Filters
Question type

Study Flashcards

Segregation of duties consists of separating the four functions of authorizing events, ______________________________ events, ______________________________ events, and safeguarding the resources resulting from consummating the events.

Correct Answer

verifed

verified

executing,...

View Answer

The four events-processing functions that constitute the segregation of duties control plan are: The four events-processing functions that constitute the segregation of duties control plan are:    Required: Below is a list of ten events-processing activities, five relating to the cycle of activities involved in processing a sales event and seven relating to the cycle for a purchase event. Classify each of the twelve activities into one of the four functional categories listed above by placing the letter A, B, C, or D on the answer line to the left of each number. You should use only one letter for each of the answers.   Required: Below is a list of ten events-processing activities, five relating to the cycle of activities involved in processing a sales event and seven relating to the cycle for a purchase event. Classify each of the twelve activities into one of the four functional categories listed above by placing the letter A, B, C, or D on the answer line to the left of each number. You should use only one letter for each of the answers. The four events-processing functions that constitute the segregation of duties control plan are:    Required: Below is a list of ten events-processing activities, five relating to the cycle of activities involved in processing a sales event and seven relating to the cycle for a purchase event. Classify each of the twelve activities into one of the four functional categories listed above by placing the letter A, B, C, or D on the answer line to the left of each number. You should use only one letter for each of the answers.

Correct Answer

verifed

verified

A data replication strategy where all data changes are data stamped and saved to secondary systems as the changes are happening is called:


A) mirror site
B) electronic vaulting
C) continuous data protection (CDP)
D) Dumping

Correct Answer

verifed

verified

The IS function of quality assurance conducts reviews to ensure the attainment of IT objectives.

Correct Answer

verifed

verified

COBIT 5 has two main components: five _____________ and seven ________________.

Correct Answer

verifed

verified

GEIT principles, ena...

View Answer

Individual departments coordinate the organizational and IT strategic planning processes and reviews and approves the strategic IT plan.

Correct Answer

verifed

verified

______________________________ is the intentional unauthorized access of an organization's computer system, accomplished by bypassing the system's access security controls.

Correct Answer

verifed

verified

Computer hacking and...

View Answer

A fidelity bond indemnifies a company in case it suffers losses from defalcations committed by its employees.

Correct Answer

verifed

verified

Program change controls provide assurance that all modifications to programs are authorized and documented, and that the changes are completed, tested, and properly implemented.

Correct Answer

verifed

verified

A clerk receives checks and customer receipts in the mail. He endorses the checks, fills out the deposit slip, and posts the checks to the cash receipts events data. The clerk is exercising which functions?


A) recording and executing events
B) authorizing and executing events
C) recording and authorizing events
D) safeguarding of resources and authorizing events

Correct Answer

verifed

verified

The ______________________________ documentation portion of application documentation provides an overall description of the application, including the system's purpose; an overview of system procedures; and sample source documents, outputs, and reports.

Correct Answer

verifed

verified

The functions of the ______________________________ commonly include assigning passwords and making sure the IT organization is secure from physical threats.

Correct Answer

verifed

verified

Intrusion-prevention systems (IPS) actively block unauthorized traffic using rules specified by the organization.

Correct Answer

verifed

verified

Which of the following is not one of COBIT's four broad IT control process domains?


A) plan and organize
B) acquire and implement
C) repair and replace
D) monitor and evaluate

Correct Answer

verifed

verified

The ______________________________ is charged with safeguarding the IT organization.

Correct Answer

verifed

verified

Copies of important stored data, programs, and documentation made periodically are called ______________________________.

Correct Answer

verifed

verified

Antivirus is a technique to protect one network from another "untrusted" network.

Correct Answer

verifed

verified

The information systems function is synonymous with the accounting function.

Correct Answer

verifed

verified

In an information systems organization, which of the following reporting relationships makes the least sense?


A) The data center manager reports to the CIO.
B) The systems development manager reports to the data center manager.
C) Database administration reports to the technical services manager.
D) The data librarian reports to the data center manager.

Correct Answer

verifed

verified

Which of the following is not a strategic planning process?


A) IT-related requirements to comply with industry, regulatory, legal, and contractual obligations, including privacy, transborder data flows, e-business, and insurance contracts.
B) Acquisition and development schedules for hardware, software, and application systems and for personnel and financial requirements.
C) Systems development life cycle adoption to ensure that comprehensive documentation is developed for each application.
D) An inventory of current IT capabilities.

Correct Answer

verifed

verified

Showing 41 - 60 of 159

Related Exams

Show Answer