Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Question 1 (1 point) The risk of an unauthorized user gaining access is likely to be a risk for which of the following areas? a

Question 1 (1 point) The risk of an unauthorized user gaining access is likely to be a risk for which of the following areas?

a telecommuting workers

b wireless networks

c Internet

d all of the above

Question 2 (1 point) True or False: Best practice is to change passwords at least every 90 days.

True False

Question 3 (1 point) Which of the following best describes the characteristics that help management determine if their directives are carried out and achieved?

a control environment

b control activities

c information and communication

d risk assessment

Question 4 (1 point) The control effectiveness of segregation of duties can be compromised through ___________.

a the absence of an internal audit function

b irregular employee reviews

c collusion among employees

d a lack of employee training

Question 5 (1 point) Proper segregation of duties calls for separation of the functions of ___________.

a authorization, payment, and recording

b custody, execution, and reporting

c authorization, recording, and custody

d authorization, execution, and payment

Question 6 (1 point) The risk that an unauthorized user could shut down systems is called ___________.

a condentiality risk

b processing integrity risk

c availability risk

d security risk

Question 7 (1 point) Which of the following is least likely to be a responsibility of the IT governance committee?

a aligning IT investments to business strategy

b overseeing and prioritizing changes to IT systems

c developing, monitoring, and reviewing security policies

d developing and maintaining the database and ensuring adequate controls over the database

Question 8 (1 point) The review of amounts billed to the company from a vendor that it purchased from is ___________.

a a customer review

b collusion

c a seller review

d a vendor audit

Question 9 (1 point) Which control activity serves as a method to conrm the accuracy or completeness of data in the accounting system?

a independent checks and reconciliations

b security of assets

c segregation of duties

d authorization

Question 10 (1 point) Which programmed input validation check compares the value in a eld relative to other fields? a completeness check

b reasonableness check

c validity check

d correctness check

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

IRS Audit Protection And Survival Guide Bars And Restaurants

Authors: Gerald F. Bernard, Daniel J. Baran

1st Edition

0471166375, 978-0471166375

More Books

Students also viewed these Accounting questions