Test 2 Flashcards
The text mentions four different AIS threats. Which type of threat is sabotage?
A. Intentional acts
B. Software errors and equipment failures
C. Unintentional acts
D. Natural abd political disasters
Intentional acts
Terrorist attacks are considered which type of threat?
A. Intentional acts
B. Natural and political disasters
C. Unintentional acts
D. Software errors and equipment failures
Natural and political disasters
Threats that arise from human carelessness, failure to follow established procedures, and poorly supervised personnel are which type of threat?
A. Unintentional acts
B. Software errors and equipment failures
C. Natural and political disasters
D. Intentional acts
Unintentional acts
Power outages and fluctuations can result in which type of threat?
A. Unintentional acts
B. Intentional acts
C. Natural and political disasters
D. Software errors and equipment failures
Software errors and equipment failures
According to the text, which type of threat represents the greatest risk to information systems and causes the greatest dollar losses?
A. Natural and political disasters
B. Unintentional acts
C. Intentional acts
D. Software errors and equipment failures
Unintentional acts
Legally, for an act to be fraudulent there must be:
A. An intent to do bodily harm
B. A material fact that induces a person to act
C. An injury or loss suffered by the perpetrator
D. A false statement, representation, or disclosure
E. A justifiable reliance, where a person relies on a misrepresentation to take an action
B. A material fact that induces a person to act
D. A false statement, representation, or disclosure
E. A justifiable reliance, where a person relies on a misrepresentation to take an action
Which of the following statements are true?
A. Small businesses are less vulnerable to fraud than large companies kbecause small companies typically gave more effective internal controls than larger companies
B. Fraud perpetrators are often referred to as blue-collar criminals
C. A typical organization loses 5% of its annual revenue to fraud, indicatjng yearly global losses of over $3.7 trillion
D. Most fraud perpetrators are knowledgeable insiders woth the requisite access, skills, and resources
E. The controls used to protect corpoyassets make it more difficult for an outsider to steal from a company
C. A typical organization loses 5% of its annual revenue to fraud, indicatjng yearly global losses of over $3.7 trillion
D. Most fraud perpetrators are knowledgeable insiders woth the requisite access, skills, and resources
E. The controls used to protect corpoyassets make it more difficult for an outsider to steal from a company
Which of the following processing controls can be used to achieve the objective of processing integrity? (Check all that apply.)
a) File labels
b) Reconciliation procedures
c) Validity check
d) Write-protection mechanisms
e) Parity bits
f) Recalculation of batch totals
g) Check digit verification
a) File labels
d) Write-protection mechanisms
f) Recalculation of batch totals
Which of the following input controls can be used to ensure the objective of processing integrity? (Check all that apply.)
a) Limit check
b) Completeness check
c) Forms design
d) Cross-footing and zero-balance tests
e) File labels
f) Turnaround documents
g) Field check
a) Limit check
b) Completeness check
c) Forms design
f) Turnaround documents
g) Field check
Assume that the XYZ Company wants to create batch totals for a transaction file that contains payments to suppliers. Which of the following fields could be used to create a financial total? (Check all that apply.)
a) Purchase order number
b) Discount for prompt payment
c) Quantity purchased
d) Check amount
e) Vendor number
f) Gross amount due
b) Discount for prompt payment
d) Check amount
f) Gross amount due
Assume that the XYZ Company wants to create batch totals for a transaction file that contains all sales invoices. Which of the following fields could be used to create a hash total? (Check all that apply.)
a) Total amount of sale
b) Customer name
c) Quantity sold
d) Part number
e) Customer number
c) Quantity sold
d) Part number
e) Customer number
Which control ensures that the master inventory file actually contains an inventory item identified by the number 251184?
a) Field check
b) Check digit verification
c) Validity check
d) Limit check
c)Validity check
Which type of file is retained indefinitely? A. UPS B. RAID C. Archive D. Backup
C. Archive
The \_\_\_\_ represents the amount of data that an organization is willing to lose, or reenter, in the event of a disaster; the \_\_\_\_ represents the number of hours or days that the organization is willing to operate without its data center. A.RTO, RPO B.RPO, RTO C.DRP, BCP D.BCP, DRP
B.RPO, RTO
Which option is appropriate for an organization, like an airline, that cannot tolerate any downtime or any loss of data?
