Exam 4: Internal Controls and Risks in IT Systems
Exam 1: Introduction to AIS81 Questions
Exam 2: Foundational Concepts of the AIS117 Questions
Exam 3: Fraud, Ethics, and Internal Control98 Questions
Exam 4: Internal Controls and Risks in IT Systems108 Questions
Exam 5: IT Governance93 Questions
Exam 6: Enterprise Resource Planning ERP Systems71 Questions
Exam 7: Auditing Information Technology-Based Processes108 Questions
Exam 8: Revenue and Cash Collection Processes and Controls104 Questions
Exam 9: Expenditures Processes and Controlspurchases92 Questions
Exam 10: Expenditures Processes and Controlspayroll and Fixed Assets95 Questions
Exam 11: Conversion Processes and Controls105 Questions
Exam 12: Administrative Processes and Controls99 Questions
Exam 13: Data and Databases118 Questions
Exam 14: E-Commerce and E-Business105 Questions
Select questions type
This type of control is intended to ensure the accuracy and completeness of processing that occurs in accounting applications:
(Multiple Choice)
4.8/5
(39)
The procedures to collect and prepare source documents are termed:
(Multiple Choice)
4.8/5
(37)
To avoid the risks associated with a public cloud, many companies establish their own computing cloud structure.The cloud is developed, owned, maintained, and used by the user company.This cloud is referred to as:
(Multiple Choice)
4.9/5
(30)
A process or procedure in an IT system to ensure that the person accessing the IT system is valid and authorized is called:
(Multiple Choice)
5.0/5
(42)
Management of an internet retail company is concerned about the possibility of computer data eavesdropping and wiretapping, and wants to maintain the confidentiality of its information as it is transmitted.The company should make use of:
(Multiple Choice)
4.8/5
(39)
A self-replicating piece of program code that can attach itself to other programs and data and perform malicious actions is referred to as a(n):
(Multiple Choice)
4.8/5
(35)
The data preparation procedures are to be well-defined so that employees will be sure of:
(Multiple Choice)
4.8/5
(46)
Which of the following is NOT one of the rules for the effective use of passwords?
(Multiple Choice)
4.9/5
(37)
A proactive program for considering risks to the business continuation and the development of plans and procedures to reduce those risks is referred to as:
(Multiple Choice)
4.7/5
(34)
This type of software should be used to avoid destruction of data programs and to maintain operation of the IT system.It continually scans the system for viruses and worms and either deletes or quarantines them.
(Multiple Choice)
4.8/5
(41)
Two or more computer network or data servers that can run identical processes or maintain the same data are called:
(Multiple Choice)
4.9/5
(35)
An IT governance committee has several responsibilities.Which of the following is least likely to be a responsibility of the IT governance committee?
(Multiple Choice)
4.8/5
(33)
This should be established for every authorized user and determines each user's access level to hardware, software, and data according to the individual's job responsibilities.
(Multiple Choice)
4.9/5
(41)
There are a number of reasons that all access to an IT system be logged.Which of the following is not one of the reasons for the log to be maintained?
(Multiple Choice)
4.9/5
(41)
This type of input validation check examines a field to ensure that the data entry in the field is valid compared with a preexisting list of acceptable values.
(Multiple Choice)
4.8/5
(39)
This table contains a list of valid, authorized users and the access level granted to each one.
(Multiple Choice)
4.8/5
(35)
Which programmed input validation makes sure that a value was entered in all of the critical fields?
(Multiple Choice)
4.7/5
(30)
Which of the following is not a general control in an IT system:
(Multiple Choice)
4.9/5
(34)
Unauthorized access to the operating system would allow the unauthorized user to:
(Multiple Choice)
4.8/5
(27)
Showing 41 - 60 of 108
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)