Exam 10: Processing Integrity and Availability Controls
Exam 1: Conceptual Foundations of Accounting Information Systems115 Questions
Exam 2: Overview of Transaction Processing and Enterprise Resource Planning Systems107 Questions
Exam 3: Systems Documentation Techniques108 Questions
Exam 4: Relational Databases113 Questions
Exam 5: Computer Fraud83 Questions
Exam 6: Computer Fraud and Abuse Techniques96 Questions
Exam 7: Control and Accounting Information Systems132 Questions
Exam 8: Controls for Information Security100 Questions
Exam 9: Confidentiality and Privacy Controls61 Questions
Exam 10: Processing Integrity and Availability Controls95 Questions
Exam 11: Auditing Computer-Based Information Systems116 Questions
Exam 12: The Revenue Cycle: Sales to Cash Collections108 Questions
Exam 13: The Expenditure Cycle: Purchasing to Cash Disbursements108 Questions
Exam 14: The Production Cycle95 Questions
Exam 15: The Human Resources Management and Payroll Cycle86 Questions
Exam 16: General Ledger and Reporting System83 Questions
Exam 17: Database Design Using the Rea Data Model90 Questions
Exam 18: Implementing an Rea Model in a Relational Database98 Questions
Exam 19: Special Topics in Rea Modeling98 Questions
Exam 20: Introduction to Systems Development and Systems Analysis124 Questions
Exam 21: Ais Development Strategies117 Questions
Exam 22: Systems Design, implementation, and Operation105 Questions
Select questions type
Error logs and review are an example of
Free
(Multiple Choice)
4.9/5
(37)
Correct Answer:
A
The best example of an effective payroll transaction file record count would most likely be
Free
(Multiple Choice)
4.9/5
(33)
Correct Answer:
B
A facility that contains all the computing equipment the organization needs to perform its essential business activities is known as a
Free
(Multiple Choice)
4.8/5
(30)
Correct Answer:
B
When opening an Excel file,Sonja received a message saying that the file is locked for editing.This is happening because
(Multiple Choice)
5.0/5
(37)
The maximum acceptable down time after a computer system failure is determined by a company's
(Multiple Choice)
4.9/5
(32)
Which of the following is an important control to prevent buffet overflow vulnerabilities?
(Multiple Choice)
4.8/5
(46)
A ________ is a data entry control that compares the ID number in transaction data to a master file to verify that the ID number exists.
(Multiple Choice)
4.8/5
(36)
Define and contrast a recovery point objective and a recovery time objective.Provide a numeric example.
(Essay)
4.8/5
(34)
Identify the most important component of a disaster recovery plan below.
(Multiple Choice)
4.8/5
(39)
A payroll clerk accidentally entered an employee's hours worked for the week as 380 instead of 38.The data entry control that would best prevent this error would be
(Multiple Choice)
4.7/5
(42)
Which of the following data entry controls would not be useful if you are recording the checkout of library books by members?
(Multiple Choice)
4.9/5
(35)
A ________ determines if all required data items have been entered.
(Multiple Choice)
4.9/5
(37)
To protect against malware,it is important that antivirus software automatically examine ________ introduced into a system.
(Multiple Choice)
4.9/5
(38)
According to COBIT 5,what should be the common features for locating and designing data centers housing mission-critical servers and databases?
(Essay)
4.8/5
(40)
A computer operator accidentally used the wrong master file when updating a transaction file.As a result,the master file data is now unreadable.Which control could best have prevented this from happening?
(Multiple Choice)
4.8/5
(38)
The maximum amount of time between backups is determined by a company's
(Multiple Choice)
4.9/5
(33)
Which of the following is an example of a turnaround document?
(Multiple Choice)
4.8/5
(30)
Showing 1 - 20 of 95
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)