Exam 8: Controlling Information Systems: Introduction to Pervasive Controls

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The functions of the ______________________________ commonly include assigning passwords and making sure the IT organization is secure from physical threats.

(Short Answer)
4.9/5
(36)

A clerk receives checks and customer receipts in the mail. He endorses the checks, fills out the deposit slip, and posts the checks to the cash receipts events data. The clerk is exercising which functions?

(Multiple Choice)
4.9/5
(31)

Segregation of duties consists of separating the four functions of authorizing events, ______________________________ events, ______________________________ events, and safeguarding the resources resulting from consummating the events.

(Short Answer)
4.9/5
(38)

Program change controls provide assurance that all modifications to programs are authorized and documented, and that the changes are completed, tested, and properly implemented.

(True/False)
4.9/5
(35)

The IS function of quality assurance conducts reviews to ensure the attainment of IT objectives.

(True/False)
4.8/5
(29)

A data replication strategy where all data changes are data stamped and saved to secondary systems as the changes are happening is called:

(Multiple Choice)
4.9/5
(45)

Copies of important stored data, programs, and documentation made periodically are called ______________________________.

(Short Answer)
4.7/5
(34)

The ______________________________ is charged with safeguarding the IT organization.

(Short Answer)
4.8/5
(36)

Which of the following is not a strategic planning process?

(Multiple Choice)
4.8/5
(34)

COBIT 5 has two main components: five _____________ and seven ________________.

(Short Answer)
4.7/5
(32)

Individual departments coordinate the organizational and IT strategic planning processes and reviews and approves the strategic IT plan.

(True/False)
4.9/5
(35)

Antivirus is a technique to protect one network from another "untrusted" network.

(True/False)
4.7/5
(28)

The four events-processing functions that constitute the segregation of duties control plan are: The four events-processing functions that constitute the segregation of duties control plan are:    Required: Below is a list of ten events-processing activities, five relating to the cycle of activities involved in processing a sales event and seven relating to the cycle for a purchase event. Classify each of the twelve activities into one of the four functional categories listed above by placing the letter A, B, C, or D on the answer line to the left of each number. You should use only one letter for each of the answers.   Required: Below is a list of ten events-processing activities, five relating to the cycle of activities involved in processing a sales event and seven relating to the cycle for a purchase event. Classify each of the twelve activities into one of the four functional categories listed above by placing the letter A, B, C, or D on the answer line to the left of each number. You should use only one letter for each of the answers. The four events-processing functions that constitute the segregation of duties control plan are:    Required: Below is a list of ten events-processing activities, five relating to the cycle of activities involved in processing a sales event and seven relating to the cycle for a purchase event. Classify each of the twelve activities into one of the four functional categories listed above by placing the letter A, B, C, or D on the answer line to the left of each number. You should use only one letter for each of the answers.

(Essay)
4.8/5
(34)

The information systems function is synonymous with the accounting function.

(True/False)
4.8/5
(38)

The ______________________________ documentation portion of application documentation provides an overall description of the application, including the system's purpose; an overview of system procedures; and sample source documents, outputs, and reports.

(Short Answer)
4.7/5
(37)

Intrusion-prevention systems (IPS) actively block unauthorized traffic using rules specified by the organization.

(True/False)
4.7/5
(31)

Which of the following is not one of COBIT's four broad IT control process domains?

(Multiple Choice)
4.7/5
(37)

A fidelity bond indemnifies a company in case it suffers losses from defalcations committed by its employees.

(True/False)
4.9/5
(45)

______________________________ is the intentional unauthorized access of an organization's computer system, accomplished by bypassing the system's access security controls.

(Short Answer)
4.8/5
(35)

In an information systems organization, which of the following reporting relationships makes the least sense?

(Multiple Choice)
4.9/5
(41)
Showing 41 - 60 of 159
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)