AC 220 MIDTERM PT 2 EXAM
QUESTIONS AND ANSWERS 100% PASS
What skill set of accountants makes them well-suited for providing consultancy services in cyber
risk management? a. Social media proficiency b. Skepticism, internal control, measurement, and
materiality judgment expertise c. Data entry proficiency d. Technological innovation knowledge
e. Physical security expertise - ANS B
Which of the following is NOT mentioned as a credential that cybersecurity experts may choose
to obtain? a. Certified Ethical Hacker (CEH) b. CompTIA Security+ c. Certified Information
Systems Manager (CISM) d. Certified Public Accountant (CPA) e. Certified Information Systems
Auditor (CISA) - ANS D
According to the chapter, what might be considered the first line of defense in protecting assets
from cyber threats? a. Increased connectivity b. Digital geography c. Metal cabinets d. Cyber-
literate individuals e. Physical security measures - ANS D
1 @COPYRIGHT 2025/2026 ALLRIGHTS RESERVED.
, Which report, assessing third-party controls over information systems, can only be issued by
certified public accountants? a. AI Impact Assessment b. Privacy Impact Assessment c. SOC 2
Report d. Cybersecurity Benchmark Report e. SEC Compliance Report - ANS C
What is mentioned as a significant human element in cyberattacks in the chapter? a. Metal
cabinets b. Cloud storage c. Paper files d. Physical security e. Phishing attacks - ANS E
What is the primary goal of cybersecurity? a. Increasing physical security b. Safeguarding
computer systems, networks, and data c. Creating a new geography d. Protecting metal cabinets
e. Reducing connectivity - ANS B
In the 1960s, what network was developed by the US Defense Department to link Pentagon
research computers over telephone lines? a. ARPANET b. World Wide Web c. Internet Protocol
d. TCP/IP e. Packet Switching Network - ANS A
What distinguishes data from information? a. Data is stored, while information is transmitted b.
Data has context, while information is raw material c. Data is unintelligible, while information is
2 @COPYRIGHT 2025/2026 ALLRIGHTS RESERVED.
QUESTIONS AND ANSWERS 100% PASS
What skill set of accountants makes them well-suited for providing consultancy services in cyber
risk management? a. Social media proficiency b. Skepticism, internal control, measurement, and
materiality judgment expertise c. Data entry proficiency d. Technological innovation knowledge
e. Physical security expertise - ANS B
Which of the following is NOT mentioned as a credential that cybersecurity experts may choose
to obtain? a. Certified Ethical Hacker (CEH) b. CompTIA Security+ c. Certified Information
Systems Manager (CISM) d. Certified Public Accountant (CPA) e. Certified Information Systems
Auditor (CISA) - ANS D
According to the chapter, what might be considered the first line of defense in protecting assets
from cyber threats? a. Increased connectivity b. Digital geography c. Metal cabinets d. Cyber-
literate individuals e. Physical security measures - ANS D
1 @COPYRIGHT 2025/2026 ALLRIGHTS RESERVED.
, Which report, assessing third-party controls over information systems, can only be issued by
certified public accountants? a. AI Impact Assessment b. Privacy Impact Assessment c. SOC 2
Report d. Cybersecurity Benchmark Report e. SEC Compliance Report - ANS C
What is mentioned as a significant human element in cyberattacks in the chapter? a. Metal
cabinets b. Cloud storage c. Paper files d. Physical security e. Phishing attacks - ANS E
What is the primary goal of cybersecurity? a. Increasing physical security b. Safeguarding
computer systems, networks, and data c. Creating a new geography d. Protecting metal cabinets
e. Reducing connectivity - ANS B
In the 1960s, what network was developed by the US Defense Department to link Pentagon
research computers over telephone lines? a. ARPANET b. World Wide Web c. Internet Protocol
d. TCP/IP e. Packet Switching Network - ANS A
What distinguishes data from information? a. Data is stored, while information is transmitted b.
Data has context, while information is raw material c. Data is unintelligible, while information is
2 @COPYRIGHT 2025/2026 ALLRIGHTS RESERVED.