ACCT 308 Exam 2
If a confusion matrix shows 25 TP, 5 FN, 1000 TN, and 5FP, what is the precision ratio?
0.83
If a confusion matrix shows 25 TP, 5 FN, 1000 TN, and 5FP, what is the recall ratio?
0.83
if a confusion matrix shows 46 TP, 6 FN, 500 TN, and 4 FP, what is the recall ratio?
0.88
if a confusion matrix shows 46 TP, 6 FN, 500 TN, and 4 FP, what is the precision ratio?
0.92
if a confusion matrix shows 46 TP, 6 FN, 500 TN, and 4 FP, what is the accuracy ratio?
0.98
If a confusion matrix shows 25 TP, 5 FN, 1000 TN, and 5FP, what is the accuracy ratio?
0.99
Authentication is the process by which the
A system verifies the identity of the user
Which of the following is not true with respect to artificial intelligence?
AI is also called cognitive technologies
Which organization created the Reporting on an Entity's Cybersecurity Risk Management Program and Controls: Attestation Guide in 2017?
AICPA
Which of the following statements is FALSE?
Because a distributed ledger exists in a blockchain network, a computer consisting of all transaction records may crash and cause the syncing issue in the blockchain network.
Which of the following is created mainly for cryptocurrency application?
Bitcoin
Which of the following statements is FALSE?
Bitcoin uses smart contract to specify the business rules
Which of the following can be considered as a good alternative to back up data and applications?
Cloud computing
A selected set of organizations may run a blockchain node separately for keeping the transaction records. Administrators from the organizations establish the access rights and permissions for each participant. This type of blockchain is often called
Consortium blockchain
Which of the following best describes deep learning?
Deep learning involves complex, multiplayer neural networks
An information technology director collected the names and locations of key vendors, current hardware configuration, names of team members, and an alternative processing location. What is the director most likely preparing?
Disaster recovery plan
Which feature CANNOT be found in Bitcoin?
Double spend
Which of the following statements is correct?
Fault Tolerance uses redundant units to provide a system with the ability to continue functioning when part of the system fails
A message digest is the result of hashing. which of the following statements about the hashing process is true?
Hashing is the best approach to make sure that two files are identical
Which of the following statements is FALSE?
Hyperledger is a public domain
Which of the following best describes the difference between artificial intelligence and machine learning?
Machine learning is a subset of AI
Which of the following best describes machine learning?
Machine learning is a technique where a software model is trained using data
Which of the following is not part of the virtuous cycle of machine learning?
Model
Which of the following best describes artificial neural networks?
Neural networks consist of inputs, neurons or nodes, and outputs
To ensure the data sent over the internet are protected, which of the following keys is required to encrypt the data (before transmission) using an asymmetric-key encryption method?
Receiver's public key
Which of the following groups/laws was the earliest to encourage auditors to incorporate fraud examination into audit programs?
SAS No. 99
To authenticate the message sender in an asymmetric-key encryption system, which of the following keys is required to decrypt the received message?
Sender's public key
Which of the following statements is true?
Smart contract was introduced in Ethereum
Which of the following best describes reinforcement learning?
The model learns by trail-and-error
Which of the following best describes supervised learning?
The training data contain input-output pairs
which of the following best describes semi-supervised learning?
The training data contain some missing labels or incomplete data
Which of the following best describes unsupervised learning?
The training data only include input values
Which of the following is not directly related to one of the five questions that machine learning/AI is best suited to answer?
Which business strategy will be most successful?
What is a requirement of the proof of authority algorithm?
a few members have known identities
When we refer to smart contract in blockchain, we mean
a piece of software code that can be executed or triggered by business activities
to prevent repudiation in conducting e-business, companies must be able to authenticate their trading partners. which of the following encryption methods can be used for authentication purpose?
asymmetric-key encryption method
select a correct statement regarding encryption methods
asymmetric-key encryption method is sued to create digital signatures
To ensure confidentiality in an asymmetric-key encryption system, knowledge of which key is required to decrypt the receive message?
both Public and Private keys
Business continuity management is a:
corrective control
disaster recovery plan
corrective control
select a correct statement describing encryption or hashing process
encryption process is reversible
comparing encryption with hashtag
encryption results are called cyphertext
Incentive to commit fraud usually will include all of the following
inadequate segregation of duties
A digital certificate
indicates that the subscriber identified has sole control and access to the private key
regarding GDPR, which of the following statements is/are correct?
it is a regulation enforced by EU and it is to protect EU citizens' personal data
Which of the following best describes a confusion matrix?
it is a table summarizing the prediction results
Ben goes to his bank to wire transfer $1,000 to his sister Jennifer. the role of the bank in this transaction is best described as
middleman
In the Ethereum network
mining of Ether occurs at a constant rate
encryption is a
preventive control
The fraud triangle indicates which of the following condition(s) exist for a fraud to be perpetrated?
rationalization, pressure, legal environment
Data processing activities may be classified in terms of three stages or processes: input, processing, and output. An activity that is not normally associated with the input stage
reporting
What information does a block in the Bitcoin network contain?
the sender, the receiver, the quantity of Bitcoins to transfer
Which of the following vulnerabilities would create the most serious risk to a firm?
unauthorized access to the firm's network
The symmetric-key encryption method:
uses the same key for both senders and receivers for encryption and decryption
What is fault tolerance?
using redundant units to continue functioning when a system is failing