Exam 16: IT Controls Part II: Security and Access

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

In an electronic data interchange environment, customers routinely access

(Multiple Choice)
4.8/5
(42)

What is deep packet inspection?

(Essay)
4.9/5
(42)

Many techniques exist to reduce the likelihood and effects of data communication hardware failure. One of these is

(Multiple Choice)
4.8/5
(37)

One purpose of a database system is the easy sharing of data. But this ease of sharing can also jeopardize security. Discuss at least three forms of access control designed to reduce this risk.

(Essay)
4.8/5
(38)

Briefly define an operating system.

(Essay)
4.7/5
(29)

Audit objectives for the database management system include all of the following except

(Multiple Choice)
4.7/5
(36)

What problem is common to all private key encryption techniques?

(Essay)
4.9/5
(42)

In a telecommunications environment, line errors can be detected by using an echo check.

(True/False)
4.8/5
(38)

When auditors examine and test the call-back feature, they are testing which audit objective?

(Multiple Choice)
4.8/5
(29)

A value added network can detect and reject transactions by unauthorized trading partners.

(True/False)
4.8/5
(37)

The message authentication code is calculated by the sender and the receiver of a data transmission.

(True/False)
4.9/5
(40)

Subschemas are used to authorize user access privileges to specific data elements.

(True/False)
4.7/5
(38)

In an electronic data interchange environment, customers routinely

(Multiple Choice)
4.8/5
(36)

The database attributes that individual users have permission to access are defined in

(Multiple Choice)
4.9/5
(42)

Electronic data interchange translation software interfaces with the sending firm and the value added network.

(True/False)
4.7/5
(35)

Which is not a biometric device?

(Multiple Choice)
4.9/5
(43)

Computer viruses usually spread throughout the system before being detected.

(True/False)
4.8/5
(39)

Operating system integrity is not of concern to accountants because only hardware risks are involved.

(True/False)
4.9/5
(35)

Which method will render useless data captured by unauthorized receivers?

(Multiple Choice)
4.9/5
(38)

Audit objectives in the electronic data interchange (EDI) environment include all of the following except

(Multiple Choice)
4.8/5
(31)
Showing 41 - 60 of 96
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)