Exam 4: Internal Controls and Risks in IT Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

All of the following are General controls except for:

(Multiple Choice)
4.8/5
(32)

The IT system includes this type of table for software, hardware, and application programs that contain the appropriate set-up and security settings.

(Multiple Choice)
4.9/5
(39)

The longest encryption keys are 128 bits.

(True/False)
4.8/5
(34)

It is necessary for an IT system to be networked to an external internet to be open to opportunities for unauthorized access.

(True/False)
4.7/5
(43)

This communication protocol is built into web server and browser software that encrypts data transferred on that website.You can determine if a website uses this technology by looking at the URL.

(Multiple Choice)
4.9/5
(30)

It is not necessary to control the humidity and temperature in the location where the computer system is housed.

(True/False)
4.9/5
(32)

One of the advantages of private cloud computing is expanded access.

(True/False)
4.8/5
(52)

Internal controls used specifically in accounting applications to control inputs, processing, and outputs are referred to as an):

(Multiple Choice)
4.7/5
(35)

Many IT systems do not use source documents; the input is automatic.

(True/False)
4.8/5
(46)

This encryption method requests connection to the network via an access point and that point then requests the use identity and transmits that identity to an authentication server, substantially authenticating the computer and the user.

(Multiple Choice)
4.9/5
(34)

The procedures to collect and prepare source documents are termed:

(Multiple Choice)
4.8/5
(34)

The function of this committee is to govern the overall development and operation of IT systems.

(Multiple Choice)
5.0/5
(35)

This table contains a list of valid, authorized users and the access level granted to each one.

(Multiple Choice)
4.8/5
(38)

This type of control is intended to ensure the accuracy and completeness of processing that occurs in accounting applications:

(Multiple Choice)
4.7/5
(44)

Deciphering renders data useless to those who do not have the correct encryption key.

(True/False)
4.9/5
(40)

This security feature, used on wireless networks, is a password that is passed between the sending and receiving nodes of a wireless network.

(Multiple Choice)
4.8/5
(43)

Two or more computer network or data servers that can run identical processes or maintain the same data are called:

(Multiple Choice)
4.8/5
(37)

All of the following are environmental control issues for physical hardware except for:

(Multiple Choice)
4.9/5
(29)

There are a number of reasons that all access to an IT system be logged.Which of the following is not one of the reasons for the log to be maintained?

(Multiple Choice)
4.9/5
(34)

This type of authentication uses some unique physical characteristic of the user to identify the user and allow the appropriate access to the system.

(Multiple Choice)
4.8/5
(37)
Showing 141 - 160 of 164
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)