7
All of the following individuals would likely be SDLC participant s EXCEPT: a. accountant s. b. shareholde rs. c. management . d. programmer s. e. all of the above. 2. The bill of lading is prepared by the: Shipping clerk 3. A chart of accounts would best be coded using a(n) ______________ coding scheme. Block 4. A coding scheme in the form of acronyms and other combinations that convey meaning is a(n): Mnemonic Code 5. A DDos attack: may take the form of either a SYN flood or smurf attack 6. A digital signature: is derived from the digest of a document that has been encrypted with the sender's private key. 7. A documentation tool that depicts the physical flow System flowchart

It Audit Final Exam

Embed Size (px)

DESCRIPTION

Flashcards for audit final exam

Citation preview

Page 1: It Audit Final Exam

All of the following individuals would likely beSDLC participants EXCEPT:

a. accountants.b. shareholders.c. management.d. programmers.e. all of the above.

2. The bill of lading is prepared by the: Shipping clerk

3.A chart of accounts would best be coded usinga(n) ______________ coding scheme.

Block

4.

A coding scheme in the form of acronyms andother combinations that convey meaning is a(n):

Mnemonic Code

5. A DDos attack:may take the form of either a SYN flood orsmurf attack

6. A digital signature:

is derived from the digest of a document thathas been encrypted with the sender's privatekey.

7.

A documentation tool that depicts the physical flow of information relating to a particular transaction through an organization is a:

System flowchart

8.A documentation tool used to represent the logical elements of a system is a(n):

Data flow diagram

9.A feasibility study for a new computer systemshould:

consider costs, savings, controls, profit improvement, and other benefits analyzed byapplication area.

10.

Hackers can disguise their message packets to look as if they came from an authorized user and gain access to the host's network using a technique called:

IP Spoofing

11. In the context of the TELOS acronym, technical feasibility refers to whether:

A proposed system is attainable, given the

Page 2: It Audit Final Exam

existing technology.

12.

An integrated group of programs that supports the applications and facilitates their access to specified resources is called a(n)

Operating system

13. A message that is contrived to appear to be coming from a trusted or authorized source is called: a SYN-ACK packet

14. One-time costs of system development include all of the following EXCEPT: hardware maintenance

15. A ping signal is used to initiate: a smurf attack

16. The production subsystem of the conversion cycle includes all of the following EXCEPT

make or buy decisions on component parts

17.A program that attaches to another legitimateprogram but does NOT replicate itself iscalled a:

Trojan Horse

18. Real-time systems might be appropriate for all of the following EXCEPT: Payroll

19. Sequential access means that:

to read any record on the file, all of the pre-ceding records must first be read.

20. Sequential file processing will not permit: data to be edited on a real-time basis

21. Sniffer software is:

used by network administrators to analyzenetwork traffic

22.The TELOS acronym is often used for determining the need for system changes. Which of the following types of feasibility studies are elements of TELOS?

technical, operational, and economic

23.The TELOS study that determines whether aproject can be completed in an acceptable time frame is:

a schedule feasibility study.

24. Transmitting numerous SYN packets to a targeted receiver, but NOT responding to an ACK, is form of: Denial of service attack

25.

A user's application may consist of several modules stored in separate memory locations, each with its own data. One module must not be allowed to destroy or corrupt another module. This is an objective of:

Operating System Controls

26.

What name is given to the time value of money technique that discounts the after-tax cash flows for a project over its life to time period zero using the company's minimum desired rate of return?

Net Present Value

27. When will a credit check approval most likely require specific authorization by the credit department?

When a valid customer places a materially

Page 3: It Audit Final Exam

large order

28. Which document is not prepared by the salesdepartment? Bill of lading

29. Which document triggers the update of the inventory subsidiary ledger? Stock release

30. Which file has as its primary purpose to provide historical financial data for comparative financial reports? General ledger history file

31. Which function or department below records the decrease in inventory due to a sale? Warehouse

32. Which function should not be performed by the billing department?

Recording the sales in the sales journal

33. Which of following functions should be segregated?Opening the mail and recording cash receiptsin the journal

34. Which of the following aspects of a cost-benefit study would have the greatest uncertainty as to its precise value? Intangible Benefits

35. Which of the following files is a temporary file? Transaction file

36. Which of the following is least likely to be anaccountant's role in the SDLC? Programmer

37. Which of the following is NOT a data communications control objective?

rendering useless any data that a perpetratorsuccessfully captures

38. Which of the following is NOT a one-time cost? Insurance

39. Which of the following is NOT a potentialexposure of the FRS?

unauthorized access to the check register

40. Which of the following is NOT a true statement?Transactions are recorded on source documents and are posted to journals

41. Which of the following is NOT an advantage of commercial software? Independence

42. Which of the following is NOT an advantage of real-time processing files over batch processing?

a. shorter transaction processing timeb. reduction of inventory stocksc. improved customer serviced. all are advantages

43. Which of the following is not an output control? The sales clerk uses pre-numbered sales orders

44. Which of the following is NOT true of a turn-around document?

They are documents used by internal partiesonly

45.Which of the following is true of the relationship between subsidiary ledgers and general ledger accounts?

The relationship between the two provides anaudit trail from the financial statements tothe source documents

46. Which of the following represents the correct 1. Recognize the problem

Page 4: It Audit Final Exam

order in problem resolution?

2. Define the problem3. Specify system objectives4. Perform feasibility studies5. Prepare a project proposal.

47. Which of the following statements best describes a computer-based GL/FRS?

Batch processing is typically not appropriatefor transaction processing of GLS.

48. Which of the following statements is NOT true? Mnemonic coding requires the user to memorize codes.

49. Which of the following statements is true?

Journal vouchers summarizing transactionactivity flow from the accounting departmentinto the GLS, where they are independentlyreconciled and posted to the general ledgeraccounts.

50. Which of the following steps is NOT considered to be part of this systems survey?

Equipment sold by various computer manufacturers is reviewed in terms of capability,cost, and availability.

51. Which situation indicates a weak internal control structure?

the AR clerk authorizes the write off of baddebts

52. Which statement is not true?Manufacturing firms have a conversion cyclebut retail firms do not.

53. Which task should the general ledger perform? Update the general ledger

54. Which type of control is considered to be a compensating control? Supervision