What is the role of the systems analyst in an IT environment?
COBIT 4.1 is:
The most critical aspect of segregation of duties within information systems is between:
Governance, risk, and compliance (GRC) systems are representative of all of the following statements except:
Which of the following terms best describes the type of control practice evidenced by segregation of duties between computer programmers and computer operators?
What is the correct ascending hierarchy of data in a system?
Which of the following risks are greater in computerized systems than in manual systems?
Information systems (IS) strategy is determined by:
Which of the following conversion strategies is characterized by a manager removing the old system and installing the new system without the possibility of reverting to the original?
An overall description of a database, including the names of data elements, their characteristics, and their relationship to each other, is defined by using a:
Which of the following types of controls is not described in the IT Governance Institute’s Control Objectives for Information and Related Technology (COBIT)?
Which of the following is a primary function of a database management system (DBMS)?
In the organization of the IT function, the most important segregation of duties is:
Which of the following should not be the responsibility of a database administrator?
Which of the following is considered an application input control?
Which of the following is the final step before placing the system in live operation?
According to eSAC, accountability is:
The function of a data dictionary is to:
The process of learning how the current system functions, determining the needs of users and developing the logical requirements of a proposed system is referred to as:
An enterprise resource planning system is designed to:
Of the following, the greatest advantage of a database (server) architecture is:
Which of the following control frameworks groups IT business assurance objectives into the five categories of availability, capability, functionality, protectability, and accountability?
Under the COBIT 5 framework, which of the following statements is false?
Which of the following areas experienced an increase in risk as personal computers replaced mainframe environments?
An accounts payable program posted a payable to a vendor not included in the online vendor master file. A control that would prevent this error is a:
A totally centralized system:
What technology is needed in order to convert a paper document into a computer file?
Which of the following best describes acceptance testing?
One advantage of a database management system (DBMS) is:
One of the major problems in a computer system is that incompatible functions may be performed by the same individual. One compensating control is the use of:
The purpose of input controls is to ensure the:
An organization’s computer help-desk function is usually a responsibility of the:
The most difficult aspect of using Internet resources is:
Which of the following are key technologies of big data?
When a new application is being created for widespread use in a large organization, the principal liaison between the IT function and the rest of an organization is normally a (n):
Preventing someone with sufficient technical skill from circumventing security procedures and making changes to production programs is best accomplished by:
A database is:
Which of the following activities would most likely be performed in the computer processing department?
Which of the following is the elementary unit of data storage used to represent individual attributes of an entity?
How is an accounting information system (AIS) distinguished from a management information system (MIS)?
An important function of a database administrator is:
Which application controls monitor processed and stored data to ensure they are consistent and complete?
An organization has made available the company newsletter and job openings on the network such that only employees of the organization may view them. The organization is using a (n):
Securing client-server systems is a complex task because of all of the following factors except:
Which of the following networks provides the least secure means of data transmission?
An organization’s primary focus is on what it needs to do in order to accomplish its predicted future. Which of the following data analytics methods would best address this concern?
Which one of the following input controls or edit checks would catch certain types of errors within the payment amount field of a transaction?
One of the principal objectives of a database system is to:
What type of computer processing system is characterized by data that are assembled from more than one location and records that are updated immediately?
A device used to connect dissimilar networks is a:
An organization should document its IT control framework for the following:
Which of the following statements about the role and nature of servers is true?
Application control objectives do not normally include assurance that:
In a traditional ERP system, the receipt of a customer order may result in:
Compared to batch processing, real-time processing has which of the following advantages?
Which of the following best describes unstructured data?
A type of network that is used to support interconnections within a building is known as a:
Control objectives regarding effectiveness and efficiency, reliability, and compliance are the basis of which control framework?
Which of the following data analytics methods should an auditor use to report on actual results?
Which of the following represents an internal control weakness in a computer-based system?