Filters
Question type

Study Flashcards

The process whereby lost data is restored and operations are continued is called ______________________________.

Correct Answer

verifed

verified

COBIT was developed to:


A) provide guidance to managers, users, and auditors on the best practices for the management of information technology
B) identify specific control plans that should be implemented to reduce the occurrence of fraud
C) specify the components of an information system that should be installed in an e-commerce environment
D) suggest the type of information that should be made available for management decision making

Correct Answer

verifed

verified

In a(n) ______________________________ a Web site is overwhelmed by an intentional onslaught of thousands of simultaneous messages, making it impossible for the attacked site to engage in its normal activities.

Correct Answer

verifed

verified

denial of ...

View Answer

The ______________________________ gives detailed instructions to computer operators and to data control about a particular application.

Correct Answer

verifed

verified

operations...

View Answer

Listed below are several pervasive control plans discussed in Chapter 8. On the blank line to the left of each control plan, insert a "P" (preventive), "D" (detective), or "C" (corrective) to best classify that control. If applicable, more than one code may be inserted for each plan. Listed below are several pervasive control plans discussed in Chapter 8. On the blank line to the left of each control plan, insert a  P  (preventive),  D  (detective), or  C  (corrective) to best classify that control. If applicable, more than one code may be inserted for each plan.

Correct Answer

verifed

verified

The IS function with the responsibility of guiding the IT organization in establishing and meeting user information requirements is the IT steering committee.

Correct Answer

verifed

verified

Watching a user type in passwords or user IDs or listening as they give account information over the phone is called ______________________________.

Correct Answer

verifed

verified

An outside auditing firm annually supervises a physical count of the items in a retail store's shelf inventory. This is an example of:


A) authorizing events
B) executing events
C) recording events
D) safeguarding resources

Correct Answer

verifed

verified

______________________________ documentation provides a description of an application computer program and usually includes the program's purpose, program flowcharts, and source code listings.

Correct Answer

verifed

verified

The ______________________________ group is responsible for routing all work in to and out of the data center, correcting errors, and monitoring all error correction.

Correct Answer

verifed

verified

The functions of the security officer commonly include assigning passwords and working with human resources to ensure proper interview practices are conducted during the hiring process.

Correct Answer

verifed

verified

The operations run manual describes user procedures for an application and assists the user in preparing inputs and using outputs.

Correct Answer

verifed

verified

The systems development function provides efficient and effective operation of the computer equipment.

Correct Answer

verifed

verified

Periodic cleaning, testing, and adjusting of computer equipment is referred to as ______________________________.

Correct Answer

verifed

verified

preventive...

View Answer

Alternative names for contingency planning include all of the following except:


A) disaster recovery planning
B) business interruption planning
C) business disaster planning
D) business continuity planning

Correct Answer

verifed

verified

Pervasive control plans:


A) are unrelated to applications control plans
B) are a subset of applications control plans
C) influence the effectiveness of applications control plans
D) increase the efficiency of applications control plans

Correct Answer

verifed

verified

One method for circumventing segregation of duties is ______________________________ between one or more persons (or departments) to exploit a system and conceal an abuse such as fraud.

Correct Answer

verifed

verified

______________________________ helps to solve the problem posed by single key cryptography by employing a pair of matched keys for each system user, one private (i.e., known only to the party who possesses it) and one public.

Correct Answer

verifed

verified

Public-key...

View Answer

The function composed of people, procedures, and equipment and is typically called the information systems department, IS department, or the IT department is the information systems organization.

Correct Answer

verifed

verified

Showing 141 - 159 of 159

Related Exams

Show Answer