ACC 576 TUTOR Great Stories /acc576tutor.com ACC 576 TUTOR Great Stories /acc576tutor.com | Page 53

59. Which of the following techniques would be used to verify that a program was free of unauthorized changes? 60. An entity has the following sales orders in a batch: Which of the following numbers represents the record count? 61. Mark Chen was recently hired by the Rollins Company at a monthly salary of $1,800. When his employee information was entered into the company's personnel system, his monthly salary amount was entered correctly, but he was inadvertently classified as an hourly employee. Which of the following controls would be most likely to detect this error? 62. A poor quality connection caused extensive line noise, resulting in faulty data transmission. Which of the following controls is most likely to detect this condition? 63. The distribution of reports is considered what type of control? 64. An audit trail is considered what type of control? 65. An auditor was examining a client's network and discovered that the users did not have any password protection. Which of the following would be the best example of the type of network password the users should have? 66. What is the primary objective of data security controls? 67. Which of the following is the strongest password? 68. Problems associated with e-commerce in general include all of the following except 69. Which of the following is not a risk of e-commerce? 70. Which of the following is not a risk of e-commerce? =============================================== ACC 576 Week 10 Quiz (All Possible Questions)