Services
Discover
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Business
Study Set
Accounting Information Systems Study Set 3
Exam 8: Controlling Information Systems: Introduction to Pervasive Controls
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 1
True/False
Combining the functions of authorizing and executing events is a violation of the organizational control plan known as segregation of duties.
Question 2
Multiple Choice
Which of the following is not one of COBIT's four broad IT control process domains?
Question 3
True/False
Forced vacations is a policy of requiring an employee to take leave from the job and substituting another employee in his or her place.
Question 4
True/False
As an IT resource, applications are automated systems and manual procedures that process information.
Question 5
True/False
The operations run manual describes user procedures for an application and assists the user in preparing inputs and using outputs.
Question 6
Short Answer
The information systems function ______________________________ provides efficient and effective operation of the computer equipment by performing tasks such as mounting tapes, disks, and other media and monitoring equipment operation.
Question 7
True/False
The functions of the security officer commonly include assigning passwords and working with human resources to ensure proper interview practices are conducted during the hiring process.
Question 8
Multiple Choice
All of the following are components of a backup and recovery strategy except:
Question 9
Multiple Choice
In an information systems organization structure, the three functions that might logically report directly to the CIO would be:
Question 10
True/False
A small organization that does not have enough personnel to adequately segregate duties must rely on alternative controls, commonly called resource controls.
Question 11
Multiple Choice
Which of the following controls restrict access to programs, data, and documentation?
Question 12
Short Answer
The disaster recovery strategy known as a(n) ____________________ is a fully equipped data center that is made available on a standby basis to client companies for a monthly subscriber's fee.
Question 13
True/False
An intrusion-detection systems (IDS) logs and monitors who is on or trying to access the network.
Question 14
Multiple Choice
Protecting resources against environmental hazards might include all of the following control plans except:
Question 15
Multiple Choice
The department or function that develops and operates an organization's information systems is often called the:
Question 16
Short Answer
The ____________________ documentation provides an overall description of the application, including the system's purpose; an overview of system procedures; and sample source documents, outputs, and reports.