Exam 16: IT Controls Part II: Security and Access
Exam 1: The Information System: an Accountants Perspective96 Questions
Exam 2: Introduction to Transaction Processing119 Questions
Exam 3: Ethics, Fraud, and Internal Control161 Questions
Exam 4: The Revenue Cycle119 Questions
Exam 5: The Expenditure Cycle Part I: Purchases and Cash Disbursements Procedures111 Questions
Exam 6: The Expenditure Cycle Part II: Payroll Processing and Fixed Asset Procedures94 Questions
Exam 7: The Conversion Cycle102 Questions
Exam 8: Financial Reporting, and Management Reporting Systems94 Questions
Exam 9: Database Management Systems105 Questions
Exam 10: The Rea Approach to Business Process Modeling76 Questions
Exam 11: Enterprise Resource Planning Systems96 Questions
Exam 12: Electronic Commerce Systems111 Questions
Exam 13: Managing the Systems Development Life Cycle93 Questions
Exam 14: Construct, Deliver, and Maintain Systems Projects92 Questions
Exam 15: IT Controls Part I: Sarbanes-Oxley and It Governance129 Questions
Exam 16: IT Controls Part II: Security and Access96 Questions
Exam 17: IT Controls Part III: Systems Development, Program Changes, and Application Controls67 Questions
Select questions type
All of the following tests of controls will provide evidence that adequate computer virus control techniques are in place and functioning except
(Multiple Choice)
4.8/5
(40)
A software program that allows access to a system without going through the normal logon procedures is called a
(Multiple Choice)
4.8/5
(28)
Which control will not reduce the likelihood of data loss due to a line error?
(Multiple Choice)
4.8/5
(36)
Malicious and destructive programs cause millions of dollars of loss to corporations annually.
(True/False)
4.8/5
(35)
Explain how transactions are audited in an electronic data interchange environment.
(Essay)
4.9/5
(43)
Disguising message packets to look as if they came from another user and to gain access to the host's network is called spooling.
(True/False)
4.8/5
(41)
The most frequent victims of program viruses are microcomputers.
(True/False)
4.9/5
(44)
Network communication poses some special types of risk for a business. What are the two broad areas of concern? Explain.
(Essay)
4.9/5
(37)
Transmitting numerous SYN packets to a targeted receiver, but NOT responding to an ACK, is
(Multiple Choice)
4.9/5
(28)
Showing 81 - 96 of 96
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)