Search Header Logo

IT General Controls - Set A

Authored by Karissa Swing

Professional Development

Professional Development

IT General Controls - Set A
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

1.     These are vital for safeguarding information systems and ensuring data integrity and security.

a)    Network segmentation

b)    Network authentication

c)    Security controls

d)    IT general controls

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

2.     Which of the following actions would NOT be considered a preventive IT control?

a)    User password complexity requirements

b)    Antivirus software installation

c)    System vulnerability scanning

d)    Conducting system audits after an incident

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

3.     It involves real-time tracking of system activities and configurations to detect anomalies and ensure compliance with security policies.

a)    Checking

b)    Continuous monitoring

c)    Compliance assurance

d)    SOC 2

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

4.     It is performed to evaluate the effectiveness of internal controls and pinpoint areas where processes can be improved.

a)    Authentication

b)    Monitoring

c)    Audit

d)    Cross-checking

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

5.     Which of the following is a key factor in ensuring the effectiveness of IT General Controls?

a)    Allowing users to make changes to system settings without approval

b)    Constant software updates

c)    Clear communication of policies and procedures to all employees

d)    Giving all users full access to company data

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

6.     It is essential for safeguarding data against loss and ensuring rapid recovery in the event of incidents.

a)    Data Follow-Up and Recovery

b)    Data Restoration

c)    Data Backup and Recovery

d)    Data Protection

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

7.     Which statement/s is/are incorrect?

I. All changes should be documented and tracked to ensure accountability.

II. Implementing a structured change management process helps organizations effectively manage change while maximizing risks.

III. A strong change management process protects organizations from potential security vulnerabilities that could emerge during transitions.

IV. Approval processes ensure that only necessary and unauthorized changes are implemented.

a)    II, III, and IV

b)    II and IV

c)    I, II, and III

d)    III and IV

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?