Question 44 For each scenario on the left, identify the most appropriate.preventive.control that best mitigates the internal control issue The accounts payable clerk was able to get information on customers and their balances A hacker used a program to guess the email password of the CEO of a large multinational comparty An employee of a company clicked on a link in an email and downloaded a virus shutting down their computer. A small CPA firm uses one main server and it sits underneath the secretary's desk. A "potential client" came in and while the secretary left their desk to go back to the office, they installed a key logger onto the server. A magnetic tape used to store data backups was lost while it was being transported to an offsite storage location. The data on the tape includes customers' credit card and personal information. A payroll director embezzled $500,000 by adding fictitious names to the company's payroll and [Choose [Choose] Employee Awareness Training Backup and Recovery Procedures Authentication controls Penetration Testing Encryption Authorization controls Physical Access Controls Log Analysis Segregation of duties Intrusion Detection Systems [Choose

Accounting Information Systems
10th Edition
ISBN:9781337619202
Author:Hall, James A.
Publisher:Hall, James A.
Chapter12: Electronic Commerce Systems
Section: Chapter Questions
Problem 3MCQ
icon
Related questions
Question
A
0
Question 44
For each scenario on the left, identify the most appropriate.preventive control that best mitigates the internal
control issue
The accounts payable clerk was able to get
information on customers and their balances,
A hacker used a program to guess the email
password of the CEO of a large multinational
company
An employee of a company clicked on a link in an
email and downloaded a virus shutting down their
computer.
A small CPA firm uses one main server and it sits
underneath the secretary's desk. A "potential
client" came in and while the secretary left their
desk to go back to the office, they installed a key
logger onto the server.
A magnetic tape used to store data backups was
lost while it was being transported to an offsite
storage location. The data on the tape includes
customers' credit card and personal information.
A payroll director embezzled $500,000 by adding
fictitious names to the company's payroll and
cashing the checks that were mailed to the
addresses on file.
[Choose
[Choose ]
Employee Awareness Training
Backup and Recovery Procedures
Authentication controls
Penetration Testing
Encryption
Authorization controls
Physical Access Controls
Log Analysis
Segregation of duties
Intrusion Detection Systems
[Choose
Transcribed Image Text:0 Question 44 For each scenario on the left, identify the most appropriate.preventive control that best mitigates the internal control issue The accounts payable clerk was able to get information on customers and their balances, A hacker used a program to guess the email password of the CEO of a large multinational company An employee of a company clicked on a link in an email and downloaded a virus shutting down their computer. A small CPA firm uses one main server and it sits underneath the secretary's desk. A "potential client" came in and while the secretary left their desk to go back to the office, they installed a key logger onto the server. A magnetic tape used to store data backups was lost while it was being transported to an offsite storage location. The data on the tape includes customers' credit card and personal information. A payroll director embezzled $500,000 by adding fictitious names to the company's payroll and cashing the checks that were mailed to the addresses on file. [Choose [Choose ] Employee Awareness Training Backup and Recovery Procedures Authentication controls Penetration Testing Encryption Authorization controls Physical Access Controls Log Analysis Segregation of duties Intrusion Detection Systems [Choose
Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Frauds in Accounting information system (AIS)
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, accounting and related others by exploring similar questions and additional content below.
Similar questions
Recommended textbooks for you
Accounting Information Systems
Accounting Information Systems
Accounting
ISBN:
9781337619202
Author:
Hall, James A.
Publisher:
Cengage Learning,
Pkg Acc Infor Systems MS VISIO CD
Pkg Acc Infor Systems MS VISIO CD
Finance
ISBN:
9781133935940
Author:
Ulric J. Gelinas
Publisher:
CENGAGE L
Principles of Accounting Volume 1
Principles of Accounting Volume 1
Accounting
ISBN:
9781947172685
Author:
OpenStax
Publisher:
OpenStax College