Exam 4: Internal Controls and Risks in IT Systems
Exam 1: Introduction to AIS113 Questions
Exam 2: Foundational Concepts of the AIS120 Questions
Exam 3: Fraud, Ethics, and Internal Control131 Questions
Exam 4: Internal Controls and Risks in IT Systems164 Questions
Exam 5: IT Governance142 Questions
Exam 6: Erp Systems138 Questions
Exam 7: Auditing Information Technology Bases Processes162 Questions
Exam 8: Revenue and Cash Collection Processes144 Questions
Exam 9: Expenditures Processes and Controls - Purchases128 Questions
Exam 10: Expenditures Processes and Controls Payroll and Fixed Assets137 Questions
Exam 11: Conversion Processes and Controls113 Questions
Exam 12: Administrative Processes and Controls119 Questions
Exam 13: Data and Databases148 Questions
Exam 14: Ecommerce and Ebusiness123 Questions
Select questions type
The systematic steps undertaken to plan, prioritize, authorize, oversee, test, and implement large-scale changes to the IT system are called:
(Multiple Choice)
4.8/5
(38)
General controls in IT systems are divided into five broad categories.Which of the following is NOT one of those categories?
(Multiple Choice)
4.9/5
(35)
The longer the encryption key is bits, the more difficult it will be to break the code.
(True/False)
4.9/5
(31)
An extra digit added to a coded identification number, determined by a mathematical algorithm is called a:
(Multiple Choice)
4.8/5
(42)
Once an organization has set up an effective system to prevent unauthorized access to the IT system, it is not necessary to continually monitor the vulnerability of that system.
(True/False)
4.9/5
(32)
Risks associated with public cloud computing include all of the following, except:
(Multiple Choice)
4.8/5
(36)
This type of control is intended to help ensure the accuracy, completeness, and security of outputs that result from application processing:
(Multiple Choice)
4.9/5
(35)
An IT governance committee has several responsibilities.Which of the following is least likely to be a responsibility of the IT governance committee?
(Multiple Choice)
4.8/5
(39)
A database is often less open to unauthorized access than the physical, paper records, because the database has fewer access points.
(True/False)
4.8/5
(35)
Discussing the strength of encryption refers to how difficult it would be to break the code.
(True/False)
4.8/5
(34)
Public and Private cloud computing both have the benefits of reduced infrastructure and reduced costs.
(True/False)
4.9/5
(34)
This type of software should be used to avoid destruction of data programs and to maintain operation of the IT system.It continually scans the system for viruses and worms and either deletes or quarantines them.
(Multiple Choice)
4.8/5
(47)
Encryption is more important for dial-up networks than for wireless networks.
(True/False)
4.9/5
(28)
The software that controls the basic input and output activities of the computer are called:
(Multiple Choice)
4.7/5
(40)
The group of controls referred to as Source Document Controls does not include form design.
(True/False)
4.8/5
(37)
It is important for accountants to consider possible threats to the IT system and to know how to implement controls to try to prevent those threats from becoming reality.
(True/False)
5.0/5
(38)
A group of LANs connected to each other to cover a wider geographic area is called a:
(Multiple Choice)
4.8/5
(41)
It is proper that the database administrator develop and write programs.
(True/False)
4.8/5
(35)
This encryption method, used with wireless network equipment, is symmetric in that both the sending and receiving network nodes must use the same encryption key.It has been proven to be susceptible to hacking.
(Multiple Choice)
4.8/5
(32)
Showing 41 - 60 of 164
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)