Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Hey can someone please help me with #9-15 (7 m/c) inpat because the customeraccuntd durin 0. Requiring a user ID and password would be an

image text in transcribed

Hey can someone please help me with #9-15 (7 m/c)

inpat because the customeraccuntd durin 0. Requiring a user ID and password would be an 14. Which of the following best describes continuous was most likely detected by a a. Completeness check b Limit check c. Validity check d. Reasonableness check The parpose of logical security controls i &. Restrict access to data b. Limit access to hardware example of what type of control? a. Detective. k Corrective c. Preventative d. Reactive auditing? techniques (CAAT). b. Oversight of continuous monitoring c. The use of continuous risk assessment, continuous controls assessment, and assessment u. Which is NOT a benefit of user-devekoped applications (UDAs? a. Quick to develop and use. b. Readily available and at a low cost. c. More configurable and flexible. d. Easy to control access to. 7. d. The ability of internal auditors to continually perform auditing steps. 15. When diseussing integration of IT into audit Record processing results. d. Ensure complete and accurate processing of data Which of the following statements regarding an engagements, which of the following is the most desirable integration of IT into specific engagements? 12. Which of the following is true about new and s. emerging technologies? a. New technologies have security login controls a. Developing and integrating testing of IT controls internal audit function's continuous aud into process-level audits. software steps into process level audits make sure the computer controls are working is/are true? b. Developing and performing computer audit built into them. h. New technologies take time for the users to I. The internal audit function is responsible for assessing the effectiveness of manage e. Auditing controls around the computer to transition and adapt to the new technology, so continuous monitoring activities II. In areas of the o training is critical. e. New technologies always come from large in which effectively management has implemented effective d. Developing and performing computer audit multinational companies d. New technologies have the best controls monitoring activities, the internal audit function can conduct less stringent continsous with testing of IT controls. embedded in them. assessments of risks and controls a. Only statement I is true b. Only statement II is true. c Both statements I and II are true. d. Neither statement I nor statement II is true. 13. Which of the following is the best source of IT audit guidance within the IPPF? a. Control Objectives for Information and Related Technologies (COBIT). b. GTAG e. National Institute of Standards and Technology 9. Which of the following is not one of the top 10 technology risks facing organizations a. Cybersecurity b. Use of older technology c. IT governance. d. Mobile computing (NIST). d. ITIL

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Construction Safety Auditing Made Easy A Checklist Approach To OSHA Compliance

Authors: Kathleen Hess

1st Edition

0865876355, 978-0865876354

More Books

Students also viewed these Accounting questions

Question

a valuing of personal and psychological privacy;

Answered: 1 week ago