IT General Controls - Set A

Quiz
•
Professional Development
•
Professional Development
•
Hard
Karissa Swing
FREE Resource
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
1. These are vital for safeguarding information systems and ensuring data integrity and security.
a) Network segmentation
b) Network authentication
c) Security controls
d) IT general controls
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
2. Which of the following actions would NOT be considered a preventive IT control?
a) User password complexity requirements
b) Antivirus software installation
c) System vulnerability scanning
d) Conducting system audits after an incident
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
3. It involves real-time tracking of system activities and configurations to detect anomalies and ensure compliance with security policies.
a) Checking
b) Continuous monitoring
c) Compliance assurance
d) SOC 2
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
4. It is performed to evaluate the effectiveness of internal controls and pinpoint areas where processes can be improved.
a) Authentication
b) Monitoring
c) Audit
d) Cross-checking
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
5. Which of the following is a key factor in ensuring the effectiveness of IT General Controls?
a) Allowing users to make changes to system settings without approval
b) Constant software updates
c) Clear communication of policies and procedures to all employees
d) Giving all users full access to company data
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
6. It is essential for safeguarding data against loss and ensuring rapid recovery in the event of incidents.
a) Data Follow-Up and Recovery
b) Data Restoration
c) Data Backup and Recovery
d) Data Protection
7.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
7. Which statement/s is/are incorrect?
I. All changes should be documented and tracked to ensure accountability.
II. Implementing a structured change management process helps organizations effectively manage change while maximizing risks.
III. A strong change management process protects organizations from potential security vulnerabilities that could emerge during transitions.
IV. Approval processes ensure that only necessary and unauthorized changes are implemented.
a) II, III, and IV
b) II and IV
c) I, II, and III
d) III and IV
Create a free account and access millions of resources
Similar Resources on Wayground
25 questions
IM post-exam

Quiz
•
Professional Development
26 questions
Day 8 Quiz - Cloud Concepts & Wireless

Quiz
•
Professional Development
30 questions
Protecting Information Resources

Quiz
•
Professional Development
20 questions
AWS Chapter 5 IAM

Quiz
•
Professional Development
27 questions
PSE-4

Quiz
•
Professional Development
21 questions
IT Fundamentals+ Network, Security Concepts & Databases

Quiz
•
Professional Development
25 questions
CompTIA Security+ Quiz

Quiz
•
Professional Development
27 questions
Day 10 Quiz - Physical & Network Security

Quiz
•
Professional Development
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
15 questions
Core 4 of Customer Service - Student Edition

Quiz
•
6th - 8th Grade
15 questions
What is Bullying?- Bullying Lesson Series 6-12

Lesson
•
11th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade