Exam 16: IT Controls Part II: Security and Access

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Public key encryption

(Multiple Choice)
4.9/5
(38)

Firewalls are special materials used to insulate computer facilities

(True/False)
4.8/5
(46)

Access controls protect databases against destruction, loss or misuse through unauthorized access.

(True/False)
4.7/5
(39)

What is an operating system? What does it do? What are operating system control objectives?

(Essay)
4.9/5
(35)

Which of the following is true?

(Multiple Choice)
4.9/5
(39)

Which of the following is considered an unintentional threat to the integrity of the operating system?

(Multiple Choice)
4.9/5
(46)

Discuss the key features of the one-time password technique:

(Essay)
4.9/5
(33)

Advance encryption standard (AES) is

(Multiple Choice)
4.7/5
(35)

Examining programmer authority tables for information about who has access to Data Definition Language commands will provide evidence about who is responsible for creating subschemas.

(True/False)
4.8/5
(44)

All of the following are designed to control exposures from subversive threats except

(Multiple Choice)
4.8/5
(47)

To preserve audit trails in a computerized environment, transaction logs are permanent records of transactions.

(True/False)
4.9/5
(33)

An integrated group of programs that supports the applications and facilitates their access to specified resources is called a (an)

(Multiple Choice)
4.8/5
(32)

In an electronic data interchange environment, the audit trail

(Multiple Choice)
4.8/5
(34)

What are the auditor's concerns in testing EDI controls?

(Essay)
4.8/5
(35)

Discuss three sources of exposure (threats) to the operating system.

(Essay)
4.7/5
(35)

The operating system performs all of the following tasks except

(Multiple Choice)
4.9/5
(34)

Audit trails cannot be used to

(Multiple Choice)
4.8/5
(37)

A recovery module suspends all data processing while the system reconciles its journal files against the database.

(True/False)
4.9/5
(35)

The database management system controls access to program files.

(True/False)
4.9/5
(35)

All of the following are objectives of operating system control except

(Multiple Choice)
4.8/5
(35)
Showing 21 - 40 of 96
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)