Exam 4: Internal Controls and Risks in IT Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

This type of control is intended to ensure the accuracy and completeness of processing that occurs in accounting applications:

(Multiple Choice)
4.8/5
(39)

The procedures to collect and prepare source documents are termed:

(Multiple Choice)
4.8/5
(37)

To avoid the risks associated with a public cloud, many companies establish their own computing cloud structure.The cloud is developed, owned, maintained, and used by the user company.This cloud is referred to as:

(Multiple Choice)
4.9/5
(30)

A process or procedure in an IT system to ensure that the person accessing the IT system is valid and authorized is called:

(Multiple Choice)
5.0/5
(42)

Management of an internet retail company is concerned about the possibility of computer data eavesdropping and wiretapping, and wants to maintain the confidentiality of its information as it is transmitted.The company should make use of:

(Multiple Choice)
4.8/5
(39)

A self-replicating piece of program code that can attach itself to other programs and data and perform malicious actions is referred to as a(n):

(Multiple Choice)
4.8/5
(35)

The data preparation procedures are to be well-defined so that employees will be sure of:

(Multiple Choice)
4.8/5
(46)

Which of the following is NOT one of the rules for the effective use of passwords?

(Multiple Choice)
4.9/5
(37)

A proactive program for considering risks to the business continuation and the development of plans and procedures to reduce those risks is referred to as:

(Multiple Choice)
4.7/5
(34)

This type of software should be used to avoid destruction of data programs and to maintain operation of the IT system.It continually scans the system for viruses and worms and either deletes or quarantines them.

(Multiple Choice)
4.8/5
(41)

Two or more computer network or data servers that can run identical processes or maintain the same data are called:

(Multiple Choice)
4.9/5
(35)

An IT governance committee has several responsibilities.Which of the following is least likely to be a responsibility of the IT governance committee?

(Multiple Choice)
4.8/5
(33)

All of the following are general controls except for:

(Multiple Choice)
4.9/5
(34)

This should be established for every authorized user and determines each user's access level to hardware, software, and data according to the individual's job responsibilities.

(Multiple Choice)
4.9/5
(41)

There are a number of reasons that all access to an IT system be logged.Which of the following is not one of the reasons for the log to be maintained?

(Multiple Choice)
4.9/5
(41)

This type of input validation check examines a field to ensure that the data entry in the field is valid compared with a preexisting list of acceptable values.

(Multiple Choice)
4.8/5
(39)

This table contains a list of valid, authorized users and the access level granted to each one.

(Multiple Choice)
4.8/5
(35)

Which programmed input validation makes sure that a value was entered in all of the critical fields?

(Multiple Choice)
4.7/5
(30)

Which of the following is not a general control in an IT system:

(Multiple Choice)
4.9/5
(34)

Unauthorized access to the operating system would allow the unauthorized user to:

(Multiple Choice)
4.8/5
(27)
Showing 41 - 60 of 108
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)