Exam 3 Flashcards

1
Q

Identification

A

Users assigning a unique identifier to the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Authentication

A

Process of associating user/name with other identifier (making sure is legit)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Authorization

A

Associating user with objects/data they’re allowed to access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Methods for authentication and multifactor authentication

A

Something user should KNOW, HAS, and IS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Multifactor authentitication

A

When more than one unique identifier is required by system, to authenticate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Role-based authorization, why’s it used?

A

To restrict network access by assigning individual specific roles that have predefined criteria, for what can/can’t be accessed to.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Role

A

Predefined permission users are assigned

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Permission

A

Right/privilege user has once assigned to a role

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Administrator role

A

Highest role in the hierchary, has premission for all objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Principle of leas privileged

A

Users should be assigned only necessary privileges to do their job

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Provisioning

A

Process of assigning access to users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

De-Provisioning

A

Process of removing access when user changes jobs/leaves organizations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Access Creep

A

Additional roles are assigned to users that are needed temporarily, but not removed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

User access reviews

A

Compare user job responsibilties with a role assigined

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

dormant access review

A

Compare access logs to user permissions to identify permissions that have not been used, and may need to be removed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Dormant user review

A

Compare access logs to users, identify users that have not accessed the system and may need to be removed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Data Center

A

Physical location where servers, network appliances and other hardware to make core IT infrastructure is stored.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Importance of data center control

A

Important because it runs all of IT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

SOC 2 Audit

A

Covers security, availability, processing integrity or privacy for the cloud provider is required. Used when data center is outsourced.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Outside environment

A

Near bottom floors of physical building, building will be on high ground

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Inside environment

A

Own A/C to avoid overheating, non-water fire suppression system presents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Physical security

A

only employees involved with operation allowed, single entry point.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Relationship between incident response, disaster recovery, business continuity.

A

Ensures business and process continue running smoothly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Data Prioritization

A

Companies’ categories systems and data based on importance, they do this in case of disaster recovery and business continuity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Hot backup site

A

immediately operational after disaster, runs continuously

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Warm backup site

A

Equipped with certain servers/equipment need to ramp up operations and takes time to start,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Cold backup site

A

Almost empty room with no servers, equipment needs to be brought in, only has power, AC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Full backup startegy

A

Copying all existing data in its entirety every time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Differential backup strategy

A

Copying data created since most recent full backup everytime

30
Q

Incremental

A

Copying only new and updated data with each backup.

31
Q

Change Manegement

A

Process that changes implementation to a system

32
Q

Types of enviorments

A

Test, Model, Production

33
Q

Test

A

Developer writes the code user requested

34
Q

Model

A

User reviews outcome of the code when it runs model environment.

35
Q

Production

A

Production control employee implements code into production.

36
Q

Purchase requsition

A

Document that initares purchase

37
Q

Supplier selection

A

Suppliers identified, best is chosen

38
Q

Purchase order

A

sent to supplier, specific goods ordered

39
Q

Goods recipt

A

Goods/services are recieved

40
Q

Purchase invoice

A

Bill identifying amount to pay and payment terms is received

41
Q

Cash Payment

A

Supplier is paid

42
Q

Recording (Accounting activites)

A

Information as transaction takes place

43
Q

Processing (Acctg activties)

A

Processing inform to make it available in a useful format

44
Q

Sorting (acctg activties)

A

Data is an organized way

45
Q

Reporting (Acctg activties)

A

reporting information to decision making

46
Q

Control actitvies

A

Proper authorization, segregation of duty, physical control

47
Q

IT general control

A

Logical access control, data center control

48
Q

Organization-wide control

A

Control environment, risk assessment monitoring.

49
Q

Preventative

A

reducing chance of outcome will happen (Likelihood)

50
Q

Detectove:

A

Abke to detect situation quickly (Impact)

51
Q

Corrective

A

Reduce the effect of the outcome (Impact)

52
Q

Steps in revenue process

A

Estimate
Sales Order
Delivery
Sales invoice
Cash Reciept
Bank deposit

53
Q

Steps in revenue recognition

A

Identify- contract with customer
Identify- Performance obligations in contract
Determine- transaction price
Allocate- transaction price to performance obligations in contract
Recognize- revenue when satisfies performance obligations.

54
Q

What Journal entries are a part of the revenue process

A

At sale: Recognize rvenue and cost
At collection: Record cash receipt and reduce A/R

55
Q

General Journal

A

Book of original entry, all journal entires are recorded here.

56
Q

Special Journal

A

Simplify recording process for frequent transactions, group similar entries.

57
Q

Subsidiary Ledger

A

Detailed information on individual accounts for business, slows effect on accounts

58
Q

General Ledger

A

Master record that holds all accounts for business, slows effect on account’s.

59
Q

Process of recording and posting in manual system

A

-Analyze transactions
-Records in the Journal
-Post to GL
-Prepaid trial balance
-Adjust entries
-prepaid financial statements
-close temporary accounts

60
Q

Special journals used in revenue process

A

Simply recording and speed posting by allowing posting of totals for all transactions to commonly used accounts, rather than posting individually.

61
Q

Control account

A

General ledger account associated with a subsidiary Ledger, all transactions end up getting posted twice.

62
Q

3 types of data

A

Configuration data, Master data, Transaction data

63
Q

Configuration data

A

Data that makes system work. (Tax rate, G.L.)

64
Q

Master data

A

Data about the people and resources including accounting transactions

65
Q

Transaction data

A

Data about the activities in the business process (Journal entries)

66
Q

Cost-Benefit constraints in implementing revenue system

A

Prepairing seperate estimate
Sales orders
Recieving recipts
Not able to connect raw materials and finished goods.

67
Q

Bundle

A

I me composed of several other items

68
Q

Bill of materials

A

Including items that are part of the bundle

69
Q

Price (bundle)

A

Sum of the prices of its components

70
Q

What changes are made to the subsidiary ledger data

A

Customers balanced increased and open balance means unpaid A/R balance

71
Q

Payments to a deposit account

A

Is a cash account, used to record cash received, but not yet placed in the bank.