Exam 8: Controlling Information Systems: Introduction to Pervasive Controls
Exam 1: Introduction to Accounting Information Systems115 Questions
Exam 2: Enterprise Systems140 Questions
Exam 3: Electronic Business E-Business Systems113 Questions
Exam 4: Documenting Information Systems108 Questions
Exam 5: Database Management Systems180 Questions
Exam 6: Relational Databases and Sql93 Questions
Exam 7: Controlling Information Systems: Introduction to Enterprise Risk Management and Internal Control161 Questions
Exam 8: Controlling Information Systems: Introduction to Pervasive Controls157 Questions
Exam 9: Controlling Information Systems: Business Process and Application Controls126 Questions
Exam 10: The Order Entrysales Oes Process128 Questions
Exam 11: The Billingaccounts Receivable Cash Receipts Barcr Process134 Questions
Exam 12: The Purchasing Process131 Questions
Exam 13: Accounts Payablecash Disbursements Apcd Process104 Questions
Exam 14: The Human Resources Process HR Management and Payroll Processes118 Questions
Exam 15: Integrated Production Processes IPP106 Questions
Exam 16: General Ledger and Business Reporting Glbr Process78 Questions
Exam 17: Acquiring and Implementing Accounting Information Systems206 Questions
Select questions type
______________________________ is a policy of requiring an employee to take leave from the job and substituting another employee in his or her place.
(Short Answer)
4.8/5
(32)
Top 10 management concerns about IT's capability to support an organization's vision and strategy include all except the following:
(Multiple Choice)
4.8/5
(39)
The ___________________________________ actively blocks unauthorized traffic using rules specified by an organization.
(Short Answer)
4.8/5
(37)
The control concern that there will be a high risk of data conversion errors relates primarily to which of the following information systems functions?
(Multiple Choice)
4.9/5
(40)
The IS function with the principal responsibilities of insuring the security of all information systems function resources is data control.
(True/False)
4.9/5
(33)
In an online environment, ________________________ ensures that only authorized users gain access to a system through a process of identification (e.g., a unique account number for each user) and authentication.
(Short Answer)
5.0/5
(41)
Personnel development control plans consist of each of the following except:
(Multiple Choice)
4.8/5
(32)
Copies of important stored data, programs, and documentation made periodically are called ____________________.
(Short Answer)
4.7/5
(37)
From the standpoint of achieving the operations system control goal of security of resources, which of the following segregation of duties possibilities is least important?
(Multiple Choice)
4.8/5
(38)
A clerk receives checks and customer receipts in the mail.He endorses the checks, fills out the deposit slip, and posts the checks to the cash receipts events data.The clerk is exercising which functions?
(Multiple Choice)
4.8/5
(39)
The disaster backup and recovery technique known as electronic vaulting is a service whereby data changes are automatically transmitted over the Internet on a continuous basis to an off-site server maintained by a third party.
(True/False)
4.9/5
(35)
Computer software that is used to facilitate the execution of a given business process is called ___________________________________.
(Short Answer)
4.7/5
(40)
Data in all their forms that are input, processed, and output by information system are called this IT resource:
(Multiple Choice)
4.8/5
(30)
With continuous data protection (CDP) all data changes are data stamped and saved to secondary systems as the changes are happening.
(True/False)
4.9/5
(38)
The functions of the ______________________________ commonly include assigning passwords and making sure the IT organization is secure from physical threats.
(Short Answer)
4.9/5
(37)
A facility usually comprised of air-conditioned space with a raised floor, telephone connections, and computer ports, into which a subscriber can move equipment, is called a hot site.
(True/False)
4.9/5
(36)
A control plan that is designed to detect a fraud by having one employee periodically do the job of another employee is called :
(Multiple Choice)
4.9/5
(42)
Instructions for computer setup, required data, restart procedures, and error messages are typically contained in a(n):
(Multiple Choice)
4.7/5
(39)
The ______________________ is charged with safeguarding the IT organization.
(Short Answer)
4.7/5
(41)
A facility usually comprised of air-conditioned space with a raised floor, telephone connections, and computer ports, into which a subscriber can move equipment, is called a(n) ____________________.
(Short Answer)
4.9/5
(38)
Showing 121 - 140 of 157
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)