Information Technology Flashcards

1
Q

digital signature

A

is a mathematical scheme primarily used to verify the authenticity of a signature; it can also be used to ensure that a message, like a signature, has not been tampered with

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Heuristic processing

A

uses judgmental rules in analyzing data rather than a logical approach, which requires greater cognitive skills.

It is useful in ANALYZING data but not in authenticating and making certain it has not been tampered with.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

perimeter switch

A

is a device that allows data to be exchanged between the public Internet and an Intranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

integrated test facility approach

A

the auditor will run fictitious transactions through the client’s system ALONG WITH the client’s data, to make certain that it is receiving the same treatment and enabling the auditor to compare results to expected results.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Parallel simulation

A

actual client data are reprocessed using an auditor software program

involves running the client’s data through an auditor-developed software package. The auditor can compare the results to the client’s results to see if the client’s system processed the data similarly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

self-checking digit

A

in which a formula is applied to determine if an identification number, such as an employee number, customer number or invoice number, is valid. Under this control, identification numbers are assigned applying the formula and someone desiring to commit fraud by create a false identification number would need to know the formula in order to do so.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

test data approach

A

allows the auditor to introduce examples of valid and invalid transactions to determine how the client’s system will handle them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

embedded audit module

A

is an audit system inserted into the client’s system as a monitoring device to apply audit procedures to client data throughout the period, which can be difficult to design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A snapshot application

A

involves applying procedures to a specific set of data or at a specific point in time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

integrated data check

A

involves integrating test data with the client’s data so that the auditor can see how the client’s system processes it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A test data generator

A

used to develop data to be run through the client’s system to test it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The record count is

A

the number of items in a batch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

remote node router is

A

a device used to connect two networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Frame relay protocol refers to

A

a method of transporting data over a wide area network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

firewall

A

is set up as an electronic boundary to prevent a user from having access to programs or data that they are not authorized to have

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

router

A

is designed to facilitate the flow of information

17
Q

gateway

A

is a means of entry into a program or set of data

18
Q

Heuristic

A

refers to a method of analysis based on rules, rather than logic

19
Q

Trojan horse program

A

is one that appears to be doing something desirable while, instead, corrupting data or inserting a virus.

20
Q

hoax virus

A

generally a message indicating that a virus threat exists when it does not

21
Q

web crawler

A

is a program that systematically browses the Internet for indexing purposes

22
Q

IT is most effective when

A

used to process large volumes of similar items

information can be processed immediately, making information available on a more timely basis.

23
Q

CPA SysTrust engagement

A

is an attestation engagement in which the client’s system is evaluated and a report is issued addressing its reliability

24
Q

CPA WebMaster engagement, also referred to as a WebTrust engagement

A

provides assurance as to whether the client’s website complies with certain criteria applicable to e-commerce

25
Q

Analytical procedures involve

A

comparing auditor expectations to client data, regardless of its source, to evaluate the reasonableness of the client’s data