Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

take/launch.jsp?course assessment id= 148911_1&course id=_135110_18.content id=287001 QUESTION 16 An auditor sets an embedded audit module to flag questionable online transactions, display information about the transaction

image text in transcribed
take/launch.jsp?course assessment id= 148911_1&course id=_135110_18.content id=287001 QUESTION 16 An auditor sets an embedded audit module to flag questionable online transactions, display information about the transaction on the auditor's computer and send a text message to the auditor's cell phone. The auditor is using O a system control audit review file the snapshot technique O continuous and intermittent simulation audit hooks QUESTION 17 Abbie Johnson is a programmer at Healtheast network. Abbie has recently developed a new computer program for Healtheast. As part of the testing process, Abbie needs to use realistic patients data to ensure that the system is working properly. To protect privacy, management at Healtheast uses a program that replaces private patient Information with fake values before sending the data to Abbie for testing. The program that replaces patient information with fake values is called data wiping data redacting data encryptioning datamasking QUESTION 18 Kuzman Jovan called a meeting of the top management at Jovan Capital Management Number one on the agenda was computer system security "The risk of Security breach incidents has become unacceptable," he said, and turned to the Chief Information Officer "What do you intend to do? Which of the following is the best answer Evaluate and modify the system using COBOL Evaluate and modify the system using the CTC checklist Evaluate and modify the system using the COS Internal Control Traniework Evaluate and modify the system using the Trust Services framework take/launch.jsp?course assessment id= 148911_1&course id=_135110_18.content id=287001 QUESTION 16 An auditor sets an embedded audit module to flag questionable online transactions, display information about the transaction on the auditor's computer and send a text message to the auditor's cell phone. The auditor is using O a system control audit review file the snapshot technique O continuous and intermittent simulation audit hooks QUESTION 17 Abbie Johnson is a programmer at Healtheast network. Abbie has recently developed a new computer program for Healtheast. As part of the testing process, Abbie needs to use realistic patients data to ensure that the system is working properly. To protect privacy, management at Healtheast uses a program that replaces private patient Information with fake values before sending the data to Abbie for testing. The program that replaces patient information with fake values is called data wiping data redacting data encryptioning datamasking QUESTION 18 Kuzman Jovan called a meeting of the top management at Jovan Capital Management Number one on the agenda was computer system security "The risk of Security breach incidents has become unacceptable," he said, and turned to the Chief Information Officer "What do you intend to do? Which of the following is the best answer Evaluate and modify the system using COBOL Evaluate and modify the system using the CTC checklist Evaluate and modify the system using the COS Internal Control Traniework Evaluate and modify the system using the Trust Services framework

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Effective Writing A For Accountants

Authors: Claire B. May, Gordon S. May

9th Edition

0132567245, 9780132567244

More Books

Students also viewed these Accounting questions