Exam 16: IT Controls Part II: Security and Access
Exam 1: The Information System: an Accountants Perspective96 Questions
Exam 2: Introduction to Transaction Processing119 Questions
Exam 3: Ethics, Fraud, and Internal Control161 Questions
Exam 4: The Revenue Cycle119 Questions
Exam 5: The Expenditure Cycle Part I: Purchases and Cash Disbursements Procedures111 Questions
Exam 6: The Expenditure Cycle Part II: Payroll Processing and Fixed Asset Procedures94 Questions
Exam 7: The Conversion Cycle102 Questions
Exam 8: Financial Reporting, and Management Reporting Systems94 Questions
Exam 9: Database Management Systems105 Questions
Exam 10: The Rea Approach to Business Process Modeling76 Questions
Exam 11: Enterprise Resource Planning Systems96 Questions
Exam 12: Electronic Commerce Systems111 Questions
Exam 13: Managing the Systems Development Life Cycle93 Questions
Exam 14: Construct, Deliver, and Maintain Systems Projects92 Questions
Exam 15: IT Controls Part I: Sarbanes-Oxley and It Governance129 Questions
Exam 16: IT Controls Part II: Security and Access96 Questions
Exam 17: IT Controls Part III: Systems Development, Program Changes, and Application Controls67 Questions
Select questions type
Firewalls are special materials used to insulate computer facilities
(True/False)
4.8/5
(46)
Access controls protect databases against destruction, loss or misuse through unauthorized access.
(True/False)
4.7/5
(39)
What is an operating system? What does it do? What are operating system control objectives?
(Essay)
4.9/5
(35)
Which of the following is considered an unintentional threat to the integrity of the operating system?
(Multiple Choice)
4.9/5
(46)
Examining programmer authority tables for information about who has access to Data Definition Language commands will provide evidence about who is responsible for creating subschemas.
(True/False)
4.8/5
(44)
All of the following are designed to control exposures from subversive threats except
(Multiple Choice)
4.8/5
(47)
To preserve audit trails in a computerized environment, transaction logs are permanent records of transactions.
(True/False)
4.9/5
(33)
An integrated group of programs that supports the applications and facilitates their access to specified resources is called a (an)
(Multiple Choice)
4.8/5
(32)
In an electronic data interchange environment, the audit trail
(Multiple Choice)
4.8/5
(34)
The operating system performs all of the following tasks except
(Multiple Choice)
4.9/5
(34)
A recovery module suspends all data processing while the system reconciles its journal files against the database.
(True/False)
4.9/5
(35)
The database management system controls access to program files.
(True/False)
4.9/5
(35)
All of the following are objectives of operating system control except
(Multiple Choice)
4.8/5
(35)
Showing 21 - 40 of 96
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)