AIS Test 1 Flashcards
The “X” in the term XBRL stands for
Extensible
Another name for an Internet domain address is its:
URL
This language allows its users to create web pages on the Internet
HTML
One form of access security is determining authentic users by “who they are.” Which of the following is an example of such authentication?
Biometric tests such as retina scans
Which of these is correct about the terms “e-business” and “e-commerce”?
e-commerce is a subset of e-business
Which of the following is true about XBRL?
It is a business application of XML
It uses tags such as <b> like HTML</b>
It is used by the SEC to collect and store financial information about companies
The letter “p” in the acronym http stands for:
Protocol
An advantage of E-wallets is that:
Users do not need to re-enter personal information each time they make an online purchase
A proxy server is
A computer dedicated to Internet access and transfers
Because Internet software is so convenient to use, many companies also create ________ for internal communications purposes.
Intranets
A forensic accountant is an accountant who:
Investigates suspected fraud
Which of the following best explains why we have incomplete information on computer crime?
Most companies handle abuse as an internal matter
Hacking involves:
Gaining illegal entry to computer files from remote locations
All of the following are ways to thwart computer viruses except:
Opening suspicious emails and attachments
A computer virus is:
A small processing routine that the user accidentally introduces into the system
A computer virus is different from a “Trojan Horse” because the virus can
Replicate itself
Which of the following is not a common way to steal personal identity information?
Altering computer records
Thwarting computer abuse can be enhanced by all of the following except:
Allowing only 10% of employees access to computers
According to the chapter, which of these statements is most accurate?
Some computer abuses are performed simply to meet a challenge
Some firms and governmental organizations use ethical hackers to help find any vulnerabilities that could be exploited by a malicious hacker. Which of the following is also used to refer to ethical hacking?
Penetration testing
An effective control for maintaining the privacy of data stored on a large, networked server would be:
Encryption
The principal function of an accounting system’s computerized controls is:
Preventing computer frauds
Which of the following is not a processing control?
Hash totals
Fault-tolerant systems are typically based on the concept of:
Redundancy
A business continuity plan (BCP) includes which of the following?
Backups for hardware
Procedures to follow in the event of an emergency
Who is in charge during the emergency
The risk of unauthorized access to data through electronic eavesdropping is minimized by using:
Data encryption
From the standpoint of computer fraud, which type of controls would probably be of highest importance?
Access controls
A company’s disaster recovery site that includes a computer system configured similarly to the system used regularly by the company for data processing purposes is called:
A hot site
Which of the following control mechanisms is common to both observation and recording control
Turn around document
Which of the following is not a control to ensure the physical safety of a company’s data processing center?
Strategic placement of the computer center
The use of password codes
The use of identification badges