Exam 4: Internal Controls and Risks in IT Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The systematic steps undertaken to plan, prioritize, authorize, oversee, test, and implement large-scale changes to the IT system are called:

(Multiple Choice)
4.8/5
(38)

General controls in IT systems are divided into five broad categories.Which of the following is NOT one of those categories?

(Multiple Choice)
4.9/5
(35)

The longer the encryption key is bits, the more difficult it will be to break the code.

(True/False)
4.9/5
(31)

An extra digit added to a coded identification number, determined by a mathematical algorithm is called a:

(Multiple Choice)
4.8/5
(42)

Once an organization has set up an effective system to prevent unauthorized access to the IT system, it is not necessary to continually monitor the vulnerability of that system.

(True/False)
4.9/5
(32)

Risks associated with public cloud computing include all of the following, except:

(Multiple Choice)
4.8/5
(36)

This type of control is intended to help ensure the accuracy, completeness, and security of outputs that result from application processing:

(Multiple Choice)
4.9/5
(35)

An IT governance committee has several responsibilities.Which of the following is least likely to be a responsibility of the IT governance committee?

(Multiple Choice)
4.8/5
(39)

A database is often less open to unauthorized access than the physical, paper records, because the database has fewer access points.

(True/False)
4.8/5
(35)

Discussing the strength of encryption refers to how difficult it would be to break the code.

(True/False)
4.8/5
(34)

Public and Private cloud computing both have the benefits of reduced infrastructure and reduced costs.

(True/False)
4.9/5
(34)

This type of software should be used to avoid destruction of data programs and to maintain operation of the IT system.It continually scans the system for viruses and worms and either deletes or quarantines them.

(Multiple Choice)
4.8/5
(47)

Encryption is more important for dial-up networks than for wireless networks.

(True/False)
4.9/5
(28)

The software that controls the basic input and output activities of the computer are called:

(Multiple Choice)
4.7/5
(40)

The group of controls referred to as Source Document Controls does not include form design.

(True/False)
4.8/5
(37)

It is important for accountants to consider possible threats to the IT system and to know how to implement controls to try to prevent those threats from becoming reality.

(True/False)
5.0/5
(38)

A group of LANs connected to each other to cover a wider geographic area is called a:

(Multiple Choice)
4.8/5
(41)

It is proper that the database administrator develop and write programs.

(True/False)
4.8/5
(35)

This encryption method, used with wireless network equipment, is symmetric in that both the sending and receiving network nodes must use the same encryption key.It has been proven to be susceptible to hacking.

(Multiple Choice)
4.8/5
(32)

A validity check is an example of an input application control.

(True/False)
4.8/5
(30)
Showing 41 - 60 of 164
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)