Internal Controls Overview Questions With Complete
Solutions
Define Maximum Tolerable Downtime (MTD). Correct
Answers The amount of time a business can tolerate an outage
without causing long-term significant damage.
How does Agile handle changes in requirements? Correct
Answers Agile welcomes changes to meet customer needs.
What are Application Logs? Correct Answers Records
application data such as user access and errors.
What are Change Logs? Correct Answers Logs that track
changes that were requested, approved, and implemented.
What are cross-disciplinary teams in blockchain management?
Correct Answers Teams formed with clear reporting lines and
segregation of duties to manage blockchain effectively.
What are Design Deficiencies in a system? Correct Answers
Controls that are absent or improperly designed.
What are design deficiencies in internal controls? Correct
Answers Controls that are absent or improperly designed.
What are detective controls in blockchain? Correct Answers
Controls that increase monitoring frequency to quickly detect
anomalies.
,What are detective controls in IT management? Correct Answers
Controls that increase the frequency of monitoring activities to
detect anomalies quickly.
What are detective controls? Correct Answers Controls that
increase the frequency of monitoring activities to detect
anomalies quickly.
What are End-User Devices (EUDs)? Correct Answers Devices
that interact with users, such as desktops, laptops, and tablets.
What are key risks associated with cloud computing? Correct
Answers Competitor adoption rate, security threats, vendor
lock-in, performance concerns, and regulatory changes.
What are Neural Networks modeled after? Correct Answers
They are modeled after neurons that facilitate the function of
human or animal memory used in ML applications.
What are preventative controls in blockchain technology?
Correct Answers Controls that focus on managing transactions
at the point of entry.
What are preventative controls in blockchain? Correct Answers
Controls that focus on managing transactions at the point of
entry due to high volume and speed.
What are preventative controls in the context of blockchain?
Correct Answers Controls that focus on managing transactions
at the point of entry.
,What are some risks associated with Change Management?
Correct Answers User resistance, lack of management support,
and integration risks.
What are system availability risks? Correct Answers Risks
include failure of IT infrastructure, insufficient capacity and
resources, and lack of business resiliency.
What are the benefits of using a Cloud Service Provider (CSP)?
Correct Answers Centralized data storage, low maintenance,
cost-efficient pay-for-what-you-use model, and infrastructure
elasticity.
What are the categories of impact in a Business Impact
Analysis? Correct Answers High, Moderate, and Low.
What are the components of COSO's Enterprise Risk
Management framework? Correct Answers Governance &
Culture, Strategy & Objective-Setting, Performance, Review &
Revision, Information, Communication & Reporting.
What are the components of COSO's Enterprise Risk
Management Framework? Correct Answers Governance &
Culture, Strategy & Objective-Setting, Performance, Review &
Revision, Information, Communication & Reporting.
What are the core components of IT infrastructure? Correct
Answers On-premises and outsourced hardware, software, and
specialized personnel.
, What are the four cloud computing deployment models? Correct
Answers Public, Private, Hybrid, and Community clouds.
What are the four primary cloud computing deployment models?
Correct Answers Public, Private, Hybrid, and Community.
What are the key features of blockchain? Correct Answers
Prevention of Bitcoin duplication, limited initial creation,
protection against alterations, and multiparty transaction
validation.
What are the key objectives of an AIS? Correct Answers To
record valid transactions, properly classify transactions, ensure
accuracy, record in the correct period, and present transactions
correctly.
What are the primary cloud computing models? Correct
Answers On-Premises, Infrastructure-as-a-Service (IaaS),
Platform-as-a-Service (PaaS), Software-as-a-Service (SaaS).
What are the risks associated with Change Management?
Correct Answers Risks include user resistance, lack of
management support, and potential business disruption.
What are the risks associated with outsourcing? Correct
Answers Risks include quality of service, reduced productivity,
information security, and staff turnover.
What are the risks to System Availability? Correct Answers
Failure of IT infrastructure, insufficient capacity and resources,
and lack of business resiliency.