take/launch.jsp?course assessment id= 148911_1&course id=_135110_18.content id=287001 QUESTION 16 An auditor sets an embedded audit module to flag questionable online transactions, display information about the transaction on the auditor's computer and send a text message to the auditor's cell phone. The auditor is using O a system control audit review file the snapshot technique O continuous and intermittent simulation audit hooks QUESTION 17 Abbie Johnson is a programmer at Healtheast network. Abbie has recently developed a new computer program for Healtheast. As part of the testing process, Abbie needs to use realistic patients data to ensure that the system is working properly. To protect privacy, management at Healtheast uses a program that replaces private patient Information with fake values before sending the data to Abbie for testing. The program that replaces patient information with fake values is called data wiping data redacting data encryptioning datamasking QUESTION 18 Kuzman Jovan called a meeting of the top management at Jovan Capital Management Number one on the agenda was computer system security "The risk of Security breach incidents has become unacceptable," he said, and turned to the Chief Information Officer "What do you intend to do? Which of the following is the best answer Evaluate and modify the system using COBOL Evaluate and modify the system using the CTC checklist Evaluate and modify the system using the COS Internal Control Traniework Evaluate and modify the system using the Trust Services framework take/launch.jsp?course assessment id= 148911_1&course id=_135110_18.content id=287001 QUESTION 16 An auditor sets an embedded audit module to flag questionable online transactions, display information about the transaction on the auditor's computer and send a text message to the auditor's cell phone. The auditor is using O a system control audit review file the snapshot technique O continuous and intermittent simulation audit hooks QUESTION 17 Abbie Johnson is a programmer at Healtheast network. Abbie has recently developed a new computer program for Healtheast. As part of the testing process, Abbie needs to use realistic patients data to ensure that the system is working properly. To protect privacy, management at Healtheast uses a program that replaces private patient Information with fake values before sending the data to Abbie for testing. The program that replaces patient information with fake values is called data wiping data redacting data encryptioning datamasking QUESTION 18 Kuzman Jovan called a meeting of the top management at Jovan Capital Management Number one on the agenda was computer system security "The risk of Security breach incidents has become unacceptable," he said, and turned to the Chief Information Officer "What do you intend to do? Which of the following is the best answer Evaluate and modify the system using COBOL Evaluate and modify the system using the CTC checklist Evaluate and modify the system using the COS Internal Control Traniework Evaluate and modify the system using the Trust Services framework