Question 44 For each scenario on the left, identify the most appropriate.preventive.control that best mitigates the internal control issue The accounts payable clerk was able to get information on customers and their balances A hacker used a program to guess the email password of the CEO of a large multinational comparty An employee of a company clicked on a link in an email and downloaded a virus shutting down their computer. A small CPA firm uses one main server and it sits underneath the secretary's desk. A "potential client" came in and while the secretary left their desk to go back to the office, they installed a key logger onto the server. A magnetic tape used to store data backups was lost while it was being transported to an offsite storage location. The data on the tape includes customers' credit card and personal information. A payroll director embezzled $500,000 by adding fictitious names to the company's payroll and [Choose [Choose] Employee Awareness Training Backup and Recovery Procedures Authentication controls Penetration Testing Encryption Authorization controls Physical Access Controls Log Analysis Segregation of duties Intrusion Detection Systems [Choose
Question 44 For each scenario on the left, identify the most appropriate.preventive.control that best mitigates the internal control issue The accounts payable clerk was able to get information on customers and their balances A hacker used a program to guess the email password of the CEO of a large multinational comparty An employee of a company clicked on a link in an email and downloaded a virus shutting down their computer. A small CPA firm uses one main server and it sits underneath the secretary's desk. A "potential client" came in and while the secretary left their desk to go back to the office, they installed a key logger onto the server. A magnetic tape used to store data backups was lost while it was being transported to an offsite storage location. The data on the tape includes customers' credit card and personal information. A payroll director embezzled $500,000 by adding fictitious names to the company's payroll and [Choose [Choose] Employee Awareness Training Backup and Recovery Procedures Authentication controls Penetration Testing Encryption Authorization controls Physical Access Controls Log Analysis Segregation of duties Intrusion Detection Systems [Choose
Accounting Information Systems
10th Edition
ISBN:9781337619202
Author:Hall, James A.
Publisher:Hall, James A.
Chapter12: Electronic Commerce Systems
Section: Chapter Questions
Problem 3MCQ
Related questions
Question
A
Expert Solution
This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
This is a popular solution!
Trending now
This is a popular solution!
Step by step
Solved in 2 steps
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, accounting and related others by exploring similar questions and additional content below.Recommended textbooks for you
Accounting Information Systems
Accounting
ISBN:
9781337619202
Author:
Hall, James A.
Publisher:
Cengage Learning,
Pkg Acc Infor Systems MS VISIO CD
Finance
ISBN:
9781133935940
Author:
Ulric J. Gelinas
Publisher:
CENGAGE L
Principles of Accounting Volume 1
Accounting
ISBN:
9781947172685
Author:
OpenStax
Publisher:
OpenStax College
Accounting Information Systems
Accounting
ISBN:
9781337619202
Author:
Hall, James A.
Publisher:
Cengage Learning,
Pkg Acc Infor Systems MS VISIO CD
Finance
ISBN:
9781133935940
Author:
Ulric J. Gelinas
Publisher:
CENGAGE L
Principles of Accounting Volume 1
Accounting
ISBN:
9781947172685
Author:
OpenStax
Publisher:
OpenStax College