Review Game Zone
Games
Test
Preview
Back
Match it!
Match it! Select the correct answer from the pull down...Good luck!
What controls check whether two items/computer systems, etc. are consistent?
Exception/Edit
Reconciliation
The technical implementation (e.g. application coding, table values, parameter setting, etc.) are appropriate.
Data Interfaces
System Access
Secondary Review
Risk Management
Authentication, System Configuration, System Access
What are examples of internal controls?
Exception/Edit
Reconciliation
The technical implementation (e.g. application coding, table values, parameter setting, etc.) are appropriate.
Data Interfaces
System Access
Secondary Review
Risk Management
Authentication, System Configuration, System Access
What control identifies a violation of a set standard or a change to a master file or data field?
Exception/Edit
Reconciliation
The technical implementation (e.g. application coding, table values, parameter setting, etc.) are appropriate.
Data Interfaces
System Access
Secondary Review
Risk Management
Authentication, System Configuration, System Access
What controls ensure transactions, data, functions/tasks, etc are accurate prior to processing/completing?
Exception/Edit
Reconciliation
The technical implementation (e.g. application coding, table values, parameter setting, etc.) are appropriate.
Data Interfaces
System Access
Secondary Review
Risk Management
Authentication, System Configuration, System Access
What attributes should be considered to assess the adequacy of System Configuration controls?
Exception/Edit
Reconciliation
The technical implementation (e.g. application coding, table values, parameter setting, etc.) are appropriate.
Data Interfaces
System Access
Secondary Review
Risk Management
Authentication, System Configuration, System Access
What controls manage access to information systems, applications, data, network, etc?
Exception/Edit
Reconciliation
The technical implementation (e.g. application coding, table values, parameter setting, etc.) are appropriate.
Data Interfaces
System Access
Secondary Review
Risk Management
Authentication, System Configuration, System Access
What controls are part of a process, effected by an entity's board of directors among others?
Exception/Edit
Reconciliation
The technical implementation (e.g. application coding, table values, parameter setting, etc.) are appropriate.
Data Interfaces
System Access
Secondary Review
Risk Management
Authentication, System Configuration, System Access
What controls transfer defined portions of information between two computer systems?
Exception/Edit
Reconciliation
The technical implementation (e.g. application coding, table values, parameter setting, etc.) are appropriate.
Data Interfaces
System Access
Secondary Review
Risk Management
Authentication, System Configuration, System Access
Check it!