Exam 8: Controlling Information Systems: Introduction to Pervasive Controls

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The process whereby lost data is restored and operations are continued is called ______________________________.

(Short Answer)
4.7/5
(40)

______________________________ documentation provides a description of an application computer program and usually includes the program's purpose, program flowcharts, and source code listings.

(Short Answer)
4.9/5
(38)

One method for circumventing segregation of duties is ______________________________ between one or more persons (or departments) to exploit a system and conceal an abuse such as fraud.

(Short Answer)
4.8/5
(30)

The functions of the security officer commonly include assigning passwords and working with human resources to ensure proper interview practices are conducted during the hiring process.

(True/False)
4.8/5
(40)

Watching a user type in passwords or user IDs or listening as they give account information over the phone is called ______________________________.

(Short Answer)
4.7/5
(43)

The systems development function provides efficient and effective operation of the computer equipment.

(True/False)
4.8/5
(33)

The ______________________________ group is responsible for routing all work in to and out of the data center, correcting errors, and monitoring all error correction.

(Short Answer)
4.9/5
(37)

______________________________ helps to solve the problem posed by single key cryptography by employing a pair of matched keys for each system user, one private (i.e., known only to the party who possesses it) and one public.

(Short Answer)
4.9/5
(41)

COBIT was developed to:

(Multiple Choice)
4.7/5
(41)

The IS function with the responsibility of guiding the IT organization in establishing and meeting user information requirements is the IT steering committee.

(True/False)
4.8/5
(48)

The ______________________________ gives detailed instructions to computer operators and to data control about a particular application.

(Short Answer)
4.8/5
(38)

Pervasive control plans:

(Multiple Choice)
4.8/5
(41)

The function composed of people, procedures, and equipment and is typically called the information systems department, IS department, or the IT department is the information systems organization.

(True/False)
4.9/5
(38)

In a(n) ______________________________ a Web site is overwhelmed by an intentional onslaught of thousands of simultaneous messages, making it impossible for the attacked site to engage in its normal activities.

(Short Answer)
4.8/5
(42)

Periodic cleaning, testing, and adjusting of computer equipment is referred to as ______________________________.

(Short Answer)
4.8/5
(35)

Listed below are several pervasive control plans discussed in Chapter 8. On the blank line to the left of each control plan, insert a "P" (preventive), "D" (detective), or "C" (corrective) to best classify that control. If applicable, more than one code may be inserted for each plan. Listed below are several pervasive control plans discussed in Chapter 8. On the blank line to the left of each control plan, insert a P (preventive), D (detective), or C (corrective) to best classify that control. If applicable, more than one code may be inserted for each plan.

(Essay)
4.8/5
(41)

An outside auditing firm annually supervises a physical count of the items in a retail store's shelf inventory. This is an example of:

(Multiple Choice)
4.9/5
(43)

Alternative names for contingency planning include all of the following except:

(Multiple Choice)
5.0/5
(32)

The operations run manual describes user procedures for an application and assists the user in preparing inputs and using outputs.

(True/False)
4.8/5
(39)
Showing 141 - 159 of 159
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)