Exam 8: Controlling Information Systems: Introduction to Pervasive Controls

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following is not a strategic planning process?

(Multiple Choice)
4.7/5
(30)

______________________________ is a process that ensures that the enterprises's IT sustains and extends the organization's strategies and objectives.

(Short Answer)
4.9/5
(34)

A method of separating systems development and operations is to prevent programmers from

(Multiple Choice)
4.8/5
(34)

The ______________________________ group is responsible for routing all work in to and out of the data center, correcting errors, and monitoring all error correction.

(Short Answer)
4.9/5
(40)

Which of the following has the responsibility of efficient and effective operation of IT?

(Multiple Choice)
4.8/5
(39)

A warehouse supervisor prepares a sales order listing items to be shipped to a customer and then signs it authorizing the removal of the items from the warehouse.The supervisor is performing which functions?

(Multiple Choice)
4.7/5
(42)

Top 10 security and privacy concerns reported by managers from 63 countries include all the following except:

(Multiple Choice)
4.8/5
(44)

Management should establish a _______________________ plan and implement related activities, including reviews, audits, and inspections, to ensure the attainment of IT customer requirements.

(Short Answer)
4.8/5
(48)

The policy of requiring an employee to alternate jobs periodically is known as forced vacations.

(True/False)
4.9/5
(35)

The ______________________________ covers the progression of information systems through the systems development process, from birth, through implementation, to ongoing use and modification.

(Short Answer)
4.7/5
(29)

Periodic cleaning, testing, and adjusting of computer equipment is referred to as ______________________________.

(Short Answer)
4.7/5
(27)

A small organization that does not have enough personnel to adequately segregate duties must rely on alternative controls, commonly called ___________________________________.

(Short Answer)
4.7/5
(47)

Data in all their forms that are input, processed, and output by information systems is the IT resource ____________________.

(Short Answer)
4.8/5
(33)

According to COSO, most organizations are adequately monitoring operations.

(True/False)
4.9/5
(43)

Listed below are several pervasive control plans discussed in Chapter 8.On the blank line to the left of each control plan, insert a "P" (preventive), "D" (detective), or "C" (corrective) to best classify that control.If you think that more than one code could apply to a particular plan, insert all appropriate codes Listed below are several pervasive control plans discussed in Chapter 8.On the blank line to the left of each control plan, insert a P (preventive), D (detective), or C (corrective) to best classify that control.If you think that more than one code could apply to a particular plan, insert all appropriate codes

(Essay)
4.8/5
(37)

The first list below contains 10 control plans discussed in Chapter 8.The second list describes 10 system failures that have control implications.Required: On the answer line to the left of each system failure, insert the capital letter from the first list of the best control plan to prevent the system failure from occurring.If you can't find a control that will prevent the failure, then choose a detective or a corrective plan.A letter should be used only once.Control Plans The first list below contains 10 control plans discussed in Chapter 8.The second list describes 10 system failures that have control implications.Required: On the answer line to the left of each system failure, insert the capital letter from the first list of the best control plan to prevent the system failure from occurring.If you can't find a control that will prevent the failure, then choose a detective or a corrective plan.A letter should be used only once.Control Plans     The first list below contains 10 control plans discussed in Chapter 8.The second list describes 10 system failures that have control implications.Required: On the answer line to the left of each system failure, insert the capital letter from the first list of the best control plan to prevent the system failure from occurring.If you can't find a control that will prevent the failure, then choose a detective or a corrective plan.A letter should be used only once.Control Plans

(Essay)
4.8/5
(29)

The use of IT resources for enterprise systems and e-business

(Multiple Choice)
4.9/5
(33)

A mechanism by which a company is reimbursed for any loss that occurs when an employee commits fraud is called a:

(Multiple Choice)
4.9/5
(37)

The ______________________________ gives detailed instructions to computer operators and to data control about a particular application.

(Short Answer)
4.8/5
(38)

Which of the following IT resources includes hardware, operating systems, DBMSs, and networking?

(Multiple Choice)
4.8/5
(43)
Showing 81 - 100 of 157
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)