Exam 4: Internal Controls and Risks in IT Systems
Exam 1: Introduction to AIS113 Questions
Exam 2: Foundational Concepts of the AIS120 Questions
Exam 3: Fraud, Ethics, and Internal Control131 Questions
Exam 4: Internal Controls and Risks in IT Systems164 Questions
Exam 5: IT Governance142 Questions
Exam 6: Erp Systems138 Questions
Exam 7: Auditing Information Technology Bases Processes162 Questions
Exam 8: Revenue and Cash Collection Processes144 Questions
Exam 9: Expenditures Processes and Controls - Purchases128 Questions
Exam 10: Expenditures Processes and Controls Payroll and Fixed Assets137 Questions
Exam 11: Conversion Processes and Controls113 Questions
Exam 12: Administrative Processes and Controls119 Questions
Exam 13: Data and Databases148 Questions
Exam 14: Ecommerce and Ebusiness123 Questions
Select questions type
This type of input validation check assesses the critical fields in an input screen to make sure that a value is in those fields.
(Multiple Choice)
4.8/5
(42)
There are a number of methods described that are intended to limit log-ins exclusively to authorized users.The only method that is foolproof is the biometric devices.
(True/False)
4.9/5
(40)
The risk of an unauthorized user gaining access is likely to be a risk for which of the following areas?
(Multiple Choice)
4.9/5
(39)
The responsibility of management to safeguard assets and funds entrusted to them by the owners of an organization is referred to as:
(Multiple Choice)
4.9/5
(43)
It is necessary for students and accountants to understand the types of threats that may affect an accounting system, so that the threats can be avoided.
(True/False)
4.9/5
(30)
AICPA Trust Principles describe five categories of IT risks and controls.Which of these five categories would be described by the statement, "The system is protected against unauthorized access"?
(Multiple Choice)
4.7/5
(31)
Biometric devises use unique physical characteristics to identify users.The most common method used is retina scans.
(True/False)
4.9/5
(38)
Which programmed input validation check determines whether the appropriate type of data, either alphabetic or numeric, was entered?
(Multiple Choice)
4.9/5
(41)
Which programmed input validation makes sure that a value was entered in all of the critical fields?
(Multiple Choice)
4.9/5
(46)
A software system that manages the interface between many users and the database is called:
(Multiple Choice)
4.7/5
(42)
To the extent possible, IT systems should be installed in locations away from any location likely to be affected by natural disasters.
(True/False)
4.7/5
(40)
The most popular type of type of unauthorized access is probably by a person known to the organization.
(True/False)
4.8/5
(44)
The workstations and the network cabling and connections represent spots were an intruder could tap into the network for unauthorized access.
(True/False)
4.7/5
(35)
The use of passwords to allow only authorized users to log into an IT system is an example of an application control.
(True/False)
4.9/5
(45)
One of the sources of risk exposure related to telecommuting workers is that the company's network equipment and cabling becomes an entry point for hackers and unauthorized users.
(True/False)
4.8/5
(53)
To avoid the risks associated with a public cloud, many companies establish their own computing cloud structure.The cloud is developed, owned, maintained, and used by the user company.This cloud is referred to as:
(Multiple Choice)
4.8/5
(41)
This should be established for every authorized user and determines each user's access level to hardware, software, and data according to the individual's job responsibilities.
(Multiple Choice)
4.9/5
(43)
Telecommuting workers cause two sources of risk exposures for their organizations - the network equipment and cabling in addition to the teleworker's computer - with only "entry-point" being teleworker's computer.
(True/False)
4.8/5
(43)
Companies who provide mobile devices for employees, normally has a policy that allows the company's IT professional to remove company data and applications from the mobile device.This process is referred to as:
(Multiple Choice)
4.9/5
(34)
To increase the effectiveness of login restrictions, passwords must be unique for each user.
(True/False)
5.0/5
(39)
Showing 61 - 80 of 164
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)