Exam 4: Internal Controls and Risks in IT Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The paper form used to capture and record the original data of an accounting transaction is called a(n):

(Multiple Choice)
4.9/5
(29)

This type of input validation check assesses the critical fields in an input screen to make sure that a value is in those fields.

(Multiple Choice)
4.8/5
(46)

The establishment of log-in procedures can help prevent or lessen security risks and are referred to as:

(Multiple Choice)
4.8/5
(42)

This term means that a user cannot deny any particular act that he or she did on the IT system:

(Multiple Choice)
4.9/5
(41)

This form of encryption uses a public key, which is known by everyone, to encrypt data, and a private key, to decode the data.

(Multiple Choice)
4.8/5
(30)

The use of the smart card or security tokens is referred to as a two factor authorization because:

(Multiple Choice)
4.9/5
(41)

This security feature, used on wireless networks, is a password that is passed between the sending and receiving nodes of a wireless network.

(Multiple Choice)
4.8/5
(33)

A company has the following invoices in a batch: Invoice No. Product ID Quantity Unit Price 401 H42 150 \ 30.00 402 K56 200 \ 25.00 403 H42 250 \ 10.00 404 L27 300 \ 5.00 Which of the following numbers represents a valid record count?

(Multiple Choice)
4.9/5
(37)
Showing 101 - 108 of 108
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)