Exam 14: Information Systems and Controls

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

What permissions are granted to a Creator role?

Free
(Essay)
4.8/5
(45)
Correct Answer:
Verified

Someone assigned the role of creator has permission to make changes to the system, create files, download and upload files, and edit files.

Which of the following statements about COBIT 2019 is TRUE?

Free
(Multiple Choice)
5.0/5
(37)
Correct Answer:
Verified

D

Which of the following COBIT 2019 management IT objectives includes topics that would help an organization define compliance with external requirements, performance monitoring, and a system of internal control?

Free
(Multiple Choice)
4.9/5
(28)
Correct Answer:
Verified

D

In what ways do climate control systems protect computer system components in a network operations center (NOC)?

(Multiple Choice)
4.9/5
(40)

An emergency change request bypasses which stage of the change management process?

(Multiple Choice)
4.8/5
(38)

What kind of security method can help prevent against piggybacking?

(Multiple Choice)
4.9/5
(29)

COBIT 2019 controls are organized into five domains that are divided into what two categories based on their objectives?

(Multiple Choice)
4.8/5
(45)

Which of the following backup sites is the most expensive but has the fastest recovery speed?

(Multiple Choice)
4.7/5
(29)

The Cardinal Company is considering a backup site for their organization. Explain to Cardinal management the major differences between a hot and warm backup site.

(Essay)
4.9/5
(35)

Which of the following statements about the COBIT 2019 IT governance domain, Evaluate, Direct and Monitor (EDM) is TRUE?

(Multiple Choice)
4.8/5
(36)

What physical location is used to recover systems and data after a disaster?

(Multiple Choice)
5.0/5
(39)

What elements of IT are IT general controls (ITGCs) designed to protect? Select all that apply.

(Multiple Choice)
4.9/5
(33)

Use what you have learned about how to protect the inside environment of a data center to describe how you would protect the center from fire damage.

(Essay)
4.8/5
(41)

Controlled access to data centers often includes multifactor authentication to mitigate the high risk to the equipment that is powering the business. An increased security measure used at very high security data centers is a man-in-the-middle trap. What kind of risk does the trap prevent?

(Multiple Choice)
4.8/5
(38)

The objectives of which COBIT domain include frameworks, resource optimization, and being transparent with stakeholders?

(Multiple Choice)
4.9/5
(43)

Unauthorized or incorrectly executed changes to a system may result in what kind of risk?

(Multiple Choice)
4.8/5
(30)

What determines when data is being stored during data back?

(Multiple Choice)
4.9/5
(29)

Which user has access to all three change management environments?

(Multiple Choice)
4.9/5
(39)

The Griffin Academy board approved a major change to the method for tuition calculation that will require a system change. A board member calls Julia, a developer in the IT department at Griffin, and requests that she make the change and implement the change immediately. If Jane does as she is told by the board member and does not put the change through the change management process, what kind of risk potential exists for Griffin?

(Multiple Choice)
4.8/5
(35)

Which type of authorization uses groups with pre-defined permissions to which users are assigned?

(Multiple Choice)
4.9/5
(43)
Showing 1 - 20 of 100
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)