Review Game Zone
Games
Test
Preview
Back
Match it!
Match it! Select the correct answer from the pull down...Good luck!
What are examples of internal controls?
Risk Management
Data Interfaces
The technical implementation (e.g. application coding, table values, parameter setting, etc.) are appropriate.
System Access
Authentication, System Configuration, System Access
Secondary Review
System Configuration
Exception/Edit
What controls manage access to information systems, applications, data, network, etc?
Risk Management
Data Interfaces
The technical implementation (e.g. application coding, table values, parameter setting, etc.) are appropriate.
System Access
Authentication, System Configuration, System Access
Secondary Review
System Configuration
Exception/Edit
What controls transfer defined portions of information between two computer systems?
Risk Management
Data Interfaces
The technical implementation (e.g. application coding, table values, parameter setting, etc.) are appropriate.
System Access
Authentication, System Configuration, System Access
Secondary Review
System Configuration
Exception/Edit
What controls ensure transactions, data, functions/tasks, etc are accurate prior to processing/completing?
Risk Management
Data Interfaces
The technical implementation (e.g. application coding, table values, parameter setting, etc.) are appropriate.
System Access
Authentication, System Configuration, System Access
Secondary Review
System Configuration
Exception/Edit
What control identifies a violation of a set standard or a change to a master file or data field?
Risk Management
Data Interfaces
The technical implementation (e.g. application coding, table values, parameter setting, etc.) are appropriate.
System Access
Authentication, System Configuration, System Access
Secondary Review
System Configuration
Exception/Edit
What controls are part of a process, effected by an entity's board of directors among others?
Risk Management
Data Interfaces
The technical implementation (e.g. application coding, table values, parameter setting, etc.) are appropriate.
System Access
Authentication, System Configuration, System Access
Secondary Review
System Configuration
Exception/Edit
What attributes should be considered to assess the adequacy of System Configuration controls?
Risk Management
Data Interfaces
The technical implementation (e.g. application coding, table values, parameter setting, etc.) are appropriate.
System Access
Authentication, System Configuration, System Access
Secondary Review
System Configuration
Exception/Edit
What controls are designed and configured to carry out a specific set of instructions based on criteria defined by management?
Risk Management
Data Interfaces
The technical implementation (e.g. application coding, table values, parameter setting, etc.) are appropriate.
System Access
Authentication, System Configuration, System Access
Secondary Review
System Configuration
Exception/Edit
Check it!