Internal Auditing and Systems Controls Paper 13

1

What is the best course of action to take if a program takes longer than usual to load or execute?






2

Six months after a disgruntled systems programmer was fired and passwords disabled, the company’s largest server was brought to a halt when it suddenly erased all of its own files and software. The most likely way the programmer accomplished this was by






3

Because of competitive pressures to be more responsive to their customers, some organizations have connected their internal personal computer networks through a host computer to outside networks. A risk of this practice is that






4

Spoofing is one type of online activity used to launch malicious attacks. Spoofing is






5

Attack on computers network may take many forms. Which of the following uses the computers of innocent parties infected with Trojan horse programs?






6

An organization’s computer system should have an intrusion detection system (IDS) if it has external connections. An IDS






7

An auditor reviews and adapts a systems flowchart to understand the flow of information in the processing of cash receipts. The flowchart






8

A critical aspect of a disaster recovery plan is to be able to regain operational capability as soon as possible. In order to accomplish this, an organization can have an arrangement with its computer hardware vendor to have a fully operational facility available that is configured to the user’s specific needs. This is best known as a(n)






9

The graphic portrayal of the flow of data and the information processing of a system, including computer hardware, is best displayed in a






10

Which of the following is not an important aspect of a disaster recovery plan?






Result

Total Questions:
Correct Answers:
Wrong Answers:
Percentage: