Close Icon
Info
Warning
Danger

Accounting Expert Answers & Study Resources : Page 418

The vast field of accounting contributes to one of the largest subjects in our study resources. Accounting flashcards, homework answers for textbooks & other learning aids can increase your competency in this domain instantly. Become a top student with our support. Search Now…

Ask an Expert

Our Experts can answer your tough homework and study questions.

Answers in as fast as 15 minutes
Post a Question
Subjects icon
150245 Materials
0 Students Benefited

21) Which of the following is not a reason for the increase in security problems for AIS? A) Confidentiality issues caused by interlinked inter-company networks B) Difficult to control distributed computing networks C) Increasing efficiency resulting from more automation D) Increasing numbers of information systems and users 22) One reason why many organizations do not.

Homework Answers
13 Views
  • 21) Which of the following not a reason for the
  • Accounting
Homework Answers
View Answer

31) This is an authorized attempt by an internal audit team or an external security consultant to attempt to break into the organization's information system. A) Intrusion detection system B) Log analysis C) Penetration test D) Vulnerability scan 32) A well-known hacker started his own computer security consulting business shortly after being released from prison..

Homework Answers
15 Views
  • 31) an authorized attempt by an internal audit team or
  • Accounting
Homework Answers
View Answer

21) In developing policies related to personal information about customers, Folding Squid Technologies adhered to the Trust Services framework. The standard applicable to these policies is A) security. B) confidentiality. C) privacy. D) availability. 22) Jeff Davis took a call from a client. "Jeff, I need for my customers to make payments online using credit.

Homework Answers
16 Views
  • 21) In developing policies related to personal information about customers,
  • Accounting
Homework Answers
View Answer

  1) The best example of a hash total for a payroll transaction file could be A) total of employees' social security numbers. B) sum of net pay. C) total number of employees. D) sum of hours worked. 2) Error logs and review are an example of A) data entry controls. B) data transmission controls. C) output controls. D).

Homework Answers
23 Views
  •   1) The best example of a hash total for a
  • Accounting
Homework Answers
View Answer

11) Which of the following is an example of a corrective control? A) Physical access controls B) Encryption C) Intrusion detection D) Incident response teams 12) Which of the following is not a requirement of effective passwords? A) Passwords should be changed at regular intervals. B) Passwords should be no more than 8 characters in length. C) Passwords.

Homework Answers
17 Views
  • 11) Which of the following an example of a corrective
  • Accounting
Homework Answers
View Answer

41) Which of the following is not one of the eight interrelated risk and control components of COSO Enterprise Risk Management Framework? A) Internal environment B) Monitoring C) Risk response D) Event assessment 42) The COSO Enterprise Risk Management Integrated Framework stresses that A) risk management activities are an inherent part of all business operations and.

Homework Answers
12 Views
  • 41) Which of the following not one of the eight
  • Accounting
Homework Answers
View Answer

41) What is the primary purpose of computer audit software? A) eliminate auditor judgment errors B) assist the auditor in retrieving and reviewing information C) detect unauthorized modifications to system program code D) recheck all mathematical calculations, cross-foot, reprocess financial statements and compare to originals 42) The scope of a(n) ________ audit encompasses.

Homework Answers
14 Views
  • 41) What the primary purpose of computer audit software? A)
  • Accounting
Homework Answers
View Answer

81) Change management refers to A) disbursement controls on petty cash. B) operational controls applied to companies after mergers or acquisitions. C) replacement of upper management and their introduction to the organization. D) controls designed to ensure that updates in information technology do not have negative consequences. 82) The Director of Information Technology for the.

Homework Answers
11 Views
  • 81) Change management refers to A) disbursement controls petty cash. B) operational
  • Accounting
Homework Answers
View Answer

88) Describe the differences between general and specific authorization. 89) Explain how a company could be the victim of fraud, even if ideal segregation of duties is enforced. 90) Classify each of the following controls as preventive, detective, or corrective. Periodic bank reconciliation Separation of cash and accounting records Maintaining backup copies of master.

Homework Answers
14 Views
  • 88) Describe the differences between general and specific authorization. 89)
  • Accounting
Homework Answers
View Answer

11) Which of the following is not one of the three important factors determining the strength of any encryption system? A) Key length B) Key management policies C) Encryption algorithm D) Privacy 12) A process that takes plaintext of any length and transforms it into a short code. A) Asymmetric encryption B) Encryption C) Hashing D) Symmetric encryption 13) Which.

Homework Answers
19 Views
  • 11) Which of the following not one of the three
  • Accounting
Homework Answers
View Answer

21) Which of the following is the first step in the risk-based audit approach? A) Identify the control procedures that should be in place. B) Evaluate the control procedures. C) Determine the threats facing the AIS. D) Evaluate weaknesses to determine their effect on the audit procedures. 22) Determining whether the necessary control procedures.

Homework Answers
15 Views
  • 21) Which of the following the first step in the
  • Accounting
Homework Answers
View Answer

Can't find what you're looking for ?

Ask our exprts a study questions, on us.
Get free Homework Help*