Exam 16: IT Controls Part II: Security and Access

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What is EDI? How does its use affect the audit trail?

(Essay)
4.9/5
(36)

What is a virus?

(Essay)
4.8/5
(29)

All of the following tests of controls will provide evidence that adequate computer virus control techniques are in place and functioning except

(Multiple Choice)
4.8/5
(40)

Explain how the one-time password approach works.

(Essay)
4.8/5
(27)

A Trojan horse

(Multiple Choice)
4.7/5
(49)

What is a database authorization table?

(Essay)
4.7/5
(43)

A software program that allows access to a system without going through the normal logon procedures is called a

(Multiple Choice)
4.8/5
(28)

Which control will not reduce the likelihood of data loss due to a line error?

(Multiple Choice)
4.8/5
(36)

Malicious and destructive programs cause millions of dollars of loss to corporations annually.

(True/False)
4.8/5
(35)

Explain how transactions are audited in an electronic data interchange environment.

(Essay)
4.9/5
(43)

Explain the concept of discretionary access privileges.

(Essay)
4.8/5
(40)

Disguising message packets to look as if they came from another user and to gain access to the host's network is called spooling.

(True/False)
4.8/5
(41)

What is a user-defined procedure?

(Essay)
4.8/5
(42)

The most frequent victims of program viruses are microcomputers.

(True/False)
4.9/5
(44)

Network communication poses some special types of risk for a business. What are the two broad areas of concern? Explain.

(Essay)
4.9/5
(37)

Transmitting numerous SYN packets to a targeted receiver, but NOT responding to an ACK, is

(Multiple Choice)
4.9/5
(28)
Showing 81 - 96 of 96
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)