Solution:
Firewalls may be used to mitigate the risk of viruses in electronic commerce.
Hence 2nd option is correct.
_may be used to mitigate the risk of viruses in electronic commerce. Multiple Choice Testing of...
may be used to mitigate the risk of unauthorized access in computer operations Multiple Choice Password systems IT networks Physical controls LUIS O Saved HelpS equired information Password systems IT networks Physical controls O Testing of user applications Backup copies
Required information may be used to mitigate the risk of unauthorized changes to computer programs. Multiple Choice Controls over access Physical controls Testing of user applications Required information Physical controls О) Testing of user applications ОО C) Password systems C) Backup copies
Required information may be used to mitigate the risk of unauthorized changes to computer programs. Multiple Choice Controls over access Physical controls Testing of user applications Controls over access Physical controls O Testing of user applications O Password systems Backup coples < Prev 21 22 23 24
Required information Use your cursor to match each example of a typical risk with the control that may be used to mitigate the risk in an IT environment. Introduction of unauthorized data or programs Physical and user controls Destruction of data Controls over access and backup copies Unauthorized changes Program and user controls Unauthorized access to data or programs Firewalls and password systems Destruction of infrastructure or data Physical controls over terminals and testing of user programs and applications
If auditors assess control risk at the maximum level, they will tend to: Multiple Choice perform more audit procedures using internal evidence. perform substantive tests at an interim date. perform a great deal of additional tests of controls. perform a great deal of substantive testing during the audit.
MULTIPLE CHOICE QUESTIONS! 1)In obtaining an understanding of an entity's internal control relevant to audit planning, an auditor is required to obtain knowledge about the a) Controls related to each principal transaction class and account balance. b) Consistency with which controls are currently being applied. c) Effectiveness of controls that have been implemented. d) Design of the controls pertaining to internal control components. 2) In a good system of segregation of duties, which of the following duties should be segregated?...
Sanders Company's internal control system should: Multiple Choice Eliminates the company's risk of loss. Monitors company and employee performance. Eliminates human error. Eliminates the need for audits. Eliminates the need for managers' certification of controls.
Ellen 84 Which preventive, detective, and/or corrective controls would best mitigate the follow- ing threats? a. An employee's laptop was stolen at the airport. The laptop contained personal in- formation about the company's customers that could potentially be used to commit identity theft. b. A salesperson successfully logged into the payroll system by guessing the payroll supervisor's password. c. A criminal remotely accessed a sensitive database using the authentication credentials (user ID and strong password) of an IT manager. At...
The rate of return on which type of security is normally used as the risk-free rate of return? Multiple Choice Long-term Treasury bonds Treasury bills Intermediate-term Treasury bonds oooo Long-term corporate bonds Intermediate-term corporate bonds
A wraparound filing: Multiple Choice a. May be used by large companies to sell securities over a period of two years without re-filing with the SEC. b. Is a simplified registration procedure for securities to be issued by small companies. c. Allows a company to simplify its periodic filing by attaching its annual report to Form 10-K. d. Is a filing completed using the SEC's electronic filing system. e. May remain in effect for a period of one to five...