AIS Exam 2 CPA questions

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/23

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

24 Terms

1
New cards

a. Data governance reduces innovation.

Which of the following statements inaccurately describes data governance?

  • a. Data governance reduces innovation.

  • b. It is difficult to measure the benefits of data governance.

  • c. Managing changes in organizational data workflows is complex and difficult.

  • d. The multiple and potentially conflicting demands of data ownership regulation is best addressed by a coordinated organizational approach.

2
New cards

d. Physical data model

The primary and foreign keys that are used in the database are examples of properties of the:

  • a. Master data.

  • b. Data classification.

  • c. Logical data model

  • d. Physical data model

3
New cards

d. Extrinsic

Which of the following is not one of the broad categories of information quality, according to the ISACA COBIT models (5 and 2019)?

  • a. Intrinsic

  • b. Contextual

  • c. Security and accessibility

  • d. Extrinsic

4
New cards

d. Unit of measurement

Chicken Lickin’ Good Manufacturing reports daily chicken production in kilograms (kg). This choice is best described as an example of:

  • a. Population

  • b. Sample

  • c. Records

  • d. Unit of measurement

5
New cards

c. Uncertainty

The confidence interval is a measure of:

  • a. Population density

  • b. Accuracy

  • c. Uncertainty

  • d. Risk

6
New cards

b. Data owner

It is most common for the ___________ to approve requests for access to new datasets.

  • a. Data custodian

  • b. Data owner

  • c. Chief risk officer

  • d. Data steward

7
New cards

b. A primary key

Which of the following terms is used to describe the unique attribute that identifies a specific record in a table?

  • a. A foreign key

  • b. A primary key

  • c. A secondary key

  • d. A schema

8
New cards

c. Normalized

Data stored in _____________ form minimizes data redundancy and is less prone to errors.

  • a. Proprietary

  • b. TSV

  • c. Normalized

  • d. PDF

9
New cards

a. Database management system (DBMS)

Which of the following components of a database is responsible for maintaining the referential integrity of the data in the system?

  • a. Database management system (DBMS)

  • b. Data query language (DQL).

  • c. Data manipulation language (DML).

  • d. Data definition language (DDL).

10
New cards

d. B and C

Database management software is considered:

  • a. Outerwear

  • b. Software

  • c. Middleware

  • d. B and C

11
New cards

c. Character, field, record, file.

What is the correct ascending hierarchy of data in a system?

  • a. Character, record, file, field.

  • b. Field, character, file, record.

  • c. Character, field, record, file.

  • d. Field, record, file, character.

12
New cards

b. data mining

Analysis of data in a database using tools which look for trends or anomalies without knowledge in advance of the meaning of the data is referred to as:

  • a. Artificial intelligence

  • b. Data mining

  • c. Virtual reality

  • d. Transitory analysis

13
New cards

a. Pattern recognition

Which of the following is a critical success factor in data mining a large data store?

  • a. Pattern recognition

  • b. Effective search engines

  • c. Image processing systems

  • d. Accurate universal resource locator (URL)

14
New cards

c. Sales data

Which of the following is least likely to be an example of big data?

  • a. Dark data

  • b. Multifactor identification data

  • c. Sales data

  • d. Video conferencing data

15
New cards

b. Have a strong governance structure.

Big data initiatives should:

  • a. Be independent of existing IT initiatives.

  • b. Have a strong governance structure.

  • c. Be a subset of the event response plan.

  • d. Be overseen by the internal audit department.

16
New cards

d. Production

after changes to a source program have been made and verified, it moves to:

  • a. Atlanta

  • b. Development

  • c. The operator

  • d. Production

17
New cards

d. Change control

A brokerage firm has changed a program so as to permit higher transaction volumes. After proper testing of the change, the revised programs were authorized and copied to the production library. This practice is an example of:

  • a. Prototyping

  • b. Program integration

  • c. SDLC (System Development Life Cycle)

  • d. Change control

18
New cards

d. Gantt charts

The most appropriate data-gathering techniques for a system survey include interviews, quick questionnaires, observations, and:

  • a. Prototypes

  • b. Systems documentation

  • c. PERT charts

  • d. Gantt charts

19
New cards

b. Identify data records.

In an accounting system, a header can be used to:

  • a. Help format a word processing document.

  • b. Identify data records.

  • c. Identify file folders.

  • d. All of the above.

20
New cards

a. Guide managers, users, and auditors to adopt best practices related to the management of information technology.

One important purpose of COBIT is to:

  • a. Guide managers, users, and auditors to adopt best practices related to the management of information technology.

  • b. Identify specific control plans that should be implemented to reduce the occurrences of fraud.

  • c. Specify the components of an information system that should be installed in an e-commerce environment.

  • d. Suggest the type of information that should be made available for management decision making.

21
New cards

b. Authentication

Major Tom's Ground Control Flight Services uses biometrics. The control goal of the use of biometrics is:

  • a. Accountability

  • b. Authentication

  • c. Authorization

  • d. Certification

22
New cards

c. Separates unauthorized individuals from computer resources.

Which of the following statements best characterizes the function of a physical access control?

  • a. Protects systems from the transmission of Trojan horses.

  • b. Provides authentication of users attempting to log in to the system.

  • c. Separates unauthorized individuals from computer resources.

  • d. Minimizes the risk of incurring a power or hardware failure.

23
New cards

d. "Network firewall" and "application firewall" are two different names for a program designed to prevent and detect unauthorized access to the system.

Which of the following statements about firewalls is NOT true?

  • a. Firewalls frequently include both a hardware component and a software component.

  • b. Firewalls screen data packets to determine if they are acceptable or unacceptable and block unacceptable packets from the system.

  • c. Application firewalls, in addition to monitoring data packets, control the execution of programs and examine the handling of data by specific applications.

24
New cards

b. Adequate physical layout space for the operating system.

When designing the physical layout of a data processing center, which of the following would be least likely to be a necessary control?

  • a. Design of controls to restrict access.

  • b. Adequate physical layout space for the operating system.

  • c. Inclusion of an adequate power supply system with surge protection.

  • d. Consideration of risks related to other uses of electricity in the area.