Information Technology Flashcards

1
Q

What is one of the most important compensating controls in a small business?

A

Engaging the owner in activities - the owner should have direct participation in business activities, including financial record keeping.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does Automated Transaction Processing result in?

A

Uniformity of transactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which system needs a greater level of controls - manual or automated?

A

Manual

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Computer processing virtually eliminates the occurrence of what?

A

Computational error normally associated with manual processing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are six risks that are still faced despite switching from a manual to an automated system?

A
  1. Faulty programs
  2. Unauthorized access
  3. Unauthorized changes
  4. Failure to update the system
  5. Manual intervention
  6. Data loss
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the 3 main areas of the COBIT Framework?

A
  1. Domains and Processes
  2. Information Criteria
  3. IT Resources
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the 4 domains that encompass the domains and processes of the COBIT Framework?

A
  1. Planning and organization
  2. Acquisition and implementation
  3. Delivery and support
  4. Monitoring
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What makes up the information criteria of the COBIT framework?

A
  1. Effectiveness
  2. Efficiency
  3. Confidentiality
  4. Integrity
  5. Availability
  6. Compliance
  7. Reliability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What makes up the IT resources of the COBIT framework?

A
  1. People
  2. Applications
  3. Technology
  4. Facilities
  5. Data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is something that a firm may not be too concerned about when enhancing IT?

A

Cutting costs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are important goals of an ERP system?

A

Improving responsiveness and flexibility and aiding int he decision making process in an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define the ERP system:

A

Provides transaction process, management support, and decision making support in a single, integrated package.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What do ERP’s attempt to eliminate?

A

Many of the problems faced by organizations when they attempted to consolidate information from operations into multiple departments, regions and divisions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is scalability?

A

Capacity of a system to grow with the information processing needs of an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is SaaS?

A

Use of the cloud to use and access software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is PaaS?

A

Use of the cloud to create software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is IaaS?

A

Use of the cloud to access virtual software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is an online analytical processing system (OLAP)?

A

Incorporates data warehouses and data mining capabilities with ERP. It primarily provides an integrated view of transactions in all parts f the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is an online transaction processing system (OLTP)?

A

Records day to day operation transactions and enhances visibility of these transactions throughout the system. It is primarily concerned with collecting data (and not analyzing it) across the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

According to COSO, evaluating the quality and nature of IT department staff trainings demonstrates what?

A

A commitment to retain competent individuals in alignment with objectives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the problem with a programmer who writes applications for a firm but also has access to the file library (aka the archives?

A

She has the capability to change both live and archived copies of programs, and the changes may not be detected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Coding approved changes to a payroll program is an appropriate responsibility for who?

A

An application programer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A company that sells hand carve statues from rural Indonesia online is using what to sell their product?

A

Product differentiation - competitors are unlikely able to sell the same product.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

How can IT influence product differentiation?

A
  1. Use the internet as a distribution channel
  2. IT can improve quality and can create differentiation through the use of lasers and 3D printers
  3. Products are increasingly digitized. So quality is better but the costs are lower.
  4. Info on the internet can be updated faster than catalogues - product cycles are shorter and the evolution of products is faster that allows for differentiation.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

How can IT influence cost leadership?

A
  1. Reduce costs, improves efficiency of production and delivery systems
  2. Intense price completion due to the internet being available to almost everyone. So because of this, there could be shifts away from low cost to produce differentiation instead.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is MIS?

A

Management information system. Supports routine management problems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is AIS?

A

Accounting Information System and is the subset of MIS. It pulls financial data from transaction processing systems to create financial statements and management control reports (I..e A/R agin). Yardi is an AIS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is DSS?

A

Decision Support Systems - provides info to managers to assist in managing non-routine issues and LT planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is an ESS?

A

Executive Support System - subset of DSS that are especially designed for forecasting and making long range strategic decisions, and they place greater emphasis on external data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What has the greatest impact on the decisions of an effective management reporting system?

