Information Technology Paper 10

1

A retail entity uses electronic data interchange (EDI) in executing and recording most of its purchase transactions. The entity’s auditor recognized that the documentation of the transactions will be retained for only a short period of time. To compensate for this limitation, the auditor most likely would






2

Which of the following is an encryption feature that can be used to authenticate the originator of a document and ensure that the message is intact and has not been tampered with?






3

In building an electronic data interchange (EDI) system, what process is used to determine which elements in the entity’s computer system correspond to the standard data elements?






4

Which of the following passwords would be most difficult to crack?






5

Which of the following is a password security problem?






6

Many of the Web 2.0 applications rely on an XML-based application that facilitates the sharing and syndication of web content, by subscription, Which of the applications below represents this XML application?






7

Which of the following is not one of the five principles of COBIT 5?






8

The Control Objectives for Information and Related Technology (COBIT) framework has been established by:






9

Which of the following procedures would an entity most likely include in its computer disaster recovery plan?






10

A company is concerned that a power outage or disaster could impair the computer hardware’s ability to function as designed. The company desires off-site backup hardware facilities that are fully configured and ready to operate within several hours. The company most likely should consider a






Result

Total Questions:
Correct Answers:
Wrong Answers:
Percentage: