Controls Practice AIS – Flashcards

question
Modest Expectations Investment Services (MEIS) allows customers to manage their investments over the internet. If customers attempt to sell more shares of a stock than they have in their account, an error message is displayed. This is an example of a
answer
Reasonable Test
question
[blank] enables a system to continue functioning in the event that a particular component fails
answer
Fault Tolerance
question
All of the following controls for online entry of a sales would be used except
answer
check digit verification on the dollar amount of the order
question
Information technology managers are often in a bind when a new exploit is discovered in the wild. They can respond by updating the affected software or hardware with new code provided by the manufacturer, which runs the risk that a flaw in the update will break the system. Or they can wait until the new code has been extensively tested, but that runs the risk that they will be compromised by the exploit during the testing period. Dealing with these issues is referred to as
answer
Patch Management
question
The organization chart for Geerts Corporation includes a controller and an information processing manager, both of whom report to the vice president of finance. Which of the following would be a control weakness?
answer
Assigning the programming and operating of the computer system to an independent control group which reports to the controller.
question
A specific inventory record indicates that there were 12 items on hand before a customer brings two of the items to the check stand to be purchased. The cashier accidentally entered quantity 20 instead of 2. Which data entry would best have prevented this error?
answer
Sign check
question
Probably the most important change management control is
answer
Management's careful monitoring and review
question
According to the Sarbanes-Oxley Act of 2002, the audit committee of the board of directors is directly responsible for
answer
hiring and firing external auditors
question
In recent years, many of the attacks carried out by hackers have relied on this type of vulnerability in computer software
answer
Buffer overflow
question
Which of the following is the most effective method of protecting against social engineering attacks on a computer system?
answer
employee awareness training
question
Forms design is an example of this type of control
answer
Input control
question
One of the objectives of the segregation of duties is to
answer
Make sure that different people handle different parts of the same transaction
question
The most common input-related vulnerability is
answer
Buffer overflow attack
question
File labels are an example of
answer
processing controls
question
Encryption has a remarkably long and varied history. The invention of writing was apparently soon followed by a desire to conceal messages. One of the earliest methods, attributed to an ancient Roman emperor, was the simple substation of numbers for letters, for example A=1 B=2, etc. This is an example of
answer
Symmetric key encryption
question
Which of the following is not an objective of a disaster recovery plan?
answer
Permanently establish an alternative means of processing information.
question
Which of the following is a control related to design and use of documents and records?
answer
sequentially renumbering sales invoices
question
This data entry control compares the ID number in the transaction data to a master file to verify that the ID number exists.
answer
Validity Check
question
Which item below would not typically be part of an adequate disaster recovery plan?
answer
A system upgrade due to operating system software changes.
question
The COSO enterprise risk management integrated framework stresses that
answer
risk management activities are an inherent part of all business operations and should be considered during strategy setting.
question
One way to circumvent the counterfeit of public keys is by using
answer
A digital certificate
question
Reducing management layers, creating self-directed work teams, and emphasizing continuous improvement are all related to which aspect of internal environment?
answer
Organizational Structure
question
According to the Trust Services Framework, the reliability principle of integrity is achieved when the system produces data that
answer
Is complete, accurate, and valid
question
A customer failed to include her account number on her check, and the accounts receivable clerk credited her payment to a different customer with the same last name. Which control could have been used to most effectively prevent this error?
answer
Closed-loop verification
question
Restricting access of users to specific portions of the system as well as specific tasks, is
answer
Authorization
question
Which component of the COSO enterprise Risk Management Integrated Framework is concerned with understanding how transactions are initiated, data are captured and processed, and information is reported?
answer
Information and communication
question
An Access control matrix
answer
is a table specifying which portions of the system users are permitted to access
question
Turnaround documents are an example of a(n)
answer
Input Control
question
The Trust Services Framework reliability principle that states that users must be able to enter, update, and retrieve data during agreed-upon times is known as
answer
Availability
question
On March 3, 2008, a laptop computer belonging to Folding Squid Technology was stolen from the trunk of Jiao Jan's car while he was attending a conference in Cleveland, Ohio. After reporting the theft, Jiao considered the implications of the theft for the company's network security and concluded there was nothing to worry about because
answer
The data stored on the computer was encrypted
question
A computer operator accidentally used the wrong master file when updating a transaction file. As a result, the master file data is now unreadable. Which control could best have prevented this from happening?
answer
Internal Header Label
question
Which of the following descriptions is not associated with symmetric encryption?
answer
Lack of Authentication
question
It was 9:08 A.M. when Jiao Jan, the Network Administrator for Folding Squid Technologies, was informed that the intrusion detection system had identified an ongoing attempt to breach network security. By the time that Jiao had identified and blocked the attack, the hacker had accessed an downloaded several files from the company's server. Using the notation for that time-based model of security in this case
answer
D > P
question
Chuck Hewitt was relaxing after work with a colleague at a local watering hole. Well into his second martini, he began expressing his opinions about his work environment. It seems that, as a result of "feminazi" interference, the suggestive banter that had been prevalent in the workplace during his youth was no longer acceptable. He even had to sit through a sexual harassment workshop! The level of control that the company is using in this case is a
answer
Boundary System
question
The data entry control that would best prevent entering an invoice received from a vendor who is not on an authorized supplier list is
answer
A validity check
question
A process that takes plaintext of any length and transforms into a short code
answer
Hashing
question
This batch processing data entry control sums a field that contains dollar values.
