Chapter 16IT Controls Part II: Security and Access TRUE/FALSE 1. In a computerized environment, the audit trail log must be printed onto paper documents. ANS: F PTS: 1 2. Disguising message packets to look as if they came from another user and to gain access to the hosts network is called spooling. ANS: F PTS: 1 3. A formal log-on procedure is the operating systems last line of defense against unauthorized access. ANS: F PTS: 1 4. Computer viruses usually spread throughout the system before being detected. ANS: T PTS: 1 5. A worm is software program that replicates itself in areas of idle memory until the system fails. ANS: T PTS: 1 6. Viruses rarely attach themselves to executable files. ANS: F PTS: 1 7. Subschemas are used to authorize user access privileges to specific data elements. ANS: F PTS: 1 8. A recovery module suspends all data processing while the system reconciles its journal files against the database. ANS: F PTS: 1 9. The database management system controls access to program files. ANS: F PTS: 1 10. Operating system controls are of interest to system professionals but should not concern accountants and auditors. ANS: F PTS: 1 11. The most frequent victims of program viruses are microcomputers. ANS: T PTS: 1 12. Access controls protect databases against destruction, loss or misuse through unauthorized access. ANS: T PTS: 1 13. Operating system integrity is not of concern to accountants because only hardware risks are involved. ANS: F PTS: 1
Page 2
Page 3Embed Size (px) 344 x 292429 x 357514 x 422599 x 487 <iframe src="https://dokumen.tips/embed/v1/4th-week-forms-and-more-controls-part-4.html" class></iframe>DESCRIPTION VB.Net, MaskedTextBox, Image List & Button, UNIM-Mojokerto Text of 4th Week - Forms and More Controls (Part 4)
Page 4 |