Upload
ricky-dhaliwal
View
120
Download
2
Embed Size (px)
DESCRIPTION
Flashcards for audit final exam
Citation preview
All of the following individuals would likely beSDLC participants EXCEPT:
a. accountants.b. shareholders.c. management.d. programmers.e. all of the above.
2. The bill of lading is prepared by the: Shipping clerk
3.A chart of accounts would best be coded usinga(n) ______________ coding scheme.
Block
4.
A coding scheme in the form of acronyms andother combinations that convey meaning is a(n):
Mnemonic Code
5. A DDos attack:may take the form of either a SYN flood orsmurf attack
6. A digital signature:
is derived from the digest of a document thathas been encrypted with the sender's privatekey.
7.
A documentation tool that depicts the physical flow of information relating to a particular transaction through an organization is a:
System flowchart
8.A documentation tool used to represent the logical elements of a system is a(n):
Data flow diagram
9.A feasibility study for a new computer systemshould:
consider costs, savings, controls, profit improvement, and other benefits analyzed byapplication area.
10.
Hackers can disguise their message packets to look as if they came from an authorized user and gain access to the host's network using a technique called:
IP Spoofing
11. In the context of the TELOS acronym, technical feasibility refers to whether:
A proposed system is attainable, given the
existing technology.
12.
An integrated group of programs that supports the applications and facilitates their access to specified resources is called a(n)
Operating system
13. A message that is contrived to appear to be coming from a trusted or authorized source is called: a SYN-ACK packet
14. One-time costs of system development include all of the following EXCEPT: hardware maintenance
15. A ping signal is used to initiate: a smurf attack
16. The production subsystem of the conversion cycle includes all of the following EXCEPT
make or buy decisions on component parts
17.A program that attaches to another legitimateprogram but does NOT replicate itself iscalled a:
Trojan Horse
18. Real-time systems might be appropriate for all of the following EXCEPT: Payroll
19. Sequential access means that:
to read any record on the file, all of the pre-ceding records must first be read.
20. Sequential file processing will not permit: data to be edited on a real-time basis
21. Sniffer software is:
used by network administrators to analyzenetwork traffic
22.The TELOS acronym is often used for determining the need for system changes. Which of the following types of feasibility studies are elements of TELOS?
technical, operational, and economic
23.The TELOS study that determines whether aproject can be completed in an acceptable time frame is:
a schedule feasibility study.
24. Transmitting numerous SYN packets to a targeted receiver, but NOT responding to an ACK, is form of: Denial of service attack
25.
A user's application may consist of several modules stored in separate memory locations, each with its own data. One module must not be allowed to destroy or corrupt another module. This is an objective of:
Operating System Controls
26.
What name is given to the time value of money technique that discounts the after-tax cash flows for a project over its life to time period zero using the company's minimum desired rate of return?
Net Present Value
27. When will a credit check approval most likely require specific authorization by the credit department?
When a valid customer places a materially
large order
28. Which document is not prepared by the salesdepartment? Bill of lading
29. Which document triggers the update of the inventory subsidiary ledger? Stock release
30. Which file has as its primary purpose to provide historical financial data for comparative financial reports? General ledger history file
31. Which function or department below records the decrease in inventory due to a sale? Warehouse
32. Which function should not be performed by the billing department?
Recording the sales in the sales journal
33. Which of following functions should be segregated?Opening the mail and recording cash receiptsin the journal
34. Which of the following aspects of a cost-benefit study would have the greatest uncertainty as to its precise value? Intangible Benefits
35. Which of the following files is a temporary file? Transaction file
36. Which of the following is least likely to be anaccountant's role in the SDLC? Programmer
37. Which of the following is NOT a data communications control objective?
rendering useless any data that a perpetratorsuccessfully captures
38. Which of the following is NOT a one-time cost? Insurance
39. Which of the following is NOT a potentialexposure of the FRS?
unauthorized access to the check register
40. Which of the following is NOT a true statement?Transactions are recorded on source documents and are posted to journals
41. Which of the following is NOT an advantage of commercial software? Independence
42. Which of the following is NOT an advantage of real-time processing files over batch processing?
a. shorter transaction processing timeb. reduction of inventory stocksc. improved customer serviced. all are advantages
43. Which of the following is not an output control? The sales clerk uses pre-numbered sales orders
44. Which of the following is NOT true of a turn-around document?
They are documents used by internal partiesonly
45.Which of the following is true of the relationship between subsidiary ledgers and general ledger accounts?
The relationship between the two provides anaudit trail from the financial statements tothe source documents
46. Which of the following represents the correct 1. Recognize the problem
order in problem resolution?
2. Define the problem3. Specify system objectives4. Perform feasibility studies5. Prepare a project proposal.
47. Which of the following statements best describes a computer-based GL/FRS?
Batch processing is typically not appropriatefor transaction processing of GLS.
48. Which of the following statements is NOT true? Mnemonic coding requires the user to memorize codes.
49. Which of the following statements is true?
Journal vouchers summarizing transactionactivity flow from the accounting departmentinto the GLS, where they are independentlyreconciled and posted to the general ledgeraccounts.
50. Which of the following steps is NOT considered to be part of this systems survey?
Equipment sold by various computer manufacturers is reviewed in terms of capability,cost, and availability.
51. Which situation indicates a weak internal control structure?
the AR clerk authorizes the write off of baddebts
52. Which statement is not true?Manufacturing firms have a conversion cyclebut retail firms do not.
53. Which task should the general ledger perform? Update the general ledger
54. Which type of control is considered to be a compensating control? Supervision