Exam 8: Controlling Information Systems: Introduction to Pervasive Controls
Exam 1: Introduction to Accounting Information Systems122 Questions
Exam 2: Enterprise Systems141 Questions
Exam 3: Electronic Business E-Business Systems122 Questions
Exam 4: Documenting Information Systems129 Questions
Exam 5: Database Management Systems175 Questions
Exam 6: Relational Databases and SQL103 Questions
Exam 7: Controlling Information Systems: Introduction to Enterprise Risk Management and Internal Control161 Questions
Exam 8: Controlling Information Systems: Introduction to Pervasive Controls159 Questions
Exam 9: Controlling Information Systems: Business Process and Application Controls135 Questions
Exam 10: The Order Entrysales Oes Process134 Questions
Exam 11: The Billingaccounts Receivablecash Receipts Barcr Process134 Questions
Exam 12: The Purchasing Process141 Questions
Exam 13: The Accounts Payablecash Disbursements Apcd Process118 Questions
Exam 14: The Human Resources Process HR Management and Payroll Processes121 Questions
Exam 15: Integrated Production Processes IPP118 Questions
Exam 16: The General Ledger and Business Reporting GLBR Process107 Questions
Exam 17: Acquiring and Implementing Accounting Information Systems206 Questions
Select questions type
Approving a customer credit purchase would be an example of which basic events processing function?
Free
(Multiple Choice)
4.9/5
(40)
Correct Answer:
A
The segregation of duties control plan consists of separating all of the following event-processing functions except:
Free
(Multiple Choice)
4.7/5
(31)
Correct Answer:
A
A warehouse clerk manually completing an order document and forwarding it to purchasing for approval is an example of:
Free
(Multiple Choice)
4.7/5
(39)
Correct Answer:
B
The ______________________________ covers the progression of information systems through the systems development process, from birth, through implementation, to ongoing use and modification.
(Short Answer)
4.8/5
(32)
The site that maintains copies of a primary computing site's programs and data is a(n) ______________________________ site.
(Short Answer)
4.9/5
(43)
Combining the functions of authorizing and executing events is a violation of the organizational control plan known as segregation of duties.
(True/False)
4.9/5
(29)
Biometric identification systems identify authorized personnel through some unique physical trait such as fingers, hands, voice, eyes, face, or writing dynamics.
(True/False)
4.7/5
(31)
Threat monitoring is a technique to protect one network from another "untrusted" network.
(True/False)
4.9/5
(46)
From the standpoint of achieving the operations system control goal of security of resources, which of the following segregation of duties possibilities is least important?
(Multiple Choice)
4.9/5
(32)
The function composed of people, procedures, and equipment and is typically called the information systems department, IS department, or IT department is the ______________________________.
(Short Answer)
4.8/5
(34)
The policy of requiring an employee to alternate jobs periodically is known as forced vacations.
(True/False)
4.8/5
(31)
Management should establish a(n) ______________________________ plan and implement related activities, including reviews, audits, and inspections, to ensure the attainment of IT customer requirements.
(Short Answer)
4.8/5
(29)
Sending out an e-mail pretending to be a legitimate business asking for information about a person's account is called:
(Multiple Choice)
4.8/5
(36)
A warehouse supervisor prepares a sales order listing items to be shipped to a customer and then signs it approving the removal of the items from the warehouse. The supervisor is performing which functions?
(Multiple Choice)
4.9/5
(38)
Instructions for computer setup, required data, restart procedures, and error messages are typically contained in a(n):
(Multiple Choice)
5.0/5
(35)
______________________________ is a process that ensures that the enterprise's IT sustains and extends the organization's strategies and objectives.
(Short Answer)
4.8/5
(26)
Which of the following has the major duties of prioritizing and selecting IT projects and resources?
(Multiple Choice)
4.7/5
(31)
The disaster backup and recovery technique known as electronic vaulting is a service whereby data changes are automatically transmitted over the Internet on a continuous basis to an off-site server maintained by a third party.
(True/False)
4.9/5
(43)
place the capital letter of the functional title that best matches the duties and responsibilities described. Do not use a letter more than once.
Correct Answer:
Premises:
Responses:
(Matching)
4.8/5
(40)
Showing 1 - 20 of 159
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)