Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Business
Study Set
Accounting Information Systems Study Set 4
Quiz 8: Controlling Information Systems: Introduction to Pervasive Controls
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 101
Essay
______________________________ is a process that employs mathematical algorithms and encryption keys to encode data (i.e. ,change un-encoded data,called plaintext,to a coded text form,called ciphertext)so that it is unintelligible.
Question 102
Multiple Choice
Protecting resources against environmental hazards might include all of the following control plans except:
Question 103
Essay
______________________________ is a process that ensures that the enterprise's IT sustains and extends the organization's strategies and objectives.
Question 104
Essay
A small organization that does not have enough personnel to adequately segregate duties must rely on alternative controls,commonly called ______________________________.
Question 105
Essay
Management should establish a(n)______________________________ plan and implement related activities,including reviews,audits,and inspections,to ensure the attainment of IT customer requirements.
Question 106
Essay
______________________________ in an internal control system means assessment by management to determine whether the control plans in place are continuing to function appropriately over time.
Question 107
Essay
______________________________ controls provide assurance that all modifications to programs are authorized and documented,and that the changes are completed,tested,and properly implemented.
Question 108
Essay
Combining the functions of authorizing and executing events is a violation of the organizational control plan known as ______________________________.
Question 109
Essay
Segregation of duties consists of separating the four functions of authorizing events,______________________________ events,______________________________ events,and safeguarding the resources resulting from consummating the events.
Question 110
Essay
The ______________________________ group is responsible for routing all work in to and out of the data center,correcting errors,and monitoring all error correction.
Question 111
Essay
One method for circumventing segregation of duties is ______________________________ between one or more persons (or departments)to exploit a system and conceal an abuse such as fraud.
Question 112
Essay
The trust service principle of processing ______________________________ determines whether processing is complete,accurate,timely and authorized.
Question 113
Multiple Choice
Searching through rubbish for system information such as passwords is called:
Question 114
Essay
The ______________________________ is charged with safeguarding the IT organization.
Question 115
Essay
The functions of the ______________________________ commonly include assigning passwords and making sure the IT organization is secure from physical threats.
Question 116
Essay
The ______________________________ maintains custody of and controls access to programs,files,and documentation.
Question 117
Essay
______________________________ are particularly important because they operate across all business processes and affect a company's capability to meet a multitude of control goals.
Question 118
Essay
The ______________________________ function provides efficient and effective operation of the computer equipment by performing tasks such as mounting tapes,disks,and other media and monitoring equipment operation.