AIS IN ACTION SOLUTIONS
Quiz Key
1. Backup procedures are relevant to which Trust Services framework principle?
a. confidentiality (Incorrect. Backup procedures create unencrypted copies of files.)
b. privacy (Incorrect. Backup procedures create unencrypted copies of files.)
c. processing integrity (Incorrect. Backup procedures do not pertain to nor check the accuracy of processing activities.)
d. Availability (correct. Backup procedures provide copies of information that can be used to replace damaged or lost files.)
2. An input validation routine in which the computer sums the first four digits of a customer number to calculate the value of the fifth digit and then compares the calculated number typed in during data entry is an example of which type of control?
a. check digit verification (correct. This is the definition of check digit verification.)
b. parity bit checking (Incorrect. A parity bit is a special binary digit added to each character to enable checking whether it is transmitted without error.)
c. redundant data check (Incorrect. A redundant data check involves using two separate data items to retrieve the correct record from a file.)
d. reasonableness test (Incorrect. A reasonableness test verifies the correctness of one data item being entered by comparing it to the value of another data item.)
3. Which of the following statements is true?
a. Encrypting data is sufficient to protect confidentiality and privacy. (Incorrect. Access to encrypted data must also be controlled because, given enough time, any encryption scheme can be broken.)
b. Cookies are text files that only store information and cannot do anything. (Correct. Cookie are text files that store information, not programs capable of performing any functions.)
c. A hot site is an empty facility that is prewired for telephone and Internet access. (Incorrect. This is the definition of a cold site.)
d. Verifying that a customer is of legal age to purchase alcohol is an example of a reasonableness test. (Incorrect. This is an example of a limit check. A reasonableness test involves verifying the accuracy of one data item by comparing it to the value of another.)
4. Which of the following is designed to identify entry of a nonexistent customer account number?
a. sequence check (Incorrect. A sequence check is used to identify missing records.)
b. field check (Incorrect. A field check verifies whether the data input into a particular field is of the proper type, such as numeric.)
c. completeness check (Incorrect. A completeness check verifies that data are not missing.)
d. validity check. (Correct. A validity check compares input data to a master file to verify that the record being referenced does indeed exist.)
5. A batch total that is calculated by summing the part numbers sold in a batch of 50 sales invoices is called a
a. financial total (Incorrect. A financial total is a dollar amount.)
b. hash total (Correct. The sum of part numbers does not mean anything but can be used to verify processing integrity.)
จบหน้า 308
c. record count (Incorrect. A record counts the number of record in a batch; in this case, it would equal 50.)
d. part count (Incorrect. There is no such input validation control.)
6. Opt-in and opt-out policies pertain to which Trust Services framework principle?
a. confidentiality (Incorrect. Opt-in and opt-out deal with the collection of personal customer information which is part of the privacy principle.)
b. privacy (Correct. Opt-in and opt-out deal with the collection of personal customer information which is part of the privacy principle.)
c. processing integrity (Incorrect. Opt-in and opt-out deal with the collection of personal customer information and pertain to the privacy principle.)
d. availability (Incorrect. Opt-in and opt-out deal with the collection of personal customer information and pertain to the privacy principle.)
7. Field checks and sign tests pertain to which Trust Services Framework principle?
a. confidentiality (Incorrect. Field checks and sign tests are designed to verify the accuracy of data entry, which pertains to the processing integrity principle.)
b. privacy (Incorrect. Field checks and sign tests are designed to verify the accuracy of data entry, which pertains to the processing integrity principle.)
c. processing integrity (Correct. Field checks and sign tests are designed to verify the accuracy of data entry, which pertains to the processing integrity principle.)
d. availability (Incorrect. Field checks and sign tests are designed to verify the accuracy of data entry, which pertains to the processing integrity principle.)
8. Which backup method is the fastest?
a. full daily backup (Incorrect. Full back up takes the longest because it copies the entire file, which is why it is seldom done on a daily basis.)
b. Incremental daily backup (Correct. Incremental backups only back up the portions of the file that changed as a result of that day’s transactions.)
c. differential daily backup (Incorrect. differential daily backups back up all portions of the file that have changed since the last full backup , not just that on day’s changes-exception: differential and incremental backups are the same on the first day following a full backup.)
d. complete daily backup (Incorrect. This is the same as a full backup, which takes the longest because it copies the entire file.)
9. A copy of the state of database at a specific point in time during the middle of a normal business day is called a(n)
a. archive (Incorrect. An archive is a backup copy kept for historical purposes to fulfill legal and regulatory requirements.)
b. cookie (Incorrect. A cookie is a text file used to facilitate browsing Web sites.)
c. Checkpoint (Correct. This is the definition of a checkpoint.)
d. restoration (Incorrect. Restoration is the process of installing a backup copy of a file or database to recover from damage or loss of the original.)
10. Which of the following statements is true?
a. Concurrent update controls are designed to facilitate restoration of backups. (Incorrect. Concurrent update controls prevent errors that can arise when two or more users simultaneously attempt to change the same item in a database.)
b. Use of a VPN protects the confidentiality of information while it is being transmitted over the Internet. (Correct. VPNs use encryption to create protected tunnels through which information can be sent confidentially over the Internet.)
c. Cross-footing balance tests are an effective method for detecting entry of invalid account numbers. (Incorrect. Cross-footing balance tests provide a check on processing integrity by comparing two alternative ways of calculating the same sum.)
d. “Emergency” changes to information systems do not need to be formally approved and documented. (Incorrect. Although emergency changes are usually made without being approved and documented due to the need to respond quickly to a problem, they should be reviewed and documented as soon as practicable.)