Exam 8: Controlling Information Systems: Introduction to Pervasive Controls

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Combining the functions of authorizing and executing events is a violation of the organizational control plan known as segregation of duties.

Free
(True/False)
4.9/5
(36)
Correct Answer:
Verified

True

Which of the following is not one of COBIT's four broad IT control process domains?

Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
Verified

C

Forced vacations is a policy of requiring an employee to take leave from the job and substituting another employee in his or her place.

Free
(True/False)
4.9/5
(37)
Correct Answer:
Verified

True

As an IT resource, applications are automated systems and manual procedures that process information.

(True/False)
4.8/5
(40)

The operations run manual describes user procedures for an application and assists the user in preparing inputs and using outputs.

(True/False)
4.9/5
(37)

The information systems function ______________________________ provides efficient and effective operation of the computer equipment by performing tasks such as mounting tapes, disks, and other media and monitoring equipment operation.

(Short Answer)
4.9/5
(37)

The functions of the security officer commonly include assigning passwords and working with human resources to ensure proper interview practices are conducted during the hiring process.

(True/False)
4.9/5
(46)

All of the following are components of a backup and recovery strategy except:

(Multiple Choice)
4.9/5
(38)

In an information systems organization structure, the three functions that might logically report directly to the CIO would be:

(Multiple Choice)
4.9/5
(37)

A small organization that does not have enough personnel to adequately segregate duties must rely on alternative controls, commonly called resource controls.

(True/False)
4.8/5
(41)

Which of the following controls restrict access to programs, data, and documentation?

(Multiple Choice)
4.7/5
(38)

The disaster recovery strategy known as a(n) ____________________ is a fully equipped data center that is made available on a standby basis to client companies for a monthly subscriber's fee.

(Short Answer)
4.9/5
(33)

An intrusion-detection systems (IDS) logs and monitors who is on or trying to access the network.

(True/False)
4.8/5
(42)

Protecting resources against environmental hazards might include all of the following control plans except:

(Multiple Choice)
4.9/5
(41)

The department or function that develops and operates an organization's information systems is often called the:

(Multiple Choice)
4.8/5
(35)

The ____________________ documentation provides an overall description of the application, including the system's purpose; an overview of system procedures; and sample source documents, outputs, and reports.

(Short Answer)
4.9/5
(45)

Threat monitoring is a technique to protect one network from another "untrusted" network.

(True/False)
4.9/5
(37)

In a ___________________________________ a web site is overwhelmed by an intentional onslaught of thousands of simultaneous messages, making it impossible for the attacked site to engage in its normal activities.

(Short Answer)
4.8/5
(49)

Which of the following personnel security control plans is corrective in nature as opposed to being a preventive or detective control plan?

(Multiple Choice)
4.8/5
(38)

________________ in an internal control system means assessment by management to determine whether the control plans in place are continuing to function appropriately over time.

(Short Answer)
4.9/5
(31)
Showing 1 - 20 of 157
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)