Exam 8: Auditing Computer-Based Information Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Data conversion checks are an example of

(Multiple Choice)
4.8/5
(34)

Chaz Finnerty called the IT Help Desk in a huff."I'm trying to open an Excel file and I get a message that says that the file is locked for editing.What's going on?" The answer is that

(Multiple Choice)
4.8/5
(40)

User reviews are an example of

(Multiple Choice)
4.9/5
(31)

The accounting department at Synergy Hydroelectric records an average of 12,500 transactions per hour.By cost-benefit analysis,managers have concluded that the maximum acceptable loss of data in the event of a system failure is 25,000 transactions.If the firm's recovery time objective is 120 minutes,then the worst case recovery time objective is

(Multiple Choice)
4.8/5
(42)

Data matching is an example of

(Multiple Choice)
4.8/5
(37)

Every organization should have a disaster recovery plan so that data processing capacity can be restored as smoothly and quickly as possible.Which item below would not typically be part of an adequate disaster recovery plan?

(Multiple Choice)
4.8/5
(32)

This compares the results produced by more than one method to verify accuracy.

(Multiple Choice)
4.8/5
(32)

The accounting department at Synergy Hydroelectric records an average of 12,500 transactions per hour.By cost-benefit analysis,managers have concluded that the maximum acceptable loss of data in the event of a system failure is 25,000 transactions.The firm's recovery point objective is therefore

(Multiple Choice)
4.8/5
(29)

When a computer system's files are automatically duplicated on a second data storage system as they are changed,the process is referred to as

(Multiple Choice)
4.8/5
(33)

This determines the correctness of the logical relationship between two data items.

(Multiple Choice)
4.8/5
(34)

Identify four processing controls.

(Essay)
4.8/5
(36)

A location that is pre-wired for necessary telecommunications and computer equipment.

(Multiple Choice)
4.9/5
(42)

Batch totals are an example of

(Multiple Choice)
4.9/5
(37)

Describe some steps you can take to minimize your risk of identify theft.

(Essay)
4.7/5
(31)

The devices that direct TCP/IP packets to their destinations are called

(Multiple Choice)
4.7/5
(38)

Visual scanning is an example of

(Multiple Choice)
4.8/5
(33)

What is the most effective way to ensure information system availability?

(Multiple Choice)
4.7/5
(27)
Showing 61 - 77 of 77
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)