Option 1' is correct
Control over Access may be used to mitigate the risk of unauthorized changes to computer programs.
Analysis
Physical Controls may be used to mitigate the risk of unauthorized access in computer operations.
Passwords may be used to mitigate unauthorized access to programs
Backup copies and testing of user applications are also incorrect
Required information may be used to mitigate the risk of unauthorized changes to computer programs. Multiple...
Required information may be used to mitigate the risk of unauthorized changes to computer programs. Multiple Choice Controls over access Physical controls Testing of user applications Controls over access Physical controls O Testing of user applications O Password systems Backup coples < Prev 21 22 23 24
may be used to mitigate the risk of unauthorized access in computer operations Multiple Choice Password systems IT networks Physical controls LUIS O Saved HelpS equired information Password systems IT networks Physical controls O Testing of user applications Backup copies
Required information Use your cursor to match each example of a typical risk with the control that may be used to mitigate the risk in an IT environment. Introduction of unauthorized data or programs Physical and user controls Destruction of data Controls over access and backup copies Unauthorized changes Program and user controls Unauthorized access to data or programs Firewalls and password systems Destruction of infrastructure or data Physical controls over terminals and testing of user programs and applications
_may be used to mitigate the risk of viruses in electronic commerce. Multiple Choice Testing of user applications Firewalls IT networks Testing of user applications Firewalls оооо IT networks Physical controls Password system
The nature of the client's IT system will affect the risks that management must confront in designing controls for the system. In assessing the risks of material misstatement, the auditors should identify these risks and evaluate the effectiveness of the related controls in mitigating those risks. Auditors assess the risks of material misstatements by using all the audit evidence obtained on the client and its environment, including its internal control. When assessing the risks of material misstatement, the auditors should...
The main threats that physical security components combat are theft, interruptions to services, physical damage, compromised systems and environment integrity, and unauthorized access. However, the information held within the equipment may be much more valuable than the equipment itself. Which controls we choose to use to mitigate risks to our information depend not only on the value we assign to that information, but also on the dynamic state of that information. Our data exists in one of three states: at...
MULTIPLE CHOICE QUESTIONS! 1)In obtaining an understanding of an entity's internal control relevant to audit planning, an auditor is required to obtain knowledge about the a) Controls related to each principal transaction class and account balance. b) Consistency with which controls are currently being applied. c) Effectiveness of controls that have been implemented. d) Design of the controls pertaining to internal control components. 2) In a good system of segregation of duties, which of the following duties should be segregated?...
connect ective stions LO 8-2 LO 8-12 LO 8-4 LO 8-4 Select questions are available with McGraw-Hill's Connect 8-29. Multiple Choice Questions Select the best answer for each of the following questions. Explain the reasons for your selection 4. LAN is the abbreviation for (1) Large Area Network. x (2) Local Area Network (3) Longitudinal Analogue Network (4) Low Analytical Nets. b. End user computing is most likely to occur on which of the following types of computers? (1) Mainframe....
Evaluation and testing of controls at Hales Ltd Tyrone has provided a narrative of controls over inventory at Hales Ltd and would like you to provide some advice on making the preliminary control risk assessment. Hales is a distributor of haircare products, including shampoos, conditioners and styling products throughout Australia. Hales uses an on-line ordering system. Hales does not manufacture any goods in house, instead, an inventory of raw materials is kept, with manufacturing being outsourced to other companies. Hales...
Evaluation and testing of controls at Hales Ltd Tyrone has provided a narrative of controls over inventory at Hales Ltd and would like you to provide some advice on making the preliminary control risk assessment. Hales is a distributor of haircare products, including shampoos, conditioners and styling products throughout Australia. Hales uses an on-line ordering system. Hales does not manufacture any goods in house, instead, an inventory of raw materials is kept, with manufacturing being outsourced to other companies. Hales...