100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
ACC 400 AIS Exam 2 (Ch. 7-11) | Questions And Answers Latest {} A+ Graded | 100% Verified $13.48   Add to cart

Exam (elaborations)

ACC 400 AIS Exam 2 (Ch. 7-11) | Questions And Answers Latest {} A+ Graded | 100% Verified

 5 views  0 purchase
  • Course
  • Top Academic Resources 2024/2025
  • Institution
  • Top Academic Resources 2024/2025

ACC 400 AIS Exam 2 (Ch. 7-11) | Questions And Answers Latest {} A+ Graded | 100% Verified

Preview 2 out of 5  pages

  • August 24, 2024
  • 5
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • Top Academic Resources 2024/2025
  • Top Academic Resources 2024/2025
avatar-seller
oneclass
ACC 400 AIS Exam 2 (Ch. 7-11) | Questions And Answers Latest {2024- 2025} A+ Graded |
100% Verified




Why are threats to accounting information systems increasing? - Many companies do not realize that
data security is crucial to their survival



Identify the best description of an access control matrix below. - is a table specifying which portions of
the system users are permitted to access



Sonja Greer called the IT Help Desk in a bad mood. "I'm trying to open an Excel file, but I get a message
that says that the file is locked for editing. Why is this happening to me?" The answer is likely that -
concurrent update controls have locked the file



The Sarbanes-Oxley Act (SOX) applies to - all publicly traded companies



One way to circumvent the counterfeiting of public keys is by using - a digital certificate



The first step of the risk assessment process is generally to - identify the threats that the company
currently faces



Which of the following statements is true with regards to system availability? - Threats to system
availability include hardware and software failures as well as natural and man-made disasters



The possibility that a material error will occur even though auditors are following audit procedures and
using good judgment is referred to as - detection risk



A process that takes plaintext of any length and transforms it into a short code - hashing



The security technology that evaluates IP packet traffic patterns in order to identify attacks against a
system is known as - an intrusion prevention system

, Which type of audits can detect fraud and errors? - all of the above



If an organization asks you to disclose your social security number, but fails to establish a set of
procedures and policies for protecting your privacy, the organization has likely violated which of the
Generally Accepted Privacy Principles? - Management



Identify the preventive control below - approving customer credit prior to approving a sales order



The scope of a(n) ________ audit encompasses all aspects of systems management - operational



If an organization asks you to disclose your social security number, yet fails to permit you to opt-out
before you provide the information, the organization has likely violated which of the Generally Accepted
Privacy Principles? - Choice and consent



A neural network is a software program that has - the ability to learn



A customer failed to include her account number on her check, and the accounts receivable clerk
credited her payment to a different customer with the same last name. Which control could have been
used to most effectively to prevent this error? - closed-loop verification



What is a test data generator? - an application that prepares data that can be used for auditing the
effectiveness of computer processing



What is the purpose of an information systems audit? - to review and evaluate the internal controls that
protect the system



________ enables a system to continue functioning in the event that a particular component fails - Fault
tolerance



In 2007, a major U.S. financial institution hired a security firm to attempt to compromise its computer
network. A week later, the firm reported that it had successfully entered the system without apparent
detection and presented an analysis of the vulnerabilities that had been found. This is an example of a -
detective control

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller oneclass. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $13.48. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

71498 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$13.48
  • (0)
  Add to cart