AIS FINAL - MBA 770 Accounting Information Systems Exam 2...

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
MBA 770 – Accounting Information Systems Exam 2 – Chapter 7 – 14 and 18 - 20 DELETE AFTER TEST IS DONE Yellow highlight – positive it’s correct Red highlight – unsure if it’s correct Multiple Choice 1. Preventive controls require two related functions, which are: a) Access and control b) Authentication and authorization p. 259 c) Detection and correction d) Physical access and logical access 2. Restricting access of users to specific portions of the system as well as specific tasks, is a) Authentication b) Authorization p. 259 c) Identification d) Threat monitoring 3. Which of the following is an example of a preventive control? a) Encryption p. 258 title and p. 271 subtitle b) Log analysis c) Intrusion detection d) Emergency response teams 4. Which of the following is an example of a detective control? a) Physical access controls b) Encryption c) Log analysis p. 277 d) Emergency response teams 5. Which of the following is an example of a corrective control? a) Physical access controls b) Encryption c) Intrusion detection d) Emergency response teams p. 258 6. A process that takes plaintext of any length and transforms it into a short code. a) Asymmetric encryption b) Encryption c) Hashing p. 273 d) Symmetric encryption
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
7. The goal of information systems controls is a) To ensure that systems objectives are met. b) To ensure that systems function c) To ensure that systems are reliable. p. 294 d) To ensure that data are confidential. 8. Sequentially pre-numbered forms is an example of. a) Data entry controls b) Data transmission controls c) Processing controls d) Source data controls 9. Input validation checks are an example of a) Data entry controls p. 301 b) Data transmission controls c) Output controls d) Source data controls 10. Parity checks are an example of a) Data entry controls b) Data transmission controls c) Output controls p. 304 d) Processing controls 11. Batch totals are an example of a) Data entry controls p. 302 b) Data transmission controls c) Output controls d) Processing controls 12. Check digit verification is an example of a) Data transmission controls b) Output controls c) Processing controls d) Source data controls KIDO FORGOT TO PUT THE REAL ANSWER – Data entry controls p. 301 13. ________ copies all changes made since the last full backup. a) Archive b) Backup c) Differential backup p. 311 d) Incremental backup
Background image of page 2
14. The three different types of internal audits commonly performed today are a) internal, external, defense contracting. b) financial, operational, information systems. p. 331 c) financial, operational, management. d) internal, external, public. 15. The __________ audit examines the reliability and integrity of accounting records. a)
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 05/16/2011 for the course MBA 770 taught by Professor Richardkido during the Spring '11 term at Chaminade University.

Page1 / 18

AIS FINAL - MBA 770 Accounting Information Systems Exam 2...

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online