Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Business
Study Set
Accounting Information Systems Study Set 1
Quiz 8: Controlling Information Systems: Introduction to Pervasive Controls
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 101
Short Answer
______________________________ controls provide assurance that all modifications to programs are authorized and documented, and that the changes are completed, tested, and properly implemented.
Question 102
Short Answer
______________________________ is a process that employs mathematical algorithms and encryption keys to encode data (i.e., change un-encoded data, called plaintext, to a coded text form, called ciphertext) so that it is unintelligible.
Question 103
Short Answer
______________________________ are particularly important because they operate across all business processes and affect a company's capability to meet a multitude of control goals.
Question 104
Short Answer
Segregation of duties consists of separating the four functions of authorizing events, ______________________________ events, ______________________________ events, and safeguarding the resources resulting from consummating the events.
Question 105
Multiple Choice
Protecting resources against environmental hazards might include all of the following control plans except:
Question 106
Short Answer
The ______________________________ is charged with safeguarding the IT organization.
Question 107
Short Answer
The ______________________________ function provides efficient and effective operation of the computer equipment by performing tasks such as mounting tapes, disks, and other media and monitoring equipment operation.
Question 108
Short Answer
Combining the functions of authorizing and executing events is a violation of the organizational control plan known as ______________________________.
Question 109
Short Answer
The ______________________________ maintains custody of and controls access to programs, files, and documentation.
Question 110
Short Answer
______________________________ in an internal control system means assessment by management to determine whether the control plans in place are continuing to function appropriately over time.
Question 111
Short Answer
Management should establish a(n) ______________________________ plan and implement related activities, including reviews, audits, and inspections, to ensure the attainment of IT customer requirements.
Question 112
Short Answer
The trust service principle of processing ______________________________ determines whether processing is complete, accurate, timely and authorized.
Question 113
Multiple Choice
Searching through rubbish for system information such as passwords is called:
Question 114
Short Answer
A small organization that does not have enough personnel to adequately segregate duties must rely on alternative controls, commonly called ______________________________.
Question 115
Short Answer
One method for circumventing segregation of duties is ______________________________ between one or more persons (or departments) to exploit a system and conceal an abuse such as fraud.