Exam 8: Controlling Information Systems: Introduction to Pervasive Controls
Exam 1: Introduction to Accounting Information Systems122 Questions
Exam 2: Enterprise Systems141 Questions
Exam 3: Electronic Business E-Business Systems122 Questions
Exam 4: Documenting Information Systems129 Questions
Exam 5: Database Management Systems175 Questions
Exam 6: Relational Databases and SQL103 Questions
Exam 7: Controlling Information Systems: Introduction to Enterprise Risk Management and Internal Control161 Questions
Exam 8: Controlling Information Systems: Introduction to Pervasive Controls159 Questions
Exam 9: Controlling Information Systems: Business Process and Application Controls135 Questions
Exam 10: The Order Entrysales Oes Process134 Questions
Exam 11: The Billingaccounts Receivablecash Receipts Barcr Process134 Questions
Exam 12: The Purchasing Process141 Questions
Exam 13: The Accounts Payablecash Disbursements Apcd Process118 Questions
Exam 14: The Human Resources Process HR Management and Payroll Processes121 Questions
Exam 15: Integrated Production Processes IPP118 Questions
Exam 16: The General Ledger and Business Reporting GLBR Process107 Questions
Exam 17: Acquiring and Implementing Accounting Information Systems206 Questions
Select questions type
The disaster recovery strategy known as a(n) ______________________________ is a fully equipped data center that is made available on a standby basis to client companies for a monthly subscriber's fee.
(Short Answer)
4.8/5
(46)
______________________________ is a policy of requiring an employee to take leave from the job and substituting another employee in his or her place.
(Short Answer)
4.8/5
(28)
The most common biometric devices read ______________________________.
(Short Answer)
4.8/5
(32)
A facility usually comprised of air-conditioned space with a raised floor, telephone connections, and computer ports, into which a subscriber can move equipment, is called a hot site.
(True/False)
4.9/5
(39)
Combining the functions of authorizing and executing events is a violation of the organizational control plan known as ______________________________.
(Short Answer)
4.8/5
(29)
The ______________________________ coordinates the organizational and IT strategic planning processes and reviews and approves the strategic IT plan.
(Short Answer)
4.8/5
(35)
______________________________ controls provide assurance that all modifications to programs are authorized and documented, and that the changes are completed, tested, and properly implemented.
(Short Answer)
4.9/5
(44)
A key control concern is that certain people within an organization have easy access to applications programs and data files. The people are:
(Multiple Choice)
4.9/5
(31)
The IS function with the principal responsibilities of ensuring the security of all IT resources is data control.
(True/False)
4.7/5
(40)
A control plan that is designed to detect a fraud by having one employee periodically do the job of another employee is called:
(Multiple Choice)
4.8/5
(33)
In an online environment, ______________________________ ensures that only authorized users gain access to a system through a process of identification (e.g., a unique account number for each user) and authentication.
(Short Answer)
4.8/5
(27)
Which of the following controls restrict access to programs, data, and documentation?
(Multiple Choice)
4.8/5
(38)
Top security concerns reported by IT security professionals include all the following except:
(Multiple Choice)
4.8/5
(24)
______________________________ controls restrict access to data, programs and documentation.
(Short Answer)
4.9/5
(37)
______________________________ are particularly important because they operate across all business processes and affect a company's capability to meet a multitude of control goals.
(Short Answer)
4.9/5
(35)
______________________________ are documents that help users learn their jobs and perform consistently in those jobs.
(Short Answer)
4.8/5
(32)
Application documentation that describes the application and contains instructions for preparing inputs and using outputs is a(n):
(Multiple Choice)
4.8/5
(36)
The use of IT resources for enterprise systems and e-business:
(Multiple Choice)
4.8/5
(36)
______________________________ in an internal control system means assessment by management to determine whether the control plans in place are continuing to function appropriately over time.
(Short Answer)
4.9/5
(37)
Top 10 management concerns about IT's capability to support an organization's vision and strategy include all except the following:
(Multiple Choice)
4.9/5
(30)
Showing 81 - 100 of 159
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)