A

The types of decisions that need to be made

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Petco has a system that examines large sets of data to determine patterns in client’s use of facilities. What is this an example of?

A

DSS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

BOD of manufacturing Co. is considering whether to expand manufacturing facilities to include a produce line Board is using both internal and external information concerning economic conditions, market projects for new product, cost of L/T financing alternatives and info about potential new competitors. What is this an example of?

A

ESS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

For CPA purposes, flat file systems are?

A

Bad/antiquated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

For CPA purposes, database systems are?

A

Good

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is a data warehouse?

A

Archive of an organizations operational transactions (sales, purchases, production, payroll) over a period of years

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Can external data be included in data warehouses?

A

Yes, external data that might be correlated with these transactions, such as economic indicators, stock prices, and exchange rates, is included.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is data mining?

A

process of performing statistical analysis and automatically searching for patterns in large volumes of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What is a data mart?

A

specialized version of a data warehouse that contains data that is pre-configured to meet the needs of specific departments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

RJ is reading an online summary production cost report and wants to known why the use of hammers used in construction of buildings is so high. What does he need to do?

A

Drill down. Which means he needs to move from summary to detailed information to determine its cause.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Database management software is considered both software and?

A

Midaleware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Customer #, Customer Name, Customer Phone, Customer Contract, Customer Credit Limit are all examples of:

A

Fields - also known as attributes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Order data elements:

A

Files are composed of:
Records: are composed of:
Fields: are composed of
Data Values: are composed of
Bytes (characters) are composted of:
Bits: smallest element of storage in computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Why are microcomputers more cost effective than mainframes for data entry and presentation?

A

Microcomputers are better suited to frequent screen updating and graphical user interfaces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What does a optical disc recorder use to burn data?

A

A laser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What are a few characteristics of solid state storage?

A

Not a ton of storage, but has great security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What is RAM?

A

Random access memory - temporary data store

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What are magnetic discs?

A

efficient way to store and retrieve individual records (secondary storage)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What is ROM?

A

Read only memory - permanently store data needed to power on computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What is a CPU?

A

central processing uint - control center of the computer system and had 2 d principal components.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

What is OLRT?

A

online real time system - example would be what is use for airline reservations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What are master files?

A

Computerized counter part of ledgers found in manual systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

What do master files do?

A

They maintain balances by accounts (financial statement accounts, customer accounts, vendor accounts, etc) they perform the same function as ledgers (and subsidiary ledgers) do in manual systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

What will speed up the adoption of automated authentication?

A

Adoption of loT.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

What is a reason for a retailer in particular to want to adopt a new payment system?

A

Reduce abandonment rates. Abandonment is the rate at which customers abandon purchases at check out.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

When a firm uses data on the strength of a user’s touch on a keyboard to partially authenticate users, it is using what type of authentication?

A

Multifactor authentication. The key word here is partially. Although this is a biometric authentication.. this is only a portion of the authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

What are HMDs?

A

Attach sensors to glasses or helmets and are therefore a type of loT device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Automating security system changes internal controls control over access to systems is part of what?

A

Accounting controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

What are a few examples of what you can use HMDs for?

A
  1. Real time system monitoring
  2. Visualizing
  3. Video conferencing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

What is Big Data?

A

Creation, analysis, storage, and dissemination of extremely large data sets. It is possible now because of technologies like cloud data. It also changes a company’s risk profile.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

What is dark data?

A

Underused data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

What is loT?

A

“Internet f Things” and is also an example of big data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

What are some examples of Big Data?

A

Dark data, multifactor identification data, video conferencing data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Is sales data big data?

A

It’s a traditional data source.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

What are some benefits of big data?

A
  1. Target marketing
  2. Improved system monitoring
  3. Better compliance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Are IT Cost Savings a benefit of big data?

A

No, big data projects are expensive and therefore IT cost savings from big data are unlikely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

What are some roles for accountants in big data?

A
  1. Assessing quality and integrity of big data
  2. Integrating big data into evolutions of internal control
  3. Data scientists

*They do not hold the responsibility for building them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

What relationship does big data have with existing data warehouses?

