SlideShare a Scribd company logo
1 of 7
ACC 564 Final Exam Part 1
NEW Spring 2016
buy here
http://onlinehelpstudy.com/exam_te
xt.php?cat=16083
www.onlinehelpstudy.com
Immediate access to
solutions for ENTIRE
COURSES,
FINAL EXAMS and
HOMEWORKS
“RATED A+" - Without
Registration!
Times Purchased: 15
Rated: A+
ACC 564 Final Exam Part 1 NEW Spring 2016
Question 1 .4 out of 4 points
An accounting information system (AIS) processes ________ to provide users with ________.
Question 2 .4 out of 4 points
Paid time-off policies, job descriptions, and procedures manuals are examples of information needed to support key
decisions in what business process?
Question 3 .4 out of 4 points
Which of the following is a primary activity in the value chain?
Question 4 .4 out of 4 points
A change in the AIS that makes information more easily accessible and widely available within an organization is most
likely to first influence the
Question 5 .4 out of 4 points
A frantic Stro Frinzel called the home office from Des Moines. "You have got to help me. I am about to close a great sale,
but I have to be able to guarantee delivery by the fourteenth. I can't get through to the company Web site to verify
delivery!" "Thank you for calling. Your call is very important to us. However, all of our lines are currently in use. Please
try again later." Which of the following characteristics of useful information is absent in the situation described above?
Question 6 .4 out of 4 points
The coding technique most likely used for sales orders is called a
Question 7 .4 out of 4 points
The quality assurance department at a large manufacturing business enters data into the AIS that is used to produce a
weekly report that summarizes the proportion of defective units in each product line. This is an example of
Question 8 .4 out of 4 points
A specialized journal
Question 9 .4 out of 4 points
Data must be collected about three facets of each business activity. What are they?
Question 10 .4 out of 4 points
A specialized journal would be most likely to be used to enter
Question 11 .4 out of 4 points
The Union Soup Kitchen is a non-profit organization that collects, stores, prepares and provides food to the homeless in
Erie, Pennsylvania. Donations of food are recorded in a database and a receipt is provided to the donor. When food is used,
the database is updated so that it always reflects the amounts and types of food that are available. In a data flow diagram,
which type of symbol would be used to represent the flow of data from the donor into the system?
Question 12 .4 out of 4 points
A flowchart that depicts the relationships among the input, processing, and output of an AIS is
Question 13 .4 out of 4 points
In a data flow diagram of the customer payment process, "Customer payment" will appear above or in
Question 14 .4 out of 4 points
In general, a data destination will be shown by
Question 15 .4 out of 4 points
In preparing a DFD, when data are transformed through a process, the symbol used should be
Question 16 .4 out of 4 points
When the human resources manager wants to gather data about vacation and personal day usage by employees and by
departments, the manager would use which language?
Question 17 .4 out of 4 points
The potential inconsistency that could occur when there are multiple occurrences of a specific data item in a database is
called the
Question 18 .4 out of 4 points
The schema that provides an organization-wide view of the entire database is known as the
Question 19 .4 out of 4 points
The database requirement that foreign keys must be null or have a value corresponding to the value of a primary key in
another table is formally called the
Question 20 .4 out of 4 points
In a relational database, requiring that every record in a table have a unique identifier is called the
Question 21 .4 out of 4 points
Which of the following is an opportunity that could contribute to employee fraud?
Question 22 .4 out of 4 points
Which of the following is the greatest risk to information systems and causes the greatest dollar losses?
Question 23 .4 out of 4 points
One fraudulent scheme covers up a theft by creating cash through the transfer of money between banks. This is known as
Question 24 .4 out of 4 points
Most frauds are detected by
Question 25 .4 out of 4 points
The most efficient way to conceal asset misappropriation is to
Question 26 .4 out of 4 points
A fraud technique that slices off tiny amounts from many projects is called the ________ technique.
Question 27 .4 out of 4 points
Computer fraud perpetrators that modify programs during systems development, allowing access into the system that
bypasses normal system controls are using
Question 28 .4 out of 4 points
A fraud technique that allows a perpetrator to bypass normal system controls and enter a secured system is called
Question 29 .4 out of 4 points
Computer fraud perpetrators who use telephone lines to commit fraud and other illegal acts are typically called
Question 30 .4 out of 4 points
A ________ is similar to a ________, except that it is a program rather than a code segment hidden in a host program.
Question 31 .4 out of 4 points
________ controls prevent, detect and correct transaction errors and fraud.
Question 32 .4 out of 4 points
According to the ERM, these objectives help ensure the accuracy, completeness and reliability of internal and external
company reports.
Question 33 .4 out of 4 points
Generally in a risk assessment process, the first step is to
Question 34 .4 out of 4 points
The process that a business uses to safeguard assets, provide accurate and reliable information, and promote and improve
operational efficiency is known as
Question 35 .4 out of 4 points
According to the ERM, these help the company address all applicable laws and regulations.
Question 36 .4 out of 4 points
Which of the following is an example of a corrective control?
Question 37 .4 out of 4 points
The process of turning off unnecessary features in the system is known as
Question 38 .4 out of 4 points
The process that screens individual IP packets based solely on the contents of the source and/or destination fields in the
packet header is known as
Question 39 .4 out of 4 points
According to the Trust Services Framework, the reliability principle of integrity is achieved when the system produces data
that
Question 40 .4 out of 4 points
Compatibility tests utilize a(n) ________, which is a list of authorized users, programs, and data files the users are
authorized to access or manipulate.
Question 41 .4 out of 4 points
Which of the following is not one of the three important factors determining the strength of any encryption system?
Question 42 .4 out of 4 points
Which of the following descriptions is not associated with symmetric encryption?
Question 43 .4 out of 4 points
An electronic document that certifies the identity of the owner of a particular public key.
Question 44 .4 out of 4 points
Which of the following is not one of the 10 internationally recognized best practices for protecting the privacy of
customers' personal information?
Question 45 .4 out of 4 points
These are used to create digital signatures.
Question 46 .4 out of 4 points
This determines the correctness of the logical relationship between two data items.
Question 47 .4 out of 4 points
This determines if characters are of the proper type.
Question 48 .4 out of 4 points
Check digit verification is an example of a(n)
Question 49 .4 out of 4 points
This batch processing data entry control sums a non-financial numeric field.
Question 50 .4 out of 4 points
What is the most effective way to ensure information system availability?

