All Matches
Solution Library
Expert Answer
Textbooks
Search Textbook questions, tutors and Books
Oops, something went wrong!
Change your search query and then try again
Toggle navigation
FREE Trial
S
Books
FREE
Tutors
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Hire a Tutor
AI Study Help
New
Search
Search
Sign In
Register
study help
business
auditing assurance services
Questions and Answers of
Auditing Assurance Services
How can modems improve the reliability of the communication subsystem?
Briefly describe three security functions performed by a port-protection device.
Briefly explain the difference between multiplexing and concentration techniques. How do they improve the reliability of the communication subsystem?
Briefly explain the difference between a loop check and redundancy as a means of detecting errors on a communication line. What are the relative advantages and disadvantages of each approach?
Briefly explain the difference between a parity check and a cyclic redundancy check,
Give an example of where forward error correcting codes might be chosen in preference to retransmission as a means of error correction.
What is the purpose of flow controls in the communication subsystem? Briefly explain the difference between the stop-and-wait flow control protocol and the sliding-window flow control protocol.
What is the purpose of link controls in the communication subsystem?
What is meant by the topology of a network? List three factors that should be considered when choosing a network topology.
From a control perspective, list the advantages and disadvantages of the following topologies: (a) ring, (b) mesh, and (c) star.
Briefly explain the function that channel access controls perform within the communication subsystem. What is the difference between polling methods and contention methods as a means of channel
Briefly describe two problems that can arise with token passing techniques as a means of channel access control.
Why is encryption an important means of protecting the integrity of data passing over public communication lines? Is encryption also useful as a means of protecting data passing over private
Distinguish between link encryption and end-to-end encryption. What are the relative strengths and limitations of link encryption versus end-to-end encryption?
Distinguish between block ciphers and stream ciphers. What are the relative strengths and limitations of block ciphers versus stream ciphers?
Explain the nature of a message authentication code (MAC). Why are message authentication codes often used in electronic funds transfer systems?
Expected losses from which types of threats'can be reduced by using message sequence numbers? Why must encryption controls be used in conjunction with message sequence numbers?
Briefly explain the nature of a request-response mechanism. Why is it unlikely that request-response mechanisms would be used extensively in commercial data communication systems?
Briefly explain the difference between a bridge, รข router, and a gateway. Why are these devices useful from a control viewpoint?
What is a communication architecture? How is the concept of a communication architecture useful to us as auditors?
What is the purpose of the accounting audit trail in the communication subsystem? List four items that might be contained in the accounting audit trail in the communication subsystem.
How does the operations audit trail in the communication subsystem assist network supervisors in their decisions on how to reconfigure the network to improve efficiency? List three data items that
Why is it difficult to provide backup for all components that might be used in a communication network?
Why is it especially important that operations personnel be well-trained with respect to backup and recovery procedures for a communication network?
Which of the following statements about transmission impairments is true?a. Delay distortion is the weakening of a signal as it traverses some transmission mediumb. Digital signals are subject to
Which of the following conditions is most likely to lead to an increase in white noise?a. Faulty switching gearb. Atmospheric conditionsc. Poor contactsd. Temperature increases
Which of the following types of subversive attacks on a communication network is a passive attack?a. Message modificationb. Denial of message servicec. Traffic analysisd. Changed message order
Which of the following transmission media is most resistant to wiretapping?a. Optical fiberb. Satellite microwavec. Twisted-pair wired. Infrared
Which of the following transmission media is most resistant to interference?a. Radio frequencyb. Coaxial cablec. Terrestrial microwaved. Satellite microwave
As a control, line conditioning is likely to be least effective against which of the following threats?a. Noiseb. Wiretappingc. Attenuationd. Distortion
Which of the following usually is not a purpose of a modem?a. Reduce line errors caused by noiseb. Produce encrypted messagesc. Convert digital signals to analog signalsd. Increase the speed of data
Which of the following is not a desirable control feature in a modem?a. Dynamic equalizationb. Automatic dial-up capabilitiesc. Multiple transmission speedsd. Attenuation amplification
Which of the following functions is unlikely to be performed by a portprotection device?a. Forward error correction of line errors that arise through noise and distortionb. Limiting calls to a host
Packet switching is an example of a:a. Multiplexing techniqueb. Line conditioning techniquec. Concentration techniqued. Modulation technique
Which of the following is not a control benefit that arises as a result of using concentration techniques in a communication network?a. There is a reduction in the amount of data available to a
Which of the following error detection controls has the most impact on the throughput of a communication line?a. Horizontal parity checkb. Cyclic redundancy codec. Vertical parity checkd. Loop check
