Test 2 Flashcards

1
Q

The text mentions four different AIS threats. Which type of threat is sabotage?
A. Intentional acts
B. Software errors and equipment failures
C. Unintentional acts
D. Natural abd political disasters

A

Intentional acts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Terrorist attacks are considered which type of threat?
A. Intentional acts
B. Natural and political disasters
C. Unintentional acts
D. Software errors and equipment failures

A

Natural and political disasters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Threats that arise from human carelessness, failure to follow established procedures, and poorly supervised personnel are which type of threat?
A. Unintentional acts
B. Software errors and equipment failures
C. Natural and political disasters
D. Intentional acts

A

Unintentional acts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Power outages and fluctuations can result in which type of threat?
A. Unintentional acts
B. Intentional acts
C. Natural and political disasters
D. Software errors and equipment failures

A

Software errors and equipment failures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

According to the text, which type of threat represents the greatest risk to information systems and causes the greatest dollar losses?
A. Natural and political disasters
B. Unintentional acts
C. Intentional acts
D. Software errors and equipment failures

A

Unintentional acts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Legally, for an act to be fraudulent there must be:
A. An intent to do bodily harm
B. A material fact that induces a person to act
C. An injury or loss suffered by the perpetrator
D. A false statement, representation, or disclosure
E. A justifiable reliance, where a person relies on a misrepresentation to take an action

A

B. A material fact that induces a person to act

D. A false statement, representation, or disclosure

E. A justifiable reliance, where a person relies on a misrepresentation to take an action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following statements are true?
A. Small businesses are less vulnerable to fraud than large companies kbecause small companies typically gave more effective internal controls than larger companies
B. Fraud perpetrators are often referred to as blue-collar criminals
C. A typical organization loses 5% of its annual revenue to fraud, indicatjng yearly global losses of over $3.7 trillion
D. Most fraud perpetrators are knowledgeable insiders woth the requisite access, skills, and resources
E. The controls used to protect corpoyassets make it more difficult for an outsider to steal from a company

A

C. A typical organization loses 5% of its annual revenue to fraud, indicatjng yearly global losses of over $3.7 trillion

D. Most fraud perpetrators are knowledgeable insiders woth the requisite access, skills, and resources

E. The controls used to protect corpoyassets make it more difficult for an outsider to steal from a company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following processing controls can be used to achieve the objective of processing integrity? (Check all that apply.)

a) File labels
b) Reconciliation procedures
c) Validity check
d) Write-protection mechanisms
e) Parity bits
f) Recalculation of batch totals
g) Check digit verification

A

a) File labels
d) Write-protection mechanisms
f) Recalculation of batch totals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following input controls can be used to ensure the objective of processing integrity? (Check all that apply.)

a) Limit check
b) Completeness check
c) Forms design
d) Cross-footing and zero-balance tests
e) File labels
f) Turnaround documents
g) Field check

A

a) Limit check
b) Completeness check
c) Forms design
f) Turnaround documents
g) Field check

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Assume that the XYZ Company wants to create batch totals for a transaction file that contains payments to suppliers. Which of the following fields could be used to create a financial total? (Check all that apply.)

a) Purchase order number
b) Discount for prompt payment
c) Quantity purchased
d) Check amount
e) Vendor number
f) Gross amount due

A

b) Discount for prompt payment
d) Check amount
f) Gross amount due

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Assume that the XYZ Company wants to create batch totals for a transaction file that contains all sales invoices. Which of the following fields could be used to create a hash total? (Check all that apply.)

a) Total amount of sale
b) Customer name
c) Quantity sold
d) Part number
e) Customer number

A

c) Quantity sold
d) Part number
e) Customer number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which control ensures that the master inventory file actually contains an inventory item identified by the number 251184?

a) Field check
b) Check digit verification
c) Validity check
d) Limit check

A

c)Validity check

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
Which type of file is retained indefinitely?
A. UPS
B. RAID
C. Archive
D. Backup
A

C. Archive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
The \_\_\_\_ represents the amount of data that an organization is willing to lose, or reenter, in the event of a disaster; the \_\_\_\_ represents the number of hours or days that the organization is willing to operate without its data center.
A.RTO, RPO
B.RPO, RTO
C.DRP, BCP
D.BCP, DRP
A

