Exam 4: Internal Controls and Risks in IT Systems
Exam 1: Introduction to AIS113 Questions
Exam 2: Foundational Concepts of the AIS120 Questions
Exam 3: Fraud, Ethics, and Internal Control131 Questions
Exam 4: Internal Controls and Risks in IT Systems164 Questions
Exam 5: IT Governance142 Questions
Exam 6: Erp Systems138 Questions
Exam 7: Auditing Information Technology Bases Processes162 Questions
Exam 8: Revenue and Cash Collection Processes144 Questions
Exam 9: Expenditures Processes and Controls - Purchases128 Questions
Exam 10: Expenditures Processes and Controls Payroll and Fixed Assets137 Questions
Exam 11: Conversion Processes and Controls113 Questions
Exam 12: Administrative Processes and Controls119 Questions
Exam 13: Data and Databases148 Questions
Exam 14: Ecommerce and Ebusiness123 Questions
Select questions type
The IT Governance Committee has several important responsibilities.Which of the following is not normally one of those responsibilities?
(Multiple Choice)
4.8/5
(33)
Using a unique service set identifier SSID) makes it more difficult for an outsider to access the wireless network.
(True/False)
4.7/5
(35)
Disaster recovery planning is a proactive plan to protect IT systems and the related data.
(True/False)
4.7/5
(35)
The establishment of log-in procedures can help prevent or lessen security risks and are referred to as:
(Multiple Choice)
4.7/5
(39)
With the proper training of employees and the adequate controls, it would be possible to eliminate all errors.
(True/False)
4.9/5
(45)
The use of dual firewalls - one between the internet and the web server and one between the web server and the organization's network - can help prevent unauthorized from accessing the organization's internal network of computers.
(True/False)
4.8/5
(35)
The process of proactively examining the IT system for weaknesses that can be exploited by hackers, viruses, or malicious employees is called:
(Multiple Choice)
4.8/5
(34)
Which of the following is NOT one of the types of control totals?
(Multiple Choice)
4.9/5
(34)
In order to master risks and controls and how they fit together, which of the following is NOT one of the areas to fully understand?
(Multiple Choice)
4.8/5
(39)
The functional responsibilities within an IT system must include the proper segregation of duties.Which of the following positions is not one of the duties that is to be segregated from the others?
(Multiple Choice)
4.8/5
(30)
This item, that strengthens the use of passwords, is plugged into the computer's card reader and helps authenticate that the use is valid; it has an integrated circuit that displays a constantly changing ID code.These statement describe:
(Multiple Choice)
5.0/5
(38)
The risk that an unauthorized user would shut down systems within the IT system is an):
(Multiple Choice)
4.7/5
(48)
Which of the following is not an example of physical characteristics being used in biometric devices?
(Multiple Choice)
4.8/5
(34)
Examples of Business Continuity include all of the following except:
(Multiple Choice)
4.8/5
(34)
A new technology that is used to authenticate users is one that plugs into the USB port and eliminates the need for a card reader.This item is called a:
(Multiple Choice)
4.7/5
(31)
Hardware, software, or a combination of both that is designed to block unauthorized access to an IT system is called:
(Multiple Choice)
4.9/5
(43)
The AICPA Trust Services Principles categorizes IT controls and risks into categories.Which of the following is not one of those categories?
(Multiple Choice)
4.9/5
(48)
In a properly segregated IT system, no single person or department should develop computer programs and also have access to data that is commensurate with operations personnel.
(True/False)
4.8/5
(35)
The accuracy, completeness, and timeliness of the process in IT systems is referred to as:
(Multiple Choice)
4.8/5
(38)
Showing 101 - 120 of 164
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)