QUIZ1 Flashcards

1
Q

are facts collected, recorded, and stored in the system

A

data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

organize the data within a context

A

information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

is used to help decision makers more effectively filter and condense information.

A

Information Technology (IT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

limit access to authorized parties

A

Access restricted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

accurate, correct, and free of error

A

Accurate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

available to users when needed

A

Available

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

perceived as true and credible

A

Reputable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

does not omit important aspects of events or
activities

A

Complete

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

clear, succinct, brief, but comprehensive

A

Concise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

presented in the same format over time

A

Consistent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

up to the present data and time

A

Current

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

unbiased, unprejudiced, and impartial

A

Objective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

reduces uncertainty and improves decision

A

Relevant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

provided in time for decision maker to make
decisions

A

Timely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

easy to use for different task

A

Useable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

easily comprehended and interpreted

A

Understandable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

two independent people can produce the same information

A

Verifiable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Data is most useful when it is in a _______ format that can be read and processed by a computer.

A

machine-readable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

is a set of related, coordinated, and structured activities and tasks performed by people, machines, or both to achieve a specific organizational goal.

A

business process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The Components of an
Information System

A

PEOPLE/ORGANIZATION/TECHNOLOGY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

agreement between two entities to exchange goods, services, or any other event that can be measured in economic terms by an organization.

A

transactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Transaction data is used to create financial statements and is called

A

transaction processing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

is a system that collects, records, stores, and processes data to produce information for decision makers.

A

AIS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

collects and stores data, transforms that data
into information, and provides adequate controls.

A

AIS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

is the use of computer systems to simulate human intelligence processes such as learning, reasoning, and self-improvement.

A

Artificial intelligence (AI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

is the use of software and algorithms to find and solve problems and improve business performance.

A

Data analytics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

displays important data points in easily understood line ( bar charts, tables)

A

Data Dashboard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

represents individual digital records, called blocks, linked together using cryptography in a single list,
called a chain.

A

Blockchain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

is the use of a browser to remotely access software, data storage, hardware, and applications.

A

Cloud computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

is the running of multiple systems simultaneously on one physical computer.

A

Virtualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

refers to the embedding of sensors in a multitude of devices (lights, heating and air conditioning, appliances, etc.) so that those devices can now connect to the Internet.

A

Internet of Things (IoT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

overall goal the organization hopes to
achieve

A

strategy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

links together the different activities within an organization that provide value to the customer.

A

value chain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

provide direct value to the customer.

A

Primary activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

enable primary activities to be efficient and effective.

A

Support activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

is an extended system that includes the organization’s value chain as well as its suppliers, distributors, and customers.

A

supply chain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

list of numbers assigned to general ledger; allows transaction data to be coded;
facilitiate preparation of FS

A

Chart of accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

well thought out to anticipate management needs are most efficient and effective

A

Coding schemas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

items numbered consecutively to account for all items (i.e., prenumbered forms)

A

Sequence codes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

blocks of numbers reserved for specific categories of data (i.e., product numbers that start with a 2 are refrigerators)

A

Block code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

two or more subgroups of digits used to code items (i.e., car VIN #’s)

A

Group codes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

letters and numbers interspersed to identify an item (i.e. Dry300W05 is low end (300), white (W) dryer (DRY) made by Sears (05))

A

Mnemonic codes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Four types of processing

A

Creating new records (e.g., adding a customer)
Reading existing data - VIEW ONLY MODE
Updating previous record or data - MODIFY / CORRECT A DATA
Deleting data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Integrates activities from the entire organization

A

Enterprise Resource Planning (ERP) Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

requires management to assess internal controls and auditors to evaluate the
assessment

A

Sarbanes-Oxley Act (SOX)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Is a visual way to represent the activities in a business process.

A

Business Process Diagrams

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

shows the flow of documents and data for a process, useful in evaluating internal controls

A

document

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

depicts the data processing cycle for a process

A

system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

illustrates the sequence of logic in the system process

A

program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

are visually simple and can be used to represent the same process at a high abstract (summary) or detailed level.

A

Data Flow Diagrams (DFD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

• Natural and political disasters
• Software errors and equipment malfunctions
• Unintentional acts
• Intentional acts

A

Threats to AIS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Any means a person uses to gain an unfair advantage over another person

A

Fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

[TWO CATEGORIES OF FRAUD]

Theft of company assets which can include physical assets (e.g., cash, inventory) and digital assets (e.g., intellectual property such as protected trade secrets, customer data)

A

Misappropriation of assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

[TWO CATEGORIES OF FRAUD]

cooking the books” (e.g., booking fictitious revenue,
overstating assets, etc.)

