IS and Comm E - Types of IS and Tech Risks Flashcards

1
Q

A risk of using potentially incorrect end-user developed files is that

A

management places the same degree of reliance on the files as they do on files generated from mainframe system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

If a company currently tracks their fixed assets and depreciation in a password-protected sheet but the IT group is moving to an ERP system, the long term solution should be to

A

adopt the fixed-asset module of the new system for integration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The most effective application for a client who wants to implement a management information system that integrates all functional areas within an organization to allow information exchange and collaboration among all parties involved in the business operations is

A

an ERP system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The major risk in relying on anti-virus software is that it

A

may not detect certain unknown viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An ERP system is designed to

A

integrate data from all aspects of an organization’s activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

As compared to a centralized database, a distributed database would involve the risk of

A

database integrity might not be preserved during a network or computer failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In an Electronic Data Interchange (EDI), encryption performed by a physically secure hardware devise is ______ secure than encryption performed by software

A

more

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When an AP system is supported via dial-up connection and the administrator leaves the company but no changes are made, what presents the greatest security risk?

A

User accounts are not removed upon termination of employees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The system that assists with nonroutine decisions, serves strategic levels of the organization, helps answer questions regarding what a company’s competitors are doing, and identifies new acquisitions that would protect the company from cyclical business swings is

A

an Executive support system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Within an integrated financial system, major risk considerations associated with the AR component of the system are

A
  • credits may be applied to improper accounts
  • updated of credit ratings may be untimely
  • financial or management reporting may be inaccurate
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A risk more likely to be encountered with end-user computing as compared to a mainframe computer system is

A

that applications would be difficult to integrate with other information systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Within an MIS system, the highest risk project would include ______ technology and _______ structure

A

new; sketchy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A disadvantage for an entity that keeps microcomputer-prepared data files rather than manually prepared files is that

A

it is usually easier for unauthorized persons to access and alter the files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

As a planning committee identifies more applications that a proposed network could support, the committee realizes that a significant risk could be

A

incomplete, inadequately tested, or unauthorized application software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Advantages of decentralized data processing facilities include:

A
  • increased direct access by users
  • standalone capabilities distributed to points of need
  • participation is increased in designs and use
  • decreased significance of system failure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

When an EFT system is used, there are higher risks related to

A

unauthorized access and activity

17
Q

Increased risks associated with the company’s use of a LAN and PCs, as opposed to use of a mainframe, could include

A
  • lack of documentation of procedures to ensure the complete capture of data
  • poor security of data residing on the PCs
  • incomplete data communications
18
Q

Through the use of a password control system, the follow risk associated with the use of telecommunication system is minimized

A

unauthorized access to system program and data files

19
Q

A company’s web server has been overwhelmed with a sudden surge of false requests that caused the server to crash. The company has most likely been the target of a

A

DOS attack