ACCT 571 DeVry Week 3 Quiz
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
<strong>ACCT</strong> <strong>571</strong> <strong>DeVry</strong> <strong>Week</strong> 3 <strong>Quiz</strong><br />
Downloading is very simple, you can download this Course here:<br />
https://www.mindsblow.com/product/acct-<strong>571</strong>-devry-week-3-quiz/<br />
Or<br />
Contact us at:<br />
SUPPORT@MINDSBLOW.COM<br />
<strong>ACCT</strong> <strong>571</strong> <strong>DeVry</strong> <strong>Week</strong> 3 <strong>Quiz</strong><br />
<strong>ACCT</strong><strong>571</strong><br />
<strong>ACCT</strong> <strong>571</strong> <strong>DeVry</strong> <strong>Week</strong> 3 <strong>Quiz</strong><br />
(TCO G) This creates logs of network traffic that was permitted to pass the firewall.<br />
o<br />
o<br />
o<br />
o<br />
Intrusion detection system<br />
Log analysis<br />
Penetration test<br />
Vulnerability scan<br />
Question 2. Question : (TCO G) Multi-factor authentication<br />
o<br />
o<br />
o<br />
o<br />
Involves the use of two or more basic authentication methods.<br />
Is a table specifying which portions of the systems users are permitted to access.<br />
Provides weaker authentication than the use of effective passwords.<br />
Requires the use of more than one effective password.<br />
Question 3. Question : (TCO G) The Trust Services Framework reliability principle that states that users must<br />
be able to enter, update, and retrieve data during agreed-upon times is known as<br />
o<br />
o<br />
o<br />
o<br />
availability.<br />
security.<br />
maintainability.<br />
integrity.<br />
Question 4. Question : (TCO G) Which of the following is not one of the 10 internationally recognized best<br />
practices for protecting the privacy of customers' personal information?<br />
o<br />
o<br />
o<br />
o<br />
Access.<br />
Monitoring and enforcement.<br />
Registration.<br />
Security.<br />
Question 5. Question : (TCO G) With which stage in the auditing process are the consideration of risk factors<br />
and materiality most associated?
o<br />
o<br />
o<br />
o<br />
audit planning<br />
collection of audit evidence<br />
communication of audit results<br />
evaluation of audit evidence<br />
Question 6. Question : (TCO G) Identify six physical access controls.<br />
Unauthorized or Unidentified Persons Deliveries Visitors Access Device Dormitory Facilities. Employees<br />
Question 7. Question : (TCO G) Why do all audits follow a sequence of events that can be divided into four<br />
stages?