B6 (Area IV) Flashcards

1
Q

Information technology (IT) corporate governance goal is to

A

align with organizational objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

Six Sigma steps are

A

problem, analyze data, and control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IT governance concept of

A

timeliness of data availability, depict the way an organization achieves its mission critical goals using IT strategies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Supporting documentation for an organizations IT security policy is

A

industry regulations, performance standards for IT assets, protocols for IT processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Vision Statement security outlines how

A

an organization will protect tangible and intangible assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Factors that those in charge of IT governance use to create organizations IT strategy are

A

vision statement, corporate strategy, regulations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Virtual networks uses

A

outsourced computer power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Internet provider vision to provide reliable and consistent network connectivity for all customer is reliant on

A

All IT personnel on company payroll, physical network, quick disaster recovery speeds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Strong IT governance models have

A

both people and policies in place that help organizations reach objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Responsibility of an information technology steering committee should be

A

formed to guide and oversee systems development and acquisition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Function of information systems steering committee is

A

ensuring top management participation, guidance and control, coordination of integrating information systems, setting governing policies for various information systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Information resource are categorized as

A

medium impact when work around for its loss on short term but recovery is necessary for long term. High impact is organization cannot operate without information resource over short period of time. Low impact the organization could operate without information resource. No impact is not a category.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Routers are

A

network devices that assign IP addresses and manage network traffic by source and destination fields

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

1) Routers assign:
2) Switches:
3) Gateways:
4) Servers:

A

1) IP addresses
2) switches can divide one connection into multiple connections
3) gateways convert protocols to communicate with other network devices
4) servers coordinate programs data and other computers so that the network can operate but do not act and an intermediary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Virtual private networks creates an

A

encrypted communication tunnel across the internet for the purpose of allowing a remote user secure access into the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Error most likely detected by analyzing financial totals is

A

transportation error on one employees paycheck on weekly payroll (manual total will be calculated for each transaction then compared to computer generated batch control total)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An accounting information system (AIS)

A

is a subsystem within management information system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Accounting information system (AIS) is found in a

A

well design system of audit trail that allows a user to trace a transaction from source documents to financial reports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Example of audit trail is authorized individual to select

A

inventory can be traced back by a copy of purchase order to see when item was ordered and who authorized it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Management information systems

A

perform report data for strategic planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

An example of decision support system (DDS) is

A

transaction processing system because (DSS) forecasts scenarios

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Enterprise resource planniny system is

A

integrate and secure data from all aspects of an organizations activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Supply chain management system concerned with

A

what goods were ordered, when goods were delivered and the amount paid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

B= Business, C= Consumer
Local food writer is asked by business to write a review about food this is an example of _________
Accountants referring to the AICPA website is__________

A

1) of C2B
2) is B2C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Benefit of using electronic funds transfer for international cash transactions is

A

reducing frequency of entry errors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Cloud computing can best be defined as

A

organizations that use internet access and applications that run on remote third party technology infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

The best reason for the company to switch to cloud computing is

A

usually has lower upfront costs of equipment and maintenance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Disadvantage of IT outsourcing is

A

quality control because they are a third party with their own standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Veracity is

A

trustworthiness of your data,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Publication phase of the data cycle

A

when data is circulated to users for various purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

A document count is

A

how many invoices a company has

31
Q

Foreign key is process of

A

transforming raw data into information that can be used in relational database

32
Q

Descriptive Analytics analyzes sales

A

by looking at the average sales by region

33
Q

1) Predictive Analytics statistical techniques and forecasting models to ____________

2) Diagnostic analytics focus on ____

3) Prescriptive analytics use______

A

1) predict what could happen

2 determining why something occurred

3) optimization and simulation algorithms to affect future decisions

34
Q

1) SQL is most like used to _________

2) C perform similar functions to SQL but ________

3) C++ can execute queries but ______

4) JavaScript focused on_______

A

1) involves extraction, which can be done by running queries

2) the language most likely being used for pulling records in database

3) broader terms of the application it has. SQL is more narrowly focused on queries

4) web programming and host of other applications

35
Q

Employ data mining allows

A

allows users to perform diagnostic analytics to drill into under lying data to better understand data

36
Q

1) Boxplot shows if there is

2) Dot Plot is a

3) Histogram a

4) Trend Line is a

A

1) a mean, median, minimum, maximum and outlier to compare

2) two dimensional map that shows the frequency of data points on one axis and another dimension on other

