Accounting Information Systems 10th Edition Gelinas Test Bank

irenkaandrle7787 0 views 35 slides Oct 18, 2025
Slide 1
Slide 1 of 35
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35

About This Presentation

Accounting Information Systems 10th Edition Gelinas Test Bank
Accounting Information Systems 10th Edition Gelinas Test Bank
Accounting Information Systems 10th Edition Gelinas Test Bank


Slide Content

Visit https://testbankfan.com to download the full version and
explore more testbank or solutions manual
Accounting Information Systems 10th Edition
Gelinas Test Bank
_____ Click the link below to download _____
https://testbankfan.com/product/accounting-information-
systems-10th-edition-gelinas-test-bank/
Explore and download more testbank or solutions manual at testbankfan.com

Here are some recommended products that we believe you will be
interested in. You can click the link to download.
Accounting Information Systems 10th Edition Gelinas
Solutions Manual
https://testbankfan.com/product/accounting-information-systems-10th-
edition-gelinas-solutions-manual/
Accounting Information Systems 9th Edition Gelinas Test
Bank
https://testbankfan.com/product/accounting-information-systems-9th-
edition-gelinas-test-bank/
Accounting Information Systems 11th Edition Gelinas Test
Bank
https://testbankfan.com/product/accounting-information-systems-11th-
edition-gelinas-test-bank/
Accounting Information Systems 11th Edition Gelinas
Solutions Manual
https://testbankfan.com/product/accounting-information-systems-11th-
edition-gelinas-solutions-manual/

Accounting Information Systems 10th Edition Hall Test Bank
https://testbankfan.com/product/accounting-information-systems-10th-
edition-hall-test-bank/
Accounting Information Systems 10th Edition Hall Solutions
Manual
https://testbankfan.com/product/accounting-information-systems-10th-
edition-hall-solutions-manual/
Management Information Systems 10th Edition Obrien Test
Bank
https://testbankfan.com/product/management-information-systems-10th-
edition-obrien-test-bank/
Management Information Systems 10th Edition McLeod Test
Bank
https://testbankfan.com/product/management-information-systems-10th-
edition-mcleod-test-bank/
Accounting Information Systems 1st Edition Richardson Test
Bank
https://testbankfan.com/product/accounting-information-systems-1st-
edition-richardson-test-bank/

Chapter 8—Controlling Information Systems: Introduction to Pervasive Controls

TRUE/FALSE

1. IT governance is a process that ensures that the organization's IT sustains and extends the
organization's strategies and objectives.

ANS: T PTS: 1

2. According to COBIT, IT resources include applications, information, infrastructure, and people.

ANS: T PTS: 1

3. According to COBIT, IT resources must be managed by IT control processes to ensure that an
organization has the information it needs to achieve its objectives.

ANS: T PTS: 1

4. The system of controls used in this text consists of the control environment, pervasive control plans, IT
general controls, and business process and application control plans.

ANS: T PTS: 1

5. The information systems function is synonymous with the accounting function.

ANS: F PTS: 1

6. The function composed of people, procedures, and equipment and is typically called the information
systems department, IS department, or the IT department is the information systems organization.

ANS: T PTS: 1

7. The IS function with the responsibility of guiding the IT organization in establishing and meeting user
information requirements is the IT steering committee.

ANS: T PTS: 1

8. The IS function with the principal responsibilities of ensuring the security of all IT resources is data
control.

ANS: F PTS: 1

9. The IS function of quality assurance conducts reviews to ensure the attainment of IT objectives.

ANS: T PTS: 1

10. The chief information officer (CIO) prioritizes and selects IT projects and resources.

ANS: F PTS: 1

11. Within the data center, the data control group is responsible for routing all work into and out of the
data center, correcting errors, and monitoring error correction.

ANS: T PTS: 1

12. The systems development function provides efficient and effective operation of the computer
equipment.

ANS: F PTS: 1

13. Within the data center, the data librarian function grants access to programs, data, and documentation.

ANS: T PTS: 1

14. Combining the functions of authorizing and executing events is a violation of the organizational
control plan known as segregation of duties.

ANS: T PTS: 1

15. Segregation of duties consists of separating the four functions of authorizing events, executing events,
recording events, and safeguarding the resources resulting from consummating the events.

ANS: T PTS: 1

16. Embezzlement is a fraud committed by two or more individuals or departments.

ANS: F PTS: 1

17. A small organization that does not have enough personnel to adequately segregate duties must rely on
alternative controls, commonly called resource controls.

ANS: F PTS: 1

18. The functions of the security officer commonly include assigning passwords and working with human
resources to ensure proper interview practices are conducted during the hiring process.

ANS: T PTS: 1

19. Individual departments coordinate the organizational and IT strategic planning processes and reviews
and approves the strategic IT plan.

ANS: F PTS: 1

20. The policy of requiring an employee to alternate jobs periodically is known as forced vacations.

ANS: F PTS: 1

21. Forced vacations is a policy of requiring an employee to take leave from the job and substitute another
employee in his or her place.

ANS: T PTS: 1

22. A fidelity bond indemnifies a company in case it suffers losses from defalcations committed by its
employees.

ANS: T PTS: 1

23. The WebTrust family of services offers best practices and e-business solutions related exclusively to
B2B electronic commerce.

ANS: F PTS: 1

24. Data encryption is a process that codes data to make it readable to human eye.

ANS: F PTS: 1

25. Systems documentation provides an overall description of the application, including the system's
purpose; an overview of system procedures; and sample source documents, outputs, and reports.

ANS: T PTS: 1

26. Program documentation provides a description of an application program and usually includes the
program's purpose, program flowcharts, and source code listings.

ANS: T PTS: 1

27. The user manual gives detailed instructions to computer operators and to data control about a
particular application.

ANS: F PTS: 1

28. The operations run manual describes user procedures for an application and assists the user in
preparing inputs and using outputs.

ANS: F PTS: 1

29. Training materials help users learn their jobs and perform consistently in those jobs.

ANS: T PTS: 1

30. Program change controls provide assurance that all modifications to programs are authorized and
documented, and that the changes are completed, tested, and properly implemented.

ANS: T PTS: 1

31. Business continuity planning is the process that identifies events that may threaten an organization and
provide a framework whereby the organization will continue to operate when the threatened event
occurs or resume operations with a minimum of disruption.

ANS: T PTS: 1

32. COBIT 5 is more procedure-based than COBIT 4.1

ANS: F PTS: 1

33. With continuous data protection (CDP) all data changes are data stamped and saved to secondary
systems as the changes are happening.

ANS: T PTS: 1

34. The disaster backup and recovery technique known as electronic vaulting is a service whereby data
changes are automatically transmitted over the Internet on a continuous basis to an off-site server
maintained by a third party.

ANS: T PTS: 1

35. The disaster recovery strategy known as a cold site is a fully equipped data center that is made
available to client companies for a monthly subscriber fee.

ANS: F PTS: 1

36. A facility usually comprised of air-conditioned space with a raised floor, telephone connections, and
computer ports, into which a subscriber can move equipment, is called a hot site.

ANS: F PTS: 1

37. In a logic bomb attack, a Web site is overwhelmed by an intentional onslaught of thousands of
simultaneous messages, making it impossible for the attacked site to engage in its normal activities.

ANS: F PTS: 1

38. Biometric identification systems identify authorized personnel through some unique physical trait such
as fingers, hands, voice, eyes, face, or writing dynamics.

ANS: T PTS: 1

39. Antivirus is a technique to protect one network from another "untrusted" network.

ANS: F PTS: 1

40. The most common biometric devices perform retinal eye scans.

ANS: F PTS: 1

41. Access control software ensures that only authorized users gain access to a system through a process
of identification and authentication.

ANS: T PTS: 1

42. Threat monitoring is a technique to protect one network from another "untrusted" network.

ANS: F PTS: 1

43. Application controls restrict access to data, programs, and documentation.

ANS: F PTS: 1

44. An intrusion-detection systems (IDS) logs and monitors who is on or trying to access the network.

ANS: T PTS: 1

45. Intrusion-prevention systems (IPS) actively block unauthorized traffic using rules specified by the
organization.

ANS: T PTS: 1

46. Periodic cleaning, testing, and adjusting of computer equipment is referred to as preventative
maintenance.

ANS: T PTS: 1

47. Computer hacking and cracking is the intentional, unauthorized access to an organization's computer
system, accomplished by bypassing the system's access security controls.

ANS: T PTS: 1

MULTIPLE CHOICE

1. The use of IT resources for enterprise systems and e-business:
a. magnifies the importance of protecting the resources both within and outside of the
organization from risks
b. magnifies the importance of protecting the resources both within but not outside the of the
organization from risks
c. makes it easier to provide internal control risk when IT resources are interlinked
d. none of the above


ANS: A PTS: 1

2. Top 10 management concerns about IT's capability to support an organization's vision and strategy
include all except the following:
a. decline in IT investments during recession
b. overall security of IT assets
c. the Internet
d. need for project management leadership


ANS: C PTS: 1

3. Top security concerns reported by IT security professionals include all the following except:
a. data breaches
b. cyber crimes and cyber attacks
c. data backup
d. workforce mobility


ANS: C PTS: 1

4. Pervasive control plans:
a. are unrelated to applications control plans
b. are a subset of applications control plans
c. influence the effectiveness of applications control plans
d. increase the efficiency of applications control plans


ANS: C PTS: 1

5. COBIT was developed to:
a. provide guidance to managers, users, and auditors on the best practices for the
management of information technology
b. identify specific control plans that should be implemented to reduce the occurrence of
fraud

c. specify the components of an information system that should be installed in an
e-commerce environment
d. suggest the type of information that should be made available for management decision
making


ANS: A PTS: 1

6. The department or function that develops and operates an organization's information systems is often
called the:
a. information systems organization
b. computer operations department
c. controller's office
d. computer technology branch


ANS: A PTS: 1

7. A policy:
a. is a plan or process put in place to guide actions and achieve goals.
b. can compel behavior and enforce penalties for failure to follow.
c. can be used to prevent fraud in an organization.
d. all of the above.


ANS: A PTS: 1

8. COBIT was developed by:
a. COSO
b. IT Governance Institute
c. PCAOB
d. AICPA


ANS: B PTS: 1

9. Quality assurance function:
a. modifies and adapts application software
b. conducts reviews to determine adherence to IT standards
c. analyzes existing applications and proposes solutions
d. supervises applications systems development


ANS: B PTS: 1

10. This IT function's key control concern is that organization and IT strategic objectives are misaligned:
a. CIO
b. quality assurance
c. IT steering committee
d. systems development manager


ANS: C PTS: 1

11. ____ can consist of many computers and related equipment connected together via a network.
a. PCs
b. Servers
c. LAN
d. Firewall


ANS: C PTS: 1

12. In an information systems organization, which of the following reporting relationships makes the least
sense?
a. The data center manager reports to the CIO.
b. The systems development manager reports to the data center manager.
c. Database administration reports to the technical services manager.
d. The data librarian reports to the data center manager.


