Exam 14: Information Systems and Controls
Exam 1: Accounting As Information98 Questions
Exam 2: Risks and Risk Assessments100 Questions
Exam 3: Risk Management and Internal Controls100 Questions
Exam 4: Software and Systems106 Questions
Exam 5: Data Storage and Analysis98 Questions
Exam 6: Systems and Database Design98 Questions
Exam 7: Emerging and Disruptive Technologies100 Questions
Exam 8: Documenting Systems and Processes100 Questions
Exam 9: Human Resources and Payroll Processes100 Questions
Exam 10: Purchasing and Payments Process100 Questions
Exam 11: Conversion Processes100 Questions
Exam 12: Marketing, Sales, and Collection Processes100 Questions
Exam 13: Financial Reporting Processes103 Questions
Exam 14: Information Systems and Controls100 Questions
Exam 15: Fraud100 Questions
Exam 16: Cybersecurity99 Questions
Exam 17: Data Analytics99 Questions
Exam 18: Data Visualization100 Questions
Exam 19: Audit Assurance86 Questions
Select questions type
What permissions are granted to a Creator role?
Free
(Essay)
4.8/5
(45)
Correct Answer:
Someone assigned the role of creator has permission to make changes to the system, create files, download and upload files, and edit files.
Which of the following statements about COBIT 2019 is TRUE?
Free
(Multiple Choice)
5.0/5
(37)
Correct Answer:
D
Which of the following COBIT 2019 management IT objectives includes topics that would help an organization define compliance with external requirements, performance monitoring, and a system of internal control?
Free
(Multiple Choice)
4.9/5
(28)
Correct Answer:
D
In what ways do climate control systems protect computer system components in a network operations center (NOC)?
(Multiple Choice)
4.9/5
(40)
An emergency change request bypasses which stage of the change management process?
(Multiple Choice)
4.8/5
(38)
What kind of security method can help prevent against piggybacking?
(Multiple Choice)
4.9/5
(29)
COBIT 2019 controls are organized into five domains that are divided into what two categories based on their objectives?
(Multiple Choice)
4.8/5
(45)
Which of the following backup sites is the most expensive but has the fastest recovery speed?
(Multiple Choice)
4.7/5
(29)
The Cardinal Company is considering a backup site for their organization. Explain to Cardinal management the major differences between a hot and warm backup site.
(Essay)
4.9/5
(35)
Which of the following statements about the COBIT 2019 IT governance domain, Evaluate, Direct and Monitor (EDM) is TRUE?
(Multiple Choice)
4.8/5
(36)
What physical location is used to recover systems and data after a disaster?
(Multiple Choice)
5.0/5
(39)
What elements of IT are IT general controls (ITGCs) designed to protect? Select all that apply.
(Multiple Choice)
4.9/5
(33)
Use what you have learned about how to protect the inside environment of a data center to describe how you would protect the center from fire damage.
(Essay)
4.8/5
(41)
Controlled access to data centers often includes multifactor authentication to mitigate the high risk to the equipment that is powering the business. An increased security measure used at very high security data centers is a man-in-the-middle trap. What kind of risk does the trap prevent?
(Multiple Choice)
4.8/5
(38)
The objectives of which COBIT domain include frameworks, resource optimization, and being transparent with stakeholders?
(Multiple Choice)
4.9/5
(43)
Unauthorized or incorrectly executed changes to a system may result in what kind of risk?
(Multiple Choice)
4.8/5
(30)
What determines when data is being stored during data back?
(Multiple Choice)
4.9/5
(29)
Which user has access to all three change management environments?
(Multiple Choice)
4.9/5
(39)
The Griffin Academy board approved a major change to the method for tuition calculation that will require a system change. A board member calls Julia, a developer in the IT department at Griffin, and requests that she make the change and implement the change immediately. If Jane does as she is told by the board member and does not put the change through the change management process, what kind of risk potential exists for Griffin?
(Multiple Choice)
4.8/5
(35)
Which type of authorization uses groups with pre-defined permissions to which users are assigned?
(Multiple Choice)
4.9/5
(43)
Showing 1 - 20 of 100
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)