ACC 576 TUTOR Great Stories /acc576tutor.com ACC 576 TUTOR Great Stories /acc576tutor.com | Page 53
59. Which of the following techniques would be used to verify that
a program was free of unauthorized changes?
60. An entity has the following sales orders in a batch: Which of
the following numbers represents the record count?
61. Mark Chen was recently hired by the Rollins Company at a
monthly salary of $1,800. When his employee information was
entered into the company's personnel system, his monthly salary
amount was entered correctly, but he was inadvertently classified as
an hourly employee. Which of the following controls would be most
likely to detect this error?
62. A poor quality connection caused extensive line noise, resulting
in faulty data transmission. Which of the following controls is most
likely to detect this condition?
63. The distribution of reports is considered what type of control?
64. An audit trail is considered what type of control?
65. An auditor was examining a client's network and discovered
that the users did not have any password protection. Which of the
following would be the best example of the type of network password
the users should have?
66. What is the primary objective of data security controls?
67. Which of the following is the strongest password?
68. Problems associated with e-commerce in general include all of
the following except
69. Which of the following is not a risk of e-commerce?
70. Which of the following is not a risk of e-commerce?
===============================================
ACC 576 Week 10 Quiz (All Possible Questions)