Exam 10: Processing Integrity and Availability Controls

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Error logs and review are an example of

Free
(Multiple Choice)
4.9/5
(37)
Correct Answer:
Verified

A

The best example of an effective payroll transaction file record count would most likely be

Free
(Multiple Choice)
4.9/5
(33)
Correct Answer:
Verified

B

A facility that contains all the computing equipment the organization needs to perform its essential business activities is known as a

Free
(Multiple Choice)
4.8/5
(30)
Correct Answer:
Verified

B

When opening an Excel file,Sonja received a message saying that the file is locked for editing.This is happening because

(Multiple Choice)
5.0/5
(37)

The maximum acceptable down time after a computer system failure is determined by a company's

(Multiple Choice)
4.9/5
(32)

Which of the following is an important control to prevent buffet overflow vulnerabilities?

(Multiple Choice)
4.8/5
(46)

A ________ is a data entry control that compares the ID number in transaction data to a master file to verify that the ID number exists.

(Multiple Choice)
4.8/5
(36)

Define and contrast a recovery point objective and a recovery time objective.Provide a numeric example.

(Essay)
4.8/5
(34)

Identify the most important component of a disaster recovery plan below.

(Multiple Choice)
4.8/5
(39)

A payroll clerk accidentally entered an employee's hours worked for the week as 380 instead of 38.The data entry control that would best prevent this error would be

(Multiple Choice)
4.7/5
(42)

Turnaround documents are an example of a(n)

(Multiple Choice)
4.9/5
(44)

Which of the following data entry controls would not be useful if you are recording the checkout of library books by members?

(Multiple Choice)
4.9/5
(35)

What control are zero balance tests an example of?

(Multiple Choice)
4.7/5
(42)

A ________ determines if all required data items have been entered.

(Multiple Choice)
4.9/5
(37)

To protect against malware,it is important that antivirus software automatically examine ________ introduced into a system.

(Multiple Choice)
4.9/5
(38)

According to COBIT 5,what should be the common features for locating and designing data centers housing mission-critical servers and databases?

(Essay)
4.8/5
(40)

A computer operator accidentally used the wrong master file when updating a transaction file.As a result,the master file data is now unreadable.Which control could best have prevented this from happening?

(Multiple Choice)
4.8/5
(38)

The maximum amount of time between backups is determined by a company's

(Multiple Choice)
4.9/5
(33)

Which of the following is an example of a turnaround document?

(Multiple Choice)
4.8/5
(30)

Sequentially prenumbered forms are an example of a(n)

(Multiple Choice)
4.8/5
(35)
Showing 1 - 20 of 95
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)