Review Game Zone
Games
Test
Preview
Back
Match it!
Match it! Select the correct answer from the pull down...Good luck!
What attributes should be considered to assess the adequacy of System Configuration controls?
Reconciliation
Authentication
The technical implementation (e.g. application coding, table values, parameter setting, etc.) are appropriate.
Data Interfaces
Exception/Edit
System Access
Secondary Review
Authentication, System Configuration, System Access
What control identifies a violation of a set standard or a change to a master file or data field?
Reconciliation
Authentication
The technical implementation (e.g. application coding, table values, parameter setting, etc.) are appropriate.
Data Interfaces
Exception/Edit
System Access
Secondary Review
Authentication, System Configuration, System Access
What controls manage access to information systems, applications, data, network, etc?
Reconciliation
Authentication
The technical implementation (e.g. application coding, table values, parameter setting, etc.) are appropriate.
Data Interfaces
Exception/Edit
System Access
Secondary Review
Authentication, System Configuration, System Access
What controls ensure internal and external customers are properly verified?
Reconciliation
Authentication
The technical implementation (e.g. application coding, table values, parameter setting, etc.) are appropriate.
Data Interfaces
Exception/Edit
System Access
Secondary Review
Authentication, System Configuration, System Access
What are examples of internal controls?
Reconciliation
Authentication
The technical implementation (e.g. application coding, table values, parameter setting, etc.) are appropriate.
Data Interfaces
Exception/Edit
System Access
Secondary Review
Authentication, System Configuration, System Access
What controls transfer defined portions of information between two computer systems?
Reconciliation
Authentication
The technical implementation (e.g. application coding, table values, parameter setting, etc.) are appropriate.
Data Interfaces
Exception/Edit
System Access
Secondary Review
Authentication, System Configuration, System Access
What controls check whether two items/computer systems, etc. are consistent?
Reconciliation
Authentication
The technical implementation (e.g. application coding, table values, parameter setting, etc.) are appropriate.
Data Interfaces
Exception/Edit
System Access
Secondary Review
Authentication, System Configuration, System Access
What controls ensure transactions, data, functions/tasks, etc are accurate prior to processing/completing?
Reconciliation
Authentication
The technical implementation (e.g. application coding, table values, parameter setting, etc.) are appropriate.
Data Interfaces
Exception/Edit
System Access
Secondary Review
Authentication, System Configuration, System Access
Check it!