Exam 16: IT Controls Part II: Security and Access
Exam 1: The Information System: an Accountants Perspective95 Questions
Exam 2: Introduction to Transaction Processing113 Questions
Exam 3: Ethics,fraud,and Internal Control158 Questions
Exam 4: The Revenue Cycle118 Questions
Exam 5: The Expenditure Cycle Part I: Purchases and Cash Disbursements Procedures107 Questions
Exam 6: The Expenditure Cycle Part Ii: Payroll Processing and Fixed Asset Procedures92 Questions
Exam 7: The Conversion Cycle100 Questions
Exam 8: General Ledger,financial Reporting,and Management Reporting Systems93 Questions
Exam 9: Database Management Systems105 Questions
Exam 10: The Rea Approach to Business Process Modeling75 Questions
Exam 11: Enterprise Resource Planning Systems96 Questions
Exam 12: Electronic Commerce Systems111 Questions
Exam 13: Managing the Systems Development Life Cycle92 Questions
Exam 14: Construct,deliver,and Maintain Systems Projects93 Questions
Exam 15: IT Controls Part I: Sarbanes-Oxley and It Governance128 Questions
Exam 16: IT Controls Part II: Security and Access94 Questions
Exam 17: IT Controls Part III: Systems Development, program Changes, and Application Controls67 Questions
Select questions type
Describe two tests of controls that would provide evidence that the database management system is protected against unauthorized access attempts.
(Essay)
4.9/5
(41)
To preserve audit trails in a computerized environment,transaction logs are permanent records of transactions.
(True/False)
4.8/5
(33)
In a computerized environment,the audit trail log must be printed onto paper documents.
(True/False)
4.9/5
(33)
A software program that replicates itself in areas of idle memory until the system fails is called a
(Multiple Choice)
4.8/5
(39)
An integrated group of programs that supports the applications and facilitates their access to specified resources is called a (an)
(Multiple Choice)
4.7/5
(39)
One purpose of a database system is the easy sharing of data.But this ease of sharing can also jeopardize security.Discuss at least three forms of access control designed to reduce this risk.
(Essay)
4.9/5
(34)
A formal log-on procedure is the operating system's first line of defense.Explain how this works.
(Essay)
5.0/5
(44)
Audit objectives for communications controls include all of the following except
(Multiple Choice)
4.8/5
(34)
Firewalls are special materials used to insulate computer facilities
(True/False)
5.0/5
(41)
The most frequent victims of program viruses are microcomputers.
(True/False)
4.9/5
(38)
In an electronic data interchange environment,customers routinely access
(Multiple Choice)
4.9/5
(40)
In an electronic data interchange environment,the audit trail
(Multiple Choice)
4.9/5
(33)
Computer viruses usually spread throughout the system before being detected.
(True/False)
4.9/5
(47)
Passwords are secret codes that users enter to gain access to systems.Security can be compromised by all of the following except
(Multiple Choice)
4.8/5
(29)
Showing 61 - 80 of 94
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)