In: Accounting
QUESTION 14 Identify the item below that is not a step you could take to prevent yourself from becoming a victim of identity theft.
Refuse to disclose your social security number to anyone or any organization. |
||
Monitor your credit reports regularly. |
||
Only print your initial and last name on your personal checks. |
||
Shred all documents that contain your personal information. |
QUESTION 15. Information rights management software can do all of the following except
limit action privileges to a specific time period. |
||
limiting access to specific files. |
||
authenticate individuals accessing information. |
||
specify the actions individuals granted access to information can perform. |
QUESTION 16. With regards to an accounting information system, a financial audit is most concerned with
the system's input. |
||
the system's storage. |
||
the system's processing. |
||
the system's output. |
QUESTION 26. Asymmetric key encryption combined with the information provided by a certificate authority allows unique identification of
the provider of encrypted data. |
||
both the user and the provider of encrypted data. |
||
the user of encrypted data. |
||
either the user or the provider of encrypted data. |
QUESTION 38. The information systems audit objective that pertains to protect computer equipment, programs, communications, and data from unauthorized access, modification, or destruction is known as
overall security. |
||
program development. |
||
program modifications. |
||
processing. |
QUESTION 43. End-user development is inappropriate for which types of systems?
Systems that must be easy to use. |
||
Organizations that have large IT departments. |
||
Systems that process a large number of transactions. |
||
Please give positive ratings so I can keep answering. It would help me a lot. Please comment if you have any query. Thanks! |
Identify the item below that is not a step you could take to prevent yourself from becoming a victim of identity theft. |
Shred all documents that contain your personal information. |
Because shredding all documents that contain your personal information means you are concealing your personal information and not protecting it. |
Information rights management software can do all of the following except |
Authenticate individuals accessing information. |
With regards to an accounting information system, a financial audit is most concerned with |
The system's output. |
Asymmetric key encryption combined with the information provided by a certificate authority allows unique identification of |
Either the user or the provider of encrypted data. |
The information systems audit objective that pertains to protect computer equipment, programs, communications, and data from unauthorized access, modification, or destruction is known as |
Overall security. |
End-user development is inappropriate for which types of systems? |
Systems that process a large number of transactions. |