1. These are vital for safeguarding information systems and ensuring data integrity and security.
IT General Controls - Set A

Quiz
•
Professional Development
•
Professional Development
•
Hard
Karissa Swing
FREE Resource
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
a) Network segmentation
b) Network authentication
c) Security controls
d) IT general controls
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
2. Which of the following actions would NOT be considered a preventive IT control?
a) User password complexity requirements
b) Antivirus software installation
c) System vulnerability scanning
d) Conducting system audits after an incident
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
3. It involves real-time tracking of system activities and configurations to detect anomalies and ensure compliance with security policies.
a) Checking
b) Continuous monitoring
c) Compliance assurance
d) SOC 2
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
4. It is performed to evaluate the effectiveness of internal controls and pinpoint areas where processes can be improved.
a) Authentication
b) Monitoring
c) Audit
d) Cross-checking
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
5. Which of the following is a key factor in ensuring the effectiveness of IT General Controls?
a) Allowing users to make changes to system settings without approval
b) Constant software updates
c) Clear communication of policies and procedures to all employees
d) Giving all users full access to company data
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
6. It is essential for safeguarding data against loss and ensuring rapid recovery in the event of incidents.
a) Data Follow-Up and Recovery
b) Data Restoration
c) Data Backup and Recovery
d) Data Protection
7.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
7. Which statement/s is/are incorrect?
I. All changes should be documented and tracked to ensure accountability.
II. Implementing a structured change management process helps organizations effectively manage change while maximizing risks.
III. A strong change management process protects organizations from potential security vulnerabilities that could emerge during transitions.
IV. Approval processes ensure that only necessary and unauthorized changes are implemented.
a) II, III, and IV
b) II and IV
c) I, II, and III
d) III and IV
Create a free account and access millions of resources
Similar Resources on Quizizz
24 questions
BCS Network Security Test 6

Quiz
•
University - Professi...
22 questions
HCM Core (Neil)

Quiz
•
Professional Development
20 questions
CompTIA Project+ PK0-005 Study Guide, Chapter 07

Quiz
•
Professional Development
22 questions
BCS Network Security Test 8

Quiz
•
University - Professi...
27 questions
Day 5 Quiz - Security Capabilities

Quiz
•
Professional Development
24 questions
SC-300: Identity and Access Administrator - TCS

Quiz
•
Professional Development
20 questions
Salesforce Admin 20Q - Test 01

Quiz
•
Professional Development
25 questions
AWS Training Pre-Test Survey 7 August 2024

Quiz
•
Professional Development
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
20 questions
Math Review - Grade 6

Quiz
•
6th Grade
20 questions
math review

Quiz
•
4th Grade
5 questions
capitalization in sentences

Quiz
•
5th - 8th Grade
10 questions
Juneteenth History and Significance

Interactive video
•
5th - 8th Grade
15 questions
Adding and Subtracting Fractions

Quiz
•
5th Grade
10 questions
R2H Day One Internship Expectation Review Guidelines

Quiz
•
Professional Development
12 questions
Dividing Fractions

Quiz
•
6th Grade