Question
Question 1 (1 point) The risk of an unauthorized user gaining access is likely to be a risk for which of the following areas? a
Question 1 (1 point) The risk of an unauthorized user gaining access is likely to be a risk for which of the following areas?
a telecommuting workers
b wireless networks
c Internet
d all of the above
Question 2 (1 point) True or False: Best practice is to change passwords at least every 90 days.
True False
Question 3 (1 point) Which of the following best describes the characteristics that help management determine if their directives are carried out and achieved?
a control environment
b control activities
c information and communication
d risk assessment
Question 4 (1 point) The control effectiveness of segregation of duties can be compromised through ___________.
a the absence of an internal audit function
b irregular employee reviews
c collusion among employees
d a lack of employee training
Question 5 (1 point) Proper segregation of duties calls for separation of the functions of ___________.
a authorization, payment, and recording
b custody, execution, and reporting
c authorization, recording, and custody
d authorization, execution, and payment
Question 6 (1 point) The risk that an unauthorized user could shut down systems is called ___________.
a condentiality risk
b processing integrity risk
c availability risk
d security risk
Question 7 (1 point) Which of the following is least likely to be a responsibility of the IT governance committee?
a aligning IT investments to business strategy
b overseeing and prioritizing changes to IT systems
c developing, monitoring, and reviewing security policies
d developing and maintaining the database and ensuring adequate controls over the database
Question 8 (1 point) The review of amounts billed to the company from a vendor that it purchased from is ___________.
a a customer review
b collusion
c a seller review
d a vendor audit
Question 9 (1 point) Which control activity serves as a method to conrm the accuracy or completeness of data in the accounting system?
a independent checks and reconciliations
b security of assets
c segregation of duties
d authorization
Question 10 (1 point) Which programmed input validation check compares the value in a eld relative to other fields? a completeness check
b reasonableness check
c validity check
d correctness check
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started