ANS: B PTS: 1

13. In an information systems organization, all of the following functions might logically report to the data
center manager except:
a. data control
b. computer operations
c. data librarian
d. quality assurance


ANS: D PTS: 1

14. Managing functional units such as networks, CAD/CAM and systems programming typically is a
major duty of:
a. data center manager
b. systems development
c. technical services manager
d. database administrator


ANS: C PTS: 1

15. From the standpoint of achieving the operations system control goal of security of resources, which of
the following segregation of duties possibilities is least important?
a. between systems programming and computer operations
b. between data control and data preparation personnel
c. between systems development and computer operators
d. between technical services and data center


ANS: B PTS: 1

16. A key control concern is that certain people within an organization have easy access to applications
programs and data files. The people are:
a. data librarians
b. systems programmers
c. systems development
d. data center managers


ANS: B PTS: 1

17. Which of the following has the major duties of prioritizing and selecting IT projects and resources?
a. steering committee
b. security officer
c. CIO
d. systems development manager


ANS: A PTS: 1

18. Which of the following has the responsibility to ensure the security of all IT resources?
a. steering committee
b. security officer

c. CIO
d. systems development manager


ANS: B PTS: 1

19. Which of the following has the responsibility of efficient and effective operation of IT?
a. steering committee
b. security officer
c. CIO
d. systems development manager


ANS: C PTS: 1

20. In an information systems organizational structure, the function of ____ is the central point from
which to control data and is a central point of vulnerability.
a. data control
b. data entry
c. data librarian
d. database administration


ANS: D PTS: 1

21. The control concern that there will be a high risk of data conversion errors relates primarily to which
of the following information systems functions?
a. data control
b. data entry
c. data librarian
d. database administration


ANS: B PTS: 1

22. The controlled access to data, programs, and documentation is a principal responsibility of which of
the following functions?
a. data control
b. data preparation (data entry)
c. data librarian
d. computer operator


ANS: C PTS: 1

23. Which of the following is not one of COBIT's four broad IT control process domains?
a. plan and organize
b. acquire and implement
c. repair and replace
d. monitor and evaluate


ANS: C PTS: 1

24. Which of the following is not a strategic planning process?
a. IT-related requirements to comply with industry, regulatory, legal, and contractual
obligations, including privacy, transborder data flows, e-business, and insurance contracts.
b. Acquisition and development schedules for hardware, software, and application systems
and for personnel and financial requirements.
c. Systems development life cycle adoption to ensure that comprehensive documentation is
developed for each application.
d. An inventory of current IT capabilities.

ANS: C PTS: 1

25. Which one of the following personnel is not involved in safeguarding resources resulting from
consummating events?
a. security officer
b. technical service manager
c. database administrator
d. CIO


ANS: D PTS: 1

26. The segregation of duties control plan consists of separating all of the following event-processing
functions except:
a. planning events
b. authorizing events
c. executing events
d. recording events


ANS: A PTS: 1

27. A warehouse clerk manually completing an order document and forwarding it to purchasing for
approval is an example of:
a. authorizing events
b. executing events
c. recording events
d. safeguarding resources


ANS: B PTS: 1

28. Specifications for availability, reliability, performance, capacity for growth, levels of user support,
disaster recovery, security, minimal system functionality, and service charges are included in:
a. application documentation
b. service-level requirements
c. business continuity plan
d. security plan


ANS: B PTS: 1

29. Approving a customer credit purchase would be an example of which basic events processing
function?
a. authorizing events
b. executing events
c. recording events
d. safeguarding resources


ANS: A PTS: 1

30. Which of the following statements is true?
a. Management has a legal responsibility to protect an organization’s informational assets.
b. Proper protection of organizational information from unauthorized use required both
physical and logical controls.
c. The unauthorized disclosure of financial information is a violation of federal securities
laws.
d. All of the above.

ANS: D PTS: 1

31. An outside auditing firm annually supervises a physical count of the items in a retail store's shelf
inventory. This is an example of:
a. authorizing events
b. executing events
c. recording events
d. safeguarding resources


ANS: D PTS: 1

32. A warehouse supervisor prepares a sales order listing items to be shipped to a customer and then signs
it approving the removal of the items from the warehouse. The supervisor is performing which
functions?
a. authorizing events and safeguarding of resources
b. executing and recording events
c. authorizing and executing events
d. authorizing and recording events


ANS: C PTS: 1

33. A clerk receives checks and customer receipts in the mail. He endorses the checks, fills out the deposit
slip, and posts the checks to the cash receipts events data. The clerk is exercising which functions?
a. recording and executing events
b. authorizing and executing events
c. recording and authorizing events
d. safeguarding of resources and authorizing events


ANS: A PTS: 1

34. When segregation of duties cannot be effectively implemented because the organization is too small,
we may rely on a more intensive implementation of other control plans such as personnel control
plans. This is called:
a. collusion controls
b. compensatory controls
c. authorizing controls
d. inventory controls


ANS: B PTS: 1

35. COBIT 5:
a. shifts the center of attention from IT to governance.
b. can be implemented by updating from COBIT 4.1.
c. does not have the enablers used in COBIT 4.1
d. all of the above.


