Exam 16: IT Controls Part II: Security and Access
Exam 1: The Information System: an Accountants Perspective96 Questions
Exam 2: Introduction to Transaction Processing119 Questions
Exam 3: Ethics, Fraud, and Internal Control161 Questions
Exam 4: The Revenue Cycle119 Questions
Exam 5: The Expenditure Cycle Part I: Purchases and Cash Disbursements Procedures111 Questions
Exam 6: The Expenditure Cycle Part II: Payroll Processing and Fixed Asset Procedures94 Questions
Exam 7: The Conversion Cycle102 Questions
Exam 8: Financial Reporting, and Management Reporting Systems94 Questions
Exam 9: Database Management Systems105 Questions
Exam 10: The Rea Approach to Business Process Modeling76 Questions
Exam 11: Enterprise Resource Planning Systems96 Questions
Exam 12: Electronic Commerce Systems111 Questions
Exam 13: Managing the Systems Development Life Cycle93 Questions
Exam 14: Construct, Deliver, and Maintain Systems Projects92 Questions
Exam 15: IT Controls Part I: Sarbanes-Oxley and It Governance129 Questions
Exam 16: IT Controls Part II: Security and Access96 Questions
Exam 17: IT Controls Part III: Systems Development, Program Changes, and Application Controls67 Questions
Select questions type
Audit objectives for communications controls include all of the following except
Free
(Multiple Choice)
4.9/5
(31)
Correct Answer:
D
A software program that replicates itself in areas of idle memory until the system fails is called a
Free
(Multiple Choice)
4.8/5
(26)
Correct Answer:
B
What are the three security objectives of audit trails? Explain.
Free
(Essay)
4.8/5
(37)
Correct Answer:
Audit trails support system security objectives in three ways. By detecting unauthorized access to the system, the audit trail protects the system from outsiders trying to breach system controls. By monitoring system performance, changes in the system may be detected. The audit trail can also contribute to reconstructing events such as system failures, security breaches, and processing errors. In addition, the ability to monitor user activity can support increased personal accountability.
Which of the following is not an access control in a database system?
(Multiple Choice)
4.8/5
(40)
All of the following tests of controls will provide evidence that access to the data files is limited except
(Multiple Choice)
4.8/5
(36)
Which method is most likely to detect unauthorized access to the system?
(Multiple Choice)
4.9/5
(31)
A firewall is a hardware partition designed to protect networks from power surges.
(True/False)
4.7/5
(40)
All of the following techniques are used to validate electronic data interchange transactions except
(Multiple Choice)
4.8/5
(31)
Describe three ways in which IPS can be used to protect against DDoS Attacks?
(Essay)
4.8/5
(40)
Hackers can disguise their message packets to look as if they came from an authorized user and gain access to the host's network using a technique called
(Multiple Choice)
4.7/5
(33)
Which of the following is not a basic database backup and recovery feature?
(Multiple Choice)
4.9/5
(41)
A formal log-on procedure is the operating system's last line of defense against unauthorized access.
(True/False)
4.9/5
(43)
Describe two ways that passwords are used to authorize and validate messages in the electronic data interchange environment.
(Essay)
4.8/5
(38)
Showing 1 - 20 of 96
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)