Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Hey can someone please help me with #9-15 (7 m/c) inpat because the customeraccuntd durin 0. Requiring a user ID and password would be an
Hey can someone please help me with #9-15 (7 m/c)
inpat because the customeraccuntd durin 0. Requiring a user ID and password would be an 14. Which of the following best describes continuous was most likely detected by a a. Completeness check b Limit check c. Validity check d. Reasonableness check The parpose of logical security controls i &. Restrict access to data b. Limit access to hardware example of what type of control? a. Detective. k Corrective c. Preventative d. Reactive auditing? techniques (CAAT). b. Oversight of continuous monitoring c. The use of continuous risk assessment, continuous controls assessment, and assessment u. Which is NOT a benefit of user-devekoped applications (UDAs? a. Quick to develop and use. b. Readily available and at a low cost. c. More configurable and flexible. d. Easy to control access to. 7. d. The ability of internal auditors to continually perform auditing steps. 15. When diseussing integration of IT into audit Record processing results. d. Ensure complete and accurate processing of data Which of the following statements regarding an engagements, which of the following is the most desirable integration of IT into specific engagements? 12. Which of the following is true about new and s. emerging technologies? a. New technologies have security login controls a. Developing and integrating testing of IT controls internal audit function's continuous aud into process-level audits. software steps into process level audits make sure the computer controls are working is/are true? b. Developing and performing computer audit built into them. h. New technologies take time for the users to I. The internal audit function is responsible for assessing the effectiveness of manage e. Auditing controls around the computer to transition and adapt to the new technology, so continuous monitoring activities II. In areas of the o training is critical. e. New technologies always come from large in which effectively management has implemented effective d. Developing and performing computer audit multinational companies d. New technologies have the best controls monitoring activities, the internal audit function can conduct less stringent continsous with testing of IT controls. embedded in them. assessments of risks and controls a. Only statement I is true b. Only statement II is true. c Both statements I and II are true. d. Neither statement I nor statement II is true. 13. Which of the following is the best source of IT audit guidance within the IPPF? a. Control Objectives for Information and Related Technologies (COBIT). b. GTAG e. National Institute of Standards and Technology 9. Which of the following is not one of the top 10 technology risks facing organizations a. Cybersecurity b. Use of older technology c. IT governance. d. Mobile computing (NIST). d. ITILStep by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started