Exam 8: Controlling Information Systems: Introduction to Pervasive Controls
Exam 1: Introduction to Accounting Information Systems115 Questions
Exam 2: Enterprise Systems140 Questions
Exam 3: Electronic Business E-Business Systems113 Questions
Exam 4: Documenting Information Systems108 Questions
Exam 5: Database Management Systems180 Questions
Exam 6: Relational Databases and Sql93 Questions
Exam 7: Controlling Information Systems: Introduction to Enterprise Risk Management and Internal Control161 Questions
Exam 8: Controlling Information Systems: Introduction to Pervasive Controls157 Questions
Exam 9: Controlling Information Systems: Business Process and Application Controls126 Questions
Exam 10: The Order Entrysales Oes Process128 Questions
Exam 11: The Billingaccounts Receivable Cash Receipts Barcr Process134 Questions
Exam 12: The Purchasing Process131 Questions
Exam 13: Accounts Payablecash Disbursements Apcd Process104 Questions
Exam 14: The Human Resources Process HR Management and Payroll Processes118 Questions
Exam 15: Integrated Production Processes IPP106 Questions
Exam 16: General Ledger and Business Reporting Glbr Process78 Questions
Exam 17: Acquiring and Implementing Accounting Information Systems206 Questions
Select questions type
A _____________________________________________ uses many computers, called zombies, that unwittingly cooperate in a denial-of-service attack by sending messages to the target Web site.
(Short Answer)
5.0/5
(38)
As used in the text, the information systems organization (function) is synonymous with the accounting function.
(True/False)
4.9/5
(35)
In an information systems organization, all of the following functions might logically report to the data center manager except:
(Multiple Choice)
5.0/5
(30)
Intrusion-prevention systems (IPS) actively block unauthorized traffic using rules specified by the organization.
(True/False)
4.8/5
(34)
Below is an alphabetical list of ten functional titles for the information systems organization structure shown in Chapter 8.The second list contains descriptions (some partial) of the duties and responsibilities of ten of the functions.Required:
On the blank line to the left of each numbered description, place the capital letter of the functional title that best matches the duties and responsibilities described.Do not use a letter more than once. 

(Essay)
4.7/5
(29)
In an information systems organization, which of the following reporting relationships makes the least sense?
(Multiple Choice)
4.8/5
(47)
____ can consist of many computers and related equipment connected together via a network.
(Multiple Choice)
4.8/5
(42)
Periodic cleaning, testing, and adjusting of computer equipment is referred to as preventative maintenance.
(True/False)
4.9/5
(38)
The terms ____________________ planning, disaster recovery planning, business interruption planning, and business continuity planning have all been used to describe the backup and recovery control plans designed to ensure that an organization can recover from a major calamity.
(Short Answer)
4.8/5
(39)
A data replication strategy where all data changes are data stamped and saved to secondary systems as the changes are happening is called:
(Multiple Choice)
4.9/5
(36)
The controlled access to data, programs, and documentation is a principal responsibility of which of the following functions?
(Multiple Choice)
4.9/5
(39)
Managing functional units such as networks, CAD/CAM and systems programming typically is a major duty of:
(Multiple Choice)
4.8/5
(26)
______________________________ are documents that helps users learn their jobs and perform consistently in those jobs.
(Short Answer)
4.8/5
(33)
Embezzlement is a fraud committed by two or more individuals or departments.
(True/False)
4.9/5
(44)
Biometric identification systems identify authorized personnel through some unique physical trait such as fingers, hands, voice, eyes, face, or writing dynamics.
(True/False)
4.8/5
(48)
___________________________________ is a service whereby data changes are automatically transmitted over the Internet on a continuous basis to an off-site server maintained by a third party.
(Short Answer)
4.9/5
(38)
Automated systems and manual procedures that process information are called this IT resource:
(Multiple Choice)
4.8/5
(36)
Personnel termination control plans might include all of the following except:
(Multiple Choice)
4.9/5
(44)
A(n) ______________________________ indemnifies a company in case it suffers losses from defalcations committed by its employees.
(Short Answer)
4.9/5
(37)
Showing 101 - 120 of 157
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)