A) Operating systems.
B) Computer-assisted auditing techniques (CAATs) .
C) Segregation of duties.
D) Routers and firewalls.
Correct Answer
verified
Multiple Choice
A) Protect the operating system from users.
B) The operating system must protect users from each other.
C) The operating system must be protected from itself.
D) The operating system must be protected from its environment.
E) The operating system must protect users from themselves.
Correct Answer
verified
Multiple Choice
A) An access point approach.
B) The black-box approach.
C) A continuous audit.
D) A pentration test.
Correct Answer
verified
Multiple Choice
A) Transactions can be tested and analyzed closer in time to when they actually occur.
B) Better compliance with laws and regulations.
C) It can reduce the effort required for routine testing.
D) It can be costly and time consuming to set up continuous auditing processes.
Correct Answer
verified
Multiple Choice
A) The attacker has access to the operating system.
B) The attacker has access to the radio link between a station and an access point.
C) The attacker has accessed the premises of the company.
D) The attacker has access to the virtual private network (VPN) .
Correct Answer
verified
Multiple Choice
A) Confidentiality.
B) Integrity.
C) Availability.
D) All of the choices are correct.
Correct Answer
verified
Multiple Choice
A) It is a centralized collection of firm-wide data.
B) The purpose of a data warehouse is to provide a rich data set for management to identify patterns and to examine trends of business events.
C) Includes data for the current fiscal year only.
D) The data in a data warehouse is pulled from each of the operational databases periodically.
Correct Answer
verified
Multiple Choice
A) Continuous monitoring and analysis of transaction processing with an embedded audit module.
B) Increased reliance on internal control activities that emphasize the segregation of duties.
C) Verification of encrypted digital certificates used to monitor the authorization of transactions.
D) Extensive testing of firewall boundaries that restrict the recording of outside network traffic.
Correct Answer
verified
Multiple Choice
A) Audit-related activities are peformed throughout the period under review.
B) The full audit team remains on the client site for the entire fiscal year.
C) The database extracts every 10th transaction and flags it for audit review.
D) Auditors can generate greater fees by increasing the amount of manual testing performed for the client.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Connect computers,printers,and file servers in an office building.
B) Lease dedicated communication lines to guarantee connection performance between remote office locations.
C) Allow employees traveling for business to connect to home office computing resources.
D) Allocates computing resources among multiple processors and operating systems.
Correct Answer
verified
Multiple Choice
A) Operational controls
B) Technical Controls
C) Management Controls
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) It uses a set of input data to validate system integrity.
B) It requires auditors to prepare both valid and invalid data to examine critical logics and controls of the system.
C) It is an automated technique that enables test data to be continually evaluated during the normal operation of a system.
D) "It uses a set of input data to validate system integrity" and "It requires auditors to prepare both valid and invalid data to examine critical logics and controls of the system" are correct.
E) None of the choices are correct.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Protect the operating system from users.
B) The operating system must protect users from each other.
C) The operating system must be protected from itself.
D) The operating system must be protected from its environment.
E) The operating system must protect users from themselves.
Correct Answer
verified
Multiple Choice
A) Operational controls
B) Technical Controls
C) Management Controls
Correct Answer
verified
Multiple Choice
A) The auditors need to gain detailed knowledge of the systems' internal logic.
B) The black-box approach could be adequate when automated systems applications are complicated.
C) The auditors first calculate expected results from the transactions entered into the system.Then,the auditors compare these calculations to the processing or output results.
D) All of the choices are correct.
Correct Answer
verified
Showing 21 - 40 of 69
Related Exams