28) This item controls the access that users have to directories, files, printers, and other...
90.2K
Verified Solution
Link Copied!
Question
Accounting
28) This item controls the access that users have to directories, files, printers, and other specific resources. a. Backup Control List b. Access Control List c. Event Monitoring d. Network Firewalls 29) Which of the following is a control objective of an operating system? a. Protecting users from each other b. Protecting the system from itself c. Protecting the system from its environment d. All of the above 30) An element that controls access between two networks is best described as a(n): a. Firewall b. Database Authorization Table c. Data Encryption d. All of the above 31) Which of the following is a system development control? a. User specification activities b. Technical design activities c. Program testing d. All of the above 32) A key element of auditing through the computer includes: a. The use of computer-assisted audit tools b. An analysis of flowcharts and other organizational documents c. Interviewing key personnel d. All of the above 33) Which audit procedure below is auditing around the computer? a. Test Data Methods b. Tracing C. Interviewing key personnel d. All of the above 34) Which of the following is a category of IT application control testing? a. Access testing b. Accuracy testing c. Redundancy testing d. All of the above
Answer & Explanation
Solved by verified expert
Get Answers to Unlimited Questions
Join us to gain access to millions of questions and expert answers. Enjoy exclusive benefits tailored just for you!
Membership Benefits:
Unlimited Question Access with detailed Answers
Zin AI - 3 Million Words
10 Dall-E 3 Images
20 Plot Generations
Conversation with Dialogue Memory
No Ads, Ever!
Access to Our Best AI Platform: Flex AI - Your personal assistant for all your inquiries!