This control measure is often used to authenticate a system user’s identity and to verify that the message they have sent has not changed in any way.
Blog
Slater Delivery Services is a brand new company, they have j…
Slater Delivery Services is a brand new company, they have just implemented several internal controls. The controller knows that even with these controls in place, there are still bad things that can happen. The risk measured by the company at this point would be known as:
Both partial backup methods in the chapter employ technology…
Both partial backup methods in the chapter employ technology to determine what has changed from a prior backup. Which technique was discussed in the chapter to help determine changes?
Star IS has agreed to purchase some equipment. They have put…
Star IS has agreed to purchase some equipment. They have put aside $20,000 of cash for the equipment and secured financing through the bank. The vendor plans to deliver the equipment next month. For Star IS, the equipment would be represented on their Statement of Financial Position as which of the following:
The controller of a company noticed that the accounts receiv…
The controller of a company noticed that the accounts receivable turnover ratio varied by the time of year. The controller asked an accounts payable clerk to create a report that showed the historical accounts receivable turnover by month. What type of analytic would be computed?
The Sarbanes-Oxley Act of 2002 requires the CEO and CFO to c…
The Sarbanes-Oxley Act of 2002 requires the CEO and CFO to certify two things. 1) That financial statements and disclosures are fairly presented and 2)
Slater calculated that a single day of operations being shut…
Slater calculated that a single day of operations being shut down because of an employee strike would cost his company $32,000. The dollar value cost to the company of this adverse thing impacting the company is called which of the following?
A hacker called the treasurer of Johnson Controls Company an…
A hacker called the treasurer of Johnson Controls Company and said he was with the network security team and that he needed to get into the treasurer’s network account to fix some issues they saw on the network monitoring software. The best preventative measure for this type of attack is which of the following:
An external auditor examines means, standard deviations, max…
An external auditor examines means, standard deviations, maximum values, and minimum values. What data validation technique is the external auditor most likely using?
A message was sent over the internet. The text of the messag…
A message was sent over the internet. The text of the message was in a format known as ciphertext. The only way to get the ciphertext back to plaintext would be through a process of: