Exam 8: Controlling Information Systems: Introduction to Pervasive Controls
Exam 1: Introduction to Accounting Information Systems115 Questions
Exam 2: Enterprise Systems140 Questions
Exam 3: Electronic Business E-Business Systems113 Questions
Exam 4: Documenting Information Systems108 Questions
Exam 5: Database Management Systems180 Questions
Exam 6: Relational Databases and Sql93 Questions
Exam 7: Controlling Information Systems: Introduction to Enterprise Risk Management and Internal Control161 Questions
Exam 8: Controlling Information Systems: Introduction to Pervasive Controls157 Questions
Exam 9: Controlling Information Systems: Business Process and Application Controls126 Questions
Exam 10: The Order Entrysales Oes Process128 Questions
Exam 11: The Billingaccounts Receivable Cash Receipts Barcr Process134 Questions
Exam 12: The Purchasing Process131 Questions
Exam 13: Accounts Payablecash Disbursements Apcd Process104 Questions
Exam 14: The Human Resources Process HR Management and Payroll Processes118 Questions
Exam 15: Integrated Production Processes IPP106 Questions
Exam 16: General Ledger and Business Reporting Glbr Process78 Questions
Exam 17: Acquiring and Implementing Accounting Information Systems206 Questions
Select questions type
Combining the functions of authorizing and executing events is a violation of the organizational control plan known as segregation of duties.
Free
(True/False)
4.9/5
(36)
Correct Answer:
True
Which of the following is not one of COBIT's four broad IT control process domains?
Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
C
Forced vacations is a policy of requiring an employee to take leave from the job and substituting another employee in his or her place.
Free
(True/False)
4.9/5
(37)
Correct Answer:
True
As an IT resource, applications are automated systems and manual procedures that process information.
(True/False)
4.8/5
(40)
The operations run manual describes user procedures for an application and assists the user in preparing inputs and using outputs.
(True/False)
4.9/5
(37)
The information systems function ______________________________ provides efficient and effective operation of the computer equipment by performing tasks such as mounting tapes, disks, and other media and monitoring equipment operation.
(Short Answer)
4.9/5
(37)
The functions of the security officer commonly include assigning passwords and working with human resources to ensure proper interview practices are conducted during the hiring process.
(True/False)
4.9/5
(46)
All of the following are components of a backup and recovery strategy except:
(Multiple Choice)
4.9/5
(38)
In an information systems organization structure, the three functions that might logically report directly to the CIO would be:
(Multiple Choice)
4.9/5
(37)
A small organization that does not have enough personnel to adequately segregate duties must rely on alternative controls, commonly called resource controls.
(True/False)
4.8/5
(41)
Which of the following controls restrict access to programs, data, and documentation?
(Multiple Choice)
4.7/5
(38)
The disaster recovery strategy known as a(n) ____________________ is a fully equipped data center that is made available on a standby basis to client companies for a monthly subscriber's fee.
(Short Answer)
4.9/5
(33)
An intrusion-detection systems (IDS) logs and monitors who is on or trying to access the network.
(True/False)
4.8/5
(42)
Protecting resources against environmental hazards might include all of the following control plans except:
(Multiple Choice)
4.9/5
(41)
The department or function that develops and operates an organization's information systems is often called the:
(Multiple Choice)
4.8/5
(35)
The ____________________ documentation provides an overall description of the application, including the system's purpose; an overview of system procedures; and sample source documents, outputs, and reports.
(Short Answer)
4.9/5
(45)
Threat monitoring is a technique to protect one network from another "untrusted" network.
(True/False)
4.9/5
(37)
In a ___________________________________ a web site is overwhelmed by an intentional onslaught of thousands of simultaneous messages, making it impossible for the attacked site to engage in its normal activities.
(Short Answer)
4.8/5
(49)
Which of the following personnel security control plans is corrective in nature as opposed to being a preventive or detective control plan?
(Multiple Choice)
4.8/5
(38)
________________ in an internal control system means assessment by management to determine
whether the control plans in place are continuing to function appropriately over time.
(Short Answer)
4.9/5
(31)
Showing 1 - 20 of 157
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)