Question
16.Which control will not reduce the likelihood of data loss due to a line error? a.echo check b.encryption c.vertical parity bit d.horizontal parity bit 17.Which
16.Which control will not reduce the likelihood of data loss due to a line error?
a.echo check
b.encryption
c.vertical parity bit
d.horizontal parity bit
17.Which method will render useless data captured by unauthorized receivers?
a.echo check
b.parity bit
c.public key encryption
d.message sequencing
18.Which method is most likely to detect unauthorized access to the system?
a.message transaction log
b.data encryption standard
c.vertical parity check
d.request-response technique
19.All of the following techniques are used to validate electronic data interchange transactions except
a.value added networks can compare passwords to a valid customer file before message transmission
b.prior to converting the message, the translation software of the receiving company can compare the password against a validation file in the firm's database
c.the recipient's application software can validate the password prior to processing
d.the recipient's application software can validate the password after the transaction has been processed
20.In an electronic data interchange environment, customers routinely access
a.the vendor's price list file
b.the vendor's accounts payable file
c.the vendor's open purchase order file
d.none of the above
21.All of the following tests of controls will provide evidence that adequate computer virus control techniques are in place and functioning except
a.verifying that only authorized software is used on company computers
b.reviewing system maintenance records
c.confirming that antivirus software is in use
d.examining the password policy including a review of the authority table
22.Audit objectives for the database management include all of the following except
a.verifying that the security group monitors and reports on fault tolerance violations
b.confirming that backup procedures are adequate
c.ensuring that authorized users access only those files they need to perform their duties
d.verifying that unauthorized users cannot access data files
23.All of the following tests of controls will provide evidence that access to the data files is limited except
a.inspecting biometric controls
b.reconciling program version numbers
c.comparing job descriptions with access privileges stored in the authority table
d.attempting to retrieve unauthorized data via inference queries
24.Audit objectives for communications controls include all of the following except
a.detection and correction of message loss due to equipment failure
b.prevention and detection of illegal access to communication channels
c.procedures that render intercepted messages useless
d.all of the above
25.When auditors examine and test the call-back feature, they are testing which audit objective?
a.incompatible functions have been segregated
b.application programs are protected from unauthorized access
c.physical security measures are adequate to protect the organization from natural disaster
d.illegal access to the system is prevented and detected
16.Which control will not reduce the likelihood of data loss due to a line error?
a.echo check
b.encryption
c.vertical parity bit
d.horizontal parity bit
17.Which method will render useless data captured by unauthorized receivers?
a.echo check
b.parity bit
c.public key encryption
d.message sequencing
18.Which method is most likely to detect unauthorized access to the system?
a.message transaction log
b.data encryption standard
c.vertical parity check
d.request-response technique
19.All of the following techniques are used to validate electronic data interchange transactions except
a.value added networks can compare passwords to a valid customer file before message transmission
b.prior to converting the message, the translation software of the receiving company can compare the password against a validation file in the firm's database
c.the recipient's application software can validate the password prior to processing
d.the recipient's application software can validate the password after the transaction has been processed
20.In an electronic data interchange environment, customers routinely access
a.the vendor's price list file
b.the vendor's accounts payable file
c.the vendor's open purchase order file
d.none of the above
21.All of the following tests of controls will provide evidence that adequate computer virus control techniques are in place and functioning except
a.verifying that only authorized software is used on company computers
b.reviewing system maintenance records
c.confirming that antivirus software is in use
d.examining the password policy including a review of the authority table
22.Audit objectives for the database management include all of the following except
a.verifying that the security group monitors and reports on fault tolerance violations
b.confirming that backup procedures are adequate
c.ensuring that authorized users access only those files they need to perform their duties
d.verifying that unauthorized users cannot access data files
23.All of the following tests of controls will provide evidence that access to the data files is limited except
a.inspecting biometric controls
b.reconciling program version numbers
c.comparing job descriptions with access privileges stored in the authority table
d.attempting to retrieve unauthorized data via inference queries
24.Audit objectives for communications controls include all of the following except
a.detection and correction of message loss due to equipment failure
b.prevention and detection of illegal access to communication channels
c.procedures that render intercepted messages useless
d.all of the above
25.When auditors examine and test the call-back feature, they are testing which audit objective?
a.incompatible functions have been segregated
b.application programs are protected from unauthorized access
c.physical security measures are adequate to protect the organization from natural disaster
d.illegal access to the system is prevented and detected
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access with AI-Powered Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started