AIS Test 1 Flashcards

1
Q

The “X” in the term XBRL stands for

A

Extensible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Another name for an Internet domain address is its:

A

URL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

This language allows its users to create web pages on the Internet

A

HTML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

One form of access security is determining authentic users by “who they are.” Which of the following is an example of such authentication?

A

Biometric tests such as retina scans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of these is correct about the terms “e-business” and “e-commerce”?

A

e-commerce is a subset of e-business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following is true about XBRL?

A

It is a business application of XML

It uses tags such as <b> like HTML</b>

It is used by the SEC to collect and store financial information about companies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The letter “p” in the acronym http stands for:

A

Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An advantage of E-wallets is that:

A

Users do not need to re-enter personal information each time they make an online purchase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A proxy server is

A

A computer dedicated to Internet access and transfers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Because Internet software is so convenient to use, many companies also create ________ for internal communications purposes.

A

Intranets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A forensic accountant is an accountant who:

A

Investigates suspected fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following best explains why we have incomplete information on computer crime?

A

Most companies handle abuse as an internal matter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Hacking involves:

A

Gaining illegal entry to computer files from remote locations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

All of the following are ways to thwart computer viruses except:

A

Opening suspicious emails and attachments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A computer virus is:

A

A small processing routine that the user accidentally introduces into the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A computer virus is different from a “Trojan Horse” because the virus can

A

Replicate itself

17
Q

Which of the following is not a common way to steal personal identity information?

A

Altering computer records

18
Q

Thwarting computer abuse can be enhanced by all of the following except:

A

Allowing only 10% of employees access to computers

19
Q

According to the chapter, which of these statements is most accurate?

A

Some computer abuses are performed simply to meet a challenge

20
Q

Some firms and governmental organizations use ethical hackers to help find any vulnerabilities that could be exploited by a malicious hacker. Which of the following is also used to refer to ethical hacking?

A

Penetration testing

21
Q

An effective control for maintaining the privacy of data stored on a large, networked server would be:

A

Encryption

22
Q

The principal function of an accounting system’s computerized controls is:

A

Preventing computer frauds

23
Q

Which of the following is not a processing control?

A

Hash totals

24
Q

Fault-tolerant systems are typically based on the concept of:

A

Redundancy

25
A business continuity plan (BCP) includes which of the following?
Backups for hardware Procedures to follow in the event of an emergency Who is in charge during the emergency
26
The risk of unauthorized access to data through electronic eavesdropping is minimized by using:
Data encryption
27
From the standpoint of computer fraud, which type of controls would probably be of highest importance?
Access controls
28
A company’s disaster recovery site that includes a computer system configured similarly to the system used regularly by the company for data processing purposes is called:
A hot site
29
Which of the following control mechanisms is common to both observation and recording control
Turn around document
30
Which of the following is not a control to ensure the physical safety of a company’s data processing center?
Strategic placement of the computer center The use of password codes The use of identification badges