ANS: A PTS: 1

36. Which of the following control plans is not a retention control plan?
a. creative and challenging work opportunities
b. occasional performance evaluations
c. competitive reward structure
d. viable career paths


ANS: B PTS: 1

37. Personnel development control plans consist of each of the following except:
a. checking employment references
b. providing sufficient and timely training
c. supporting employee educational interests and pursuits
d. performing scheduled evaluations


ANS: A PTS: 1

38. The primary reasons for performing regular employee performance reviews include all of the
following except:
a. determine whether an employee is satisfying the requirements indicated by a job
description
b. assess an employee's strengths and weaknesses
c. assist management in determining salary adjustments, promotions, or terminations
d. develop a strategy for filling necessary positions


ANS: D PTS: 1

39. A policy that requires employees to alternate jobs periodically is called:
a. segregation of duties
b. forced vacations
c. rotation of duties
d. personnel planning


ANS: C PTS: 1

40. A control plan that is designed to detect a fraud by having one employee periodically do the job of
another employee is called:
a. segregation of duties
b. forced vacations
c. periodic audits
d. management control


ANS: B PTS: 1

41. A mechanism by which a company is reimbursed for any loss that occurs when an employee commits
fraud is called a:
a. segregation of duties
b. fidelity bond
c. personnel planning control
d. termination control plan


ANS: B PTS: 1

42. Which of the following personnel security control plans is corrective in nature as opposed to being a
preventive or detective control plan?
a. rotation of duties
b. fidelity bonding
c. forced vacations
d. performing scheduled evaluations


ANS: B PTS: 1

43. Personnel termination control plans might include all of the following except:
a. require immediate separation
b. identify the employee's reasons for leaving

c. establish a policy of forced vacations
d. collect the employee's keys, badges, etc.


ANS: C PTS: 1

44. Instructions for computer setup, required data, restart procedures, and error messages are typically
contained in a(n):
a. systems development standards manual
b. program documentation manual
c. operations run manual
d. application documentation manual


ANS: C PTS: 1

45. Application documentation that describes the application and contains instructions for preparing inputs
and using outputs is a(n):
a. operations run manual
b. user manual
c. program documentation
d. systems documentation


ANS: B PTS: 1

46. Alternative names for contingency planning include all of the following except:
a. disaster recovery planning
b. business interruption planning
c. business disaster planning
d. business continuity planning


ANS: C PTS: 1

47. A data replication strategy where all data changes are data stamped and saved to secondary systems as
the changes are happening is called:
a. mirror site
b. electronic vaulting
c. continuous data protection (CDP)
d. Dumping


ANS: C PTS: 1

48. All of the following are components of a backup and recovery strategy except:
a. echo checking
b. mirror site
c. electronic vaulting
d. hot site


ANS: A PTS: 1

49. Which of the following statements related to denial of service attacks is false?
a. Insurance is available to offset the losses suffered by denial of service attacks.
b. A denial of service attack is designed to overwhelm a Web site, making it incapable of
performing normal functions.
c. Web sites can employ filters to sense multiple messages from a single site.
d. The most effective attacks originate from a small cluster of computers in a remote
geographic region.

ANS: D PTS: 1

50. In an on-line computer system, restricting user access to programs and data files includes all of the
following except:
a. user identification
b. user authentication
c. determining user access rights
d. wearing identification badges


ANS: D PTS: 1

51. Sending out an e-mail pretending to be a legitimate business asking for information about a person's
account is called:
a. dumpster diving
b. phishing
c. smoozing
d. shoulder surfing


ANS: B PTS: 1

52. Which of the following controls restrict access to programs, data, and documentation?
a. library controls
b. password controls
c. authentication controls
d. program change controls


ANS: A PTS: 1

53. This logs and monitors who is on or trying to access an organization's network.
a. biometrics
b. electronic vaulting
c. intrusion detection systems (IDS)
d. firewall


ANS: C PTS: 1

54. Protecting resources against environmental hazards might include all of the following control plans
except:
a. fire alarms and smoke detectors
b. waterproof ceilings
c. voltage regulators
d. rotation of duties


ANS: D PTS: 1

55. Searching through rubbish for system information such as passwords is called:
a. scavenging
b. phishing
c. smoozing
d. shoulder surfing


ANS: A PTS: 1

COMPLETION

1. ______________________________ is a process that ensures that the enterprise's IT sustains and
extends the organization's strategies and objectives.

ANS: IT governance

PTS: 1

2. ______________________________ controls provide assurance that all modifications to programs are
authorized and documented, and that the changes are completed, tested, and properly implemented.

ANS: Program change

PTS: 1

3. ______________________________ is a process that employs mathematical algorithms and
encryption keys to encode data (i.e., change un-encoded data, called plaintext, to a coded text form,
called ciphertext) so that it is unintelligible.

ANS: Data encryption

PTS: 1

4. ______________________________ are particularly important because they operate across all
business processes and affect a company's capability to meet a multitude of control goals.

ANS: Pervasive controls

PTS: 1

5. ______________________________ in an internal control system means assessment by management
to determine whether the control plans in place are continuing to function appropriately over time.

ANS: Monitoring

PTS: 1

6. The function composed of people, procedures, and equipment and is typically called the information
systems department, IS department, or IT department is the ______________________________.

