Question

1. Which of the following statements regarding the black-box approach for systems auditing is correct? Multiple...

1. Which of the following statements regarding the black-box approach for systems auditing is correct?

Multiple Choice

  • The auditors need to gain detailed knowledge of the systems' internal logic.

  • The black-box approach could be adequate when automated systems applications are complicated.

  • The auditors first calculate expected results from the transactions entered into the system. Then, the auditors compare these calculations to the processing or output results.

  • All of these answers are correct.

2.Which statements are incorrect about virtual private network (VPN)?

Multiple Choice

  • It is a way to use the public telecommunication infrastructure in providing secure access to an organization’s network.

  • It enables the employees to work remotely by accessing their firm’s network securely using the Internet

  • The packets sent through VPN are encrypted and with authentication technology.

  • The expensive cost is one major disadvantage of VPN.

3.Which of the following statements is not correct?

Multiple Choice

  • The IP address of a desktop computer often changes.

  • The MAC address of a desktop computer often changes.

  • The IP address of a Web server does not change.

  • Each hardware device must have a MAC address.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

1. The Auditors first calculate expected results from the transactions entered into the system. Then, the auditors compare these calculations to the processing or output results.

The Black Box approach of system auditing is based entirely on the input and outputs. The auditor is not required to understand the entire process of the system to perform this kind of audit.

2. The expensive cost is one major disadvantage of VPN - this is the incorrect fact about VPN connections since there are multiple inexpensive options that corporations or individuals can opt for.

3. The IP address of a desktop computer often changes - incorrect fact among the options.

Add a comment
Know the answer?
Add Answer to:
1. Which of the following statements regarding the black-box approach for systems auditing is correct? Multiple...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • 1.Which of the following is not one of the reasons auditors should consider the use of...

    1.Which of the following is not one of the reasons auditors should consider the use of CAATs? Multiple Choice ISACA standards require IS auditors to obtain sufficient, reliable, and relevant evidence, and should perform appropriate analysis of this evidence. GAAP stipulates that audits should be performed using tools and techniques appropriate to the evidence being reviewed. The IIA professional practices state that auditor must consider the use of technology-based auditing tools when conducting audits. GAAS requires auditors to gather sufficient...

  • Question 1 Which of the following statements about DDoS, reflector, and amplifier attacks is correct? Select...

    Question 1 Which of the following statements about DDoS, reflector, and amplifier attacks is correct? Select all that apply only 3 answers are correct. 1. DDoS attacks often include a network of compromised systems to form a botnet. 2. In reflector attacks, intermediary systems are often chosen to be high-capacity servers to generate high volume of response packets. 3. Both reflector and amplifier attacks require intermediaries with a spoofed source address of the attacker's machine. 4. Common services used in...

  • TRUE/FALSE QUESTIONS:  Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for...

    TRUE/FALSE QUESTIONS:  Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for all potential types of non-standard inputs that might be exploited by an attacker to subvert a program. 2. Without suitable synchronization of accesses it is possible that values may be corrupted, or changes lost, due to over-lapping access, use, and replacement of shared values. 3. The biggest change of the nature in Windows XP SP2 was to change all anonymous remote procedure call (RPC)...

  • Multiple-Choice Questions (worth two points each) 1. Which of the following describes the process in which...

    Multiple-Choice Questions (worth two points each) 1. Which of the following describes the process in which one adopts patterns of behavior that lead to greater life satisfaction? A. wellness B. health C. social determination D. self-efficacy 2. The Stages of Change Model of health behavior change emphasizes that A. change happens as a process. B. people change only when faced with an illness. C. change occurs only when the environment supports it. D. changes are more effective when based on...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT