What You'll Practice
Our questions are aligned with the AICPA CPA Exam Blueprints, the authoritative guide for what's testable.
Common Traps to Avoid
These are the patterns that trip up candidates. Our questions specifically target these areas so you won't fall for them on exam day.
7-Day ITGC Mastery Plan
Why Our Question Bank
Simple, Affordable Pricing
Pass the CPA exam for the price of a streaming subscription
Frequently Asked Questions
Access provisioning is the process of granting, modifying, and revoking user access to systems and data. Proper provisioning ensures users have only the access needed for their job (least privilege) and that access is removed promptly when no longer needed. Weak provisioning leads to unauthorized access risks.
Change management controls ensure system changes (code, configurations, infrastructure) are properly authorized, tested, and implemented. Key controls include segregation of duties between developers and production access, testing requirements, approval workflows, and emergency change procedures.
IT segregation of duties prevents any single person from having conflicting responsibilities that could enable fraud or errors. For example, developers shouldn't have production access; those who request access shouldn't approve it; DBAs shouldn't be the only ones reviewing database activity.
Logs provide evidence of system activity and are essential for detective controls. Monitoring involves reviewing logs for anomalies, security events, and policy violations. Effective logging and monitoring help detect unauthorized changes, access violations, and system issues.