Exam 14: Information Systems and Controls
Exam 1: Accounting As Information98 Questions
Exam 2: Risks and Risk Assessments100 Questions
Exam 3: Risk Management and Internal Controls100 Questions
Exam 4: Software and Systems106 Questions
Exam 5: Data Storage and Analysis98 Questions
Exam 6: Systems and Database Design98 Questions
Exam 7: Emerging and Disruptive Technologies100 Questions
Exam 8: Documenting Systems and Processes100 Questions
Exam 9: Human Resources and Payroll Processes100 Questions
Exam 10: Purchasing and Payments Process100 Questions
Exam 11: Conversion Processes100 Questions
Exam 12: Marketing, Sales, and Collection Processes100 Questions
Exam 13: Financial Reporting Processes103 Questions
Exam 14: Information Systems and Controls100 Questions
Exam 15: Fraud100 Questions
Exam 16: Cybersecurity99 Questions
Exam 17: Data Analytics99 Questions
Exam 18: Data Visualization100 Questions
Exam 19: Audit Assurance86 Questions
Select questions type
Which of the following change management steps occurs in the test environment?
(Multiple Choice)
4.8/5
(36)
Joel has developed new code and implemented it into the model environment so that the user can test it to see if it works as required. What stage in the change management process is Joel preparing for?
(Multiple Choice)
4.9/5
(44)
Which of these access roles would you assign an internal auditor reviewing accounts payable and accounts receivable transactions?
(Multiple Choice)
4.9/5
(31)
Caribbean Technologies is located on the island of Grand Cayman in the Caribbean SeA. The management team established a data center both onsite and offsite in Ohio. What onsite protection measures would you recommend be implemented?
(Multiple Choice)
4.8/5
(39)
User access de-provisioning should occur when which of the following user access status changes occur? Choose all that apply.
(Multiple Choice)
4.9/5
(37)
Which of the following change management steps occurs in the production environment?
(Multiple Choice)
4.9/5
(34)
What role should be assigned to a new team member who needs access to make changes to the system, create files, download and upload files, and edit files.
(Multiple Choice)
4.9/5
(41)
What is the most widely used international standard for IT governance?
(Multiple Choice)
5.0/5
(36)
In what way do the three change management environment stages work together to prevent a change being accidentally implemented?
(Multiple Choice)
4.8/5
(34)
Data centers should be situated in a room with no windows to prevent
(Multiple Choice)
4.9/5
(40)
Moore Software Development (MSD), Inc. began operations in Moore, Oklahoma, an area prone to tornadoes. Recent business growth necessitates the need for a larger data center. Select the most appropriate statement associated with MSD's new data center.
(Multiple Choice)
4.7/5
(35)
What statement about the functionality of a cold backup site is FALSE?
(Multiple Choice)
4.9/5
(42)
Accounting professionals utilize multiple frameworks. Which framework would a manager select to make sure that all internal controls are Sarbanes Oxley compliant?
(Multiple Choice)
4.9/5
(34)
Which of the following COBIT 2019 management IT objectives includes topics that would help an organization manage operations, problems, continuity, and business process controls?
(Multiple Choice)
4.7/5
(40)
What user access role includes permission to add, remove, and set access rights on all objects?
(Multiple Choice)
4.9/5
(35)
How does a man-in-the middle trap create another level of security?
(Multiple Choice)
4.7/5
(39)
A formal change management process includes multiple environments to reduce risk. A formal change must go through the environments in what order?
(Multiple Choice)
4.8/5
(42)
Which of the following statements concerning user access reviews is TRUE?
(Multiple Choice)
4.8/5
(35)
Showing 41 - 60 of 100
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)