ANS:
information systems organization
IS organization

PTS: 1

7. The ______________________________ coordinates the organizational and IT strategic planning
processes and reviews and approves the strategic IT plan.

ANS: IT steering committee

PTS: 1

8. The ______________________________ is charged with safeguarding the IT organization.

ANS: security officer

PTS: 1

9. Management should establish a(n) ______________________________ plan and implement related
activities, including reviews, audits, and inspections, to ensure the attainment of IT customer
requirements.

ANS:
quality assurance
quality assurance (QA)
QA

PTS: 1

10. The ______________________________ group is responsible for routing all work in to and out of the
data center, correcting errors, and monitoring all error correction.

ANS: data control

PTS: 1

11. The ______________________________ function provides efficient and effective operation of the
computer equipment by performing tasks such as mounting tapes, disks, and other media and
monitoring equipment operation.

ANS: computer operations

PTS: 1

12. The ______________________________ maintains custody of and controls access to programs, files,
and documentation.

ANS: data librarian

PTS: 1

13. Combining the functions of authorizing and executing events is a violation of the organizational
control plan known as ______________________________.

ANS: segregation of duties

PTS: 1

14. Segregation of duties consists of separating the four functions of authorizing events,
______________________________ events, ______________________________ events, and
safeguarding the resources resulting from consummating the events.

ANS:
executing, recording
recording, executing

PTS: 1

15. One method for circumventing segregation of duties is ______________________________ between
one or more persons (or departments) to exploit a system and conceal an abuse such as fraud.

ANS: collusion

PTS: 1

16. A small organization that does not have enough personnel to adequately segregate duties must rely on
alternative controls, commonly called ______________________________.

ANS: compensatory controls

PTS: 1

17. The functions of the ______________________________ commonly include assigning passwords and
making sure the IT organization is secure from physical threats.

ANS: security officer

PTS: 1

18. The trust service principle of processing ______________________________ determines whether
processing is complete, accurate, timely and authorized.

ANS: integrity

PTS: 1

19. The policy of requiring an employee to alternate jobs periodically is known as
______________________________.

ANS: rotation of duties

PTS: 1

20. ______________________________ is a policy of requiring an employee to take leave from the job
and substituting another employee in his or her place.

ANS: Forced vacations

PTS: 1

21. A(n) ______________________________ indemnifies a company in case it suffers losses from
defalcations committed by its employees.

ANS: fidelity bond

PTS: 1

22. The ______________________________ covers the progression of information systems through the
systems development process, from birth, through implementation, to ongoing use and modification.

ANS:
system development life cycle (SDLC)

system development life cycle
SDLC

PTS: 1

23. Computer software that is used to facilitate the execution of a given business process is called
______________________________.

ANS: application software

PTS: 1

24. The ______________________________ documentation portion of application documentation
provides an overall description of the application, including the system's purpose; an overview of
system procedures; and sample source documents, outputs, and reports.

ANS:
systems
system

PTS: 1

25. ______________________________ documentation provides a description of an application computer
program and usually includes the program's purpose, program flowcharts, and source code listings.

ANS: Program

PTS: 1

26. The ______________________________ gives detailed instructions to computer operators and to data
control about a particular application.

ANS: operations run manual

PTS: 1

27. The ______________________________ describes user procedures for an application and assists the
user in preparing inputs and using outputs.

ANS: user manual

PTS: 1

28. ______________________________ are documents that help users learn their jobs and perform
consistently in those jobs.

ANS: Training materials

PTS: 1

29. ______________________________ controls restrict access to data, programs and documentation.

ANS: Library

PTS: 1

30. The terms ______________________________ planning, disaster recovery planning, business
interruption planning, and business continuity planning have all been used to describe the backup and
recovery control plans designed to ensure that an organization can recover from a major calamity.

ANS: contingency

PTS: 1

31. ______________________________ is a service whereby data changes are automatically transmitted
over the Internet on a continuous basis to an off-site server maintained by a third party.

ANS: Electronic vaulting

PTS: 1

32. With the data replication strategy known as ______________________________ all data changes are
data stamped and saved to secondary systems as the changes are happening.

ANS:
continuous data protection (CDP)
continuous data protection
CDP

PTS: 1

33. The disaster recovery strategy known as a(n) ______________________________ is a fully equipped
data center that is made available on a standby basis to client companies for a monthly subscriber's fee.

ANS: hot site

PTS: 1

34. A facility usually comprised of air-conditioned space with a raised floor, telephone connections, and
computer ports, into which a subscriber can move equipment, is called a(n)
______________________________.

ANS: cold site

PTS: 1

35. In a(n) ______________________________ a Web site is overwhelmed by an intentional onslaught of
thousands of simultaneous messages, making it impossible for the attacked site to engage in its normal
activities.

ANS: denial of service attack

PTS: 1

36. ______________________________ identification systems identify authorized personnel through
some unique physical trait such as fingers, hands, voice, eyes, face, and writing dynamics.

ANS: Biometric

PTS: 1

37. A(n) ______________________________ is a technique to protect one network from another
"untrusted" network.

ANS: firewall

PTS: 1

38. The most common biometric devices read ______________________________.

ANS: fingerprints

PTS: 1

39. In an online environment, ______________________________ ensures that only authorized users
gain access to a system through a process of identification (e.g., a unique account number for each
user) and authentication.

