Deck 13: Monitoring and Auditing Ais

Full screen (f)
exit full mode
Question
Which of the following statements about switches is correct?
A. A hub is smarter than Switch.
B. Switches provide more security protections than hubs do for a company's internal network.
C. Switches are widely used in WANs.
D. A Switch contains multiple ports.
Use Space or
up arrow
down arrow
to flip the card.
Question
A data warehouse is for daily operations and often includes data for the current fiscal year only.
Question
Which of the following describes a group of computers that connects the internal users of a company distributed over an office building?
A. Internet
B. LAN
C. Virtual private network (VPN)
D. Decentralized network
Question
Which of the following is not an approach used for online analytical processing (OLAP).
A. Exception reports
B. What-if simulations
C. Consolidation
D. Data mining
Question
Parallel simulation attempts to simulate the firm's key features or processes.
Question
The Generally Accepted Auditing Standards (GAAS) issued by PCAOB provide guidelines for conducting an IS/IT audit.
Question
Parallel simulation uses an independent program to simulate a part of an existing application program, and is designed to test the validity and to verify the accuracy of an existing application program.
Question
Computer-assisted audit techniques (CAAT) are often used when auditing a company's IT infrastructure.
Question
A continuous audit allows companies to perform audit-related activities on a continuous basis.
Question
An integrated test facility (ITF) is an automated technique that enables test data to be continually evaluated during the normal operation of a system.
Question
Which of the following is not a management control for wireless networks?
A. Assigning roles and responsibilities of employees for access control
B. Conducting risk assessment on a regular basis
C. Conducting appropriate awareness training on wireless networks
D. Creating policies and procedures
Question
Data mining is the process of searching for patterns in the data in a data warehouse and to analyze the patterns for decision making.
Question
Data governance is the convergence of data quality, data management, data policies, business process management, and risk management surrounding the handling of data in a company.
Question
A virtual private network (VPN) is a private network, provided by a third party, for exchanging information through a high capacity connection.
Question
Which of the statements regarding a data warehouse is incorrect?
A. It is a centralized collection of firm-wide data
B. The purpose of a data warehouse is to provide a rich data set for management to identify patterns and to examine trends of business events
C. Includes data for the current fiscal year only
D. The data in a data warehouse is pulled from each of the operational databases periodically
Question
An embedded audit module is a programmed audit module that is added to the system under review.
Question
The data in a data warehouse are updated when transactions are processed.
Question
Firewalls are security systems comprised of hardware and software that is built using routers, servers, and a variety of software.
Question
A wireless network is comprised of access points and stations. Access points logically connect stations to a firm's network.
Question
Accountants increasingly participate in designing internal controls and improving business and IT processes in a database environment.
Question
Which of the following tools is typically used in data mining?
A. COBIT.
B. OLAP.
C. REA.
D. DBA.
Question
Which of the following is least likely to be considered a component of a computer network?
A. Application programs.
B. Computers.
C. Servers.
D. Routers.
Question
Which of the following statements regarding the black-box approach for systems auditing is correct?
A. The auditors need to gain detailed knowledge of the systems' internal logic
B. The black-box approach could be adequate when automated systems applications are complicated
C. The auditors first calculate expected results from the transactions entered into the system. Then, the auditors compare these calculations to the processing or output results.
D. All of the above are correct
Question
What is the man-in-the-middle threat for wireless LANs?
A. The attacker impersonates an authorized user and gains certain unauthorized privileges to the wireless network
B. The attacker passively monitors wireless networks for data, including authentication credentials
C. The attacker steals or makes unauthorized use of a service
D. The attacker actively intercepts communications between wireless clients and access points to obtain authentication credentials and data.
Question
What is the test data technique?
A. It uses a set of input data to validate system integrity.
B. It requires auditors to prepare both valid and invalid data to examine critical logics and controls of the system
C. It is an automated technique that enables test data to be continually evaluated during the normal operation of a system
D. A and B are correct
E. None of the above is correct
Question
Which of the following statements about firewalls is wrong?
A. A firewall is a security system comprised of hardware and software that is built using routers, servers, and a variety of software
B. A firewall allows individuals on the corporate network to send and receive data packets from the Internet
C. A firewall can filter through packets coming from outside networks to prevent unauthorized access
D. A firewall connects different LANs, software-based intelligent devices, and examines IP addresses
Question
What is data mining?
A. A particular attribute of information.
B. A common term for the representation of multidimensional data.
C. The process of analyzing data to extract information that is not affected by the raw data alone.
D. None of the above is correct.
Question
Which of the following statements is wrong regarding continuous audit?
A. Continuous audit is used to perform audit-related activities on a continuous basis
B. Testing in continuous audits often consists of continuous controls monitoring and continuous data assurance
C. Technology plays a key role in continuous audit in analyzing trends and patterns of transactions, identifying exceptions and anomalies, and testing controls
D. Continuous audit is frequently used to perform substantive tests and is used for testing of controls through transactional-data analysis
Question
LAN is the abbreviation for
A. Large Area Network.
B. Local Area Network.
C. Longitudinal Analogue Network.
D. Low Analytical Nets.
Question
Which of the following strategies will a CPA most likely consider in auditing an entity that processes most of its financial data only in electronic form, such as a paperless system?
A. Continuous monitoring and analysis of transaction processing with an embedded audit module.
B. Increased reliance on internal control activities that emphasize the segregation of duties.
C. Verification of encrypted digital certificates used to monitor the authorization of transactions.
D. Extensive testing of firewall boundaries that restrict the recording of outside network traffic.
Question
Which statements are incorrect about virtual private network (VPN)?
A. It is a way to use the public telecommunication infrastructure in providing secure access to an organization's network.
B. It enables the employees to work remotely by accessing their firm's network securely using the Internet
C. The packets sent through VPN are encrypted and with authentication technology.
D. The expensive cost is one major disadvantage of VPN.
Question
Which of the following is the primary reason that many auditors hesitate to use embedded audit modules?
A. Embedded audit modules cannot be protected from computer viruses.
B. Auditors are required to monitor embedded audit modules continuously to obtain valid results.
C. Embedded audit modules can easily be modified through management tampering.
D. Auditors are required to be involved in the system design of the application to be monitored.
Question
One control objective for an operating system is that it must be protected from itself. Which of the following statements best explains this concept?
A. The operating system should be able to gracefully terminate activities, and later recover to its previous state.
B. No operating system module should be allowed to corrupt or destroy another operating system module.
C. User applications must not be allowed to gain control of or damage the operating system.
D. The operating system must be able to prevent unauthorized users from accessing, corrupting, or destroying other users' data.
Question
Which of the following best describes a data warehouse?
A. Users typically post operational transactions directly to the data warehouse.
B. Data warehouses contain real-time data.
C. A data warehouse typically hold no more than one year's worth of data.
D. A data warehouse contains nonvolatile data.
Question
The masquerading threat for wireless LANs is:
A. The attacker actively intercepts communications between wireless clients and access points to obtain authentication credentials and data
B. The attacker alters a legitimate message sent via wireless networks by deleting, adding to, changing, or reordering it
C. The attacker passively monitors wireless networks for data, including authentication credentials
D. The attacker impersonates an authorized user and gains certain unauthorized privileges to the wireless network
Question
Which of the following statements is not correct?
A. The IP address of a desktop computer often changes
B. The MAC address of a desktop computer often changes
C. The IP address of a Web server does not change
D. Each hardware device must have a MAC address
Question
Accounting professionals should understand database systems for all of the following reasons except:
A. Accountants have a strong understanding of risks, controls and business processes.
B. Accountants increasingly participate in creating internal control systems.
C. Accountants typically manage organizations' operational databases.
D. Accountants frequently help improve business and IT processes.
Question
The results of a generalized audit software simulation of the aging of accounts receivable revealed substantial differences in the aging contribution, even though grand totals reconciled. Which of the following should the IS auditor do first to resolve the discrepancy?
A. Recreate the test, using different software.
B. List a sample of actual data to verify the accuracy of the test program.
C. Ignore the discrepancy because the grand totals reconcile and instruct the controller to correct the program.
D. Create test transactions and run test data on both the production and simulation program.
Question
Which of the following uses best describes the use of a VPN?
A. Connect computers, printers, and file servers in an office building.
B. Lease dedicated communication lines to guarantee connection performance between remote office locations.
C. Allow employees traveling for business to connect to home office computing resources.
D. Allocates computing resources among multiple processors and operating systems.
Question
Which of the following is not a use of CAATs in auditing?
