AIS Test 1 Flashcards

1
Q

The “X” in the term XBRL stands for

A

Extensible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Another name for an Internet domain address is its:

A

URL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

This language allows its users to create web pages on the Internet

A

HTML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

One form of access security is determining authentic users by “who they are.” Which of the following is an example of such authentication?

A

Biometric tests such as retina scans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of these is correct about the terms “e-business” and “e-commerce”?

A

e-commerce is a subset of e-business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following is true about XBRL?

A

It is a business application of XML

It uses tags such as <b> like HTML</b>

It is used by the SEC to collect and store financial information about companies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The letter “p” in the acronym http stands for:

A

Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An advantage of E-wallets is that:

A

Users do not need to re-enter personal information each time they make an online purchase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A proxy server is

A

A computer dedicated to Internet access and transfers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Because Internet software is so convenient to use, many companies also create ________ for internal communications purposes.

A

Intranets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A forensic accountant is an accountant who:

A

Investigates suspected fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following best explains why we have incomplete information on computer crime?

A

Most companies handle abuse as an internal matter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Hacking involves:

A

Gaining illegal entry to computer files from remote locations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

All of the following are ways to thwart computer viruses except:

A

Opening suspicious emails and attachments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A computer virus is:

A

A small processing routine that the user accidentally introduces into the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A computer virus is different from a “Trojan Horse” because the virus can

A

Replicate itself

17
Q

Which of the following is not a common way to steal personal identity information?

A

Altering computer records

18
Q

Thwarting computer abuse can be enhanced by all of the following except:

A

Allowing only 10% of employees access to computers

19
Q

According to the chapter, which of these statements is most accurate?

A

Some computer abuses are performed simply to meet a challenge

20
Q

Some firms and governmental organizations use ethical hackers to help find any vulnerabilities that could be exploited by a malicious hacker. Which of the following is also used to refer to ethical hacking?

A

Penetration testing

21
Q

An effective control for maintaining the privacy of data stored on a large, networked server would be:

A

Encryption

22
Q

The principal function of an accounting system’s computerized controls is:

A

Preventing computer frauds

23
Q

Which of the following is not a processing control?

A

Hash totals

24
Q

Fault-tolerant systems are typically based on the concept of:

A

Redundancy

25
Q

A business continuity plan (BCP) includes which of the following?

A

Backups for hardware

Procedures to follow in the event of an emergency

Who is in charge during the emergency

26
Q

The risk of unauthorized access to data through electronic eavesdropping is minimized by using:

A

Data encryption

27
Q

From the standpoint of computer fraud, which type of controls would probably be of highest importance?

A

Access controls

28
Q

A company’s disaster recovery site that includes a computer system configured similarly to the system used regularly by the company for data processing purposes is called:

A

A hot site

29
Q

Which of the following control mechanisms is common to both observation and recording control

A

Turn around document

30
Q

Which of the following is not a control to ensure the physical safety of a company’s data processing center?

A

Strategic placement of the computer center

The use of password codes

The use of identification badges