Information Technology Flashcards

1
Q

Which of the following is not a type of customer relationship management (CRM) technology?

A) On-premises CRM systems
B) Closed-source CRM systems
C) Cloud-based CRM systems
D) Open-source CRM systems

A

B. Closed-source CRM Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

5 Core Risk Principles

A

Security, Availability, Confidentiality, Processing Integrity, & Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

2 Types of Information Security controls

A

Logical & physical access controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

6 General IT Control Categories

A

Preventive, Detective, Corrective, Feedback, General, Application (input, output & processing)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Confidentiality, Privacy, availability, processing integrity & security

A

5 Trust Services criteria (CPAPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An intuitive graphical language that unlocks the DNA of a corporation using a system of diagrams based on five W’s (Who, What, Which, Where, and When)

A

XBML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the 3 main goals of input controls?

A

Validity, Completeness, and Accuracy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Electronic audit trails, run-to-run controls & internal labels are what category of IT controls?

A

Processing Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Spooling, aborted print jobs & distribution logs are what type of IT control?

A

Output Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Two types of information security controls are what?

A

Logical and Physical Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Database design, operation and security are functions of who?

A

Database Administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Routines that utilize the computer to check the validity and accuracy of transaction data during input are called:

A

Edit programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly