Exam 4: Internal Controls and Risks in IT Systems
Exam 1: Introduction to AIS113 Questions
Exam 2: Foundational Concepts of the AIS120 Questions
Exam 3: Fraud, Ethics, and Internal Control131 Questions
Exam 4: Internal Controls and Risks in IT Systems164 Questions
Exam 5: IT Governance142 Questions
Exam 6: Erp Systems138 Questions
Exam 7: Auditing Information Technology Bases Processes162 Questions
Exam 8: Revenue and Cash Collection Processes144 Questions
Exam 9: Expenditures Processes and Controls - Purchases128 Questions
Exam 10: Expenditures Processes and Controls Payroll and Fixed Assets137 Questions
Exam 11: Conversion Processes and Controls113 Questions
Exam 12: Administrative Processes and Controls119 Questions
Exam 13: Data and Databases148 Questions
Exam 14: Ecommerce and Ebusiness123 Questions
Select questions type
The only risk related to the entry points of telecommuting workers is the interaction risk.
(True/False)
4.8/5
(39)
The form authorization and control includes the requirement that source documents should be prenumbered and are to be used in sequence.
(True/False)
4.9/5
(43)
The company-to-company transfer of standard business documents in electronic form is called:
(Multiple Choice)
4.9/5
(33)
In entering client contact information in the computerized database of a telemarketing business, a clerk erroneously entered nonexistent area codes for a block of new clients.This error rendered the block of contacts useless to the company.Which of the following would most likely have led to discovery of this error into the company's computerized system?
(Multiple Choice)
4.8/5
(35)
Specific software tools that monitor data flow within a network and alert the IT staff to hacking attempts or other unauthorized access attempts is called:
(Multiple Choice)
4.8/5
(35)
The software that accomplishes end user tasks such as work processing, spreadsheets, and accounting functions is called:
(Multiple Choice)
4.8/5
(38)
General controls are divided into five broad categories.Which of the following is not one of these categories?
(Multiple Choice)
4.7/5
(28)
It is necessary to identify the "entry points" in the IT system that make an organization susceptible to IT risks.
(True/False)
4.9/5
(35)
Each organization has to decide which combination of IT controls is most suitable for its IT system, making sure that the benefits of each control outweigh its costs.
(True/False)
4.9/5
(30)
Unauthorized access to the operating system would allow the unauthorized user to:
(Multiple Choice)
4.7/5
(34)
Which of the following items is not one of the source document controls?
(Multiple Choice)
4.8/5
(35)
If a company's IT system fails, it would have little or no effect on the company's operations.
(True/False)
4.9/5
(46)
This form of encryption uses a public key, which is known by everyone, to encrypt data, and a private key, to decode the data.
(Multiple Choice)
4.8/5
(38)
In a wireless network, signals are transmitted through the air rather than over cables.Anyone who wants to gain access to the network would need to know the password to access these "air-borne" signals.
(True/False)
5.0/5
(33)
Scalability, related to public cloud computing, refers to the fact that as a company can easily purchase new capacity from the cloud provider.
(True/False)
4.9/5
(35)
Which of the following is not a good example of an effective password?
(Multiple Choice)
4.8/5
(40)
A self-replicating piece of program code that can attach itself to other programs and data and perform malicious actions is referred to as an):
(Multiple Choice)
4.9/5
(30)
Internal controls that apply overall to the IT system are called:
(Multiple Choice)
4.8/5
(30)
An alternative power supply that provides electrical power in the event that a main source is lost is called:
(Multiple Choice)
4.9/5
(46)
Showing 21 - 40 of 164
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)