Filters
Question type

Study Flashcards

Computer-assisted audit techniques (CAAT)are often used when auditing a company's IT infrastructure.

Correct Answer

verifed

verified

Which of the following is not a use of generalized audit software (GAS) ?


A) Substantive testing.
B) Security testing.
C) Control testing.
D) Transaction data analysis.

Correct Answer

verifed

verified

Which of the following is a key reason an operating system is the most important system software?


A) It is the centralized collection of firmwide data.
B) It manages computer-assisted audit techniques (CAATs) .
C) It manages interfaces with the computer.
D) None of the choices are correct.

Correct Answer

verifed

verified

A data warehouse is for daily operations and often includes data for the current fiscal year only.

Correct Answer

verifed

verified

Which of the following is least likely to be considered a component of a computer network?


A) Application programs.
B) Computers.
C) Servers.
D) Routers.

Correct Answer

verifed

verified

Parallel simulation attempts to simulate the firm's key features or processes.

Correct Answer

verifed

verified

Which statements are incorrect about virtual private network (VPN) ?


A) It is a way to use the public telecommunication infrastructure in providing secure access to an organization's network.
B) It enables the employees to work remotely by accessing their firm's network securely using the Internet.
C) The packets sent through VPN are encrypted and with authentication technology.
D) The VPN model requires leased lines.

Correct Answer

verifed

verified

IT governance over operating systems includes establishing proper policies and procedures.These policies and procedures over operating systems should cover all of the following except:


A) Which computing hardware to use.
B) Who can access the operating system.
C) Which actions users can take.
D) Which resources users can use.

Correct Answer

verifed

verified

Which of the following is not considered one of the primary CAAT approaches?


A) The black-box approach.
B) Encryption testing.
C) Auditing through the computer.
D) The white-box approach.

Correct Answer

verifed

verified

Which of the following statements about firewalls is wrong?


A) A firewall is a security system comprised of hardware and software that is built using routers,servers,and a variety of software.
B) A firewall allows individuals on the corporate network to send and receive data packets from the Internet.
C) A firewall can filter through packets coming from outside networks to prevent unauthorized access.
D) A firewall connects different LANs,software-based intelligent devices,and examines IP addresses.

Correct Answer

verifed

verified

Categorize the following scenario below as management,operational,or technical controls for wireless networks' security controls. "Configuring all access points with encryption."


A) Operational controls
B) Technical Controls
C) Management Controls

Correct Answer

verifed

verified

B

The results of a generalized audit software simulation of the aging of accounts receivable revealed substantial differences in the aging contribution,even though grand totals reconciled.Which of the following should the IS auditor do first to resolve the discrepancy?


A) Recreate the test,using different software.
B) List a sample of actual data to verify the accuracy of the test program.
C) Ignore the discrepancy because the grand totals reconcile and instruct the controller to correct the program.
D) Create test transactions and run test data on both the production and simulation program.

Correct Answer

verifed

verified

Which of the following is not one of the reasons auditors should consider the use of CAATs?


A) ISACA standards require IS auditors to obtain sufficient,reliable,and relevant evidence,and should perform appropriate analysis of this evidence.
B) GAAP stipulates that audits should be performed using tools and techniques appropriate to the evidence being reviewed.
C) The IIA professional practices state that auditor must consider the use of technology-based auditing tools when conducting audits.
D) GAAS requires auditors to gather sufficient and appropriate evidence in the course of audit field work.

Correct Answer

verifed

verified

B

What are the differences between LANs and WANs? Have you ever used any LANs and WANS?

Correct Answer

verifed

verified

WANs are much more expensive t...

View Answer

Which of the following is not a benefit of using wireless technology?


A) Mobility.
B) Rapid deployment.
C) Flexibility and Scalability.
D) Security.

Correct Answer

verifed

verified

The purpose of a company's firewall is to:


A) Guard against spoofing.
B) What-if simulations.
C) Deny computer hackers access to sensitive data.
D) All of the choices are correct.

Correct Answer

verifed

verified

D

Identify which fundamental control objective belongs with the following statement: "No module should be allowed to destroy or corrupt another module."


A) Protect the operating system from users.
B) The operating system must protect users from each other.
C) The operating system must be protected from itself.
D) The operating system must be protected from its environment.
E) The operating system must protect users from themselves.

Correct Answer

verifed

verified

Which of the following is not one of the benefits of using a wireless network?


A) Flexibility and scalability.
B) Mobility.
C) Greater security.
D) Rapid deployment.

Correct Answer

verifed

verified

CAATs are commonly used in all of the following situations except:


A) Transaction testing.
B) Network penetration testing.
C) Encryption testing.
D) Operating system vulnerability assessments.

Correct Answer

verifed

verified

Identify which fundamental control objective belongs with the following statement: "A user's application may consist of several modules stored in separate memory locations,each with its own data.One module must not be allowed to destroy or corrupt another module."


A) Protect the operating system from users.
B) The operating system must protect users from each other.
C) The operating system must be protected from itself.
D) The operating system must be protected from its environment.
E) The operating system must protect users from themselves.

Correct Answer

verifed

verified

Showing 1 - 20 of 69

Related Exams

Show Answer