You are on page 1of 27

Quiz Bee

 ___________ key is widely distributed and


available to everyone.
 A. Private C. Car
 B. Public D. Password

1
 Private key is least likely use in
_____________.
 A. Symmetric encryption C. Digital
signature
 B. Asymmetric encryption D. All of the above

2
 Forms design is an example of this type of
control.
 A. Data entry control
 B. Data transmission control
 C. Output control
 D. Source data control

3
 Information that needs to be stored securely
for 10 years or more would most likely be
stored in which type of file?
 A. Archive C. Encrypted
 B. Backup D. Log

4
 Sequentially pre-numbered forms is an
example of?
 A. Data entry controls
 B. Data transmission controls
 C. Processing controls
 D. Source data controls

5
 This batch processing data entry control sums
a non-financial numeric field.
 A. Batch total C. Hash total
 B. Financial total D. Sequence check

6
 This determines if the characters in a field are
of the proper type.
 A. Field check C. Range
 B. Limit check D. Reasonableness test

7
 This ensures that the input data will fit into the
assigned field.
 A. Limit check C. Size check
 B. Range check D. Validity check

8
 This tests a numerical amount to ensure that it
does not exceed a predetermined value nor fall
below another predetermined value.
 A. Completeness check C. Limit check
 B. Field check D. Range check

9
 This tests a numerical amount to ensure that it
does not exceed a predetermined value.
 A. Completeness check C. Range check
 B. Limit check D. Sign check

10
 Which of the following is least likely batch
totals?
 A. Financial totals C. Document size
 B. Record count D. Hash totals

11
 An error message that will tell the user to fill
the required field is an example of what
control?
 A. Completeness check C. Limit check
 B. Field check D. Range check

12
 Batch totals are example of
 A. Data entry controls
 B. Data transmission controls
 C. Output controls
 D. Processing controls

13
 Computing hash total is a procedure to ensure
that the data entered into the system are
______________.
 A. Accurate C. Legal
 B. Complete D. Valid

14
 File labels are example of

 A. Data entry controls C. Processing


controls
 B. Output controls D. Source data controls

15
 Message acknowledgment techniques are
example of
 A. Data entry controls
 B. Data transmission controls
 C. Output controls
 D. Processing controls

16
 Rejecting office supplies expense that
amounted to 1 million is an example of what
control?
 A. Validity check C. Limit check
 B. Range check D. Reasonableness test

17
 Protecting companies' customer information is
the objective of?
 A. Privacy Principle
 B. Confidentiality Principle
 C. Availability Principle
 D. None of the above

18
 Protecting companies' own information is the
objective of?
 A. Privacy Principle
 B. Confidentiality Principle
 C. Availability Principle
 D. None of the above

19
 Which of the following statements is false
about confidentiality?

 A.Management must identify which


information is sensitive
 B.Each organization must follow standard
definitions of sensitive information
 C.Organization may include business plan as
one of their sensitive information
 D.All of the above are true
20
 Which of the following control would prevent
entry of nonexistent customer number in a
sales transaction?
 A. Field Check C. Validity Check
 B. Reasonableness check D. Batch Total

21
 Which of the following is a control that can be
used to verify the accuracy of information
transmitted over a network?
 A. Completeness check C. Parity bit
 B. Check digit D. Size check

22
 Which of the following is an example of
processing control?
 A. Input validation C. Check digit
 B. Parity checks D. Field check

23
 Which of the following is an example of the kind of
batch total call hash total?

 A.the sum of the purchase amount field in a set of


purchaseorders.
 B.the sum of the purchase order number field in a
set of purchase orders.
 C.the number of completed documents in a set of
purchase orders.
 D.All of the above

24
 Which of the following provides detailed
procedures to resolve the problems resulting
from flash flood that completely destroys a
company's data center?
 A. backup plan C. business continuity plan
 B. disaster recovery plan D. archive plan

25
CONGRATULATIONS

You might also like