ANS: access control software

PTS: 1

40. COBIT 5 has two main components: five _____________ and seven ________________.

ANS:
GEIT principles, enablers
governance of enterprise IT principles, enablers

PTS: 1

41. Periodic cleaning, testing, and adjusting of computer equipment is referred to as
______________________________.

ANS: preventive maintenance

PTS: 1

42. ______________________________ is the intentional unauthorized access of an organization's
computer system, accomplished by bypassing the system's access security controls.

ANS:
Computer hacking and cracking
Computer hacking
Computer cracking

PTS: 1

43. Copies of important stored data, programs, and documentation made periodically are called
______________________________.

ANS: backups

PTS: 1

44. The process whereby lost data is restored and operations are continued is called
______________________________.

ANS: recovery

PTS: 1

45. The site that maintains copies of a primary computing site's programs and data is a(n)
______________________________ site.

ANS: mirror

PTS: 1

46. A(n) ______________________________ uses many computers, called zombies, that unwittingly
cooperate in a denial-of-service attack by sending messages to the target Web site.

ANS: distributed denial-of-service attack

PTS: 1

47. The ______________________________ logs and monitors who is on or is trying to access the
network.

ANS:
intrusion-detection system (IDS)
intrusion-detection system
IDS

PTS: 1

48. The ______________________________ actively blocks unauthorized traffic using rules specified by
an organization.

ANS:
intrusion-prevention system (IPS)
intrusion-prevention system
IPS

PTS: 1

49. Watching a user type in passwords or user IDs or listening as they give account information over the
phone is called ______________________________.

ANS: shoulder surfing

PTS: 1

50. ______________________________ is when a hacker calls and requests a password based on some
pretext.

ANS: Smoozing

Exploring the Variety of Random
Documents with Different Content

PLEASE READ THIS BEFORE YOU DISTRIBUTE OR USE THIS WORK
To protect the Project Gutenberg™ mission of promoting the
free distribution of electronic works, by using or distributing this
work (or any other work associated in any way with the phrase
“Project Gutenberg”), you agree to comply with all the terms of
the Full Project Gutenberg™ License available with this file or
online at www.gutenberg.org/license.
Section 1. General Terms of Use and
Redistributing Project Gutenberg™
electronic works
1.A. By reading or using any part of this Project Gutenberg™
electronic work, you indicate that you have read, understand,
agree to and accept all the terms of this license and intellectual
property (trademark/copyright) agreement. If you do not agree
to abide by all the terms of this agreement, you must cease
using and return or destroy all copies of Project Gutenberg™
electronic works in your possession. If you paid a fee for
obtaining a copy of or access to a Project Gutenberg™
electronic work and you do not agree to be bound by the terms
of this agreement, you may obtain a refund from the person or
entity to whom you paid the fee as set forth in paragraph 1.E.8.
1.B. “Project Gutenberg” is a registered trademark. It may only
be used on or associated in any way with an electronic work by
people who agree to be bound by the terms of this agreement.
There are a few things that you can do with most Project
Gutenberg™ electronic works even without complying with the
full terms of this agreement. See paragraph 1.C below. There
are a lot of things you can do with Project Gutenberg™
electronic works if you follow the terms of this agreement and
help preserve free future access to Project Gutenberg™
electronic works. See paragraph 1.E below.

1.C. The Project Gutenberg Literary Archive Foundation (“the
Foundation” or PGLAF), owns a compilation copyright in the
collection of Project Gutenberg™ electronic works. Nearly all the
individual works in the collection are in the public domain in the
United States. If an individual work is unprotected by copyright
law in the United States and you are located in the United
States, we do not claim a right to prevent you from copying,
distributing, performing, displaying or creating derivative works
based on the work as long as all references to Project
Gutenberg are removed. Of course, we hope that you will
support the Project Gutenberg™ mission of promoting free
access to electronic works by freely sharing Project Gutenberg™
works in compliance with the terms of this agreement for
keeping the Project Gutenberg™ name associated with the
work. You can easily comply with the terms of this agreement
by keeping this work in the same format with its attached full
Project Gutenberg™ License when you share it without charge
with others.
1.D. The copyright laws of the place where you are located also
govern what you can do with this work. Copyright laws in most
countries are in a constant state of change. If you are outside
the United States, check the laws of your country in addition to
the terms of this agreement before downloading, copying,
displaying, performing, distributing or creating derivative works
based on this work or any other Project Gutenberg™ work. The
Foundation makes no representations concerning the copyright
status of any work in any country other than the United States.
1.E. Unless you have removed all references to Project
Gutenberg:
1.E.1. The following sentence, with active links to, or other
immediate access to, the full Project Gutenberg™ License must
appear prominently whenever any copy of a Project
Gutenberg™ work (any work on which the phrase “Project

Gutenberg” appears, or with which the phrase “Project
Gutenberg” is associated) is accessed, displayed, performed,
viewed, copied or distributed:
This eBook is for the use of anyone anywhere in
the United States and most other parts of the
world at no cost and with almost no restrictions
whatsoever. You may copy it, give it away or re-
use it under the terms of the Project Gutenberg
License included with this eBook or online at
www.gutenberg.org. If you are not located in the
United States, you will have to check the laws of
the country where you are located before using
this eBook.
1.E.2. If an individual Project Gutenberg™ electronic work is
derived from texts not protected by U.S. copyright law (does not
contain a notice indicating that it is posted with permission of
the copyright holder), the work can be copied and distributed to
anyone in the United States without paying any fees or charges.
If you are redistributing or providing access to a work with the
phrase “Project Gutenberg” associated with or appearing on the
work, you must comply either with the requirements of
paragraphs 1.E.1 through 1.E.7 or obtain permission for the use
of the work and the Project Gutenberg™ trademark as set forth
in paragraphs 1.E.8 or 1.E.9.
1.E.3. If an individual Project Gutenberg™ electronic work is
posted with the permission of the copyright holder, your use and
distribution must comply with both paragraphs 1.E.1 through
1.E.7 and any additional terms imposed by the copyright holder.
Additional terms will be linked to the Project Gutenberg™
License for all works posted with the permission of the copyright
holder found at the beginning of this work.