B.RPO, RTO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which option is appropriate for an organization, like an airline, that cannot tolerate any downtime or any loss of data?
A.Any of the three choices is appropriate.
B.Hot site
C.Cold site
D.Real-time mirroring

A

D.Real-time mirroring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following statements are true? (Check all that apply.)
A.Virtualization significantly reduces RTO.
B.All of the other three answers are true.
C.Virtualization does not eliminate the need for backups.
D.Virtualization cannot be used to support real-time mirroring.

A

A.Virtualization significantly reduces RTO.

C.Virtualization does not eliminate the need for backups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
Incremental daily backups take \_\_\_\_ time to make than Differential daily backups, but the restoration process taken is \_\_\_\_\_.
A.more, shorter
B. less, shorter
C.more, longer
D.less, longer
A

D.less, longer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A turnaround document is an example of a(n)

a) output control
b) input control
c) processing control
d) none of these are correct

A

b)input control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following is an effective data entry control to ensure that overtime hours should be zero for someone who has not worked the maximum number of regular hours in a pay period?

a) A limit check.
b) A range check.
c) A reasonableness check.
d) A validity check

A

c)A reasonableness check.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

When Jo, a sales associate, enters an account number, which of the following controls would allow the system to retrieve and display the account name so that Jo could verify that the correct account number had been entered?

a) Prompting.
b) Sequence check.
c) Data matching.
d) Closed-loop verification.

A

d)Closed-loop verification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the following is designed to prevent an attacker from executing a buffer overflow attack by submitting lengthy attack code into the address field on a website form?

a) limit check
b) reasonableness test
c) field check
d) size check

A

d)size check

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A batch total that is computed by adding up the invoice numbers in a set of sales invoices is called a

a) record count
b) checksum
c) hash total
d) financial total

A

c)hash total

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A facility that is not only prewired for telephone and Internet access but also contains all the computing and office equipment the organization needs to perform its essential business activities is called

a) virtualization
b) a real-time mirroring site.
c) a cold site.
d) a hot site.

A

d) a hot site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A cold site is an appropriate strategy for disaster recovery for organizations that are willing to tolerate operating for several ________ without their ERP system and who are also willing to reenter or even lose several __________ worth of transactions.

a) hours; hours
b) days; days
c) minutes; minutes
d) minutes; hours
e) minutes; days
f) hours; days

A

b)days; days

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Each night during the week an organization backs up just that day’s transactions. This is referred to as making what kind of backup?

a) archival
b) incremental
c) differential
d) full

A

b)incremental

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which of the following techniques can be used to minimize system downtime?

a) all of the actions minimize system downtime
b) UPS
c) preventive maintenance
d) RAID

A

a)all of the actions minimize system downtime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

After a tornado destroys an organization’s data center, the CIO turns to the __________ for instructions on how to recover.

a) Backup Plan (BP)
b) Business Continuity Plan (BCP)
c) Incident Response Plan (IRP)
d) Disaster Recovery Plan (DRP)

A

d)Disaster Recovery Plan (DRP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

After the Sarbanes-Oxley Act (SOX) was passed, the Securities and Exchange Commission (SEC) required management to do which of the following:

a. use the same audit firm for at least two consecutive audit years.
b. report material internal control weaknesses.
c. disclose all weaknesses regardless of materiality.
d. conduct 100% substantive testing of all internal controls.

A

b.report material internal control weaknesses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Identify the corrective control below

a. Reconciling the bank statement to the cash control account
b. Approving customer credit prior to approving a sales order.
c. Maintaining frequent backup records.
d. Counting inventory on hand and comparing counts to the perpetual inventory records.

A

c. Maintaining frequent backups records.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Hiring decisions at a company are made by the Director of Human Resources. Pay rates are approved by the Vice President for Operations. At the end of each pay period, supervisors submit time cards to the payroll clerk, who prepares paycheck requisitions. Paychecks are then distributed through the company’s mail room. This represents a(n) segregation of duties.

a. partial
b. effective
c. ineffective
d. limited4.

A

b.effective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Which of the following is (are) a component(s) of COSO’s internal control model?

a. Control activities
b. Risk assessment
c. Monitoring
d. All of the above.

A

d.All of the above.

32
Q

What is (are) a principle(s) behind enterprise risk management (ERM)?a.Uncertainty can result in opportunity.

b. The ERM framework can help management manage uncertainty.
c. Uncertainty results in risk.
d. All of the above.e.None of the above.

A

d.All of the above.e.None of the above.

33
Q

General authorization is different from specific authorization. With general authorization an employee in the proper functional area can:

a. authorize typical purchases of inventory items.
b. approve purchases within normal customer credit limits.
c. endorse checks for deposit.
d. approve sales returns and allowances.
e. approve vendor invoices for payment.
f. All of the above.

A

f.All of the above.

34
Q

The organization chart for a corporation includes a controller and an information processing manager, both of whom report to the vice president of finance. Which of the following would be a control weakness?

a. Assigning the programming and operating of the computer system to an independent control group which reports to the controller
b. Providing for maintenance of input data controls by an independent control group which reports to the controller
c. Periodically rotating assignment of application processing among machine operators, who all report to the information processing manager
d. Providing for review and distribution of system-generated reports by an independent control group which reports to the controller

A

a.Assigning the programming and operating of the computer system to an independent control group which reports to the controller

35
Q

As a result of an internal risk assessment, an insurance company decided it was no longer profitable to provide fire insurance in the western states without a general rate increase. The insurance company apparently chose to the risk of paying fire claims in the western states by raising its insurance rate.

a. reduce
b. share
c. avoid
d. accept

A

b.share

36
Q

Which functions should be segregated?

a. Authorization and recording
b. Authorization and custody
c. Recording and custody
d. All of the above.
e. None of the above.

A

d.All of the above.

37
Q

Which of the following is not a principle applicable to project development and acquisition controls?

a. Strategic master plan
b. Project controls
c. Steering committee
d. Network management

A

d.Network management

38
Q

According to sound internal control concepts, which of the following systems duties should be segregated?

a. Programming and Systems Administration
b. Computer operations and programming
c. Custody and record keeping.
d. Answers 1 and 2 are correct.

A

a. Programming and Systems Administration

b. Computer operations and programming

39
Q

Which of the following is not related to information and communicating in the updated COSO Integrated Control framework?

a. Communicate relevant internal control matters to external parties.
b. Obtain or generate relevant, high-quality information to support internal control.
c. Surround internal control processes with information technology that enables discrepancies to be identified.
d. Internally communicate the information necessary to support the other components of internal control

A

c.Surround internal control processes with information technology that enables discrepancies to be identified.

40
Q

Helping employees understand entity goals and objectives and then holding them accountable for achieving them are all related to which aspect of the control environment?

a. Organizational structure.
b. Methods of assigning authority and responsibility.
c. Management philosophy and operating style.
d. Commitment to competence.

A

b.Methods of assigning authority and responsibility.

41
Q

What criteria contribute to system reliability?

a. Developing and documenting policies
b. Effectively communicating policies to all authorized users
c. Monitoring the system and taking corrective action
e. All of the above
f. None of the above

A

e. All of the above

42
Q

What type of security controls are authorization controls?

a. Corrective controls
b. Detective controls
c. Preventive controls

A

c. Preventive controls

43
Q

Which of the following devices should NOT be placed in the demilitarized zone (DMZ)?

a. Web server
b. Sales department server
c. Mail server
d. Remote access server

A

b. Sales department server

44
Q

The time-based model of security does not include which factor to evaluate the effectiveness of an entity security controls:

a. The time it takes an attacker to break through the entity’s preventative controls
b. The time it takes to determine that an attack is in progress
c. The time it takes to respond to an attack
d. The time it takes to evaluate the financial consequences from an attack

A

d. The time it takes to evaluate the financial consequences from an attack

45
Q

Which of the following is an example of a preventive control?
a. The creation of “security-aware” culture
b. The creation of “Log user friendly” culture
c. The creation of a “continuous monitoring” culture
d, The creation of a chief information security officer position

A

a. The creation of “security-aware” culture

46
Q

Which of the following statements is true regarding authorization controls?

a. Permits access to all aspects of an entity’s operating system
b. Permits the user to engage in all operating actions
c. Permits the user unlimited ability to change information
d. All of the about
e. None of the above

A

e. None of the above

47
Q

Which of the following items are considered detective controls?

a. Log analysis
b. Intrusion detection system
c. Antiwalware controls
d. Both log analysis and intrusion Detection Systems
e. None of the above

A

d. Both log analysis and intrusion Detection Systems

48
Q

Which of the following is an example of a corrective control?

a. Authentication controls
b. Encryption
c. Log analysis
d. Patch management

A

d. Patch management

49
Q

Company XYZ hired a renowned security firm to attempt to compromise its computer network. A few days later, the security firm reported that it had successfully entered XYZ’s computer system without being detected. The security firm presented an analysis of the vulnerabilities that had been found to the financial institution. This is an example of a:

a. Preventive control
b. Detective controls
c. Corrective control
d. Security control

A

b. Detective controls

50
Q

Which step would a computer incident response team (CIRT) team take first in the incident response process?

a. Containment of the problem
b. Recovery
c. Follow up
d. Recognition that the problem exists

A

d. Recognition that the problem exists

51
Q

According to the Trust Services Framework, the reliability principle of security is achieved when the system produces data that:

a. Is available for operation and use at times set forth by agreement
b. Is protected against unauthorized physical and logical access
c. Can be maintained as required without affecting system availability, security, and integrity
d. Is complete, accurate, and valid.

A

b. Is protected against unauthorized physical and logical access

52
Q

If the time an attacker takes to break through the organization’s preventive controls is 25 minutes, time required to detect the attack is 5 minutes, and the time required to correct/respond to the attack is 12 minutes, then security is:

a. effective
b. ineffective
c. overdone
d. undermanaged

A

a. effective

53
Q

Access controls include the following:
a, require employee logouts when the workstations are left unattended
b. prohibitions against visitors roaming the building in which computers are stored
c. Both a and b
d. Neither a nor b

A

c. Both a and b

54
Q

Which of the following can be used to detect whether confidential information has been disclosed?
a, A digital watermark
b. Information rights management (IRM) software
c. Data loss prevention (DLP) software
d. None of the above

A

a, A digital watermark

55
Q
Identify the type of information below that is least likely to be considered confidential by an organization?
a, Audited financial statements
b. Legal documents
c. Top executive salaries
d. New product development plans
A

a, Audited financial statements

56
Q
If an organization asks you to disclose your social security number, yet fails to permit you to opt-out before you provide the information, the organization has likely violated which of the General Accepted Privacy Principles?
a, Management
b. Notice
c. Choice and consent
d. Use and retention
A

c. Choice and consent

57
Q

Which of the following are internationally recognized best practices for protecting the privacy of customers’ personal information?

a. Organizations should explain the choices available and obtain their consent to the collection of customer data prior to its collection
b. Use and retention of customer information as described by their privacy policy
c. Disclosure to third parties only according to their privacy policy
d. All of the above

A

d. All of the above

58
Q

The same key is used to encrypt and decrypt in which type of encryption systems?

a. Symmetric encryption systems
b. Asymmetric encryption systems
c. Neither of the above

A

a. Symmetric encryption systems

59
Q

Which of the following statements is true?

a. Hashing is reversible, but encryption is not
b. Encryption is reversible, but hashing is not
c. Both encryption and hashing are reversible
d. Neither hashing nor encryption are reversible

A

b. Encryption is reversible, but hashing is not

60
Q

Which of the following uses encryption to create a secure pathway to transmit data?

a. Encryption tunnel
b. Virtual Private Network (VPN)
c. Demilitarized Zone
d. None of the above

A

b. Virtual Private Network (VPN)

61
Q

Which of the following is NOT a factor that can influence encryption strength?

a. Encryption algorithm
b. Key length
c. Policies for managing cryptographic keys
d. All of the above affect encryption strength

