Filters
Question type

Study Flashcards

A policy that requires employees to alternate jobs periodically is called:


A) segregation of duties
B) forced vacations
C) rotation of duties
D) personnel planning

Correct Answer

verifed

verified

______________________________ in an internal control system means assessment by management to determine whether the control plans in place are continuing to function appropriately over time.

Correct Answer

verifed

verified

With the data replication strategy known as ______________________________ all data changes are data stamped and saved to secondary systems as the changes are happening.

Correct Answer

verifed

verified

continuous data prot...

View Answer

The disaster recovery strategy known as a(n)______________________________ is a fully equipped data center that is made available on a standby basis to client companies for a monthly subscriber's fee.

Correct Answer

verifed

verified

______________________________ documentation provides a description of an application computer program and usually includes the program's purpose,program flowcharts,and source code listings.

Correct Answer

verifed

verified

A data replication strategy where all data changes are data stamped and saved to secondary systems as the changes are happening is called:


A) mirror site
B) electronic vaulting
C) continuous data protection (CDP)
D) Dumping

Correct Answer

verifed

verified

The disaster backup and recovery technique known as electronic vaulting is a service whereby data changes are automatically transmitted over the Internet on a continuous basis to an off-site server maintained by a third party.

Correct Answer

verifed

verified

The use of IT resources for enterprise systems and e-business:


A) magnifies the importance of protecting the resources both within and outside of the organization from risks
B) magnifies the importance of protecting the resources both within but not outside the of the organization from risks
C) makes it easier to provide internal control risk when IT resources are interlinked
D) none of the above

Correct Answer

verifed

verified

Pervasive control plans:


A) are unrelated to applications control plans
B) are a subset of applications control plans
C) influence the effectiveness of applications control plans
D) increase the efficiency of applications control plans

Correct Answer

verifed

verified

This logs and monitors who is on or trying to access an organization's network.


A) biometrics
B) electronic vaulting
C) intrusion detection systems (IDS)
D) firewall

Correct Answer

verifed

verified

______________________________ controls provide assurance that all modifications to programs are authorized and documented,and that the changes are completed,tested,and properly implemented.

Correct Answer

verifed

verified

The four events-processing functions that constitute the segregation of duties control plan are: The four events-processing functions that constitute the segregation of duties control plan are:     Required: Below is a list of ten events-processing activities,five relating to the cycle of activities involved in processing a sales event and seven relating to the cycle for a purchase event.Classify each of the twelve activities into one of the four functional categories listed above by placing the letter A,B,C,or D on the answer line to the left of each number.You should use only one letter for each of the answers.   Required: Below is a list of ten events-processing activities,five relating to the cycle of activities involved in processing a sales event and seven relating to the cycle for a purchase event.Classify each of the twelve activities into one of the four functional categories listed above by placing the letter A,B,C,or D on the answer line to the left of each number.You should use only one letter for each of the answers. The four events-processing functions that constitute the segregation of duties control plan are:     Required: Below is a list of ten events-processing activities,five relating to the cycle of activities involved in processing a sales event and seven relating to the cycle for a purchase event.Classify each of the twelve activities into one of the four functional categories listed above by placing the letter A,B,C,or D on the answer line to the left of each number.You should use only one letter for each of the answers.

Correct Answer

verifed

verified

The ______________________________ is charged with safeguarding the IT organization.

Correct Answer

verifed

verified

A warehouse supervisor prepares a sales order listing items to be shipped to a customer and then signs it approving the removal of the items from the warehouse.The supervisor is performing which functions?


A) authorizing events and safeguarding of resources
B) executing and recording events
C) authorizing and executing events
D) authorizing and recording events

Correct Answer

verifed

verified

Embezzlement is a fraud committed by two or more individuals or departments.

Correct Answer

verifed

verified

______________________________ is a process that employs mathematical algorithms and encryption keys to encode data (i.e. ,change un-encoded data,called plaintext,to a coded text form,called ciphertext)so that it is unintelligible.

Correct Answer

verifed

verified

______________________________ identification systems identify authorized personnel through some unique physical trait such as fingers,hands,voice,eyes,face,and writing dynamics.

Correct Answer

verifed

verified

In an online environment,______________________________ ensures that only authorized users gain access to a system through a process of identification (e.g. ,a unique account number for each user)and authentication.

Correct Answer

verifed

verified

access con...

View Answer

A key control concern is that certain people within an organization have easy access to applications programs and data files.The people are:


A) data librarians
B) systems programmers
C) systems development
D) data center managers

Correct Answer

verifed

verified

A(n)______________________________ is a technique to protect one network from another "untrusted" network.

Correct Answer

verifed

verified

Showing 81 - 100 of 159

Related Exams

Show Answer