Card 0 of 20
Which organization created the COBIT framework?
The ISACA is the organization which created the COBIT framework.
Compare your answer with the correct one above
Per ISACA, beneficiaries of an implemented COBIT framework would include all of the following except:
The beneficiaries of an implemented COBIT framework should be those with more of a stake in the operations of the company.
Compare your answer with the correct one above
According to the ISACA when creating the COBIT framework, which of the following is not an attribute of the framework?
For any implemented process, a guarantee is never an attribute as nothing can guarantee ethical compliance.
Compare your answer with the correct one above
Which of the following is a person who enters data or uses the information processed by a system?
Users are any workers who enter data into a system or who use the information processed by the system. Users could be secretaries, administrators, accountants, auditors, CEOs, and so on.
Compare your answer with the correct one above
Which of the following is a person who designs and/or writes programs to collect, process, store, transform and distribute the data and information that are entered by the end users?
A software developer designs and/or writes the systems and/or programs to collect, process, store, transform and distribute the data and info that are entered by the end users.
Compare your answer with the correct one above
A service that allows customers to rent virtual servers and related services that can be used to develop and test new software applications is ____.
IT as a service is not a term, software as a service relates to applications hosted by a vendor, and platform as a service allows customers to host their own applications.
Compare your answer with the correct one above
What type of data processing system would be most appropriate for a company that is opening a new retail location?
A new retail location would be significantly improved with real time processing in inventory.
Compare your answer with the correct one above
Which of the following can be discovered using a data mining process?
Data mining can be used to sort through data in order to discover previously unknown information.
Compare your answer with the correct one above
Analysis of large and diverse amounts of data included in data warehouses is often referred to as:
This is the definition of the process of data mining.
Compare your answer with the correct one above
Which of the following activities would most likely detect computer related fraud?
System access logs are electronic lists of who has accessed or has attempted to access systems or parts of systems or data or subsets of data.
Compare your answer with the correct one above
General controls in an information system include each of the following except:
General controls ensure that an organization's control environment is well managed and stable. Logic tests are not one of the components of general controls.
Compare your answer with the correct one above
______ is a way of distributing software through applications hosted by a vendor and made available to customers over the web.
IT as a service is not a term, software as a service relates to applications hosted by a vendor, and platform as a service allows customers to host their own applications.
Compare your answer with the correct one above
Which of the following types of business planning focuses on how a company can most effectively restore business operations following a disaster?
Business continuity planning focuses on restoring and continuing operations in the event a disaster occurs that affects an organization.
Compare your answer with the correct one above
Which of the following best describes a hot site?
A hot site will have hardware that can be configured to be used for the processing needs of the client.
Compare your answer with the correct one above
In which of the following locations should a copy of the accounting system data backup of year end information be stored?
The accounting system data backup of year end information should be stored in some kind of secure off site location and not in any of the other locations.
Compare your answer with the correct one above
The protective device that allows private intranet users to access the Internet without allowing Internet users access to private Intranet information is called a:
A firewall is a protective device that allows private intranet users to access the Internet without allowing Internet users access to private Intranet information.
Compare your answer with the correct one above
Which of the following is the step where the intended recipient converts the ciphertext into plain text?
This step is where the intended recipient converts the ciphertext into plain text.
Compare your answer with the correct one above
A(n) _______ relates to copying data items that have been altered since the previous data backup.
An incremental backup saves time by not having to duplicate data. A full backup would duplicate all saved data. The other terms are distractors.
Compare your answer with the correct one above
An enterprise resource planning system is designed to:
ERP systems work to integrate data from all aspects of an organization's activities.
Compare your answer with the correct one above
Which of the following factors has the greatest impact on the design of an effective management reporting system?
The types of decisions to be made have the greatest impact on the design of an effective management reporting system.
Compare your answer with the correct one above