General controls may include firewalls which are used to protect from:
A) erroneous internal handling of data.
B) insufficient documentation of transactions.
C) illogical programming commands.
D) unauthorized external users.
Correct Answer:
Verified
Q63: The embedded audit module approach requires the
Q84: Which of the following best describes the
Q86: An auditor who is testing IT controls
Q88: What tools do companies use to limit
Q93: Which of the following computer-assisted auditing techniques
Q103: Auditors often use Generalized Audit Software during
Q123: When auditing a client who uses a
Q132: A database management system
A) allows clients to
Q141: When the auditor is obtaining an understanding
Q151: Rather than maintain an internal IT center,
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents