0 of 32 Questions completed
Questions:
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
0 of 32 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Average score |
|
Your score |
|
Pos. | Name | Entered on | Points | Result |
---|---|---|---|---|
Table is loading | ||||
No data available | ||||
______ type of assurance is provided by internal control
After which process an employee becomes a member of the company’s workforce
______ cyber-crime unsuspecting victims would use infected computers to make online
transactions
Which tactic a business uses to automate processes to operate efficiently and effecively
All data and & programs could be lost if there is no longer backup in the event of disaster & Business could come to a standstill.
Which of the following is not considered as inherent limitation under internal control
In which stage the employee and supervisor workout long term carrier goals with company?
______ cyber-crime homepage of site is replaced with a pornographic or defamatory page
Which is not an objective of BPA
how many types of business risk are present
What shows the flow of data or information from one place to another place
______ include professional growth & training to prepare employee for more responsible position with company
_______ cyber-crime involves fraudulently acquiring sensitive information through
masquerading a site as trusted entity
To ensure that data is only available to person who have right to see the same is known as______
Which of the following is not a business risk
In Data flow diagrams process are identified to _________.
Following steps are involved in ______ .
i) Procuring, ii) Registering, iii) Adjusting, iv) Disposing
_______ is the most coveted and important ‘Crown Jewel’ assets of company
To ensure that no un-authorized amendments can be made in data is known as_______.
Which type of risk can prevent an organization from accomplishing its objectives
Following process are related to _________.
i) Assembly & Shipping, ii) Production Control, iv) Credit & Invoicing, iv) Sales
In which step the fixed assets are sold when it becomes useless & obsolete
‘A’ thief enters in ‘B’s’ house and steals an object kept in the house. The following is an example of ______ .
Which is not the benefit of Automating business process
Which type of risk will expose the organization to fines & penalties from a
regulatory agency
Following process are related to _________.
i) Sales & Marketing, ii) Order Fulfilment, iii) Manufacturing, iv) Receivables
What has input in the form of transactions and then output are various types of financial reports such.
Stealing valuable information without permission of owner of data through using internet is known as ______ .
How many steps are defined to implement a BPA
which risk can expose the organization to negative publicity
Following process are related to _________.
i) User Department, ii) Vendor, iii) Stores, iv) Accounts Payable
What is the main principal on data protection & privacy enumerated under IT Act, 2000