Sie sind auf Seite 1von 9

1

10

11

12

13

14

15

16

17

18

19

20

Quiz #2 - Midterms

Instruction: Key-in the letter of the best answer in Column C


Question
Control objectives regarding effectiveness and efficiency, reliability, and compliance are the
basis of which control framework?
A. GTAG.
B. eSAC.
C. COBIT.
D. COSO.
Which of the following control frameworks groups IT business assurance objectives into the
five categories of availability, capability, functionality, protectability, and accountability?
A. COBIT.
B. COSO.
C. eSAC.
D. GTAG.
Which of the following types of controls is not described in the IT Governance Institutes
Control Objectives for Information and Related Technology (COBIT)?
A. General controls.
B. Exchange controls.
C. Business controls.
D. Process controls.
COBIT is
A. A set of guidelines to assist in implementing adequate controls over IT processes.
B. A set of risks and responses to technology challenges.
C. The update of the previous Systems Auditability and Control reports.
D. Published by the Committee of Sponsoring Organizations

Which of the following characteristics distinguishes computer processing from


manual processing?
A. Computer processing virtually eliminates the occurrence of computational error normally associa
processing.
B. Errors or fraud in computer processing will be detected soon after their occurrence.
C. The potential for systematic errors is ordinarily greater in manual processing than in computeriz
D. Most computer systems are designed so that transaction trails useful for audit purposes do not e

Batch processing
A. Is not used by most businesses because it reduces the audit trail.
B. Allows users to inquire about groups of information contained in the system.
C. Accumulates transaction records into groups for processing against the master file on a delayed
D. Can only be performed on a centralized basis.

When assessing application controls, which one of the following input controls or edit
checks is most likely to be used to detect a data input error in the customer account number field?
A. Limit check.
B. Validity check.
C. Control total.
D. Hash total.

The two broad groupings of information systems control activities are general controls and
application controls. General controls include controls
A. Relating to the correction and resubmission of faulty data.
B. For developing, modifying, and maintaining computer programs.
C. Designed to ensure that only authorized users receive output from processing.
D. Designed to ensure that all data submitted for processing have been properly authorized
The purpose of input controls is to ensure the
A. Authorization of access to data files.
B. Authorization of access to program files.
C. Completeness, accuracy, and validity of updating.
D. Completeness, accuracy, and validity of input.
The two broad groupings of information systems control activities are general controls and
application controls. General controls include controls
A. Relating to the correction and resubmission of faulty data.
B. For developing, modifying, and maintaining computer programs.
C. Designed to assure that only authorized users receive output from processing.
D. Designed to ensure that all data submitted for processing have been properly authorized.

Some data processing controls relate to all computer processing activities (general
controls) and some relate to specific tasks (application controls). General controls include
A. Controls designed to ascertain that all data submitted to computer processing have been proper
B. Controls that relate to the correction and resubmission of data that were initially incorrect.
C. Controls for documenting and approving programs and changes to programs.
D. Controls designed to assure the accuracy of the processing results.

Which of the following statements presents an example of a general control for a


computerized system?
A. Limiting entry of sales transactions to only valid credit customers.
B. Creating hash totals from Social Security numbers for the weekly payroll.
C. Restricting entry of accounts payable transactions to only authorized users.
D. Restricting access to the computer center by use of biometric devices.

Which of the following is a true statement regarding security over an entitys IT?
A.Controls should exist to ensure that users have access to and can update only the data elements
been authorized to access.
B. Controls over data sharing by diverse users within an entity should be the same for every user.
C. The employee who manages the computer hardware should also develop and debug the compu
D. Controls can provide assurance that all processed transactions are authorized but cannot verify
transactions are processed.

A local area network (LAN) is best described as a(n)


A. Computer system that connects computers of all sizes, workstations, terminals, and other device
proximity.
B. System to allow computer users to meet and share ideas and information.
C. Electronic library containing millions of items of data that can be reviewed, retrieved, and analyz
D. Method to offer specialized software, hardware, and data-handling techniques that improve effe
reduce costs.

Which of the following is false with respect to client-server networks?


A. A client-server network divides processing of an application between a client machine on a netw
B. In a client-server network, many applications reside on the client computer.
C. The server customarily manages peripheral hardware and controls access to shared databases.
D. A client-server network can cope with only 12 or fewer clients at a time.
Which of the following is considered to be a server in a local area network (LAN)?
A. The cabling that physically interconnects the nodes of the LAN.
B. A device that stores program and data files for users of the LAN.
C. A device that connects the LAN to other networks.
D. A workstation that is dedicated to a single user on the LAN
A type of network that is used to support interconnections within a building is
known as a
A. Local area network.
B. Wide area network.
C. Metropolitan area network.
D. Value-added network.
The network signaling technology that makes the Internet possible is
A. Switching.
B. Routing.
C. Bridging.
D. Ethernet.
Which of the following concepts is not specifically associated with the Internet?
A. Bluetooth.
B. TCP/IP.
C. HTML.
D. URL.
The transmission protocol underlying the Internet is known as
A. TCP/IP.
B. Bluetooth.
C. WAN.
D. Ethernet.

Answer

Das könnte Ihnen auch gefallen