Exam 16: IT Controls Part II: Security and Access
Exam 1: The Information System: an Accountants Perspective96 Questions
Exam 2: Introduction to Transaction Processing119 Questions
Exam 3: Ethics, Fraud, and Internal Control161 Questions
Exam 4: The Revenue Cycle119 Questions
Exam 5: The Expenditure Cycle Part I: Purchases and Cash Disbursements Procedures111 Questions
Exam 6: The Expenditure Cycle Part II: Payroll Processing and Fixed Asset Procedures94 Questions
Exam 7: The Conversion Cycle102 Questions
Exam 8: Financial Reporting, and Management Reporting Systems94 Questions
Exam 9: Database Management Systems105 Questions
Exam 10: The Rea Approach to Business Process Modeling76 Questions
Exam 11: Enterprise Resource Planning Systems96 Questions
Exam 12: Electronic Commerce Systems111 Questions
Exam 13: Managing the Systems Development Life Cycle93 Questions
Exam 14: Construct, Deliver, and Maintain Systems Projects92 Questions
Exam 15: IT Controls Part I: Sarbanes-Oxley and It Governance129 Questions
Exam 16: IT Controls Part II: Security and Access96 Questions
Exam 17: IT Controls Part III: Systems Development, Program Changes, and Application Controls67 Questions
Select questions type
Describe two tests of controls that would provide evidence that the database management system is protected against unauthorized access attempts.
(Essay)
4.8/5
(38)
A worm is software program that replicates itself in areas of idle memory until the system fails.
(True/False)
4.8/5
(36)
Operating system controls are of interest to system professionals but should not concern accountants and auditors.
(True/False)
4.7/5
(33)
In determining whether a system is adequately protected from attacks by computer viruses, all of the following policies are relevant except
(Multiple Choice)
4.8/5
(33)
In a computerized environment, the audit trail log must be printed onto paper documents.
(True/False)
4.8/5
(40)
A formal log-on procedure is the operating system's first line of defense. Explain how this works.
(Essay)
4.8/5
(42)
Contrast the Private Encryption Standard approach with the Public Key Encryption approach to controlling access to telecommunication messages.
(Essay)
4.9/5
(43)
Audit trails in computerized systems are comprised of two types of audit logs: detailed logs of individual keystrokes and event-oriented logs.
(True/False)
5.0/5
(33)
All of the following will reduce the exposure to computer viruses except
(Multiple Choice)
4.9/5
(34)
The request-response technique should detect if a data communication transmission has been diverted.
(True/False)
4.8/5
(36)
Passwords are secret codes that users enter to gain access to systems. Security can be compromised by all of the following except
(Multiple Choice)
4.9/5
(35)
In an electronic data interchange (EDI) environment, when the auditor compares the terms of the trading partner agreement against the access privileges stated in the database authority table, the auditor is testing which audit objective?
(Multiple Choice)
4.9/5
(47)
Electronic data interchange customers may be given access to the vendor's data files.
(True/False)
4.7/5
(40)
List three methods of controlling unauthorized access to telecommunication messages.
(Essay)
4.8/5
(31)
Showing 61 - 80 of 96
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)