Professional Documents
Culture Documents
B. Unauthorized Access. The Rest Adequate Backups Will Protect Software
B. Unauthorized Access. The Rest Adequate Backups Will Protect Software
ns center is that the initial recovery period is very quick and the rest are disadvantages.
of the following is the least critical application for disaster recovery purposes, the rest are not.
y until the system fails
em without going through the * normal logon procedures
choices will reduce the exposure to computer viruses
hat users enter to gain access to systems. Security can be compromised by the rest of the choices.
ons controls.
quately protected from attacks by computer viruses, the policy that permits users to take is not include in the relevant policies.
t, customers routinely access the vendor's inventory, the rest of the choices are not correct.
The rest of the choices does not answer the given question.
f the database administrator
tions. Since A is an exception, then the rest are included as an audit objectives for the database management system
s is an exception since the rest of the choices are tests of controls will provide evidence that access to the data files.
o implementation. C is the correct answer since it is a test of controls will provide evidence that the system as originally * implemented was
uld not be tested.
e distributed across the internet. It refers to a DDoS attack, which targets a web server to keep it from serving its legitimate use
the Internet must have. It refers to IP address which stands for Internet Protocol
lues that they are otherwise not authorized to access through query features by inference controls.
ystem. It is software that guards against viruses that might damage the system.
divides the main database into sections or partitions and distributes them to their main user.
tives are clearly stated in the system analysis report.
selection phase are not official products.
c occurrence.
conomic event happens, there is no time lag in the real-time processing.
he rest are weaknesses.
gement system
the data files.
tem as originally * implemented was free from material errors and free from fraud.
e role of the accountant/internal auditor in the conceptual design phase of the Systems Development Life Cycle
nd the rest are not the correct answers.
ave little trouble collecting money for his own benefit without disclosing the sources of the funds.
e of these accounts aren't necessarily incompatible.
who codes, maintains, and operates the program. Additionally, none of the other options are computer-based information systems.
s/operate it. Moreover, the rest of the choices are not computer-based information system.
robust internal controls.