W41-Characteristics of IT Systems-Specific Flashcards
Q54. A computer that is designed to provide software and other application to other computers is referred to as a
a. Microcomputer
b. Network computer
c. Server
d. Supercomputer
Q54. (c) A server provides other computers (“clients”) with access to files and printers as shared resources to a computer network.
Q55. Which is least likely to be considered a component of a computer network?
a. Application program
b. Computers
c. Software
d. Routers
Q55. (a) application program is a program that gives a computer instructions that provide the user with tools to accomplish a specific task (e.g., a word processing application).
Q59 Laptop computers provide automation outside of the normal office location. Which of the following would provide the least security for sensitive data stored on a laptop computer?
a. Encryption of data files on the laptop computer
b. Setting up a password for the screensaver program on the laptop computer
c. Using a laptop computer with a removable hard disk drive
d. Using a locking device that can secure the laptop computer to an immovable object
Q59. (b) password protection for a screensaver program can be easily bypassed.
Q60. When developing a new computer system that will handle customer orders and process customer payments, a high-level systems design phase would include determination of which of the following?
a. How the new system will affect current inventory and general ledger systems
b. How the file layouts will be structured for the customer order records
c. Whether to purchase a turn-key system or modify an existing system
d. Whether formal approval by top management is needed for the new system
Q60. (c) the determination of what type of system to obtain is made during the high-level design phase.
Q62. Management is concerned that data uploaded from a microcomputer to the company’s mainframe system in batch processing may be erroneous. Which of the following controls would best address this issue?
a. The mainframe computer should be backed up on a regular basis
b. Two persons should be present at the microcomputer when it is uploading data
c. The mainframe computer should subject the data to the same edits and validation routines that online data entry would require
d. The users should be required to review a random sample of processed data
Q62. (c) this could help prevent data errors
Q66. The use of message encryption software
a. Guarantees the secrecy of data
b. Requires manual distribution of keys
c. Increases system overhead
d. Reduces the need for periodic password changes
Q66. (c) the machine instructions necessary to encrypt and decrypt data constitute system overhead, which means that processing may be slowed down
Q67. A company’s management is concerned about computer data eavesdropping and wants to maintain the confidentiality of its information as it is transmitted. The company should utilize
a. Data encryption
b. Dial-back systems
c. Message acknowledgement procedures
d. Password codes
Q67. (a) data encryption prevents eavesdropping by using codes to ensure that data transmissions are protected from unauthorized tampering or electronic eavesdropping
Q69. The internal auditor is reviewing a new policy on electronic mail. Appropriate elements of such a policy would include all of the following except:
a. Erasing all employee’s electronic mail immediately upon employment termination
b. Encrypting electronic mail messages when transmitted over phone lines
c. Limiting the number of electronic mail packages adopted by the organization
d. Directing that personnel do not send highly sensitive or confidential messages using electronic mail
Q69. (a) the company should have access to the business-related e-mail that is left behind. Access to e-mail can also be critical in business or possible criminal investigations. The privacy concerns of the individual case must be mitigated by compelling business interests: the need to follow up on business e-mail and to assist in investigations.
Q70. Which of the following risks is most likely to be encountered in an end-user computing (EUC) environment as compared to a mainframe computer system?
a. Inability to afford adequate uninterruptible power supply system
b. User input screens without a graphical user interface (GUI)
c. Applications that are difficult to integrate with other information systems
d. Lack of adequate utility programs
Q70. (c) this risk is considered unique to end-user computing (EUC) system development
Q72. Method to minimize the installation of unlicensed microcomputer software include all of the following except:
a. Employee awareness programs
b. Regular audits for unlicensed software
c. Regular monitoring of network access and start-up scripts
d. An organizational policy that includes software licensing requirements
Q72. (c) this technique will not affect introduction of unlicensed software
Q73. In traditional information systems, computer operators are generally responsible for backing up software and data files on a regular basis. In distributed or cooperative systems, ensuring that adequate backups are taken is the responsibility of
a. User management
b. Systems programmers
c. Data entry clerks
d. Tape libratians
Q73. (a) in distributed or cooperative systems, the responsibility for ensuring that adequate backups are taken is the responsibility of user management because the systems are under the control of users
Q74. An auditor is least likely to find that a client’s data is input through
a. Magnetic tape reader
b. Dynamic linking character reader
c. Point-of-sale recorders
d. Touch sensitive screens
Q74. (b) the term “dynamic linking character reader” is a combination of therms that has no real meaning
Q75. End-user computing is an example of which of the following?
a. Client/server processing
b. A distributed system
c. Data mining
d. Decentralized processing
Q75. (d) end-use computing involves individual users performing the development and execution of computer applications in a decentralized manner
Q77. Which of the following statements is correct regarding the Internet as a commercially viable network?
a. Organizations must use firewalls if they wish to maintain security over internal data
b. Companies must apply to the Internet to gain permission to create a homepage to engage in electronic commerce
c. Companies that wish to engage in electronic commerce on the Internet must meet required security standards established by the coalition of Internet providers
d. All of the above
Q77. (a) companies that wish to maintain adequate security must use firewalls to protect data from being accessed by unauthorized users
Q78. To reduce security exposure when transmitting proprietary data over communication lines, a company should use.
a. Asynchronous modems
b. Authentic techniques
c. Call-back procedures
d. Cryptographic devices
Q78. (d) cryptographic devices protect data in transmission over communication lines