Which of the following best describes a reason that companies would want assurance on their XBRL filings?

The SEC’s rule titled “Interactive Data to Improve Financial Reporting” resulted in which of the following?

Large accelerated filers must now format their financial statements using XBRL.

A data warehouse may include:

General Economic Information

Consider the following BPMN diagram of a subprocess. Which of the following is required to correct an error in the diagram?

Add a sequence flow to an end event after the discard errors activity.

Which of the following is a set of standards created by the AICPA for data files and fields in order to support external audits?

Audit Data Standards (ADS).

Data mining may uncover relationships in which no causality should be implied. In these cases, which of the following phases would be most appropriate?

“A is associated with B.”

According to COSO which of the following is not a component of internal control?

Before data from multiple sources can be loaded into the data warehouse, which of the following activities must be performed?

Data inconsistencies must be removed so that the warehouse has homogeneous data for analysis and reporting purposes.

Which of the following IT controls would best prevent a developer from inappropriately accessing the system?

Which of the following best describes a difference between Excel and Power BI?

There are no key differences described in this text.

The overall attitude and awareness of a firm's top management and board of directors concerning the importance of internal control is often reflected in its:

Which of the following would not help create a appropriate question in the AMPS model?

Ensuring the data has integrity.

A RAID array implemented in a data center is an example of which of the following?

All of the following are examples of internal control procedures except

Processing customer satisfaction surveys

If a Chief Technology Officer wanted to ensure a new system had appropriate processing controls which of the following would he/she require?

In addition to focusing on controls, COBIT 5 expands its scope by incorporating which of the following broad perpsectives?

How IT brings value to the firm.

Review the following BPMN activity diagram. In this conversion process, the quantities of raw materials to be released is calculated based on which information?

Which of the following not one of the reasons that the conversion process is typically considered more complicated than the sales and collections and the purchases and payments processes?

Many companies do not have a conversion process.

Which of the following is the least likely example of how a specialized digital dashboard might be used?

To track fixed asset depreciation.

Select a correct statement regarding encryption methods?

When conducting e-business, most companies use both symmetric-key and asymmetric-key encryption methods.

Which of the following is not an example of data questions which arise during the second step of the AMPS model, mastering the data?

A document containing XBRL elements is called a(n):

When creating a UML class diagram to support the conversion process, which of the following approaches provides a way to meet both accounting and general management information requirements?

Review the following diagram. Which answer provides the best interpretation of the multiplicities for the association between the Employees and the Labor Operations classes?

An employee may not perform any labor operations.

What Microsoft tool would most likely be used to create a complex visualization using a large amount of data?

Sound internal control dictates that immediately upon receiving checks from customers by mail, a responsible employee should

Prepare a summary listing of checks received.

Which of the following is a key difference between Bitcoin and Ethereum?

Ethereum employs smart contracts.

Select a correct statement regarding a hashing process.

The outcome is a message digest.

Which of the following does not represent a viable data backup method?

Which statement below describes the relationship between artificial intelligence and machine learning?

Artificial intelligence is like a database and machine learning is like a table in the database.

The IT Infrastructure Libarary (ITIL) is considered a de facto standard in which of the following regions?

Which of the following is not an example of a physical security vulnerability?

Poor choice of passwords.

ableau can source data from all of the following except?

Ford may use business intelligence for all of the following except:

Prepare activity models using BPM.

In which of the following situations would blockchain add value?

Multiple parties that do not trust each other want to collaborate.

When using an analytical mindset which of the following is the first task?

What is not a general function of blockchain technology?

Which of the following represents an inherent risk for a financial institution?

The economy goes into a recession.

The ISO 27000 Series of standards are designed to address which of the following?

Information security issues.

Which of the following describes the recommended prerequisites for managing vulnerabilities?

Determine the main objective of vulnerability management, and assign roles and responsibilities.

A well controlled conversion process would likely have which of the following roles seperated into swimlanes?

Accounts Payable Manager and Receiving Employee.

Which type of analysis assists with defining how to optimize performance based on a potential constraint?

Which of the following best describes the Get Data step in preparing data and developing a visualization?

Understand and clean the data for use.

Why do Certificate Authority (CA) play an important role in a company's information security management?

Most companies use CA to manage their employees’ public keys.

Which of the following metrics would be most likely to show up on a Digital Dashboard for a retail organization?

Abandoned Shopping Carts for retailer’s website.

Which of the following is the most likely primary key for the Materials table?

In a BPMN activity diagram, what does the following symbol represent? (Looks like a circular arrow and boxed plus sign)

A looping collapsed subprocess.

The framework to be used by management in its internal control assessment under requirements of SOX is the:

All of the choices are correct.

Which of the following best represents the virtuous cycle of machine learning?

Input customer purchase data→Learn pattern→Predict future purchases.

Which of the following is not one of the skill sets often associated with data analytics?

Which of the following does not facilitate business decision-making activities?

An entity doing business on the internet most likely could use any of the following methods to prevent unauthorized intruders from accessing proprietary information except:

What type of tables does Excel use to create data visualization?

Which of the following is a password security weakness?

Users are assigned passwords when accounts are created, but do not change them.

How often is a block added to Ethereum?

Asymmetric-key encryption uses which of the following techniques to allow users to communicate securely?

A public key and a private key.

Both ISACA and the GTAG define vulnerability. Which of the following does not represent one of these definitions?

An organizations’ exposure to disaster.

Which of the following is not considered a data visualization tool?

Which of the following is not one of the main components of vulnerability management and assessment?

Which one of the following is not an example of machine learning assisting in an audit?

Reviewing organization charts.

Which of the following controls would most likely assure that a company can reconstruct its financial records?

Backup data are tested and stored safely.

Data mining is considered a technique of:

Which of the following is an example of an appropriate question to begin analyzing a business problem?

Why is our newest product not selling as expected in Kentucky?

Which type of blockchain offers economic reward for the computational proof of work in mining?

Which type of chart is best to describe the economic conditions of each country?

Which of the following is least likely to appear in a Digital Dashboard:

Expected Fed Fund rate changes

What is the primary objective of data security controls?

To ensure that data storage media are subject to authorization prior to access, change, or destruction.

Which of the following is not accurate regarding blockchain?

Only the administrator keeps a copy of the entire database.

Which of the following should an analyst not do when on the second step of the AMPS model, mastering the data?

Which type of blockchain would a corporation and their key supplier set up to facilitate transactions?

Which of the following is not one of the responses to risk presented in COSO ERM?

To be considered blockchain a technology must have all of the following except:

Tracing shipping documents to pre-numbered sales invoices provides evidence that:

Shipments to customers were properly invoiced.

According to COSO 2013, which of the following components of the enterprise risk management addresses an entity’s integrity and ethical values?

All of the following are the primary functions of internal controls except:

The Public Company Accounting Oversight Board (PCAOB) is not responsible for standards related to:

Which type of chart is best to show a persons’ weight over time?

Which type of analysis assists with understanding what is happening right now?

Reconciliation of cash accounts may be referred to as what type of control?

Which of the following is an activity performed as part of data visualization?

Selecting the data visualization tool.

Which of the following least reflects the purpose of a business rule in the conversion process?

Return defective items to suppliers promptly.

Which of the following is not a common step in preparing data and developing visualizations?

Assess the data cost versus its value.

XBRL GL, or XBRL Global Ledger Taxonomy, is different from XBRL US GAAP because it facilitates:

Efficient communication within a firm.

Select a correct statement regarding encryption methods?

When conducting e-business, most companies use both symmetric-key and asymmetric-key encryption methods.

Which of the following is not one of the common techniques for information security risks and attacks?

Which of the following is the best reason that a collaboration model would not be used to diagram the conversion process?

All conversion activities are internal to the organization.

Which of the following is not a basic activity in the conversion process?

When an accounting team automates account reconciliations this is an example of:

Robotic process automation.

Review the following diagram. Which answer provides the best interpretation of the multiplicities for the association between the Employees and Production Authorization classes?

One employee can authorize production multiple times.

In February 2009, the _____ passed the rule requiring all large domestic publicly traded firms to begin formatting their financial statements using XBRL.

Securities and Exchange Commission.

The steps in business intelligence include:

Gather Information, Analyze Data for Patterns, Make Decision

Which of the following may be the result of data mining?

Items frequently bought in combination.

eXtensible Business Reporting Language

Which of the following is the most likely foreign key for the Bill of Materials table?

Data warehouses that focus on facilitating managerial accounting needs and/or management by exception, can be called:

Decision Support Systems.

Which of the following best describes how external auditors’ interactions with their clients is likely to change due to the use of data analytics in the audit process?

External auditors will stay engaged with clients beyond the audit.

Which of the following is not a component of COSO ERM 2017?

Which of the following is not an example of a measure in Tableau?

All of these are examples of measures.

Review of the audit log is an example of which of the following types of security control?

Which of the following best describes the skill sets used in data analytics?

Acquiring/cleansing data; Creating data structures/models; Mining/analyzing data.

What is the first step to get data when using Tableau?

Select Connect>To a file.

Before data from multiple sources can be loaded into the data warehouse, which of the following activities must be performed?

Data inconsistencies must be removed so that the warehouse has homogeneous data for analysis and reporting purposes.

Which of the following areas of financial reporting is most suitable for applying data analytics techniques?

Evaluation of estimates and valuations.

Which type of chart would best show outbreaks of the flu by region?

According to COSO ERM, which of the following is not one of the bases that should be used to analyze the risks of an identified event?

What must first be added to the page when creating a visualization in Power BI?

Which of the following statements is incorrect?

A fraud prevention program should include an evaluation on the efficiency of business processes.

Which of the following is not benefit of blockchain?

Past information is easily edited.

Which type of chart is best for time trend data?

Review the following diagram. Which answer provides the best interpretation of the multiplicities for the association between the Employees and the Labor Operations classes?

An employee may not perform any labor operations.

Blockchain was built to minimize the use of:

Data Mining uses which of the following approaches to analyze data and find new patterns and trends?

Sophisticated statistical techniques.

Which of the following control activities should be taken to reduce the risk of incorrect processing in a newly installed computerized accounting system?

Independently verify the transactions.

Review the following diagram. Which answer provides the best interpretation of the multiplicities for the association between the Materials and the Materials Issue classes?

A Material Issue must include at least one material, but may include many materials.

When a bank has an input file of FICO scores and uses machine learning to help predict credit losses for each customer, they are likely using which type of learning?

Which of the following metrics would be least likely to show up on a Digital Dashboard?

Accumulated depreciation for the previous year

Power BI can source data from all of the following except?

All of the following are sources.

When computer programs or files can be accessed from terminals, users should be required to enter a(n):

Password as a personal identification code.

Which of the following is not a consensus algorithm?

Deep learning is best described as:

A form of machine learning that involves complex, multilayer neural networks.

In addition to finding statistical correlations, proper application of Data Mining techniques should include which of the following?

Which of the following statements regarding authentication in conducting e-business is incorrect?

Only one key is used for encryption and decryption purposes in the authentication process.

Which of the following best describes what is meant by corporate governance?

Management’s processes, policies, and ethical approach to safeguarding stakeholder interests.

Which of the following is often used as the main repository of a company’s historical data (i.e., its corporate memory)?

Which of the following is an example of natural language processing?

A product which reads contracts and helps accountants with revenue recognition.

Why would companies want to use digital signatures when conducting e-business?

They can authenticate the document sender and maintain data integrity.

Which of the following in Tableau allows modification of the visualization by changing color?

A manufacturing firm identified that it would have difficulty sourcing raw materials locally, so it decided to relocate its production facilities. According to COSO, this decision represents which of the following response to the risk?

The internal control provisions of SOX apply to which companies in the United States?

Which of the following does not facilitate business decision-making activities?

A Public Key Infrastructure (PKI) provides the ability to do which of the following?

Issue, maintain, and revoke digital certificates.

Which of the following items is one of the eight components of COSO’s enterprise risk management 2004 framework?

In addition to focusing on controls, COBIT 5 expands its scope by incorporating which of the following broad perpsectives?

How IT brings value to the firm.

Which type of company does the Securities and Exchange Commission (SEC) require to format their financial statements using XBRL?

Which type of chart is best for categorical data?

Business Intelligence is a technique that frequently makes use of all of the following except:

Which of the following is the best way to compensate for the lack of adequate segregation of duties in a small organization?

Providing greater management oversight of incompatible activities.

n a computerized environment, internal controls can be categorized into which of the following?

General controls and application controls.

Which of the following is not an example of vulnerability within the process of IT operations?

Review the following diagram. Which answer provides the best interpretation Bill of Materials class and its associations?

Bills of Materials act as a type image class that specifies the details of the implied association between products and materials.

The duality associations between the events in the generic conversion UML class diagram illustrate which of the following?

The capture of actual material and labor costs for comparison with the original plan.

An analyst may use which two features to explain the results of a complex analysis in the most robust manner possible using Tableau?

Which of the following best describes the purpose of a bill of material class?

Links each raw material item to one or more finished good items.

Which of the following least reflects the purpose of a business rule in the conversion process?

Return defective items to suppliers promptly.

Which of the following is not included in the remediation phase for vulnerability management?

Vulnerability Prioritization.

The insight provided through data analytics can help companies in all of the following ways except:

Dictate the policies of external business partners.

Which of the following is an example of a validity check?

The computer flags any transmission for which the control field value did not match that of an existing file record.

Which statement best describes data visualization?

Data visualization is one way we share the story.

Which of the following best describes the use of XBRL style sheets?

Style sheets allow for presentation of selected data from XBRL documents in a way that humans can read.

A customer intended to order 100 units of a product A, but incorrectly ordered nonexistent product B. Which of the following controls most likely would detect this error?

Which of the following best describes the use of XBRL style sheets?

Which of the following best describes the use of XBRL style sheets? Style sheets allow for presentation of selected data from XBRL documents in a way that humans can read.

Which group requires the use of XBRL by all of its members?

Which group required the use of XBRL by all of its members? SEC. XBRL stands for: eXtensible Business Reporting Language.

Which of the following is the best definition for the term big data?

Big data defined The definition of big data is data that contains greater variety, arriving in increasing volumes and with more velocity. This is also known as the three Vs. Put simply, big data is larger, more complex data sets, especially from new data sources.

Which of the following best describes data analytics quizlet?

The three V's of big data are volume, velocity, and veracity. Data analytics is best described as the science of reducing extremely large datasets down to more manageable databases that can then be processed using traditional tools.