A. Test of details of transactions and balances
B. Analytical review procedures
C. Fraud examination
D. Produce terms and conditions of employment
Question
Which of the following is not one of the categories of security controls for wireless networks?
A. Operational controls.
B. Application controls.
C. Management controls.
D. Technical controls.
Question
Which of the following is not one of the reasons auditors should consider the use of CAATs?
A. ISACA standards require IS auditors to obtain sufficient, reliable, and relevant evidence, and should perform appropriate analysis of this evidence.
B. GAAP stipulates that audits should be performed using tools and techniques appropriate to the evidence being reviewed.
C. The IIA professional practices state that auditor must consider the use of technology-based auditing tools when conducting audits.
D. GAAS requires auditors to gather sufficient and appropriate evidence in the course of audit field work.
Question
Which of the following approaches and/or tools are not typically used as part of a CAAT approach to auditing?
A. Integrated testing facility (ITF).
B. Generalized audit software (GAS).
C. Audit calculation engine (ACE).
D. Embedded audit module (EAM).
Question
What are the two approaches of CAATs in auditing systems? What are the differences between them?
Question
Which of the following best describes continuous auditing?
A. Audit-related activities are peformed throughout the period under review.
B. The full audit team remains on the client site for the entire fiscal year.
C. The database extracts every 10th transaction and flags it for audit review.
D. Auditors can generate greater fees by increasing the amount of manual testing performed for the client.
Question
CAATs are commonly used in all of the following situations except:
A. Transaction testing.
B. Network penetration testing.
C. Encryption testing.
D. Operating system vulnerability assessments.
Question
Which of the following is not considered an advantage of using a continuous auditing approach?
A. Transactions can be tested and analyzed closer in time to when they actually occur.
B. Better compliance with laws and regulations.
C. It can reduce the effort required for routine testing.
D. It can be costly and time consuming to set up continuous auditing processes.
Question
Which of the following is not one of the benefits of using a wireless network?
A. Flexibility and scalability.
B. Mobility.
C. Greater security.
D. Rapid deployment.
Question
Which of the following is not considered one of the primary CAAT approaches?
A. The black-box approach.
B. Encryption testing.
C. Auditing through the computer.
D. The white-box approach.
Question
ACL and IDEA are two prominent examples of which of the following?
A. ITF.
B. GAS.
C. EAM.
D. DBMS.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 13: Monitoring and Auditing Ais
1
Which of the following statements about switches is correct?
A. A hub is smarter than Switch.
B. Switches provide more security protections than hubs do for a company's internal network.
C. Switches are widely used in WANs.
D. A Switch contains multiple ports.
Switches provide more security protections than hubs do for a company's internal network
2
A data warehouse is for daily operations and often includes data for the current fiscal year only.
False
3
Which of the following describes a group of computers that connects the internal users of a company distributed over an office building?
A. Internet
B. LAN
C. Virtual private network (VPN)
D. Decentralized network
LAN
4
Which of the following is not an approach used for online analytical processing (OLAP).
A. Exception reports
B. What-if simulations
C. Consolidation
D. Data mining
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
Parallel simulation attempts to simulate the firm's key features or processes.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
The Generally Accepted Auditing Standards (GAAS) issued by PCAOB provide guidelines for conducting an IS/IT audit.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
Parallel simulation uses an independent program to simulate a part of an existing application program, and is designed to test the validity and to verify the accuracy of an existing application program.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
Computer-assisted audit techniques (CAAT) are often used when auditing a company's IT infrastructure.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
A continuous audit allows companies to perform audit-related activities on a continuous basis.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
An integrated test facility (ITF) is an automated technique that enables test data to be continually evaluated during the normal operation of a system.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following is not a management control for wireless networks?
A. Assigning roles and responsibilities of employees for access control
B. Conducting risk assessment on a regular basis
C. Conducting appropriate awareness training on wireless networks
D. Creating policies and procedures
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
Data mining is the process of searching for patterns in the data in a data warehouse and to analyze the patterns for decision making.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
Data governance is the convergence of data quality, data management, data policies, business process management, and risk management surrounding the handling of data in a company.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
A virtual private network (VPN) is a private network, provided by a third party, for exchanging information through a high capacity connection.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the statements regarding a data warehouse is incorrect?
