Test 1 Quizzes Flashcards
Cycle: Payoff mortgage on factory
financing cycle
Cycle: Hire a new assistant controller
human resources/payroll cycle
Cycle: Pay for raw materials
expenditure cycle
Cycle: Disburse payroll checks to factory workers
HR/payroll cycle
Cycle: Record goods received from vendor
expenditure cycle
Cycle: Decide how many units to make next month
production cycle
Cycle: Collect payment on customer accounts
revenue cycle
Control Account
The gen. ledger account corresponding to a subsidiary ledger, where the sum of all sub ledger entries should equal the amount in the gen ledger account
Group code
two or more subgroups of digits are used to code items
Transaction File
Contains records of individual business transactions that occur during a specific time period
Data differs from information in which way?
- Information is output and data is input.
- Data is output and information is input
- Data is meaningful bits of information
- There is no difference
Info is output and data is input
Which of the following is not a characteristic that makes information useful?
- It is relevant
- It is reliable
- It is timely
- It is inexpensive
It is inexpensive
Which of the following is not a means by which information improves decision making?
- increasing information overload
- reducing uncertainty
- providing feedback about the effectiveness of prior decisions
- identifying situations requiring management action
increasing information overload
Which of the following is not an advantage of an ERP system?
- better access control
- simplicity and reduced costs
- standardization of procedures and reports
- improved monitoring capabilities
simplicity and reduced cost
Which of the following is a function of an AIS?
- transforming data into useful information
- reducing the need to identify a strategy and strategic position
- allocating organizational resources
- automating all decision making
transforming data into useful information
All of the information (name, gpa, major, etc.) about a particular student is stored in which of the following? attribute file record field
record
Which of the following would contain the total value of all inventory owned by an organization? general ledger source document cash budget subsidiary ledger
general ledger
Which of the following is most likely to be a general ledger control account?
- accounts receivable
- petty cash
- prepaid rent
- retained earnings
accounts receivable
In which cycle does a company ship goods to customers? expenditure cycle production cycle financing cycle revenue cycle
revenue cycle
Which of the following is NOT one of the three conditions necessary for fraud to occur (hint: these three conditions form the sides of the fraud triangle)? Attitude Opportunity Rationalization Pressure
Attitude
Which of the following causes the majority of computer security problems? power outages natural disasters software errors human errors
human errors
The three C’s of perpetrating a successful fraud are nestled among the following list. Identify the three C’s that are necessary for a successful fraud. Communicate Collusion Commit Convert Contribute Conceal Convict Correct Cover
Commit
Convert
Conceal
Segregation of Duties functions
Authorization - approving transactions and decisions
Recording - preparing, entering data
Custody - handling
Which SOD conflicts occurs in the following situation:
A purchasing agent received a 10% kickback of the invoice amount for all purchases made form a specific vendor.
Recording and Authorization
Which SOD conflicts occurs in the following situation:
A payroll clerk recorded a 40-hour week for an employee who had quit the previous week. He then prepared a paycheck for this employee, forged her signature, and cashed the check.
Custodial and Recording Conflict
A(n) ________ control is associated with making sure an organization’s control environment is stable, while a(n) ________ control prevents, detects, and corrects transaction errors and fraud.
- application, general
- general, application
- diagnostic, interactive
- interactive, diagnostic
general, application
Which of the following is NOT included in the COSO Enterprise Risk Management (ERM) model?
- Control Activities
- Event Identification
- Information & Communication
- Internal Environment
- Monitoring
- Objective Setting
- Risk Assessment
- Risk Response
- All of the above are part of the COSO ERM model
All of the above are part of the COSO ERM model
The COBIT5 framework primarily relates to
- best practices and effective governance and management of private companies.
- best practices and effective governance and management of public companies.
- best practices and effective governance and management of information technology (IT).
- all of the above
best practices and effective governance and management of information technology (IT).
At a movie theater you buy a movie ticket at a ticket window. The clerk gives you a pre-numbered movie ticket once you pay. As you enter the theater an usher takes your ticket and tears it in half, keeping his/her half. The ticket stubs are later reconciled with the tickets sold. Cash is reconciled with tickets sold.
- True or False: The controls implemented in the scenario successfully mitigate the risk that the usher can let people in without a ticket.
- True or False: The controls implemented in the scenario successfully mitigate the risk the clerk will pocket cash when selling a ticket for cash.
- True or False: The controls implemented in the scenario successfully mitigate the risk that the clerk will give tickets away to friends
- True or False: The controls implemented in the scenario successfully mitigate the risk that the cashier and usher could collude to collect cash and issue fictitious tickets, splitting the money and throwing away the fictitious tickets.
- False
- True
- True
- False
Identify the primary means of protecting data stored in a cloud from unauthorized access. authentication authorization virtualization securitization
authentication
True or False: Cloud computing is generally more secure than traditional computing.
True
False
False
________ is/are an example of a preventive control.
- Emergency response teams
- Encryption
- Log analysis
- Intrusion detection
encryption
Which of the following preventive controls are necessary to provide adequate security for social engineering threats?
- controlling remote access
- encryption
- host and application hardening
- awareness training
awareness training
A special purpose hardware device or software running on a general purpose computer, which filters information that is allowed to enter and leave the organization’s information system, is known as a(n)
- demilitarized zone.
- intrusion detection system.
- intrusion prevention system.
- firewall.
firewall
This batch processing data entry control sums a non-financial numeric field.
- Financial total
- Hash total
- Record count
- Sequence check
Hash Total
This determines if all required data items have been entered.
- Completeness check
- Field check
- Limit check
- Range check
Completeness Check
This protects records from errors that occur when two or more users attempt to update the same record simultaneously.
- Concurrent update controls
- Cross-footing balance test
- Data conversion controls
- Echo check
Concurrent update controls
This enables a system to continue functioning in the event that a particular hardware component fails,
- Backup procedures
- Fault tolerance
- Preventive maintenance
- None of the above
Fault Tolerance
A comparison of debits and credits in related control accounts is referred to as a
- Cross-footing balance test
- Parity test
- Zero-balance test
- Size check
Zero-balance test
Forms design is an example of this type of control. Data entry controls Data transmission controls Output controls Input controls
INput controls
While this type of backup process takes longer than the alternative, restoration is easier and faster.
- archive
- cloud computing
- differential backup
- incremental backup
Differential backup
Which of the following measures the amount of data that might be potentially losts as a result of a system failure? RTO (Recovery Time Objective) RPO (Recovery Point Objective) ROLO (The anit-Twixt) BCP (Business Continuity Plan) DRP (Disaster Recovery Plan)
RPO
If you choose to update two copies of your database in real-time at two separate data centers, you are
- setting up a detective control
- doing a live cold site
- doing real-time mirroring
- doing repetitive checkpoints
doing real-time mirroring
Which of the following provides detailed procedures to resolve the problems resulting from a flash flood that completely destroys a company’s data center?
- disaster recovery plan (DRP)
- backup plan
- business continuity plan (BCP)
- archive plan
DRP