Deck 8: Auditing Computer-Based Information Systems

ملء الشاشة (f)
exit full mode
سؤال
Parity checks are an example of

A)Data entry controls
B)Data transmission controls
C)Output controls
D)Processing controls
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
The goal of information systems controls is

A)To ensure that systems objectives are met.
B)To ensure that systems function
C)To ensure that systems are reliable.
D)To ensure that data are confidential.
سؤال
Check digit verification is an example of

A)Data transmission controls
B)Output controls
C)Processing controls
D)Source data controls
سؤال
User reviews are an example of

A)Data entry controls
B)Data transmission controls
C)Output controls
D)Processing controls
سؤال
Input validation checks are an example of

A)Data entry controls
B)Data transmission controls
C)Output controls
D)Source data controls
سؤال
Sequentially pre-numbered forms is an example of .

A)Data entry controls
B)Data transmission controls
C)Processing controls
D)Source data controls
سؤال
Which of the following is not one of the 10 internationally recognized best practices for protecting the privacy of customers' personal information?

A)Access.
B)Monitoring and enforcement.
C)Registration.
D)Security.
سؤال
Turnaround documents are an example of

A)Data entry controls
B)Output controls
C)Processing controls
D)Source data controls
سؤال
Forms design is an example of this type of control.

A)Data entry controls
B)Data transmission controls
C)Output controls
D)Source data controls
سؤال
Batch totals are an example of

A)Data entry controls
B)Data transmission controls
C)Output controls
D)Processing controls
سؤال
A text file created by a website and stored on a visitor's hard disk.

A)Validity check
B)Spam
C)Error log
D)Cookie
سؤال
This determines if the characters in a field are of the proper type.

A)Field check
B)Limit check
C)Range check
D)Reasonableness test
سؤال
Data conversion checks are an example of

A)Data entry controls
B)Output controls
C)Processing controls
D)Source data controls
سؤال
File labels are an example of

A)Data entry controls
B)Output controls
C)Processing controls
D)Source data controls
سؤال
Visual scanning is an example of

A)Data entry controls
B)Output controls
C)Processing controls
D)Source data controls
سؤال
Which of the following is not one of the 10 internationally recognized best practices for protecting the privacy of customers' personal information?

A)Choice and consent.
B)Disclosure to third parties.
C)Reimbursement.
D)Use and retention.
سؤال
Concerning virtual private networks (VPN),which of the following is not true?

A)VPNs provide the functionality of a privately owned network using the Internet.
B)Using VPN software to encrypt information while it is in transit over the Internet in effect creates private communication channels,often referred to as tunnels,which are accessible only to those parties possessing the appropriate encryption and decryption keys.
C)The cost of the VPN software is much less than the cost of leasing or buying the infrastructure (telephone lines,satellite links,communications equipment,etc.)needed to create a privately owned secure communications network.
D)It is more expensive to reconfigure VPNs to include new sites than it is to add or remove the corresponding physical connections in a privately owned network.
سؤال
Error logs and review are an example of

A)Data entry controls
B)Data transmission controls
C)Output controls
D)Processing controls
سؤال
Message acknowledgement techniques are an example of

A)Data entry controls
B)Data transmission controls
C)Output controls
D)Processing controls
سؤال
Data matching is an example of

A)Data entry controls
B)Data transmission controls
C)Processing controls
D)Source data controls
سؤال
This compares the results produced by more than one method to verify accuracy.

A)Concurrent update control
B)Cross-footing balance test
C)Data matching
D)Recalculation of batch totals
سؤال
Every organization should have a disaster recovery plan so that data processing capacity can be restored as smoothly and quickly as possible.Which item below would not typically be part of an adequate disaster recovery plan?

A)a system upgrade due to operating system software changes
B)uninterruptible power systems installed for key system components
C)scheduled electronic vaulting of files
D)backup computer and telecommunication facilities
سؤال
This batch processing data entry control sums a non-financial numeric field.

