B6 (Area IV) Flashcards

1
Q

Information technology (IT) corporate governance goal is to

A

align with organizational objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

Six Sigma steps are

A

problem, analyze data, and control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IT governance concept of

A

timeliness of data availability, depict the way an organization achieves its mission critical goals using IT strategies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Supporting documentation for an organizations IT security policy is

A

industry regulations, performance standards for IT assets, protocols for IT processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Vision Statement security outlines how

A

an organization will protect tangible and intangible assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Factors that those in charge of IT governance use to create organizations IT strategy are

A

vision statement, corporate strategy, regulations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Virtual networks uses

A

outsourced computer power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Internet provider vision to provide reliable and consistent network connectivity for all customer is reliant on

A

All IT personnel on company payroll, physical network, quick disaster recovery speeds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Strong IT governance models have

A

both people and policies in place that help organizations reach objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Responsibility of an information technology steering committee should be

A

formed to guide and oversee systems development and acquisition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Function of information systems steering committee is

A

ensuring top management participation, guidance and control, coordination of integrating information systems, setting governing policies for various information systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Information resource are categorized as

A

medium impact when work around for its loss on short term but recovery is necessary for long term. High impact is organization cannot operate without information resource over short period of time. Low impact the organization could operate without information resource. No impact is not a category.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Routers are

A

network devices that assign IP addresses and manage network traffic by source and destination fields

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

1) Routers assign:
2) Switches:
3) Gateways:
4) Servers:

A

1) IP addresses
2) switches can divide one connection into multiple connections
3) gateways convert protocols to communicate with other network devices
4) servers coordinate programs data and other computers so that the network can operate but do not act and an intermediary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Virtual private networks creates an

A

encrypted communication tunnel across the internet for the purpose of allowing a remote user secure access into the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Error most likely detected by analyzing financial totals is

A

transportation error on one employees paycheck on weekly payroll (manual total will be calculated for each transaction then compared to computer generated batch control total)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An accounting information system (AIS)

A

is a subsystem within management information system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Accounting information system (AIS) is found in a

A

well design system of audit trail that allows a user to trace a transaction from source documents to financial reports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Example of audit trail is authorized individual to select

A

inventory can be traced back by a copy of purchase order to see when item was ordered and who authorized it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Management information systems

A

perform report data for strategic planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

An example of decision support system (DDS) is

A

transaction processing system because (DSS) forecasts scenarios

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Enterprise resource planniny system is

A

integrate and secure data from all aspects of an organizations activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Supply chain management system concerned with

A

what goods were ordered, when goods were delivered and the amount paid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

B= Business, C= Consumer
Local food writer is asked by business to write a review about food this is an example of _________
Accountants referring to the AICPA website is__________