answer
Financial Total
question
Which of the following is not a requirement of effective passwords?
answer
Passwords should be no more than 8 characters in length.
question
There are "white hat" hackers and "black hat" hackers. Cowboy451 was one of the "black hat" hackers. He had researched an exploit and determined that he could penetrate the target system, download a file containing valuable data, and cover his tracks in eight minutes. Six minutes into the attack he was locked out of the system. Using the notation of the time-based model of security, which of the following must be true?
answer
P > 6
question
The accounting department at Synergy Hydroelectric records an average of 12,500 transactions per hour. By cost-benefit analysis, managers have concluded that the maximum acceptable loss of data in the event of a system failure is 25,000 transactions. If the firm's recovery time objective is 120 minutes, then the worst case recovery time objective is
answer
4 hours
question
Multi-factor authentication methods
answer
involves the use of two or more basis authentication methods
question
This determines if characters are of the proper type
answer
Field Check
question
This control entails verifying that the proper number of bits are set to the value 1 in each character received.
answer
Parity Check
question
Go-Go Corporation, a publicly traded company, has three brothers who serve as President, Vice President of Finance and CEO. This situation
answer
increases the risk associated with an audit
question
________ controls are designed to make sure an organization's control environment is stable and well managed.
answer
General
question
Which of the following is an independent check on performance?
answer
The General Manager compares budgeted amounts with expenditure records from all departments.
question
This determines if all required data items have been entered.
answer
Completeness Check
question
This protocol specifies the procedures for dividing files and documents into packets to be sent over the Internet.
answer
Transmission control protocol
question
Generally in a risk assessment process, the first step is to
answer
Identify the threats the company currently faces
question
Change management refers to
answer
controls designed to ensure that updates in information technology do not have negative consequences.
question
Parity checks are an example of a(n)
answer
data transmission control.
question
The Director of Information Technology for the city of Bumpkiss, Minnesota, formed a company to sell computer supplies and software. All purchases made on behalf of the City were made from his company. He was later charged with fraud for overcharging the City, but was not convicted. The control issue in this case arose because the Director had both ________ and ________ duties.
answer
recording; auhtorization
question
On February 14, 2008, students enrolled in an economics course at Swingline College received an email stating that class would be cancelled. The email claimed to be from the professor, but it wasn't. Computer forensic experts determined that the email was sent from a computer in one of the campus labs at 9:14 A.M. They were then able to uniquely identify the computer that was used by means of its network interface card's ________ address. Security cameras revealed the identity of the student responsible for spoofing the class.
answer
MAC
question
A special purpose hardware device or software running on a general purpose computer, which filters information that is allowed to enter and leave the organization's information system, is known as a(n)
answer
firewall
question
Safeguarding assets is one of the control objectives of internal control. Which of the following is not one of the other control objectives?
answer
ensuring that no fraud has occured
question
The system and processes used to issue and manage asymmetric keys and digital certificates are known as
answer
public key infrastructure.
question
According to the ERM, these help the company address all applicable laws and regulations.
answer
Compliance Objectives
question
This batch processing data entry control sums a non-financial numeric field.
answer
Hash total
question
Information encrypted with the creator's private key that is used to authenticate the sender is
answer
digital signature.
question
The maximum amount of time between backups is determined by a company's
answer
recovery point objective.
question
Which attribute below is not an aspect of the COSO ERM Framework internal environment?
answer
Restricting access to assets
question
The security technology that evaluates IP packet traffic patterns in order to identify attacks against a system is known as
answer
n intrusion prevention system.
question
A facility that contains all the computing equipment the organization needs to perform its essential business activities is known as a
answer
hot site
question
This batch processing data entry control sums the number of items in a batch.
answer
record count
question
When new employees are hired by Folding Squid Technologies, they are assigned user names and passwords and provided with laptop computers that have an integrated fingerprint reader. In order to log in, the user's fingerprint must be recognized by the reader. This is an example of a(an)
answer
biometric device.
question
Which of the following is not a reason for the increase in security problems for AIS?
answer
Increasing efficiency resulting from more automation
question
Sequentially prenumbered forms is an example of a(n)
answer
input control
question
The process of turning off unnecessary features in the system is known as
answer
hardening
question
The Spontaneous Combustion Rocket Shoppe in downtown Fargo, North Dakota, generates three quarters of its revenue from orders taken over the Internet. The revenue clearing account is debited by the total of cash and credit receipts and credited by the total of storefront and Internet sales. This is an example of a
answer
Zero-balance test
question
Which of the following suggests a weakness in a company's internal environment?
answer
Formal employee performance evaluations are prepared every three years.
question
Which of the following is not a violation of the Sarbanes-Oxley Act (SOX)? The management at Folding Squid Technologies
answer
hired the manager from the external audit team as company CFO twelve months after the manager had worked on the audit.
question
The process that a business uses to safeguard assets, provide accurate and reliable information, and promote and improve operational efficiency is known as
answer
internal control
question
Which of the following describes one weakness of encryption?
answer
Encrypted packets cannot be examined by a firewall.
question
An electronic document that certifies the identity of the owner of a particular public key.
answer
Digital Certificate
question
Which of the following is not one of the three important factors determining the strength of any encryption system?
answer
Privacy
question
Internal control is often referred to as a(n) ________, because it permeates an organization's operating activities and is an integral part of management activities.
answer
process
question
This creates logs of network traffic that was permitted to pass the firewall.
answer
Intrusion detection system
question
Which of the following preventive controls are necessary to provide adequate security for social engineering threats?
answer
Awareness Training
question
A facility that is pre-wired for necessary telecommunications and computer equipment, but doesn't have equipment installed, is known as a
answer
cold site
question
All employees of E.C. Hoxy are required to pass through a gate and present their photo identification cards to the guard before they are admitted. Entry to secure areas, such as the Information Technology Department offices, requires further procedures. This is an example of a(an)
answer
physical access control.
question
Which of the following is not one of the three fundamental information security concepts?
answer
nformation security is a technology issue based on prevention.
question
The SEC and FASB are best described as external influences that directly affect an organization's
answer
nternal environment.
question
This control framework's intent includes helping the organization to provide reasonable assurance that objectives are achieved and problems are minimized, and to avoid adverse publicity and damage to the organization's reputation.
answer
COSO's enterprise risk management framework
question
Perimeter defense is an example of which of the following preventive controls that are necessary to provide adequate security?
answer
Controlling remote access
question
A validity check is an example of a(n)
answer
data entry control.
question
Encryption has a remarkably long and varied history. Spies have been using it to convey secret messages ever since there were secret messages to convey. One powerful method of encryption uses random digits. Two documents are prepared with the same random sequence of numbers. The spy is sent out with one and the spy master retains the other. The digits are used as follows. Suppose that the word to be encrypted is SPY and the random digits are 352. Then S becomes V (three letters after S), P becomes U (five letters after P), and Y becomes A (two letters after Y, restarting at A after Z). The spy would encrypt a message and then destroy the document used to encrypt it. This is an early example of
answer
symmetric key encryption.
question
In a private key system the sender and the receiver have ________, and in the public key system they have ________.
answer
the same key; two separate keys
question
Which of the following would be considered a "red flag" for problems with management operating style if the question were answered "yes"?
answer
All of these statements would raise "red flags" if answered "yes."
question
A well-known hacker started his own computer security consulting business shortly after being released from prison. Many companies pay him to attempt to gain unauthorized access to their network. If he is successful, he offers advice as to how to design and implement better controls. What is the name of the testing for which the hacker is being paid?
answer
Penetration test
question
A data entry input control in which the application software sums the first four digits of a customer number to calculate the value of the fifth digit and then compares the calculated number to the number typed in during data entry is an example of a
answer
check digit verification.
question
This ensures that the input data will fit into the assigned field.
answer
Size check
question
The process that screens individual IP packets based solely on the contents of the source and/or destination fields in the packet header is known as
answer
static packet filtering.
question
These are used to create digital signatures.
answer
Asymmetric encryption and hashing
question
At a movie theater box office, all tickets are sequentially prenumbered. At the end of each day, the beginning ticket number is subtracted from the ending number to calculate the number of tickets sold. Cash is counted and compared with the number of tickets sold. Which of the following situations does this control detect?
answer
The box office cashier accidentally gives too much change to a customer.
question
Jeff Davis took a call from a client. "Jeff, I need for my customers to make payments online using credit cards, but I want to make sure that the credit card data isn't intercepted. What do you suggest?" Jeff responded "The best solution will be to implement
answer
an encryption system with digital signatures."
question
Duplicate checking of calculations is an example of a ________ control, and procedures to resubmit rejected transactions is an example of a ________ control.
answer
detective; corrective
question
Which of the following is not a useful control procedure to control access to system outputs?
answer
Allowing visitors to move through the building without supervision
question
Cancellation and storage of documents means that
answer
documents are defaced and stored.
question
Using a combination of symmetric and asymmetric key encryption, Chris Kai sent a report to her home office in Syracuse, New York. She received an email acknowledgement that the document had been received and then, a few minutes later, she received a second email that indicated that the hash calculated from the report differed from that sent with the report. This most likely explanation for this result is that
answer
the symmetric encryption key had been compromised.
question
Which of the following is not one of the 10 internationally recognized best practices for protecting the privacy of customers' personal information?
answer
Providing free credit report monitoring for customers
question
Meaningful Discussions is a social networking site that boasts over a million registered users and a quarterly membership growth rate in the double digits. As a consequence, the size of the information technology department has been growing very rapidly, with many new hires. Each employee is provided with a name badge with a photo and embedded computer chip that is used to gain entry to the facility. This is an example of a(an)
answer
authentication control.
question
A(n) ________ measures company progress by comparing actual performance to planned performance.
answer
diagnostic control system
question
Asymmetric key encryption combined with the information provided by a certificate authority allows unique identification of
answer
either the user or the provider of encrypted data.