1.E.4. Do not unlink or detach or remove the full Project
Gutenberg™ License terms from this work, or any files
containing a part of this work or any other work associated with
Project Gutenberg™.
1.E.5. Do not copy, display, perform, distribute or redistribute
this electronic work, or any part of this electronic work, without
prominently displaying the sentence set forth in paragraph 1.E.1
with active links or immediate access to the full terms of the
Project Gutenberg™ License.
1.E.6. You may convert to and distribute this work in any binary,
compressed, marked up, nonproprietary or proprietary form,
including any word processing or hypertext form. However, if
you provide access to or distribute copies of a Project
Gutenberg™ work in a format other than “Plain Vanilla ASCII” or
other format used in the official version posted on the official
Project Gutenberg™ website (www.gutenberg.org), you must,
at no additional cost, fee or expense to the user, provide a copy,
a means of exporting a copy, or a means of obtaining a copy
upon request, of the work in its original “Plain Vanilla ASCII” or
other form. Any alternate format must include the full Project
Gutenberg™ License as specified in paragraph 1.E.1.
1.E.7. Do not charge a fee for access to, viewing, displaying,
performing, copying or distributing any Project Gutenberg™
works unless you comply with paragraph 1.E.8 or 1.E.9.
1.E.8. You may charge a reasonable fee for copies of or
providing access to or distributing Project Gutenberg™
electronic works provided that:
• You pay a royalty fee of 20% of the gross profits you derive
from the use of Project Gutenberg™ works calculated using the
method you already use to calculate your applicable taxes. The
fee is owed to the owner of the Project Gutenberg™ trademark,

but he has agreed to donate royalties under this paragraph to
the Project Gutenberg Literary Archive Foundation. Royalty
payments must be paid within 60 days following each date on
which you prepare (or are legally required to prepare) your
periodic tax returns. Royalty payments should be clearly marked
as such and sent to the Project Gutenberg Literary Archive
Foundation at the address specified in Section 4, “Information
about donations to the Project Gutenberg Literary Archive
Foundation.”
• You provide a full refund of any money paid by a user who
notifies you in writing (or by e-mail) within 30 days of receipt
that s/he does not agree to the terms of the full Project
Gutenberg™ License. You must require such a user to return or
destroy all copies of the works possessed in a physical medium
and discontinue all use of and all access to other copies of
Project Gutenberg™ works.
• You provide, in accordance with paragraph 1.F.3, a full refund of
any money paid for a work or a replacement copy, if a defect in
the electronic work is discovered and reported to you within 90
days of receipt of the work.
• You comply with all other terms of this agreement for free
distribution of Project Gutenberg™ works.
1.E.9. If you wish to charge a fee or distribute a Project
Gutenberg™ electronic work or group of works on different
terms than are set forth in this agreement, you must obtain
permission in writing from the Project Gutenberg Literary
Archive Foundation, the manager of the Project Gutenberg™
trademark. Contact the Foundation as set forth in Section 3
below.
1.F.

1.F.1. Project Gutenberg volunteers and employees expend
considerable effort to identify, do copyright research on,
transcribe and proofread works not protected by U.S. copyright
law in creating the Project Gutenberg™ collection. Despite these
efforts, Project Gutenberg™ electronic works, and the medium
on which they may be stored, may contain “Defects,” such as,
but not limited to, incomplete, inaccurate or corrupt data,
transcription errors, a copyright or other intellectual property
infringement, a defective or damaged disk or other medium, a
computer virus, or computer codes that damage or cannot be
read by your equipment.
1.F.2. LIMITED WARRANTY, DISCLAIMER OF DAMAGES - Except
for the “Right of Replacement or Refund” described in
paragraph 1.F.3, the Project Gutenberg Literary Archive
Foundation, the owner of the Project Gutenberg™ trademark,
and any other party distributing a Project Gutenberg™ electronic
work under this agreement, disclaim all liability to you for
damages, costs and expenses, including legal fees. YOU AGREE
THAT YOU HAVE NO REMEDIES FOR NEGLIGENCE, STRICT
LIABILITY, BREACH OF WARRANTY OR BREACH OF CONTRACT
EXCEPT THOSE PROVIDED IN PARAGRAPH 1.F.3. YOU AGREE
THAT THE FOUNDATION, THE TRADEMARK OWNER, AND ANY
DISTRIBUTOR UNDER THIS AGREEMENT WILL NOT BE LIABLE
TO YOU FOR ACTUAL, DIRECT, INDIRECT, CONSEQUENTIAL,
PUNITIVE OR INCIDENTAL DAMAGES EVEN IF YOU GIVE
NOTICE OF THE POSSIBILITY OF SUCH DAMAGE.
1.F.3. LIMITED RIGHT OF REPLACEMENT OR REFUND - If you
discover a defect in this electronic work within 90 days of
receiving it, you can receive a refund of the money (if any) you
paid for it by sending a written explanation to the person you
received the work from. If you received the work on a physical
medium, you must return the medium with your written
explanation. The person or entity that provided you with the
defective work may elect to provide a replacement copy in lieu

