100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

ACCT 351 EXAM 5 CHAP 14-18 STUDY QUESTIONS AND ANSWERS

Rating
-
Sold
-
Pages
20
Grade
A+
Uploaded on
05-11-2025
Written in
2025/2026

What is the most widely used international standard for IT governance? a. ISACA b. COSO ERM c. COBIT d. COSO Internal Control—Integrated Framework c. COBIT Select the statement that is not true about COBIT 2019. a. Its organizational focus is IT governance. b. It focuses on all controls for assessing risk and providing assurance throughout an organization. c. It is a living document that welcomes feedback. d. It has five domains and 40 control objectives. b. It focuses on all controls for assessing risk and providing assurance throughout an organization. Which item is not an objective of the IT Evaluate, Direct, and Monitor domain? a. Ensure IT governance framework setting and maintenance. b. Ensure IT risk realization. c. Ensure stakeholder transparency. d. Manage an IT system of internal control. d. Manage an IT system of internal control. One important purpose of COBIT is to a. guide managers, users, and auditors in adopting best practices related to the management of information technology. b. identify specific control plans that could be implemented to reduce the occurrence of fraud. c. specify the components of an information system that should be installed in an e-commerce environment. d. suggest the type of information that should be made available for management decision making. a. guide managers, users, and auditors in adopting best practices related to the management of information technology. Which of these logical access controls relates to authorization rather than authentication? a. Role-based access b. Username and password c. Fingerprint scan d. Smart card a. Role-based access Which of these access roles would you assign to the internal audit manager of a public company? a. Administration b. Creator c. Read-only d. Manager c. read-only Eleanor Rigby's Crematorium and Pet Custodian Services wants to choose the strongest control method for accessing its systems. Eleanor should choose a. a sign-in log. b. biometrics. c. passwords. d. a two-way mirror. b. biometrics. When a client's accounts payable computer system was relocated, the administrator provided support through a dial-up connection to a server. Subsequently, the administrator left the company. No changes were made to the accounts payable system at that time. Which of the following situations represents the greatest security risk? a. User passwords are not required to be in alphanumeric format.

Show more Read less










Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
November 5, 2025
Number of pages
20
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

  • acct 351 exam 5
  • acct 351

Content preview

ACCT 351



ACCT 351 EXAM 5 CHAP 14-18 STUDY
QUESTIONS AND ANSWERS 2025-2026
What is the most widely used international standard for IT governance?
a. ISACA
b. COSO ERM
c. COBIT
d. COSO Internal Control—Integrated Framework
c. COBIT
Select the statement that is not true about COBIT 2019.
a. Its organizational focus is IT governance.
b. It focuses on all controls for assessing risk and providing assurance throughout
an organization.
c. It is a living document that welcomes feedback.
d. It has five domains and 40 control objectives.
b. It focuses on all controls for assessing risk and providing assurance throughout
an organization.
Which item is not an objective of the IT Evaluate, Direct, and Monitor domain?
a. Ensure IT governance framework setting and maintenance.
b. Ensure IT risk realization.
c. Ensure stakeholder transparency.
d. Manage an IT system of internal control.
d. Manage an IT system of internal control.
One important purpose of COBIT is to
a. guide managers, users, and auditors in adopting best practices related to the
management of information technology.
b. identify specific control plans that could be implemented to reduce the
occurrence of fraud.
c. specify the components of an information system that should be installed in an e-
commerce environment.



ACCT 351

,ACCT 351


d. suggest the type of information that should be made available for management
decision making.
a. guide managers, users, and auditors in adopting best practices related to the
management of information technology.
Which of these logical access controls relates to authorization rather than
authentication?
a. Role-based access
b. Username and password
c. Fingerprint scan
d. Smart card
a. Role-based access
Which of these access roles would you assign to the internal audit manager of a
public company?
a. Administration
b. Creator
c. Read-only
d. Manager
c. read-only
Eleanor Rigby's Crematorium and Pet Custodian Services wants to choose the
strongest control method for accessing its systems. Eleanor should choose
a. a sign-in log.
b. biometrics.
c. passwords.
d. a two-way mirror.
b. biometrics.
When a client's accounts payable computer system was relocated, the administrator
provided support through a dial-up connection to a server. Subsequently, the
administrator left the company. No changes were made to the accounts payable
system at that time. Which of the following situations represents the greatest
security risk?
a. User passwords are not required to be in alphanumeric format.


ACCT 351

, ACCT 351


b. Management procedures for user accounts are not documented.
c. User accounts are not removed upon termination of employees.
d. Security logs are not periodically reviewed for violations.
c. User accounts are not removed upon termination of employees.
Why did Amazon and Google choose to not build their new data centers near their
headquarters?
a. It wasn't financially feasible.
b. They already owned land elsewhere.
c. It was against regulations.
d. They plan to leave those areas and relocate their headquarters.
a. It wasn't financially feasible.
A security guard opens the door to allow an authenticated person into the data
center. A second person enters behind the first person without properly scanning
through security. This method of circumventing physical access controls is called
a. piggybacking, or tailgating.
b. the access control vestibule.
c. a backup plan.
d. unlawful access.
a. piggybacking, or tailgating.
Which of the following best characterizes the function of a physical access
control?
a. Protects systems from Trojan horses
b. Provides authentication of users attempting to log into the system
c. Separates unauthorized individuals from computer resources
d. Minimizes the risk of a power or hardware failure
c. Separates unauthorized individuals from computer resources
The inside environment of a data center should include all the following except
a. cable management system.
b. backup power supply.
c. fire response systems.
d. heated floors.


ACCT 351

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
PossibleA Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
988
Member since
4 year
Number of followers
650
Documents
12741
Last sold
6 days ago
POSSIBLEA QUALITY UPDATED EXAMS

Choose quality study materials for nursing schools to ensure success in your studies and future career. "Welcome to PossibleA - your perfect study assistant! Here you will find Quality sheets, study materials, exams, quizzes, tests, and notes to prepare for exams and study successfully. Our store offers a wide selection of materials on various subjects and difficulty levels, created by experienced teachers and checked for quality. Our quality sheets are an easy and quick way to remember key points and definitions. And our study materials, tests, and quizzes will help you absorb the material and prepare for exams. Our store also has notes and lecture summaries that will help you save time and make the learning process more efficient.

Read more Read less
3.9

141 reviews

5
74
4
25
3
20
2
1
1
21

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions