1. These are vital for safeguarding information systems and ensuring data integrity and security.
IT General Controls - Set A

Quiz
•
Professional Development
•
Professional Development
•
Hard
Karissa Swing
FREE Resource
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
a) Network segmentation
b) Network authentication
c) Security controls
d) IT general controls
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
2. Which of the following actions would NOT be considered a preventive IT control?
a) User password complexity requirements
b) Antivirus software installation
c) System vulnerability scanning
d) Conducting system audits after an incident
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
3. It involves real-time tracking of system activities and configurations to detect anomalies and ensure compliance with security policies.
a) Checking
b) Continuous monitoring
c) Compliance assurance
d) SOC 2
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
4. It is performed to evaluate the effectiveness of internal controls and pinpoint areas where processes can be improved.
a) Authentication
b) Monitoring
c) Audit
d) Cross-checking
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
5. Which of the following is a key factor in ensuring the effectiveness of IT General Controls?
a) Allowing users to make changes to system settings without approval
b) Constant software updates
c) Clear communication of policies and procedures to all employees
d) Giving all users full access to company data
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
6. It is essential for safeguarding data against loss and ensuring rapid recovery in the event of incidents.
a) Data Follow-Up and Recovery
b) Data Restoration
c) Data Backup and Recovery
d) Data Protection
7.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
7. Which statement/s is/are incorrect?
I. All changes should be documented and tracked to ensure accountability.
II. Implementing a structured change management process helps organizations effectively manage change while maximizing risks.
III. A strong change management process protects organizations from potential security vulnerabilities that could emerge during transitions.
IV. Approval processes ensure that only necessary and unauthorized changes are implemented.
a) II, III, and IV
b) II and IV
c) I, II, and III
d) III and IV
Create a free account and access millions of resources
Similar Resources on Quizizz
20 questions
CompTIA Project+ PK0-005 Study Guide, Chapter 07

Quiz
•
Professional Development
27 questions
Day 5 Quiz - Security Capabilities

Quiz
•
Professional Development
20 questions
Chapter 2 Data Classification

Quiz
•
Professional Development
24 questions
SC-300: Identity and Access Administrator - TCS

Quiz
•
Professional Development
25 questions
AWS Training Pre-Test Survey 7 August 2024

Quiz
•
Professional Development
24 questions
BCS Network Security Test 6

Quiz
•
University - Professi...
22 questions
HCM Core (Neil)

Quiz
•
Professional Development
25 questions
Quiz 1 - PROFE5 313 - BSIS 3A

Quiz
•
Professional Development
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade