Exam 2: Ch 10
Which data entry application control would detect and prevent entry of alphabetic characters as the price of an inventory item? A) Field check B) Limit check C) Reasonableness check D) Sign check E) Price check
A) Field check
Which of the following statements is true? A) Incremental daily backups are faster to perform than differential daily backups, but restoration is slower and more complex. B) Incremental daily backups are faster to perform than differential daily backups, and restoration is faster and simpler. C) Differential daily backups are faster to perform than incremental daily backups, but restoration is slower and more complex. D) Differential daily backups are faster to perform than incremental daily backups, and restoration is faster and simpler.
A) Incremental daily backups are faster to perform than differential daily backups, but restoration is slower and more complex.
Which disaster recovery strategy involves contracting for use of a physical site to which all necessary computing equipment will be delivered within 24 to 36 hours? A) Virtualization B) Cold site C) Hot site D) Data mirroring E) Computer Centers R us
B) Cold site
Which of the following provides detailed procedures to resolve the problems resulting from a flash flood that completely destroys a company's data center? A) Backup plan B) Disaster recovery plan (DRP) C) Business continuity plan (BCP) D) Archive plan E) Obama's Stimulus plan (OSP)
B) Disaster recovery plan (DRP)
Which of the following measures the amount of data that might be potentially lost as a result of a system failure? A) Recovery time objective (RTO) B) Recovery point objective (RPO) C) Disaster recovery plan (DRP) D) Business continuity plan (BCP) E) Potentially lost data (PLD)
B) Recovery point objective (RPO)
Which of the following is an example of the kind of batch total called a hash total? A) The sum of the purchase amount field in a set of purchase orders B) The sum of the purchase order number field in a set of purchase orders C) The number of completed documents in a set of purchase orders D) All of the above E) The sum of a gun in a set of purchase orders
B) The sum of the purchase order number field in a set of purchase orders
Information that needs to be stored securely for 10 years or more would most likely be stored in which type of file? A) backup B) archive C) encrypted D) log E) 10-year
B) archive
What would be the best location for your data center? A) New Orleans B) A trailer park in Kansas C) NORAD D) On the San Andreas fault E) Along the banks of the Mississippi
C) NORAD
Which of the following is a control that can be used to verify the accuracy of information transmitted over a network? A) Completeness check B) Check digit C) Parity bit D) Size check E) Cross-footing balance test
C) Parity bit
Which of the following controls would prevent entry of a nonexistent customer number in a sales transaction? A) Field check B) Completeness check C) Validity check D) Batch total E) Fraud-o-meter
C) Validity check
Which of the following statements is true? A) "Emergency" changes need to be documented once the problem is resolved. B) Changes should be tested in a system separate from the one used to process transactions. C) Change controls are necessary to maintain adequate segregation of duties. D) All of the above are true. E) None of the above are true.
D) All of the above are true.
A facility that is not only prewired for telephone and Internet access but also contains all the computing and office equipment the organization needs to perform its essential business activities is called a)virtualization b)a real-time mirroring site. c)a cold site. d) a hot site.
d) a hot site.
Assume that the XYZ Company wants to create batch totals for a transaction file that contains payments to suppliers. Which of the following fields could be used to create a financial total? (Check all that apply.) a)Discount for prompt payment b)Vendor number c)Quantity purchased d)Check amount e)Gross amount due f)Purchase order number
a)Discount for prompt payment d)Check amount e)Gross amount due
Assume that the XYZ Company wants to create batch totals for a transaction file that contains all sales invoices. Which of the following fields could be used to create a hash total? (Check all that apply.) a)Quantity sold b)Total amount of sale c)Customer name d)Customer number e)Part number
a)Quantity sold d)Customer number e)Part number
Which of the following techniques can be used to minimize system downtime? a)all of the actions minimize system downtime b)UPS c)preventive maintenance d)RAID
a)all of the actions minimize system downtime
When Jo, a sales associate, enters an account number, which of the following controls would allow the system to retrieve and display the account name so that Jo could verify that the correct account number had been entered? a) Prompting. b)Sequence check. c) Data matching. d)Closed-loop verification.
d)Closed-loop verification.
Which of the following input controls can be used to ensure the objective of processing integrity? (Check all that apply.) a)File labels b)Limit check c)Field check d)Completeness check e)Turnaround documents f)Forms design g)Cross-footing and zero-balance tests
b)Limit check c)Field check d)Completeness check e)Turnaround documents f)Forms design
Which of the following are output controls that help achieve the objective of processing integrity? (Check all that apply.) a)Cross-footing and zero-balance tests b)Reconciliation procedures c)Reasonableness test d)User review e)Data transmission controls f)File labels g)Batch totals
b)Reconciliation procedures d)User review e)Data transmission controls
Which control ensures that the master inventory file actually contains an inventory item identified by the number 251184? a)Check digit verification b)Validity check c)Field check d) Limit check
b)Validity check The check digit verification only tests whether a specific item number could exist. A validity check verifies that the item number really does exist in the master file.
A cold site is an appropriate strategy for disaster recovery for organizations that are willing to tolerate operating for several ________ without their ERP system and who are also willing to reenter or even lose several __________ worth of transactions. a)hours; hours b)days; days c)minutes; minutes d)minutes; hours e)minutes; days f)hours; days
b)days; days
Each night during the week an organization backs up just that day's transactions. This is referred to as making what kind of backup? a)archival b)incremental c)differential d)full
b)incremental
A turnaround document is an example of a(n) a)output control b)input control c)processing control d)none of these are correct
b)input control
Which of the following is an effective data entry control to ensure that overtime hours should be zero for someone who has not worked the maximum number of regular hours in a pay period? a)A limit check. b)A range check. c)A reasonableness check. d)A validity chec
c)A reasonableness check.
Which of the following processing controls can be used to achieve the objective of processing integrity? (Check all that apply.) a)Check digit verification b)Reconciliation procedures c)Write-protection mechanisms d)Recalculation of batch totals e)Validity check f)File labels g)Parity bits
c)Write-protection mechanisms d)Recalculation of batch totals f)File labels
A batch total that is computed by adding up the invoice numbers in a set of sales invoices is called a a)record count b)checksum c)hash total d)financial total
c)hash total
After a tornado destroys an organization's data center, the CIO turns to the __________ for instructions on how to recover. a)Backup Plan (BP) b)Business Continuity Plan (BCP) c)Incident Response Plan (IRP) d)Disaster Recovery Plan (DRP)
d)Disaster Recovery Plan (DRP)
Which of the following is designed to prevent an attacker from executing a buffer overflow attack by submitting lengthy attack code into the address field on a website form? a)limit check b)reasonableness test c)field check d)size check
d)size check