A

d. All of the above affect encryption strength

62
Q

A client would like a way for their customers to take payments online using credit cards, but would like to make sure the credit card data isn’t intercepted. What should you suggest?

a. a data masking program
b. a virtual private network
c. a private cloud environment
d. an encryption system with digital signatures

A

d. an encryption system with digital signatures

63
Q

What is the first step in protecting the confidentiality of intellectual property and other sensitive business information?

a. Encrypt the data
b. Install information rights management software
c. Employ deep packet inspection techniques on all incoming packets
d. Identify where confidential data resides and who has access to it

A

d. Identify where confidential data resides and who has access to it

64
Q

A programmer for a hospital system has recently developed a new computer program. As part of the testing process, he needs to use realistic patients’ data to ensure that the system is working properly. To protect privacy, management uses a program that replaces private information with fake values before sending the data to the programmer for testing. The program that replaces patient information with fake values is called:

a. data encryption
b. data masking
c. data wiping
d. data redacting

A

b. data masking

65
Q

Blockchains typically have copies of all blocks distributed on multiple machines. The distribution of the ledger helps ensure which of the following?

a. Distribution provides a means to identify any attempts to unilaterally alter the original documents.
b. Distribution ensures that data entered into a blockchain is correct
c. Distribution speeds up the process of adding blocks to a blockchain
d. All of the above are benefits of distribution.

A

a. Distribution provides a means to identify any attempts to unilaterally alter the original documents.

66
Q

Which of the following controls checks the accuracy of input data by using it to retrieve and display other related information?

a. Prompting
b. Validity check
c. Closed-loop verification
d. All of the above

A

c. Closed-loop verification

67
Q

Which of the following backup procedures copies all changes made since the last full backup?

a. Incremental backup
b. Differential backup
c. Archive backup
d. None of the above

A

b. Differential backup

68
Q

Data entry controls do NOT include

a. field checks
b. sign checks
c. parity checks
d. range checks

A

c. parity checks

69
Q

Online processing data entry controls includes:

a. Prompting
b. Closed loop verification
c. trailer records
d. echo check
e. Answers 1 and 2 only

A

e. Answer 1 and 2 only

70
Q

A customer forgets to include her account number on her check, and the accounts receivable clerk credited her payment to a different customer with the same last name. Which control could have been used to most effectively prevent this error?

a. closed-loop verification
b. duplicate values check
c. reasonableness test
d. reconciliation of a batch control total

A

a, closed-loop verification

71
Q

Which of the following maintains two copies of a database in two separate data centers at all times and updating both copies in real-time as each transaction occurs.

a. real-time mirroring
b. full backups
c. incremental backups
d. archives

A

a, real-time mirroring

72
Q

The least expensive and least effective option for replacing computer equipment lost in a disaster it:

a. leasing a cold site
b. real-time mirroring
c. creating a hot site
d. All of the above are ineffective options in disaster recovery

A

a. leasing a cold site

73
Q

Disaster recovery and testing plans should be done:
a, only when a disaster seems imminent
b. only immediately after disaster recovery is designated
c, at least annually
d. only if determined to be necessary

A

c, at least annually

74
Q

Threats to system availability include:

a. hardware and software failures
b. natural disasters
c. human error
d. all of the above

A

d. all of the above

75
Q

A shop generates 3 quarters of its revenue from orders taken over the internet. The revenue clearing account is debited by the total cash and credit receipts and credited by the total of storefront and internet sales. This is an example of a:

a. data integrity test
b. zero-balace test
c. trial balance audit
d. cross-footing balance test

A

b. zero-balance test

76
Q

Which of the following is not an objective of a disaster recovery plan?

a. minimize the extent of the disruption, damage or loss
b. establish a permanent alternative means of processing information
c. resume normal operations as soon as possible
d. train employees for emergency operations

A

b. establish a permanent alternative means of processing information

77
Q

A university course enrollment system allows students to manage their classes online. If students attempt to add more than 21 hours per semester an error message is displayed. This is an example of a

a. reasonableness test
b. field check
c. validity checks
d. limit check

A

a. reasonableness test