A)Batch total
B)Financial total
C)Hash total
D)Sequence check
سؤال
This tests a numerical amount to ensure that it does not exceed a predetermined value.

A)Completeness check
B)Limit check
C)Range check
D)Sign check
سؤال
This batch processing data entry control sums the number of items in a batch.

A)Batch total
B)Hash total
C)Record count
D)Sequence check
سؤال
The system and the receiving unit calculate a summary statistic and compare it.

A)Echo check
B)Numbered batches
C)Parity check
D)Trailer record
سؤال
This ensures that the input data will fit into the assigned field.

A)Limit check
B)Range check
C)Size check
D)Validity check
سؤال
This compares the ID number in transaction data with similar data in the master file to verify that the account exists.

A)Reasonableness test
B)Sign check
C)Size check
D)Validity check
سؤال
This enables a system to continue functioning in the event that a particular component fails,

A)Backup procedures
B)Fault tolerance
C)Preventive maintenance
D)None of the above
سؤال
Concerning availability,which of the following statements is true?

A)Human error does not threaten system availability.
B)Proper controls can maximize the risk of threats causing significant system downtime.
C)Threats to system availability can be completely eliminated.
D)Threats to system availability include hardware and software failures as well as natural and man-made disasters.
سؤال
This entails verifying that the proper number of bits are set to the value 1 in each character received.

A)Echo check
B)Numbered batches
C)Parity check
D)Trailer record
سؤال
This batch processing data entry control sums a field that contains dollar values.

A)Batch total
B)Financial total
C)Hash total
D)Sequence check
سؤال
This tests a numerical amount to ensure that it does not exceed a predetermined value nor fall below another predetermined value.

A)Completeness check
B)Field check
C)Limit check
D)Range check
سؤال
This determines if all required data items have been entered.

A)Completeness check
B)Field check
C)Limit check
D)Range check
سؤال
This ensures that the correct and most current files are being updated.

A)Cross-footing balance test
B)Data matching
C)File labels
D)Write-protect mechanism
سؤال
This protects records from errors that occur when two or more users attempt to update the same record simultaneously.

A)Concurrent update controls
B)Cross-footing balance test
C)Data conversion controls
D)Recalculation of batch totals
سؤال
This determines the correctness of the logical relationship between two data items.

A)Range check
B)Reasonableness test
C)Sign check
D)Size check
سؤال
This batch processing data entry control tests if a batch of input data is in the proper numerical or alphabetical sequence.

A)Batch total
B)Financial total
C)Hash total
D)Sequence check
سؤال
These find processing errors.

A)Cross-footing balance test
B)File labels
C)Recalculation of batch totals
D)Write-protect mechanisms
سؤال
________ involves copying only the data items that have changed since the last backup.

A)Archive
B)Backup
C)Differential backup
D)Incremental backup
سؤال
A facility that contains all the computing equipment the organization needs to perform its essential business activities.

A)a cold site
B)a hot site
C)a remote sister site
D)a subsidiary location
سؤال
Which of the following is not a useful control procedure to control access to system outputs?

A)Allowing visitors to move through the building without supervision.
B)Coding reports to reflect their importance.
C)Requiring employees to log out of applications when leaving their desk.
D)Restricting access to rooms with printers.
سؤال
The maximum amount of time between backups is determined by a firm's

A)recovery time objective.
B)recovery point objective.
C)recovery objective.
D)maximum time recovery objective.
سؤال
The accounting department at Synergy Hydroelectric records an average of 10,000 transactions per hour.By cost-benefit analysis,managers have concluded that the maximum acceptable loss of data in the event of a system failure is 40,000 transactions.The firm's recovery point objective is therefore

A)40,000 transactions
B)10,000 transactions
C)10 hours
D)4 hours
سؤال
A location that is pre-wired for necessary telecommunications and computer equipment.

