Exam 4: Internal Controls and Risks in IT Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

This type of control is intended to help ensure the accuracy, completeness, and security of outputs that result from application processing:

(Multiple Choice)
4.7/5
(42)

An extra digit added to a coded identification number, determined by a mathematical algorithm is called a:

(Multiple Choice)
4.8/5
(31)

The process of legitimately attempting to hack into an IT system to find whether weaknesses can be exploited by unauthorized hackers is referred to as:

(Multiple Choice)
4.8/5
(44)

The process of converting data from human readable form to computer readable form is referred to as:

(Multiple Choice)
4.7/5
(35)

A small piece of program code that attaches to the computer's unused memory space and replicates itself until the system becomes overloaded and shuts down is called:

(Multiple Choice)
4.8/5
(35)

Authorized employees may need to access the company IT system from locations outside the organization.These employees should connect to the IT system using this type of network.

(Multiple Choice)
4.9/5
(36)

A group of LANs connected to each other to cover a wider geographic area is called a:

(Multiple Choice)
4.9/5
(50)

A battery to maintain power in the event of a power outage meant to keep the computer running for several minutes after the power outage is an example of a(n):

(Multiple Choice)
4.8/5
(35)

This method of monitoring exposure can involve either manual testing or automated software tools.The method can identify weaknesses before they become network break-ins and attempt to fix these weaknesses before they are exploited.

(Multiple Choice)
4.8/5
(36)

This item, that strengthens the use of passwords, is plugged into the computer's card reader and helps authenticate that the use is valid; it has an integrated circuit that displays a constantly changing ID code.These statement describe:

(Multiple Choice)
4.9/5
(42)

Hardware, software, or a combination of both that is designed to block unauthorized access to an IT system is called:

(Multiple Choice)
4.8/5
(45)

This encryption method requests connection to the network via an access point and that point then requests the use identity and transmits that identity to an authentication server, substantially authenticating the computer and the user.

(Multiple Choice)
4.9/5
(33)

Many IT systems have redundant data storage such that two or more disks are exact mirror images.This is accomplished by the use of:

(Multiple Choice)
4.8/5
(30)

Internal controls used specifically in accounting applications to control inputs, processing, and outputs are referred to as a(n):

(Multiple Choice)
4.8/5
(29)

Specific software tools that monitor data flow within a network and alert the IT staff to hacking attempts or other unauthorized access attempts is called:

(Multiple Choice)
4.9/5
(27)

Internal controls that apply overall to the IT system are called:

(Multiple Choice)
4.9/5
(30)

All of the following are environmental control issues for physical hardware except for:

(Multiple Choice)
4.7/5
(35)

This term relates to making the computer recognize a user in order to create a connection at the beginning of the computer session.

(Multiple Choice)
4.8/5
(26)

This communication protocol is built into web server and browser software that encrypts data transferred on that website.You can determine if a website uses this technology by looking at the URL.

(Multiple Choice)
4.9/5
(38)

Internal controls that apply overall to the IT accounting system, that are not restricted to any particular accounting application, are referred to as a(n):

(Multiple Choice)
4.8/5
(42)
Showing 61 - 80 of 108
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)