A

Fraudulent financial reporting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

requires auditors to:
• Understand fraud
• Discuss the risks of material fraudulent misstatements
• Obtain information
• Identify, assess, and respond to risks
• Evaluate the results of their audit tests
• Document and communicate findings
• Incorporate a technology focus

A

SAS No. 99 (AU-C Section 240)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

three conditions must be present for fraud to occur:

A

PRESSURE
OPPORTUNITY
RATIONALIZE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

If a computer is used to commit fraud, it is called

A

Computer Fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

six steps that many criminals use to attack information systems:

A

– Conduct reconnaissance
– Attempt social engineering
– Scan and map the target
– Research
– Execute the attack
– Cover tracks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Unauthorized access, modification, or use of an electronic device or some element of a computer system

A

Hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Techniques or tricks on people to gain physical or
logical access to confidential information

A

Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Software used to do harm

A

Malware

62
Q

Gaining control of a computer to carry out illicit activities

A

Hijacking

63
Q

Uses vulnerability of Web application that allows the Web site to get injected with malicious code. When a user visits the Web site, that malicious code is able to collect data from the user.

A

Cross-site scripting (XSS)

64
Q

Large amount of data sent to overflow the input memory (buffer) of a program, causing it to crash and replacing it with attacker’s program instructions.

A

Buffer overflow attack

65
Q

Malicious code inserted in place of a query to get to the
database information

A

SQL injection (insertion) attack

66
Q

Hacker is placed in between a client (user) and a host
(server) to read, modify, or steal data.

A

Man in the middle (MITM)

67
Q

Taking small amounts at a time

A

Salami technique:

68
Q

Theft of information, intellectual property, and trade secrets

A

Economic espionage

69
Q

Threats to a person or business online through e-mail
or text messages unless money is paid

A

Cyber-extortion

70
Q

Assuming someone else’s identity

A

Identity theft

71
Q

Using a scenario to trick
victims to divulge information or to gain access

A

Pretexting

72
Q

Creating a fake business to
get sensitive information

A

Posing

73
Q

Sending an e-mail asking the victim to respond to a link that appears legitimate that requests sensitive data

A

Phishing

74
Q

Redirects website to a
spoofed website

A

Pharming

75
Q

Takes advantage of typographical errors entered in for websites and user gets invalid or wrong website

A

URL hijacking

76
Q

Searching trash for confidential information

A

Scavenging

77
Q

Snooping (either close behind
the person) or using technology to snoop and get confidential information

A

Shoulder surfing

78
Q

Double swiping credit card

A

Skimming

79
Q

Secretly monitors and collects
information
– Can hijack browser, search
requests
– Adware, scareware

A

Spyware

80
Q

Threatening to harm a
company or a person if a specified amount of money is not paid

A

Cyber-extortion

81
Q

Software that records user
keystrokes

A

Keylogger

82
Q

Malicious computer instructions in an authorized and properly functioning program

A

Trojan Horse

83
Q

Set of instructions that allow the
user to bypass normal system
controls

A

Trap door

84
Q

Captures data as it travels over the Internet

A

Packet sniffer

85
Q

A section of self-replicating code
that attaches to a program or file requiring a human to do something so it can replicate itself

A

Virus

86
Q

Stand-alone self replicating
program

A

Worm

87
Q

Stealing contact lists, data, pictures on Bluetooth
compatible smartphones

A

Bluesnarfing

88
Q

Taking control of a phone to make or listen to calls, send or read text messages

A

Bluebugging

89
Q

Any potential adverse occurrence or unwanted event that could be injurious to either the accounting information system or the organization is referred to as a _____ or an event.

A

threat

90
Q

The potential dollar loss should a particular threat become a reality is referred to as the _____ or impact of the threat.

A

exposure

91
Q

The probability that the threat will happen is the ______ associated with the threat.

A

likelihood

92
Q

Processes implemented to provide assurance that the following objectives are achieved

A

Internal Controls

93
Q

Deter problems from occurring

A

Preventive controls

94
Q

– Discover problems that are not prevented

A

Detective controls

95
Q

Identify and correct problems; correct and recover from
the problems

A

Corrective controls

96
Q

To prevent companies from bribing foreign officials to obtain
business
– Requires all publicly owned corporations to maintain a system of internal accounting controls

A

FCPA is legislation passed (1977)

97
Q
  • Prevent financial statement fraud
    – Make financial reports transparent
    – Protect investors
    – Strengthen internal controls
    – Punish executives who perpetrate fraud
A

SOX is legislation passed (2002)

98
Q

Framework for IT control

A

COBIT

99
Q

Framework for enterprise internal controls (control-
based approach)

A

COSO

100
Q

Expands COSO framework taking a risk-based approach

A

COSO-ERM

101
Q

five components of the COSO Internal Control

A

– Control environment
– Risk assessment
– Control activities
– Information and communication
– Monitoring

102
Q

Probability that the event will occur

A

Likelihood

103
Q

Estimate potential loss if event occurs

A

Impact

104
Q

Risk that exists before plans are made to control it

A

Inherent

105
Q

Risk that is left over after you control it

A

Residual

106
Q

Access to the system and data is controlled and
restricted to legitimate users.

A

Security

107
Q

Sensitive organizational data is protected.

A

Confidentiality

108
Q

Personal information about trading partners, investors, and employees is protected.

A

Privacy

109
Q

Data are processed accurately, completely, in a timely
manner, and only with proper authorization.

A

Processing integrity

110
Q

System and information are available.

A

Availability

111
Q

It is the implementation of a combination of preventive, detective, and corrective controls that protect information assets long enough to enable an organization to recognize that an attack is occurring and take steps to thwart it before any information is lost or compromised.

A

time-based model of information security

112
Q

examining logs to identify evidence of possible attacks

A

Log Analysis

113
Q

system that creates logs of network traffic that was permitted to pass the firewall and then analyzes those logs for signs of attempted or successful intrusions

A

Intrusion Detection Systems (IDSs)

114
Q

A decoy system used to provide early warning that an insider or outsider is attempting to search for confidential information

A

Honeypots

115
Q

employee compliance with organization’s information security policies and overall performance of business processes

A

Continuous Monitoring

116
Q

An authorized attempt to break into the organization’s information system

A

Penetration Test

117
Q

the formal process used to ensure that modifications to hardware, software, or processes do not reduce systems reliability

A

Change Control and Change Management

118
Q

Procedures and policies with assigned responsibility and accountability

A

Management

119
Q

Provide notice of privacy policies and practices prior to collecting data

A

Notice

120
Q

Opt-in versus opt-out approaches

A

Choice and consent

121
Q

Only collect needed information

A

Collection

122
Q

Use information only for stated business purpose. When no longer useful, dispose in a secure manner.

A

Use, retention, and disposal

123
Q

Customer should be able to review, correct, or delete information collected on them

A

Access

124
Q

Protect from loss or unauthorized access

A

Security

125
Q

– Procedures in responding to complaints
– Compliance

A

Monitoring and enforcement

126
Q

[TYPE OF ENCRYPTION]

• Uses one key to encrypt and decrypt
• Both parties need to know the key
– Need to securely communicate the shared key
– Cannot share key with multiple parties, they get their own (different) key from the organization

A

Symmetric

127
Q

[TYPE OF ENCRYPTION]

Uses two keys
– Public—everyone has
access
– Private—used to decrypt (only known by you)
– Public key can be used by all your trading partners
• Can create digital signatures

A

Asymmetric

128
Q

Securely transmits encrypted data between sender and receiver

A

Virtual Private Network (VPN)

129
Q

is a process that takes plaintext of any length and creates a short code called a message digest

A

Hashing

130
Q

Used to create legally binding agreements (two steps to create)

A

Digital Signatures

131
Q

technology was originally developed to support the crypto-currency Bitcoin to prevent “double- spending” the same coin, but it has since been adopted for use in a variety of industries to create reliable audit trails for any business process.

A

Blockchain

132
Q

Characters in a field are
proper type

A

Fieldcheck

133
Q

Data in a field is appropriate sign (positive/negative)

A

Sign check

134
Q

Tests numerical amount
against a fixed value

A

Limit check

135
Q

Tests numerical amount against lower and upper limits

A

Range check

136
Q

Input data fits into the field

A

Size check

137
Q

Verifies that all required data is
entered

A

Completeness check

138
Q

Compares data from transaction file to that of master file to verify existence

A

Validity check

139
Q

Correctness of logical relationship between two data items

A

Reasonableness test

140
Q

Recalculating check digit to verify data entry error has not been made

A

Check digit verification

141
Q

Test of batch data in proper numerical or alphabetical sequence

A

Batchprocessing

142
Q

Summarize numeric values for a batch of input records

A

Batch totals

143
Q

System prompts you for input
(online completeness check)

A

Prompting

144
Q

Checks accuracy of input data by using it to retrieve and display other related information (e.g., customer account # retrieves the customer name)

A

Closed-loop verification

145
Q

Two or more items must be matched before an action takes place

A

Data matching

146
Q

Ensures correct and most
updated file is used

A

File labels

147
Q

Verifies accuracy by comparing two alternative ways of calculating the same total

A

Cross-footing

148
Q

For control accounts (e.g.,
payroll clearing)

A

Zero-balance tests

149
Q

Protect against overwriting or erasing data

A

Write-protection mechanisms

150
Q

Prevent error of two or more users updating the same record at the same time

A

Concurrent update controls