Question 1
Describe three threats in the general ledger and reporting system and identify corresponding controls for each threat.
Question 2
Identify one way "rainbow tables" are often used.
◦ To discover plaintext passwords associated with a hash.
◦ To integrate different tables into one, master table.
◦ To perform a zero-balance check.
◦ To ensure referential integrity of all the associated tables.