question
According to the ERM, high level goals that are aligned with and support the company's mission are
answer
strategic objectives.
question
Concerning system availability, which of the following statements is true ?
answer
Threats to system availability include hardware and software failures as well as natural and man-made disasters.
question
Error logs and review are an example of
answer
data entry controls.
question
The Sarbanes-Oxley Act (SOX) applies to
answer
all publicly held companies.
question
Which of the following statements about internal environment is false ?
answer
Management's attitudes toward internal control and ethical behavior have only minimal impact on employee beliefs or actions.
question
According to the ERM, these objectives help ensure the accuracy, completeness and reliability of internal and external company reports.
answer
Reporting objectives
question
Concerning virtual private networks (VPN), which of the following is not true?
answer
t is more expensive to reconfigure VPNs to include new sites than it is to add or remove the corresponding physical connections in a privately owned network.
question
________ involves copying only the data items that have changed since the last partial backup.
answer
Incremental backup
question
Batch totals are an example of a(n)
answer
data entry control.
question
The most effective way to protect network resources, like email servers, that are outside of the network and are exposed to the Internet is
answer
a demilitarized zone.
question
The COSO Enterprise Risk Management Integrated Framework identifies four objectives necessary to achieve corporate goals. Objectives specifically identified include all of the following except
answer
implementation of newest technologies.
question
Check digit verification is an example of a(n)
answer
input control.
question
The risk that remains after management implements internal controls is
answer
Residual risk
question
What is not a corrective control procedure?
answer
Deter problems before they arise.
question
Murray Snitzel called a meeting of the top management at Snitzel Capital Management. Number one on the agenda was computer system security. "The risk of security breach incidents has become unacceptable," he said, and turned to the Chief Information Officer. "This is your responsibility! What do you intend to do?" Which of the following is the best answer?
answer
Evaluate and modify the system using the Trust Services framework
question
In developing policies related to personal information about customers, Folding Squid Technologies adhered to the Trust Services framework. The standard applicable to these policies is
answer
privacy
question
The COSO Enterprise Risk Management Framework includes eight components. Which of the following is not one of them?
answer
compliance with federal, state, or local laws
question
Which of the following is an example of a preventive control?
answer
Encryption
question
Compatibility tests utilize a(n) ________, which is a list of authorized users, programs, and data files the users are authorized to access or manipulate.
answer
access control matrix
question
This is used to identify rogue modems (or by hackers to identify targets).
answer
War dialing
question
If the time an attacker takes to break through the organization's preventive controls is greater than the sum of the time required to detect the attack and the time required to respond to the attack, then security is
answer
effective.
question
What is the most effective way to ensure information system availability?
answer
Maintain a hot site
question
the ________ disseminates information about fraud, errors, breaches and other improper system uses and their consequences.
answer
chief security officer
question
When a computer system's files are automatically duplicated on a second data storage system as they are changed, the process is referred to as
answer
real-time mirroring.
question
Which of the following is an example of a corrective control?
answer
Incident response teams
question
When new employees are hired by Folding Squid Technologies, they are assigned user names and appropriate permissions are entered into the information system's access control matrix. This is an example of a(an)
answer
authorization control.
question
This is an authorized attempt by an internal audit team or an external security consultant to attempt to break into the organization's information system.
answer
Penetration test
question
These systems use the same key to encrypt and to decrypt.
answer
Symmetric encryption
question
Which of the following is not one of the important aspects of the Sarbanes-Oxley Act?
answer
New rules for information systems development
question
According to the COSO Enterprise Risk Management Framework, the risk assessment process incorporates all of the following components except
answer
reporting potential risks to auditors.
question
River Rafting Adventures of Iowa provides rafts and tour guides to tourists eager to ride the wild rivers of Iowa. Management has determined that there is one chance in a thousand of a client being injured or killed. Settlement of resulting lawsuits has an average cost of $650,000. Insurance with a $50,000 deductible is available. It covers the costs of lawsuits, unless there is evidence of criminal negligence. What is the impact of this risk without insurance?
answer
$650,000
question
Verifying the identity of the person or device attempting to access the system is
answer
authentication.
question
While this type of backup process takes longer than the alternative, restoration is easier and faster.
answer
Differential backup
question
Which of the following is not associated with asymmetric encryption?
answer
Speed
question
The process that maintains a table that lists all established connections between the organization's computers and the Internet, to determine whether an incoming packet is part of an ongoing communication initiated by an internal computer is known as
answer
stateful packet filtering.
question
A copy of a database, master file, or software that will be retained indefinitely as a historical record is known as a(n)
answer
archive.
question
The process that allows a firewall to be more effective by examining the data in the body of an IP packet, instead of just the header, is known as
answer
deep packet inspection.
question
According to the ERM, these deal with the effectiveness and efficiency of company operations, such as performance and profitability goals.
answer
Operations objectives
question
eff Davis took a call from a client. "Jeff, I need to interact online and real time with our affiliate in India, and I want to make sure that our communications aren't intercepted. What do you suggest?" Jeff responded "The best solution will be to implement
answer
a virtual private network."