A)a cold site
B)a hot site
C)a remote sister site
D)a subsidiary location
سؤال
The accounting department at Synergy Hydroelectric records an average of 12,500 transactions per hour.By cost-benefit analysis,managers have concluded that the maximum acceptable loss of data in the event of a system failure is 25,000 transactions.If the firm's recovery time objective is 120 minutes,then the worst case recovery time objective is

A)1 hour
B)2 hours
C)3 hours
D)4 hours
سؤال
The maximum acceptable down time after a computer system failure is determined by a firm's

A)recovery time objective.
B)recovery point objective.
C)recovery objective.
D)maximum time recovery objective.
سؤال
While this type of backup takes longer,it's restoration is simpler.

A)Archive
B)Backup
C)Differential backup
D)Incremental backup
سؤال
Chaz Finnerty called the IT Help Desk in a huff."I'm trying to open an Excel file and I get a message that says that the file is locked for editing.What's going on?" The answer is that

A)the file is corrupted due to a computer virus.
B)there is no problem.Chaz is editing the file,so it is locked..
C)concurrent update controls have locked the file.
D)Chaz didn't open the file with the appropriate program.
سؤال
Which of the following is not the objective of a disaster recovery plan?

A)Minimize the extent of the disruption,damage or loss.
B)Permanently establish an alternative means of processing information.
C)Resume normal operations as soon as possible.
D)Train employees for emergency operations.
سؤال
The most important change management technique is probably

A)User rights and privileges are carefully monitored during change process.
B)Changes tested thoroughly prior to implementation.
C)All documentation is updated to reflect changes to the system.
D)Adequate monitoring and review by top management.
سؤال
The accounting department at Synergy Hydroelectric records an average of 10,000 transactions per hour.By cost-benefit analysis,managers have concluded that the maximum acceptable loss of data in the event of a system failure is 20,000 transactions.If the firm's recovery time objective is 60 minutes,then the worst case recovery time objective is

A)1 hour
B)2 hours
C)3 hours
D)4 hours
سؤال
________ copies all changes made since the last full backup.

A)Archive
B)Backup
C)Differential backup
D)Incremental backup
سؤال
The Spontaneous Combustion Rocket Shoppe in downtown Fargo,North Dakota,generates three quarters of its revenue from orders taken over the Internet.The revenue clearing account is debited by the total of cash and credit receipts and credited by the total of storefront and Internet sales.This is an example of a

A)data integrity test.
B)zero-balance test.
C)trial balance audit.
D)cross-footing balance test.
سؤال
The accounting department at Synergy Hydroelectric records an average of 12,500 transactions per hour.By cost-benefit analysis,managers have concluded that the maximum acceptable loss of data in the event of a system failure is 25,000 transactions.The firm's recovery point objective is therefore

A)25,000 transactions
B)12,500 transactions
C)1 hour
D)2 hours
سؤال
When I enter a correct customer number,the data entry screen displays the customer name and address.This is an example of

A)prompting.
B)preformatting.
C)closed-loop verification
D)error checking.
سؤال
What is the most effective way to ensure information system availability?

A)High bandwidth
B)Maintain a hot site
C)Maintain a cold site
D)Frequent backups
سؤال
A copy of a database,master file,or software that will be retained indefinitely as a historical record.

A)Archive
B)Backup
C)Differential backup
D)Incremental backup
سؤال
When a computer system's files are automatically duplicated on a second data storage system as they are changed,the process is referred to as

A)real-time mirroring.
B)batch updating.
C)consistency control.
D)double-secure storage.
سؤال
A comparison of debits and credits in related control accounts is referred to as a

A)cross-footing balance test.
B)parity test.
C)zero-balance test.
D)size check.
سؤال
Define and contrast a recovery point objective and a recovery time objective.
سؤال
What is fault tolerance?
سؤال
Which of the following will not make a password more secure?

A)Including multiple character types
B)Choosing a word or phrase that is easy to remember.
C)Making a password longer.
D)Change a password frequently.
سؤال
Devices that filter TCP/IP packets in order to protect against malicious code are called

A)routers.
B)firewalls.
C)COBIT frameworks.
D)black ICE.
سؤال
Modest Expectations Investment Services (MEIS)allows customers to manage their investments over the Internet.If customers attempt to sell more shares of a stock than they have in their account,an error message is displayed.This is an example of a

A)reasonableness test.
B)field check.
C)validity check.
D)limit check.
سؤال
Identify four data entry controls.
سؤال
Identify four source data controls.
سؤال
Mike Colby took a call from a client."Listen,Mike,I need to interact online in real time with our manufacturing operation in China,and I want to make sure that no one intercepts the communications.How can I do that?" Mike thought a moment,then responded with the best solution."We'll set up a(an)________."

A)ballistic sequencing network
B)electronic courier system
C)virtual private network
D)can-string-can (CSC)system
سؤال
Identify four useful procedures for controlling access to system outputs.
سؤال
Modest Expectations Investment Services (MEIS)allows customers to manage their investments over the Internet.If customers attempt to spend more money than they have in their account,an error message is displayed.This is an example of a

A)reasonableness test.
B)field check.
C)validity check.
D)limit check.
سؤال
Identify the 10 internationally recognized best practices for protecting the privacy of customers' personal information.
سؤال
Describe some steps you can take to minimize your risk of identify theft.
سؤال
Cancellation and storage of documents means that

A)data are copied from a document and stored,after which the document is shredded.
B)documents are defaced before being shredded.
C)documents are defaced and stored.
D)cancellation data are copied from documents before they are stored.
سؤال
Identify a fundamental control procedure for protecting that confidentiality of sensitive information.
سؤال
The devices that direct TCP/IP packets to their destinations are called

A)servers.
B)access points.
C)routers.
D)coaxial stackers.
سؤال
Identify four processing controls.
سؤال
Mike Colby took a call from a client."Listen,Mike,I need for my customers to make payments online using credit cards.Here's the thing,though.I want to make sure that no one intercepts the communications.How can I do that?" Mike thought a moment,then responded with the best solution."We'll set up a(an)________."

A)ballistic sequencing network
B)electronic courier system
C)secure sockets layer (SSL)system
D)can-string-can (CSC)system
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/77
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 8: Auditing Computer-Based Information Systems
1
Parity checks are an example of

A)Data entry controls
B)Data transmission controls
C)Output controls
D)Processing controls
B
2
The goal of information systems controls is

A)To ensure that systems objectives are met.
B)To ensure that systems function
C)To ensure that systems are reliable.
D)To ensure that data are confidential.
C
3
Check digit verification is an example of

A)Data transmission controls
B)Output controls
C)Processing controls
D)Source data controls
D
4
User reviews are an example of

A)Data entry controls
B)Data transmission controls
C)Output controls
D)Processing controls
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
5
Input validation checks are an example of

A)Data entry controls
B)Data transmission controls
C)Output controls
D)Source data controls
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
6
Sequentially pre-numbered forms is an example of .

A)Data entry controls
B)Data transmission controls
C)Processing controls
D)Source data controls
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
7
Which of the following is not one of the 10 internationally recognized best practices for protecting the privacy of customers' personal information?

A)Access.
B)Monitoring and enforcement.
C)Registration.
D)Security.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
8
Turnaround documents are an example of

A)Data entry controls
B)Output controls
C)Processing controls
D)Source data controls
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
9
Forms design is an example of this type of control.

A)Data entry controls
B)Data transmission controls
C)Output controls
D)Source data controls
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
10
Batch totals are an example of

A)Data entry controls
B)Data transmission controls
C)Output controls
D)Processing controls
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
11
A text file created by a website and stored on a visitor's hard disk.

A)Validity check
B)Spam
C)Error log
D)Cookie
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
12
This determines if the characters in a field are of the proper type.

A)Field check
B)Limit check
C)Range check
D)Reasonableness test
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
13
Data conversion checks are an example of

A)Data entry controls
B)Output controls
C)Processing controls
D)Source data controls
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
14
File labels are an example of

A)Data entry controls
B)Output controls
C)Processing controls
D)Source data controls
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
15
Visual scanning is an example of

A)Data entry controls
B)Output controls
C)Processing controls
D)Source data controls
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
16
Which of the following is not one of the 10 internationally recognized best practices for protecting the privacy of customers' personal information?

A)Choice and consent.
B)Disclosure to third parties.
C)Reimbursement.
D)Use and retention.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
17
Concerning virtual private networks (VPN),which of the following is not true?

A)VPNs provide the functionality of a privately owned network using the Internet.
B)Using VPN software to encrypt information while it is in transit over the Internet in effect creates private communication channels,often referred to as tunnels,which are accessible only to those parties possessing the appropriate encryption and decryption keys.
C)The cost of the VPN software is much less than the cost of leasing or buying the infrastructure (telephone lines,satellite links,communications equipment,etc.)needed to create a privately owned secure communications network.
D)It is more expensive to reconfigure VPNs to include new sites than it is to add or remove the corresponding physical connections in a privately owned network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
18
Error logs and review are an example of

A)Data entry controls
B)Data transmission controls
C)Output controls
D)Processing controls
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
19
Message acknowledgement techniques are an example of

A)Data entry controls
B)Data transmission controls
C)Output controls
D)Processing controls
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
20
Data matching is an example of

A)Data entry controls
B)Data transmission controls
C)Processing controls
D)Source data controls
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
21
This compares the results produced by more than one method to verify accuracy.

A)Concurrent update control
B)Cross-footing balance test
C)Data matching
D)Recalculation of batch totals
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
22
Every organization should have a disaster recovery plan so that data processing capacity can be restored as smoothly and quickly as possible.Which item below would not typically be part of an adequate disaster recovery plan?

A)a system upgrade due to operating system software changes
B)uninterruptible power systems installed for key system components
C)scheduled electronic vaulting of files
D)backup computer and telecommunication facilities
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
23
This batch processing data entry control sums a non-financial numeric field.

A)Batch total
B)Financial total
C)Hash total
D)Sequence check
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
24
This tests a numerical amount to ensure that it does not exceed a predetermined value.

A)Completeness check
B)Limit check
C)Range check
D)Sign check
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
25
This batch processing data entry control sums the number of items in a batch.

A)Batch total
B)Hash total
C)Record count
D)Sequence check
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
26
The system and the receiving unit calculate a summary statistic and compare it.

A)Echo check
B)Numbered batches
C)Parity check
D)Trailer record
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
27
This ensures that the input data will fit into the assigned field.

A)Limit check
B)Range check
C)Size check
D)Validity check
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
28
This compares the ID number in transaction data with similar data in the master file to verify that the account exists.

A)Reasonableness test
B)Sign check
C)Size check
D)Validity check
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
29
This enables a system to continue functioning in the event that a particular component fails,

A)Backup procedures
B)Fault tolerance
C)Preventive maintenance
D)None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
30
Concerning availability,which of the following statements is true?

A)Human error does not threaten system availability.
B)Proper controls can maximize the risk of threats causing significant system downtime.
C)Threats to system availability can be completely eliminated.
D)Threats to system availability include hardware and software failures as well as natural and man-made disasters.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
31
This entails verifying that the proper number of bits are set to the value 1 in each character received.

A)Echo check
B)Numbered batches
C)Parity check
D)Trailer record
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
32
This batch processing data entry control sums a field that contains dollar values.

A)Batch total
B)Financial total
C)Hash total
D)Sequence check
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
33
This tests a numerical amount to ensure that it does not exceed a predetermined value nor fall below another predetermined value.

A)Completeness check
B)Field check
C)Limit check
D)Range check
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
34
This determines if all required data items have been entered.

A)Completeness check
B)Field check
C)Limit check
D)Range check
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
35
This ensures that the correct and most current files are being updated.

A)Cross-footing balance test
B)Data matching
C)File labels
D)Write-protect mechanism
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
36
This protects records from errors that occur when two or more users attempt to update the same record simultaneously.

A)Concurrent update controls
B)Cross-footing balance test
C)Data conversion controls
D)Recalculation of batch totals
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
37
This determines the correctness of the logical relationship between two data items.

A)Range check
B)Reasonableness test
C)Sign check
D)Size check
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
38
This batch processing data entry control tests if a batch of input data is in the proper numerical or alphabetical sequence.

A)Batch total
B)Financial total
C)Hash total
D)Sequence check
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
39
These find processing errors.

A)Cross-footing balance test
B)File labels
C)Recalculation of batch totals
D)Write-protect mechanisms
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
40
________ involves copying only the data items that have changed since the last backup.

A)Archive
B)Backup
C)Differential backup
D)Incremental backup
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
41
A facility that contains all the computing equipment the organization needs to perform its essential business activities.

A)a cold site
B)a hot site
C)a remote sister site
D)a subsidiary location
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
42
Which of the following is not a useful control procedure to control access to system outputs?

A)Allowing visitors to move through the building without supervision.
B)Coding reports to reflect their importance.
C)Requiring employees to log out of applications when leaving their desk.
D)Restricting access to rooms with printers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
43
The maximum amount of time between backups is determined by a firm's

A)recovery time objective.
B)recovery point objective.
C)recovery objective.
D)maximum time recovery objective.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
44
The accounting department at Synergy Hydroelectric records an average of 10,000 transactions per hour.By cost-benefit analysis,managers have concluded that the maximum acceptable loss of data in the event of a system failure is 40,000 transactions.The firm's recovery point objective is therefore

A)40,000 transactions
B)10,000 transactions
C)10 hours
D)4 hours
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
45
A location that is pre-wired for necessary telecommunications and computer equipment.

A)a cold site
B)a hot site
C)a remote sister site
D)a subsidiary location
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
46
The accounting department at Synergy Hydroelectric records an average of 12,500 transactions per hour.By cost-benefit analysis,managers have concluded that the maximum acceptable loss of data in the event of a system failure is 25,000 transactions.If the firm's recovery time objective is 120 minutes,then the worst case recovery time objective is

A)1 hour
B)2 hours
C)3 hours
D)4 hours
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
47
The maximum acceptable down time after a computer system failure is determined by a firm's

A)recovery time objective.
B)recovery point objective.
C)recovery objective.
D)maximum time recovery objective.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
48
While this type of backup takes longer,it's restoration is simpler.

A)Archive
B)Backup
C)Differential backup
D)Incremental backup
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
49
Chaz Finnerty called the IT Help Desk in a huff."I'm trying to open an Excel file and I get a message that says that the file is locked for editing.What's going on?" The answer is that

A)the file is corrupted due to a computer virus.
B)there is no problem.Chaz is editing the file,so it is locked..
C)concurrent update controls have locked the file.
D)Chaz didn't open the file with the appropriate program.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
50
Which of the following is not the objective of a disaster recovery plan?

A)Minimize the extent of the disruption,damage or loss.
B)Permanently establish an alternative means of processing information.
C)Resume normal operations as soon as possible.
D)Train employees for emergency operations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
51
The most important change management technique is probably

A)User rights and privileges are carefully monitored during change process.
B)Changes tested thoroughly prior to implementation.
C)All documentation is updated to reflect changes to the system.
D)Adequate monitoring and review by top management.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
52
The accounting department at Synergy Hydroelectric records an average of 10,000 transactions per hour.By cost-benefit analysis,managers have concluded that the maximum acceptable loss of data in the event of a system failure is 20,000 transactions.If the firm's recovery time objective is 60 minutes,then the worst case recovery time objective is

A)1 hour
B)2 hours
C)3 hours
D)4 hours
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
53
________ copies all changes made since the last full backup.

