Exam 10: Processing Integrity and Availability Controls

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

A facility that is pre-wired for necessary telecommunications and computer equipment,but doesn't have equipment installed,is known as a

(Multiple Choice)
4.8/5
(38)

________ involves copying only the data items that have changed since the last partial backup.

(Multiple Choice)
4.8/5
(33)

________ is a plan that specifies how to resume not only IT operations but all business processes in the event of a major calamity.

(Multiple Choice)
4.7/5
(37)

Which COBIT5 management practice addresses the importance of locating and designing the data centers housing mission-critical servers and databases so as to minimize the risks associated with natural and human-caused disasters?

(Multiple Choice)
4.9/5
(46)

Which of the following is not a risk associated with the data input process?

(Multiple Choice)
4.7/5
(38)

Define and contrast a recovery point objective and a recovery time objective.Provide a numeric example.

(Essay)
4.9/5
(35)

When a computer system's files are automatically duplicated on a second data storage system as they are changed,the process is referred to as

(Multiple Choice)
4.8/5
(41)

What control are zero balance tests an example of?

(Multiple Choice)
4.9/5
(45)

Identify the most important component of a disaster recovery plan below.

(Multiple Choice)
4.7/5
(40)

A ________ is a data entry control that compares the ID number in transaction data to a master file to verify that the ID number exists.

(Multiple Choice)
4.8/5
(28)

Form design is one example of a(n)

(Multiple Choice)
4.8/5
(32)

A ________ tests a numerical amount to ensure that it does not exceed a predetermined value.

(Multiple Choice)
4.9/5
(37)

Sequentially prenumbered forms are an example of a(n)

(Multiple Choice)
4.9/5
(44)

What is the primary objective of ensuring systems and information are available for use whenever needed?

(Multiple Choice)
4.9/5
(29)

Which of the following is an important control to prevent buffet overflow vulnerabilities?

(Multiple Choice)
4.7/5
(39)
Showing 81 - 95 of 95
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)