Services
Discover
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Business
Study Set
Accounting Information Systems Study Set 6
Exam 10: Processing Integrity and Availability Controls
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 1
Multiple Choice
Error logs and review are an example of
Question 2
Multiple Choice
The best example of an effective payroll transaction file record count would most likely be
Question 3
Multiple Choice
A facility that contains all the computing equipment the organization needs to perform its essential business activities is known as a
Question 4
Multiple Choice
When opening an Excel file,Sonja received a message saying that the file is locked for editing.This is happening because
Question 5
Multiple Choice
The maximum acceptable down time after a computer system failure is determined by a company's
Question 6
Multiple Choice
Which of the following is an important control to prevent buffet overflow vulnerabilities?
Question 7
Multiple Choice
A ________ is a data entry control that compares the ID number in transaction data to a master file to verify that the ID number exists.
Question 8
Essay
Define and contrast a recovery point objective and a recovery time objective.Provide a numeric example.
Question 9
Multiple Choice
Identify the most important component of a disaster recovery plan below.
Question 10
Multiple Choice
A payroll clerk accidentally entered an employee's hours worked for the week as 380 instead of 38.The data entry control that would best prevent this error would be
Question 11
Multiple Choice
Turnaround documents are an example of a(n)
Question 12
Multiple Choice
Which of the following data entry controls would not be useful if you are recording the checkout of library books by members?
Question 13
Multiple Choice
What control are zero balance tests an example of?
Question 14
Multiple Choice
A ________ determines if all required data items have been entered.
Question 15
Multiple Choice
To protect against malware,it is important that antivirus software automatically examine ________ introduced into a system.
Question 16
Essay
According to COBIT 5,what should be the common features for locating and designing data centers housing mission-critical servers and databases?
Question 17
Multiple Choice
A computer operator accidentally used the wrong master file when updating a transaction file.As a result,the master file data is now unreadable.Which control could best have prevented this from happening?