Chapter 7 - IT (Hard/Incorrect Questions Only) Flashcards
The computer operating system performs scheduling, resource allocation, and data retrieval functions based on a set of instructions provided by the
Job Control Language Got this correct first try
A digital signature is used primarily to determine that a message is
UNALTERED IN TRANSMISSION.
You got it incorrect - selected “Not intercepted on route”.
Remember from audit, we said Digital Signatures are on files and e-mails to prove identity of the sender and assure that the information was unaltered in in transmission.
Digital signatures do not (incorrect answers):
- prevent a message from being intercepted on route
- dont ensure the message is received by the intended recipient
- dont ensure its sent to the correct address
What is a major disadvantage to using a private keyto encrypt data?
Both sender and receiver must have privatekey before this encryption method can work
Got right, but wasn’t sure if that was an advantage for a sec
Which of the following aresof responsibility are normally assigned to the systems programmer in a computer system environment?
Maintaining and updating operating systems and compliers.
You thought it was “systems analysis and application programming”. That’s for APPLICATION programming, not system programming
Most client/server applications operate on a three-tiered architecture consisting of which of the following layers?
Desktop client, appliation, and database
got it right. It wouldn’t use the following:
- software
- desktop server
- hardware
A trojan horse is a
computer program that appears to be legitimate but performs an illicit activity when it is run
Critical success factor in data mining a large data store?
Pattern recognition.
You got wrong; had no clue.
From book:
“Data mining searches for patterns and trends in data set to obtain useful information. The recognition of patterns is central, thus a critical success factor of a data mining operation.
Google said:
“Data Mining is an analytic process designed to explore data in search of consistent patterns and/or systematic relationships between variables. Data is typically business or market related”
In whcih of the following locations should a copy of the accounting system data backup of year-end information be stired?
Secured off-site lcoation to protect itf rom theft, sabotage, and natural disasters
Got wrong
A manufacturing comoany that wanted to be able to place material rodersmore efficiantly most likely would utilize
EDI
Got wrong
In business informations processing, “stakeholder” refers to which of the following?
Anyone in the organization who has a role in creating or using documents and data stired on computers and networks.
Got right. Was close to choosing C - authorized users who are granted access rights to documents and data stored on the computers or networks
security awareness manual is what type of control?
A preventative correction error because it suggests the organization educates its employees of procedures to prevent errors or fraud
Which seperates or isolates a networks segment from the main network while maintaing the connection betweek networks?
firewall
got wrong
A company has a significant e-commerce presence and self-hosts its web site. To assure continuity in the event of a natural disaster, the firm should adopt which of the following strategies?
Establish an off-site server
An auditor most likely would test for the presence of unauthorized EDP program changes by running a
source code compariosn program