Filters
Question type

Study Flashcards

The control concern that there will be a high risk of data conversion errors relates primarily to which of the following information systems functions?


A) data control
B) data entry
C) data librarian
D) database administration

Correct Answer

verifed

verified

A facility usually comprised of air-conditioned space with a raised floor, telephone connections, and computer ports, into which a subscriber can move equipment, is called a hot site.

Correct Answer

verifed

verified

Instructions for computer setup, required data, restart procedures, and error messages are typically contained in a(n) :


A) systems development standards manual
B) program documentation manual
C) operations run manual
D) application documentation manual

Correct Answer

verifed

verified

The disaster backup and recovery technique known as electronic vaulting is a service whereby data changes are automatically transmitted over the Internet on a continuous basis to an off-site server maintained by a third party.

Correct Answer

verifed

verified

Top 10 management concerns about IT's capability to support an organization's vision and strategy include all except the following:


A) IT and business alignment
B) security and privacy
C) the Internet
D) retaining IT professionals

Correct Answer

verifed

verified

Copies of important stored data, programs, and documentation made periodically are called ____________________.

Correct Answer

verifed

verified

The ___________________________________ actively blocks unauthorized traffic using rules specified by an organization.

Correct Answer

verifed

verified

intrusion-...

View Answer

Data in all their forms that are input, processed, and output by information system are called this IT resource:


A) Information
B) Applications
C) Infrastructure
D) People

Correct Answer

verifed

verified

Personnel development control plans consist of each of the following except:


A) checking employment references
B) providing sufficient and timely training
C) supporting employee educational interests and pursuits
D) performing scheduled evaluations

Correct Answer

verifed

verified

The functions of the ______________________________ commonly include assigning passwords and making sure the IT organization is secure from physical threats.

Correct Answer

verifed

verified

From the standpoint of achieving the operations system control goal of security of resources, which of the following segregation of duties possibilities is least important?


A) between systems programming and computer operations
B) between data control and data preparation personnel
C) between systems development and computer operators
D) between technical services and data center

Correct Answer

verifed

verified

The IS function with the principal responsibilities of insuring the security of all information systems function resources is data control.

Correct Answer

verifed

verified

In an online environment, ________________________ ensures that only authorized users gain access to a system through a process of identification (e.g., a unique account number for each user) and authentication.

Correct Answer

verifed

verified

access con...

View Answer

A control plan that is designed to detect a fraud by having one employee periodically do the job of another employee is called :


A) segregation of duties
B) forced vacations
C) periodic audits
D) management control

Correct Answer

verifed

verified

A facility usually comprised of air-conditioned space with a raised floor, telephone connections, and computer ports, into which a subscriber can move equipment, is called a(n) ____________________.

Correct Answer

verifed

verified

A clerk receives checks and customer receipts in the mail.He endorses the checks, fills out the deposit slip, and posts the checks to the cash receipts events data.The clerk is exercising which functions?


A) recording and executing events
B) authorizing and executing events
C) recording and authorizing events
D) safeguarding of resources and authorizing events

Correct Answer

verifed

verified

The ______________________ is charged with safeguarding the IT organization.

Correct Answer

verifed

verified

With continuous data protection (CDP) all data changes are data stamped and saved to secondary systems as the changes are happening.

Correct Answer

verifed

verified

Computer software that is used to facilitate the execution of a given business process is called ___________________________________.

Correct Answer

verifed

verified

applicatio...

View Answer

______________________________ is a policy of requiring an employee to take leave from the job and substituting another employee in his or her place.

Correct Answer

verifed

verified

Showing 121 - 140 of 157

Related Exams

Show Answer