Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Business
Study Set
Accounting Information Systems Study Set 4
Quiz 8: Controlling Information Systems: Introduction to Pervasive Controls
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 141
Essay
The first list below contains 10 control plans discussed in Chapter 8.The second list describes 10 system failures that have control implications. Required: On the answer line to the left of each system failure,insert the capital letter from the first list of the best control plan to prevent the system failure from occurring.If you can't find a control that will prevent the failure,then choose a detective or a corrective plan.A letter should be used only once.
Question 142
Essay
Periodic cleaning,testing,and adjusting of computer equipment is referred to as ______________________________.
Question 143
Essay
A(n)______________________________ uses many computers,called zombies,that unwittingly cooperate in a denial-of-service attack by sending messages to the target Web site.
Question 144
Essay
Copies of important stored data,programs,and documentation made periodically are called ______________________________.
Question 145
Essay
Listed below are several pervasive control plans discussed in Chapter 8.On the blank line to the left of each control plan,insert a "P" (preventive),"D" (detective),or "C" (corrective)to best classify that control.If applicable,more than one code may be inserted for each plan.
Question 146
Essay
The first list below contains 10 control plans discussed in Chapter 8.The second list describes 10 system failures that have control implications. Required: On the answer line to the left of each system failure,insert the capital letter from the first list of the best control plan to prevent the system failure from occurring.(If you can't find a control that will prevent the failure,then choose a detective or corrective control plan).A letter should be used only once.
Question 147
Essay
The ______________________________ actively blocks unauthorized traffic using rules specified by an organization.
Question 148
Essay
Below is a list of ten functional titles for the information systems organization structure shown in Chapter 8.The second list contains descriptions (some partial)of the duties and responsibilities of ten of the functions. Required: On the blank line to the left of each numbered description,place the capital letter of the functional title that best matches the duties and responsibilities described.Do not use a letter more than once.
Question 149
Essay
COBIT 5 has two main components: five _____________ and seven ________________.
Question 150
Essay
The four events-processing functions that constitute the segregation of duties control plan are:
Required: Below is a list of ten events-processing activities,five relating to the cycle of activities involved in processing a sales event and seven relating to the cycle for a purchase event.Classify each of the twelve activities into one of the four functional categories listed above by placing the letter A,B,C,or D on the answer line to the left of each number.You should use only one letter for each of the answers.
Question 151
Essay
In an online environment,______________________________ ensures that only authorized users gain access to a system through a process of identification (e.g. ,a unique account number for each user)and authentication.