Exam 4: Internal Controls and Risks in IT Systems
Exam 1: Introduction to AIS113 Questions
Exam 2: Foundational Concepts of the AIS120 Questions
Exam 3: Fraud, Ethics, and Internal Control131 Questions
Exam 4: Internal Controls and Risks in IT Systems164 Questions
Exam 5: IT Governance142 Questions
Exam 6: Erp Systems138 Questions
Exam 7: Auditing Information Technology Bases Processes162 Questions
Exam 8: Revenue and Cash Collection Processes144 Questions
Exam 9: Expenditures Processes and Controls - Purchases128 Questions
Exam 10: Expenditures Processes and Controls Payroll and Fixed Assets137 Questions
Exam 11: Conversion Processes and Controls113 Questions
Exam 12: Administrative Processes and Controls119 Questions
Exam 13: Data and Databases148 Questions
Exam 14: Ecommerce and Ebusiness123 Questions
Select questions type
A process or procedure in an IT system to ensure that the person accessing the IT system is valid and authorized is called:
Free
(Multiple Choice)
4.9/5
(46)
Correct Answer:
C
It is possible to completely eliminate risks with the proper controls.
Free
(True/False)
4.8/5
(36)
Correct Answer:
False
A computer network covering a small geographic area, which, in most cases, are within a single building or a local group of buildings is called a:
Free
(Multiple Choice)
4.9/5
(44)
Correct Answer:
C
The type of network uses tunnels, authentication, and encryption within the Internet network to isolate Internet communications so that unauthorized users cannot access or use certain data.
(Multiple Choice)
4.8/5
(33)
The data preparation procedures are to be well-defined so that employees will be sure of:
(Multiple Choice)
4.9/5
(37)
If an employee's personal smart phone or tablet is lost or stolen, the company has the right to apply a remote wipe, to remove any company data.
(True/False)
4.7/5
(40)
The use of passwords to allow only authorized users to log into an IT system is an example of a general control.
(True/False)
4.8/5
(30)
Availability risks, related to the authentication of users would include:
(Multiple Choice)
4.8/5
(37)
Unchecked risks and threats to the IT system could result in:
(Multiple Choice)
4.8/5
(34)
This type of control is intended to ensure the accuracy and completeness of data input procedures and the resulting data:
(Multiple Choice)
4.7/5
(40)
An organization must maintain procedures to protect the output from unauthorized access in the form of written guidelines and procedures for output distribution.
(True/False)
4.7/5
(33)
If no source documents are used by the IT system, then the general controls, such as computer logging of transactions, become less important.
(True/False)
4.8/5
(30)
Which programmed input validation check compares the value in a field with related fields which determine whether the value is appropriate?
(Multiple Choice)
4.9/5
(40)
The work arrangement where employees work from home using some type of network connection to the office is referred to as:
(Multiple Choice)
4.8/5
(31)
Employees who hack into computer networks are often more dangerous because of their knowledge of company operations.
(True/False)
4.8/5
(38)
A small piece of program code that attaches to the computer's unused memory space and replicates itself until the system becomes overloaded and shuts down is called:
(Multiple Choice)
4.8/5
(32)
This method of monitoring exposure can involve either manual testing or automated software tools.The method can identify weaknesses before they become network break-ins and attempt to fix these weaknesses before they are exploited.
(Multiple Choice)
4.8/5
(35)
Which control total is the total of field values that are added for control purposes, but not added for any other purpose?
(Multiple Choice)
4.8/5
(41)
Management of an internet retail company is concerned about the possibility of computer data eavesdropping and wiretapping, and wants to maintain the confidentiality of its information as it is transmitted.The company should make use of:
(Multiple Choice)
4.8/5
(44)
Application controls apply to the IT accounting system and are not restricted to any particular accounting application.
(True/False)
4.8/5
(40)
Showing 1 - 20 of 164
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)