Exam 4: Internal Controls and Risks in IT Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The IT Governance Committee has several important responsibilities.Which of the following is not normally one of those responsibilities?

(Multiple Choice)
4.8/5
(33)

Using a unique service set identifier SSID) makes it more difficult for an outsider to access the wireless network.

(True/False)
4.7/5
(35)

Disaster recovery planning is a proactive plan to protect IT systems and the related data.

(True/False)
4.7/5
(35)

The establishment of log-in procedures can help prevent or lessen security risks and are referred to as:

(Multiple Choice)
4.7/5
(39)

With the proper training of employees and the adequate controls, it would be possible to eliminate all errors.

(True/False)
4.9/5
(45)

The use of dual firewalls - one between the internet and the web server and one between the web server and the organization's network - can help prevent unauthorized from accessing the organization's internal network of computers.

(True/False)
4.8/5
(35)

The process of proactively examining the IT system for weaknesses that can be exploited by hackers, viruses, or malicious employees is called:

(Multiple Choice)
4.8/5
(34)

Which of the following is NOT one of the types of control totals?

(Multiple Choice)
4.9/5
(34)

In order to master risks and controls and how they fit together, which of the following is NOT one of the areas to fully understand?

(Multiple Choice)
4.8/5
(39)

The functional responsibilities within an IT system must include the proper segregation of duties.Which of the following positions is not one of the duties that is to be segregated from the others?

(Multiple Choice)
4.8/5
(30)

This item, that strengthens the use of passwords, is plugged into the computer's card reader and helps authenticate that the use is valid; it has an integrated circuit that displays a constantly changing ID code.These statement describe:

(Multiple Choice)
5.0/5
(38)

The risk that an unauthorized user would shut down systems within the IT system is an):

(Multiple Choice)
4.7/5
(48)

Which of the following is not an example of physical characteristics being used in biometric devices?

(Multiple Choice)
4.8/5
(34)

Examples of Business Continuity include all of the following except:

(Multiple Choice)
4.8/5
(34)

A new technology that is used to authenticate users is one that plugs into the USB port and eliminates the need for a card reader.This item is called a:

(Multiple Choice)
4.7/5
(31)

Hardware, software, or a combination of both that is designed to block unauthorized access to an IT system is called:

(Multiple Choice)
4.9/5
(43)

The AICPA Trust Services Principles categorizes IT controls and risks into categories.Which of the following is not one of those categories?

(Multiple Choice)
4.9/5
(48)

In a properly segregated IT system, no single person or department should develop computer programs and also have access to data that is commensurate with operations personnel.

(True/False)
4.8/5
(35)

Nonrepudiation means that:

(Multiple Choice)
4.8/5
(34)

The accuracy, completeness, and timeliness of the process in IT systems is referred to as:

(Multiple Choice)
4.8/5
(38)
Showing 101 - 120 of 164
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)