Exam 4: Internal Controls and Risks in IT Systems
Exam 1: Introduction to AIS81 Questions
Exam 2: Foundational Concepts of the AIS117 Questions
Exam 3: Fraud, Ethics, and Internal Control98 Questions
Exam 4: Internal Controls and Risks in IT Systems108 Questions
Exam 5: IT Governance93 Questions
Exam 6: Enterprise Resource Planning ERP Systems71 Questions
Exam 7: Auditing Information Technology-Based Processes108 Questions
Exam 8: Revenue and Cash Collection Processes and Controls104 Questions
Exam 9: Expenditures Processes and Controlspurchases92 Questions
Exam 10: Expenditures Processes and Controlspayroll and Fixed Assets95 Questions
Exam 11: Conversion Processes and Controls105 Questions
Exam 12: Administrative Processes and Controls99 Questions
Exam 13: Data and Databases118 Questions
Exam 14: E-Commerce and E-Business105 Questions
Select questions type
Unchecked risks and threats to the IT system could result in:
(Multiple Choice)
4.9/5
(39)
Availability risks, related to the authentication of users would include:
(Multiple Choice)
4.9/5
(41)
A large disk storage for accounting and operating data is referred to as a(n):
(Multiple Choice)
4.8/5
(31)
The systematic steps undertaken to plan, prioritize, authorize, oversee, test, and implement large-scale changes to the IT system are called:
(Multiple Choice)
4.8/5
(43)
The type of network uses tunnels, authentication, and encryption within the Internet network to isolate Internet communications so that unauthorized users cannot access or use certain data.
(Multiple Choice)
4.8/5
(32)
General controls are divided into five broad categories.Which of the following is not one of these categories?
(Multiple Choice)
4.9/5
(45)
A software system that manages the interface between many users and the database is called:
(Multiple Choice)
4.8/5
(51)
Which of the following is NOT one of the types of input controls?
(Multiple Choice)
4.9/5
(35)
A company using public cloud computing has the ability to purchase new capacity from the cloud provider, instead of buyer servers or new data storage.This ability is referred to as:
(Multiple Choice)
4.8/5
(36)
The responsibility of management to safeguard assets and funds entrusted to them by the owners of an organization is referred to as:
(Multiple Choice)
4.9/5
(36)
Field check, limit check, range check and sequence check are all examples of:
(Multiple Choice)
5.0/5
(35)
Companies who provide mobile devices for employees, normally have a policy that allows the company's IT professional to remove company data and applications from the mobile device.This process is referred to as:
(Multiple Choice)
4.7/5
(39)
The process where the details of individual transactions at each stage of the business process can be recreated in order to establish whether proper accounting procedures for the transaction were performed is called:
(Multiple Choice)
4.8/5
(32)
The process of converting data into secret codes referred to cipher text is called:
(Multiple Choice)
4.9/5
(39)
Which of the following is not a good example of an effective password?
(Multiple Choice)
4.8/5
(38)
These controls are intended to prevent, detect, or correct errors that occur during the processing of an application.
(Multiple Choice)
4.8/5
(42)
The risk of an unauthorized user gaining access is likely to be a risk for which of the following areas?
(Multiple Choice)
4.9/5
(30)
Which control total is the total of field values that are added for control purposes, but not added for any other purpose?
(Multiple Choice)
4.9/5
(30)
The functional responsibilities within an IT system must include the proper segregation of duties.Which of the following positions is not one of the duties that is to be segregated from the others?
(Multiple Choice)
4.9/5
(37)
Which of the following items is not one of the source document controls?
(Multiple Choice)
4.9/5
(37)
Showing 81 - 100 of 108
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)