1 of

Unlock all answers in this set

Unlock answers
question
Modest Expectations Investment Services (MEIS) allows customers to manage their investments over the internet. If customers attempt to sell more shares of a stock than they have in their account, an error message is displayed. This is an example of a
answer
Reasonable Test
question
[blank] enables a system to continue functioning in the event that a particular component fails
answer
Fault Tolerance
question
All of the following controls for online entry of a sales would be used except
answer
check digit verification on the dollar amount of the order
question
Information technology managers are often in a bind when a new exploit is discovered in the wild. They can respond by updating the affected software or hardware with new code provided by the manufacturer, which runs the risk that a flaw in the update will break the system. Or they can wait until the new code has been extensively tested, but that runs the risk that they will be compromised by the exploit during the testing period. Dealing with these issues is referred to as
answer
Patch Management
question
The organization chart for Geerts Corporation includes a controller and an information processing manager, both of whom report to the vice president of finance. Which of the following would be a control weakness?
answer
Assigning the programming and operating of the computer system to an independent control group which reports to the controller.
question
A specific inventory record indicates that there were 12 items on hand before a customer brings two of the items to the check stand to be purchased. The cashier accidentally entered quantity 20 instead of 2. Which data entry would best have prevented this error?
answer
Sign check
question
Probably the most important change management control is
answer
Management's careful monitoring and review
question
According to the Sarbanes-Oxley Act of 2002, the audit committee of the board of directors is directly responsible for
answer
hiring and firing external auditors
question
In recent years, many of the attacks carried out by hackers have relied on this type of vulnerability in computer software
answer
Buffer overflow
question
Which of the following is the most effective method of protecting against social engineering attacks on a computer system?
answer
employee awareness training
question
Forms design is an example of this type of control
answer
Input control
question
One of the objectives of the segregation of duties is to
answer
Make sure that different people handle different parts of the same transaction
question
The most common input-related vulnerability is
answer
Buffer overflow attack
question
File labels are an example of
answer
processing controls
question
Encryption has a remarkably long and varied history. The invention of writing was apparently soon followed by a desire to conceal messages. One of the earliest methods, attributed to an ancient Roman emperor, was the simple substation of numbers for letters, for example A=1 B=2, etc. This is an example of
answer
Symmetric key encryption
question
Which of the following is not an objective of a disaster recovery plan?
answer
Permanently establish an alternative means of processing information.
question
Which of the following is a control related to design and use of documents and records?
answer
sequentially renumbering sales invoices
question
This data entry control compares the ID number in the transaction data to a master file to verify that the ID number exists.
answer
Validity Check
question
Which item below would not typically be part of an adequate disaster recovery plan?
answer
A system upgrade due to operating system software changes.
question
The COSO enterprise risk management integrated framework stresses that
answer
risk management activities are an inherent part of all business operations and should be considered during strategy setting.
question
One way to circumvent the counterfeit of public keys is by using
answer
A digital certificate
question
Reducing management layers, creating self-directed work teams, and emphasizing continuous improvement are all related to which aspect of internal environment?
answer
Organizational Structure
question
According to the Trust Services Framework, the reliability principle of integrity is achieved when the system produces data that
answer
Is complete, accurate, and valid
question
A customer failed to include her account number on her check, and the accounts receivable clerk credited her payment to a different customer with the same last name. Which control could have been used to most effectively prevent this error?
answer
Closed-loop verification
question
Restricting access of users to specific portions of the system as well as specific tasks, is
answer
Authorization
question
Which component of the COSO enterprise Risk Management Integrated Framework is concerned with understanding how transactions are initiated, data are captured and processed, and information is reported?
answer
Information and communication
question
An Access control matrix
answer
is a table specifying which portions of the system users are permitted to access
question
Turnaround documents are an example of a(n)
answer
Input Control
question
The Trust Services Framework reliability principle that states that users must be able to enter, update, and retrieve data during agreed-upon times is known as
answer
Availability
question
On March 3, 2008, a laptop computer belonging to Folding Squid Technology was stolen from the trunk of Jiao Jan's car while he was attending a conference in Cleveland, Ohio. After reporting the theft, Jiao considered the implications of the theft for the company's network security and concluded there was nothing to worry about because
answer
The data stored on the computer was encrypted
question
A computer operator accidentally used the wrong master file when updating a transaction file. As a result, the master file data is now unreadable. Which control could best have prevented this from happening?
answer
Internal Header Label
question
Which of the following descriptions is not associated with symmetric encryption?
answer
Lack of Authentication
question
It was 9:08 A.M. when Jiao Jan, the Network Administrator for Folding Squid Technologies, was informed that the intrusion detection system had identified an ongoing attempt to breach network security. By the time that Jiao had identified and blocked the attack, the hacker had accessed an downloaded several files from the company's server. Using the notation for that time-based model of security in this case
answer
D > P
question
Chuck Hewitt was relaxing after work with a colleague at a local watering hole. Well into his second martini, he began expressing his opinions about his work environment. It seems that, as a result of "feminazi" interference, the suggestive banter that had been prevalent in the workplace during his youth was no longer acceptable. He even had to sit through a sexual harassment workshop! The level of control that the company is using in this case is a
answer
Boundary System
question
The data entry control that would best prevent entering an invoice received from a vendor who is not on an authorized supplier list is
answer
A validity check
question
A process that takes plaintext of any length and transforms into a short code
answer
Hashing
question
This batch processing data entry control sums a field that contains dollar values.
answer
Financial Total
question
Which of the following is not a requirement of effective passwords?
answer
Passwords should be no more than 8 characters in length.
question
There are "white hat" hackers and "black hat" hackers. Cowboy451 was one of the "black hat" hackers. He had researched an exploit and determined that he could penetrate the target system, download a file containing valuable data, and cover his tracks in eight minutes. Six minutes into the attack he was locked out of the system. Using the notation of the time-based model of security, which of the following must be true?
answer
P > 6
question
The accounting department at Synergy Hydroelectric records an average of 12,500 transactions per hour. By cost-benefit analysis, managers have concluded that the maximum acceptable loss of data in the event of a system failure is 25,000 transactions. If the firm's recovery time objective is 120 minutes, then the worst case recovery time objective is
answer
4 hours
question
Multi-factor authentication methods
answer
involves the use of two or more basis authentication methods
question
This determines if characters are of the proper type
answer
Field Check
question
This control entails verifying that the proper number of bits are set to the value 1 in each character received.
answer
Parity Check
question
Go-Go Corporation, a publicly traded company, has three brothers who serve as President, Vice President of Finance and CEO. This situation
answer
increases the risk associated with an audit
question
________ controls are designed to make sure an organization's control environment is stable and well managed.
answer
General
question
Which of the following is an independent check on performance?
answer
The General Manager compares budgeted amounts with expenditure records from all departments.
question
This determines if all required data items have been entered.
answer
Completeness Check
question
This protocol specifies the procedures for dividing files and documents into packets to be sent over the Internet.
answer
Transmission control protocol
question
Generally in a risk assessment process, the first step is to
answer
Identify the threats the company currently faces
question
Change management refers to
answer
controls designed to ensure that updates in information technology do not have negative consequences.
question
Parity checks are an example of a(n)
answer
data transmission control.
question
The Director of Information Technology for the city of Bumpkiss, Minnesota, formed a company to sell computer supplies and software. All purchases made on behalf of the City were made from his company. He was later charged with fraud for overcharging the City, but was not convicted. The control issue in this case arose because the Director had both ________ and ________ duties.
answer
recording; auhtorization
question
On February 14, 2008, students enrolled in an economics course at Swingline College received an email stating that class would be cancelled. The email claimed to be from the professor, but it wasn't. Computer forensic experts determined that the email was sent from a computer in one of the campus labs at 9:14 A.M. They were then able to uniquely identify the computer that was used by means of its network interface card's ________ address. Security cameras revealed the identity of the student responsible for spoofing the class.
answer
MAC
question
A special purpose hardware device or software running on a general purpose computer, which filters information that is allowed to enter and leave the organization's information system, is known as a(n)
answer
firewall
question
Safeguarding assets is one of the control objectives of internal control. Which of the following is not one of the other control objectives?
answer
ensuring that no fraud has occured
question
The system and processes used to issue and manage asymmetric keys and digital certificates are known as
answer
public key infrastructure.
question
According to the ERM, these help the company address all applicable laws and regulations.
answer
Compliance Objectives
question
This batch processing data entry control sums a non-financial numeric field.
answer
Hash total
question
Information encrypted with the creator's private key that is used to authenticate the sender is
answer
digital signature.
question
The maximum amount of time between backups is determined by a company's
answer
recovery point objective.
question
Which attribute below is not an aspect of the COSO ERM Framework internal environment?
answer
Restricting access to assets
question
The security technology that evaluates IP packet traffic patterns in order to identify attacks against a system is known as
answer
n intrusion prevention system.
question
A facility that contains all the computing equipment the organization needs to perform its essential business activities is known as a
answer
hot site
question
This batch processing data entry control sums the number of items in a batch.
answer
record count
question
When new employees are hired by Folding Squid Technologies, they are assigned user names and passwords and provided with laptop computers that have an integrated fingerprint reader. In order to log in, the user's fingerprint must be recognized by the reader. This is an example of a(an)
answer
biometric device.
question
Which of the following is not a reason for the increase in security problems for AIS?
answer
Increasing efficiency resulting from more automation
question
Sequentially prenumbered forms is an example of a(n)
answer
input control
question
The process of turning off unnecessary features in the system is known as
answer
hardening
question
The Spontaneous Combustion Rocket Shoppe in downtown Fargo, North Dakota, generates three quarters of its revenue from orders taken over the Internet. The revenue clearing account is debited by the total of cash and credit receipts and credited by the total of storefront and Internet sales. This is an example of a
answer
Zero-balance test
question
Which of the following suggests a weakness in a company's internal environment?
answer
Formal employee performance evaluations are prepared every three years.
question
Which of the following is not a violation of the Sarbanes-Oxley Act (SOX)? The management at Folding Squid Technologies
answer
hired the manager from the external audit team as company CFO twelve months after the manager had worked on the audit.
question
The process that a business uses to safeguard assets, provide accurate and reliable information, and promote and improve operational efficiency is known as
answer
internal control
question
Which of the following describes one weakness of encryption?
answer
Encrypted packets cannot be examined by a firewall.
question
An electronic document that certifies the identity of the owner of a particular public key.
answer
Digital Certificate
question
Which of the following is not one of the three important factors determining the strength of any encryption system?
answer
Privacy
question
Internal control is often referred to as a(n) ________, because it permeates an organization's operating activities and is an integral part of management activities.
answer
process
question
This creates logs of network traffic that was permitted to pass the firewall.
answer
Intrusion detection system
question
Which of the following preventive controls are necessary to provide adequate security for social engineering threats?
answer
Awareness Training
question
A facility that is pre-wired for necessary telecommunications and computer equipment, but doesn't have equipment installed, is known as a
answer
cold site
question
All employees of E.C. Hoxy are required to pass through a gate and present their photo identification cards to the guard before they are admitted. Entry to secure areas, such as the Information Technology Department offices, requires further procedures. This is an example of a(an)
answer
physical access control.
question
Which of the following is not one of the three fundamental information security concepts?
answer
nformation security is a technology issue based on prevention.
question
The SEC and FASB are best described as external influences that directly affect an organization's
answer
nternal environment.
question
This control framework's intent includes helping the organization to provide reasonable assurance that objectives are achieved and problems are minimized, and to avoid adverse publicity and damage to the organization's reputation.
answer
COSO's enterprise risk management framework
question
Perimeter defense is an example of which of the following preventive controls that are necessary to provide adequate security?
answer
Controlling remote access
question
A validity check is an example of a(n)
answer
data entry control.
question
Encryption has a remarkably long and varied history. Spies have been using it to convey secret messages ever since there were secret messages to convey. One powerful method of encryption uses random digits. Two documents are prepared with the same random sequence of numbers. The spy is sent out with one and the spy master retains the other. The digits are used as follows. Suppose that the word to be encrypted is SPY and the random digits are 352. Then S becomes V (three letters after S), P becomes U (five letters after P), and Y becomes A (two letters after Y, restarting at A after Z). The spy would encrypt a message and then destroy the document used to encrypt it. This is an early example of
answer
symmetric key encryption.
question
In a private key system the sender and the receiver have ________, and in the public key system they have ________.
answer
the same key; two separate keys
question
Which of the following would be considered a "red flag" for problems with management operating style if the question were answered "yes"?
answer
All of these statements would raise "red flags" if answered "yes."
question
A well-known hacker started his own computer security consulting business shortly after being released from prison. Many companies pay him to attempt to gain unauthorized access to their network. If he is successful, he offers advice as to how to design and implement better controls. What is the name of the testing for which the hacker is being paid?
answer
Penetration test
question
A data entry input control in which the application software sums the first four digits of a customer number to calculate the value of the fifth digit and then compares the calculated number to the number typed in during data entry is an example of a
answer
check digit verification.
question
This ensures that the input data will fit into the assigned field.
answer
Size check
question
The process that screens individual IP packets based solely on the contents of the source and/or destination fields in the packet header is known as
answer
static packet filtering.
question
These are used to create digital signatures.
answer
Asymmetric encryption and hashing
question
At a movie theater box office, all tickets are sequentially prenumbered. At the end of each day, the beginning ticket number is subtracted from the ending number to calculate the number of tickets sold. Cash is counted and compared with the number of tickets sold. Which of the following situations does this control detect?
answer
The box office cashier accidentally gives too much change to a customer.
question
Jeff Davis took a call from a client. "Jeff, I need for my customers to make payments online using credit cards, but I want to make sure that the credit card data isn't intercepted. What do you suggest?" Jeff responded "The best solution will be to implement
answer
an encryption system with digital signatures."
question
Duplicate checking of calculations is an example of a ________ control, and procedures to resubmit rejected transactions is an example of a ________ control.
answer
detective; corrective
question
Which of the following is not a useful control procedure to control access to system outputs?
answer
Allowing visitors to move through the building without supervision
question
Cancellation and storage of documents means that
answer
documents are defaced and stored.
question
Using a combination of symmetric and asymmetric key encryption, Chris Kai sent a report to her home office in Syracuse, New York. She received an email acknowledgement that the document had been received and then, a few minutes later, she received a second email that indicated that the hash calculated from the report differed from that sent with the report. This most likely explanation for this result is that
answer
the symmetric encryption key had been compromised.
question
Which of the following is not one of the 10 internationally recognized best practices for protecting the privacy of customers' personal information?
answer
Providing free credit report monitoring for customers
question
Meaningful Discussions is a social networking site that boasts over a million registered users and a quarterly membership growth rate in the double digits. As a consequence, the size of the information technology department has been growing very rapidly, with many new hires. Each employee is provided with a name badge with a photo and embedded computer chip that is used to gain entry to the facility. This is an example of a(an)
answer
authentication control.
question
A(n) ________ measures company progress by comparing actual performance to planned performance.
answer
diagnostic control system
question
Asymmetric key encryption combined with the information provided by a certificate authority allows unique identification of
answer
either the user or the provider of encrypted data.
