The 'Acct 308 final exam' assesses knowledge in information security management, focusing on preventive controls, authentication methods, vulnerabilities, and encryption techniques. It prepares students for managing security in business environments.
Preventive controls
Detective controls
Corrective controls
Reactive controls
Rate this question:
Authorization
Authentication
Compatibility test
Intrusion detection
Rate this question:
Exploit
Patch
Vulnerability
Hash
Rate this question:
Hashing
Asymmetric encryption
Symmetric encryption
Key escrow
Rate this question:
Penetration testing
Patch management
Training
Log analysis
Rate this question:
Deep packet inspection
Static packet filtering
Stateful packet filtering
Deep packet filtering
Rate this question:
The sender encrypts a hash using the recipient's public key
The sender encrypts a hash using the sender's private key
The sender encrypts a hash using the recipient's public key
The sender encrypts a hash using the sender's public key
Rate this question:
Fingerprint reader
Compatibility test
Encryption
Log analysis
Rate this question:
Encryption
Patching
Hardening
War dialing
Rate this question:
Checkpoint
Restoration
RTO
RPO
Rate this question:
Field check
Limit check
Completeness check
Reasonableness check
Rate this question:
Encrypting data is sufficient to protect confidentiality and privacy
Cookies are text files that only store information and cannot do anything
A hot site is an empty facility that is prewired for telephone and Internet access
Verifying that a customer is of legal age to purchase alcohol is an example of a reasonableness test
Rate this question:
Sequence check
Field check
Completeness check
Validity check
Rate this question:
Financial total
Hash total
Record count
Part count
Rate this question:
Size check
Encryption
Cross-footing balance check
Forms design
Rate this question:
Reciprocal agreement
Hot site
Cold site
Real-time mirroring
Rate this question:
Full daily backup
Incremental daily backup
Differential daily backup
Complete daily backup
Rate this question:
Archive
Cookie
Checkpoint
Restoration
Rate this question:
Concurrent update controls are designed to facilitate restoration of backups
Use of a VPN protects the confidentiality of information while it is being transmitted over the Internet
Cross-footing balance tests are an effective method for detecting entry of invalid account numbers
"emergency" changes to information systems do not need to be formally approved and documented
Rate this question:
Setting customer credit limits
Preparing a bill of lading
Checking customer credit
Approving sales returns
Rate this question:
Picking ticket
Packing slip
Credit memo
Sales order
Rate this question:
Open-invoice method
Balance-forward method
Accounts receivable aging method
Cycle billing method
Rate this question:
EFT
VMI
FEDI
ACH
Rate this question:
Sales order entry
Shipping
Billing
Cash collections
Rate this question:
Accounts receivable aging schedule
Profitability analysis
Sales analysis
Cash budget
Rate this question:
Picking ticket
Packing slip
Shipping order
Sales invoice
Rate this question:
VMI
Lockboxes
Aging accounts receivable
EDINT
Rate this question:
Credit manager
Sales manager
Billing manager
Controller
Rate this question:
Billing
Accounts receivable
Cashier
Sales
Rate this question:
JIT
EOQ
MRP
ABC
Rate this question:
The vendor invoice with the receiving report
The purchase order with the receiving report
The vedor invoice with the purchase order
The vendor invoice, the receiving report, and the purchase order
Rate this question:
ERS systems use disbursement vouchers
Setting up petty cash as an imprest fund violates segregation of duties
The EOQ formula is used to identify the reorder point
The voucher package usually includes a debit memo
Vendor invoice
Purchase requisition
Purchase order
Disbursement voucher
Rate this question:
Bar-coding
EDI
Procurement cards
EFT
Rate this question:
Ordering goods
Approving vendor invoices
Receiving goods
Cash disbursements
Rate this question:
Segregate check-preparation and check signing functions
Prepare checks only for invoices that have been matched to receiving reports
Require two signatures on all checks above a certain limit
Cancel all supporting documents when the check is signed
Rate this question:
Cashier
Accounts payable
Purchasing agent
Controller
Rate this question:
Maintaining a list of approved suppliers and requiring all purchases to be made from suppliers on that list
Requiring purchasing agents to disclose any financial investments in potential suppliers
Requiring approval of all purchase orders
Prenumbering and periodically accounting for all purchase orders
Rate this question:
Receiving report
Credit memo
Debit memo
Purchase order
Rate this question:
Tables
Forms
Queries
Reports
All of the above
Rate this question:
Data entry
Data storage
Data retrieval
Two of the above are correct
Rate this question:
Data entry
Data storage
Data retrieval
Two of the above
None of the above
Rate this question:
Create a foreign key in one of the tables to link the two tables
Create a relation with no attributes of its own
Create a separate table with a concatenated primary key comprised of the primary keys from both entity tables
Many to many relationships cannot be represented in Access
Rate this question:
Text box
Combo box
Source box
None of the above
Rate this question:
Select query
Parameter query
Crosstab query
Action query
None of the above
Rate this question:
Locked=yes, enabled=no
Locked=yes, enabled=yes
Locked=no, enabled=yes
Locked=no, enabled=no
Rate this question:
We should implement all relationships, regardless of the maximim cardinalities, by posting the primary key of one entity into the other entity's table as a foreign key
We should implement a 1:1 (one to one) relationship with a separate table
We should implement a 1:N (one to many) relationship by posting the key of the many entity table into the one entity table
We should implement a 1:N (one to many) relationship by posting the key of the one entity table into the many entity table
Rate this question:
1:0
1:N
1:1
N:N
None of the above
Rate this question:
Quiz Review Timeline (Updated): Jun 24, 2024 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.