More Related Content

What's hot

________ relates to any computer-based tool people use to work with informa...
  ________ relates to any computer-based tool people use to work with informa...  ________ relates to any computer-based tool people use to work with informa...
________ relates to any computer-based tool people use to work with informa...
Gender Core
 

What's hot (7)

ACC 564 NERD Achievement Education--acc564nerd.com
ACC 564 NERD Achievement Education--acc564nerd.comACC 564 NERD Achievement Education--acc564nerd.com
ACC 564 NERD Achievement Education--acc564nerd.com
 
ACC 564 NERD Become Exceptional--acc564nerd.com
ACC 564 NERD Become Exceptional--acc564nerd.comACC 564 NERD Become Exceptional--acc564nerd.com
ACC 564 NERD Become Exceptional--acc564nerd.com
 
________ relates to any computer-based tool people use to work with informa...
  ________ relates to any computer-based tool people use to work with informa...  ________ relates to any computer-based tool people use to work with informa...
________ relates to any computer-based tool people use to work with informa...
 
564 complete class
 564 complete class 564 complete class
564 complete class
 
Route Fifty: 2016 Top Management Challenges for State & Local Government - Co...
Route Fifty: 2016 Top Management Challenges for State & Local Government - Co...Route Fifty: 2016 Top Management Challenges for State & Local Government - Co...
Route Fifty: 2016 Top Management Challenges for State & Local Government - Co...
 
