Question: CHOOSE THE CORRECT ANSWER (NO NEED TO EXPLAIN) 1. A data warehouse a. stores transaction processing records in hard copy b. replaces traditional transaction processing
CHOOSE THE CORRECT ANSWER (NO NEED TO EXPLAIN)
1. A data warehouse
a.
stores transaction processing records in hard copy
b.
replaces traditional transaction processing databases
c.
increases the speed of transaction processing.
d.
is primarily used for analysis rather than transaction processing.
2. An IT auditor examined weblogs that tracked every time a person tried to log in to the company website. The IT auditor noticed a very long list of attempted login attempts for the same username but using different passwords from the same IP address. The IT auditor is likely seeing a person try to do which of the following?
a.
Password cracking
b.
Hijacking
c.
Spamming
d.
Phishing
3. Illegally obtaining and using confidential information about a person for economic gain is known as:
a.
eavesdropping
b.
scavenging
c.
identity theft
d.
cyber-extortion
4. Misappropriation of assets is a fraudulent act that involves
a.
misrepresenting facts to promote an investment
b.
using computer technology to perpetrate a crime
c.
theft of company property.
d.
dishonest conduct by those in power
5. Consider the following revenue cycle scenario: The company has been exposed to customer dissatisfaction and the suggested control procedure to be implemented is to install and use bar-code scanners. What is the threat?
a.
The company may be shipping orders to the wrong address
b.
All of the above threats may apply to this scenario
c.
The company may be shipping the wrong quantities of merchandise
d.
The company may be shipping the wrong merchandise
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
