Risks which have impact on different parts of the enterprise ?
Correct
Incorrect
Question 2 of 30
2. Question
1 points
Category: Enterprise Information System
Which of these sets tone of an organization, influencing the control consciousness of its people?
Correct
Incorrect
Question 3 of 30
3. Question
1 points
Category: Enterprise Information System
Ordering, production, finish goods & delivery are phase of _______ .
Correct
Incorrect
Question 4 of 30
4. Question
1 points
Category: Enterprise Information System
Which response take no action against risk due to a cost/benefit decision ?
Correct
Incorrect
Question 5 of 30
5. Question
1 points
Category: Enterprise Information System
Which of these measure, monitor and control activities related to business procedure system ?
Correct
Incorrect
Question 6 of 30
6. Question
1 points
Category: Enterprise Information System
Which is a foundation for how risk & control are viewed and addressed by entity’s people ?
Correct
Incorrect
Question 7 of 30
7. Question
1 points
Category: Enterprise Information System
Which are the actions established through policies and procedure that help to ensure that management directives to mitigate risk are carried out ?
Correct
Incorrect
Question 8 of 30
8. Question
1 points
Category: Enterprise Information System
Which Act provides the legal infrastructure for e-commerce in India ?
Correct
Incorrect
Question 9 of 30
9. Question
1 points
Category: Enterprise Information System
Which of these is an example of management process ?
Correct
Incorrect
Question 10 of 30
10. Question
1 points
Category: Enterprise Information System
All input Transaction data may not be accurate, complete and authorized is risk of ______.
Correct
Incorrect
Question 11 of 30
11. Question
1 points
Category: Enterprise Information System
Which type of assurance is provided by internal control?
Correct
Incorrect
Question 12 of 30
12. Question
1 points
Category: Enterprise Information System
By which process an employee becomes a member of the company’s workforce?
Correct
Incorrect
Question 13 of 30
13. Question
1 points
Category: Enterprise Information System
In which cyber-crime unsuspecting victims would use infected computers to make online transactions?
Correct
Incorrect
Question 14 of 30
14. Question
1 points
Category: Enterprise Information System
Which is the tactic that a business uses to automate processes to operate efficiently & effectively ?
OR
Which is a tradition of analyzing, documenting, optimizing & then automating business processes ?
Correct
Incorrect
Question 15 of 30
15. Question
1 points
Category: Enterprise Information System
All data and & programs could be lost if there is no longer backup in the event of disaster & Business could come to a standstill .
Correct
Incorrect
Question 16 of 30
16. Question
1 points
Category: Enterprise Information System
Which is not considered as inherent limitation under internal control?
Correct
Incorrect
Question 17 of 30
17. Question
1 points
Category: Enterprise Information System
At which stage the employee and supervisor workout long term carrier goals with company ?
Correct
Incorrect
Question 18 of 30
18. Question
1 points
Category: Enterprise Information System
In which cyber-crime homepage of site is replaced with a pornographic or defamatory page?
Correct
Incorrect
Question 19 of 30
19. Question
1 points
Category: Enterprise Information System
Which is not an objective of BPA?
Correct
Incorrect
Question 20 of 30
20. Question
1 points
Category: Enterprise Information System
50. There are how many types of business risk ?
Correct
Incorrect
Question 21 of 30
21. Question
1 points
Category: Enterprise Information System
Which shows the flow of data or information from one place to another place ?
Correct
Incorrect
Question 22 of 30
22. Question
1 points
Category: Enterprise Information System
Which include professional growth & training to prepare employee for more responsible position with company ?
Correct
Incorrect
Question 23 of 30
23. Question
1 points
Category: Enterprise Information System
In which cyber-crime involves fraudulently acquiring sensitive information through masquerading a site as trusted entity?
Correct
Incorrect
Question 24 of 30
24. Question
1 points
Category: Enterprise Information System
To ensure that data is only available to person who have right to see the same .
Correct
Incorrect
Question 25 of 30
25. Question
1 points
Category: Enterprise Information System
Which is not a type of business risk?
Correct
Incorrect
Question 26 of 30
26. Question
1 points
Category: Enterprise Information System
In Data flow diagrams process are identified to whom?