Exam 8: Controlling Information Systems: Introduction to Pervasive Controls

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The disaster recovery strategy known as a(n) ______________________________ is a fully equipped data center that is made available on a standby basis to client companies for a monthly subscriber's fee.

(Short Answer)
4.8/5
(46)

______________________________ is a policy of requiring an employee to take leave from the job and substituting another employee in his or her place.

(Short Answer)
4.8/5
(28)

The most common biometric devices read ______________________________.

(Short Answer)
4.8/5
(32)

A facility usually comprised of air-conditioned space with a raised floor, telephone connections, and computer ports, into which a subscriber can move equipment, is called a hot site.

(True/False)
4.9/5
(39)

Combining the functions of authorizing and executing events is a violation of the organizational control plan known as ______________________________.

(Short Answer)
4.8/5
(29)

The ______________________________ coordinates the organizational and IT strategic planning processes and reviews and approves the strategic IT plan.

(Short Answer)
4.8/5
(35)

______________________________ controls provide assurance that all modifications to programs are authorized and documented, and that the changes are completed, tested, and properly implemented.

(Short Answer)
4.9/5
(44)

A key control concern is that certain people within an organization have easy access to applications programs and data files. The people are:

(Multiple Choice)
4.9/5
(31)

The IS function with the principal responsibilities of ensuring the security of all IT resources is data control.

(True/False)
4.7/5
(40)

A control plan that is designed to detect a fraud by having one employee periodically do the job of another employee is called:

(Multiple Choice)
4.8/5
(33)

In an online environment, ______________________________ ensures that only authorized users gain access to a system through a process of identification (e.g., a unique account number for each user) and authentication.

(Short Answer)
4.8/5
(27)

Which of the following controls restrict access to programs, data, and documentation?

(Multiple Choice)
4.8/5
(38)

Top security concerns reported by IT security professionals include all the following except:

(Multiple Choice)
4.8/5
(24)

______________________________ controls restrict access to data, programs and documentation.

(Short Answer)
4.9/5
(37)

______________________________ are particularly important because they operate across all business processes and affect a company's capability to meet a multitude of control goals.

(Short Answer)
4.9/5
(35)

______________________________ are documents that help users learn their jobs and perform consistently in those jobs.

(Short Answer)
4.8/5
(32)

Application documentation that describes the application and contains instructions for preparing inputs and using outputs is a(n):

(Multiple Choice)
4.8/5
(36)

The use of IT resources for enterprise systems and e-business:

(Multiple Choice)
4.8/5
(36)

______________________________ in an internal control system means assessment by management to determine whether the control plans in place are continuing to function appropriately over time.

(Short Answer)
4.9/5
(37)

Top 10 management concerns about IT's capability to support an organization's vision and strategy include all except the following:

(Multiple Choice)
4.9/5
(30)
Showing 81 - 100 of 159
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)