Services
Discover
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Business
Study Set
Accounting Information Systems Study Set 1
Exam 4: Internal Controls and Risks in IT Systems
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
Multiple Choice
In order to master risks and controls and how they fit together, which of the following is NOT one of the areas to fully understand?
Question 22
Multiple Choice
Large-scale IT systems should be protected by physical access controls.Which of the following is not listed as one of those controls?
Question 23
Multiple Choice
Risks associated with public cloud computing include all of the following, except:
Question 24
Multiple Choice
A new technology that is used to authenticate users is one that plugs into the USB port and eliminates the need for a card reader.This item is called a:
Question 25
Multiple Choice
This type of input check ensures that the batch of transactions is sorted in order, but does not help to find the missing transactions.
Question 26
Multiple Choice
Examples of Business Continuity include all of the following except:
Question 27
Multiple Choice
The software that controls the basic input and output activities of the computer are called:
Question 28
Multiple Choice
Which programmed input validation check determines whether the appropriate type of data, either alphabetic or numeric, was entered?
Question 29
Multiple Choice
The IT Governance Committee has several important responsibilities.Which of the following is not normally one of those responsibilities?
Question 30
Multiple Choice
The risk that an unauthorized user would shut down systems within the IT system is a(n) :
Question 31
Multiple Choice
The software that accomplishes end user tasks such as work processing, spreadsheets, and accounting functions is called:
Question 32
Multiple Choice
The process of proactively examining the IT system for weaknesses that can be exploited by hackers, viruses, or malicious employees is called:
Question 33
Multiple Choice
Nonrepudiation means that:
Question 34
Multiple Choice
This encryption method, used with wireless network equipment, is symmetric in that both the sending and receiving network nodes must use the same encryption key.It has been proven to be susceptible to hacking.