A

1) of C2B
2) is B2C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Benefit of using electronic funds transfer for international cash transactions is
reducing frequency of entry errors
25
Cloud computing can best be defined as
organizations that use internet access and applications that run on remote third party technology infrastructure
26
The best reason for the company to switch to cloud computing is
usually has lower upfront costs of equipment and maintenance
27
Disadvantage of IT outsourcing is
quality control because they are a third party with their own standards
28
Veracity is
trustworthiness of your data,
29
Publication phase of the data cycle
when data is circulated to users for various purposes.
30
A document count is
how many invoices a company has
31
Foreign key is process of
transforming raw data into information that can be used in relational database
32
Descriptive Analytics analyzes sales
by looking at the average sales by region
33
1) Predictive Analytics statistical techniques and forecasting models to ____________ 2) Diagnostic analytics focus on ____ 3) Prescriptive analytics use______
1) predict what could happen 2 determining why something occurred 3) optimization and simulation algorithms to affect future decisions
34
1) SQL is most like used to _________ 2) C perform similar functions to SQL but ________ 3) C++ can execute queries but ______ 4) JavaScript focused on_______
1) involves extraction, which can be done by running queries 2) the language most likely being used for pulling records in database 3) broader terms of the application it has. SQL is more narrowly focused on queries 4) web programming and host of other applications
35
Employ data mining allows
allows users to perform diagnostic analytics to drill into under lying data to better understand data
36
1) Boxplot shows if there is 2) Dot Plot is a 3) Histogram a 4) Trend Line is a
1) a mean, median, minimum, maximum and outlier to compare 2) two dimensional map that shows the frequency of data points on one axis and another dimension on other 3) bar chart that plots a measurement of data points at different points in time does not show extremes 4) continuous graphing of data points over a specified time period
37
1) Flowchart maps out 2) Waterfall chart shows 3) Directional Chart highlights
1) process, not cumulative effect of data points 2) cumulative effect of series of data points that make up total with incremental contributions making up total net income 3) milestones or events over multiple time periods
38
A key difference in controls when
changing from manual system to a computer system bc its changing methodologies
39
When seeking competitive advantage in planning the implementation of new software system
design an optimal process and then align the software
40
Risk assessment identifies
whether the company has information that unauthorized individuals want.
41
Risk management includes
risk assessment, trade off between risk and reward, risk inherent aspect of project
42
Integrating general and application control procedures
part of basic design ensures effective control procedures
43
General controls in an information system include
information technology infrastructure, security management, software acquisition
44
Reviewing the systems access log most likely detects
computer related fraud
45
Identification of critical applications is important to
include in the disaster and recovery plan
46
Continuity Planning most effectively
restore business operations following a disaster
47
To assure continuity in the event of a natural disaster the firm should
adopt an offsite mirrored web server
48
Cold is a data processing disaster recovery site
but has not been stocked with equipment
49
Hot site is a
Location that is equipped with the necessary hardware and software
50
The primary purpose of a disaster recovery plan is to
specify the steps required to resume operations
51
Incremental backup
backup copying only the data items that have changed since last backup
52
System availability control example
raise the floors in the room where the network resides to avoid flood damage
53
Primary objective of data security controls
access, change, or destruction
54
Systems analyst start the process of
implementing a new software system
55
Computer programmers create a
program based on a design
56
Data entry and application programming should
be delegated to separate individuals
57
A disadvantage of symmetric encrypt data is
both sender and receiver must have the private key before this encryption method will work
58
Systems Analyst develops
long range plans, directing application development and computer operations
59
Physical access control
separates unauthorized individuals from computer resources
60
An application programmer should have the responsibility to
CODE approved changes to a payroll program
61
1) Hashing involves______ 2) Both hashing and asymmetric encryption provides________
1) mapping large quantities of data into smaller table for recovering purposes. Encryption involves using a digital key to scramble. Asymmetric encryption is considered more secure. Symmetric provides less security than asymmetric 2) the same level of assurance enforceability of a digitally signed transactions as an inked signature
62
Public Key Infrastructure (PKI) refers to
processes used to issue asymmetric keys and digital certificates
63
Encryption in a electronically transmitting data would
provide the most assurance unauthorized release of sensitive information would be prevented
64
What is used to prevent unauthorized access to files
Smart Card, Multifactor authentication, Multimodal authentication
65
1) Asymmetric encryption 2) Private key
1) a public key is used to encrypt messages. 2) private key used to decrypt the the message at the other end
66
Read but not write is the access staff accountants should have after
sending to management for approval
67
Firewall prevents
unauthorized users from gaining access to network resources
68
Multifactor authentication requires
both a password and a numerical key generated on a smartphone for its users to log in
69
Users enter a log in name and password in an effort to
strengthen this the installation of fingerprint scanners
70
Biometric Devices use mitigate the risk of
unauthorized access to its payroll data
71
The highest risk of data integrity is
a spreadsheet into which the controller enters summary daily sales data from a printed report of an automated accounting system
72
Calculate monetary value:
(Risk Probability) x (Cost) Risk is measured in: (H) = high action as soon as possible, (M) medium action and corrective action in a reasonable time frame, (L) low action no corrective action
73
The 7 principles of quality management are
Customer Focus, Leadership, People Engagement, Process Approach, Continuous Improvement, Evidence Based Decision Making, Relationship Management
74
Six Sigma
evaluate the achievement of goals and improving processes to reduce defective outputs
75
What does IT stand for
Information Technology