A

Big Data uses existing data warehouses, but data warehousing is not a direct enabler of big data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

What are some enablers of big data?

A

Analytics, dark data, loT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Describe what a bitcoin is.

A

It is an intangible asset. It has value but no physical form. It is a form of electronic cash. The IRS taxes it as property. It is decentralized and not under the control of the government.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

What type of network does bitcoin have?

A

Peer-to-peer network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Is bitcoin susceptible to fraud?

A

Yes - particularly the Ponzi scheme.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Describe what a block chain is.

A

It is a decentralized, distributed ledger. It is a non-modifiable audit trail of transactions. Everyone in the peer to peer “network” can always log, view and confirm. It is an electronic file that consists of blocks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Which component of the COSO framework is Blockchain a powerful example of?

A

Continuous monitoring. Blockchain is an excellent example of new technology that enables continuous monitoring of the accounting system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

What is an important outmode of the use of blockchain?

A

Reduced auditing and compliance costs are an important outcome of the use of blockchain. Since the accounting transaction are stored on an automated, secured network, then auditing and compliance costs should go down.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Provide a short description of AI technologies.

A

Include reasoning and judgement abilities that do not exist in most applications. It can be biased.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

What is an example of AI technology?

A

IBM’s Watson system. It is used by KPMG to generate predictive analytics that help clients identify and manage F/S risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

What does AI depend heavily on?

A

Fast computers and big data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

What is a goal of AI?

A

Machine learning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

What are some risks of AI?

A

Confirmation bias, privacy issues, prediction bias.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Is AI used when preparing F/S?

A

Preparing F/S is a standardized task that is least likely to be mostly automated into the AI system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

What are some examples of Accounting work with AI?

A
  1. Working w/ an AI to harvest and clean data for use in predicting fraud risk.
  2. Working on a legacy system with AI assistance, that is uneconomical to replace with AI technology
  3. Develop and AI system to analyze the risk of investing in the extraction industry.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

How should management assess cyber risk?

A

Management must know and understand which systems are critical to organizational objectives an understand which systems are most valuable to the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

When it comes to assessing cyber risk, who should lead the initiative?

A

SR management should lead the initiative and collage with business and IT stakeholders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Why must you understand the industry when assessing cyber risk?

A

Because cyber criminals often engineer industry specific attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

Who should be notified first about cyber breaches?

A

The entity’s external auditors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

What types of controls can an entity manage cyber risks?

A

Should attempt to prevent cyber breaching with preventative controls but also address those that occur through detect and corrective controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

What are the 5 functions of the framework for cyber security?

A
  1. Identify
  2. Protect
  3. Detect
  4. Respond
  5. Recover
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

What are the subcategories of the framework for cyber security?

A
  • Identify and catalog external information systems
  • Protect data at rest
  • Investigate notifications from detection systems.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

What are the 4 implementation tiers?

A

Tier 1 - Partial
Tier 2 - Risk informed
Tier 3 - Repeatable
Tier 4 - Adaptive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

Firm is reviewing its cyber security to explore its current state and related risks as part of establishing a high level objectives for cybersecurity. In the framework of cyber security, this is an example of?

A

The element categories and the function identify. The organization is exploring how is it doing? at a higher level related to cyber security. Function “identify” because the focus is on high level objectives and element is categories.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

Are IT policies particularly important in decentralized or centralized companies?

A

Decentralized since IT services are likely to be less under the control of management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

What are the five IT security principals specified by the AICPA?

A
  1. Security
  2. Availability
  3. Processing Integrity
  4. Confidentiality
  5. Privacy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

Which on of the five IT security principals specified by the AICPA is the foundation of systems reliability?

A

Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

Which one of the five IT security principals specified by the AICPA supports system availability for operations and monitoring?

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

Which one of the five IT security principals specified by AICPA is the completeness, validity, accuracy,y timeliness, and authorization of system processing?

