Exam 4: Internal Controls and Risks in IT Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A company using public cloud computing has the ability to purchase new capacity from the cloud provider, instead of buyer servers or new data storage.This ability is referred to as:

(Multiple Choice)
4.9/5
(34)

The use of the smart card or security tokens is referred to as a two factor authorization because:

(Multiple Choice)
4.8/5
(27)

General controls for an IT system include:

(Multiple Choice)
4.9/5
(37)

Controls will help to reduce risks, but it is impossible to completely eliminate risks.

(True/False)
4.8/5
(36)

To increase the effectiveness of login restrictions, user Ids must be unique for each user.

(True/False)
5.0/5
(37)

The user ID and password for a particular user should not allow access to the configuration tables unless that user is authorized to change the configuration settings.

(True/False)
4.9/5
(38)

It is important to understand that the IT governance committee delegates many of its duties by the policies that it develops.

(True/False)
4.9/5
(34)

Many companies use a public cloud computing model for software, data storage or both.Which of the following is an advantage to the public cloud computing model?

(Multiple Choice)
4.9/5
(37)

The paper form used to capture and record the original data of an accounting transaction is called an):

(Multiple Choice)
4.9/5
(39)

Field check, limit check, range check and sequence check are all examples of:

(Multiple Choice)
4.9/5
(39)

This type of input validation check examines a field to ensure that the data entry in the field is valid compared with a preexisting list of acceptable values.

(Multiple Choice)
4.9/5
(39)

A proactive program for considering risks to the business continuation and the development of plans and procedures to reduce those risks is referred to as:

(Multiple Choice)
4.8/5
(32)

Unauthorized access is a concern when an IT system is networked to either internal networks or the Internet.

(True/False)
4.9/5
(26)

Authorized employees may need to access the company IT system from locations outside the organization.These employees should connect to the IT system using this type of network.

(Multiple Choice)
4.7/5
(31)

This type of input check ensures that the batch of transactions is sorted in order, but does not help to find the missing transactions.

(Multiple Choice)
4.9/5
(38)

This form of encryption uses a single encryption key that must be used to encrypt data and also to decode the encrypted data.

(Multiple Choice)
4.9/5
(33)

To verify the accuracy of application software, an organization should be sure the software is tested before it is implemented and must regularly test it after implementation.

(True/False)
4.7/5
(36)

Large-scale IT systems should be protected by physical access controls.Which of the following is not listed as one of those controls?

(Multiple Choice)
4.8/5
(36)

The process of converting data from human readable form to computer readable form is referred to as:

(Multiple Choice)
4.8/5
(41)

Which of the following is NOT one of the types of input controls?

(Multiple Choice)
4.8/5
(37)
Showing 81 - 100 of 164
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)