100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Examen

2024 PRINCIPLE OF INFORMATION SECURITY (CIS 410) ACTUAL TEST REAL QUESTIONS AND CORRECT DETAILED ANSWERS (100% CORRECT VERIFIED ANSWERS)

Puntuación
-
Vendido
-
Páginas
37
Grado
A+
Subido en
25-04-2025
Escrito en
2024/2025

2024 PRINCIPLE OF INFORMATION SECURITY (CIS 410) ACTUAL TEST REAL QUESTIONS AND CORRECT DETAILED ANSWERS (100% CORRECT VERIFIED ANSWERS)

Institución
Grado











Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Libro relacionado

Escuela, estudio y materia

Grado

Información del documento

Subido en
25 de abril de 2025
Número de páginas
37
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

MindanaokStatekUniversity
CollegekofkBusinesskAdministrationkandkAccountancy
DEPARTMENTkOFkACCOUNTANCY
MarawikCity



AUDITINGkINkAkCISkENVIRONMENT
Accountingk153

MULTIPLEkCHOICE.kReadkcarefullykthekquestionskbelowkandkchoosekthekbestkstatementkamongkth
ekchoices.kWritekthekletterkcorrespondingktokyourkanswerkonktheksheetkprovidedkalongkwithkthiskqu
estionnaire.kErasureskarekstrictlyknotkallowed.
1. WhichkstatementkiskincorrectkwhenkauditingkinkakCISkenvironment?
a. AkCISkenvironmentkexistskwhenkakcomputerkofkanyktypekorksizekiskinvolvedkinkthekproc
essingkbykthekentitykofkfinancialkinformationkofksignificancektokthekaudit,kwhetherkthat
kcomputerkiskoperatedkbykthekentitykorkbykakthirdkparty.

b. ThekauditorkshouldkconsiderkhowkakCISkenvironmentkaffectskthekaudit.
c. Thekusekofkakcomputerkchangeskthekprocessing,kstoragekandkcommunicationkofkfina
ncialkinformationkandkmaykaffectkthekaccountingkandkinternalkcontrolksystemskempl
oyedkbykthekentity.
d. AkCISkenvironmentkchangeskthekoverallkobjectivekandkscopekofkankaudit.
2. Whichkofkthekfollowingkconceptskdistinguisheskthekretentionkofkcomputerizedkauditkdocume
ntskfromkthektraditionalkhardkcopykform?
a. Analyses,kconclusionskandkrecommendationskarekfiledkonkelectronickmediakandkarek
thereforeksubjectktokcomputerksystemkcontrolskandksecuritykprocedures.
b. Evidentialksupportkforkallkfindingskiskcopiedkandkprovidedktoklocalkmanagementkdurin
gkthekclosingkconferencekandktokeachkpersonkreceivingkthekfinalkreport.
c. Computerizedkdatakfileskcankbekusedkinkcomputerkauditkprocedures.
d. Auditkprogramskcankbekstandardizedktokeliminatekthekneedkforkakpreliminaryksurveyk
atkeachklocation.
3. Responsibilitykforkthekcontrolkofkend-
userkcomputingkexistskatkthekorganizational,kdepartmentalkandkindividualkuserklevel.kAkdirect
kresponsibilitykofkthekindividualkuserskis:

a. Acquisitionkofkhardwarekandksoftware.
b. Takingkequipmentkinventories.
c. Strategickplanningkofkend-userkcomputing.
d. Physicalksecuritykcomputerkhardware.
4. WhichkofkthekfollowingkiskleastklikelykakriskkcharacteristickassociatedkwithkCISkenvironment?
a. Errorskembeddedkinkankapplication’skprogramklogickmaybekdifficultktokmanuallykdet
ectkonkaktimelykbasis.
b. Manykcontrolkprocedureskthatkwouldkordinarilykbekperformedkbykseparatekindividual
skinkmanualksystemkmaybekconcentratedkinkCIS.
c. Thekpotentialkunauthorizedkaccessktokdatakorktokalterkthemkwithoutkvisiblekevidencek
maybekgreater.
d. Initiationkofkchangeskinkthekmasterkfilekiskexclusivelykhandledkbykrespectivekusers.
5. Personalkcomputerskareksusceptiblektoktheft,kphysicalkdamage,kunauthorizedkaccesskorkmisu
sekofkequipment.kWhichkofkthekfollowingkiskleastklikelykakphysicalksecurityktokrestrictkaccessktok
personalkcomputerskwhenknotkinkuse?
a. Usingkdoorklockskorkotherksecuritykprotectionkduringknon-businesskhours.
b. Fasteningkthekpersonalkcomputerktokaktablekusingksecuritykcables.
c. Lockingkthekpersonalkcomputerkinkakprotectivekcabinetkorkshell.
d. Usingkanti-virusksoftwarekprograms.
6. WhichkofkthekfollowingksignificancekandkcomplexitykofkthekCISkactivitieskshouldkankauditorkle
astkunderstand?
a. Thekorganizationalkstructurekofkthekclient’skCISkactivities.
b. Lackkofktransactionktrails.
c. Theksignificancekandkcomplexitykofkcomputerkprocessingkinkeachksignificantkaccoun
tingkapplication.
d. Thekusekofksoftwarekpackageskinsteadkofkcustomizedksoftware.
7. Whichkofkthekfollowingkisknotklikelykakcontrolkoverkremovablekstoragekmediaktokpreventkmispl
acement,kalterationkwithoutkauthorizationkorkdestruction?

, ntokankunintelligiblekform.
b. Placingkresponsibilitykforksuchkmediakunderkpersonnelkwhosekresponsibilitieskincludek
dutieskofksoftwarekcustodianskorklibrarians.
c. Usingkakprogramkandkdatakfilekcheck-inkandkcheck-
outksystemkandklockingkthekdesignatedkstorageklocations.
d. Keepingkcurrentkcopieskofkdiskettes,kcompactkdiskskorkback-
upktapeskandkhardkdiskskinkakfireproofkcontainer,keitherkon-site,koff-sitekorkboth.
8. Tokachievekauditkefficiencykandkeffectivenesskwithkakpersonalkcomputer,kthektwokcrucialkre
quirementskare:
a. Thekappropriatekauditktaskkforkpersonalkcomputerkapplicationskandkthekappropriatek
softwarektokperformkthekselectedkauditktasks.
b. Thekappropriateksoftwarektokperformkthekselectedkauditktaskkandkdatakthatkcankbek
accessedkbykthekauditor’skpersonalkcomputer.
c. Companykdatakthatkcankbekaccessedkbykthekauditor’skpersonalkcomputerkandkthek
appropriatekauditktaskskforkpersonalkcomputerkapplications.
d. Thekappropriateksamplekofkcompanykdataktoktestkwithkthekauditor’skpersonalkcompu
terkandkthekappropriateksoftwarektokperformkthekselectedkauditktasks.
9. Whichkofkthekfollowingkleastklikelykprotectskcriticalkandksensitivekinformationkfromkunauthorize
dkaccesskinkakpersonalkcomputerkenvironment?
a. Usingksecretkfileknameskandkhidingkthekfiles.
b. Keepingkofkback-upkcopieskoffsite.
c. Employingkpasswords.
d. Segregatingkdatakintokfileskorganizedkunderkseparatekfilekdirectories.
10. WhichkstatementkiskincorrectkregardingkthekgeneralkCISkcontrolskofkparticularkimportancekink
akdatabasekenvironment?
a. Sincekdatakareksharedkbykmanykusers,kcontrolkmaykbekenhancedkwhenkakstandardk
approachkiskusedkforkdevelopingkeachknewkapplicationkprogramkandkforkapplicatio
nkprogramkmodification.
b. Severalkdatakownerskshouldkbekassignedkresponsibilitykforkdefiningkaccesskandksecuri
tykrules,ksuchkaskwhokcankusekthekdatak(access)kandkwhatkfunctionsktheykcankperfor
mk(security).
c. Userkaccessktokthekdatabasekcankbekrestrictedkthroughkthekusekofkpasswords.
d. Responsibilitieskforkperformingkthekvariouskactivitieskrequiredktokdesign,kimplementkan
dkoperatekakdatabasekarekdividedkamongktechnical,kdesign,kadministrativekandkuse
rkpersonnel.
11. Thekfollowingkmatterskarekofkparticularkimportancektokthekauditorkinkankon-
linekcomputerksystem,kexcept:
a. Authorization,kcompletenesskandkaccuracykofkon-linektransactions.
b. Integritykofkrecordskandkprocessing,kduektokon-
linekaccessktoktheksystemkbykmanykuserskandkprogrammers.
c. ChangeskinkthekperformancekofkauditkprocedureskincludingkthekusekofkCAAT's.
d. Cost-benefitkratiokofkinstallingkon-linekcomputerksystem.
12. Thekauditorkmaykoftenkassumekthatkcontrolkriskkiskhighkinkpersonalkcomputerksystemsksince,kitk
mayknotkbekpracticablekorkcost-
effectivekforkmanagementktokimplementksufficientkcontrolsktokreducekthekriskskofkundetecte
dkerrorsktokakminimumklevel.kThiskleastklikelykentail:
a. Morekphysicalkexaminationkandkconfirmationkofkassets.
b. Morekanalyticalkprocedureskthanktestskofkdetails.
c. Largerksampleksizes.
d. Greaterkusekofkcomputer-assistedkauditktechniques,kwherekappropriate.k
13. Auditkprocedureskinkakdatabasekenvironmentkwillkbekaffectedkprincipallykby:
a. Thekextentktokwhichkthekdatakinkthekdatabasekarekusedkbykthekaccountingksystem.
b. Thektypekandksignificancekofkfinancialktransactionskbeingkprocessed.
c. Theknaturekofkthekdatabase,kthekDBMS,kthekdatabasekadministrationktaskskandktheka
pplications.
d. ThekgeneralkCISkcontrolskwhichkarekparticularlykimportantkinkakdatabasekenvironmen
t.
14. WhichkstatementkiskincorrectkregardingkthekcharacteristicskofkakCISkorganizationalkstructure?

