Final Flashcards

(39 cards)

1
Q

What are common types of cyberattacks?

A

Phishing, malware, DoS, man-in-the-middle, SQL injection, social engineering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What strategy is suggested to distinguish similar-sounding cyberattacks?

A

List them on a reference sheet for quick review.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How are exam questions structured for cyberattacks?

A

Scenario-based questions requiring identification of specific attack types.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the three categories of internal controls?

A

Preventive, Detective, Corrective.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does the Sarbanes-Oxley Act of 2002 require?

A

Internal control reporting, PCAOB creation, improved financial disclosures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the COSO ERM Framework objectives?

A

Strategic, Operations, Reporting, Compliance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the COSO ERM Framework components?

A

Internal environment, objective setting, event identification, risk assessment, risk response, control activities, info/communication, monitoring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are common risk responses in COSO ERM?

A

Avoid, Reduce, Share, Accept.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the COBIT Framework used for?

A

IT control and governance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are key internal control activities?

A

Segregation of duties, proper authorization, system access control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the Trust Services Principles?

A

Security, Availability, Processing Integrity, Confidentiality, Privacy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the Time-Based Security Model formula?

A

P > D + C.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is multi-factor authentication?

A

Uses different types of credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is multi-modal authentication?

A

Uses multiple methods of the same type.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is defense in depth?

A

Using layers of security to reduce breach likelihood.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the difference between authentication and authorization?

A

Authentication verifies identity; authorization defines user permissions.

17
Q

What are ACL and RBAC?

A

Access Control List and Role-Based Access Control.

18
Q

What does Information Rights Management (IRM) do?

A

Restricts access and controls document/email usage.

19
Q

What does Data Loss Prevention (DLP) software do?

A

Detects and prevents unauthorized transmission of sensitive data.

20
Q

What is symmetric encryption?

A

Uses one key; fast but less secure.

21
Q

What is asymmetric encryption?

A

Uses a public/private key pair; slower but more secure.

22
Q

What is hashing used for?

A

Ensures data integrity; one-way transformation.

23
Q

What is a digital signature?

A

Confirms authenticity and integrity.

24
Q

What is a Certificate Authority (CA)?

A

Issues and verifies digital certificates.

25
What is a VPN?
Encrypts internet traffic over public networks.
26
What are input controls used for?
Ensure data accuracy and authorization.
27
What are common input control techniques?
Form design, field checks, limit checks, completeness checks, batch totals.
28
What are processing controls?
Ensure complete and accurate processing.
29
What are examples of processing controls?
File labels, checksums, control totals, spreadsheet integrity.
30
What is fault tolerance?
System operates despite component failure.
31
What are backup types?
Incremental and Differential.
32
What are the types of disaster recovery sites?
Hot Site, Cold Site, Real-Time Mirroring.
33
What are RTO and RPO?
RTO: max downtime; RPO: max data loss.
34
What are the main revenue cycle activities?
Sales order entry, shipping, billing, cash collection.
35
What documents are used in the revenue cycle?
Sales order, picking ticket, packing slip, bill of lading, invoice, remittance advice.
36
What controls prevent invalid orders?
Digital signatures, customer verification.
37
What controls prevent inaccurate billing?
Automated pricing, invoice matching.
38
What controls prevent loss of cash?
Segregation of duties, reconciliation of deposits.
39
What is Table 14-1 useful for?
Summarizing activities, risks, and controls in the revenue cycle.