Delivering on Digital Government
Delivering on Digital GovernmentDelivering on Digital Government
Delivering on Digital Government
 
The need to lead in data and analytics
The need to lead in data and analyticsThe need to lead in data and analytics
The need to lead in data and analytics
 

Viewers also liked

Técnicas e instrumentos de recolección de datos.pptx david y joan
Técnicas e instrumentos de recolección de datos.pptx   david y joanTécnicas e instrumentos de recolección de datos.pptx   david y joan
Técnicas e instrumentos de recolección de datos.pptx david y joan
David Loaiza
 

Viewers also liked (17)

Devry acct 504 complete course latest 2016 feb
Devry acct 504 complete course latest 2016 febDevry acct 504 complete course latest 2016 feb
Devry acct 504 complete course latest 2016 feb
 
Acc 561 new 2016
Acc 561 new 2016Acc 561 new 2016
Acc 561 new 2016
 
Acc 564 final exam part 2 new spring 2016
Acc 564 final exam part 2 new spring 2016Acc 564 final exam part 2 new spring 2016
Acc 564 final exam part 2 new spring 2016
 
Acct 220 final exam new spring 2016
Acct 220 final exam new spring 2016Acct 220 final exam new spring 2016
Acct 220 final exam new spring 2016
 
Técnicas e instrumentos de recolección de datos.pptx david y joan
Técnicas e instrumentos de recolección de datos.pptx   david y joanTécnicas e instrumentos de recolección de datos.pptx   david y joan
Técnicas e instrumentos de recolección de datos.pptx david y joan
 
Digipak analysis
Digipak analysis Digipak analysis
Digipak analysis
 
Habilidad lectora
Habilidad lectoraHabilidad lectora
Habilidad lectora
 
Habilidad matematica
Habilidad matematicaHabilidad matematica
Habilidad matematica
 
театр
театртеатр
театр
 
The weather
The     weatherThe     weather
The weather
 
Cetinje and National Park Lovcen - Montenegro
Cetinje and National Park Lovcen - MontenegroCetinje and National Park Lovcen - Montenegro
Cetinje and National Park Lovcen - Montenegro
 
Aim to Be an Open Source Zero
Aim to Be an Open Source ZeroAim to Be an Open Source Zero
Aim to Be an Open Source Zero
 
Caso 2 Planeación Estrategica Sun Life
Caso 2 Planeación Estrategica Sun LifeCaso 2 Planeación Estrategica Sun Life
Caso 2 Planeación Estrategica Sun Life
 
Acc 491 final exam new spring 2016
Acc 491 final exam new spring 2016Acc 491 final exam new spring 2016
Acc 491 final exam new spring 2016
 
Acc 349 final exam 2016 july
Acc 349 final exam 2016 julyAcc 349 final exam 2016 july
Acc 349 final exam 2016 july
 
Acct 220 final exam new spring 2016
Acct 220 final exam new spring 2016Acct 220 final exam new spring 2016
Acct 220 final exam new spring 2016
 
Daniel
DanielDaniel
Daniel
 

Similar to Acc 564 final exam part 1 new spring 2016

19Question 1 4 4 pointsLO5 What is a packetQu.docx
19Question 1 4  4 pointsLO5 What is a packetQu.docx19Question 1 4  4 pointsLO5 What is a packetQu.docx
19Question 1 4 4 pointsLO5 What is a packetQu.docx
aulasnilda
 
Question 1 1. Organizations can ensure that the quality is roote.docx
Question 1 1. Organizations can ensure that the quality is roote.docxQuestion 1 1. Organizations can ensure that the quality is roote.docx
Question 1 1. Organizations can ensure that the quality is roote.docx
IRESH3
 
Enabling role of information technology in bpm
Enabling role of information technology in bpmEnabling role of information technology in bpm
Enabling role of information technology in bpm
dutconsult
 

Similar to Acc 564 final exam part 1 new spring 2016 (14)

ACC 564 Final Exam
ACC 564 Final ExamACC 564 Final Exam
ACC 564 Final Exam
 
ACC 564 TUTOR Achievement Education--acc564tutor.com
 ACC 564 TUTOR Achievement Education--acc564tutor.com ACC 564 TUTOR Achievement Education--acc564tutor.com
ACC 564 TUTOR Achievement Education--acc564tutor.com
 
Hsa 315 Massive Success / snaptutorial.com
Hsa 315 Massive Success / snaptutorial.comHsa 315 Massive Success / snaptutorial.com
Hsa 315 Massive Success / snaptutorial.com
 
19Question 1 4 4 pointsLO5 What is a packetQu.docx
19Question 1 4  4 pointsLO5 What is a packetQu.docx19Question 1 4  4 pointsLO5 What is a packetQu.docx
19Question 1 4 4 pointsLO5 What is a packetQu.docx
 
