Reviewer/Quizzer On It Controls Part 2 Security and Access - Questions
Reviewer/Quizzer On It Controls Part 2 Security and Access - Questions
Reviewer/Quizzer On It Controls Part 2 Security and Access - Questions
QUESTIONS
2) Language translation modules of the operation system that convert one line of logic
at a time are known as
a. compilers.
b. interpreters.
c. converters.
d. inverters.
4) Key information about the user, including user ID, password, user group, and
privileges granted to the user are contained in
a. log-on procedure.
b. access token.
c. access control list.
d. discretionary access privilege.
7) Which of the following statements about password and password controls is most
correct?
a. A password is a code, usually shared with others, entered by the user to gain
access to data files.
b A reusable password is a network password that constantly changes.
c. Reviewing that all users are required to have passwords is an audit objective
relating to passwords.
d. None. All of the above statements are incorrect.
8) An audit procedure relating to malware includes
a. determining that personnel are ignorant and unaware of practices that can spread
viruses and other malicious programs.
b verifying that new software is tested after its implementation.
c. verifying up-to-date antiviral software.
d. all of the above.
9) When the auditor uses the audit log viewer to scan for unusual activity, the auditor
should focus on
a. authorized or active users.
b log-on and log-off times.
c. successful log-on attempts
d. all of the above.
10) Which controls ensure that in the event of data loss due to unauthorized access,
equipment failure, or physical disaster, the organization can recover its files and
databases?
a. Back-up controls
b. Access controls
c. Audit trail controls
d. Controls against malware
14) Selecting a sample of users and verifying the appropriateness of access privileges is
an audit procedure pertaining to
a. appropriate access authority.
b. biometric controls.
c. encryption controls.
d. none of the above.
16) Which of the following statements about backup controls is most correct?
a. The audit objective relating to database backup is to ensure that controls are
adequate in the event of a loss.
b. An audit procedure relating to database backup is to verify that databases are
copied at regular intervals and that the backup copies are stored off-site to support
disaster recovery procedures.
c. Both a and b.
d. None of the above.
18) Which type of firewall provides higher level customizable network security but add
overhead to connectivity?
a. Network-level firewall
b. Screen router
c. Application-level firewall
d. None of the above
20) A type of encryption that uses a single key known to both the sender and the receiver
of the message refers to
a. Private key encryption or the advanced encryption standard (AES)
b. Triple Data Encryption Standard (DES)
c. EEE3 and EDE3
d. Public key encryption
21) Which of the following is used in conjunction with a public key encryption to
authenticate the sender of a message?
a. Digital signature
b. Digest
c. Digital certificate
d. Certification authority
22) A call-back device
a. is a sequence number inserted in each message to foil any attempt by an intruder
in the communications channel to delete a message from a stream of messages,
change the order of messages received, or duplicate a message.
b. is a log in which all incoming and outgoing messages, as well as attempted (failed)
access, should be recorded.
c. is a technique in which a control message from the sender and a response from
the sender are sent at periodic synchronized intervals.
d. is a hardware component that asks the dial-in caller to enter a password and then
breaks the connection to perform a security check.
23) Audit objectives relating to subversive threats include verifying the security and
integrity of financial transactions by determining network controls can:
a. prevent and detect legal internal and Internet network access.
b. render any data captured by a perpetrator useful.
c. preserve integrity and physical security of data connected to the network.
d. all of the above.
25) Which of the following statements about controlling risks from equipment failure is
least correct?
a. Most common problem in data communications is data loss due to line errors from
communications noise.
b. A line error is an error caused when the bit structure of the message is corrupted
through noise on the communications lines.
c. Two techniques to detect and correct such data errors are echo and parity check.
d. Parity check only includes horizontal parity.
26) Which of the following statements about controlling risks from equipment failure is
most correct?
a. Audit objectives relating to equipment failure include ensuring and verifying the
integrity of the electronic commerce transactions by determining that controls are
in place to detect and correct message loss due to equipment failure.
b. An audit procedure relating to equipment failure include selecting a sample of
messages, examining them for garbled content and verifying that all corrupted
messages were successfully retransmitted.
c. Both a and b.
d. None of the above.
27) The absence of human intervention in this process of electronic data interchange
presents a unique twist to traditional control problems, including:
a. ensuring that transactions are authorized and valid.
b. allowing unauthorized access to data files.
c. Both a and b.
d. None of the above.
28) Under transaction authorization and validation of EDI, both the customer and the
supplier must establish that the transaction being processed is to (or from) a valid
trading partner and is authorized. This can be done using the following scenario(s):
a. Some VANs have the capability of validating passwords and user ID codes for the
vendor by matching these against a valid customer file.
b. Before being converted, the translation software can validate the trading partner’s
ID and password against a validation file in the firm’s database.
c. Before processing, the trading partner’s application software references the valid
customer and vendor files to validate the transaction.
d. All of the above.
29) Which of the following statements under access control of EDI is the least correct?
a. EDI trading partners must permit a degree of access to public data files that would
be forbidden in a traditional environment.
b. The trading partner agreement will determine the degree of access control in place.
c. To guard against unauthorized access, each company must establish valid vendor
and customer files.
d. None. All of the above statements are equally correct.
32) A company has recently installed a new computer network. The operating
philosophy adopted by the new network administrator was to establish an open
system that would foster work group data sharing, flexible access, and minimal
inconvenience to the network users. To accomplish this objective, the data
administrator assigned employee access privileges to data based on department and
functional affiliated rather than specific tasks.
Which of the following actions will directly address the issue on the scenario above?
a. Network and data administrator should assign privileges consistent with job
descriptions.
b. Terminated employees should not be allowed to continue working for the company.
c. Antivirus software should be in place on the network server to prevent any files
from being uploaded before they are checked for viruses.
d. All users should have been required to change their passwords immediately.
33) Stephanie Baskill, an unemployed accounting clerk, took a low profile position as a
cleaning woman in Cleaver Manufacturing Company. By being the janitress in the
company, it gave her access to all areas in the building. While working, Stephanie
snooped through offices, watched people who were working late type in their
passwords, and guessed passwords. She ultimately printed out lists of user IDs and
passwords using a Trojan horse virus, thus obtaining all the necessary passwords
to set herself up as a supplier, customer, systems operator, and systems librarian.
34) You are currently the Database Administrator AKA Inc. You are tasked to create
the database authorization table for the accounts payable clerk. The following
tables are available for AKA Inc., as follows:
➢ Customer Table
➢ Sales Invoice (AR) Table
➢ Inventory Table
➢ Cash Receipts Table
➢ Vendor Table
➢ Purchase Order Table
➢ Receiving Report Table
➢ Vendor Invoice Table (AP)
➢ Cash Disbursement Table