Filters
Question type

Study Flashcards

An auditor reviewing the risks associated with a firm's Wide area network (WAN) should pay particular attention to which of the following?


A) Operating systems.
B) Computer-assisted auditing techniques (CAATs) .
C) Segregation of duties.
D) Routers and firewalls.

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

Identify which fundamental control objective belongs with the following statement: "In the event of a power failure or other disaster,the operating system should be able to achieve a controlled termination of activities from which it can later recover."


A) Protect the operating system from users.
B) The operating system must protect users from each other.
C) The operating system must be protected from itself.
D) The operating system must be protected from its environment.
E) The operating system must protect users from themselves.

F) A) and D)
G) B) and D)

Correct Answer

verifed

verified

If an auditor wanted to test the accuracy of a computer generated report they might use which of the the following approaches?


A) An access point approach.
B) The black-box approach.
C) A continuous audit.
D) A pentration test.

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Which of the following would not assist in continuous auditing?


A) Transactions can be tested and analyzed closer in time to when they actually occur.
B) Better compliance with laws and regulations.
C) It can reduce the effort required for routine testing.
D) It can be costly and time consuming to set up continuous auditing processes.

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

Most threats involving a wireless local area network (LAN) involve which of the following?


A) The attacker has access to the operating system.
B) The attacker has access to the radio link between a station and an access point.
C) The attacker has accessed the premises of the company.
D) The attacker has access to the virtual private network (VPN) .

E) A) and D)
F) B) and D)

Correct Answer

verifed

verified

An auditor should be most concerned about which of the following when reviewing the risks of a company's wireless network:


A) Confidentiality.
B) Integrity.
C) Availability.
D) All of the choices are correct.

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

Which of the statements regarding a data warehouse is incorrect?


A) It is a centralized collection of firm-wide data.
B) The purpose of a data warehouse is to provide a rich data set for management to identify patterns and to examine trends of business events.
C) Includes data for the current fiscal year only.
D) The data in a data warehouse is pulled from each of the operational databases periodically.

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

Which of the following strategies will a CPA most likely consider in auditing an entity that processes most of its financial data only in electronic form,such as a paperless system?


A) Continuous monitoring and analysis of transaction processing with an embedded audit module.
B) Increased reliance on internal control activities that emphasize the segregation of duties.
C) Verification of encrypted digital certificates used to monitor the authorization of transactions.
D) Extensive testing of firewall boundaries that restrict the recording of outside network traffic.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Which of the following best describes continuous auditing?


A) Audit-related activities are peformed throughout the period under review.
B) The full audit team remains on the client site for the entire fiscal year.
C) The database extracts every 10th transaction and flags it for audit review.
D) Auditors can generate greater fees by increasing the amount of manual testing performed for the client.

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

The Generally Accepted Auditing Standards (GAAS)issued by PCAOB provide guidelines for conducting an IS/IT audit.

A) True
B) False

Correct Answer

verifed

verified

Which of the following uses best describes the use of a VPN?


A) Connect computers,printers,and file servers in an office building.
B) Lease dedicated communication lines to guarantee connection performance between remote office locations.
C) Allow employees traveling for business to connect to home office computing resources.
D) Allocates computing resources among multiple processors and operating systems.

E) A) and B)
F) A) and D)

Correct Answer

verifed

verified

Categorize the following scenario below as management,operational,or technical controls for wireless networks' security control. "Deciding how transmissions over wireless networks should be protected."


A) Operational controls
B) Technical Controls
C) Management Controls

D) All of the above
E) A) and C)

Correct Answer

verifed

verified

Parallel simulation uses an independent program to simulate a part of an existing application program,and is designed to test the validity and to verify the accuracy of an existing application program.

A) True
B) False

Correct Answer

verifed

verified

Data governance is the convergence of data quality,data management,data policies,business process management,and risk management surrounding the handling of data in a company.

A) True
B) False

Correct Answer

verifed

verified

List common security threats for wireless LANs.Find a specific case in which the security of wireless LANs was threatened.Given the case you find,comment on how to prevent or mitigate the threats?

Correct Answer

verifed

verified

Rogue Access Points: The attacker sets u...

View Answer

What is the test data technique?


A) It uses a set of input data to validate system integrity.
B) It requires auditors to prepare both valid and invalid data to examine critical logics and controls of the system.
C) It is an automated technique that enables test data to be continually evaluated during the normal operation of a system.
D) "It uses a set of input data to validate system integrity" and "It requires auditors to prepare both valid and invalid data to examine critical logics and controls of the system" are correct.
E) None of the choices are correct.

F) C) and D)
G) A) and B)

Correct Answer

verifed

verified

The data in a data warehouse are updated when transactions are processed.

A) True
B) False

Correct Answer

verifed

verified

Identify which fundamental control objective belongs with the following statement: "One user must not be able to access,destroy,or corrupt the data or programs of another user."


A) Protect the operating system from users.
B) The operating system must protect users from each other.
C) The operating system must be protected from itself.
D) The operating system must be protected from its environment.
E) The operating system must protect users from themselves.

F) C) and E)
G) All of the above

Correct Answer

verifed

verified

Categorize the following scenario below as management,operational,or technical controls for wireless networks' security controls. "Providing regular updates in organizational policies and procedures to employees."


A) Operational controls
B) Technical Controls
C) Management Controls

D) A) and C)
E) A) and B)

Correct Answer

verifed

verified

Which of the following statements regarding the black-box approach for systems auditing is correct?


A) The auditors need to gain detailed knowledge of the systems' internal logic.
B) The black-box approach could be adequate when automated systems applications are complicated.
C) The auditors first calculate expected results from the transactions entered into the system.Then,the auditors compare these calculations to the processing or output results.
D) All of the choices are correct.

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Showing 21 - 40 of 69

Related Exams

Show Answer