100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada
logo-home
ACC 400 AIS Exam 2 (Ch. 7-11) | Questions And Answers Latest {} A+ Graded | 100% Verified $13.48   Añadir al carrito

Examen

ACC 400 AIS Exam 2 (Ch. 7-11) | Questions And Answers Latest {} A+ Graded | 100% Verified

 5 vistas  0 veces vendidas
  • Grado
  • Top Academic Resources 2024/2025
  • Institución
  • Top Academic Resources 2024/2025

ACC 400 AIS Exam 2 (Ch. 7-11) | Questions And Answers Latest {} A+ Graded | 100% Verified

Vista previa 2 fuera de 5  páginas

  • 24 de agosto de 2024
  • 5
  • 2024/2025
  • Examen
  • Preguntas y respuestas
  • Top Academic Resources 2024/2025
  • Top Academic Resources 2024/2025
avatar-seller
ACC 400 AIS Exam 2 (Ch. 7-11) | Questions And Answers Latest {2024- 2025} A+ Graded |
100% Verified




Why are threats to accounting information systems increasing? - Many companies do not realize that
data security is crucial to their survival



Identify the best description of an access control matrix below. - is a table specifying which portions of
the system users are permitted to access



Sonja Greer called the IT Help Desk in a bad mood. "I'm trying to open an Excel file, but I get a message
that says that the file is locked for editing. Why is this happening to me?" The answer is likely that -
concurrent update controls have locked the file



The Sarbanes-Oxley Act (SOX) applies to - all publicly traded companies



One way to circumvent the counterfeiting of public keys is by using - a digital certificate



The first step of the risk assessment process is generally to - identify the threats that the company
currently faces



Which of the following statements is true with regards to system availability? - Threats to system
availability include hardware and software failures as well as natural and man-made disasters



The possibility that a material error will occur even though auditors are following audit procedures and
using good judgment is referred to as - detection risk



A process that takes plaintext of any length and transforms it into a short code - hashing



The security technology that evaluates IP packet traffic patterns in order to identify attacks against a
system is known as - an intrusion prevention system

, Which type of audits can detect fraud and errors? - all of the above



If an organization asks you to disclose your social security number, but fails to establish a set of
procedures and policies for protecting your privacy, the organization has likely violated which of the
Generally Accepted Privacy Principles? - Management



Identify the preventive control below - approving customer credit prior to approving a sales order



The scope of a(n) ________ audit encompasses all aspects of systems management - operational



If an organization asks you to disclose your social security number, yet fails to permit you to opt-out
before you provide the information, the organization has likely violated which of the Generally Accepted
Privacy Principles? - Choice and consent



A neural network is a software program that has - the ability to learn



A customer failed to include her account number on her check, and the accounts receivable clerk
credited her payment to a different customer with the same last name. Which control could have been
used to most effectively to prevent this error? - closed-loop verification



What is a test data generator? - an application that prepares data that can be used for auditing the
effectiveness of computer processing



What is the purpose of an information systems audit? - to review and evaluate the internal controls that
protect the system



________ enables a system to continue functioning in the event that a particular component fails - Fault
tolerance



In 2007, a major U.S. financial institution hired a security firm to attempt to compromise its computer
network. A week later, the firm reported that it had successfully entered the system without apparent
detection and presented an analysis of the vulnerabilities that had been found. This is an example of a -
detective control

Los beneficios de comprar resúmenes en Stuvia estan en línea:

Garantiza la calidad de los comentarios

Garantiza la calidad de los comentarios

Compradores de Stuvia evaluaron más de 700.000 resúmenes. Así estas seguro que compras los mejores documentos!

Compra fácil y rápido

Compra fácil y rápido

Puedes pagar rápidamente y en una vez con iDeal, tarjeta de crédito o con tu crédito de Stuvia. Sin tener que hacerte miembro.

Enfócate en lo más importante

Enfócate en lo más importante

Tus compañeros escriben los resúmenes. Por eso tienes la seguridad que tienes un resumen actual y confiable. Así llegas a la conclusión rapidamente!

Preguntas frecuentes

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

100% de satisfacción garantizada: ¿Cómo funciona?

Nuestra garantía de satisfacción le asegura que siempre encontrará un documento de estudio a tu medida. Tu rellenas un formulario y nuestro equipo de atención al cliente se encarga del resto.

Who am I buying this summary from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller oneclass. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy this summary for $13.48. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

45,681 summaries were sold in the last 30 days

Founded in 2010, the go-to place to buy summaries for 14 years now

Empieza a vender
$13.48
  • (0)
  Añadir