Information Technology Paper 7

1

A company using EDI made it a practice to track the functional acknowledgments from trading partners and to issue warning messages if acknowledgments did not occur within a reasonable length of time. What risk was the company attempting to address by this practice?






2

Management is concerned that data uploaded from a microcomputer to the company’s mainframe system in batch processing may be erroneous. Which of the following controls would best address this issue?






3

One major category of computer viruses is programs that attach themselves to other programs, thus infecting the other programs. While many of these viruses are relatively harmless, some have the potential to cause significant damage. Which of the following is an indication that a computer virus of this category is present?






4

One major category of computer viruses is programs that attach themselves to other programs, thus infecting the other programs. While many of these viruses are relatively harmless, some have the potential to cause significant damage. Which of the following operating procedures increases an organization’s exposure to computer viruses?






5

Which of the following is a risk that is higher when an electronic funds transfer (EFT) system is used?






6

The use of message encryption software






7

A company’s management is concerned about computer data eavesdropping and wants to maintain the confidentiality of its information as it is transmitted. The company should utilize






8

Which of the following is likely to be a benefit of electronic data interchange (EDI)?






9

The internal auditor is reviewing a new policy on electronic mail. Appropriate elements of such a policy would include all of the following except:






10

Which of the following risks is more likely to be encountered in an end-user computing (EUC) environment as compared to a mainframe computer system?






Result

Total Questions:
Correct Answers:
Wrong Answers:
Percentage: