Exam 1 Flashcards

1
Q

an intentional act where the intent is to destroy a system or some of its components

A

sabotage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

a text file created by Web site and stored on a visitor’s hard drive. Store information about who the user is and what the user has done on the site.

A

Cookie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Any and all means a person uses to gain an unfair advantage over another person

A

fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

typically business people who commit fraud. Usually resort to trickery or cunning, and their crimes usually involve a violation of trust or confidence

A

White-collar criminals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

dishonest conduct by those in power which often involves actions that are illegitimate, immoral, or incompatible with ethical standards. Examples include bribery and bid rigging.

A

Corruption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Misrepresenting or leaving out facts in order to promote and investment that promises fantastic profits with little or no risk. Examples include Ponzi schemes and securities fraud

A

investment fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

theft of company assets by employees

A

misappropriation of assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

intentional or reckless conduct, whether by act or omission, that results in materially misleading financial statements.

A

fraudulent financial reporting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

pressure, rationalization, and opportunity

A

fraud triangle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

a person’s incentive or motivation for committing fraud; could be financial, lifestyle, or emotional. Also management characteristics, industry conditions, and financial can lead to financial statement fraud

A

pressure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

the condition or situation that allows a person or organization to commit and conceal a dishonest act and convert it to personal gain. Commit, conceal, and convert

A

opportunity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

concealing the theft of cash by means of a series of delays in posting collection to accounts receivable

A

lapping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

creating cash using the lag between the time a check is deposited and the time it clears the bank.

A

check kiting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

the excuse that fraud perpetrators use to justify their illegal behaviors. Ex. “I’m only borrowing it,” “The company owes me, I am only taking what is rightfully mine.”

A

rationalization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

any type of fraud that requires computer technology to perpetrate

A

computer fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

easiest type of computer fraud, involves falsifying or altering computer input

A

input fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

includes unauthorized system use, including the theft of computer time and services

A

processor fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

includes tampering with company software, copying software illegally, using software in an unauthorized manner, and developing software to carry out an unauthorized activity

A

computer instructions fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

illegally using, copying, browsing, searching, or harming computer data

A

data fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

displayed or printed output that is stolen or copied or misused

A

output fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

controls that deter problems before they arise.

A

preventive controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

controls designed to discover control problems that were not prevented

A

detective controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

controls that identify and correct problems as well as correct and recover from the resulting errors.

A

corrective controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

controls designed to make sure tan organization’s information system and control environment is stable and well managed.

A

general controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

controls that prevent, detect, and correct transaction errors and fraud in application programs

A

application controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

system that describes how a company creates value, helps employees understand management’s vision, communicates company core values, and inspires employees to live by those values

A

belief system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

system that helps employees act ethically by setting boundaries on employee behavior

A

boundary system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

system that measures, monitors, and compares actual company progress to budgets and performance goals.

A

diagnostic control system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

system that helps managers to focus subordinates’ attention on key strategic issues and to be more involved in their decisions

A

interactive control system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

a security and control framework that allows (1) management to benchmark the security and control practices of IT environments, (2) users of IT services to be assured that adequate security and control exist, (3) auditors to substantiate their internal control opinions and advise on it security and control matters.

A

Control Objectives for information and related technology (COBIT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

includes Control Environment, Risk assessment, control activities, information and communication, and monitoring as guidance for evaluating and enhancing internal control systems

A

Committee of Sponsoring Organizations (Coso) Internal Control-Integrated framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Includes Internal environment, objective setting, event identification, risk assessment, risk response, control activities, information and communication, and monitoring as guidance for evaluating and enhancing internal control systems

A

Enterprise Risk Management framework (ERM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

The company culture that is the foundation for all other ERM components as it influences how organizations establish strategies and objectives; structure business activities and identify, assess, and respond to risk.

A

internal environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

the amount of risk a company is willing to accept to achieve its goals and objectives, To avoid undue risk, risk appetite must be in alignment with company strategy

A

Risk appetite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

the outside, independent board of director members responsible for financial reporting, regulatory compliance, internal control, and hiring and overseeing internal and external auditors

A

audit commitee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

a document that explains proper business practices, describes needed knowledge and experience, explains document procedures, explains how to handle transactions, and lists the resources provided to carry out specific duties

A

policy and procedures manual

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

an investigation of a prospective or current employee that involves verifying their educational and work experience, talking to references, checking for a criminal record or credit problems, and examining other publicly available information

A

background check

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

high level goals that are aligned with and support the company’s mission and create shareholder value

A

strategic objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

objectives that deal with the effectiveness and efficiency of company operations and determine how to allocate resources

A

operations objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

objectives to help ensure the accuracy, completeness, and reliability of company reports; improve decision making; and monitor company activities and performance

A

reporting objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

objectives to help the company comply with all applicable laws and regulations

A

compliance objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

a positive or negative incident or occurrence from internal or external sources that affects the implementation of strategy or the achievement of objectives.

