You are on page 1of 3

Which of the following describes the system used by a company as a testing approach that

utilises real transactions and files rather than hypothetical ones?


Walk-through.
Processing of test transactions.
Acceptance test.
Parallel conversion test.
Which of the following is least likely to be an accountant’s role in the software development life
cycle?
User
Consultant
Auditor
Programmer
When selecting a new accounting program, we need to perform a feasibility study for the
accounting information systems. Which of the following should be considered in the feasibility
study?
Consider costs; savings; controls; profit improvement and other benefits analysed by application
area.
Provide the preliminary plan for converting existing manual systems and clerical operations.
Provide management with assurance from qualified, independent consultants that the use of a
computer system appeared justified.
Include a report by the internal audit department that evaluated internal control features for each
planned application.
Which of the following is NOT one of the tangible or intangible benefits a company might obtain
from purchasing a new system?
Cost savings.
Improved customer service and productivity.
Improved decision making.
Resistance to change.
Organisations that buy rather than develop accounting information systems must still go through
the systems development life cycle.
True.
False.
Not proven.
All of the above.
Which of the following statements is false?
The psychological profiles of white-collar criminals differ from those of violent criminals.
The psychological profiles of white-collar criminals are significantly different from those of the
general public.
There is little difference between computer fraud perpetrators and other types of white-collar
criminals.
Some computer fraud perpetrators do not view themselves as criminals.
An auditor has just completed a review of an organisation that has a mainframe computer and
two database servers where all production data reside. Which of the following weaknesses would
be considered the MOST serious?
The security officer also serves as the database administrator.
Password controls are not administered over the two database servers.
There is no business continuity plan for the mainframe system's non critical applications.
Most local area networks (LANs) do not back up file-server-fixed disks regularly.
Which of the following is NOT one of the difficulties accountants have experienced in using the
traditional systems development life cycle?
Accounting information systems development projects are backlogged for years.
Changes are usually not possible after requirements have been frozen.
The accounting information system that is developed may not meet their needs.
All are difficulties with the software development cycle.
Once fraud has occurred, an organisation can use, the following in reducing losses sustained
from the fraud?
Insurance.
Regular backup of data and programs.
Contingency plan.
Segregation of duties.
Perpetrators redirect a website’s traffic to a bogus website, usually to gain access to personal and
confidential information of an organisation. What is this computer fraud technique called?
Vishing
Phishing
Pharming
Phreaking
Which of the following provides detailed procedures to resolve the problems resulting from a
flash flood that have completely destroyed a company’s data centre?
Backup plan.
Disaster recovery plan (DRP).
Business continuity plan (BCP).
Archive plan.
Which of the following BEST provides access control to payroll data being processed on a local
server?
Logging access to personal information.
Using separate passwords for sensitive transactions.
Using software that restricts access rules to authorised staff.
Restricting system access to business hours.
Financial statements that need to be stored securely for 10 years or more would most likely be
stored in which type of file?
Backup.
Archive.
Encrypted.
Log.
Which of the following is NOT a benefit derived from outsourcing by an organisation?
It offers a great deal of flexibility because it is relatively easy to change outsourcers.
It can provide access to the expertise and special services provided by outsourcers.
It allows companies to move to a more sophisticated level of computing at a reasonable cost.
It is a cost-effective way to handle the peaks and valleys found in seasonal businesses.
Under what circumstances is it appropriate for an organisation to use prototyping?
When there is little uncertainty about the accounting information system.
When it is clear what users’ needs are.
When the final accounting information system cannot be clearly visualised because the decision
process is still unclear.
When there is a very low likelihood of failure.
Confidentiality in the organisation focuses on protecting ______________.
Personal information collected from customers.
A company’s annual report stored on its website.
Merger and acquisition plans.
All of the above.
An organisation decides to purchase a software package instead of developing it. In such a case,
the design and development phases of a traditional software development life cycle would be
replaced with:
Selection and configuration phases.
Feasibility and requirements phases.
Implementation and testing phases.
Nothing; replacement is not required.
When a complete segregation of duties cannot be achieved in an online system environment,
which of the following accounting functions should be separated from the others?
Origination.
Authorisation.
Recording.
Correction.
A weakness that an attacker can take advantage of to either disable or take control of a system is
called a _____________.
Exploit
Patch
Vulnerability
Attack
Which type of audit involves a review of general and application controls, with a focus on
determining whether there is compliance with policies and adequate safeguarding of assets?
Information systems audit.
Financial audit.
Operational audit.
Compliance audit.

You might also like