Questions from Accounting Information Systems


Q: Explain why an organization should establish and enforce policies for its IT

Explain why an organization should establish and enforce policies for its IT systems in the following areas regarding the use of passwords for log in: a. Length of password b. Use of numbers or symb...

See Answer

Q: The use of smart cards or tokens is called two factor authentication

The use of smart cards or tokens is called two factor authentication. Answer the following questions, assuming that the company you work for uses smart cards or tokens for two factor authentication....

See Answer

Q: Many IT professionals feel that wireless networks pose the highest risks in

Many IT professionals feel that wireless networks pose the highest risks in a company’s network system. Required: a. Why do you think this is true? b. Which general controls can help reduce these r...

See Answer

Q: Control totals include batch totals, hash totals, and record counts

Control totals include batch totals, hash totals, and record counts. Which of these totals would be useful in preventing or detecting IT system input and processing errors or fraud described as follow...

See Answer

Q: Explain how each of the following input validation checks can prevent or

Explain how each of the following input validation checks can prevent or detect errors: a. Field check b. Validity check c. Limit check d. Range check e. Reasonableness check f. Completeness che...

See Answer

Q: The IT governance committee should comprise top level managers. Describe why

The IT governance committee should comprise top level managers. Describe why you think that is important. What problems are likely to arise with regard to IT systems if the top level managers are not...

See Answer

Q: The networks discussed in this chapter were LANs, Internet, intranet

The networks discussed in this chapter were LANs, Internet, intranet, and extranet. Explain each.

See Answer

Q: Using the Internet or other research tool, look up the term

Using the Internet or other research tool, look up the term “penetration testing.” Describe the software tools you find that are intended to achieve penetration testing. Describe the types of systems...

See Answer

Q: Visit the AICPA website at www.aicpa.org. Search

Visit the AICPA website at www.aicpa.org. Search for the terms “WebTrust” and “SysTrust.” Describe these services and the role of Trust Services Principles in these services.

See Answer

Q: Using the Internet or other research tool, look up the terms

Using the Internet or other research tool, look up the terms “disaster recovery,” along with “9/11.” The easiest way to search for both terms together is to type into the search box the following: “di...

See Answer