A.Any of the three choices is appropriate.
B.Hot site
C.Cold site
D.Real-time mirroring
D.Real-time mirroring
Which of the following statements are true? (Check all that apply.)
A.Virtualization significantly reduces RTO.
B.All of the other three answers are true.
C.Virtualization does not eliminate the need for backups.
D.Virtualization cannot be used to support real-time mirroring.
A.Virtualization significantly reduces RTO.
C.Virtualization does not eliminate the need for backups.
Incremental daily backups take \_\_\_\_ time to make than Differential daily backups, but the restoration process taken is \_\_\_\_\_. A.more, shorter B. less, shorter C.more, longer D.less, longer
D.less, longer
A turnaround document is an example of a(n)
a) output control
b) input control
c) processing control
d) none of these are correct
b)input control
Which of the following is an effective data entry control to ensure that overtime hours should be zero for someone who has not worked the maximum number of regular hours in a pay period?
a) A limit check.
b) A range check.
c) A reasonableness check.
d) A validity check
c)A reasonableness check.
When Jo, a sales associate, enters an account number, which of the following controls would allow the system to retrieve and display the account name so that Jo could verify that the correct account number had been entered?
a) Prompting.
b) Sequence check.
c) Data matching.
d) Closed-loop verification.
d)Closed-loop verification.
Which of the following is designed to prevent an attacker from executing a buffer overflow attack by submitting lengthy attack code into the address field on a website form?
a) limit check
b) reasonableness test
c) field check
d) size check
d)size check
A batch total that is computed by adding up the invoice numbers in a set of sales invoices is called a
a) record count
b) checksum
c) hash total
d) financial total
c)hash total
A facility that is not only prewired for telephone and Internet access but also contains all the computing and office equipment the organization needs to perform its essential business activities is called
a) virtualization
b) a real-time mirroring site.
c) a cold site.
d) a hot site.
d) a hot site.
A cold site is an appropriate strategy for disaster recovery for organizations that are willing to tolerate operating for several ________ without their ERP system and who are also willing to reenter or even lose several __________ worth of transactions.
a) hours; hours
b) days; days
c) minutes; minutes
d) minutes; hours
e) minutes; days
f) hours; days
b)days; days
Each night during the week an organization backs up just that day’s transactions. This is referred to as making what kind of backup?
a) archival
b) incremental
c) differential
d) full
b)incremental
Which of the following techniques can be used to minimize system downtime?
a) all of the actions minimize system downtime
b) UPS
c) preventive maintenance
d) RAID
a)all of the actions minimize system downtime
After a tornado destroys an organization’s data center, the CIO turns to the __________ for instructions on how to recover.
a) Backup Plan (BP)
b) Business Continuity Plan (BCP)
c) Incident Response Plan (IRP)
d) Disaster Recovery Plan (DRP)
d)Disaster Recovery Plan (DRP)
After the Sarbanes-Oxley Act (SOX) was passed, the Securities and Exchange Commission (SEC) required management to do which of the following:
a. use the same audit firm for at least two consecutive audit years.
b. report material internal control weaknesses.
c. disclose all weaknesses regardless of materiality.
d. conduct 100% substantive testing of all internal controls.
b.report material internal control weaknesses.
Identify the corrective control below
a. Reconciling the bank statement to the cash control account
b. Approving customer credit prior to approving a sales order.
c. Maintaining frequent backup records.
d. Counting inventory on hand and comparing counts to the perpetual inventory records.
c. Maintaining frequent backups records.
Hiring decisions at a company are made by the Director of Human Resources. Pay rates are approved by the Vice President for Operations. At the end of each pay period, supervisors submit time cards to the payroll clerk, who prepares paycheck requisitions. Paychecks are then distributed through the company’s mail room. This represents a(n) segregation of duties.
a. partial
b. effective
c. ineffective
d. limited4.
b.effective