System Information Essay

5338 Words22 Pages
1. If complete separation of duties cannot be achieved in an on-line system, each of the following functions could be performed by the same individual without causing a major control violation EXCEPT transaction A. B. C. D. origination authorization recording correction Answer: B 2. Which of the following data sources would be used to restore a data base to its initial state after an abnormal termination of an application program? A. B. C. D. Transaction logs The job accounting log Before image copy After image copy Answer: C 3. A systems analyst should have access to each of the following EXCEPT A. B. C. D. source codes password identification tables checkpoint/restart procedures edit criteria Answer: B 4. A password is best described as a method of user A. B. C. D. identification authorization authentication confirmation Answer: C 5. It is generally agreed that which of the following should be held responsible for correction errors detected by an application system? A. B. C. D. System designers Users Programmers Computer operators Answer: B 6. Which of the following represents the greatest source of losses in data processing? A. B. C. D. Computer fraud Theft of machine time Errors and omissions Machine-room fires Answer: C 7. The most valuable information for detecting unauthorized input from a terminal would be provided by the A. B. C. D. console log printout transaction journal automated suspense file listing user error report Answer: B 8. Which of the following is the most important factor to review during a business continuity audit? A. B. C. D. A hot site is contracted for and available as needed. Insurance coverage is adequate and premiums are current. A business continuity manual is available and current. Media backups are performed on a timely basis and stored off-site. Answer: D 9. The best corrective control for dealing with a

More about System Information Essay

Open Document