The following statements have been made about logical access controls:(1) Their primary purpose is to stop unauthorised access to the data and software in asystem.(2) They include the use of passwords.(3) It is never possible for logical access controls to stop all unauthorised attempts toaccess confidential data.Which of the statements above are true?
参考答案(由小熊题库网聘请的专业题库老师提供的解答)
请点击↑↑↑ 查看官方参考答案 按钮
习题解析
请点击 查看官方参考答案 按钮
您可能感兴趣的题目
1 .Anthony’s model defines three levels of management – Strategic, Tactical and Operational.Which of the following tasks would NOT normally be performed by tactical managers?
A Preparation of budgets for the next financial year B Making pricing decisions for the local market C Deciding to move into new markets D Planning how many staff to recruit each year
2 .What type of information systems monitor the elementary activities and transactions ofthe organisations?
A Management-level systems B Transactions processing systems C Knowledge-level systems D Strategic-level systems
3 .Projections and responses to queries are typically outputs from what type of system?
A Decision Support Systems B Management Information Systems C Executive information systems D Transactions processing systems
4 .The following statements have been made about Enterprise Resource Planning (ERP)systems:(1) They aim to allow all departments within an organisation to share information.(2) They are used only by strategic managers.(3) They typically include an accounting module.Which of the above statements are correct?
A 1 and 2 only B 1 and 3 only C 2 and 3 only D All of the above
5 .Beta Co is developing a new ERP system. The project manager is preparing a cost benefitanalysis of the system, and has been told that all costs must be classified as direct or indirect.He has asked you to assist in categorising two particular items of expenditure:(1) The annual maintenance contract with the provider of the software – this includesthe provision of a “hotline” that staff may call if they need help using the software.(2) The costs of storing the data backups. The data backups will be stored on the serverof a specialist backup company. The charges for this are variable, and depend onthe quantity of data stored.How should each of the items of expenditure be categorised?
A Item 1 Direct;Item 2 Direct B Item 1 Direct;Item 2 Indirect C Item 1 Indirect;Item 2 Direct D Item 1 Indirect;Item 2 Indirect
7 .可以直接修改他人填制而未被审核的凭证。( )
Y 对 N 错
8 .Which TWO of the following are reasons why organisations need to have effectivesystems of control?(1) Managing going concern risk(2) Maximising its profitability(3) Managing its assets and liabilities(4) Cutting down the time needed for the audit(5) Complying with laws and regulations
A 2 and 3 B 1 and 3 C 1 and 5 D 4 and 5
9 .An effective system of internal control requires segregation of basic functions (segregation ofduties).Which THREE of the following functions should ideally be segregated?(1) Authorisation of transactions(2) Preparation of financial statements(3) Custody or handling of assets(4) Budgetary control(5) Recording of transactions
A 1, 3 and 5 B 1, 2 and 3 C 1, 2 and 5 D 3, 4 and 5
10 .ISA 315 Identifying and Assessing the Risks of Material Misstatement through Understandingthe Entity and Its Environment states that an internal control system in an organisationconsists of five components: the control environment, the entity’s risk assessment process, theinformation system, control activities and monitoring of controls.Which component would include the review by a senior financial manager of monthlybank reconciliations produced by her assistant?
A Control environment B Control activity C Monitoring of controls
