Exam 4: Internal Controls and Risks in IT Systems
Exam 1: Introduction to AIS81 Questions
Exam 2: Foundational Concepts of the AIS117 Questions
Exam 3: Fraud, Ethics, and Internal Control98 Questions
Exam 4: Internal Controls and Risks in IT Systems108 Questions
Exam 5: IT Governance93 Questions
Exam 6: Enterprise Resource Planning ERP Systems71 Questions
Exam 7: Auditing Information Technology-Based Processes108 Questions
Exam 8: Revenue and Cash Collection Processes and Controls104 Questions
Exam 9: Expenditures Processes and Controlspurchases92 Questions
Exam 10: Expenditures Processes and Controlspayroll and Fixed Assets95 Questions
Exam 11: Conversion Processes and Controls105 Questions
Exam 12: Administrative Processes and Controls99 Questions
Exam 13: Data and Databases118 Questions
Exam 14: E-Commerce and E-Business105 Questions
Select questions type
This type of authentication uses some unique physical characteristic of the user to identify the user and allow the appropriate access to the system.
Free
(Multiple Choice)
5.0/5
(35)
Correct Answer:
B
Which of the following is NOT one of the types of control totals?
Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
A
A computer network covering a small geographic area, which, in most cases, are within a single building or a local group of buildings is called a:
Free
(Multiple Choice)
4.7/5
(40)
Correct Answer:
C
This type of control is intended to ensure the accuracy and completeness of data input procedures and the resulting data:
(Multiple Choice)
4.8/5
(40)
Internal controls over the input, processing, and output of accounting applications are called:
(Multiple Choice)
4.9/5
(32)
Which of the following would normally not be found on the IT Governance Committee?
(Multiple Choice)
4.9/5
(44)
The company-to-company transfer of standard business documents in electronic form is called:
(Multiple Choice)
4.9/5
(36)
The totals of fields that have no apparent logical reason to be added are called:
(Multiple Choice)
4.8/5
(37)
A complete record of all dates, times, and uses for each person is referred to as a(n):
(Multiple Choice)
4.8/5
(37)
An alternative power supply that provides electrical power in the event that a main source is lost is called:
(Multiple Choice)
4.7/5
(37)
The function of this committee is to govern the overall development and operation of IT systems.
(Multiple Choice)
4.7/5
(32)
The work arrangement where employees work from home using some type of network connection to the office is referred to as:
(Multiple Choice)
5.0/5
(33)
Which of the following is not a control intended to authenticate users?
(Multiple Choice)
4.9/5
(36)
Many companies use a public cloud computing model for software, data storage or both.Which of the following is an advantage to the public cloud computing model?
(Multiple Choice)
4.7/5
(31)
General controls in IT systems are divided into five broad categories.Which of the following is NOT one of those categories?
(Multiple Choice)
4.9/5
(36)
Which of the following is not an example of physical characteristics being used in biometric devices?
(Multiple Choice)
4.8/5
(39)
The accuracy, completeness, and timeliness of the process in IT systems is referred to as:
(Multiple Choice)
4.9/5
(38)
The AICPA Trust Services Principles categorizes IT controls and risks into categories.Which of the following is not one of those categories?
(Multiple Choice)
4.7/5
(40)
Showing 1 - 20 of 108
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)