Forward error correcting codes are most likely to be used to detect line errors with which of the following transmission media?a. Coaxial cableb. Infraredc. Optical fiberd. Satellite microwave
The primary purpose of flow controls is to:a. Detect and correct errors on a communication line caused by excessive traffic on the lineb. Regulate the rate at which a node in a communication network
In choosing a network topology, maximum reliability can be achieved using a:a. Star networkb. Ring networkc. Mesh networkd. Multidrop line network
Which of the following statements about bus topologies versus ring topologies is false?a. Encryption is a more important control in a bus topology compared with a ring topologyb. The taps used in a
Which of the following statements about star topologies is false?a. A star topology is more reliable than a mesh topologyb. The hub is the most critical node in a star networkc. Servicing and
Which of the following problems is unlikely to undermine the reliability of a token ring local area network?a. A node could fail to release the token after capturing it to read a messageb. Tokens
Which of the following is an advantage of using link encryption?a. Individual nodes in the network do not have to be protectedb. The exposure that results from compromise of an encryption key is
End-to-end encryption provides only limited protection against a subversive attack that uses:a. Message insertionb. Spurious associationsc. Change of message orderd. Traffic analysis
A characteristic of a stream cipher is that it:a. Transforms variable-length blocks of cleartext to ciphertextb. Uses a constant fixed-length key to produce ciphertextc. Transforms cleartext on a
When encryption is used in the communication subsystem, the primary purpose of an error propagation code is to protect against:a. Release of message contentsb. Spurious associationsc. Change of
A message authentication code is used to protect against:a. Changes to the content of a messageb. Traffic analysisc. Release of message contentsd. Exposures that arise when PINs are transmitted in
Which of the following controls does not protect against message sequence numbers being altered?a. Error propagation codesb. Cyclic redundancy check c.. Message authentication codesd. Stream ciphers
A request-response mechanism is most likely to be used in a:a. System where the receiver and sender are in constant communication with each other b Military data communication system where data
Which of the following is not a reason for establishing an internet?a. To improve the overall reliability of the networkb. To better exercise access controls over the various subnetworksc. To confine
In the context of the OSI communication architecture, in which of the following layers are encryption controls unlikely to be exercised?a. Presentationb. Data linkc. Physicald. Transport
Which of the following data items is most likely to appear in the operations audit trail and not the accounting audit trail for the communication subsystem?a. Time and date at which the message was
You are the external auditor for Centnet Pty. Ltd., a public electronic funds transfer network that operates switches in the capital cities of all states in Australia. Because Centnet has a large
Centnet Pty. Ltd. is a public electronic funds transfer network that operates switches in the capital cities of all states in Australia (see case 12-1). Because much of the data transmitted
During 1984-85, the credit union industry in Australia considered various ways of improving the electronic funds transfer services that it offered to its members. Most credit unions already provided
To provide more extensive services to their customers, financial institutions in some countries are becoming increasingly involved in using interchange network facilities. In an interchange network
You are the partner-in-charge of information systems auditing for a large public accounting firm. One of your clients is a major insurance company that is a mature user of computer-based information
Which of the following actions is most likely to increase the number of errors made during data input to an application system:a. Direct entry of data captured during interaction between a clerk and
The factor most likely to affect the grade and weight of paper chosen for a source document is:a. The conditions under which the source document will be completedb. Whether the documents will be
In the layout of a source document:a. To prevent users from being confused, keying instructions should not appear on the formb. Instructions should not be combined with questionsc. Fields should be
The primary factor affecting the design of a data-entry screen is:a. The amount of data to be collected on the screenb. The expertise and experience of the keyboard operatorc. How frequently the
If a screen is used for direct entry of input data, it should be organized to:a. Maximize the number of vertical alignment points to decrease screen complexityb. Mirror the way in which data is to be
Which of the following is not a design guideline for captions on a data-entry screen?a. Use uppercase type font for captions and lowercase type font for dataentry fieldsb. Fully spell out captions if
Which of the following is not a design guideline for data-entry field design on a screen?a. Tab automatically to the next field when the current field is full of datab. In the case of a repeating
Which of the following is not a design guideline for using color on a dataentry screen?a. Use colors sparinglyb. Use bright colors so differences are highlightedc. Use colors that are widely spaced
Under what circumstances will a data-entry screen keyboard operator tolerate the slowest response time?a. The transition between one screen and the next screenb. The transition between one field and
If the product number A5723 is coded as A2753, this is an example of a:a. Truncation errorb. Double transposition errorc. Random errord. Transcription error
