
IT General Controls - Set A
Authored by Karissa Swing
Professional Development
Professional Development

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
1. These are vital for safeguarding information systems and ensuring data integrity and security.
a) Network segmentation
b) Network authentication
c) Security controls
d) IT general controls
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
2. Which of the following actions would NOT be considered a preventive IT control?
a) User password complexity requirements
b) Antivirus software installation
c) System vulnerability scanning
d) Conducting system audits after an incident
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
3. It involves real-time tracking of system activities and configurations to detect anomalies and ensure compliance with security policies.
a) Checking
b) Continuous monitoring
c) Compliance assurance
d) SOC 2
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
4. It is performed to evaluate the effectiveness of internal controls and pinpoint areas where processes can be improved.
a) Authentication
b) Monitoring
c) Audit
d) Cross-checking
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
5. Which of the following is a key factor in ensuring the effectiveness of IT General Controls?
a) Allowing users to make changes to system settings without approval
b) Constant software updates
c) Clear communication of policies and procedures to all employees
d) Giving all users full access to company data
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
6. It is essential for safeguarding data against loss and ensuring rapid recovery in the event of incidents.
a) Data Follow-Up and Recovery
b) Data Restoration
c) Data Backup and Recovery
d) Data Protection
7.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
7. Which statement/s is/are incorrect?
I. All changes should be documented and tracked to ensure accountability.
II. Implementing a structured change management process helps organizations effectively manage change while maximizing risks.
III. A strong change management process protects organizations from potential security vulnerabilities that could emerge during transitions.
IV. Approval processes ensure that only necessary and unauthorized changes are implemented.
a) II, III, and IV
b) II and IV
c) I, II, and III
d) III and IV
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?