Exam 8: Controlling Information Systems: Introduction to Pervasive Controls
Exam 1: Introduction to Accounting Information Systems122 Questions
Exam 2: Enterprise Systems141 Questions
Exam 3: Electronic Business E-Business Systems122 Questions
Exam 4: Documenting Information Systems129 Questions
Exam 5: Database Management Systems175 Questions
Exam 6: Relational Databases and SQL103 Questions
Exam 7: Controlling Information Systems: Introduction to Enterprise Risk Management and Internal Control161 Questions
Exam 8: Controlling Information Systems: Introduction to Pervasive Controls159 Questions
Exam 9: Controlling Information Systems: Business Process and Application Controls135 Questions
Exam 10: The Order Entrysales Oes Process134 Questions
Exam 11: The Billingaccounts Receivablecash Receipts Barcr Process134 Questions
Exam 12: The Purchasing Process141 Questions
Exam 13: The Accounts Payablecash Disbursements Apcd Process118 Questions
Exam 14: The Human Resources Process HR Management and Payroll Processes121 Questions
Exam 15: Integrated Production Processes IPP118 Questions
Exam 16: The General Ledger and Business Reporting GLBR Process107 Questions
Exam 17: Acquiring and Implementing Accounting Information Systems206 Questions
Select questions type
A small organization that does not have enough personnel to adequately segregate duties must rely on alternative controls, commonly called ______________________________.
(Short Answer)
4.7/5
(41)
____ can consist of many computers and related equipment connected together via a network.
(Multiple Choice)
5.0/5
(37)
Systems documentation provides an overall description of the application, including the system's purpose; an overview of system procedures; and sample source documents, outputs, and reports.
(True/False)
4.8/5
(33)
Specifications for availability, reliability, performance, capacity for growth, levels of user support, disaster recovery, security, minimal system functionality, and service charges are included in:
(Multiple Choice)
4.8/5
(38)
With the data replication strategy known as ______________________________ all data changes are data stamped and saved to secondary systems as the changes are happening.
(Short Answer)
4.9/5
(33)
The chief information officer (CIO) prioritizes and selects IT projects and resources.
(True/False)
4.8/5
(35)
Which of the following control plans is not a retention control plan?
(Multiple Choice)
4.8/5
(28)
The WebTrust family of services offers best practices and e-business solutions related exclusively to B2B electronic commerce.
(True/False)
4.8/5
(42)
Which of the following statements related to denial of service attacks is false?
(Multiple Choice)
4.9/5
(35)
All of the following are components of a backup and recovery strategy except:
(Multiple Choice)
4.9/5
(38)
The first list below contains 10 control plans discussed in Chapter 8. The second list describes 10 system failures that have control implications.
Required:
On the answer line to the left of each system failure, insert the capital letter from the first list of the best control plan to prevent the system failure from occurring. If you can't find a control that will prevent the failure, then choose a detective or a corrective plan. A letter should be used only once.



(Essay)
4.8/5
(50)
Data encryption is a process that codes data to make it readable to human eye.
(True/False)
4.9/5
(36)
This IT function's key control concern is that organization and IT strategic objectives are misaligned:
(Multiple Choice)
4.7/5
(39)
The controlled access to data, programs, and documentation is a principal responsibility of which of the following functions?
(Multiple Choice)
4.9/5
(46)
Application controls restrict access to data, programs, and documentation.
(True/False)
4.8/5
(45)
The control concern that there will be a high risk of data conversion errors relates primarily to which of the following information systems functions?
(Multiple Choice)
5.0/5
(34)
Within the data center, the data control group is responsible for routing all work into and out of the data center, correcting errors, and monitoring error correction.
(True/False)
4.8/5
(33)
Segregation of duties consists of separating the four functions of authorizing events, executing events, recording events, and safeguarding the resources resulting from consummating the events.
(True/False)
4.8/5
(34)
Showing 121 - 140 of 159
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)