Exam 10: Processing Integrity and Availability Controls
Exam 1: Accounting Information Systems: an Overview94 Questions
Exam 2: Overview of Transaction Processing and Enterprise Resource Planning Systems95 Questions
Exam 3: Systems Documentation Techniques102 Questions
Exam 4: Relational Databases98 Questions
Exam 5: Computer Fraud60 Questions
Exam 6: Computer Fraud and Abuse Techniques60 Questions
Exam 7: Control and Accounting Information Systems100 Questions
Exam 8: Controls for Information Security69 Questions
Exam 9: Confidentiality and Privacy Controls51 Questions
Exam 10: Processing Integrity and Availability Controls81 Questions
Exam 11: Auditing Computer-Based Information Systems93 Questions
Exam 12: The Revenue Cycle: Sales to Cash Collections100 Questions
Exam 13: The Expenditure Cycle: Purchasing to Cash Disbursements100 Questions
Exam 14: The Production Cycle86 Questions
Exam 15: The Human Resources Management and Payroll Cycle77 Questions
Exam 16: General Ledger and Reporting System74 Questions
Exam 17: Database Design Using the Rea Data Model80 Questions
Exam 18: Implementing an Rea Model in a Relational Database84 Questions
Exam 19: Special Topics in Rea Modeling90 Questions
Exam 20: Introduction to Systems Development and Systems Analysis100 Questions
Exam 21: Ais Development Strategies97 Questions
Exam 22: Systems Design,implementation,and Operation92 Questions
Select questions type
A ________ ensures input data will fit into the assigned field.
(Multiple Choice)
4.9/5
(33)
The accounting department at Aglaya Telecom records an average of 2,500 transactions per hour.Managers state that the maximum acceptable loss of data in the event of a system failure is 2,500 transactions.The firm's recovery point objective is therefore
(Multiple Choice)
4.7/5
(38)
This tests a numerical amount to ensure that it does not exceed a predetermined value.
(Multiple Choice)
4.8/5
(42)
A computer operator accidentally used the wrong master file when updating a transaction file.As a result,the master file data is now unreadable.Which control could best have prevented this from happening?
(Multiple Choice)
4.8/5
(38)
What is the primary objective of ensuring systems and information are available for use whenever needed?
(Multiple Choice)
4.8/5
(33)
This control protects records from errors that occur when two or more users attempt to update the same record simultaneously.
(Multiple Choice)
4.9/5
(38)
________ involves copying only the data items that have changed since the last partial backup.
(Multiple Choice)
4.8/5
(41)
The data entry control that would best prevent entering an invoice received from a vendor who is not on an authorized supplier list is
(Multiple Choice)
4.9/5
(36)
Which COBIT5 management practice addresses system backup procedures?
(Multiple Choice)
4.8/5
(45)
This control entails verifying that the proper number of bits are set to the value 1 in each character received.
(Multiple Choice)
4.8/5
(43)
While this type of backup process takes longer than the alternative,restoration is easier and faster.
(Multiple Choice)
4.8/5
(31)
This control ensures that the correct and most current files are being updated.
(Multiple Choice)
4.8/5
(40)
Which of the following is a control is an important way to prevent buffer overflow vulnerabilities?
(Multiple Choice)
4.8/5
(44)
True or False: Best practice requires backups be retained indefinitely.
(True/False)
4.9/5
(33)
Identify one organization that quickly recovered from September 11th,2001 due to its disaster recovery and business continuity plan.
(Multiple Choice)
4.9/5
(32)
To protect against malware,it is important that antivirus software automatically examine ________ introduced into a system.
(Multiple Choice)
4.8/5
(34)
Showing 21 - 40 of 81
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)