Exam 4: Internal Controls and Risks in IT Systems
Exam 1: Introduction to AIS113 Questions
Exam 2: Foundational Concepts of the AIS120 Questions
Exam 3: Fraud, Ethics, and Internal Control131 Questions
Exam 4: Internal Controls and Risks in IT Systems164 Questions
Exam 5: IT Governance142 Questions
Exam 6: Erp Systems138 Questions
Exam 7: Auditing Information Technology Bases Processes162 Questions
Exam 8: Revenue and Cash Collection Processes144 Questions
Exam 9: Expenditures Processes and Controls - Purchases128 Questions
Exam 10: Expenditures Processes and Controls Payroll and Fixed Assets137 Questions
Exam 11: Conversion Processes and Controls113 Questions
Exam 12: Administrative Processes and Controls119 Questions
Exam 13: Data and Databases148 Questions
Exam 14: Ecommerce and Ebusiness123 Questions
Select questions type
General controls apply to the IT accounting system and are not restricted to any particular accounting application.
(True/False)
4.9/5
(34)
A large disk storage for accounting and operating data is referred to as an):
(Multiple Choice)
4.7/5
(40)
General controls are used specifically in accounting applications to control inputs, processing, and outputs.
(True/False)
4.8/5
(31)
The VPN, virtual private network, uses the internet and is therefore not truly private - but is virtually private.
(True/False)
4.9/5
(30)
Internal controls that apply overall to the IT accounting system, that are not restricted to any particular accounting application, are referred to as an):
(Multiple Choice)
4.9/5
(41)
Many companies use a public cloud computing model for storage only.
(True/False)
4.9/5
(35)
Which of the following is NOT one of the rules for the effective use of passwords?
(Multiple Choice)
4.9/5
(42)
Access to the operating system will not allow hackers access to the application software or the database.
(True/False)
4.8/5
(41)
A computer network coving a small geographic area is referred to as a LAN.
(True/False)
4.8/5
(41)
A firewall can prevent the unauthorized flow of data in both directions.
(True/False)
4.7/5
(34)
The process where the details of individual transactions at each stage of the business process can be recreated in order to establish whether proper accounting procedures for the transaction were performed is called:
(Multiple Choice)
5.0/5
(37)
Which of the following URL's would indicate that the site is using browser software that encrypts data transferred to the website?
(Multiple Choice)
4.9/5
(37)
This term relates to making the computer recognize a user in order to create a connection at the beginning of the computer session.
(Multiple Choice)
4.9/5
(31)
The closer the source document matches the input screen, the easier it will be for the data entry employee to complete the input screen without errors.
(True/False)
4.7/5
(38)
Which of the following is not a control intended to authenticate users?
(Multiple Choice)
4.9/5
(35)
The process of converting data into secret codes referred to cipher text is called:
(Multiple Choice)
4.9/5
(44)
This complete records of all dates, times, and uses for each person is referred to as an):
(Multiple Choice)
4.9/5
(31)
Application controls are intended to ensure that inputs and processing are accurate and complete and that outputs are properly distributed, controlled, and disposed.
(True/False)
4.9/5
(38)
The most important factor in controlling IT systems is the maintenance of the vulnerability assessment activities.
(True/False)
4.8/5
(31)
This term means that a user cannot deny any particular act that he or she did on the IT system is referred to as:
(Multiple Choice)
4.9/5
(28)
Showing 121 - 140 of 164
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)