Exam 8: Controlling Information Systems: Introduction to Pervasive Controls

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A small organization that does not have enough personnel to adequately segregate duties must rely on alternative controls, commonly called ______________________________.

(Short Answer)
4.7/5
(41)

____ can consist of many computers and related equipment connected together via a network.

(Multiple Choice)
5.0/5
(37)

Systems documentation provides an overall description of the application, including the system's purpose; an overview of system procedures; and sample source documents, outputs, and reports.

(True/False)
4.8/5
(33)

Specifications for availability, reliability, performance, capacity for growth, levels of user support, disaster recovery, security, minimal system functionality, and service charges are included in:

(Multiple Choice)
4.8/5
(38)

With the data replication strategy known as ______________________________ all data changes are data stamped and saved to secondary systems as the changes are happening.

(Short Answer)
4.9/5
(33)

The chief information officer (CIO) prioritizes and selects IT projects and resources.

(True/False)
4.8/5
(35)

Which of the following control plans is not a retention control plan?

(Multiple Choice)
4.8/5
(28)

The WebTrust family of services offers best practices and e-business solutions related exclusively to B2B electronic commerce.

(True/False)
4.8/5
(42)

Which of the following statements related to denial of service attacks is false?

(Multiple Choice)
4.9/5
(35)

All of the following are components of a backup and recovery strategy except:

(Multiple Choice)
4.9/5
(38)

The first list below contains 10 control plans discussed in Chapter 8. The second list describes 10 system failures that have control implications. Required: On the answer line to the left of each system failure, insert the capital letter from the first list of the best control plan to prevent the system failure from occurring. If you can't find a control that will prevent the failure, then choose a detective or a corrective plan. A letter should be used only once. The first list below contains 10 control plans discussed in Chapter 8. The second list describes 10 system failures that have control implications. Required: On the answer line to the left of each system failure, insert the capital letter from the first list of the best control plan to prevent the system failure from occurring. If you can't find a control that will prevent the failure, then choose a detective or a corrective plan. A letter should be used only once.     The first list below contains 10 control plans discussed in Chapter 8. The second list describes 10 system failures that have control implications. Required: On the answer line to the left of each system failure, insert the capital letter from the first list of the best control plan to prevent the system failure from occurring. If you can't find a control that will prevent the failure, then choose a detective or a corrective plan. A letter should be used only once.

(Essay)
4.8/5
(50)

Data encryption is a process that codes data to make it readable to human eye.

(True/False)
4.9/5
(36)

This IT function's key control concern is that organization and IT strategic objectives are misaligned:

(Multiple Choice)
4.7/5
(39)

Which of the following statements is true?

(Multiple Choice)
4.7/5
(46)

COBIT 5:

(Multiple Choice)
4.8/5
(37)

The controlled access to data, programs, and documentation is a principal responsibility of which of the following functions?

(Multiple Choice)
4.9/5
(46)

Application controls restrict access to data, programs, and documentation.

(True/False)
4.8/5
(45)

The control concern that there will be a high risk of data conversion errors relates primarily to which of the following information systems functions?

(Multiple Choice)
5.0/5
(34)

Within the data center, the data control group is responsible for routing all work into and out of the data center, correcting errors, and monitoring error correction.

(True/False)
4.8/5
(33)

Segregation of duties consists of separating the four functions of authorizing events, executing events, recording events, and safeguarding the resources resulting from consummating the events.

(True/False)
4.8/5
(34)
Showing 121 - 140 of 159
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)