Exam 4: Internal Controls and Risks in IT Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Unchecked risks and threats to the IT system could result in:

(Multiple Choice)
4.9/5
(39)

Availability risks, related to the authentication of users would include:

(Multiple Choice)
4.9/5
(41)

A large disk storage for accounting and operating data is referred to as a(n):

(Multiple Choice)
4.8/5
(31)

The systematic steps undertaken to plan, prioritize, authorize, oversee, test, and implement large-scale changes to the IT system are called:

(Multiple Choice)
4.8/5
(43)

The type of network uses tunnels, authentication, and encryption within the Internet network to isolate Internet communications so that unauthorized users cannot access or use certain data.

(Multiple Choice)
4.8/5
(32)

General controls are divided into five broad categories.Which of the following is not one of these categories?

(Multiple Choice)
4.9/5
(45)

A software system that manages the interface between many users and the database is called:

(Multiple Choice)
4.8/5
(51)

Which of the following is NOT one of the types of input controls?

(Multiple Choice)
4.9/5
(35)

A company using public cloud computing has the ability to purchase new capacity from the cloud provider, instead of buyer servers or new data storage.This ability is referred to as:

(Multiple Choice)
4.8/5
(36)

The responsibility of management to safeguard assets and funds entrusted to them by the owners of an organization is referred to as:

(Multiple Choice)
4.9/5
(36)

Field check, limit check, range check and sequence check are all examples of:

(Multiple Choice)
5.0/5
(35)

Companies who provide mobile devices for employees, normally have a policy that allows the company's IT professional to remove company data and applications from the mobile device.This process is referred to as:

(Multiple Choice)
4.7/5
(39)

The process where the details of individual transactions at each stage of the business process can be recreated in order to establish whether proper accounting procedures for the transaction were performed is called:

(Multiple Choice)
4.8/5
(32)

The process of converting data into secret codes referred to cipher text is called:

(Multiple Choice)
4.9/5
(39)

Which of the following is not a good example of an effective password?

(Multiple Choice)
4.8/5
(38)

These controls are intended to prevent, detect, or correct errors that occur during the processing of an application.

(Multiple Choice)
4.8/5
(42)

The risk of an unauthorized user gaining access is likely to be a risk for which of the following areas?

(Multiple Choice)
4.9/5
(30)

Which control total is the total of field values that are added for control purposes, but not added for any other purpose?

(Multiple Choice)
4.9/5
(30)

The functional responsibilities within an IT system must include the proper segregation of duties.Which of the following positions is not one of the duties that is to be segregated from the others?

(Multiple Choice)
4.9/5
(37)

Which of the following items is not one of the source document controls?

(Multiple Choice)
4.9/5
(37)
Showing 81 - 100 of 108
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)