Question: (LO 13-1) An organization is planning to replace its wired networks with wireless networks. Which of the following approaches provides the most secure wireless network?
(LO 13-1) An organization is planning to replace its wired networks with wireless networks. Which of the following approaches provides the most secure wireless network? a. Implement wired equivalent privacy (WEP) protocol. b. Allow access to only authorized media access control (MAC) addresses. c. Disable the network interface card (NIC). d. Implement wi-fi protected access (WPA2). 8. (LO 13-3) The vice president of human resources has requested an audit to identify payroll overpayments for the previous year. Which would be the best audit technique to use in this situation? a. Test data b. Generalized audit software c. Integrated test facility d. Embedded audit module 9. (LO 13-2) Which of the following statements about CAATs is not correct? a. Parallel simulation attempts to simulate or reproduce the firm's actual processing results. b. The test data technique uses a set of hypothetical transactions to examine the programmed checks and program logic in programs. c. The integrated test facility is a programmed module or segment that is inserted into an application program to monitor and collect data based on daily transactions. d. The embedded audit module may require the auditor to have a good working knowledge of computer programming and a solid understanding of IT risks that may exist in a system. 10. (LO 13-3) Which of the following audit techniques should an IS auditor use to detect duplicate invoice records within an invoice master file? a. Test data b. Generalized audi
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
