Exam 8: Controlling Information Systems: Introduction to Pervasive Controls
Exam 1: Introduction to Accounting Information Systems115 Questions
Exam 2: Enterprise Systems140 Questions
Exam 3: Electronic Business E-Business Systems113 Questions
Exam 4: Documenting Information Systems108 Questions
Exam 5: Database Management Systems180 Questions
Exam 6: Relational Databases and Sql93 Questions
Exam 7: Controlling Information Systems: Introduction to Enterprise Risk Management and Internal Control161 Questions
Exam 8: Controlling Information Systems: Introduction to Pervasive Controls157 Questions
Exam 9: Controlling Information Systems: Business Process and Application Controls126 Questions
Exam 10: The Order Entrysales Oes Process128 Questions
Exam 11: The Billingaccounts Receivable Cash Receipts Barcr Process134 Questions
Exam 12: The Purchasing Process131 Questions
Exam 13: Accounts Payablecash Disbursements Apcd Process104 Questions
Exam 14: The Human Resources Process HR Management and Payroll Processes118 Questions
Exam 15: Integrated Production Processes IPP106 Questions
Exam 16: General Ledger and Business Reporting Glbr Process78 Questions
Exam 17: Acquiring and Implementing Accounting Information Systems206 Questions
Select questions type
The IS function of quality assurance conducts reviews to ensure the attainment of IT customer requirements.
(True/False)
4.9/5
(38)
Antivirus is a technique to protect one network from another "untrusted" network.
(True/False)
4.7/5
(42)
A fidelity bond indemnifies a company in case it suffers losses from defalcations committed by its employees.
(True/False)
4.9/5
(40)
With the data replication strategy known as ________________________________________ all data changes are data stamped and saved to secondary systems as the changes are happening.
(Short Answer)
4.8/5
(34)
______________________________ are particularly important because they relate to a multitude of control goals and processes.
(Short Answer)
4.8/5
(34)
Approving a customer credit purchase would be an example of which basic events processing function?
(Multiple Choice)
4.9/5
(39)
The site that maintains copies of a primary computing site's programs and data is a ____________________ site.
(Short Answer)
4.9/5
(41)
An employee of a warehouse is responsible for taking a computer-generated shipping list, pulling the items from the warehouse shelves and placing them in a bin which is transferred to shipping when the list is completely filled.This is an example of:
(Multiple Choice)
4.9/5
(26)
IT governance leads to better organizational performance such as profitability.
(True/False)
4.8/5
(39)
The IS function with the responsibility of guiding the IT organization in establishing and meeting user information requirements is the IT steering committee.
(True/False)
4.9/5
(38)
___________________________________ is when a hacker calls and requests a password based on some pretext.
(Short Answer)
4.7/5
(33)
Watching a user type in passwords or user IDs or listening as they give account information over the phone is called ___________________________________.
(Short Answer)
4.8/5
(37)
In an on-line computer system, restricting user access to programs and data files includes all of the following except:
(Multiple Choice)
4.8/5
(35)
When segregation of duties cannot be effectively implemented because the organization is too small, we may rely on a more intensive implementation of other control plans such as personnel control plans.This is called:
(Multiple Choice)
4.7/5
(45)
Segregation of duties consists of separating the four functions of authorizing events, executing events, recording events, and safeguarding the resources resulting from consummating the events.
(True/False)
4.9/5
(35)
The IS function of systems development provides efficient and effective operation of the computer equipment by performing tasks such as mounting tapes and disks, loading printer paper, and responding to computer messages.
(True/False)
4.7/5
(30)
Sending out an e-mail pretending to be a legitimate business asking for information about a person's account is called:
(Multiple Choice)
4.7/5
(39)
A policy that requires employees to alternate jobs periodically is called:
(Multiple Choice)
4.9/5
(42)
In an online computer environment, the accumulation of access activity and its review by the security officer is also called ______________________________.
(Short Answer)
4.9/5
(42)
Showing 21 - 40 of 157
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)