A

Processing integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

Which one of the five IT security principals is related to the collection, use, retention, disclosure, and disposal of personal info?

A

Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

What is defense in depth and provide an example?

A

Includes the implementation of multiple control layers. An example would be if an organization implements an integrated package of authentication controls related to critical systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

Which one of the five IT security principals concerned when confidential information is protected consistently with the organization’s commitments and agreements?

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

What is GAPP?

A

A set of criteria to guide best practices related to data privacy.

100
Q

A manufacturing company discovers that its rollback and retention procedures do not include data from a key system related to production quality? What does this problem relate to?

A

Disaster recovery preparation, which is a subcategory of IT policies.

101
Q

Do IT policies need to relate specifically to physical or electronic threats to IT policies?

A

No, not necessarily .

102
Q

What is quality as it relates to IT policies?

A

Statement of IT performance standard.

103
Q

What is electronic communication use as it relates to IT policies?

A

Policy related to employee use of the Internet, intranet, e-mail, etc.

104
Q

What is security as it relates to IT policies?

A

Guarding against physical or electronic threats to IT

105
Q

What is B2B E-Commerce?

A

Includes EDI, supply change management (SCM) and EFT.

106
Q

What is B2C E-Commerce?

A

Selling to consumers using the internet and web based technology.

107
Q

What is B2E E-commerce?

A

Interact withe employees through portals and intranets.

108
Q

What is B2G E- Commerce?

A

G stands for government. Providing property tax data online, paying parking tickets online, online contract bidding.

109
Q

What does an e-procurment company seek bids to do?

A

Provide a product or service.

110
Q

What are some risks/problems of E-Commerce?

A

System availability, non repudiation, failure to trust trading partners, establishing identity and authenticity, privacy of customers info, secure exchange for payment of goods/services.

111
Q

What is EDI?

A

Electronic data interchange - system to system exchange of business data (I.e. purchase orders, confirmations, invoices, etc) in structured formats that allow direct processing of the data by the receiving system.

For example - Commerical cafe

112
Q

What is CRM?

A

Customer relationship management - provides tools to analyze the information and develop personalized marketing plans for individual customers.

113
Q

What is a token based payment system?

A

Electronic cash, smart cards, paypal

114
Q

What is a common motivation for the use of a VAN?

A

Increased security

115
Q

Encryption can be used to ensure the privacy and security of EDI messages both during _____ and when ____.

A

Transmission and when stored.

116
Q

What is more secure, hardware encryption or software encryption?

A

Hardware encryption is inherently more secure than software based encryption. Software can be more easily accessed and altered than hardware.

117
Q

Why is the CEO of a small entity is more likely than the CEO of a large entity to be aware of the risks arising from internal factors?

A

CEO of small entities will have hands on involvement with all levels of personnel.

118
Q

An internal private cloud is not shared and is wholly owned and managed within what?

A

Within the entity. This is not an example of IT outsourcing.

119
Q

What is an essential element of an internal cloud?

A

It is behind an entity’s firewall.

120
Q

What do effective cloud solutions required?

A

Require considering and integrating relevant business process, a deployment model, and a service delivery model.

121
Q

How do you manage the lack of CSP transparency?

A

When the firm who purchases CSP regularly requests and receives data about the system’s performances of CSP.

122
Q

Who should test spreadsheets of a small business and why?

A

Spreadsheets as part of a small business computing should be reviewed and tested by an independent 3rd party to ensure they operate as expected.

123
Q

What is most likely to be absent in a small business computer environment?

A

Authorization. There is a great need for a 3rd party review and testing within the small business computing environment.

124
Q

What is an important physical security control in a small business environment?

A

Locking doors when offices are open and removing storage devices to secure locations.

125
Q

What are three important things that need to happen in a small business computing environment?

A
  1. Independent 3rd party review is especially important.
  2. Back up procedures are important
  3. Additional supervision of computing may be necessary
126
Q

What is a data warehouse?

A

Example of online analytical processing. Combines data into subject oriented, integrated collection of data used to support the management decision making process.

127
Q

When would a distributed processing environment be most beneficial?

A

When large volumes of data are generated at many locations and fast access is required. It is useful when processing is done in multiple locations. It enables the processing of large volume of transactions and fast access to data.

128
Q

What is a hybrid/distributed database system?

A

A system that distributes processing to local units but also maintains a centralized database.

129
Q

What is a decentralized system?

A

A system that allows for more customization to meet the needs of location operations.

130
Q

What is a centralized system?

A

Similar to M:Drive - can remove in, bit it is all centralized in one location.

131
Q

How does a peer to peer network work?

A

A central server is not required. It is simple, expensive, and used by LANs.

132
Q

What are LANs?

A

Network confined to limited geographic area and are dedicated lines.

133
Q

What are WANs?

A

National/international network that are on public or shared lines. This is the most appropriate type of network for a company that needs its network to function inexpensively in widely separated geographical areas.

134
Q

What is a node?

A

A device connected to a computer network.

135
Q

What is a twisted pair?

A

Low cost comparatively low quality transmission media

136
Q

What is an extranet?

A

Open to an organization’s associates (company suppliers, customers, business partners, etc) to access data that is relevant to them.

137
Q

What is HTML?

A

Core markup language (a way of tagging text) for Web Pages.

138
Q

What is TCP/IP?

A

Data control protocol/internet protocol that is the control transmission on the internet.

139
Q

What is XBRL?

A

specifically designed to exchange financial info over the WW web

140
Q

What are application firewalls?

A

Have the ability to do much more sophisticated checks and provide much better control (thats network firewall fo example)

141
Q

What is a network firewall?

A

Perform relatively low level filtering capabilities.

142
Q

What would data control language used in a relational database most likely include?

A

Commands used to control which users have various privileges relating to a database. For example, who is able to read from and write to various portions of the database.

143
Q

What are internal disk labels read by?

A

Software.

144
Q

What is used to identify data records in an accounting system file?

A

Headers. This has nothing to do with the formal of a word processing document - but the title was misleading.

145
Q

What type of controls are IT facility controls?

A

General

146
Q

What floor in a building is the best choice to locate a centralized computer facility?

A

Middle Floor.

147
Q

What type of control would restricting physical access to the IT department be?

A

Preventative control. It prevents unauthorized individuals from gaining physical access to the system.

148
Q

What are SET protocols?

A

Secure Electronic Transactions. These protocols are used for credit card payments so that the merchant can securely transmit payment payment information and authenticate.

149
Q

What us cipher text?

A

Text that has been mathematically scrambled so its meaning cannot be determined without the use of an algorithm key.

150
Q

What is a VPN?

A

Virtual Private Network. It is a secure way to create an encrypted communication tunnel to allow remote users and encryption to prevent unauthorized users from intercepting data.

151
Q

What types of keys can be used to encrypt and decrypt messages?

A

Both public and private keys. Public key can only decrypt messaged encrypted with a private key and vice versa.

152
Q

What provides the most reliable form of electronic authentication?

A

Digital certificates. They provide a higher level of reliability than a digital signature.

153
Q

What occurs with a digital certificate?

A

An independent background check is completed ton confirm the identify of the requesting entity.

154
Q

How does a digital signature work?

A

Uses public/private key encryption technology to provide means of authenticating messaged delivered I a networked environment.

155
Q

Who has the private key in asymmetric encryption?

A

The receiver.

156
Q

What is a cold site for disaster recovery?

A

No computers. Cheap. Off-site location.

157
Q

What is a warm site for disaster recovery?

A

Has computers, not back up data. Costs a little more money than a cold site but less than a hot site.

158
Q

What is a hot site for disaster recovery?

A

Has everything and is a near immediate operation. More expensive than a warm.

159
Q

What is a mirrored site?

A

Fully redundant and the most expensive. It is fully staged with real time replication.

160
Q

What types of tasks are given first priority in disaster recovery planning?

