Professional Documents
Culture Documents
1
Private key is least likely use in
_____________.
A. Symmetric encryption C. Digital
signature
B. Asymmetric encryption D. All of the above
2
Forms design is an example of this type of
control.
A. Data entry control
B. Data transmission control
C. Output control
D. Source data control
3
Information that needs to be stored securely
for 10 years or more would most likely be
stored in which type of file?
A. Archive C. Encrypted
B. Backup D. Log
4
Sequentially pre-numbered forms is an
example of?
A. Data entry controls
B. Data transmission controls
C. Processing controls
D. Source data controls
5
This batch processing data entry control sums
a non-financial numeric field.
A. Batch total C. Hash total
B. Financial total D. Sequence check
6
This determines if the characters in a field are
of the proper type.
A. Field check C. Range
B. Limit check D. Reasonableness test
7
This ensures that the input data will fit into the
assigned field.
A. Limit check C. Size check
B. Range check D. Validity check
8
This tests a numerical amount to ensure that it
does not exceed a predetermined value nor fall
below another predetermined value.
A. Completeness check C. Limit check
B. Field check D. Range check
9
This tests a numerical amount to ensure that it
does not exceed a predetermined value.
A. Completeness check C. Range check
B. Limit check D. Sign check
10
Which of the following is least likely batch
totals?
A. Financial totals C. Document size
B. Record count D. Hash totals
11
An error message that will tell the user to fill
the required field is an example of what
control?
A. Completeness check C. Limit check
B. Field check D. Range check
12
Batch totals are example of
A. Data entry controls
B. Data transmission controls
C. Output controls
D. Processing controls
13
Computing hash total is a procedure to ensure
that the data entered into the system are
______________.
A. Accurate C. Legal
B. Complete D. Valid
14
File labels are example of
15
Message acknowledgment techniques are
example of
A. Data entry controls
B. Data transmission controls
C. Output controls
D. Processing controls
16
Rejecting office supplies expense that
amounted to 1 million is an example of what
control?
A. Validity check C. Limit check
B. Range check D. Reasonableness test
17
Protecting companies' customer information is
the objective of?
A. Privacy Principle
B. Confidentiality Principle
C. Availability Principle
D. None of the above
18
Protecting companies' own information is the
objective of?
A. Privacy Principle
B. Confidentiality Principle
C. Availability Principle
D. None of the above
19
Which of the following statements is false
about confidentiality?
21
Which of the following is a control that can be
used to verify the accuracy of information
transmitted over a network?
A. Completeness check C. Parity bit
B. Check digit D. Size check
22
Which of the following is an example of
processing control?
A. Input validation C. Check digit
B. Parity checks D. Field check
23
Which of the following is an example of the kind of
batch total call hash total?
24
Which of the following provides detailed
procedures to resolve the problems resulting
from flash flood that completely destroys a
company's data center?
A. backup plan C. business continuity plan
B. disaster recovery plan D. archive plan
25
CONGRATULATIONS