3) bar chart that plots a measurement of data points at different points in time does not show extremes

4) continuous graphing of data points over a specified time period

37
Q

1) Flowchart maps out

2) Waterfall chart shows

3) Directional Chart highlights

A

1) process, not cumulative effect of data points

2) cumulative effect of series of data points that make up total with incremental contributions making up total net income

3) milestones or events over multiple time periods

38
Q

A key difference in controls when

A

changing from manual system to a computer system bc its changing methodologies

39
Q

When seeking competitive advantage in planning the implementation of new software system

A

design an optimal process and then align the software

40
Q

Risk assessment identifies

A

whether the company has information that unauthorized individuals want.

41
Q

Risk management includes

A

risk assessment, trade off between risk and reward, risk inherent aspect of project

42
Q

Integrating general and application control procedures

A

part of basic design ensures effective control procedures

43
Q

General controls in an information system include

A

information technology infrastructure, security management, software acquisition

44
Q

Reviewing the systems access log most likely detects

A

computer related fraud

45
Q

Identification of critical applications is important to

A

include in the disaster and recovery plan

46
Q

Continuity Planning most effectively

A

restore business operations following a disaster

47
Q

To assure continuity in the event of a natural disaster the firm should

A

adopt an offsite mirrored web server

48
Q

Cold is a data processing disaster recovery site

A

but has not been stocked with equipment

49
Q

Hot site is a

A

Location that is equipped with the necessary hardware and software

50
Q

The primary purpose of a disaster recovery plan is to

A

specify the steps required to resume operations

51
Q

Incremental backup

A

backup copying only the data items that have changed since last backup

52
Q

System availability control example

A

raise the floors in the room where the network resides to avoid flood damage

53
Q

Primary objective of data security controls

A

access, change, or destruction

54
Q

Systems analyst start the process of

A

implementing a new software system

55
Q

Computer programmers create a

A

program based on a design

56
Q

Data entry and application programming should

A

be delegated to separate individuals

57
Q

A disadvantage of symmetric encrypt data is

A

both sender and receiver must have the private key before this encryption method will work

58
Q

Systems Analyst develops

A

long range plans, directing application development and computer operations

59
Q

Physical access control

A

separates unauthorized individuals from computer resources

60
Q

An application programmer should have the responsibility to

A

CODE approved changes to a payroll program

61
Q

1) Hashing involves______

2) Both hashing and asymmetric encryption provides________

A

1) mapping large quantities of data into smaller table for recovering purposes. Encryption involves using a digital key to scramble. Asymmetric encryption is considered more secure. Symmetric provides less security than asymmetric

2) the same level of assurance enforceability of a digitally signed transactions as an inked signature

62
Q

Public Key Infrastructure (PKI) refers to

A

processes used to issue asymmetric keys and digital certificates

63
Q

Encryption in a electronically transmitting data would

A

provide the most assurance unauthorized release of sensitive information would be prevented

64
Q

What is used to prevent unauthorized access to files

A

Smart Card, Multifactor authentication, Multimodal authentication

65
Q

1) Asymmetric encryption

2) Private key

A

1) a public key is used to encrypt messages.
2) private key used to decrypt the the message at the other end

66
Q

Read but not write is the access staff accountants should have after

A

sending to management for approval

67
Q

Firewall prevents

A

unauthorized users from gaining access to network resources

68
Q

Multifactor authentication requires

A

both a password and a numerical key generated on a smartphone for its users to log in

69
Q

Users enter a log in name and password in an effort to

A

strengthen this the installation of fingerprint scanners

70
Q

Biometric Devices use mitigate the risk of

A

unauthorized access to its payroll data

71
Q

The highest risk of data integrity is

A

a spreadsheet into which the controller enters summary daily sales data from a printed report of an automated accounting system

72
Q

Calculate monetary value:

A

(Risk Probability) x (Cost)

Risk is measured in: (H) = high action as soon as possible, (M) medium action and corrective action in a reasonable time frame, (L) low action no corrective action

73
Q

The 7 principles of quality management are

A

Customer Focus, Leadership, People Engagement, Process Approach, Continuous Improvement, Evidence Based Decision Making, Relationship Management

74
Q

Six Sigma

A

evaluate the achievement of goals and improving processes to reduce defective outputs

75
Q

What does IT stand for

A

Information Technology