Exam 8: Controlling Information Systems: Introduction to Pervasive Controls
Exam 1: Introduction to Accounting Information Systems122 Questions
Exam 2: Enterprise Systems141 Questions
Exam 3: Electronic Business E-Business Systems122 Questions
Exam 4: Documenting Information Systems129 Questions
Exam 5: Database Management Systems175 Questions
Exam 6: Relational Databases and SQL103 Questions
Exam 7: Controlling Information Systems: Introduction to Enterprise Risk Management and Internal Control161 Questions
Exam 8: Controlling Information Systems: Introduction to Pervasive Controls159 Questions
Exam 9: Controlling Information Systems: Business Process and Application Controls135 Questions
Exam 10: The Order Entrysales Oes Process134 Questions
Exam 11: The Billingaccounts Receivablecash Receipts Barcr Process134 Questions
Exam 12: The Purchasing Process141 Questions
Exam 13: The Accounts Payablecash Disbursements Apcd Process118 Questions
Exam 14: The Human Resources Process HR Management and Payroll Processes121 Questions
Exam 15: Integrated Production Processes IPP118 Questions
Exam 16: The General Ledger and Business Reporting GLBR Process107 Questions
Exam 17: Acquiring and Implementing Accounting Information Systems206 Questions
Select questions type
The functions of the ______________________________ commonly include assigning passwords and making sure the IT organization is secure from physical threats.
(Short Answer)
4.9/5
(36)
A clerk receives checks and customer receipts in the mail. He endorses the checks, fills out the deposit slip, and posts the checks to the cash receipts events data. The clerk is exercising which functions?
(Multiple Choice)
4.9/5
(31)
Segregation of duties consists of separating the four functions of authorizing events, ______________________________ events, ______________________________ events, and safeguarding the resources resulting from consummating the events.
(Short Answer)
4.9/5
(38)
Program change controls provide assurance that all modifications to programs are authorized and documented, and that the changes are completed, tested, and properly implemented.
(True/False)
4.9/5
(35)
The IS function of quality assurance conducts reviews to ensure the attainment of IT objectives.
(True/False)
4.8/5
(29)
A data replication strategy where all data changes are data stamped and saved to secondary systems as the changes are happening is called:
(Multiple Choice)
4.9/5
(45)
Copies of important stored data, programs, and documentation made periodically are called ______________________________.
(Short Answer)
4.7/5
(34)
The ______________________________ is charged with safeguarding the IT organization.
(Short Answer)
4.8/5
(36)
Which of the following is not a strategic planning process?
(Multiple Choice)
4.8/5
(34)
COBIT 5 has two main components: five _____________ and seven ________________.
(Short Answer)
4.7/5
(32)
Individual departments coordinate the organizational and IT strategic planning processes and reviews and approves the strategic IT plan.
(True/False)
4.9/5
(35)
Antivirus is a technique to protect one network from another "untrusted" network.
(True/False)
4.7/5
(28)
The four events-processing functions that constitute the segregation of duties control plan are:
Required:
Below is a list of ten events-processing activities, five relating to the cycle of activities involved in processing a sales event and seven relating to the cycle for a purchase event. Classify each of the twelve activities into one of the four functional categories listed above by placing the letter A, B, C, or D on the answer line to the left of each number. You should use only one letter for each of the answers.



(Essay)
4.8/5
(34)
The information systems function is synonymous with the accounting function.
(True/False)
4.8/5
(38)
The ______________________________ documentation portion of application documentation provides an overall description of the application, including the system's purpose; an overview of system procedures; and sample source documents, outputs, and reports.
(Short Answer)
4.7/5
(37)
Intrusion-prevention systems (IPS) actively block unauthorized traffic using rules specified by the organization.
(True/False)
4.7/5
(31)
Which of the following is not one of COBIT's four broad IT control process domains?
(Multiple Choice)
4.7/5
(37)
A fidelity bond indemnifies a company in case it suffers losses from defalcations committed by its employees.
(True/False)
4.9/5
(45)
______________________________ is the intentional unauthorized access of an organization's computer system, accomplished by bypassing the system's access security controls.
(Short Answer)
4.8/5
(35)
In an information systems organization, which of the following reporting relationships makes the least sense?
(Multiple Choice)
4.9/5
(41)
Showing 41 - 60 of 159
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)