Filters
Question type

Study Flashcards

What is data mining?


A) A particular attribute of information.
B) A common term for the representation of multidimensional data.
C) The process of analyzing data to extract of information that is not affected by the raw data alone.
D) None of the above is correct.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Parallel simulation uses an independent program to simulate a part of an existing application program,and is designed to test the validity and to verify the accuracy of an existing application program.

A) True
B) False

Correct Answer

verifed

verified

A wireless network is comprised access points and stations.Access points logically connect stations to a firm's network.

A) True
B) False

Correct Answer

verifed

verified

What are the general security objectives for both wired LANs and wireless LANs?

Correct Answer

verifed

verified

1)Confidentiality: Ensure that communica...

View Answer

The data in a data warehouse are updated when transactions are processed.

A) True
B) False

Correct Answer

verifed

verified

Common IT techniques that are needed to implement continuous auditing include


A) Data warehouse and data mining
B) Transaction logging and query tools
C) Computer-assisted audit techniques.
D) All of the above.

E) B) and C)
F) C) and D)

Correct Answer

verifed

verified

Which of the following is not an approach used for the online analytical processing (OLAP) .


A) Exception reports
B) What-if simulations
C) Consolidation
D) Data mining

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Which of the following statements about switches is correct?


A) Hub is smarter than Switch.
B) Switches provide more security protections than hubs do for a company's internal network.
C) Switch is widely used in WANs.
D) A Switch contains multiple ports.

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

Discuss five significant barriers that are often encountered in implementing continuous auditing?

Correct Answer

verifed

verified

1)Access to all relevant data in a timel...

View Answer

What are the two approaches of CAATs in auditing systems? What are the differences between them?

Correct Answer

verifed

verified

The two approaches are auditing around t...

View Answer

Which of the following is not a use of CAATs in auditing?


A) Test of details of transactions and balances
B) Analytical review procedures
C) Fraud examination
D) Produce terms and conditions of employment

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

Firewalls are security systems comprised of hardware and software that is built using routers,servers,and a variety of software.

A) True
B) False

Correct Answer

verifed

verified

Which of the following statements about firewalls is wrong?


A) A firewall is a security system comprised of hardware and software that is built using routers, servers, and a variety of software
B) A firewall allows individuals on the corporate network to send and receive data packets from the Internet
C) A firewall can filter through packets coming from outside networks to prevent unauthorized access
D) A firewall connects different LANs, software-based intelligent devices, examines IP addresses

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Integrated test facility (ITF)is an automated technique that enables test data to be continually evaluated during the normal operation of a system.

A) True
B) False

Correct Answer

verifed

verified

Which of the statements regarding the data warehouse is incorrect?


A) It is a centralized collection of firm-wide data
B) The purpose of a data warehouse is to provide a rich data set for management to identify patterns and to examine trends of business events
C) Includes data for the current fiscal year only
D) The data in a data warehouse is pulled from each of the operational databases periodically

E) B) and C)
F) C) and D)

Correct Answer

verifed

verified

Which of the following is not a management control for wireless networks?


A) Assigning roles and responsibilities of employees for access control
B) Conducting risk assessment on a regular basis
C) Conducting appropriate awareness training on wireless networks
D) Creating policies and procedures

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

The Generally Accepted Auditing Standards (GAAS)issued by PCAOB provide guidelines for conducting an IS/IT audit.

A) True
B) False

Correct Answer

verifed

verified

Which of the following is not a benefit of using wireless technology?


A) Mobility
B) Rapid deployment
C) Flexibility and Scalability
D) Security

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

Which of the following strategies will a CPA most likely consider in auditing an entity that processes most of its financial data only in electronic form,such as a paperless system?


A) Continuous monitoring and analysis of transaction processing with an embedded audit module.
B) Increased reliance on internal control activities that emphasize the segregation of duties.
C) Verification of encrypted digital certificates used to monitor the authorization of transactions.
D) Extensive testing of firewall boundaries that restrict the recording of outside network traffic.

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

Which of the following statements regarding the purposes of an operating system is correct?


A) To ensure the integrity of a system
B) To control the flow of multiprogramming and tasks of scheduling in the computer
C) To allocate computer resources to users and applications
D) All of the above are correct

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

Showing 21 - 40 of 48

Related Exams

Show Answer