T5 project jeffin scaria mba
T5 project jeffin scaria mbaT5 project jeffin scaria mba
T5 project jeffin scaria mba
 
Question 1 1. Organizations can ensure that the quality is roote.docx
Question 1 1. Organizations can ensure that the quality is roote.docxQuestion 1 1. Organizations can ensure that the quality is roote.docx
Question 1 1. Organizations can ensure that the quality is roote.docx
 
Stop the fraudster! Pennsylvania Treasury, Industry Expert Chris Doxey and Fu...
Stop the fraudster! Pennsylvania Treasury, Industry Expert Chris Doxey and Fu...Stop the fraudster! Pennsylvania Treasury, Industry Expert Chris Doxey and Fu...
Stop the fraudster! Pennsylvania Treasury, Industry Expert Chris Doxey and Fu...
 
Exploratory research design secondary data
Exploratory research design  secondary dataExploratory research design  secondary data
Exploratory research design secondary data
 
Sad 201 project sparc vision online library-assignment 2
Sad 201  project sparc vision  online library-assignment 2Sad 201  project sparc vision  online library-assignment 2
Sad 201 project sparc vision online library-assignment 2
 
Presentation_17_Online Questionnaire.pptx
Presentation_17_Online Questionnaire.pptxPresentation_17_Online Questionnaire.pptx
Presentation_17_Online Questionnaire.pptx
 
5 things that keep comptrollers up at night
5 things that keep comptrollers up at night5 things that keep comptrollers up at night
5 things that keep comptrollers up at night
 
Hsa 520 Success Begins / snaptutorial.com
Hsa 520  Success Begins / snaptutorial.comHsa 520  Success Begins / snaptutorial.com
Hsa 520 Success Begins / snaptutorial.com
 
Moving Beyond Batch: Transactional Databases for Real-time Data
Moving Beyond Batch: Transactional Databases for Real-time DataMoving Beyond Batch: Transactional Databases for Real-time Data
Moving Beyond Batch: Transactional Databases for Real-time Data
 
Enabling role of information technology in bpm
Enabling role of information technology in bpmEnabling role of information technology in bpm
Enabling role of information technology in bpm
 

Recently uploaded

Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
MateoGardella
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
MateoGardella
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 

Recently uploaded (20)

Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 

Acc 564 final exam part 1 new spring 2016

  • 1. ACC 564 Final Exam Part 1 NEW Spring 2016 buy here http://onlinehelpstudy.com/exam_te xt.php?cat=16083 www.onlinehelpstudy.com Immediate access to solutions for ENTIRE COURSES, FINAL EXAMS and HOMEWORKS “RATED A+" - Without Registration!
  • 2. Times Purchased: 15 Rated: A+ ACC 564 Final Exam Part 1 NEW Spring 2016 Question 1 .4 out of 4 points An accounting information system (AIS) processes ________ to provide users with ________. Question 2 .4 out of 4 points Paid time-off policies, job descriptions, and procedures manuals are examples of information needed to support key decisions in what business process? Question 3 .4 out of 4 points Which of the following is a primary activity in the value chain? Question 4 .4 out of 4 points A change in the AIS that makes information more easily accessible and widely available within an organization is most likely to first influence the Question 5 .4 out of 4 points A frantic Stro Frinzel called the home office from Des Moines. "You have got to help me. I am about to close a great sale, but I have to be able to guarantee delivery by the fourteenth. I can't get through to the company Web site to verify delivery!" "Thank you for calling. Your call is very important to us. However, all of our lines are currently in use. Please try again later." Which of the following characteristics of useful information is absent in the situation described above? Question 6 .4 out of 4 points The coding technique most likely used for sales orders is called a Question 7 .4 out of 4 points The quality assurance department at a large manufacturing business enters data into the AIS that is used to produce a weekly report that summarizes the proportion of defective units in each product line. This is an example of Question 8 .4 out of 4 points
  • 3. A specialized journal Question 9 .4 out of 4 points Data must be collected about three facets of each business activity. What are they? Question 10 .4 out of 4 points A specialized journal would be most likely to be used to enter Question 11 .4 out of 4 points The Union Soup Kitchen is a non-profit organization that collects, stores, prepares and provides food to the homeless in Erie, Pennsylvania. Donations of food are recorded in a database and a receipt is provided to the donor. When food is used, the database is updated so that it always reflects the amounts and types of food that are available. In a data flow diagram, which type of symbol would be used to represent the flow of data from the donor into the system? Question 12 .4 out of 4 points A flowchart that depicts the relationships among the input, processing, and output of an AIS is Question 13 .4 out of 4 points In a data flow diagram of the customer payment process, "Customer payment" will appear above or in Question 14 .4 out of 4 points In general, a data destination will be shown by Question 15 .4 out of 4 points In preparing a DFD, when data are transformed through a process, the symbol used should be Question 16 .4 out of 4 points When the human resources manager wants to gather data about vacation and personal day usage by employees and by departments, the manager would use which language? Question 17 .4 out of 4 points The potential inconsistency that could occur when there are multiple occurrences of a specific data item in a database is called the
  • 4. Question 18 .4 out of 4 points The schema that provides an organization-wide view of the entire database is known as the Question 19 .4 out of 4 points The database requirement that foreign keys must be null or have a value corresponding to the value of a primary key in another table is formally called the Question 20 .4 out of 4 points In a relational database, requiring that every record in a table have a unique identifier is called the Question 21 .4 out of 4 points Which of the following is an opportunity that could contribute to employee fraud? Question 22 .4 out of 4 points Which of the following is the greatest risk to information systems and causes the greatest dollar losses? Question 23 .4 out of 4 points One fraudulent scheme covers up a theft by creating cash through the transfer of money between banks. This is known as Question 24 .4 out of 4 points Most frauds are detected by Question 25 .4 out of 4 points The most efficient way to conceal asset misappropriation is to Question 26 .4 out of 4 points A fraud technique that slices off tiny amounts from many projects is called the ________ technique. Question 27 .4 out of 4 points Computer fraud perpetrators that modify programs during systems development, allowing access into the system that bypasses normal system controls are using Question 28 .4 out of 4 points
  • 5. A fraud technique that allows a perpetrator to bypass normal system controls and enter a secured system is called Question 29 .4 out of 4 points Computer fraud perpetrators who use telephone lines to commit fraud and other illegal acts are typically called Question 30 .4 out of 4 points A ________ is similar to a ________, except that it is a program rather than a code segment hidden in a host program. Question 31 .4 out of 4 points ________ controls prevent, detect and correct transaction errors and fraud. Question 32 .4 out of 4 points According to the ERM, these objectives help ensure the accuracy, completeness and reliability of internal and external company reports. Question 33 .4 out of 4 points Generally in a risk assessment process, the first step is to Question 34 .4 out of 4 points The process that a business uses to safeguard assets, provide accurate and reliable information, and promote and improve operational efficiency is known as Question 35 .4 out of 4 points According to the ERM, these help the company address all applicable laws and regulations. Question 36 .4 out of 4 points Which of the following is an example of a corrective control? Question 37 .4 out of 4 points The process of turning off unnecessary features in the system is known as Question 38 .4 out of 4 points
  • 6. The process that screens individual IP packets based solely on the contents of the source and/or destination fields in the packet header is known as Question 39 .4 out of 4 points According to the Trust Services Framework, the reliability principle of integrity is achieved when the system produces data that Question 40 .4 out of 4 points Compatibility tests utilize a(n) ________, which is a list of authorized users, programs, and data files the users are authorized to access or manipulate. Question 41 .4 out of 4 points Which of the following is not one of the three important factors determining the strength of any encryption system? Question 42 .4 out of 4 points Which of the following descriptions is not associated with symmetric encryption? Question 43 .4 out of 4 points An electronic document that certifies the identity of the owner of a particular public key. Question 44 .4 out of 4 points Which of the following is not one of the 10 internationally recognized best practices for protecting the privacy of customers' personal information? Question 45 .4 out of 4 points These are used to create digital signatures. Question 46 .4 out of 4 points This determines the correctness of the logical relationship between two data items. Question 47 .4 out of 4 points This determines if characters are of the proper type. Question 48 .4 out of 4 points
  • 7. Check digit verification is an example of a(n) Question 49 .4 out of 4 points This batch processing data entry control sums a non-financial numeric field. Question 50 .4 out of 4 points What is the most effective way to ensure information system availability?