Acct 308 Final Exam

50 Questions | Total Attempts: 43

SettingsSettingsSettings
Act Quizzes & Trivia

Questions and Answers
  • 1. 
    Which of the following statments is true?
    • A. 

      The concept of defense-in-depth reflects the fact that security involves the use of a few, sophisticated technical controls.

    • B. 

      Information security is primarily a management issue

    • C. 

      The time based model of security can be expressed in the following formula: P

    • D. 

      Symmetric encryption is slower than asymmetric encryption

  • 2. 
    Firewalls are an example of
    • A. 

      Preventive controls

    • B. 

      Detective controls

    • C. 

      Corrective controls

    • D. 

      Reactive controls

  • 3. 
    The control procedure designed to verify a user's identity is called
    • A. 

      Authorization

    • B. 

      Authentication

    • C. 

      Compatibility test

    • D. 

      Intrusion detection

  • 4. 
    A weakness that an attacker can take advantage of to either disable or take control of a system is called a(n)
    • A. 

      Exploit

    • B. 

      Patch

    • C. 

      Vulnerability

    • D. 

      Hash

  • 5. 
    Which of the following techniques involves the creation and use of a pair of public and private keys?
    • A. 

      Hashing

    • B. 

      Asymmetric encryption

    • C. 

      Symmetric encryption

    • D. 

      Key escrow

  • 6. 
    Which of the following is a preventive control?
    • A. 

      Penetration testing

    • B. 

      Patch management

    • C. 

      Training

    • D. 

      Log analysis

  • 7. 
    The approach to perimeter defense that involves examining only information in the packet header of each individual IP packet is referred to as
    • A. 

      Deep packet inspection

    • B. 

      Static packet filtering

    • C. 

      Stateful packet filtering

    • D. 

      Deep packet filtering

  • 8. 
    In order to create a digital signature
    • A. 

      The sender encrypts a hash using the recipient's public key

    • B. 

      The sender encrypts a hash using the sender's private key

    • C. 

      The sender encrypts a hash using the recipient's public key

    • D. 

      The sender encrypts a hash using the sender's public key

  • 9. 
    Which of the following in an authorization control?
    • A. 

      Fingerprint reader

    • B. 

      Compatibility test

    • C. 

      Encryption

    • D. 

      Log analysis

  • 10. 
    Modifying default configurations to improve security is called
    • A. 

      Encryption

    • B. 

      Patching

    • C. 

      Hardening

    • D. 

      War dialing

  • 11. 
    Which of the following measures the potential amount of data that might be lost due to a system disaster?
    • A. 

      Checkpoint

    • B. 

      Restoration

    • C. 

      RTO

    • D. 

      RPO

  • 12. 
    Which data entry application control would detect and prevent entry of alphabetic characters as the price of an item in the inventory master file?
    • A. 

      Field check

    • B. 

      Limit check

    • C. 

      Completeness check

    • D. 

      Reasonableness check

  • 13. 
    Which of the following statments is true?
    • A. 

      Encrypting data is sufficient to protect confidentiality and privacy

    • B. 

      Cookies are text files that only store information and cannot do anything

    • C. 

      A hot site is an empty facility that is prewired for telephone and Internet access

    • D. 

      Verifying that a customer is of legal age to purchase alcohol is an example of a reasonableness test

  • 14. 
    Which of the following is designed to identify entry of a nonexistent customer account number?
    • A. 

      Sequence check

    • B. 

      Field check

    • C. 

      Completeness check

    • D. 

      Validity check

  • 15. 
    A batch total that is calculated by summing the part numbers sold in a batch of 50 sales invoices is called a
    • A. 

      Financial total

    • B. 

      Hash total

    • C. 

      Record count

    • D. 

      Part count

  • 16. 
    Which of the following is an example of an output control?
    • A. 

      Size check

    • B. 

      Encryption

    • C. 

      Cross-footing balance check

    • D. 

      Forms design

  • 17. 
    Which infrastructure replacement option involves puchasing or leasing a physical site, prewiring it for telephone and Internet access, and contracting with one or more vendors to have computers and other equipment delivered to the site within 12-24 hours?
    • A. 

      Reciprocal agreement

    • B. 

      Hot site

    • C. 

      Cold site

    • D. 

      Real-time mirroring

  • 18. 
    Which backup method is the fastest?
    • A. 

      Full daily backup

    • B. 

      Incremental daily backup

    • C. 

      Differential daily backup

    • D. 

      Complete daily backup

  • 19. 
    A copy of the state of a database at a specific point in time during the middle of a normal business day is called a(n)?
    • A. 

      Archive

    • B. 

      Cookie

    • C. 

      Checkpoint

    • D. 

      Restoration

  • 20. 
    Which of the following statments is true?
    • A. 

      Concurrent update controls are designed to facilitate restoration of backups

    • B. 

      Use of a VPN protects the confidentiality of information while it is being transmitted over the Internet

    • C. 

      Cross-footing balance tests are an effective method for detecting entry of invalid account numbers

    • D. 

      "emergency" changes to information systems do not need to be formally approved and documented

  • 21. 
    Which activity is part of the sales order entry process?
    • A. 

      Setting customer credit limits

    • B. 

      Preparing a bill of lading

    • C. 

      Checking customer credit

    • D. 

      Approving sales returns

  • 22. 
    Which document often accompanies merchandise shipped to a customer?
    • A. 

      Picking ticket

    • B. 

      Packing slip

    • C. 

      Credit memo

    • D. 

      Sales order

  • 23. 
    Which method is most likely used when a company offers customers discounts for prompt payment?
    • A. 

      Open-invoice method

    • B. 

      Balance-forward method

    • C. 

      Accounts receivable aging method

    • D. 

      Cycle billing method

  • 24. 
    Which of the following techniques is the most efficient way to process customer payments and update accounts receivable?
    • A. 

      EFT

    • B. 

      VMI

    • C. 

      FEDI

    • D. 

      ACH

  • 25. 
    Which of the following revenue cycle activities can potentially be eliminated by technology?
    • A. 

      Sales order entry

    • B. 

      Shipping

    • C. 

      Billing

    • D. 

      Cash collections

Back to Top Back to top