1. A local area network (LAN) is best described as a(n): a. Computer system that connects computers...

Question:

1. A local area network (LAN) is best described as a(n):
a. Computer system that connects computers of all sizes, workstations, terminals, and other devices within a limited proximity.
b. System that allows computer users to meet and share ideas and information.
c. Electronic library containing millions of items of data that can be reviewed, retrieved, and analyzed.
d. Method to offer specialized software, hardware, and data-handling techniques that improve effectiveness and reduce costs.


2. Which of the following network components is set up to serve as a security measure that prevents unauthorized traffic between different segments of the network?
a. Switch
b. Router
c. Firewall
d. Virtual local area networks (VLANs)


3. Unauthorized alteration of records in a database system would impair which of the following components of the CIA (related to security)?
a. Confidentiality
b. Integrity
c. Availability
d. Authorization


4. Which of the following is not a task performed by an operating system?
a. Translate high-level languages to machine-level language
b. Manage job scheduling and multi programming
c. Support applications and facilitate their access to specified resources
d. Provide controlled access to data and process data


5. Managers at a consumer products company purchased personal computer software from only recognized vendors and prohibited employees from installing non-authorized software on their personal computers by enforcing a new end-user computing policy. To minimize the likelihood of computer viruses infecting any of its systems, the company should also:
a. Restore infected systems with authorized versions.
b. Recompile infected programs from source code backups.
c. Institute program change control procedures.
d. Test all new software on a stand-alone personal computer.


6. Unauthorized alteration of records in a database system can be prevented by employing:
a. Key verification.
b. Computer matching.
c. Regular review of audit trails.
d. Database access controls.


7. An organization is planning to replace its wired networks with wireless networks. Which of the following approaches provides the most secure wireless network?
a. Implement wired equivalent privacy (WEP) protocol
b. Allow access to only authorized media access control (MAC) addresses
c. Disable the network interface card (NIC)
d. Implement wi-fi protected access (WPA2)


8. The vice president of human resources has requested an audit to identify payroll over-payments for the previous year. Which would be the best audit technique to use in this situation?
a. Test data
b. Generalized audit software
c. Integrated test facility
d. Embedded audit module


9. Which of following statements about CAATs is not correct?
a. Parallel simulation attempts to simulate or reproduce the firm’s actual processing results.
b. The test data technique uses a set of hypothetical transactions to examine the programmed checks and program logic in programs.
c. The integrated test facility is a programmed module or segment that is inserted into an application program to monitor and collect data based on daily transactions.
d. The embedded audit module may require the auditor to have a good working knowledge of computer programming and a solid understanding of IT risks that may exist in a system.


10. Which of the following audit techniques should an IS auditor use to detect duplicate invoice records within an invoice master file?
a. Test data
b. Generalized audit software
c. Integrated test facility
d. Embedded audit module

Fantastic news! We've Found the answer you've been seeking!

Step by Step Answer:

Related Book For  book-img-for-question

Accounting Information Systems

ISBN: 978-1260153156

2nd edition

Authors: Vernon Richardson, Chengyee Chang, Rod Smith

Question Posted: