Test 1 Vocab Flashcards

1
Q

source documents

A

documents to capture transaction data at its source - when the transaction takes place

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

turnaround document

A

records of company data sent to an external party and then returned to the system as input

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

block code

A

blocks of numbers reserved for specific categories of data. i.e. - 1000-1999 is reserved for electronic devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

fraud

A

gaining an unfair advantage over another person - false statements, intent to deceive, injury or loss suffered by victim

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

investment fraud

A

misrepresenting or leaving out facts in order to promote investment that promises fantastic profits with little risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

misappropriation of assets

A

theft of company assets by employees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Fraud Triangle: Pressure

A

a person’s incentive or motivation for committing fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Fraud Triangle: Opportunity

A

the condition or situation that allows the perpetrator to COMMIT, CONCEAL, AND CONVERT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

lapping

A

concealing the theft of cash by means of a series of delays in posting collections to AR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

check kiting

A

creating cash using the lag between the time a check is deposited and the time it clears the bank

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Fraud Triangle: Rationalization

A

the excuse that fraud perpetrators use to justify their illegal behavior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

COBIT 5 Framework

A
  1. Meet stakeholder needs 2. Covering the enterprise end-to-end 3. Applying a single, integrated framework 4. Enabling a holistic approach 5. Separating governance from mgt
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

COSO’s ERM Model

A
  1. Internal Environment 2. Objective Setting 3. Event Identification 4. Risk Assessment 5. Risk Response 6. Control Activities 7. Info & Communication 8. Monitoring
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

risk appetite

A

amt of risk a company is willing to accept to achieve its goals and objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Possible Responses to Risk

A
  1. Reduce - IC 2. Accept 3. Share - buy insurance, outsource an activity or enter into hedging transactions 4. Avoid - Don’t get involved in those risky activities.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Excpected Loss

A

impact x likelihood

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Specific Authorization

A

special approval an employee needs in order to be allowed to handle a transaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Trust Services Framework (Systems Reliability)

A
  1. Security 2. Confidentiality 3. Privacy 4. Processing Integrity 5. Availability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Confidentiality

A

sensitive organizational information is protected from unauthorized disclosure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Privacy

A

personal information is protect from unauthorized disclosure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Availability

A

system and its info are available to meet operation and contractual obligations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Security Life Cylce

A
  1. Assess threats and select risk response 2. Develop and communicate policy 3. Acquire and implement solutions 4. Monitor performance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

defense-in-depth

A

employing multiple layers of controls to avoid a single point-of-failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Time-based Model of Security

A

P > D + C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Authentication

A
  1. Something they know (PIN) 2. Something they have (ID Card) 3. Something they are (BIOMETRIC, fingerprint, typing patterns)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Multimodal Authentication

A

More than one of the same type of authentication credentials - IE username AND password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Multifactor Authentication

A

Using two or more types of authentication. IE - Fingerprint and Password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Compatibility Test

A

Matches user’s authentication credentials against the access control matrix to determine if they should be allowed to do what they’re trying to do

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

border router

A

what connects the organization to the internet - final thing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

firewall

A

hardware or software running on a general-purpose computer that controls inboudn and outbound communication between the system and other networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Demilitarized Zone (DMZ)

A

separate network outside the organization’s internal IS that permits controlled access from the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

packet filtering

A

a process that uses packet headers to make decision

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

deep packet inspection

A

examines body and contents of packet (opening an envelope)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

endpoints

A

devices, printers, servers, etc. that comprise an org’s network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

hardening

A

process of modifying the default configuration of endpoints to eliminate unnecessary settings and services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Log Analysis

A

Detective control - examine logs to ID evidence of possible attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Intrusion Detection System

A

Detective - logs all network traffic that passed the firewall and looks for signs of intrusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Petetration Testing

A

Detective Control - AUTHORIZED attempt to break into the organizations info system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Exploit

A

a program designed to take advantage of a known vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Virtualization

A

running multiple systems simultaneously on one physical computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Application Controls for Processing Integrity

A
  1. Input Controls 2. Processing Controls 3. Output Controls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Input Controls

A
  1. Forms Design 2.Cancellation and Storage of Source Docs 3.Data Entry Controls 4.Batch Processing Entry Ctrls 5.Online Entry Ctrls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Field Check

A

CORRECT TYPE OF CHARACTERS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Sign Chck

A

Correct sign - no negatives in inventory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Limit check

A

compares number against a fixed value -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Range Check

A

Whether number falls between specified lower and upper limits (marketing promotion targets only those with income between $50k and $100k)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Size Check

A

Correct number of Chars, Digits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Completeness Check

A

all required data items have been entered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Validity Check

A

Compares ID code to master file to verify the account exists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Reasonableness Test

A

logical correctness of relationships among data items. (overtime hours should be 0 for those who have not worked 40 hrs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Check Digit(and verification)

A

digit computed by using the other digits in and id number to identify errors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Prompting

A

system requests each input data item and waits for an acceptable response, ensures that all data is entered (online completeness check)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Closed-loop Verification

A

check accuracy by bringing up account name to verify the account number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

transposition error

A

when numbers in two adjacent columns are inadvertently exchanged (64 become 46)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Cross-footing balance test

A

sum a row of column totals and a column of row totals to make sure they come out to the same number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Zero-Balance Test

A

debits and credits - payroll clearning account should have a zero balance after both sets of entries have been made.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Write-Protection Mechanisms

A

Processing control - protect against overwriting or erasing of data files stored on magnetic media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Concurrent update controls

A

prevent errors of when two or more users try to update the same record simultaneously. locks the others out until the first one is finished

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Processing Controls

A

Data Matching File Labels Recalc of Batch Totals Cross-footing and Zero-balance Write-protection mechanism Councurrent Update Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Output Controls

A

User review of Output Reconcil. Procedures External Data Reconcil. Data Transmission Controls (Checksums and Parity Bits)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Checksums

A

uses a hash of a file to verify accuracy

62
Q

Parity bit

A

and extra bit added to every character - even parity bit = 1011010=0 Ones add up to an even number

63
Q

Archive

A

Copy of a database, master file, oir software that is retained indefinitely as a historical record (legal)

64
Q

documents to capture transaction data at its source - when the transaction takes place

A

source documents

65
Q

records of company data sent to an external party and then returned to the system as input

A

turnaround document

66
Q

blocks of numbers reserved for specific categories of data. i.e. - 1000-1999 is reserved for electronic devices

A

block code

67
Q

gaining an unfair advantage over another person - false statements, intent to deceive, injury or loss suffered by victim

A

fraud

68
Q

misrepresenting or leaving out facts in order to promote investment that promises fantastic profits with little risk

A

investment fraud

69
Q

theft of company assets by employees

A

misappropriation of assets

70
Q

a person’s incentive or motivation for committing fraud

A

Fraud Triangle: Pressure

71
Q

the condition or situation that allows the perpetrator to COMMIT, CONCEAL, AND CONVERT

A

Fraud Triangle: Opportunity

72
Q

concealing the theft of cash by means of a series of delays in posting collections to AR

A

lapping

73
Q

creating cash using the lag between the time a check is deposited and the time it clears the bank

A

check kiting

74
Q

the excuse that fraud perpetrators use to justify their illegal behavior

A

Fraud Triangle: Rationalization

75
Q
  1. Meet stakeholder needs 2. Covering the enterprise end-to-end 3. Applying a single, integrated framework 4. Enabling a holistic approach 5. Separating governance from mgt
A

COBIT 5 Framework

76
Q
  1. Internal Environment 2. Objective Setting 3. Event Identification 4. Risk Assessment 5. Risk Response 6. Control Activities 7. Info & Communication 8. Monitoring
A

COSO’s ERM Model

77
Q

amt of risk a company is willing to accept to achieve its goals and objectives

A

risk appetite

78
Q
  1. Reduce - IC 2. Accept 3. Share - buy insurance, outsource an activity or enter into hedging transactions 4. Avoid - Don’t get involved in those risky activities.
A

Possible Responses to Risk

79
Q

impact x likelihood

A

Excpected Loss

80
Q

special approval an employee needs in order to be allowed to handle a transaction

A

Specific Authorization

81
Q
  1. Security 2. Confidentiality 3. Privacy 4. Processing Integrity 5. Availability
A

Trust Services Framework (Systems Reliability)

82
Q

sensitive organizational information is protected from unauthorized disclosure

A

Confidentiality

83
Q

personal information is protect from unauthorized disclosure

A

Privacy

84
Q

system and its info are available to meet operation and contractual obligations

A

Availability

85
Q
  1. Assess threats and select risk response 2. Develop and communicate policy 3. Acquire and implement solutions 4. Monitor performance
A

Security Life Cylce

86
Q

employing multiple layers of controls to avoid a single point-of-failure

A

defense-in-depth

87
Q

P > D + C

A

Time-based Model of Security

88
Q
  1. Something they know (PIN) 2. Something they have (ID Card) 3. Something they are (BIOMETRIC, fingerprint, typing patterns)
A

Authentication

89
Q

More than one of the same type of authentication credentials - IE username AND password

A

Multimodal Authentication

90
Q

Using two or more types of authentication. IE - Fingerprint and Password

A

Multifactor Authentication

91
Q

Matches user’s authentication credentials against the access control matrix to determine if they should be allowed to do what they’re trying to do

A

Compatibility Test

92
Q

what connects the organization to the internet - final thing

A

border router

93
Q

hardware or software running on a general-purpose computer that controls inboudn and outbound communication between the system and other networks

A

firewall

94
Q

separate network outside the organization’s internal IS that permits controlled access from the Internet

A

Demilitarized Zone (DMZ)

95
Q

a process that uses packet headers to make decision

A

packet filtering

96
Q

examines body and contents of packet (opening an envelope)

A

deep packet inspection

97
Q

devices, printers, servers, etc. that comprise an org’s network

A

endpoints

98
Q

process of modifying the default configuration of endpoints to eliminate unnecessary settings and services

A

hardening

99
Q

Detective control - examine logs to ID evidence of possible attacks

A

Log Analysis

100
Q

Detective - logs all network traffic that passed the firewall and looks for signs of intrusion

A

Intrusion Detection System

100
Q

Detective - logs all network traffic that passed the firewall and looks for signs of intrusion

A

Intrusion Detection System

101
Q

Detective Control - AUTHORIZED attempt to break into the organizations info system

A

Petetration Testing

101
Q

Detective Control - AUTHORIZED attempt to break into the organizations info system

A

Petetration Testing

102
Q

a program designed to take advantage of a known vulnerability

A

Exploit

102
Q

a program designed to take advantage of a known vulnerability

A

Exploit

103
Q

running multiple systems simultaneously on one physical computer

A

Virtualization

103
Q

running multiple systems simultaneously on one physical computer

A

Virtualization

104
Q
  1. Input Controls 2. Processing Controls 3. Output Controls
A

Application Controls for Processing Integrity

104
Q
  1. Input Controls 2. Processing Controls 3. Output Controls
A

Application Controls for Processing Integrity

105
Q
  1. Forms Design 2.Cancellation and Storage of Source Docs 3.Data Entry Controls 4.Batch Processing Entry Ctrls 5.Online Entry Ctrls
A

Input Controls

105
Q
  1. Forms Design 2.Cancellation and Storage of Source Docs 3.Data Entry Controls 4.Batch Processing Entry Ctrls 5.Online Entry Ctrls
A

Input Controls

106
Q

CORRECT TYPE OF CHARACTERS

A

Field Check

106
Q

CORRECT TYPE OF CHARACTERS

A

Field Check

107
Q

Correct sign - no negatives in inventory

A

Sign Chck

107
Q

Correct sign - no negatives in inventory

A

Sign Chck

108
Q

compares number against a fixed value -

A

Limit check

108
Q

compares number against a fixed value -

A

Limit check

109
Q

Whether number falls between specified lower and upper limits (marketing promotion targets only those with income between $50k and $100k)

A

Range Check

109
Q

Whether number falls between specified lower and upper limits (marketing promotion targets only those with income between $50k and $100k)

A

Range Check

110
Q

Correct number of Chars, Digits

A

Size Check

111
Q

all required data items have been entered

A

Completeness Check

111
Q

all required data items have been entered

A

Completeness Check

112
Q

Compares ID code to master file to verify the account exists

A

Validity Check

112
Q

Compares ID code to master file to verify the account exists

A

Validity Check

113
Q

logical correctness of relationships among data items. (overtime hours should be 0 for those who have not worked 40 hrs)

A

Reasonableness Test

113
Q

logical correctness of relationships among data items. (overtime hours should be 0 for those who have not worked 40 hrs)

A

Reasonableness Test

114
Q

digit computed by using the other digits in and id number to identify errors

A

Check Digit(and verification)

114
Q

digit computed by using the other digits in and id number to identify errors

A

Check Digit(and verification)

115
Q

system requests each input data item and waits for an acceptable response, ensures that all data is entered (online completeness check)

A

Prompting

115
Q

system requests each input data item and waits for an acceptable response, ensures that all data is entered (online completeness check)

A

Prompting

116
Q

check accuracy by bringing up account name to verify the account number

A

Closed-loop Verification

116
Q

check accuracy by bringing up account name to verify the account number

A

Closed-loop Verification

117
Q

when numbers in two adjacent columns are inadvertently exchanged (64 become 46)

A

transposition error

117
Q

when numbers in two adjacent columns are inadvertently exchanged (64 become 46)

A

transposition error

118
Q

sum a row of column totals and a column of row totals to make sure they come out to the same number

A

Cross-footing balance test

118
Q

sum a row of column totals and a column of row totals to make sure they come out to the same number

A

Cross-footing balance test

119
Q

debits and credits - payroll clearning account should have a zero balance after both sets of entries have been made.

A

Zero-Balance Test

119
Q

debits and credits - payroll clearning account should have a zero balance after both sets of entries have been made.

A

Zero-Balance Test

120
Q

Processing control - protect against overwriting or erasing of data files stored on magnetic media

A

Write-Protection Mechanisms

120
Q

Processing control - protect against overwriting or erasing of data files stored on magnetic media

A

Write-Protection Mechanisms

121
Q

prevent errors of when two or more users try to update the same record simultaneously. locks the others out until the first one is finished

A

Concurrent update controls

121
Q

prevent errors of when two or more users try to update the same record simultaneously. locks the others out until the first one is finished

A

Concurrent update controls

122
Q

Data Matching File Labels Recalc of Batch Totals Cross-footing and Zero-balance Write-protection mechanism Councurrent Update Controls

A

Processing Controls

122
Q

Data Matching File Labels Recalc of Batch Totals Cross-footing and Zero-balance Write-protection mechanism Councurrent Update Controls

A

Processing Controls

123
Q

User review of Output Reconcil. Procedures External Data Reconcil. Data Transmission Controls (Checksums and Parity Bits)

A

Output Controls

124
Q

uses a hash of a file to verify accuracy

A

Checksums

124
Q

uses a hash of a file to verify accuracy

A

Checksums

125
Q

and extra bit added to every character - even parity bit = 1011010=0 Ones add up to an even number

A

Parity bit

125
Q

and extra bit added to every character - even parity bit = 1011010=0 Ones add up to an even number

A

Parity bit

126
Q

Copy of a database, master file, oir software that is retained indefinitely as a historical record (legal)

A

Archive

126
Q

Copy of a database, master file, oir software that is retained indefinitely as a historical record (legal)

A

Archive