A)Archive
B)Backup
C)Differential backup
D)Incremental backup
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
54
The Spontaneous Combustion Rocket Shoppe in downtown Fargo,North Dakota,generates three quarters of its revenue from orders taken over the Internet.The revenue clearing account is debited by the total of cash and credit receipts and credited by the total of storefront and Internet sales.This is an example of a

A)data integrity test.
B)zero-balance test.
C)trial balance audit.
D)cross-footing balance test.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
55
The accounting department at Synergy Hydroelectric records an average of 12,500 transactions per hour.By cost-benefit analysis,managers have concluded that the maximum acceptable loss of data in the event of a system failure is 25,000 transactions.The firm's recovery point objective is therefore

A)25,000 transactions
B)12,500 transactions
C)1 hour
D)2 hours
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
56
When I enter a correct customer number,the data entry screen displays the customer name and address.This is an example of

A)prompting.
B)preformatting.
C)closed-loop verification
D)error checking.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
57
What is the most effective way to ensure information system availability?

A)High bandwidth
B)Maintain a hot site
C)Maintain a cold site
D)Frequent backups
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
58
A copy of a database,master file,or software that will be retained indefinitely as a historical record.

A)Archive
B)Backup
C)Differential backup
D)Incremental backup
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
59
When a computer system's files are automatically duplicated on a second data storage system as they are changed,the process is referred to as

A)real-time mirroring.
B)batch updating.
C)consistency control.
D)double-secure storage.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
60
A comparison of debits and credits in related control accounts is referred to as a

A)cross-footing balance test.
B)parity test.
C)zero-balance test.
D)size check.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
61
Define and contrast a recovery point objective and a recovery time objective.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
62
What is fault tolerance?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
63
Which of the following will not make a password more secure?

A)Including multiple character types
B)Choosing a word or phrase that is easy to remember.
C)Making a password longer.
D)Change a password frequently.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
64
Devices that filter TCP/IP packets in order to protect against malicious code are called

A)routers.
B)firewalls.
C)COBIT frameworks.
D)black ICE.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
65
Modest Expectations Investment Services (MEIS)allows customers to manage their investments over the Internet.If customers attempt to sell more shares of a stock than they have in their account,an error message is displayed.This is an example of a

A)reasonableness test.
B)field check.
C)validity check.
D)limit check.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
66
Identify four data entry controls.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
67
Identify four source data controls.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
68
Mike Colby took a call from a client."Listen,Mike,I need to interact online in real time with our manufacturing operation in China,and I want to make sure that no one intercepts the communications.How can I do that?" Mike thought a moment,then responded with the best solution."We'll set up a(an)________."

A)ballistic sequencing network
B)electronic courier system
C)virtual private network
D)can-string-can (CSC)system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
69
Identify four useful procedures for controlling access to system outputs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
70
Modest Expectations Investment Services (MEIS)allows customers to manage their investments over the Internet.If customers attempt to spend more money than they have in their account,an error message is displayed.This is an example of a

A)reasonableness test.
B)field check.
C)validity check.
D)limit check.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
71
Identify the 10 internationally recognized best practices for protecting the privacy of customers' personal information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
72
Describe some steps you can take to minimize your risk of identify theft.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
73
Cancellation and storage of documents means that

A)data are copied from a document and stored,after which the document is shredded.
B)documents are defaced before being shredded.
C)documents are defaced and stored.
D)cancellation data are copied from documents before they are stored.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
74
Identify a fundamental control procedure for protecting that confidentiality of sensitive information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
75
The devices that direct TCP/IP packets to their destinations are called

A)servers.
B)access points.
C)routers.
D)coaxial stackers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
76
Identify four processing controls.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
77
Mike Colby took a call from a client."Listen,Mike,I need for my customers to make payments online using credit cards.Here's the thing,though.I want to make sure that no one intercepts the communications.How can I do that?" Mike thought a moment,then responded with the best solution."We'll set up a(an)________."

A)ballistic sequencing network
B)electronic courier system
C)secure sockets layer (SSL)system
D)can-string-can (CSC)system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 77 في هذه المجموعة.