23.05.2017 Views

ACCT 571 DeVry Entire Course

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Question 4. Question : (TCO B) This control framework addresses the issue of control from three vantage points:<br />

business objectives, information technology resources, and information technology processes.<br />

o<br />

o<br />

o<br />

o<br />

ISACA's control objectives for information and related technology<br />

COSO's internal control framework<br />

COSO's enterprise risk management framework<br />

None of the above<br />

Question 5. Question : (TCO G) Identify the aspect of a normalized database that is incorrect:<br />

o<br />

o<br />

o<br />

o<br />

Data is consistent.<br />

Redundancy is minimized and controlled.<br />

All data is stored in one table or relation.<br />

The primary key of any row in a relation cannot be null.<br />

Question 6. Question : (TCO B) Why is computer fraud on the rise?<br />

Question 7. Question : (TCO B) What is a weakness of the internal control concept of the separation of duties?<br />

Points Received: 0 of 5 Comments:<br />

<strong>ACCT</strong> <strong>571</strong> <strong>DeVry</strong> Week 3 Quiz<br />

(TCO G) This creates logs of network traffic that was permitted to pass the firewall.<br />

o<br />

o<br />

o<br />

o<br />

Intrusion detection system<br />

Log analysis<br />

Penetration test<br />

Vulnerability scan<br />

Question 2. Question : (TCO G) Multi-factor authentication<br />

o<br />

o<br />

o<br />

o<br />

Involves the use of two or more basic authentication methods.<br />

Is a table specifying which portions of the systems users are permitted to access.<br />

Provides weaker authentication than the use of effective passwords.<br />

Requires the use of more than one effective password.<br />

Question 3. Question : (TCO G) The Trust Services Framework reliability principle that states that users must<br />

be able to enter, update, and retrieve data during agreed-upon times is known as<br />

o<br />

o<br />

o<br />

o<br />

availability.<br />

security.<br />

maintainability.<br />

integrity.<br />

Question 4. Question : (TCO G) Which of the following is not one of the 10 internationally recognized best<br />

practices for protecting the privacy of customers' personal information?<br />

o<br />

o<br />

o<br />

o<br />

Access.<br />

Monitoring and enforcement.<br />

Registration.<br />

Security.<br />

Question 5. Question : (TCO G) With which stage in the auditing process are the consideration of risk factors<br />

and materiality most associated?

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!