,k




stributionkandkusekofkthekoutput.
b. Manykconventionalkcontrolskbasedkonkadequateksegregationkofkincompatiblekfunct
ionskmayknotkexist,korkinkthekabsencekofkaccesskandkotherkcontrols,kmaykbeklesskeffec
tive.
c. Transactionkandkmasterkfilekdatakarekoftenkconcentrated,kusuallykinkmachine-
readablekform,keitherkinkonekcomputerkinstallationklocatedkcentrallykorkinkaknumberk
ofkinstallationskdistributedkthroughoutkankentity.
d. SystemskemployingkCISkmethodskdoknotkincludekmanualkoperationsksincektheknumbe
rkofkpersonskinvolvedkinkthekprocessingkofkfinancialkinformationkisksignificantlykreduce
d.
15. Akmajorkexposurekassociatedkwithkthekrapidlykexpandingkusekkofkmicrocomputerskiskthekabse
ncekof:kkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
a. Adequateksizekofkmainkmemorykandkdiskkstorage.
b. Compatiblekoperatingksystems.
c. Formalizedkprocedureskforkpurchasekjustification.
d. Physical,kdatakfile,kandkprogramksecurity.kkkkkkkkkk
16. SystemkcharacteristicskthatkmaykresultkfromktheknaturekofkCISkprocessingkinclude,kexcept:
a. Absencekofkinputkdocuments.
b. Lackkofkvisiblektransactionktrail.
c. Lackkofkvisiblekoutput.
d. Difficultykofkaccessktokdatakandkcomputerkprograms.
17. ThekdevelopmentkofkCISkwillkgenerallykresultkinkdesignkandkproceduralkcharacteristicskthatkar
ekdifferentkfromkthosekfoundkinkmanualksystems.kThesekdifferentkdesignkandkproceduralkaspe
ctskofkCISkinclude,kexcept:
a. Consistencykofkperformance.
b. Programmedkcontrolkprocedures.
c. Vulnerabilitykofkdatakandkprogramkstoragekmedia
d. Multiplektransactionkupdatekofkmultiplekcomputerkfileskorkdatabases.
18. WhichkstatementkiskincorrectkregardingkinternalkcontrolskinkakCISkenvironment?
a. Manualkandkcomputerkcontrolkprocedureskcomprisekthekoverallkcontrolskaffectingkth
ekCISkenvironmentk(generalkCISkcontrols)kandkthekspecifickcontrolskoverkthekaccounti
ngkapplicationsk(CISkapplicationkcontrols).
b. ThekpurposekofkgeneralkCISkcontrolskisktokestablishkakframeworkkofkoverallkcontrolkove
rkthekCISkactivitieskandktokprovidekakreasonableklevelkofkassurancekthatkthekoverallko
bjectiveskofkinternalkcontrolkarekachieved.
c. ThekpurposekofkCISkapplicationkcontrolskisktokestablishkspecifickcontrolkprocedureskov
erkthekapplicationksystemskinkorderktokprovidekreasonablekassurancekthatkallktransact
ionskarekauthorizedkandkrecorded,kandkarekprocessedkcompletely,kaccuratelykandk
onkaktimelykbasis.
d. Thekinternalkcontrolskoverkcomputerkprocessing,kwhichkhelpktokachievekthekoverallko
bjectiveskofkinternalkcontrol,kincludekonlykthekprocedureskdesignedkintokcomputerkpr
ograms.
19. GeneralkCISkcontrolskmaykinclude,kexcept:
a. Organizationkandkmanagementkcontrols.
b. Deliverykandksupportkcontrols.
c. Developmentkandkmaintenancekcontrols.
d. Controlskoverkcomputerkdatakfiles.
20. CISkapplicationkcontrolskinclude,kexcept:
a. Controlskoverkinput.
b. Controlskoverkprocessingkandkcomputerkdatakfiles.
c. Controlskoverkoutput.
d. Monitoringkcontrols.
21. WhichkstatementkiskincorrectkregardingkthekreviewkofkgeneralkCISkcontrolskandkCISkapplicati
onkcontrols?
a. ThekauditorkshouldkconsiderkhowkthesekgeneralkCISkcontrolskaffectkthekCISkapplicatio
nsksignificantktokthekaudit.
b. GeneralkCISkcontrolskthatkrelatektoksomekorkallkapplicationskarektypicallykinterdepend
entkcontrolskinkthatktheirkoperationkiskoftenkessentialktokthekeffectivenesskofkCISkapplic

, onnel,kbykuserskofktheksystem,kbykakseparatekcontrolkgroup,korkmaykbekprogrammedki
ntokapplicationksoftware.
d. Itkmaykbekmorekefficientktokreviewkthekdesignkofkthekapplicationkcontrolskbeforekrevi
ewingkthekgeneralkcontrols.
22. WhichkstatementkiskincorrectkregardingkthekevaluationkofkgeneralkCISkcontrolskandkCISkappli
cationkcontrols?
a. ThekgeneralkCISkcontrolskmaykhavekakpervasivekeffectkonkthekprocessingkofktransacti
onskinkapplicationksystems.
b. IfkgeneralkCISkcontrolskareknotkeffective,ktherekmaykbekakriskkthatkmisstatementskmigh
tkoccurkandkgokundetectedkinkthekapplicationksystems.
c. Manualkprocedureskexercisedkbykuserskmaykprovidekeffectivekcontrolkatkthekapplica
tionklevel.
d. WeaknesseskinkgeneralkCISkcontrolskcannotkprecludektestingkcertainkCISkapplicationk
controls.
23. Ankinternalkauditorknotedkthekfollowingkpointskwhenkconductingkakpreliminaryksurveykinkcon
nectionkwithkthekauditkofkankEDPkdepartment.kWhichkofkthekfollowingkwouldkbekconsideredk
aksafeguardkinkthekcontrolksystemkonkwhichkthekauditorkmightkrely?
a. Programmerskandkcomputerkoperatorskcorrectkdailykprocessingkproblemskasktheykari
se.
b. Thekcontrolkgroupkworkskwithkuserkorganizationsktokcorrectkrejectedkinput.
c. Newksystemskarekdocumentedkasksoonkaskpossiblekafterktheykbeginkprocessingklivekd
ata.
d. ThekaveragektenurekofkemployeeskworkingkinkthekEDPkdepartmentkisktenkmonths.
24. Ankon-
linekaccesskcontrolkthatkcheckskwhetherkthekuser’skcodeknumberkiskauthorizedktokinitiatekaksp
ecificktypekofktransactionkorkinquirykiskreferredktokas:
a. Password.
b. Compatibilityktest.
c. Limitkcheck.
d. Reasonablenessktest.
25. Akcontrolkprocedurekthatkcouldkbekusedkinkankon-
lineksystemktokprovidekankimmediatekcheckkonkwhetherkankaccountknumberkhaskbeenkente
redkonkakterminalkaccuratelykiska:
a. Compatibilityktest.
b. Recordkcount.
c. Hashktotal.
d. Self-checkingkdigit.
26. Akcontrolkdesignedktokcatchkerrorskatkthekpointkofkdatakentrykis:
a. Batchktotal.
b. Self-checkingkdigit.
c. Recordkcount.
d. Checkpoints.
27. Programkdocumentationkiskakcontrolkdesignedkprimarilyktokensurekthat:
a. Programmerskhavekaccessktokthektapeklibrarykorkinformationkonkdiskkfiles.
b. Programskdoknotkmakekmathematicalkerrors.
c. Programskarekkeptkupktokdatekandkperformkaskintended.
d. Datakhavekbeenkenteredkandkprocessed.
28. Somekofkthekmorekimportantkcontrolskthatkrelatektokautomatedkaccountingkinformationksyst
emskarekvaliditykchecks,klimitkchecks,kfieldkchecks,kandksignktests.kThesekarekclassifiedkas:
a. Controlktotalkvalidationkroutines.
b. Outputkcontrols.
c. Hashktotaling.
d. Inputkvalidationkroutines.
29. Mostkofktoday’skcomputerksystemskhavekhardwarekcontrolskthatkarekbuiltkinkbykthekcomputer
kmanufacturer.kCommon khardwarekcontrolskare:

a. Duplicatekcircuitry,kechokcheck,kandkinternalkheaderklabels
b. Tapekfilekprotection,kcryptographickprotection,kandklimitkchecks

c. Duplicatekcircuitry,kechokcheck,kandkdualkreading
$20.99
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
JOHNNKABIRU Teachme2-tutor
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
14
Miembro desde
7 meses
Número de seguidores
7
Documentos
798
Última venta
1 semana hace

4.7

596 reseñas

5
451
4
97
3
39
2
6
1
3

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes