IT Flashcards
A business continuity plan is
designed to minimize disruptions to operations in the event of a disaster. Business continuity plans would help ensure a timely recovery.
A value-added network
routes data transactions between trading partners. A value-added network is used to link different companies’ computer files together, helping to facilitate transactions between the trading partners.
A value added network links the computer files of different companies
provides increased security over data transmissions.
private key
A disadvantage of using a private key for encryption is that both sender and receiver must have the key for this encryption method to be effective.
A private key can be broken into fragments and distributed to the receiver.
The private key must be used by both the sender for encryption and the receiver for decryption.
greatest risk regarding an entity’s use of electronic data interchange (EDI)?
data is transmitted electronically, creating the risk that data may be inadvertently transmitted to an unauthorized or inappropriate user.
EDI transactions are formatted using standards that are uniform worldwide they can be transmitted among parties electronically.
must be GAAP.
conducted over the Internet
process of communication between suppliers and customers.
EDI uses strict communication standards, encryption, and access controls to ensure orders are placed and processed as expected.
On-line analytical processing systems
enable users to interactively analyze data through operations such as consolidation, drill-down, and slicing and dicing.
Transmission Control Protocol or Internet Protocol (TCP/IP) network
Every site connected to a Transmission Control Protocol or Internet Protocol (TCP/IP) network has a unique address.
can be used with all computers with access to the world wide web
may be an exchange of any type of data
Transmission control program/Internet protocol is a set of communications standards used for the internet and similar networks.
An executive support system is designed to
support the work of executives including making nonroutine decisions, answering questions about competitors, and identifying new acquisitions.
Decision support systems
process and present data to support management decision-making, but are not specific to the requirements of strategic levels of an organization.
Management information systems
support day-to-day management decision making through pre-defined reports, and routine strategic level decision making.
Transaction processing systems
support day-to-day operations, not strategic level decision making
A virtual private network
establishes an encrypted point-to-point connection between sites and provides secure access to remote user
An authority certificate
certifies the ownership of a public data encryption key and is not a method for creating encrypted communication over the internet.
Packet-switching
is a communications method that groups all data into blocks for transmission and does not create secure access for remote users.
integrated test facilities
auditor’s data + client data
client’s program
test data
auditor’s data
client’s program
parallel simulation
client’s data
auditor’s program
Access control software
would prevent unauthorized individuals from accessing the system.
Contingency planning
is designed to correct an error or irregularity and minimize any consequences.
An echo check
and
hash total
is a detective control.
The data librarian
is responsible for the collection, preservation, and maintenance of an entity’s data.