The internal auditor is reviewing a new policy on electronic mail. Appropriate elements of such a policy would include all of the following EXCEPT:
a. Erasing all employee's electronic mail immediately upon employment termination.
b. Encrypting electronic mail messages when transmitted over phone lines.
c. Limiting the number of electronic mail packages adopted by the organization.
d. Directing that personnel do not send highly sensitive or confidential messages using electronic mail.
Answer: a.
Learn More :
CPA Module 41
- Which of the following is a computer test made to ascertain whether a given characteristic belongs to the group?
- Which of the following input controls is a numeric value computed to provide assurance that the original value has NOT been altered in construction or transmission?
- Which of the following MOST likely represents a hash total?
- Preventing someone with sufficient technical skill from circumventing security procedures and making changes to production programs is BEST accomplished by
- Minimizing the likelihood of unauthorized editing of production programs, job control language, and operating system software can BEST be accomplished by
- Output controls ensure that the results of computer processing are accurate, complete, and properly distributed which of the following is NOT a typical output control?
- Almost all commercially marketed software is
- A company is concerned that a power outage or disaster could impair the computer hardware's ability to function as designed. The company desires off-site backup hardware facilities that are fully configured and ready to operate within several hours. The company MOST likely should consider a
- Which of the following is not one of the five principles of COBIT 5?
- Many of the Web 2.0 applications rely on an XML-based application that facilitates the sharing and syndication of web content, by subscription, which of the applications below represents this XML application?
- Securing client/server system is a complex task because of all of the following factors EXCEPT:
- In traditional information systems, computer operators are generally responsible for backing up software and data files on a regular basis. In distributed or cooperative systems, ensuring that adequate backups are taken is the responsibility of
- Which of the following risks is NOT greater in an electronic funds transfer (EFT) environment than in a manual system using paper transactions?
- In a computerized system, procedure or problem-oriented language is converted to machine language through a(n)
- Where disk files are used, the grandfather-father-son updating backup concept is relatively difficult to implement because the
- Several language interfaces exist in a database management system. These typically include a data definition language (DDL), a data control language (DCL), a data manipulation language (DML), and a database query language (DQL). What language interface would a database administrator use to establish the structure of database tables?
- The 2nd generation programming language that is generally specific to a computer architecture (i.e., it is not portable) is
- Another term for cloud-based storage is
- Analysis of data in a database using tools which look for trends or anomalies without knowledge in advance of the meaning of the data is referred to as
- Which computer application is most frequently used to analyzes numbers and financial information?
- Which of the following system implementation models has the advantage of achieving a full operational test of the new system before it is implemented?
- Samco Inc. is in the process of designing a new customer relations system. In which phase of the development life-cycle would a need assessment MOST likely be performed?
- The systems Development Life Cycle (SDLC) is the traditional methodology for developing information systems. In which phase of the SDLC would the activity of identifying the problem(s) that need to be solved MOST likely occur?
- An "office suite" of software is LEAST likely to include a(n)
- For the accounting system of Acme Company, the amounts of cash disbursements entered into a terminal are transmitted to the computer that immediately transmits the amounts back to the terminal for display on the terminal screen. This display enables the operator to