Exam 4: Internal Controls and Risks in IT Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The only risk related to the entry points of telecommuting workers is the interaction risk.

(True/False)
4.8/5
(39)

The form authorization and control includes the requirement that source documents should be prenumbered and are to be used in sequence.

(True/False)
4.9/5
(43)

The company-to-company transfer of standard business documents in electronic form is called:

(Multiple Choice)
4.9/5
(33)

In entering client contact information in the computerized database of a telemarketing business, a clerk erroneously entered nonexistent area codes for a block of new clients.This error rendered the block of contacts useless to the company.Which of the following would most likely have led to discovery of this error into the company's computerized system?

(Multiple Choice)
4.8/5
(35)

Specific software tools that monitor data flow within a network and alert the IT staff to hacking attempts or other unauthorized access attempts is called:

(Multiple Choice)
4.8/5
(35)

The software that accomplishes end user tasks such as work processing, spreadsheets, and accounting functions is called:

(Multiple Choice)
4.8/5
(38)

General controls are divided into five broad categories.Which of the following is not one of these categories?

(Multiple Choice)
4.7/5
(28)

It is necessary to identify the "entry points" in the IT system that make an organization susceptible to IT risks.

(True/False)
4.9/5
(35)

Each organization has to decide which combination of IT controls is most suitable for its IT system, making sure that the benefits of each control outweigh its costs.

(True/False)
4.9/5
(30)

Hacking can be prevented by using which of the following?

(Multiple Choice)
4.7/5
(37)

Unauthorized access to the operating system would allow the unauthorized user to:

(Multiple Choice)
4.7/5
(34)

Which of the following items is not one of the source document controls?

(Multiple Choice)
4.8/5
(35)

If a company's IT system fails, it would have little or no effect on the company's operations.

(True/False)
4.9/5
(46)

This form of encryption uses a public key, which is known by everyone, to encrypt data, and a private key, to decode the data.

(Multiple Choice)
4.8/5
(38)

In a wireless network, signals are transmitted through the air rather than over cables.Anyone who wants to gain access to the network would need to know the password to access these "air-borne" signals.

(True/False)
5.0/5
(33)

Scalability, related to public cloud computing, refers to the fact that as a company can easily purchase new capacity from the cloud provider.

(True/False)
4.9/5
(35)

Which of the following is not a good example of an effective password?

(Multiple Choice)
4.8/5
(40)

A self-replicating piece of program code that can attach itself to other programs and data and perform malicious actions is referred to as an):

(Multiple Choice)
4.9/5
(30)

Internal controls that apply overall to the IT system are called:

(Multiple Choice)
4.8/5
(30)

An alternative power supply that provides electrical power in the event that a main source is lost is called:

(Multiple Choice)
4.9/5
(46)
Showing 21 - 40 of 164
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)