Exam 4: Internal Controls and Risks in IT Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

This type of input validation check assesses the critical fields in an input screen to make sure that a value is in those fields.

(Multiple Choice)
4.8/5
(42)

There are a number of methods described that are intended to limit log-ins exclusively to authorized users.The only method that is foolproof is the biometric devices.

(True/False)
4.9/5
(40)

The risk of an unauthorized user gaining access is likely to be a risk for which of the following areas?

(Multiple Choice)
4.9/5
(39)

The responsibility of management to safeguard assets and funds entrusted to them by the owners of an organization is referred to as:

(Multiple Choice)
4.9/5
(43)

It is necessary for students and accountants to understand the types of threats that may affect an accounting system, so that the threats can be avoided.

(True/False)
4.9/5
(30)

AICPA Trust Principles describe five categories of IT risks and controls.Which of these five categories would be described by the statement, "The system is protected against unauthorized access"?

(Multiple Choice)
4.7/5
(31)

Biometric devises use unique physical characteristics to identify users.The most common method used is retina scans.

(True/False)
4.9/5
(38)

Which programmed input validation check determines whether the appropriate type of data, either alphabetic or numeric, was entered?

(Multiple Choice)
4.9/5
(41)

Which programmed input validation makes sure that a value was entered in all of the critical fields?

(Multiple Choice)
4.9/5
(46)

A software system that manages the interface between many users and the database is called:

(Multiple Choice)
4.7/5
(42)

To the extent possible, IT systems should be installed in locations away from any location likely to be affected by natural disasters.

(True/False)
4.7/5
(40)

The most popular type of type of unauthorized access is probably by a person known to the organization.

(True/False)
4.8/5
(44)

The workstations and the network cabling and connections represent spots were an intruder could tap into the network for unauthorized access.

(True/False)
4.7/5
(35)

The use of passwords to allow only authorized users to log into an IT system is an example of an application control.

(True/False)
4.9/5
(45)

One of the sources of risk exposure related to telecommuting workers is that the company's network equipment and cabling becomes an entry point for hackers and unauthorized users.

(True/False)
4.8/5
(53)

To avoid the risks associated with a public cloud, many companies establish their own computing cloud structure.The cloud is developed, owned, maintained, and used by the user company.This cloud is referred to as:

(Multiple Choice)
4.8/5
(41)

This should be established for every authorized user and determines each user's access level to hardware, software, and data according to the individual's job responsibilities.

(Multiple Choice)
4.9/5
(43)

Telecommuting workers cause two sources of risk exposures for their organizations - the network equipment and cabling in addition to the teleworker's computer - with only "entry-point" being teleworker's computer.

(True/False)
4.8/5
(43)

Companies who provide mobile devices for employees, normally has a policy that allows the company's IT professional to remove company data and applications from the mobile device.This process is referred to as:

(Multiple Choice)
4.9/5
(34)

To increase the effectiveness of login restrictions, passwords must be unique for each user.

(True/False)
5.0/5
(39)
Showing 61 - 80 of 164
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)