Question: 28) This item controls the access that users have to directories, files, printers, and other specific resources. a. Backup Control List b. Access Control List

28) This item controls the access that users have to directories, files, printers, and other specific resources. a. Backup Control List b. Access Control List c. Event Monitoring d. Network Firewalls 29) Which of the following is a control objective of an operating system? a. Protecting users from each other b. Protecting the system from itself c. Protecting the system from its environment d. All of the above 30) An element that controls access between two networks is best described as a(n): a. Firewall b. Database Authorization Table c. Data Encryption d. All of the above 31) Which of the following is a system development control? a. User specification activities b. Technical design activities c. Program testing d. All of the above 32) A key element of auditing through the computer includes: a. The use of computer-assisted audit tools b. An analysis of flowcharts and other organizational documents c. Interviewing key personnel d. All of the above 33) Which audit procedure below is auditing around the computer? a. Test Data Methods b. Tracing C. Interviewing key personnel d. All of the above 34) Which of the following is a category of IT application control testing? a. Access testing b. Accuracy testing c. Redundancy testing d. All of the above
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
