Exam 8: Controlling Information Systems: Introduction to Pervasive Controls

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

An intrusion-detection systems (IDS) logs and monitors who is on or trying to access the network.

(True/False)
4.8/5
(37)

According to COBIT, IT resources must be managed by IT control processes to ensure that an organization has the information it needs to achieve its objectives.

(True/False)
4.8/5
(39)

The most common biometric devices perform retinal eye scans.

(True/False)
4.8/5
(35)

______________________________ is when an e-mail is sent pretending to be a legitimate business asking for information about your account.

(Short Answer)
4.8/5
(34)

In an information systems organization, all of the following functions might logically report to the data center manager except:

(Multiple Choice)
4.8/5
(28)

Protecting resources against environmental hazards might include all of the following control plans except:

(Multiple Choice)
4.9/5
(34)

The ______________________________ actively blocks unauthorized traffic using rules specified by an organization.

(Short Answer)
4.9/5
(41)

The ______________________________ describes user procedures for an application and assists the user in preparing inputs and using outputs.

(Short Answer)
4.9/5
(43)

A facility usually comprised of air-conditioned space with a raised floor, telephone connections, and computer ports, into which a subscriber can move equipment, is called a(n) ______________________________.

(Short Answer)
4.8/5
(37)

COBIT 5 is more procedure-based than COBIT 4.1

(True/False)
4.8/5
(35)

In an on-line computer system, restricting user access to programs and data files includes all of the following except:

(Multiple Choice)
4.9/5
(35)

Which of the following has the responsibility of efficient and effective operation of IT?

(Multiple Choice)
4.7/5
(36)

Within the data center, the data librarian function grants access to programs, data, and documentation.

(True/False)
4.9/5
(44)

A small organization that does not have enough personnel to adequately segregate duties must rely on alternative controls, commonly called resource controls.

(True/False)
4.9/5
(43)

COBIT was developed by:

(Multiple Choice)
4.8/5
(37)

Program documentation provides a description of an application program and usually includes the program's purpose, program flowcharts, and source code listings.

(True/False)
4.8/5
(39)

The ______________________________ logs and monitors who is on or is trying to access the network.

(Short Answer)
4.7/5
(29)

According to COBIT, IT resources include applications, information, infrastructure, and people.

(True/False)
5.0/5
(36)

______________________________ is a service whereby data changes are automatically transmitted over the Internet on a continuous basis to an off-site server maintained by a third party.

(Short Answer)
4.9/5
(41)

With continuous data protection (CDP) all data changes are data stamped and saved to secondary systems as the changes are happening.

(True/False)
4.9/5
(35)
Showing 101 - 120 of 159
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)