IT General Controls - Set A

Quiz
•
Professional Development
•
Professional Development
•
Hard
Karissa Swing
FREE Resource
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
1. These are vital for safeguarding information systems and ensuring data integrity and security.
a) Network segmentation
b) Network authentication
c) Security controls
d) IT general controls
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
2. Which of the following actions would NOT be considered a preventive IT control?
a) User password complexity requirements
b) Antivirus software installation
c) System vulnerability scanning
d) Conducting system audits after an incident
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
3. It involves real-time tracking of system activities and configurations to detect anomalies and ensure compliance with security policies.
a) Checking
b) Continuous monitoring
c) Compliance assurance
d) SOC 2
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
4. It is performed to evaluate the effectiveness of internal controls and pinpoint areas where processes can be improved.
a) Authentication
b) Monitoring
c) Audit
d) Cross-checking
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
5. Which of the following is a key factor in ensuring the effectiveness of IT General Controls?
a) Allowing users to make changes to system settings without approval
b) Constant software updates
c) Clear communication of policies and procedures to all employees
d) Giving all users full access to company data
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
6. It is essential for safeguarding data against loss and ensuring rapid recovery in the event of incidents.
a) Data Follow-Up and Recovery
b) Data Restoration
c) Data Backup and Recovery
d) Data Protection
7.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
7. Which statement/s is/are incorrect?
I. All changes should be documented and tracked to ensure accountability.
II. Implementing a structured change management process helps organizations effectively manage change while maximizing risks.
III. A strong change management process protects organizations from potential security vulnerabilities that could emerge during transitions.
IV. Approval processes ensure that only necessary and unauthorized changes are implemented.
a) II, III, and IV
b) II and IV
c) I, II, and III
d) III and IV
Create a free account and access millions of resources
Similar Resources on Wayground
27 questions
PSE-4

Quiz
•
Professional Development
20 questions
Chapter 1 Architectural Concepts

Quiz
•
Professional Development
20 questions
Sales Conference 2023 - Post Test Security

Quiz
•
Professional Development
20 questions
MTA: 98-367 Security Part 1

Quiz
•
KG - Professional Dev...
22 questions
Day 2 Quiz - Cryptographic Solutions & Identity Management

Quiz
•
Professional Development
25 questions
CompTIA Security+ Quiz

Quiz
•
Professional Development
21 questions
IT Fundamentals+ Network, Security Concepts & Databases

Quiz
•
Professional Development
20 questions
AWS Chapter 5 IAM

Quiz
•
Professional Development
Popular Resources on Wayground
50 questions
Trivia 7/25

Quiz
•
12th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
11 questions
Negative Exponents

Quiz
•
7th - 8th Grade
12 questions
Exponent Expressions

Quiz
•
6th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade
20 questions
One Step Equations All Operations

Quiz
•
6th - 7th Grade
18 questions
"A Quilt of a Country"

Quiz
•
9th Grade