Exam 4: Internal Controls and Risks in IT Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

This type of authentication uses some unique physical characteristic of the user to identify the user and allow the appropriate access to the system.

Free
(Multiple Choice)
5.0/5
(35)
Correct Answer:
Verified

B

Which of the following is NOT one of the types of control totals?

Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
Verified

A

A computer network covering a small geographic area, which, in most cases, are within a single building or a local group of buildings is called a:

Free
(Multiple Choice)
4.7/5
(40)
Correct Answer:
Verified

C

General controls for an IT system include:

(Multiple Choice)
4.8/5
(42)

This type of control is intended to ensure the accuracy and completeness of data input procedures and the resulting data:

(Multiple Choice)
4.8/5
(40)

Internal controls over the input, processing, and output of accounting applications are called:

(Multiple Choice)
4.9/5
(32)

Which of the following would normally not be found on the IT Governance Committee?

(Multiple Choice)
4.9/5
(44)

The company-to-company transfer of standard business documents in electronic form is called:

(Multiple Choice)
4.9/5
(36)

The totals of fields that have no apparent logical reason to be added are called:

(Multiple Choice)
4.8/5
(37)

A complete record of all dates, times, and uses for each person is referred to as a(n):

(Multiple Choice)
4.8/5
(37)

An alternative power supply that provides electrical power in the event that a main source is lost is called:

(Multiple Choice)
4.7/5
(37)

The function of this committee is to govern the overall development and operation of IT systems.

(Multiple Choice)
4.7/5
(32)

The work arrangement where employees work from home using some type of network connection to the office is referred to as:

(Multiple Choice)
5.0/5
(33)

A primary objective of output controls would be:

(Multiple Choice)
4.7/5
(39)

Which of the following is not a control intended to authenticate users?

(Multiple Choice)
4.9/5
(36)

Many companies use a public cloud computing model for software, data storage or both.Which of the following is an advantage to the public cloud computing model?

(Multiple Choice)
4.7/5
(31)

General controls in IT systems are divided into five broad categories.Which of the following is NOT one of those categories?

(Multiple Choice)
4.9/5
(36)

Which of the following is not an example of physical characteristics being used in biometric devices?

(Multiple Choice)
4.8/5
(39)

The accuracy, completeness, and timeliness of the process in IT systems is referred to as:

(Multiple Choice)
4.9/5
(38)

The AICPA Trust Services Principles categorizes IT controls and risks into categories.Which of the following is not one of those categories?

(Multiple Choice)
4.7/5
(40)
Showing 1 - 20 of 108
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)