Exam 10: Processing Integrity and Availability Controls
Exam 1: Conceptual Foundations of Accounting Information Systems115 Questions
Exam 2: Overview of Transaction Processing and Enterprise Resource Planning Systems107 Questions
Exam 3: Systems Documentation Techniques108 Questions
Exam 4: Relational Databases113 Questions
Exam 5: Computer Fraud83 Questions
Exam 6: Computer Fraud and Abuse Techniques96 Questions
Exam 7: Control and Accounting Information Systems132 Questions
Exam 8: Controls for Information Security100 Questions
Exam 9: Confidentiality and Privacy Controls61 Questions
Exam 10: Processing Integrity and Availability Controls95 Questions
Exam 11: Auditing Computer-Based Information Systems116 Questions
Exam 12: The Revenue Cycle: Sales to Cash Collections108 Questions
Exam 13: The Expenditure Cycle: Purchasing to Cash Disbursements108 Questions
Exam 14: The Production Cycle95 Questions
Exam 15: The Human Resources Management and Payroll Cycle86 Questions
Exam 16: General Ledger and Reporting System83 Questions
Exam 17: Database Design Using the Rea Data Model90 Questions
Exam 18: Implementing an Rea Model in a Relational Database98 Questions
Exam 19: Special Topics in Rea Modeling98 Questions
Exam 20: Introduction to Systems Development and Systems Analysis124 Questions
Exam 21: Ais Development Strategies117 Questions
Exam 22: Systems Design, implementation, and Operation105 Questions
Select questions type
A ________ determines whether the input data are of the proper type.
(Multiple Choice)
4.8/5
(39)
The accounting department at Aglaya Telecom records an average of 8,000 transactions per hour and have a recovery time objective of 240 minutes.Aglaya recently suffered a hardware malfunction and it took the company 16 hours to recover their lost data.How many transactions did Aglaya recover?
(Multiple Choice)
4.8/5
(29)
________ involves copying only the data items that have changed since the last partial backup.
(Multiple Choice)
4.9/5
(41)
A ________ control entails verifying that the proper number of bits are set to the value 1 in each character received.
(Multiple Choice)
4.9/5
(37)
When a computer system's files are automatically duplicated on a second data storage system as they are changed,the process is referred to as
(Multiple Choice)
4.8/5
(34)
The best example of an effective payroll transaction file financial total would most likely be
(Multiple Choice)
4.9/5
(35)
A ________ tests a numerical amount to ensure that it does not exceed a predetermined value.
(Multiple Choice)
4.9/5
(39)
Which of the following statements is true with regards to system availability?
(Multiple Choice)
4.9/5
(34)
The batch processing data entry control that sums the number of items in a batch is called
(Multiple Choice)
4.8/5
(38)
Which COBIT5 management practice addresses the importance of locating and designing the data centers housing mission-critical servers and databases so as to minimize the risks associated with natural and human-caused disasters?
(Multiple Choice)
4.8/5
(38)
________ is a data entry input control that requests each input data item and waits for an acceptable response,ensures that all necessary data are entered.
(Multiple Choice)
4.8/5
(44)
Modest Expectations Investment Services (MEIS)allows customers to manage their investments over the Internet.If customers attempt to sell more shares of a stock than they have in their account,an error message is displayed.This is an example of a
(Multiple Choice)
4.8/5
(39)
What is the primary objective of ensuring systems and information are available for use whenever needed?
(Multiple Choice)
4.8/5
(33)
Which of the following is not an objective of a disaster recovery plan?
(Multiple Choice)
4.8/5
(36)
Showing 81 - 95 of 95
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)