of a refund. If you received the work electronically, the person
or entity providing it to you may choose to give you a second
opportunity to receive the work electronically in lieu of a refund.
If the second copy is also defective, you may demand a refund
in writing without further opportunities to fix the problem.
1.F.4. Except for the limited right of replacement or refund set
forth in paragraph 1.F.3, this work is provided to you ‘AS-IS’,
WITH NO OTHER WARRANTIES OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR ANY PURPOSE.
1.F.5. Some states do not allow disclaimers of certain implied
warranties or the exclusion or limitation of certain types of
damages. If any disclaimer or limitation set forth in this
agreement violates the law of the state applicable to this
agreement, the agreement shall be interpreted to make the
maximum disclaimer or limitation permitted by the applicable
state law. The invalidity or unenforceability of any provision of
this agreement shall not void the remaining provisions.
1.F.6. INDEMNITY - You agree to indemnify and hold the
Foundation, the trademark owner, any agent or employee of the
Foundation, anyone providing copies of Project Gutenberg™
electronic works in accordance with this agreement, and any
volunteers associated with the production, promotion and
distribution of Project Gutenberg™ electronic works, harmless
from all liability, costs and expenses, including legal fees, that
arise directly or indirectly from any of the following which you
do or cause to occur: (a) distribution of this or any Project
Gutenberg™ work, (b) alteration, modification, or additions or
deletions to any Project Gutenberg™ work, and (c) any Defect
you cause.

Section 2. Information about the Mission
of Project Gutenberg™
Project Gutenberg™ is synonymous with the free distribution of
electronic works in formats readable by the widest variety of
computers including obsolete, old, middle-aged and new
computers. It exists because of the efforts of hundreds of
volunteers and donations from people in all walks of life.
Volunteers and financial support to provide volunteers with the
assistance they need are critical to reaching Project
Gutenberg™’s goals and ensuring that the Project Gutenberg™
collection will remain freely available for generations to come. In
2001, the Project Gutenberg Literary Archive Foundation was
created to provide a secure and permanent future for Project
Gutenberg™ and future generations. To learn more about the
Project Gutenberg Literary Archive Foundation and how your
efforts and donations can help, see Sections 3 and 4 and the
Foundation information page at www.gutenberg.org.
Section 3. Information about the Project
Gutenberg Literary Archive Foundation
The Project Gutenberg Literary Archive Foundation is a non-
profit 501(c)(3) educational corporation organized under the
laws of the state of Mississippi and granted tax exempt status
by the Internal Revenue Service. The Foundation’s EIN or
federal tax identification number is 64-6221541. Contributions
to the Project Gutenberg Literary Archive Foundation are tax
deductible to the full extent permitted by U.S. federal laws and
your state’s laws.
The Foundation’s business office is located at 809 North 1500
West, Salt Lake City, UT 84116, (801) 596-1887. Email contact

links and up to date contact information can be found at the
Foundation’s website and official page at
www.gutenberg.org/contact
Section 4. Information about Donations to
the Project Gutenberg Literary Archive
Foundation
Project Gutenberg™ depends upon and cannot survive without
widespread public support and donations to carry out its mission
of increasing the number of public domain and licensed works
that can be freely distributed in machine-readable form
accessible by the widest array of equipment including outdated
equipment. Many small donations ($1 to $5,000) are particularly
important to maintaining tax exempt status with the IRS.
The Foundation is committed to complying with the laws
regulating charities and charitable donations in all 50 states of
the United States. Compliance requirements are not uniform
and it takes a considerable effort, much paperwork and many
fees to meet and keep up with these requirements. We do not
solicit donations in locations where we have not received written
confirmation of compliance. To SEND DONATIONS or determine
the status of compliance for any particular state visit
www.gutenberg.org/donate.
While we cannot and do not solicit contributions from states
where we have not met the solicitation requirements, we know
of no prohibition against accepting unsolicited donations from
donors in such states who approach us with offers to donate.
International donations are gratefully accepted, but we cannot
make any statements concerning tax treatment of donations
received from outside the United States. U.S. laws alone swamp
our small staff.

Please check the Project Gutenberg web pages for current
donation methods and addresses. Donations are accepted in a
number of other ways including checks, online payments and
credit card donations. To donate, please visit:
www.gutenberg.org/donate.
Section 5. General Information About
Project Gutenberg™ electronic works
Professor Michael S. Hart was the originator of the Project
Gutenberg™ concept of a library of electronic works that could
be freely shared with anyone. For forty years, he produced and
distributed Project Gutenberg™ eBooks with only a loose
network of volunteer support.
Project Gutenberg™ eBooks are often created from several
printed editions, all of which are confirmed as not protected by
copyright in the U.S. unless a copyright notice is included. Thus,
we do not necessarily keep eBooks in compliance with any
particular paper edition.
Most people start at our website which has the main PG search
facility: www.gutenberg.org.
This website includes information about Project Gutenberg™,
including how to make donations to the Project Gutenberg
Literary Archive Foundation, how to help produce our new
eBooks, and how to subscribe to our email newsletter to hear
about new eBooks.