A

Mission critical tasks.

161
Q

What type of disaster recovery is described by an alternative location where there will be a delivery of duplicate computer hardware

A

Cold site. The hardware and records are being delivered after the occurrence of a disaster.

162
Q

What information would contribute to the development of a disaster recovery plan?

A

Collecting names and locations of key vendors, current hardware configuration, names of team members, and finding an alternative processing location.

163
Q

How many remote back up sites should a firm have?

A

A firm should maintain at least one remote archive offsite.

164
Q

What is a checkpoint and restart backup?

A

This is common with batch processing. It is the point where processing accuracy is verified. There are periodic backups and if there is a problem, you would be able to return to the most recent checkpoint and restart.

(Like and iPhone backup - when you back up to the cloud, you can return to the point where the last back up was)

165
Q

What is a rollback and recovery backup?

A

Common to online, real time processing. There is a record processing transaction in a log. Periodically record master file contents and if there is a problem, you return to the good master file and reprocess subsequent transactions.

166
Q

What are fault tolerant systems?

A

They operate despite component failure.

167
Q

What are high availability clusters?

A

Computer clusters designed to improve service availability which is common in e-commerce.

168
Q

What is a remote (online) backup by a managed provider?

A

Automated, outsource to experts, off site, and can be continuous

169
Q

What are SANs?

A

Storage Area Networks which replicate data from multiple sites. Date is immediately available. This is efficient storage for services.

170
Q

What is mirroring?

A

Maintaining an exact copy of the data set. It is stored in the same original format and not zipped. It is very fast, but it is very expensive.

171
Q

What is a backdoor computer attack?

A

Malware program that allows an unauthorized user to gain access to the system by side stepping the normal logon procedures.

172
Q

What is a DNS attack?

A

Prevents legitimate users from accessing the system by flooding the server with incomplete access requests.

173
Q

What is a logic bomb?

A

Program planted in system and is dormant until an event or time.

174
Q

What are two types of malicious software?

A

Virus - which is an unauthorized program that copies itself and damages data.

Worm - virus that replicates across systems, I.e. by sending email floods.

175
Q

What is a Trojan horse?

A

Program hidden inside a benign file and can insert itself back door. It appears to be legitimate, but performs illicit activity when its run.

176
Q

What are packet sniffers?

A

They capture packets of data s they move across a computer network. They are used to monitor performance and trouble shoot problems. However, they can also be used by hackers to capture usernames/passwords and other info to help them hack the network.

177
Q

What is a “man in the middle?”

A

Impersonates sender and receiver.

178
Q

What is Salami Fraud?

A

Transfers tiny amounts (penny or less) from a large # of accounts.

179
Q

What is social engineering?

A

Access by tricking employees. An example would be “phishing” which sends spoofed emails with fraudulent websites to fool people entering financial/identification information.

180
Q

What is the most appropriate data gathering techniques for a system?

A

Interviews
Quick questionnaires
Observations
Systems documentation

181
Q

After changes to a source program have been made and verified, it moves to where?

A

Production

182
Q

What is change control?

A

The process of authorizing changes, approving tests results, and copying development programs to a production library.

183
Q

When management of a company has a lack of SOD within the application environment, with programers having access to development and production as well as having the ability to implement application code changes into production without monitoring or a quality assurance function, this is considered a deficiency in what?

A

Change control

184
Q

What is a SPLMS?

A

Source program library management system. The functions include storing, retrieving, deleting, and documenting by who, where, and how programs are changes.

185
Q

What are the 4 levels of documentation for processing integrity?

A
  1. Systems Documentation
  2. Program Documentation
  3. Operating Documentation
  4. User Documentation
186
Q

What are some forms of documentation for processing integrity?

A

Questionnaires, narratives, data flow diagrams, flowcharts, decision tables, and entity relationship

187
Q

What is a SPL?

A

Source Program Library - critical tot he internal control system by securing/archiving computer programs in a library, and separating them from live programs by storing the library offset.

188
Q

What is systems documentation?