A strategy for reducing coding errors is to:a. Have only numeric codesb. Group more characters in a chunk of informationc. If a mixed alphabetic-numeric code is used, group alphabetics together and
The code AJB/156/7G is most likely to be an example of a(n):a. Hierarchical codeb. Block sequence codec. Alphabetic derivation coded. Serial code
Given the code 7215 , modulus 13 , and the weights \(2-1-2-1\), the check digit is:a. 1b. 10c. 0d. 3
Which of the following guidelines should not be used when designing a batch?a. Have only one type of document in the batchb. Have the batch small enough to facilitate locating errorsc. Have the batch
A check for missing data/blanks is an example of a:a. Record checkb. Set membership checkc. Field checkd. Batch check
A check for a valid sign (numerics) is an example of:a. Record checkb. Batch checkc. Field checkd. Alphabetics/numerics check
The purpose of an input validation sequence check is to:a. Check that input files are loaded in the correct orderb. Check that multiple physical records for a single logical record follow the
The purpose of a file retention date is to:a. Enable files with the same generation number to be distinguishedb. Indicate when the file should be recovered from production activitiesc. Prevent the
Novice users are most likely to make errors when they use a:a. Menu-driven languageb. Command languagec. Question-answer languaged. Forms-based language
To reduce errors, it is better to use a command language that has:a. Specification of arguments without having to use keywordsb. A small number of commands with a large number of argumentsc. A large
Which of the following is a strength of using a natural-language interface to an application system?a. It copes well with the ambiguity and redundancy inherent in natural languageb. The lexicon
Which of the following is a limitation in the use of direct manipulation interfaces to application systems?a. They are error-prone, even with experienced users, because they are not preciseb. It is
During lexical validation of instruction input, which of the following "words" would be classified as a literal?a. A reserved wordb. A mathematical operatorc. A labeld. A numerical constant
Which of the following is not a function of the syntax analyzer during instruction input?a. Identifies the sequence of operations to be performedb. Classifies identifiers as either labels or
Which of the following would be identified as an error during semantic validation of instruction input?a. Use of a reserved word as a literalb. A missing parenthesis in a mathematical equationc.
Which of the following data items is likely to be most useful as part of the operations audit trail (rather than the accounting audit trail) for the input subsystem?a. The identity of the person who
Which of the following statements about existence controls in the input subsystem is most likely to be false?a. Existence controls for instruction input are more important than existence bontrols for
Orchard Distributions Pte. Ltd. is a large, Singaporean-based distributor of clothing products to other companies throughout Southeast Asia. Orders are received from customers either by telephone,
Chang \& Co. is a Malaysian civil engineering firm based in Kuala Lumpur. It performs construction work throughout Southeast Asia. The firm employs 1,000 people at various offices and construction
You are the internal auditor for a large distributor participating in the design of a new order-filling system. The programmer responsible for the design of the input validation program asks your
Refer to case 10-1. Using the bill-payment-by-telephone system, customers enter the following data:a. customer numberb. account numberc. creditor numberd. amount to be paid to creditor in centse.
Keep-on-Truckin Corporation (KOTC) is a manufacturer and distributor of shoes. It has established electronic data interchange (EDI) links with most of its customers.The sequence of electronic
Canterbury Convenience Stores (CCS) is a newly formed organization in Christchurch, New Zealand. It comprises 10 moderately sized convenience stores that previously operated independently of each
You are an external auditor in a firm that undertakes the audit of Canadian Life and Mutual (CLM), a large, Montreal-based financial institution. CLM relies heavily on its computer-based information
Ferntree Products Limited (FPL) is a large New Zealand-based manufacturer of diverse products with headquarters in Auckland. It uses information technology extensively to support all aspects of its
Dayton Deliveries (DD) Plc. is a large Manchester-based distribution company with an extensive and diverse customer base scattered throughout England. DD is regarded as a market leader in the
You are an information systems auditor in the firm of external auditors for Black Snake Breweries (BSB) Ltd., a large Brisbane-based manufacturer and supplier of beer to Australia, New Zealand, Papua
Hunger-Payne (HP) Inc. is a medium-sized Atlanta-based manufacturer and distributor of snack-foods. It has sought to establish a niche in the marketplace by developing products aimed at
Briefly describe the functions of the boundary subsystem. Give two components that perform basic activities in the boundary subsystem.
Why are boundary subsystem controls becoming more important? Do you expect this trend to continue? If so, why?
Define the following terms:a. Cryptologyb. Cryptographyc. Cryptanalysisd. Cryptogram
Briefly explain the difference between transposition ciphers, substitution ciphers, and product ciphers. Which type of cipher is used most often in modern cryptosystems? Why?
What is meant by the "work factor" associated with a cipher system? Explain the relationship between the work factor and the size of the cryptographic key.
Showing 800 - 900
of 2689
First
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
Last