28) This item controls the access that users have to directories, files, printers, and other...

90.2K

Verified Solution

Question

Accounting

image

28) This item controls the access that users have to directories, files, printers, and other specific resources. a. Backup Control List b. Access Control List c. Event Monitoring d. Network Firewalls 29) Which of the following is a control objective of an operating system? a. Protecting users from each other b. Protecting the system from itself c. Protecting the system from its environment d. All of the above 30) An element that controls access between two networks is best described as a(n): a. Firewall b. Database Authorization Table c. Data Encryption d. All of the above 31) Which of the following is a system development control? a. User specification activities b. Technical design activities c. Program testing d. All of the above 32) A key element of auditing through the computer includes: a. The use of computer-assisted audit tools b. An analysis of flowcharts and other organizational documents c. Interviewing key personnel d. All of the above 33) Which audit procedure below is auditing around the computer? a. Test Data Methods b. Tracing C. Interviewing key personnel d. All of the above 34) Which of the following is a category of IT application control testing? a. Access testing b. Accuracy testing c. Redundancy testing d. All of the above

Answer & Explanation Solved by verified expert
Get Answers to Unlimited Questions

Join us to gain access to millions of questions and expert answers. Enjoy exclusive benefits tailored just for you!

Membership Benefits:
  • Unlimited Question Access with detailed Answers
  • Zin AI - 3 Million Words
  • 10 Dall-E 3 Images
  • 20 Plot Generations
  • Conversation with Dialogue Memory
  • No Ads, Ever!
  • Access to Our Best AI Platform: Flex AI - Your personal assistant for all your inquiries!
Become a Member

Other questions asked by students