A

Shows the program and data files, processing logic and interactions w/ other program. (narratives, flow charts)

189
Q

What is program documentation?

A

Detailed analysis of the inputed data, logic, and output of software. (flowcharts, source code listings, and record layouts)

190
Q

What is operator documentation?

A

“run manual” - necessary info to execute the program (equipment, data files, computer supplies, execution commands, error messages, verifications, expected output)

191
Q

What is user documentation?

A

Documents system in language so that an end user can understand when to submit data and request reroutes + procedures for verifying the accuracy of data and correcting errors.

192
Q

What are 6 reasons as to why organizations document their accounting systems.

A
  1. Required by law
  2. Facilitates building and evaluating complex systems
  3. Training
  4. Improve system survival and sustainability
  5. System Audits
  6. Process re-engineering.
193
Q

What are application controls?

A

Concern the accuracy, validity, and completeness of data processing in specific application programs. Examples are input and origination controls, processing and file controls, and output controls.

194
Q

What is an important determinant of the correct answer regarding application controls?

A

Whether it is batch or OLRT processing.

195
Q

What do input controls over transactions do?

A
  1. Validity - transactions are authorized with no duplicates and no fictitious transactions
  2. Completeness - All transactions have been captured
  3. Accuracy - data has been correctly transcribed, account codes are correct, and all data fields present.
196
Q

What are some examples of input controls?

A
Missing data check
Field check
Limit test (rang/sign test)
Validity Test
Check digit (used for batches)
Logic/Reasonableness Test
Sequent Check
Key Verification 
Closed loop verification 
Batch control totals (financial, hash, record counts)
Reprinted forms and pre-perfomatted screens 
Default values
Automated data controls
197
Q

What type of input control would catch an error like entering April 31st since there are only 30 days in April?

A

Logic/Reasonableness Test

198
Q

What type of input control compares value entered in a field to a list of valid data values and an error message is displayed when the value is not found on the list?

A

Valid/validity test

199
Q

What type of input control helps ensure that a valid and correct account has been entered - after code is entered the system looks up and displays additional info about selected code?

A

Closed loop verification

200
Q

What is an example of a closed loop verification?

A

Bank clerk enters account # and customer into pop ups which ensures $$ goes into correct account.

201
Q

How does a record count input control work?

A

Simple count the number of records in a batch. For example:

Invoice #:
101
102
103
104
105 

Record count is 5.

202
Q

What is an important determinant of the correct answer for questions about application controls?

A

Processing method

203
Q

What are some processing controls?

A

Run to run controls
Internal labels (“header/trailer” records)
Audit Trail controls

204
Q

What are the different types of files?

A

Master files, standing data, transaction files, system control parameter files

205
Q

What is the primary goal of data control?

A

Ensure that access, change, or destruction of data and storage media is authorized.

206
Q

What are examples of file controls?

A
Parity check
Read after write check 
Echo check 
Error reporting and resolution 
Boundary protection
Internal labels
External labels
Version control 
File Access and Updating Controls
207
Q

What is the type of file control that is designed to detect errors in data transmission?

A

Parity Check

208
Q

What type of file control is designed to prevent the mixing of data on a magnetic memory discs and a core storage unit?

A

Boundary Protection

209
Q

What are examples of output controls?

A
Spooling (print queue) controls
Disposal of aborted print jobs
Distribution of reports
End user controls
Logging and archiving 
Record retention and disposal
210
Q

What will allow a review of an individual’s access to the system?

A

A computer log.

211
Q

How does the accounting cycle begin?

A

By recording business transactions in the form of journal entries.

212
Q

What is the life cycle of journal entries?

A

They are first recorded in general journals. Then they are posted to ledger accounts.

213
Q

What does the financing cycle contribute to?

A

The financing cycle contributes funds to the expenditure cycle, which contributes RM to the production cycle.

214
Q

What two cycles receive cash?

A

Revenue and Financing. Revenue receives cash from sales and financing receives cash from financing activities (creating debt & equity for example)

215
Q

What are the components of the Revenue cycle?

