Question: 28) This item controls the access that users have to directories, files, printers, and other specific resources. a. Backup Control List b. Access Control List

 28) This item controls the access that users have to directories,

28) This item controls the access that users have to directories, files, printers, and other specific resources. a. Backup Control List b. Access Control List c. Event Monitoring d. Network Firewalls 29) Which of the following is a control objective of an operating system? a. Protecting users from each other b. Protecting the system from itself c. Protecting the system from its environment d. All of the above 30) An element that controls access between two networks is best described as a(n): a. Firewall b. Database Authorization Table c. Data Encryption d. All of the above 31) Which of the following is a system development control? a. User specification activities b. Technical design activities c. Program testing d. All of the above 32) A key element of auditing through the computer includes: a. The use of computer-assisted audit tools b. An analysis of flowcharts and other organizational documents c. Interviewing key personnel d. All of the above 33) Which audit procedure below is auditing around the computer? a. Test Data Methods b. Tracing C. Interviewing key personnel d. All of the above 34) Which of the following is a category of IT application control testing? a. Access testing b. Accuracy testing c. Redundancy testing d. All of the above

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Accounting Questions!