Chapter 13

Ace your homework & exams now with Quizwiz!

A facility that is not only prewired for telephone and Internet access but also contains all the computing and office equipment the organization needs to perform its essential business activities is called A. a real-time mirroring site B. a hot site. C. Virtualization. D. a cold site.

B

A turnaround document is an example of a(n) A. output control. B. input control. C. processing control. D. None of these are correct.

B

Information that needs to be stored securely for 10 years or more would most likely be stored in which type of file? A. backup B. archive C. log D. encrypted

B

Which control ensures that the master inventory file contains an inventory item identified by the number 251184? A. Field check B. Validity check C. Limit check D. Check digit verification

B

Which disaster recovery strategy involves contracting for use of a physical site to which all necessary computing equipment will be delivered within 24 to 36 hours? A. virtualization B. cold site C. data mirroring D. hot site

B

Which of the following is an example of the kind of batch total called a hash total? A. the sum of the purchase amount field in a set of purchase orders B. the sum of the purchase order number field in a set of purchase orders C. the number of completed documents in a set of purchase orders D. All of the above

B

Which of the following provides detailed procedures to resolve the problems resulting from a flash flood that completely destroys a company's data center? A. backup plan B. disaster recovery plan (DRP) C. business continuity plan (BCP) D. archive plan

B

Assume that the XYZ Company wants to create batch totals for a transaction file that contains all sales invoices. Which of the following fields could be used to create a hash total? (Check all that apply.) A. Total amount of sale B. Quantity sold C. Customer name D. Customer number E. Part number

B, D, E

Assume that the XYZ Company wants to create batch totals for a transaction file that contains payments to suppliers. Which of the following fields could be used to create a financial total? (Check all that apply.) A. Vendor number B. Gross amount due C. Quantity purchased D. Check amount E. Discount for prompt payment

B, D, E

Which of the following controls would prevent entry of a nonexistent customer number in a sales transaction? A. completeness check B. batch total C. field check D. validity check

D

Which of the following is designed to prevent an attacker from executing a buffer overflow attack by submitting lengthy attack code into the address field on a website form? A. Size check B. Field check C. Reasonableness test D. Limit check

A

Which of the following measures the amount of data that might be potentially lost as a result of a system failure? A. recovery point objective (RPO) B. recovery time objective (RTO) C. disaster recovery plan (DRP) D. business continuity plan (BCP)

A

Which option is appropriate for an organization, like an airline, that cannot tolerate any downtime or any loss of data? A. Real-time mirroring B. Hot site C. Cold site D. Any of the three choices is appropriate.

A

Which type of file is retained indefinitely? A. Archive B. UPS C. Backup D. RAID

A

Which of the following statements are true? (Check all that apply.) A. Virtualization significantly reduces RTO. B. Virtualization does not eliminate the need for backups. C. All of the other three answers are true. D. Virtualization cannot be used to support real-time mirroring.

A, B

Which of the following processing controls can be used to achieve the objective of processing integrity? (Check all that apply.) A. File labels B. Reconciliation procedures C. Validity check D. Recalculation of batch totals E. Parity bits

A, D

Which of the following input controls can be used to ensure the objective of processing integrity? (Check all that apply.) A. Forms design B. Cross-footing and zero-balance tests C. File labels D. Completeness check E. Turnaround documents

A, D, E

A batch total that is computed by adding up the invoice numbers in a set of sales invoices is called a A. record count. B. financial total. C. hash total. D. checksum.

C

After a tornado destroys an organization's data center, the CIO turns to the __________ for instructions on how to recover. A. Incident Response Plan (IRP) B. Business Continuity Plan (BCP) C. Disaster Recovery Plan (DRP) D. Backup Plan (BP)

C

Which of the following is a control that can be used to verify the accuracy of information transmitted over a network? A. size check B. check digit C. parity bit D. completeness check

C

Which of the following is an effective data entry control to ensure that overtime hours should be zero for someone who has not worked the maximum number of regular hours in a pay period? A. A limit check B. A range check C. A reasonableness check D. A validity check

C

Each night during the week an organization backs up just that day's transactions. This is referred to as making what kind of backup? A. Differential B. Full C. Archival D. Incremental

D

Incremental daily backups take ____ time to make than Differential daily backups, but the restoration process taken is _____. A. more, longer B. less, shorter C. more, shorter D. less, longer

D

The ____ represents the amount of data that an organization is willing to lose, or reenter, in the event of a disaster; the ____ represents the number of hours or days that the organization is willing to operate without its data center. A. DRP, BCP B. RTO, RPO C. BCP, DRP D. RPO, RTO

D

When Jo, a sales associate, enters an account number, which of the following controls would allow the system to retrieve and display the account name so that Jo could verify that the correct account number had been entered? A. Sequence check B. Data matching C. Prompting D. Closed-loop verification

D

Which data entry application control would detect and prevent entry of alphabetic characters as the price of an inventory item? A. sign check B. limit check C. reasonableness check D. field check

D

Which of the following statements is true? A. Differential daily backups are faster to perform than incremental daily backups, and restoration is faster and simpler. B. Differential daily backups are faster to perform than incremental daily backups, but restoration is slower and more complex. C. Incremental daily backups are faster to perform than differential daily backups, and restoration is faster and simpler. D. Incremental daily backups are faster to perform than differential daily backups, but restoration is slower and more complex.

D

Which of the following statements is true? A. Virtualization significantly reduces RTO for hardware problems. B. Cloud computing reduces the risk that a single catastrophe from either a natural disaster or terrorist attack would result in significant downtime and loss of availability. C. Backups still need to be made when using either virtualization or cloud computing. D. All of the above are true.

D

Which of the following techniques can be used to minimize system downtime? A. UPS B. RAID C. Preventive maintenance D. All of these

D

A cold site is an appropriate strategy for disaster recovery for organizations that are willing to tolerate operating for several ________ without their ERP system and who are also willing to reenter or even lose several __________ worth of transactions. A. minutes; days B. minutes; hours C. hours; hours D. hours; days E. days; days

E


Related study sets

Common Verbs - Hablar (hablando, hablado)

View Set

Biology Chapter 1 Review Questions

View Set

Sherpath- Congenital heart disease

View Set

Sociology Exam Review: Questions

View Set

OES-4015- TEST 2 - Multiple Choice/ Fill in Blank/ True-False.

View Set