ACCT 571 DeVry Entire Course
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Question 4. Question : (TCO B) This control framework addresses the issue of control from three vantage points:<br />
business objectives, information technology resources, and information technology processes.<br />
o<br />
o<br />
o<br />
o<br />
ISACA's control objectives for information and related technology<br />
COSO's internal control framework<br />
COSO's enterprise risk management framework<br />
None of the above<br />
Question 5. Question : (TCO G) Identify the aspect of a normalized database that is incorrect:<br />
o<br />
o<br />
o<br />
o<br />
Data is consistent.<br />
Redundancy is minimized and controlled.<br />
All data is stored in one table or relation.<br />
The primary key of any row in a relation cannot be null.<br />
Question 6. Question : (TCO B) Why is computer fraud on the rise?<br />
Question 7. Question : (TCO B) What is a weakness of the internal control concept of the separation of duties?<br />
Points Received: 0 of 5 Comments:<br />
<strong>ACCT</strong> <strong>571</strong> <strong>DeVry</strong> Week 3 Quiz<br />
(TCO G) This creates logs of network traffic that was permitted to pass the firewall.<br />
o<br />
o<br />
o<br />
o<br />
Intrusion detection system<br />
Log analysis<br />
Penetration test<br />
Vulnerability scan<br />
Question 2. Question : (TCO G) Multi-factor authentication<br />
o<br />
o<br />
o<br />
o<br />
Involves the use of two or more basic authentication methods.<br />
Is a table specifying which portions of the systems users are permitted to access.<br />
Provides weaker authentication than the use of effective passwords.<br />
Requires the use of more than one effective password.<br />
Question 3. Question : (TCO G) The Trust Services Framework reliability principle that states that users must<br />
be able to enter, update, and retrieve data during agreed-upon times is known as<br />
o<br />
o<br />
o<br />
o<br />
availability.<br />
security.<br />
maintainability.<br />
integrity.<br />
Question 4. Question : (TCO G) Which of the following is not one of the 10 internationally recognized best<br />
practices for protecting the privacy of customers' personal information?<br />
o<br />
o<br />
o<br />
o<br />
Access.<br />
Monitoring and enforcement.<br />
Registration.<br />
Security.<br />
Question 5. Question : (TCO G) With which stage in the auditing process are the consideration of risk factors<br />
and materiality most associated?