A. It is a centralized collection of firm-wide data
B. The purpose of a data warehouse is to provide a rich data set for management to identify patterns and to examine trends of business events
C. Includes data for the current fiscal year only
D. The data in a data warehouse is pulled from each of the operational databases periodically
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
An embedded audit module is a programmed audit module that is added to the system under review.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
The data in a data warehouse are updated when transactions are processed.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
Firewalls are security systems comprised of hardware and software that is built using routers, servers, and a variety of software.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
A wireless network is comprised of access points and stations. Access points logically connect stations to a firm's network.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
Accountants increasingly participate in designing internal controls and improving business and IT processes in a database environment.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
Which of the following tools is typically used in data mining?
A. COBIT.
B. OLAP.
C. REA.
D. DBA.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
Which of the following is least likely to be considered a component of a computer network?
A. Application programs.
B. Computers.
C. Servers.
D. Routers.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
Which of the following statements regarding the black-box approach for systems auditing is correct?
A. The auditors need to gain detailed knowledge of the systems' internal logic
B. The black-box approach could be adequate when automated systems applications are complicated
C. The auditors first calculate expected results from the transactions entered into the system. Then, the auditors compare these calculations to the processing or output results.
D. All of the above are correct
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
What is the man-in-the-middle threat for wireless LANs?
A. The attacker impersonates an authorized user and gains certain unauthorized privileges to the wireless network
B. The attacker passively monitors wireless networks for data, including authentication credentials
C. The attacker steals or makes unauthorized use of a service
D. The attacker actively intercepts communications between wireless clients and access points to obtain authentication credentials and data.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
What is the test data technique?
A. It uses a set of input data to validate system integrity.
B. It requires auditors to prepare both valid and invalid data to examine critical logics and controls of the system
C. It is an automated technique that enables test data to be continually evaluated during the normal operation of a system
D. A and B are correct
E. None of the above is correct
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
Which of the following statements about firewalls is wrong?
A. A firewall is a security system comprised of hardware and software that is built using routers, servers, and a variety of software
B. A firewall allows individuals on the corporate network to send and receive data packets from the Internet
C. A firewall can filter through packets coming from outside networks to prevent unauthorized access
D. A firewall connects different LANs, software-based intelligent devices, and examines IP addresses
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
What is data mining?
A. A particular attribute of information.
B. A common term for the representation of multidimensional data.
C. The process of analyzing data to extract information that is not affected by the raw data alone.
D. None of the above is correct.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
Which of the following statements is wrong regarding continuous audit?
A. Continuous audit is used to perform audit-related activities on a continuous basis
B. Testing in continuous audits often consists of continuous controls monitoring and continuous data assurance
C. Technology plays a key role in continuous audit in analyzing trends and patterns of transactions, identifying exceptions and anomalies, and testing controls
D. Continuous audit is frequently used to perform substantive tests and is used for testing of controls through transactional-data analysis
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
LAN is the abbreviation for
A. Large Area Network.
B. Local Area Network.
C. Longitudinal Analogue Network.
D. Low Analytical Nets.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
Which of the following strategies will a CPA most likely consider in auditing an entity that processes most of its financial data only in electronic form, such as a paperless system?
A. Continuous monitoring and analysis of transaction processing with an embedded audit module.
B. Increased reliance on internal control activities that emphasize the segregation of duties.
C. Verification of encrypted digital certificates used to monitor the authorization of transactions.
D. Extensive testing of firewall boundaries that restrict the recording of outside network traffic.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
Which statements are incorrect about virtual private network (VPN)?
A. It is a way to use the public telecommunication infrastructure in providing secure access to an organization's network.
B. It enables the employees to work remotely by accessing their firm's network securely using the Internet
C. The packets sent through VPN are encrypted and with authentication technology.
D. The expensive cost is one major disadvantage of VPN.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
Which of the following is the primary reason that many auditors hesitate to use embedded audit modules?
A. Embedded audit modules cannot be protected from computer viruses.
B. Auditors are required to monitor embedded audit modules continuously to obtain valid results.
C. Embedded audit modules can easily be modified through management tampering.
D. Auditors are required to be involved in the system design of the application to be monitored.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
One control objective for an operating system is that it must be protected from itself. Which of the following statements best explains this concept?
A. The operating system should be able to gracefully terminate activities, and later recover to its previous state.
B. No operating system module should be allowed to corrupt or destroy another operating system module.
C. User applications must not be allowed to gain control of or damage the operating system.
D. The operating system must be able to prevent unauthorized users from accessing, corrupting, or destroying other users' data.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
Which of the following best describes a data warehouse?
