Question: AUDIT [IF IT GENERAL CONTROL Computer Operations and Access to Programs and Data Requirement: True and False 1.) To the extent possible. IT systems should

 AUDIT [IF IT GENERAL CONTROL Computer Operations and Access to Programs

AUDIT [IF IT GENERAL CONTROL Computer Operations and Access to Programs and Data Requirement: True and False 1.) To the extent possible. IT systems should be installed in locations away from any location likely to be affected by natural disasters. 2.) It is not necessary to control the humidity and temperature in the location where the computer system is housed. 3.) Disaster recovery planning is a proactive plan to protect IT systems and the related data. 4.)!1'. disaster recovery plan is a comprehensive statement of all actions to be taken after a disaster. 5.} Library procedures should assure that only authorized persons receive les, programs, or documents. and that these persons acknowledge their responsibility at the time of each issuance. 6.) The entire focus of disaster recovery could be summed up with a oneword definition: rebuilding T. :I The approach to any risk should be to try to remove the threat by considering business locations. building materials and duplication of key functions at remote sites. AUDIT DF II' GENERAL CONTROL Computer Operations and Access to Programs and Data Requirement: True and False 1.) BOP should be supported by a formal executive policy that states the organization's overall target for recovery and empowers those involved in developing, testing and maintaining the plans. 2.) The purpose of an IT auditor is to provide ad hoc assistance to business users. 3.) To increase the effectiveness of login restrictions. user Ids must be unique for each user. 4.) Biometric devises use unique physical characteristics to identify users. The most common method used is retina scans. 5.) Once an organization has set up an effective system to prevent unauthorized access to the IT system. it is not necessary to continually monitor the vulnerability of that system. 6.) Employees who hack into computer networks are often more dangerous because of their knowledge of company operations. T.) Controlling access to the operating system is critical because that access opens access to any data or program within the system. 8.) An organization must maintain procedures to protect the output from unauthorized access in the form of written guidelines and procedures for output distribution

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Accounting Questions!