Exam 4: Internal Controls and Risks in IT Systems
Exam 1: Introduction to AIS113 Questions
Exam 2: Foundational Concepts of the AIS120 Questions
Exam 3: Fraud, Ethics, and Internal Control131 Questions
Exam 4: Internal Controls and Risks in IT Systems164 Questions
Exam 5: IT Governance142 Questions
Exam 6: Erp Systems138 Questions
Exam 7: Auditing Information Technology Bases Processes162 Questions
Exam 8: Revenue and Cash Collection Processes144 Questions
Exam 9: Expenditures Processes and Controls - Purchases128 Questions
Exam 10: Expenditures Processes and Controls Payroll and Fixed Assets137 Questions
Exam 11: Conversion Processes and Controls113 Questions
Exam 12: Administrative Processes and Controls119 Questions
Exam 13: Data and Databases148 Questions
Exam 14: Ecommerce and Ebusiness123 Questions
Select questions type
The IT system includes this type of table for software, hardware, and application programs that contain the appropriate set-up and security settings.
(Multiple Choice)
4.9/5
(39)
It is necessary for an IT system to be networked to an external internet to be open to opportunities for unauthorized access.
(True/False)
4.7/5
(43)
This communication protocol is built into web server and browser software that encrypts data transferred on that website.You can determine if a website uses this technology by looking at the URL.
(Multiple Choice)
4.9/5
(30)
It is not necessary to control the humidity and temperature in the location where the computer system is housed.
(True/False)
4.9/5
(32)
One of the advantages of private cloud computing is expanded access.
(True/False)
4.8/5
(52)
Internal controls used specifically in accounting applications to control inputs, processing, and outputs are referred to as an):
(Multiple Choice)
4.7/5
(35)
Many IT systems do not use source documents; the input is automatic.
(True/False)
4.8/5
(46)
This encryption method requests connection to the network via an access point and that point then requests the use identity and transmits that identity to an authentication server, substantially authenticating the computer and the user.
(Multiple Choice)
4.9/5
(34)
The procedures to collect and prepare source documents are termed:
(Multiple Choice)
4.8/5
(34)
The function of this committee is to govern the overall development and operation of IT systems.
(Multiple Choice)
5.0/5
(35)
This table contains a list of valid, authorized users and the access level granted to each one.
(Multiple Choice)
4.8/5
(38)
This type of control is intended to ensure the accuracy and completeness of processing that occurs in accounting applications:
(Multiple Choice)
4.7/5
(44)
Deciphering renders data useless to those who do not have the correct encryption key.
(True/False)
4.9/5
(40)
This security feature, used on wireless networks, is a password that is passed between the sending and receiving nodes of a wireless network.
(Multiple Choice)
4.8/5
(43)
Two or more computer network or data servers that can run identical processes or maintain the same data are called:
(Multiple Choice)
4.8/5
(37)
All of the following are environmental control issues for physical hardware except for:
(Multiple Choice)
4.9/5
(29)
There are a number of reasons that all access to an IT system be logged.Which of the following is not one of the reasons for the log to be maintained?
(Multiple Choice)
4.9/5
(34)
This type of authentication uses some unique physical characteristic of the user to identify the user and allow the appropriate access to the system.
(Multiple Choice)
4.8/5
(37)
Showing 141 - 160 of 164
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)