Exam 14: Information Systems and Controls
Exam 1: Accounting As Information98 Questions
Exam 2: Risks and Risk Assessments100 Questions
Exam 3: Risk Management and Internal Controls100 Questions
Exam 4: Software and Systems106 Questions
Exam 5: Data Storage and Analysis98 Questions
Exam 6: Systems and Database Design98 Questions
Exam 7: Emerging and Disruptive Technologies100 Questions
Exam 8: Documenting Systems and Processes100 Questions
Exam 9: Human Resources and Payroll Processes100 Questions
Exam 10: Purchasing and Payments Process100 Questions
Exam 11: Conversion Processes100 Questions
Exam 12: Marketing, Sales, and Collection Processes100 Questions
Exam 13: Financial Reporting Processes103 Questions
Exam 14: Information Systems and Controls100 Questions
Exam 15: Fraud100 Questions
Exam 16: Cybersecurity99 Questions
Exam 17: Data Analytics99 Questions
Exam 18: Data Visualization100 Questions
Exam 19: Audit Assurance86 Questions
Select questions type
Which of the following backup sites is the least expensive but has the slowest recovery speed?
(Multiple Choice)
4.9/5
(40)
Which of the following roles have control ownership related to protecting the physical computer systems?
(Multiple Choice)
4.7/5
(48)
Which development environment is often referred to as the sandbox because developers can test without having impact on the live systems?
(Multiple Choice)
4.8/5
(35)
Alejandro reviewed the user access protocols for Ponder Products. Alejandro is concerned that the accounting system could be subject to malicious attacks on user accounts that are currently protected with a user name and password. The system has the capability to send a message to a user's cell phone or email address. How could Alejandro use the messaging capabilities of the system to further protect it from attack?
(Multiple Choice)
4.7/5
(36)
In which change management environment does a developer write code to make the change in the system?
(Multiple Choice)
4.9/5
(37)
Which statement concerning the disaster response Recovery Time Objective (RTO) is TRUE?
(Multiple Choice)
4.8/5
(39)
Which of the following statements concerning IT governance are TRUE?
(Multiple Choice)
4.9/5
(42)
What kind of facility is used to protect the physical components on which systems and data are stored?
(Multiple Choice)
4.9/5
(31)
Which statements concerning Business Continuity Planning (BCP) are TRUE? Select all statements that are TRUE.
(Multiple Choice)
4.9/5
(41)
Adrian evaluated Branch Technologies user access assignment procedures and found them to be inefficient. Rather than assign each user permissions individually, Adrian recommends that Branch Technologies define roles with pre-defined access criteria and assign users to roles. What type of authorization is Adrian recommending?
(Multiple Choice)
4.9/5
(36)
An internal auditor inspecting a data center will look at all the following components.
(Multiple Choice)
4.8/5
(34)
Which role in the change management process tests the functionality of the code submitted to the model environment and documents the results of the test?
(Multiple Choice)
4.9/5
(43)
When disaster strikes, what two metrics concerning system and data restoration are important to consider?
(Multiple Choice)
4.9/5
(37)
The CEO of All-Farm Insurance asked you to verify that organization data is fully backed up each weekend and that all new data is backed up daily. On the daily backups, the CEO requests that all new data since the full backup is stored. What type of backup strategy should you choose?
(Multiple Choice)
4.7/5
(44)
Which of the stages of the formal change management process includes a recent copy of the production environment where tests are performed?
(Multiple Choice)
5.0/5
(40)
Which of the following are physical security measures used to prevent unauthorized access to a data center?
(Multiple Choice)
4.8/5
(40)
Angela is tasked with reviewing the IT service request process for her accounting firm. Which COBIT domain should she reference?
(Multiple Choice)
4.8/5
(29)
Which of the following is a poor policy for physical access control for a data center?
(Multiple Choice)
4.7/5
(32)
Which control activity related to physical security is managed by the facilities manager?
(Multiple Choice)
4.9/5
(48)
Showing 61 - 80 of 100
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)