A

event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

the susceptibility of a set of accounts or transactions to significant control problems in the absence of internal control

A

inherent risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

the risk that remains after management implements internal controls or some other response to risk

A

residual risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Impact x likelihood= . . .
the product of the potential dollar loss that would occur should a threat become a reality and the risk or probability that the threat will occur

A

Expected loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

policies, procedures and rules that provide reasonable assurance that control objectives are met and risk responses are carried out

A

control activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

separating the accounting functions of authorization, custody, and recording to minimize an employee’s ability to commit fraud

A

segregation of duties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

cooperation of two or more people in an effort to thwart internal controls

A

collusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

employing multiple layers of controls to avoid a single point failure

A

defense-in-depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

implementing a combination of preventive, detective, and corrective controls that protect information assets long enough to enable an organization to recognize that an attack is occurring and take steps to thwart it before any information is lost or compromised

A

time-based model of security

51
Q

using deception to obtain unauthorized access to information resources

A

social engineering

52
Q

verifying the identity of the person or device attempting to access the system; usually includes something you know, something you have, or some physical or behavioral characteristic

A

authentication

53
Q

a physical or behavioral characteristic that is used as an authentication credential

A

biometric identifier

54
Q

the use of two or more types of authentication credentials in conjunction to achieve a greater level of security

A

multifactor authentication

55
Q

the use of multiple authentication credentials of the same type to achieve a greater level of security

A

multimodal authentication

56
Q

the process of restricting access of authenticated users to specific portions of the system and limiting what actions they are permitted to perform

A

authorization

57
Q

a table used to implement authorization controls

A

access control matrix

58
Q

matching the user’s authentication credentials against the access control matrix to determine whether that employee should be allowed to access that resource and perform the requested action.

A

compatibility test

59
Q

a device that connects an organization’s information system to the internet

A

border router

60
Q

a special-purpose hardware device or software running a general purpose computer that controls both inbound and outbound communication between the system behind the firewall and other networks

A

firewall

61
Q

a separate network located outside the organizations internal information system that permits controlled access from the internet

A

demilitarized zone

62
Q

special purpose devices that are assigned to read the source and destination address fields in IP packet headers to decide where to send the packet next

A

routers

63
Q

a set of if-then rules used to determine what to do with arriving packets

A

access control list (ACL)

64
Q

a process that uses various fields in a packet’s IP and TCP headers to decide what to do with the packet

A

packet filtering

65
Q

a process that examines the data in the body of a TCP packet to control traffic, rather than looking only at the information in the IP and TCP headers. Usually takes longer but is more secure

A

deep packet inspection

66
Q

software or hardware that monitor patterns in the traffic flow to identify and automatically block attacks

A

intrusion prevention systems (IPS)

67
Q

a standard method for verifying the identify of users attempting to connect via dial-in access

A

remote authentication dial-in user service (radius)

68
Q

searching for an idle modem by programming a computer to dial thousands of phone lines

A

war dialing

69
Q

collective term for the workstations,servers, printers and other devices that comprise an organizations network

A

endpoints

70
Q

flaws in programs that can be exploited to either crash the system or take control of it

A

vulnerabilities

71
Q

automated tools designed to identify whether a given system possesses any unused and unnecessary programs that represent potential security threats.

A

vulnerability scanners

72
Q

the process of modifying the default configuration of endpoints to eliminate unnecessary settings and devices

A

hardening

73
Q

the formal process used to ensure that modifications to hardware, software, or processes do not reduce systems reliability

A

change control and change management

74
Q

the process of examining logs to identify evidence of possible attacks

A

log analysis

75
Q

a system that creates logs of all network traffic that was permitted to pass the firewall and then analyzes those logs for signs of attempted or successful intrusions.

A

intrusion detection system (IDS)

76
Q

an authorized attempt to break into the organizations information system

A

penetration test

77
Q

a team that is responsible for dealing with major security incidents

A

computer incident response team (CIRT)

78
Q

a program designed to take advantage of a known vulnerability

A

exploit

79
Q

code released by software developers that fixes a particular vulnerability

A

patch

80
Q

the process of regularly applying patches and updates to software

A

patch management

81
Q

running multiple systems simultaneously on one physical computer

A

virtualization

82
Q

using a browser to remotely access software, data storage, hardware, and applications

A

cloud computing

83
Q

a record of company data sent to an external party and then returned by the external party for subsequent input to the system

A

turnaround document

84
Q

an edit check that tests whether the characters in a field are of the correct field type (ex. numeric data in numeric fields)

A

field check

85
Q

an edit check that verifies that the data in a field have the appropriate arithmetic sign

A

sign check

86
Q

an edit check that tests a numerical amount against a fixed value

A

limit check

87
Q

an edit check that tests whether a data item falls within predetermined upper and lower limits

A

range check

88
Q

an edit check that ensures that the input data will fit into the assigned field.