A

Sales -> Ship/Deliveries -> Accounts Receivable -> Getting Cash

216
Q

What is the most important document in the billing process?

A

Sales invoice.

217
Q

What is a picking ticket?

A

Identifies the items to be pulled for a sales order.

218
Q

What is a bill of lading?

A

The authorization for and terms of a shipping agreement. It is the legal contract between seller and shipper.

219
Q

What is a remittance advice used for?

A

Matching payments and invoices.

220
Q

Why is the segregation of duties of the receiving function from the purchasing function important?

A

It allows for all purchase orders to be checked by a separate receiving department which should detect mis-delivered orders.

221
Q

What is a bill of materials?

A

Used in production and identifies part #’s, descriptions, and quantities of each component in making a product.

222
Q

What is a good control that you can use the bill of materials for?

A

Match the bill of materials to goods produced to detect over/underuse of materials

223
Q

What is a materials requisition “ticket”?

A

Authorizes moving raw materials from a store room to production.

224
Q

What is a control that you can use the materials requisition ticket for?

A

Match the ticket to physical materials in production to ensure that goods are not lost, stolen, damaged, or over-underused in production.

225
Q

What are move tickets?

A

Identify parts to be transferred into or between the production process.

226
Q

What is an operations list?

A

Sequence of steps to make a product, which equipment tot use, and how long each step requires.

227
Q

What would be used to authorize a factor worker to move a “sprocket” from raw materials to production?

A

Materials requisition ticket.

228
Q

What is a master production schedule helpful for?

A

Reduced excess production of inventory.

229
Q

What is a cumulative earnings register?

A

YTD gross pay, net pay and deduction by employee.

230
Q

What is a control that a cumulative earnings register can be used for?

A

Review the register & match it to pay rates by supervisors to confirm OT and regular rates.

231
Q

What is a US Form 941?

A

Quarterly federal tax return showing all wages subject to tax and amounts withheld for income tax and FICA.

232
Q

What is aa common fraud by a bookkeeper when it comes to employee payroll taxes and deductions?

A

collect but not pay the payroll tax deducted from an employee’s paycheck

233
Q

What do direct deposits lessen the likelihood of?

A

Physical checks deposited by someone other than an employee.

234
Q

What is a skills inventory report helpful for?

A

Matching employee skills to a new job duty.

235
Q

What is an important advantage of outsourcing payroll?

A

Lower fraud risk.

236
Q

What is the purpose of closing journal entries?

A

Transfer balances from temporary accounts to R/E

237
Q

What is a control account?

A

Master account for subsidiary accounts, which must, in the aggregate sums to the total control balance.

238
Q

What is the lead systems analyst responsible for?

A

All direct contact with end users and for developing overall program logic and functionality.

239
Q

What are application programers responsible for?

A

They work under the lead system analyst and are responsible for writing and testing a program

240
Q

What are the 7 steps in a system development lifecycle?

A
  1. Planning and Feasibility
  2. Analysis
  3. Design
  4. Development
  5. Testing
  6. Implementation
  7. Maintenance
241
Q

What goes into the planning and feasibility stage of the SDLC?

A

the technical, economic, and operational feasibility of new system.

242
Q

What goes into the analysis stage of the SDLC?

A

Analysts work with end users to understand requirements of a new system.

243
Q

What goes into the design stage of the SDLC?

A

Technical and design specifications

244
Q

What goes into the development stage of the SDLC?

A

Use design specifications to develop program and data files

245
Q

What goes into the testing stage of the SDLC?

A

Testing to see if it meets design specifications

246
Q

What goes into the implementation stage of the SDLC?

A

4 different types:
Parallel - run new and old system
Cold Turkey - drop old system, starting using new one in its place
Phased implementation
Pilot implementation - users are divided into smaller groups and trained on group at a time.

247
Q

What goes into the maintenance stage of the SDLC?

A

Make sure system is working properly and make any updates based on current need.