Information Technology Flashcards
Which of the following is not a type of customer relationship management (CRM) technology?
A) On-premises CRM systems
B) Closed-source CRM systems
C) Cloud-based CRM systems
D) Open-source CRM systems
B. Closed-source CRM Systems
5 Core Risk Principles
Security, Availability, Confidentiality, Processing Integrity, & Privacy
2 Types of Information Security controls
Logical & physical access controls
6 General IT Control Categories
Preventive, Detective, Corrective, Feedback, General, Application (input, output & processing)
Confidentiality, Privacy, availability, processing integrity & security
5 Trust Services criteria (CPAPS)
An intuitive graphical language that unlocks the DNA of a corporation using a system of diagrams based on five W’s (Who, What, Which, Where, and When)
XBML
What are the 3 main goals of input controls?
Validity, Completeness, and Accuracy
Electronic audit trails, run-to-run controls & internal labels are what category of IT controls?
Processing Controls
Spooling, aborted print jobs & distribution logs are what type of IT control?
Output Controls
Two types of information security controls are what?
Logical and Physical Controls
Database design, operation and security are functions of who?
Database Administrator
Routines that utilize the computer to check the validity and accuracy of transaction data during input are called:
Edit programs