Exam 4: Internal Controls and Risks in IT Systems
Exam 1: Introduction to AIS81 Questions
Exam 2: Foundational Concepts of the AIS117 Questions
Exam 3: Fraud, Ethics, and Internal Control98 Questions
Exam 4: Internal Controls and Risks in IT Systems108 Questions
Exam 5: IT Governance93 Questions
Exam 6: Enterprise Resource Planning ERP Systems71 Questions
Exam 7: Auditing Information Technology-Based Processes108 Questions
Exam 8: Revenue and Cash Collection Processes and Controls104 Questions
Exam 9: Expenditures Processes and Controlspurchases92 Questions
Exam 10: Expenditures Processes and Controlspayroll and Fixed Assets95 Questions
Exam 11: Conversion Processes and Controls105 Questions
Exam 12: Administrative Processes and Controls99 Questions
Exam 13: Data and Databases118 Questions
Exam 14: E-Commerce and E-Business105 Questions
Select questions type
This type of control is intended to help ensure the accuracy, completeness, and security of outputs that result from application processing:
(Multiple Choice)
4.7/5
(42)
An extra digit added to a coded identification number, determined by a mathematical algorithm is called a:
(Multiple Choice)
4.8/5
(31)
The process of legitimately attempting to hack into an IT system to find whether weaknesses can be exploited by unauthorized hackers is referred to as:
(Multiple Choice)
4.8/5
(44)
The process of converting data from human readable form to computer readable form is referred to as:
(Multiple Choice)
4.7/5
(35)
A small piece of program code that attaches to the computer's unused memory space and replicates itself until the system becomes overloaded and shuts down is called:
(Multiple Choice)
4.8/5
(35)
Authorized employees may need to access the company IT system from locations outside the organization.These employees should connect to the IT system using this type of network.
(Multiple Choice)
4.9/5
(36)
A group of LANs connected to each other to cover a wider geographic area is called a:
(Multiple Choice)
4.9/5
(50)
A battery to maintain power in the event of a power outage meant to keep the computer running for several minutes after the power outage is an example of a(n):
(Multiple Choice)
4.8/5
(35)
This method of monitoring exposure can involve either manual testing or automated software tools.The method can identify weaknesses before they become network break-ins and attempt to fix these weaknesses before they are exploited.
(Multiple Choice)
4.8/5
(36)
This item, that strengthens the use of passwords, is plugged into the computer's card reader and helps authenticate that the use is valid; it has an integrated circuit that displays a constantly changing ID code.These statement describe:
(Multiple Choice)
4.9/5
(42)
Hardware, software, or a combination of both that is designed to block unauthorized access to an IT system is called:
(Multiple Choice)
4.8/5
(45)
This encryption method requests connection to the network via an access point and that point then requests the use identity and transmits that identity to an authentication server, substantially authenticating the computer and the user.
(Multiple Choice)
4.9/5
(33)
Many IT systems have redundant data storage such that two or more disks are exact mirror images.This is accomplished by the use of:
(Multiple Choice)
4.8/5
(30)
Internal controls used specifically in accounting applications to control inputs, processing, and outputs are referred to as a(n):
(Multiple Choice)
4.8/5
(29)
Specific software tools that monitor data flow within a network and alert the IT staff to hacking attempts or other unauthorized access attempts is called:
(Multiple Choice)
4.9/5
(27)
Internal controls that apply overall to the IT system are called:
(Multiple Choice)
4.9/5
(30)
All of the following are environmental control issues for physical hardware except for:
(Multiple Choice)
4.7/5
(35)
This term relates to making the computer recognize a user in order to create a connection at the beginning of the computer session.
(Multiple Choice)
4.8/5
(26)
This communication protocol is built into web server and browser software that encrypts data transferred on that website.You can determine if a website uses this technology by looking at the URL.
(Multiple Choice)
4.9/5
(38)
Internal controls that apply overall to the IT accounting system, that are not restricted to any particular accounting application, are referred to as a(n):
(Multiple Choice)
4.8/5
(42)
Showing 61 - 80 of 108
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)