100% found this document useful (1 vote)
203 views12 pages

ACT430 Mid 2 Fall 2020

1. The document contains questions about databases, information security, auditing, and internal controls. 2. It tests knowledge on topics like database components, types of databases commonly used by organizations, database management systems, security risks and vulnerabilities, computer-assisted audit techniques, and components of internal control systems. 3. The responses provide answers and explanations for multiple choice questions covering these subject areas.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
203 views12 pages

ACT430 Mid 2 Fall 2020

1. The document contains questions about databases, information security, auditing, and internal controls. 2. It tests knowledge on topics like database components, types of databases commonly used by organizations, database management systems, security risks and vulnerabilities, computer-assisted audit techniques, and components of internal control systems. 3. The responses provide answers and explanations for multiple choice questions covering these subject areas.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 12

 

1. The following are component of database except

2/2

meta data
indexes
reports
 
user data

 
2. Amazon uses what kind of database
0/2

single
 
multiple
data mining
ecommerce

Correct answer
ecommerce

 
3. The true relational database `
2/2

r:base
 
oracle dbms
IDBMS
Python

 
4. SQL stands for what
2/2

Structured Query Language


 

Correct answer

structured query language


 
5. Whta's not considered to be a job of DBMS?
4/4

creating forms
 
processing forms
creating databse
processing data

 
6. ERP is what kind of database
0/2

Single
 
multiple
ecommerce
data mining

Correct answer
multiple

 
7. Which of the following is not considered to be a enterprise-class database
system?
2/2

users
database applications
dbms
cobol
 
 
8. The most difficult database in the world is
2/2

Oracle
 
DB2
Access
Sql server
 
9 A databse is called self-describing
2/2

yes
 
no
neutal

 
10. Database applications are seldom intended to use by single user
2/2

True
False
 
Option 3

 
11. A study found ___% of inspected computers were infected with spyware.
each machine containing on average 93 spyware or adware components.
2/2

70
50
60
80
 
 
12. Clandestine use of someone's W-Fi network is
2/2

Piggybacking
 
Podlsurping
Phreaking
Superzapping

 
13. Zombies on a __________ used an automated SQL injection attack to
compromise over ____________ websites last year, stealing sensitive
information and injecting malware into the site.
4/4

botnet, 200000
podslurping, 500,000
botnet, 500000
 
superzap, 500,000

 
14. Taking control of a phone to make calls, or read text messages is
____________
2/2

Bluebugging
 
Superzapping
Phising
Bluesnarfing

 
15. __________ is stealing contact lists, images, and other data using
Bluetooth.
2/2

Bluebugging
Bluesnarfing
 
Bluebugging
Bluezapping

 
16. Stealing tiny slices of money over time is _____________>
2/2

Scavenging
Salami
 
Spoofing
Skimming

 
17. Watching or listening to people disclose confidential data is called
_________________.
2/2

Sexting
Shoulder surfing
 
Shoulder skimming
Shoulder bot

 
18. Hacker create __________________ with links to websites they own to
increase their Google Pagerank.
0/5

Blogs
Spam
Splogs
 
Blogs and Spams

Correct answer
Splogs
Blogs and Spams

 
19. ______________________ is a vulnerability in dynamic web pages that
allows an attacker to bypass a browser's security mechanisms and instruct
the victim's browser to execute the code, thinking it came from the desired
website.
2/2

XSSS
BSS
XSS
 
XNS

 
20. ___________________ is using the Internet to pump up the price of a
stock and then selling it.
3/4

Pump-and-Dump
 

Correct answer

Internet pump-and-dump fraud

 
21. Which of the following audit data analytic techniques would most likely be
used to compare information from different sources, such as invoices,
purchase orders, and shipping documents, to detect errors or other
unanticipated variances?
2/2

Sorting.
Matching.
 
Trend analysis.
Ratio analysis.

 
22. Which of the following is a computer-assisted audit technique that
permits an auditor to insert the auditor's version of a client's program to
process data and compare the output with the client's output?
2/2

Test data module.


Frame relay protocol.
Remote node router.
Parallel simulation.
 
 
23. An employee wants to create a fake employee identification number as
part of a fraud scheme. Which of the following controls would be most likely
to prevent the employee from creating the fake identification number?
2/2

Controls over management override


Reconciliation of control totals
Reconciliation of the bank account used for payroll
Self-checking digits
 
 
24.Which of the following statements is not true of the test data approach
when testing a computerized accounting system?
2/2

The test need consist of only those valid and invalid conditions which interest the auditor.
Only one transaction of each type need be tested.
The test data must consist of all possible valid and invalid conditions.
 
Test data are processed by the client’s computer programs under the auditor’s control.

 
25. Which of the following procedures would an entity most likely include in
its disaster recovery plan?
2/2

Convert all data from EDI format to an internal company format.


Maintain a trojan horse program to prevent illicit activity.
Develop an auxiliary power supply to provide uninterrupted electricity.
Store duplicate copies of files in a location away from the computer center.
 
 
26. Which of the following computer-assisted auditing techniques processes
client input data on a controlled program under the auditor’s control to test
controls in the computer system?
0/2
Test data.
Integrated test facility.
 
Parallel simulation.

Correct answer
Parallel simulation.

 
27. An auditor is performing an audit data analytic as a risk assessment
procedure for all active sales divisions. The auditor determined that the
results of the analysis were significantly different from the expected results
because the data included a discontinued division for which other risk
assessment procedures had already been planned. The auditor should
0/2

Exclude the discontinued operation and reperform the analytic procedures.


Raise the risk of material misstatement for the discontinued division.
Include additional audit procedures related to the discontinued division.
 
Obtain an explanation from the client about the significant difference

Correct answer
Exclude the discontinued operation and reperform the analytic procedures.

 
28. Which of the following is a professional engagement that a CPA may
perform to provide assurance on a system's reliability?
2/2

MAS AssurAbility.
CPA WebMaster.
MAS AttestSure.
CPA SysTrust
 
 
29. Which of the following outcomes is a likely benefit of information
technology used for internal control?
2/2

Processing of unusual or nonrecurring transactions.


Enhanced timeliness of information.
 
Potential loss of data.
Recording of unauthorized transactions.

 
30. Which of the following constitutes a potential risk associated with the use
of information technology in an entity's internal control structure?
2/2

A reduction in the ability to monitor the entity's activities.


The facilitation of additional analyses.
A reduction in the circumvention of controls.
Unauthorized changes to systems.
 
 
31. Which of the following is not a component of an entity’s internal control?
2/2

Control risk.
 
Control activities.
Monitoring.
Control environment

 
32. Which of the following factors would most likely be considered an
inherent limitation to an entity's internal control?
2/2

The complexity of the information processing system.


Human judgment in the decision making process.
 
The ineffectiveness of the board of directors.
The lack of management incentives to improve the control environment.

 
34. Risk assessment and segregation is a component of internal contro.
2/2

True
False
 
 
35. Which of the following represents an inherent limitation in a system of
internal controls?
2/2

An accountant who both approves and posts journal entries.


An accountant posting a transaction to the incorrect account.
 
A board of directors that does not meet regularly.
An internal audit function that lacks enough personnel

 
36. Which of the following components of internal control would be
considered the foundation for the other components?
2/2

Information and communication.


Risk assessment.
Control environment.
 
Control activities

 
37. The ______________ provides pictorial representation of given problem.
(one word)
2/2

Flowchart
 
 
38. The ___________ symbol is used at the beginning of a flow chart.
3/3
Circle
 

Correct answer

circle

 
39. The ______________ symbol is used to represent decision in a
flowchart.
4/4

Diamond
 

Correct answer

diamond

 
40. The _________________ is used to represent process in a flow chart.
4/4

Rectangle
 

Correct answer

rectangle

 
41. The _________________ is used to represent input and output in a flow
chart.
4/4

Parallelogram
 
 
42. The ____________ is a symbol used connects two symbols of flowchart.
4/4

Arrow
 

Correct answer

arrow

You might also like