AC 220 MIDTERM PT 2 Questions and
Correct Answers/ Latest Update / Already
Graded
What skill set of accountants makes them well-suited for providing
consultancy services in cyber risk management? a. Social media
proficiency b. Skepticism, internal control, measurement, and
materiality judgment expertise c. Data entry proficiency d.
Technological innovation knowledge e. Physical security expertise
Ans: B
Which of the following is NOT mentioned as a credential that
cybersecurity experts may choose to obtain? a. Certified Ethical Hacker
(CEH) b. CompTIA Security+ c. Certified Information Systems Manager
(CISM) d. Certified Public Accountant (CPA) e. Certified Information
Systems Auditor (CISA)
Ans: D
According to the chapter, what might be considered the first line of
defense in protecting assets from cyber threats? a. Increased
connectivity b. Digital geography c. Metal cabinets d. Cyber-literate
individuals e. Physical security measures
Ans: D
All rights reserved © 2025/ 2026 |
, Page |2
Which report, assessing third-party controls over information systems,
can only be issued by certified public accountants? a. AI Impact
Assessment b. Privacy Impact Assessment c. SOC 2 Report d.
Cybersecurity Benchmark Report e. SEC Compliance Report
Ans: C
What is mentioned as a significant human element in cyberattacks in
the chapter? a. Metal cabinets b. Cloud storage c. Paper files d.
Physical security e. Phishing attacks
Ans: E
What is the primary goal of cybersecurity? a. Increasing physical
security b. Safeguarding computer systems, networks, and data c.
Creating a new geography d. Protecting metal cabinets e. Reducing
connectivity
Ans: B
In the 1960s, what network was developed by the US Defense
Department to link Pentagon research computers over telephone
lines? a. ARPANET b. World Wide Web c. Internet Protocol d. TCP/IP e.
Packet Switching Network
Ans: A
All rights reserved © 2025/ 2026 |
, Page |3
What distinguishes data from information? a. Data is stored, while
information is transmitted b. Data has context, while information is
raw material c. Data is unintelligible, while information is processed d.
Information is collected, while data is created e. Information is
electronic, while data is physical
Ans: C
How is confidentiality different from privacy in the context of data? a.
Confidentiality refers to private data, while privacy involves
unauthorized access b. Confidentiality means data belonging to
individuals, while privacy means keeping data secret
c. Confidentiality involves data availability, while privacy focuses on
data integrity d. Confidentiality and privacy are synonymous e. Privacy
refers to data completeness, while confidentiality involves authorized
access
Ans: B
What is the role of hypertext transfer protocol (HTTP) in a web server?
a. Hardware element of the server b. Communication rules for file
transfers c. Database server functionality d. Set of rules for connecting
clients e. Software used for client interactions
Ans: B
All rights reserved © 2025/ 2026 |