Filters
Question type

Study Flashcards

Parallel simulation attempts to simulate the firm's key features or processes.

Correct Answer

verifed

verified

True

Which of the following describes a group of computers that connects the internal users of a company distributed over an office building?


A) Internet
B) LAN
C) Virtual private network (VPN)
D) Decentralized network

Correct Answer

verifed

verified

Categorize the following scenarios as management,operational,or technical controls for wireless networks' security controls. Categorize the following scenarios as management,operational,or technical controls for wireless networks' security controls.

Correct Answer

verifed

verified

Which statements are incorrect about virtual private network (VPN) ?


A) It is a way to use the public telecommunication infrastructure in providing secures access to an organization's network.
B) It enables the employees to work remotely by accessing their firm's network securely using the Internet
C) The packets sent through VPN are encrypted and with authentication technology.
D) The expensive cost is one major disadvantage of VPN.

Correct Answer

verifed

verified

What are the benefits of conducting continuous audits (or monitoring)?

Correct Answer

verifed

verified

Using continuous audit/monitoring,most f...

View Answer

What is the man-in-the-middle threat for wireless LANs?


A) The attacker impersonates an authorized user and gains certain unauthorized privileges to the wireless network
B) The attacker passively monitors wireless networks for data, including authentication credentials
C) The attacker steals or makes unauthorized use of a service
D) The attacker actively intercepts communications between wireless clients and access points to obtain authentication credentials and data.

Correct Answer

verifed

verified

Which of the following statements is wrong regarding continuous audit?


A) Continuous audit is to perform audit-related activities on a continuous basis
B) Testing in continuous audits often consists of continuous controls monitoring and continuous data assurance
C) Technology plays a key role in continuous audit in analyzing trends and patterns of transactions, identifying exceptions and anomalies, and testing controls
D) Continuous audit is frequently used to perform substantive tests and is used for testing of controls through transactional-data analysis

Correct Answer

verifed

verified

What are the differences between LANs and WANs? Have you ever used any LANs and WANS? 1)LANs covers a small area while WANs covers a significantly larger area. 2)LANs speeds are also significantly faster than WANs. 3)LANs is more secure than WANs. 4)WANs are much more expensive to implement than LANs. The Internet is the most popular WAN.A local area network is often used in a computer lab on campus.(Students' answers may vary.)

Correct Answer

verifed

verified

The purpose of a company's firewall is to:


A) Guard against spoofing
B) Filtering packets
C) Deny computer hackers access to sensitive data
D) All of the above

Correct Answer

verifed

verified

Masquerading threat for wireless LANs is:


A) The attacker actively intercepts communications between wireless clients and access points to obtain authentication credentials and data
B) The attacker alters a legitimate message sent via wireless networks by deleting, adding to, changing, or reordering it
C) The attacker passively monitors wireless networks for data, including authentication credentials
D) The attacker impersonates an authorized user and gains certain unauthorized privileges to the wireless network

Correct Answer

verifed

verified

Which of the following is the primary reason that many auditors hesitate to use embedded audit modules?


A) Embedded audit modules cannot be protected from computer viruses.
B) Auditors are required to monitor embedded audit modules continuously to obtain valid results.
C) Embedded audit modules can easily be modified through management tampering.
D) Auditors are required to be involved in the system design of the application to be monitored.

Correct Answer

verifed

verified

Which of the following statements is not correct?


A) The IP address of a desktop computer often changes
B) The MAC address of a desktop computer often changes
C) The IP address of a Web server does not change
D) Each hardware device must have a MAC address

Correct Answer

verifed

verified

B

The results of a generalized audit software simulation of the aging of accounts receivable revealed substantial differences in the aging contribution,even though grand totals reconciled.Which of the following should the IS auditor do first to resolve the discrepancy?


A) Recreate the test, using different software.
B) List a sample of actual data to verify the accuracy of the test program.
C) Ignore the discrepancy because the grand totals reconcile and instruct the controller to correct program.
D) Create test transactions and run test data on both the production and simulation program.

Correct Answer

verifed

verified

Embedded audit module is a programmed audit module that is added to the system under review.

Correct Answer

verifed

verified

Virtual private network (VPN)is a private network,provided by a third party,for exchanging information through a high capacity connection.

Correct Answer

verifed

verified

Data governance is the convergence of data quality,data management,data policies,business process management,and risk management surrounding the handling of data in a company.

Correct Answer

verifed

verified

True

Accountants increasingly participate in designing internal controls and improving business and IT processes in a database environment.

Correct Answer

verifed

verified

A data warehouse is for daily operations and often includes data for the current fiscal year only.

Correct Answer

verifed

verified

Within a WAN,a router would perform which of the following functions?


A) Provide the communication within the network
B) Select network pathways within a network for the flow of data packets.
C) Amplify and rebroadcast signals in a network
D) Forward data packets to their internal network destination

Correct Answer

verifed

verified

Data mining is the process of searching for patterns in the data in a data warehouse and to analyze the patterns for decision making.

Correct Answer

verifed

verified

Showing 1 - 20 of 48

Related Exams

Show Answer