Exam 16: IT Controls Part II: Security and Access
Exam 1: The Information System: an Accountants Perspective96 Questions
Exam 2: Introduction to Transaction Processing119 Questions
Exam 3: Ethics, Fraud, and Internal Control161 Questions
Exam 4: The Revenue Cycle119 Questions
Exam 5: The Expenditure Cycle Part I: Purchases and Cash Disbursements Procedures111 Questions
Exam 6: The Expenditure Cycle Part II: Payroll Processing and Fixed Asset Procedures94 Questions
Exam 7: The Conversion Cycle102 Questions
Exam 8: Financial Reporting, and Management Reporting Systems94 Questions
Exam 9: Database Management Systems105 Questions
Exam 10: The Rea Approach to Business Process Modeling76 Questions
Exam 11: Enterprise Resource Planning Systems96 Questions
Exam 12: Electronic Commerce Systems111 Questions
Exam 13: Managing the Systems Development Life Cycle93 Questions
Exam 14: Construct, Deliver, and Maintain Systems Projects92 Questions
Exam 15: IT Controls Part I: Sarbanes-Oxley and It Governance129 Questions
Exam 16: IT Controls Part II: Security and Access96 Questions
Exam 17: IT Controls Part III: Systems Development, Program Changes, and Application Controls67 Questions
Select questions type
In an electronic data interchange environment, customers routinely access
(Multiple Choice)
4.8/5
(42)
Many techniques exist to reduce the likelihood and effects of data communication hardware failure. One of these is
(Multiple Choice)
4.8/5
(37)
One purpose of a database system is the easy sharing of data. But this ease of sharing can also jeopardize security. Discuss at least three forms of access control designed to reduce this risk.
(Essay)
4.8/5
(38)
Audit objectives for the database management system include all of the following except
(Multiple Choice)
4.7/5
(36)
In a telecommunications environment, line errors can be detected by using an echo check.
(True/False)
4.8/5
(38)
When auditors examine and test the call-back feature, they are testing which audit objective?
(Multiple Choice)
4.8/5
(29)
A value added network can detect and reject transactions by unauthorized trading partners.
(True/False)
4.8/5
(37)
The message authentication code is calculated by the sender and the receiver of a data transmission.
(True/False)
4.9/5
(40)
Subschemas are used to authorize user access privileges to specific data elements.
(True/False)
4.7/5
(38)
In an electronic data interchange environment, customers routinely
(Multiple Choice)
4.8/5
(36)
The database attributes that individual users have permission to access are defined in
(Multiple Choice)
4.9/5
(42)
Electronic data interchange translation software interfaces with the sending firm and the value added network.
(True/False)
4.7/5
(35)
Computer viruses usually spread throughout the system before being detected.
(True/False)
4.8/5
(39)
Operating system integrity is not of concern to accountants because only hardware risks are involved.
(True/False)
4.9/5
(35)
Which method will render useless data captured by unauthorized receivers?
(Multiple Choice)
4.9/5
(38)
Audit objectives in the electronic data interchange (EDI) environment include all of the following except
(Multiple Choice)
4.8/5
(31)
Showing 41 - 60 of 96
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)