54817510-Hall-5e-TB-Ch16-1

54817510-Hall-5e-TB-Ch16-1 - Chapter 16IT Controls Part II:...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Chapter 16—IT Controls Part II: Security and Access TRUE/FALSE 1. In a computerized environment, the audit trail log must be printed onto paper documents. ANS: F 2. Disguising message packets to look as if they came from another user and to gain access to the host’s network is called spooling. ANS: F 3. Access controls take on increased importance in a computerized environment because all of the records may be found in one place. ANS: T 4. Computer viruses usually spread throughout the system before being detected. ANS: T 5. A worm is software program that replicates itself in areas of idle memory until the system fails. ANS: T 6. Viruses rarely attach themselves to executable files. ANS: F 7. Subschemas are used to authorize user access privileges to specific data elements. ANS: F 8. A recovery module suspends all data processing while the system reconciles its journal files against the database. ANS: F
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 2

54817510-Hall-5e-TB-Ch16-1 - Chapter 16IT Controls Part II:...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online