Chapter 15 Homework

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

The test data technique uses: a. an automated technique that enables test data to be continually evaluated during the normal operation of a system. b. a programmed audit module that is added to the system under review. c. a computer program to reprocess the firm's actual data for a past period to generate simulated results. d. a set of input data to validate system integrity.

d. a set of input data to validate system integrity

An operational database: a. contains data that are uploaded from a data warehouse. b. is updated before transactions are processed. c. covers the data of current and previous fiscal years. d. contains data that are volatile.

d. contains data that are volatile

The vice president of human resources has requested an audit to identify payroll overpayments for the previous year. Which would be the best audit technique to use in this situation? a. Test data b. Integrated test facility c. Embedded audit module d. Generalized audit software

d. generalized audit software

Select a correct statement regarding routers. a. Routers are used for data transmission over internal networks. b. Routers use MAC addresses to pass the packets over the Internet. c. Routers and hubs using the same approach in transmitting packets. d. None of these choices are correct.

d. none of these choices are correct

Which of the following is not a task performed by an operating system? a. Translate high-level languages to machine-level language b. Provide controlled access to data and process data c. Support applications and facilitate their access to specified resources d. Manage job scheduling and multiprogramming

a. translate high level languages to machine level language

Which of the following is not a generalized audit software (GAS)? a. ACL b. SAP c. IDEA

b. SAP

Unauthorized alteration of records in a database system can be prevented by employing: a. regular review of audit trails. b. computer matching. c. database access controls. d. key verification.

c. database access controls

Which of the following network components is set up to serve as a security measure that prevents unauthorized traffic between different segments of the network? a. Switch b. Virtual local area networks (VLANs) c. Firewall d. Router

c. firewall

An organization is planning to replace its wired networks with wireless networks. Which of the following approaches provides the most secure wireless network? a. Allow access to only authorized media access control (MAC) addresses. b. Implement wired equivalent privacy (WEP) protocol. c. Implement wi-fi protected access (WPA2). d. Disable the network interface card (NIC).

c. implement wi-fi protected access (wpa2)

The most common security threats for wireless LANs include: a. social engineering. b. virus. c. man-in-the-middle. d. system malfunction.

c. man-in-the-middle

Which of the following is not one of the main purposes for a WAN? a. Link two or more geographically dispersed sites within a company b. Provide remote access to employees and/or customers c. Provide corporate access to the Internet d. Securely connect a network to distant offices in a building by sending encrypted packets

d. Securely connect a network to distant offices in a building by sending encrypted packets

Which of following statements about CAATs is not correct? a. The integrated test facility is a programmed module or segment that is inserted into an application program to monitor and collect data based on daily transactions. b. The embedded audit module may require the auditor to have a good working knowledge of computer programming and a solid understanding of IT risks that may exist in a system. c. Parallel simulation attempts to simulate or reproduce the firm's actual processing results. d. The test data technique uses a set of hypothetical transactions to examine the programmed checks and program logic in programs.

a. The integrated test facility is a programmed module or segment that is inserted into an application program to monitor and collect data based on daily transactions.

A local area network (LAN) is best described as a(n): a. computer system that connects computers of all sizes, workstations, terminals, and other devices within a limited proximity. b. method to offer specialized software, hardware, and data-handling techniques that improve effectiveness and reduce costs. c. electronic library containing millions of items of data that can be reviewed, retrieved, and analyzed. d. system that allows computer users to meet and share ideas and information.

a. computer system that connects computers of all sizes, workstations, terminals, and other devices within a limited proximity

Select a correct statement regarding database systems. a. Data mining are often used to analyze data in the data warehouse. b. A data warehouse is the operational database. c. A company's ERP system is often the same as the data warehouse. d. Two of the choices are correct.

a. data mining are often used to analyze data in the data warehouse

Which of the following audit techniques should an IS auditor use to detect duplicate invoice records within an invoice master file? a. Generalized audit software b. Embedded audit module c. Integrated test facility d. Test data

a. generalized audit software

Unauthorized alteration of records in a database system would impair which of the following components of the CIA (related to security)? a. Integrity b. Availability c. Confidentiality d. Authorization

a. integrity

Managers at a consumer products company purchased personal computer software from only recognized vendors and prohibited employees from installing nonauthorized software on their personal computers by enforcing a new end-user computing policy. To minimize the likelihood of computer viruses infecting any of its systems, the company should also: a. recompile infected programs from source code backups. b. test all new software on a stand-alone personal computer. c. restore infected systems with authorized versions. d. institute program change control procedures.

b. test all new software on a stand-alone personal computer

What is the main purpose of using VPN today? a. Secure the data transmission between e-business trading partners. b. Examine the Internet traffic and to prevent from DoS attacks. c. Maintain a secured data transmission or communication for remote access. d. None of these choices are correct.

c. Maintain a secured data transmission or communication for remote access.

A group of computers, printers, and other devices connected to the same network and covering a limited geographic range is called a: a. VAN. b. WAN. c. VPN. d. LAN.

d. LAN

Select the correct statement(s) regarding network devices. a. Firewalls are used to screen and secure data transmitted among internal networks. b. Routers use IP addresses for data transmission over the Internet. c. Hubs are used for transmitting packets over internal networks. d. Firewalls are used to screen and secure data transmitted among internal networks and routers use IP addresses for data transmission over the Internet. e. Routers use IP addresses for data transmission over the Internet and hubs are used for transmitting packets over internal networks.

e. Routers use IP addresses for data transmission over the Internet and hubs are used for transmitting packets over internal networks.


Kaugnay na mga set ng pag-aaral

Structure and Function of Macro-molecules

View Set

Module 1: Climate and Meteorology

View Set

Cell Transport/Enzymes Honors Biology Test 2022

View Set

Texas Life and Health: Taxes, Retirement, and Other Insurance Concepts

View Set

Chapter 44: The Child With Cancer ?s

View Set

Unit 2: Obstetrics A - Normal Obstetrics, Unit 2: Obstetrics - B. Abnormal Obstetrics

View Set

Gastritis, PUD, GI CA, Bariatric sx

View Set