22.05.2017 Views

ACCT 571 DeVry Week 3 Quiz

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>ACCT</strong> <strong>571</strong> <strong>DeVry</strong> <strong>Week</strong> 3 <strong>Quiz</strong><br />

Downloading is very simple, you can download this Course here:<br />

https://www.mindsblow.com/product/acct-<strong>571</strong>-devry-week-3-quiz/<br />

Or<br />

Contact us at:<br />

SUPPORT@MINDSBLOW.COM<br />

<strong>ACCT</strong> <strong>571</strong> <strong>DeVry</strong> <strong>Week</strong> 3 <strong>Quiz</strong><br />

<strong>ACCT</strong><strong>571</strong><br />

<strong>ACCT</strong> <strong>571</strong> <strong>DeVry</strong> <strong>Week</strong> 3 <strong>Quiz</strong><br />

(TCO G) This creates logs of network traffic that was permitted to pass the firewall.<br />

o<br />

o<br />

o<br />

o<br />

Intrusion detection system<br />

Log analysis<br />

Penetration test<br />

Vulnerability scan<br />

Question 2. Question : (TCO G) Multi-factor authentication<br />

o<br />

o<br />

o<br />

o<br />

Involves the use of two or more basic authentication methods.<br />

Is a table specifying which portions of the systems users are permitted to access.<br />

Provides weaker authentication than the use of effective passwords.<br />

Requires the use of more than one effective password.<br />

Question 3. Question : (TCO G) The Trust Services Framework reliability principle that states that users must<br />

be able to enter, update, and retrieve data during agreed-upon times is known as<br />

o<br />

o<br />

o<br />

o<br />

availability.<br />

security.<br />

maintainability.<br />

integrity.<br />

Question 4. Question : (TCO G) Which of the following is not one of the 10 internationally recognized best<br />

practices for protecting the privacy of customers' personal information?<br />

o<br />

o<br />

o<br />

o<br />

Access.<br />

Monitoring and enforcement.<br />

Registration.<br />

Security.<br />

Question 5. Question : (TCO G) With which stage in the auditing process are the consideration of risk factors<br />

and materiality most associated?


o<br />

o<br />

o<br />

o<br />

audit planning<br />

collection of audit evidence<br />

communication of audit results<br />

evaluation of audit evidence<br />

Question 6. Question : (TCO G) Identify six physical access controls.<br />

Unauthorized or Unidentified Persons Deliveries Visitors Access Device Dormitory Facilities. Employees<br />

Question 7. Question : (TCO G) Why do all audits follow a sequence of events that can be divided into four<br />

stages?

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!