A. Users typically post operational transactions directly to the data warehouse.
B. Data warehouses contain real-time data.
C. A data warehouse typically hold no more than one year's worth of data.
D. A data warehouse contains nonvolatile data.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
The masquerading threat for wireless LANs is:
A. The attacker actively intercepts communications between wireless clients and access points to obtain authentication credentials and data
B. The attacker alters a legitimate message sent via wireless networks by deleting, adding to, changing, or reordering it
C. The attacker passively monitors wireless networks for data, including authentication credentials
D. The attacker impersonates an authorized user and gains certain unauthorized privileges to the wireless network
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
Which of the following statements is not correct?
A. The IP address of a desktop computer often changes
B. The MAC address of a desktop computer often changes
C. The IP address of a Web server does not change
D. Each hardware device must have a MAC address
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
Accounting professionals should understand database systems for all of the following reasons except:
A. Accountants have a strong understanding of risks, controls and business processes.
B. Accountants increasingly participate in creating internal control systems.
C. Accountants typically manage organizations' operational databases.
D. Accountants frequently help improve business and IT processes.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
The results of a generalized audit software simulation of the aging of accounts receivable revealed substantial differences in the aging contribution, even though grand totals reconciled. Which of the following should the IS auditor do first to resolve the discrepancy?
A. Recreate the test, using different software.
B. List a sample of actual data to verify the accuracy of the test program.
C. Ignore the discrepancy because the grand totals reconcile and instruct the controller to correct the program.
D. Create test transactions and run test data on both the production and simulation program.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
Which of the following uses best describes the use of a VPN?
A. Connect computers, printers, and file servers in an office building.
B. Lease dedicated communication lines to guarantee connection performance between remote office locations.
C. Allow employees traveling for business to connect to home office computing resources.
D. Allocates computing resources among multiple processors and operating systems.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
Which of the following is not a use of CAATs in auditing?
A. Test of details of transactions and balances
B. Analytical review procedures
C. Fraud examination
D. Produce terms and conditions of employment
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
Which of the following is not one of the categories of security controls for wireless networks?
A. Operational controls.
B. Application controls.
C. Management controls.
D. Technical controls.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
Which of the following is not one of the reasons auditors should consider the use of CAATs?
A. ISACA standards require IS auditors to obtain sufficient, reliable, and relevant evidence, and should perform appropriate analysis of this evidence.
B. GAAP stipulates that audits should be performed using tools and techniques appropriate to the evidence being reviewed.
C. The IIA professional practices state that auditor must consider the use of technology-based auditing tools when conducting audits.
D. GAAS requires auditors to gather sufficient and appropriate evidence in the course of audit field work.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
Which of the following approaches and/or tools are not typically used as part of a CAAT approach to auditing?
A. Integrated testing facility (ITF).
B. Generalized audit software (GAS).
C. Audit calculation engine (ACE).
D. Embedded audit module (EAM).
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
What are the two approaches of CAATs in auditing systems? What are the differences between them?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
Which of the following best describes continuous auditing?
A. Audit-related activities are peformed throughout the period under review.
B. The full audit team remains on the client site for the entire fiscal year.
C. The database extracts every 10th transaction and flags it for audit review.
D. Auditors can generate greater fees by increasing the amount of manual testing performed for the client.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
CAATs are commonly used in all of the following situations except:
A. Transaction testing.
B. Network penetration testing.
C. Encryption testing.
D. Operating system vulnerability assessments.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
Which of the following is not considered an advantage of using a continuous auditing approach?
A. Transactions can be tested and analyzed closer in time to when they actually occur.
B. Better compliance with laws and regulations.
C. It can reduce the effort required for routine testing.
D. It can be costly and time consuming to set up continuous auditing processes.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
Which of the following is not one of the benefits of using a wireless network?
A. Flexibility and scalability.
B. Mobility.
C. Greater security.
D. Rapid deployment.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
Which of the following is not considered one of the primary CAAT approaches?
A. The black-box approach.
B. Encryption testing.
C. Auditing through the computer.
D. The white-box approach.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
ACL and IDEA are two prominent examples of which of the following?
A. ITF.
B. GAS.
C. EAM.
D. DBMS.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 50 flashcards in this deck.