Exam 4: Internal Controls and Risks in IT Systems
Exam 1: Introduction to AIS113 Questions
Exam 2: Foundational Concepts of the AIS120 Questions
Exam 3: Fraud, Ethics, and Internal Control131 Questions
Exam 4: Internal Controls and Risks in IT Systems164 Questions
Exam 5: IT Governance142 Questions
Exam 6: Erp Systems138 Questions
Exam 7: Auditing Information Technology Bases Processes162 Questions
Exam 8: Revenue and Cash Collection Processes144 Questions
Exam 9: Expenditures Processes and Controls - Purchases128 Questions
Exam 10: Expenditures Processes and Controls Payroll and Fixed Assets137 Questions
Exam 11: Conversion Processes and Controls113 Questions
Exam 12: Administrative Processes and Controls119 Questions
Exam 13: Data and Databases148 Questions
Exam 14: Ecommerce and Ebusiness123 Questions
Select questions type
A company using public cloud computing has the ability to purchase new capacity from the cloud provider, instead of buyer servers or new data storage.This ability is referred to as:
(Multiple Choice)
4.9/5
(34)
The use of the smart card or security tokens is referred to as a two factor authorization because:
(Multiple Choice)
4.8/5
(27)
Controls will help to reduce risks, but it is impossible to completely eliminate risks.
(True/False)
4.8/5
(36)
To increase the effectiveness of login restrictions, user Ids must be unique for each user.
(True/False)
5.0/5
(37)
The user ID and password for a particular user should not allow access to the configuration tables unless that user is authorized to change the configuration settings.
(True/False)
4.9/5
(38)
It is important to understand that the IT governance committee delegates many of its duties by the policies that it develops.
(True/False)
4.9/5
(34)
Many companies use a public cloud computing model for software, data storage or both.Which of the following is an advantage to the public cloud computing model?
(Multiple Choice)
4.9/5
(37)
The paper form used to capture and record the original data of an accounting transaction is called an):
(Multiple Choice)
4.9/5
(39)
Field check, limit check, range check and sequence check are all examples of:
(Multiple Choice)
4.9/5
(39)
This type of input validation check examines a field to ensure that the data entry in the field is valid compared with a preexisting list of acceptable values.
(Multiple Choice)
4.9/5
(39)
A proactive program for considering risks to the business continuation and the development of plans and procedures to reduce those risks is referred to as:
(Multiple Choice)
4.8/5
(32)
Unauthorized access is a concern when an IT system is networked to either internal networks or the Internet.
(True/False)
4.9/5
(26)
Authorized employees may need to access the company IT system from locations outside the organization.These employees should connect to the IT system using this type of network.
(Multiple Choice)
4.7/5
(31)
This type of input check ensures that the batch of transactions is sorted in order, but does not help to find the missing transactions.
(Multiple Choice)
4.9/5
(38)
This form of encryption uses a single encryption key that must be used to encrypt data and also to decode the encrypted data.
(Multiple Choice)
4.9/5
(33)
To verify the accuracy of application software, an organization should be sure the software is tested before it is implemented and must regularly test it after implementation.
(True/False)
4.7/5
(36)
Large-scale IT systems should be protected by physical access controls.Which of the following is not listed as one of those controls?
(Multiple Choice)
4.8/5
(36)
The process of converting data from human readable form to computer readable form is referred to as:
(Multiple Choice)
4.8/5
(41)
Which of the following is NOT one of the types of input controls?
(Multiple Choice)
4.8/5
(37)
Showing 81 - 100 of 164
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)