question
According to the ERM, high level goals that are aligned with and support the company's mission are
answer
strategic objectives.
question
Concerning system availability, which of the following statements is true ?
answer
Threats to system availability include hardware and software failures as well as natural and man-made disasters.
question
Error logs and review are an example of
answer
data entry controls.
question
The Sarbanes-Oxley Act (SOX) applies to
answer
all publicly held companies.
question
Which of the following statements about internal environment is false ?
answer
Management's attitudes toward internal control and ethical behavior have only minimal impact on employee beliefs or actions.
question
According to the ERM, these objectives help ensure the accuracy, completeness and reliability of internal and external company reports.
answer
Reporting objectives
question
Concerning virtual private networks (VPN), which of the following is not true?
answer
t is more expensive to reconfigure VPNs to include new sites than it is to add or remove the corresponding physical connections in a privately owned network.
question
________ involves copying only the data items that have changed since the last partial backup.
answer
Incremental backup
question
Batch totals are an example of a(n)
answer
data entry control.
question
The most effective way to protect network resources, like email servers, that are outside of the network and are exposed to the Internet is
answer
a demilitarized zone.
question
The COSO Enterprise Risk Management Integrated Framework identifies four objectives necessary to achieve corporate goals. Objectives specifically identified include all of the following except
answer
implementation of newest technologies.
question
Check digit verification is an example of a(n)
answer
input control.
question
The risk that remains after management implements internal controls is
answer
Residual risk
question
What is not a corrective control procedure?
answer
Deter problems before they arise.
question
Murray Snitzel called a meeting of the top management at Snitzel Capital Management. Number one on the agenda was computer system security. "The risk of security breach incidents has become unacceptable," he said, and turned to the Chief Information Officer. "This is your responsibility! What do you intend to do?" Which of the following is the best answer?
answer
Evaluate and modify the system using the Trust Services framework
question
In developing policies related to personal information about customers, Folding Squid Technologies adhered to the Trust Services framework. The standard applicable to these policies is
answer
privacy
question
The COSO Enterprise Risk Management Framework includes eight components. Which of the following is not one of them?
answer
compliance with federal, state, or local laws
question
Which of the following is an example of a preventive control?
answer
Encryption
question
Compatibility tests utilize a(n) ________, which is a list of authorized users, programs, and data files the users are authorized to access or manipulate.
answer
access control matrix
question
This is used to identify rogue modems (or by hackers to identify targets).
answer
War dialing
question
If the time an attacker takes to break through the organization's preventive controls is greater than the sum of the time required to detect the attack and the time required to respond to the attack, then security is
answer
effective.
question
What is the most effective way to ensure information system availability?
answer
Maintain a hot site
question
the ________ disseminates information about fraud, errors, breaches and other improper system uses and their consequences.
answer
chief security officer
question
When a computer system's files are automatically duplicated on a second data storage system as they are changed, the process is referred to as
answer
real-time mirroring.
question
Which of the following is an example of a corrective control?
answer
Incident response teams
question
When new employees are hired by Folding Squid Technologies, they are assigned user names and appropriate permissions are entered into the information system's access control matrix. This is an example of a(an)
answer
authorization control.
question
This is an authorized attempt by an internal audit team or an external security consultant to attempt to break into the organization's information system.
answer
Penetration test
question
These systems use the same key to encrypt and to decrypt.
answer
Symmetric encryption
question
Which of the following is not one of the important aspects of the Sarbanes-Oxley Act?
answer
New rules for information systems development
question
According to the COSO Enterprise Risk Management Framework, the risk assessment process incorporates all of the following components except
answer
reporting potential risks to auditors.
question
River Rafting Adventures of Iowa provides rafts and tour guides to tourists eager to ride the wild rivers of Iowa. Management has determined that there is one chance in a thousand of a client being injured or killed. Settlement of resulting lawsuits has an average cost of $650,000. Insurance with a $50,000 deductible is available. It covers the costs of lawsuits, unless there is evidence of criminal negligence. What is the impact of this risk without insurance?
answer
$650,000
question
Verifying the identity of the person or device attempting to access the system is
answer
authentication.
question
While this type of backup process takes longer than the alternative, restoration is easier and faster.
answer
Differential backup
question
Which of the following is not associated with asymmetric encryption?
answer
Speed
question
The process that maintains a table that lists all established connections between the organization's computers and the Internet, to determine whether an incoming packet is part of an ongoing communication initiated by an internal computer is known as
answer
stateful packet filtering.
question
A copy of a database, master file, or software that will be retained indefinitely as a historical record is known as a(n)
answer
archive.
question
The process that allows a firewall to be more effective by examining the data in the body of an IP packet, instead of just the header, is known as
answer
deep packet inspection.
question
According to the ERM, these deal with the effectiveness and efficiency of company operations, such as performance and profitability goals.
answer
Operations objectives
question
eff Davis took a call from a client. "Jeff, I need to interact online and real time with our affiliate in India, and I want to make sure that our communications aren't intercepted. What do you suggest?" Jeff responded "The best solution will be to implement
answer
a virtual private network."
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New