Question: Questions 1 - 1 0 1 0 Marks 1 . Select the correct definition. IT governance is defined as the a . policies in place
Questions Marks Select the correct definition. IT governance is defined as the a policies in place around the use of IT in the organisation b measures in place to monitor adherence of IT staff to performance goals c processes that ensure the effective and efficient use of IT in enabling an organisation to achieve its goals d processes that ensure the effective and efficient use of information within an organisation. Whom of the following within an organisation is responsible for information governance? a Business b IT c Business and IT d Users During a review of logical access controls, you observe that userids are shared. This poses the following risk: a The audit trail will reflect the incorrect userid b User access is time consuming c Passwords are easily guessed d User accountability may not be established The best source of evidence to determine if exemployees continue to have access to a company's automated databases is a Reviewing computer logs of access attempts b Reconciling current payroll lists with database access lists c Discussing the password removal process with the database administrator d Reviewing access controls software to determine whether the most current version is implemented A risk associated with change management is that a Unauthorised changes may be implemented resulting in business disruption b Unauthorised users may gain access to the system c Computer equipment may not function optimally d Computer equipment are not safeguarded Which of the following statements relating to disaster recovery is true? a Business continuity is a subset of disaster recovery b There is no need for business involvement when defining the disaster recovery plan c Disaster recovery is the ability of a business to recover its IT applications and processes in the event of a disaster d Disaster recovery is the ability of a business to continue operations in the event of a disruption or a disaster The best method to ensure that backups will run is to it a Schedule it b Trigger it manually c Trigger it automatically d Schedule it to trigger automatically An incident is usually an indication that a a change request was logged to make changes to an application in the development phase b business continuity plans are not working as intended c there is an interruption of an IT service provided to business d physical access to the server room was compromised The following are objectives of application controls: i All transactions are appropriately authorised and recorded ii All transactions are processed on a timely basis iii. All transactions are processed completely and accurately iv Output is complete and accurate and authorised users are able to view it a i and ii b ii and iii c i ii and iii d All of the above An audit trail is used to track processing history of a transaction. An audit trail used to track master file updates may not contain: a Before and after image of the changes made. b Userid of the person who made the changes. c The date on which the changes were made. d The userids of the supervisors responsible for reviewing the changes made.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
