Chapter 7 - IT (Hard/Incorrect Questions Only) Flashcards

1
Q

The computer operating system performs scheduling, resource allocation, and data retrieval functions based on a set of instructions provided by the

A

Job Control Language Got this correct first try

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A digital signature is used primarily to determine that a message is

A

UNALTERED IN TRANSMISSION.

You got it incorrect - selected “Not intercepted on route”.

Remember from audit, we said Digital Signatures are on files and e-mails to prove identity of the sender and assure that the information was unaltered in in transmission.

Digital signatures do not (incorrect answers):

  • prevent a message from being intercepted on route
  • dont ensure the message is received by the intended recipient
  • dont ensure its sent to the correct address
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a major disadvantage to using a private keyto encrypt data?

A

Both sender and receiver must have privatekey before this encryption method can work

Got right, but wasn’t sure if that was an advantage for a sec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following aresof responsibility are normally assigned to the systems programmer in a computer system environment?

A

Maintaining and updating operating systems and compliers.

You thought it was “systems analysis and application programming”. That’s for APPLICATION programming, not system programming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Most client/server applications operate on a three-tiered architecture consisting of which of the following layers?

A

Desktop client, appliation, and database

got it right. It wouldn’t use the following:

  • software
  • desktop server
  • hardware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A trojan horse is a

A

computer program that appears to be legitimate but performs an illicit activity when it is run

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Critical success factor in data mining a large data store?

A

Pattern recognition.

You got wrong; had no clue.

From book:
“Data mining searches for patterns and trends in data set to obtain useful information. The recognition of patterns is central, thus a critical success factor of a data mining operation.

Google said:
“Data Mining is an analytic process designed to explore data in search of consistent patterns and/or systematic relationships between variables. Data is typically business or market related”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In whcih of the following locations should a copy of the accounting system data backup of year-end information be stired?

A

Secured off-site lcoation to protect itf rom theft, sabotage, and natural disasters

Got wrong

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A manufacturing comoany that wanted to be able to place material rodersmore efficiantly most likely would utilize

A

EDI

Got wrong

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In business informations processing, “stakeholder” refers to which of the following?

A

Anyone in the organization who has a role in creating or using documents and data stired on computers and networks.

Got right. Was close to choosing C - authorized users who are granted access rights to documents and data stored on the computers or networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

security awareness manual is what type of control?

A

A preventative correction error because it suggests the organization educates its employees of procedures to prevent errors or fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which seperates or isolates a networks segment from the main network while maintaing the connection betweek networks?

A

firewall

got wrong

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A company has a significant e-commerce presence and self-hosts its web site. To assure continuity in the event of a natural disaster, the firm should adopt which of the following strategies?

A

Establish an off-site server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An auditor most likely would test for the presence of unauthorized EDP program changes by running a

A

source code compariosn program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following is not considered to be a risk associated with the performance of an audit in an IT environment?

A

circumvention

17
Q

Which of the following statements is not true of the test data approach when testing a computerized accounting system?

A

Test data must consist of all possible valid and invalid conditions

18
Q

What should be examined to determine if an information system is operating according to prescribed procedures?

A

system control

19
Q

Which one of the following artificial intelligence information systems cannot learn from experience?

A

Rule-based expert systems. think about it

20
Q

.

According to COBIT 5, covering the enterprise from end-to-end means that COBIT 5

A

Integrates governance of enterprise IT with enterprise governance

21
Q

An information technology director collected the names and locations of key vendors, current hardware configuration, names of team members, and an alternative processing location. What is the director most likely preparing?

A

A disaster-recovery plan. Doing these will facilitate rapid operation recovery in the event of a disaster

22
Q

A company has a significant e-commerce presence and self-hosts its web site. To assure continuity in the event of a natural disaster, the firm should adopt which of the following strategies?

A

Establish an off-site mirrorwed web server

You said “store records offsight”. Remember, this is an e-commerce heavy website. Also, storing it off-site would tkae more time to reupload info than sttoring it somewhere else online

23
Q

Which of the following statements presents an example of a general control for a computerized system?

A

restricting access to computer center through use of biometric devices

24
Q

Mill Co. uses a batch processing method to process its sales transactions. Data on Mill’s sales transaction tape are electronically sorted by customer number and are subjected to programmed edit checks in preparing its invoices, sales journals, and updated customer account balances. One of the direct outputs of the creation of this tape most likely would be a

A

report showing exceptions and control totals

25
Q

To obtain evidence that user identification and password controls are functioning as designed, an auditor would most likely

A

Examine a sample to determine whether password holders may have access to something incomaptible with their authroity

26
Q

An auditor using audit software probably would be least interested in which of the following fields in a computerized perpetual inventory file?

A

economic order quantity

irrelevant for auditor

27
Q

An auditor would least likely use computer software to

A

Assess EDP control risk

that requires JUDGEMENT

28
Q

In an IT department in a fairly large company, which of the following would be responsible for the security of shared data stored in a database system?

A

Database ADMINISTRATOR

NOT:

Data librarian

Data control clerk

systems analysy

29
Q

.

Duties that are considered incompatible and should be segregated in an IT environment are:

A

Authorization, recording, custody

(normal ARC)

30
Q

Which of the following is not an input control?

A

parity check ; thats a hardware control

31
Q

Which of the following is not considered to be a risk associated with the performance of an audit in an IT environment?

A

circumvention

32
Q

An audit client is using a computer program to process its data that the auditor wishes to verify. There is no appropriate equivalent program available to the auditor, requiring the auditor to apply techniques involving the direct use of the client program.

A

A auditor can verify that a program to be tested is the one used processing actual data through controlled reprocessing

33
Q

A research-based firm in the medical field could use each of the following Internet-based tools for collaboration, except

A

EDI

34
Q

Jones, an auditor for Farmington Co., noted that the Acme employees were using computers connected to Acme’s network by wireless technology. On Jones’ next visit to Acme, Jones brought one of Farmington’s laptop computers with a wireless network card. When Jones started the laptop to begin work, Jones noticed that the laptop could view several computers on Acme’s network and Jones had access to Acme’s network files. Which of the following statements is the most likely explanation?

A

Acme was not using security on the network

35
Q

Most client/server applications operate on a three-tiered architecture consisting of which of the following layers?

A

Desktop client/application database

Thought was “DESKTOP SERVER”