Exam 8: Controlling Information Systems: Introduction to Pervasive Controls

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Access control software ensures that only authorized users gain access to a system through a process of identification and authentication.

(True/False)
4.9/5
(38)

The user manual gives detailed instructions to computer operators and to data control about a particular application.

(True/False)
4.9/5
(37)

IT governance is a process that ensures that the organization's IT sustains and extends the organization's strategies and objectives.

(True/False)
4.9/5
(33)

The system of controls used in this text consists of the control environment, pervasive control plans, IT general controls, and business process and application control plans.

(True/False)
4.8/5
(40)

When segregation of duties cannot be effectively implemented because the organization is too small, we may rely on a more intensive implementation of other control plans such as personnel control plans. This is called:

(Multiple Choice)
4.9/5
(38)

A mechanism by which a company is reimbursed for any loss that occurs when an employee commits fraud is called a:

(Multiple Choice)
4.8/5
(35)

This logs and monitors who is on or trying to access an organization's network.

(Multiple Choice)
4.8/5
(37)

A(n) ______________________________ uses many computers, called zombies, that unwittingly cooperate in a denial-of-service attack by sending messages to the target Web site.

(Short Answer)
4.9/5
(39)

______________________________ is when a hacker calls and requests a password based on some pretext.

(Short Answer)
4.8/5
(35)

In an information systems organizational structure, the function of ____ is the central point from which to control data and is a central point of vulnerability.

(Multiple Choice)
4.8/5
(41)

The ______________________________ function provides efficient and effective operation of the computer equipment by performing tasks such as mounting tapes, disks, and other media and monitoring equipment operation.

(Short Answer)
4.7/5
(37)

Managing functional units such as networks, CAD/CAM and systems programming typically is a major duty of:

(Multiple Choice)
4.9/5
(39)

Computer software that is used to facilitate the execution of a given business process is called ______________________________.

(Short Answer)
4.8/5
(43)

Periodic cleaning, testing, and adjusting of computer equipment is referred to as preventative maintenance.

(True/False)
4.9/5
(39)

Training materials help users learn their jobs and perform consistently in those jobs.

(True/False)
4.9/5
(31)

The first list below contains 10 control plans discussed in Chapter 8. The second list describes 10 system failures that have control implications. Required: On the answer line to the left of each system failure, insert the capital letter from the first list of the best control plan to prevent the system failure from occurring. (If you can't find a control that will prevent the failure, then choose a detective or corrective control plan). A letter should be used only once. The first list below contains 10 control plans discussed in Chapter 8. The second list describes 10 system failures that have control implications. Required: On the answer line to the left of each system failure, insert the capital letter from the first list of the best control plan to prevent the system failure from occurring. (If you can't find a control that will prevent the failure, then choose a detective or corrective control plan). A letter should be used only once.     The first list below contains 10 control plans discussed in Chapter 8. The second list describes 10 system failures that have control implications. Required: On the answer line to the left of each system failure, insert the capital letter from the first list of the best control plan to prevent the system failure from occurring. (If you can't find a control that will prevent the failure, then choose a detective or corrective control plan). A letter should be used only once.

(Essay)
4.9/5
(37)

The terms ______________________________ planning, disaster recovery planning, business interruption planning, and business continuity planning have all been used to describe the backup and recovery control plans designed to ensure that an organization can recover from a major calamity.

(Short Answer)
4.9/5
(43)

A(n) ______________________________ is a technique to protect one network from another "untrusted" network.

(Short Answer)
4.7/5
(38)

______________________________ is a process that employs mathematical algorithms and encryption keys to encode data (i.e., change un-encoded data, called plaintext, to a coded text form, called ciphertext) so that it is unintelligible.

(Short Answer)
4.7/5
(44)

Business continuity planning is the process that identifies events that may threaten an organization and provide a framework whereby the organization will continue to operate when the threatened event occurs or resume operations with a minimum of disruption.

(True/False)
4.7/5
(32)
Showing 61 - 80 of 159
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)