1. Which of the following is the GREATEST risk of cloud computing?
A) Reduced performance B) Disclosure of data C) Lack of scalability D) Inflexibility
2. In an IT organization where many responsibilities are shared, which of the following would be the BEST control for detecting unauthorized data changes?
A) Data changes are independently reviewed by another group. B) Users are required to periodically rotate responsibilities. C) Segregation of duties conflicts are periodically reviewed. D) Data changes are logged in an outside application.
3. Which of the following is a substantive test procedure?
A) Using audit software to verify the total of an accounts receivable file B) Observing that user IDs and passwords are required to sign on to the online system C) Test of invoice calculation process D) Verifying that appropriate approvals are documented in a sample of program changes
4. Which of the following is an advantage of decentralized security administration?
A) Greater integrity B) Faster turnaround C) More uniformity D) Better-trained administrators
5. For an organization which uses a VoIP telephony system exclusively, the GREATEST concern associated with leaving a connected telephone in an unmonitored public area is the possibility of:
A) connectivity issues when used with an analog local exchange carrier B) unauthorized use leading to theft of services and financial loss C) network compromise due to the introduction of malware D) theft or destruction of an expensive piece of electronic equipment
Leave a comment