Fill This Form To Receive Instant Help
Homework answers / question archive / Utah State University ACCT 610 Chapter 16-IT Controls Part II: Security and Access TRUE/FALSE 1)In a computerized environment, the audit trail log must be printed onto paper documents
Utah State University
ACCT 610
Chapter 16-IT Controls Part II: Security and Access
TRUE/FALSE
1)In a computerized environment, the audit trail log must be printed onto paper documents.
a. |
translates third-generation languages into machine language |
b. |
assigns memory to applications |
c. |
authorizes user access |
d. |
schedules job processing |
a. |
a hacker gaining access to the system because of a security flaw |
b. |
a hardware flaw that causes the system to crash |
c. |
a virus that formats the hard drive |
d. |
the systems programmer accessing individual user files |
a. |
Trojan horse |
b. |
worm |
c. |
logic bomb |
d. |
none of the above |
a. |
logic bomb |
b. |
Trojan horse |
c. |
worm |
d. |
back door |
a. |
install antivirus software |
b. |
install factory-sealed application software |
c. |
assign and control user passwords |
d. |
install public-domain software from reputable bulletin boards |
a. |
grandfather-father-son approach |
b. |
staggered backup approach |
c. |
direct backup |
d. |
remote site, intermittent backup |
a. |
the number of backup versions retained depends on the amount of data in the file |
b. |
off-site backups are not required |
c. |
backup files can never be used for scratch files |
d. |
the more significant the data, the greater the number of backup versions |
a. |
spoofing. |
b. |
spooling. |
c. |
dual-homed. |
d. |
screening. |
a. |
backups are created using the grandfather-father-son approach |
b. |
processing a transaction file against a maser file creates a backup file |
c. |
files are backed up immediately before an update run |
d. |
if the master file is destroyed, it cannot be reconstructed |
a. |
antivirus software |
b. |
database authorization table |
c. |
passwords |
d. |
voice prints |
a. |
password |
b. |
retina prints |
c. |
voice prints |
d. |
signature characteristics |
a. |
checkpoint |
b. |
backup database |
c. |
transaction log |
d. |
database authority table |
a. |
protecting the OS from users |
b. |
protesting users from each other |
c. |
protecting users from themselves |
d. |
protecting the environment from users |
a. |
failure to change passwords on a regular basis |
b. |
using obscure passwords unknown to others |
c. |
recording passwords in obvious places |
d. |
selecting passwords that can be easily detected by computer criminals |
a. |
detect unauthorized access to systems |
b. |
facilitate reconstruction of events |
c. |
reduce the need for other forms of security |
d. |
promote personal accountability |
a. |
echo check |
b. |
encryption |
c. |
vertical parity bit |
d. |
horizontal parity bit |
a. |
echo check |
b. |
parity bit |
c. |
public key encryption |
d. |
message sequencing |
a. |
message transaction log |
b. |
data encryption standard |
c. |
vertical parity check |
d. |
request-response technique |
a. |
value added networks can compare passwords to a valid customer file before message transmission |
b. |
prior to converting the message, the translation software of the receiving company can compare the password against a validation file in the firm's database |
c. |
the recipient's application software can validate the password prior to processing |
d. |
the recipient's application software can validate the password after the transaction has been processed |
a. |
the vendor's price list file |
b. |
the vendor's accounts payable file |
c. |
the vendor's open purchase order file |
d. |
none of the above |
a. |
verifying that only authorized software is used on company computers |
b. |
reviewing system maintenance records |
c. |
confirming that antivirus software is in use |
d. |
examining the password policy including a review of the authority table |
a. |
verifying that the security group monitors and reports on fault tolerance violations |
b. |
confirming that backup procedures are adequate |
c. |
ensuring that authorized users access only those files they need to perform their duties |
d. |
verifying that unauthorized users cannot access data files |
a. |
inspecting biometric controls |
b. |
reconciling program version numbers |
c. |
comparing job descriptions with access privileges stored in the authority table |
d. |
attempting to retrieve unauthorized data via inference queries |
a. |
detection and correction of message loss due to equipment failure |
b. |
prevention and detection of illegal access to communication channels |
c. |
procedures that render intercepted messages useless |
d. |
all of the above |
a. |
incompatible functions have been segregated |
b. |
application programs are protected from unauthorized access |
c. |
physical security measures are adequate to protect the organization from natural disaster |
d. |
illegal access to the system is prevented and detected |
a. |
all EDI transactions are authorized |
b. |
unauthorized trading partners cannot gain access to database records |
c. |
authorized trading partners have access only to approved data |
d. |
a complete audit trail is maintained |
a. |
all EDI transactions are authorized |
b. |
unauthorized trading partners cannot gain access to database records |
c. |
a complete audit trail of EDI transactions is maintained |
d. |
backup procedures are in place and functioning properly |
a. |
the policy on the purchase of software only from reputable vendors |
b. |
the policy that all software upgrades are checked for viruses before they are implemented |
c. |
the policy that current versions of antivirus software should be available to all users |
d. |
the policy that permits users to take files home to work on them |
a. |
biometric controls |
b. |
encryption controls |
c. |
backup controls |
d. |
inference controls |
a. |
access the vendor's accounts receivable file with read/write authority |
b. |
access the vendor's price list file with read/write authority |
c. |
access the vendor's inventory file with read-only authority |
d. |
access the vendor's open purchase order file with read-only authority |
a. |
is a printout of all incoming and outgoing transactions |
b. |
is an electronic log of all transactions received, translated, and processed by the system |
c. |
is a computer resource authority table |
d. |
consists of pointers and indexes within the database |
a. |
firewalls |
b. |
one-time passwords |
c. |
field interrogation |
d. |
data encryption |
a. |
hardware access procedures |
b. |
antivirus software |
c. |
parity checks |
d. |
data encryption |
a. |
transaction authorization and validation |
b. |
access controls |
c. |
EDI audit trail |
d. |
all of the above |
a. |
special materials used to insulate computer facilities |
b. |
a system that enforces access control between two networks |
c. |
special software used to screen Internet access |
d. |
none of the above |
a. |
operating system. |
b. |
user manual. |
c. |
database schema. |
d. |
user view. |
e. |
application listing. |
a. |
operating system. |
b. |
database management system. |
c. |
utility system |
d. |
facility system. |
e. |
object system. |
:
Already member? Sign In