Exam 8: Controlling Information Systems: Introduction to Pervasive Controls
Exam 1: Introduction to Accounting Information Systems122 Questions
Exam 2: Enterprise Systems141 Questions
Exam 3: Electronic Business E-Business Systems122 Questions
Exam 4: Documenting Information Systems129 Questions
Exam 5: Database Management Systems175 Questions
Exam 6: Relational Databases and SQL103 Questions
Exam 7: Controlling Information Systems: Introduction to Enterprise Risk Management and Internal Control161 Questions
Exam 8: Controlling Information Systems: Introduction to Pervasive Controls159 Questions
Exam 9: Controlling Information Systems: Business Process and Application Controls135 Questions
Exam 10: The Order Entrysales Oes Process134 Questions
Exam 11: The Billingaccounts Receivablecash Receipts Barcr Process134 Questions
Exam 12: The Purchasing Process141 Questions
Exam 13: The Accounts Payablecash Disbursements Apcd Process118 Questions
Exam 14: The Human Resources Process HR Management and Payroll Processes121 Questions
Exam 15: Integrated Production Processes IPP118 Questions
Exam 16: The General Ledger and Business Reporting GLBR Process107 Questions
Exam 17: Acquiring and Implementing Accounting Information Systems206 Questions
Select questions type
An intrusion-detection systems (IDS) logs and monitors who is on or trying to access the network.
(True/False)
4.8/5
(37)
According to COBIT, IT resources must be managed by IT control processes to ensure that an organization has the information it needs to achieve its objectives.
(True/False)
4.8/5
(39)
______________________________ is when an e-mail is sent pretending to be a legitimate business asking for information about your account.
(Short Answer)
4.8/5
(34)
In an information systems organization, all of the following functions might logically report to the data center manager except:
(Multiple Choice)
4.8/5
(28)
Protecting resources against environmental hazards might include all of the following control plans except:
(Multiple Choice)
4.9/5
(34)
The ______________________________ actively blocks unauthorized traffic using rules specified by an organization.
(Short Answer)
4.9/5
(41)
The ______________________________ describes user procedures for an application and assists the user in preparing inputs and using outputs.
(Short Answer)
4.9/5
(43)
A facility usually comprised of air-conditioned space with a raised floor, telephone connections, and computer ports, into which a subscriber can move equipment, is called a(n) ______________________________.
(Short Answer)
4.8/5
(37)
In an on-line computer system, restricting user access to programs and data files includes all of the following except:
(Multiple Choice)
4.9/5
(35)
Which of the following has the responsibility of efficient and effective operation of IT?
(Multiple Choice)
4.7/5
(36)
Within the data center, the data librarian function grants access to programs, data, and documentation.
(True/False)
4.9/5
(44)
A small organization that does not have enough personnel to adequately segregate duties must rely on alternative controls, commonly called resource controls.
(True/False)
4.9/5
(43)
Program documentation provides a description of an application program and usually includes the program's purpose, program flowcharts, and source code listings.
(True/False)
4.8/5
(39)
The ______________________________ logs and monitors who is on or is trying to access the network.
(Short Answer)
4.7/5
(29)
According to COBIT, IT resources include applications, information, infrastructure, and people.
(True/False)
5.0/5
(36)
______________________________ is a service whereby data changes are automatically transmitted over the Internet on a continuous basis to an off-site server maintained by a third party.
(Short Answer)
4.9/5
(41)
With continuous data protection (CDP) all data changes are data stamped and saved to secondary systems as the changes are happening.
(True/False)
4.9/5
(35)
Showing 101 - 120 of 159
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)