ACC 562 EDU Education Terms/acc562edu.com ACC 562 EDU Education Terms/acc562edu.com | Page 9
operating system programs.
Java scripts.
access control programs.
34. The combination of which functions in an information technology
environment are not necessarily a control weakness? (Points: 4)
user and programming functions
database administrator and data input functions
programmers and authorization of changes
users and certain data access
35. Backup controls, used to prevent data and software loss would
include procedures to: (Points: 4)
load balance in the event of heavy traffic across the network.
constantly monitor the network for intrusion and attack.
provide an alternate form of electricity to the corporate facilities.
fail-over to a mirrored storage device in the event of interruption
or loss.
36. Which one of the following is an example of an edit test for limits?
(Points: 4)
Only numbers are allowed to be input into the social security
number field and dashes are pre-formatted.
Each sales order is given an identifier that is also tagged to the
receipt of goods record, the customer invoice record and the cash
receipts record