A

size check

89
Q

an edit check that verifies that all data required have been entered

A

completeness check (or test)

90
Q

an edit test that compares the ID code or account number in transaction data with similar data in the master file to very f that the account exists

A

validity check

91
Q

an edit check of the logical correctness of relationships among data items

A

reasonableness test

92
Q

ID numbers (such as employee number) can contain a check digit computed from the other digits

A

check digit

93
Q

recalculating a check digit to verify that a data entry error has not been made

A

check digit verification

94
Q

an edit check that determines if a batch of input data is in the proper numerical or alphabetical sequence

A

sequence check

95
Q

the sum of a numerical item for a batch of documents, calculated prior to processing the batch, when the data are entered, and subsequently compared with computer-generated totals after each processing step to verify that the data was processed correctly

A

batch totals

96
Q

a type of batch total that equals the sum of a field that contains monetary values, or something that you would normally add like total hours worked

A

financial total

97
Q

a type of batch total generated by summing values for a field that would not usually be totaled

A

hash total

98
Q

a type of batch total that equals the number of records processed at a given time

A

record count

99
Q

an online data entry completeness check that request each required item of input data and then waits for an acceptable response before requesting the next required

A

prompting

100
Q

an input validation method that uses data entered into the system to retrieve and display other related information so that the data entry person can verify the accuracy of the input data

A

closed-loop verification

101
Q

type of internal label that appears at the beginning of each file and contains the file name, expiration date, and other file identification information.

A

header record

102
Q

type of internal label that appears at the end of a file; in transaction files, the trailer record contains the batch totals calculated during input

A

trailer record

103
Q

an error that results when numbers in two adjacent columns are inadvertently exchanged

A

transposition error

104
Q

a processing control which verifies accuracy by comparing two alternative ways of calculating the same total

A

cross-footing balance test

105
Q

a processing control that verifies that the balance of a control account equals zero after all entries to it have been made

A

zero-balance test

106
Q

controls that lock out users to protect individual records from errors that could occur if multiple users attempted to update the same record simultaneously

A

concurrent update controls

107
Q

a data transmission control that uses a hash of a file to very accuracy

A

checksum

108
Q

an extra bit added to every character; used to check transmission accuracy

A

parity bit

109
Q

a data transmission control in which the receiving device recalculates the parity bit to verify accuracy of transmitted data

A

parity checking

110
Q

the capability of a system to continue performing when there is a hardware failure

A

fault tolerance

111
Q

a fault tolerance technique that records data on multiple disk drives instead of just one to reduce the risk of data loss

A

redundant arrays of independent drives (RAID)

112
Q

an alternative power supply device that protects against the loss of power and fluctuations in the power level by using battery power to enable the system to operate long enough to back up critical data and safely shut down

A

uninterruptible power supply (UPS)

113
Q

a copy of a database, file or software program

A

backup

114
Q

the amount of data the organization is willing to reenter or potentially

A

recovery point objective (RPO)

115
Q

to restore an organization’s information system following a disaster, representing the length of time that the organization is willing to attempt to function without its information system

A

recovery time objective (RTO)

116
Q

maintaining complete copies of a database at two separate data centers and updating both copies in real-time as each transaction occurs

A

real-time mirroring

117
Q

exact copy of an entire database

A

full backup

118
Q

a type of partial backup that involves copying only the data items that have changed since the last partial backup. This produces a set of incremental backup files, each containing the results of one day’s transactions

A

incremental backup

119
Q

a type of partial backup that involves copying all changes made since the last full backup. Thus, each new differential backup file contains the cumulative effects of all activity since the last full backup.

A

differential backup

120
Q

a copy of a database, master file, or software that is retained indefinitely as a historical record, usually to satisfy legal and regulatory requirements

A

archive

121
Q

a plan to restore an organization’s IT capability in the event that its data center is destroyed

A

disaster recovery plan (DRP)

122
Q

a disaster recovery option that relies on access to an alternative facility that that is prewired for necessary telephone and internet access, but does not contain any computing equipment

A

Cold site

123
Q

a disaster recovery option that relies on access to a completely operational alternative data center that is not only prewired but also contains all necessary hardware and softeware

A

hot site

124
Q

a plan that specifies how to resume not only IT operations but all business processes in the event of a major calamity

A

business continuity plan (BCP)