Chapter 10 – ‘Processing Integrity and Availability Controls’ Flashcards
- Which of the following measures the amount of data that might be
potentially lost as a result of a system failure?
a. recovery time objective (RTO)
b.recovery point objective(RPO)
c. disaster recovery plan (DRP)
d. business continuity plan (BCP)
b.recovery point objective(RPO)(Correct. The RPO measures the time between
the last data backup and the occurrence of a problem.)
- Which data entry application control would detect and prevent entry of
alphabetic characters as the price of an inventory item?
a. field check
b. limit check
c. reasonableness check
d. sign check
a. field check (Correct. Field checks test whether data are numeric or
alphabetic. )
3. Which of the following controls would prevent entry of a nonexistent customer number in a sales transaction? a. field check b. completeness check c. validity check d. batch total
c. validity check (Correct. A validity check compares a customer number
entered into a transaction record against the customer numbers that exist in
the master file or database.)
- Which disaster recovery strategy involves contracting for use of a
physical site to which all necessary computing equipment will be delivered
within 24 to 36 hours?
a. virtualization
b. cold site
c. hot site
d. data mirroring
b. cold site (Correct.)
- Which of the following statements is true?
a. Incremental daily backups are faster to perform than differential daily
backups, but restoration is slower and more complex.
b. Incremental daily backups are faster to perform than differential daily
backups, and restoration is faster and simpler.
c. Differential daily backups are faster to perform than incremental daily
backups, butrestoration is slower and more complex.
d. Differential daily backups are faster to perform than incremental daily
backups, and restoration is faster and simpler.
a. Incremental daily backups are faster to perform than differential daily
backups, but restoration is slower and more complex. (Correct.)
- Information that needs to be stored securely for 10 years or more would
most likely be stored in which type of file?
a. backup
b. archive
c. encrypted
d. log
b. archive (Correct.)
- Which of the following is an example of the kind of batch total called a
hash total?
a. the sum of the purchase amount field in a set of purchase orders
b. the sum of the purchase order number field in a set of purchase
orders
c. the number of completed documents in a set of purchase orders
d. all of the above
b. the sum of the purchase order number field in a set of purchase
orders(Correct. The sum of purchase order numbers has no intrinsic
meaning.)
- Which of the following statements is true?
a. Virtualization significantly reduces RTO for hardware problems.
b. Cloud computing reduces the risk that a single catastrophe from either a
natural disaster or terrorist attack would result in significant downtime and loss
of availability.
c. Backups still need to be made when using either virtualization or cloud
computing.
d. All of the above are true.
d. All of the above are true. (Correct.)
- Which of the following provides detailed procedures to resolve the
problems resulting from a flash flood that completely destroys a
company’s data center?
a. backup plan
b. disaster recovery plan(DRP)
c. business continuity plan (BCP)
d. archive plan
b. disaster recovery plan(DRP)(Correct. A DRP focuses on restoring an
organization’s IT functionality.)
- Which of the following is a control that can be used to verify the
accuracy of information transmitted over a network?
a. completeness check
b. check digit
c. parity bit
d. size check
c. parity bit (Correct. A parity bit is a communications control that counts the
number of bits in order to verify the integrity of data sent and received.)