Contingency Paper 4

1

A controller became aware that a competitor appeared to have access to the company’s pricing information. The internal auditor determined that the leak of information was occurring during the electronic transmission of data from branch offices to the head office. Which of the following controls would be the most effective in preventing the leak of information?






2

Management’s enthusiasm for computer security seems to vary with changes in the environment, particularly with occurrence of the other computer disasters. Which of the following concepts should be addressed when making a comprehensive recommendation regarding the costs and benefits of computer security?
I. Potential loss if security is not implemented.
II. Probability of occurrences.
III. Cost and effectiveness of the implementation and operation of computer security.






3

Each day after all processing is finished, a bank performs a backup of its online deposit files and retains it for 7 days. Copies of each day’s transaction files are not retained. This approach is:






Result

Total Questions:
Correct Answers:
Wrong Answers:
Percentage: