Which of the following situations best illustrates the process of authentication quizlet?

Recommended textbook solutions

Which of the following situations best illustrates the process of authentication quizlet?

Myers' Psychology for AP

2nd EditionDavid G Myers

900 solutions

Which of the following situations best illustrates the process of authentication quizlet?

HDEV5

6th EditionSpencer A. Rathus

380 solutions

Which of the following situations best illustrates the process of authentication quizlet?

Social Psychology

10th EditionElliot Aronson, Robin M. Akert, Samuel R. Sommers, Timothy D. Wilson

525 solutions

Which of the following situations best illustrates the process of authentication quizlet?

Myers' Psychology for the AP Course

3rd EditionC. Nathan DeWall, David G Myers

955 solutions

In the event identification component of the COSO ERM framework, management must classify events into which of the following?

Weaknesses and vulnerabilities.
Risks and opportunities.
Risks and rewards.
Controls and vulnerabilities.

Risks and opportunities.

What is the primary objective of data security controls?

- To establish a framework for controlling the design, security, and use of computer programs throughout an organization.
- To ensure that data storage media are subject to authorization prior to access, change, or destruction.
- To formalize standard, rules, and procedures to ensure the organization's control are properly executed.
- To monitor the use of system software to prevent unauthorized access to system software and computer programs.

To ensure that data storage media are subject to authorization prior to access, change, or destruction.

What type of tables does Excel use to create data visualization?

Relational tables.
Formatted tables.
Pivot tables.
Sorted tables.

Pivot tables.

Which of the following is the least likely example of how a specialized digital dashboard might be used?

To track construction projects.
To track network security.
To track manufacturing operations.
To track fixed asset depreciation.

To track fixed asset depreciation.

If a Chief Technology Officer wanted to ensure a new system had appropriate processing controls which of the following would he/she require?
Disposal of excess documents.
URL Class diagram.
A record count.
Password management.

A record count.

Select a correct statement regarding encryption methods?

To use symmetric-key encryption, each user needs two different keys.
Most companies prefer using symmetric-key encryption than asymmetric-key encryption method.
Both symmetric-key and asymmetric-key encryption methods require the involvement of a certificate authority.
When conducting e-business, most companies use both symmetric-key and asymmetric-key encryption methods.

When conducting e-business, most companies use both symmetric-key and asymmetric-key encryption methods.

Which type of analysis assists with defining how to optimize performance based on a potential constraint?

Descriptive.
Diagnostic.
Predictive.
Prescriptive.

Prescriptive.

Which of the following controls would most likely assure that a company can reconstruct its financial records?

Security controls such as firewalls.
Backup data are tested and stored safely.
Personnel understand the data very well.
Paper records.

Backup data are tested and stored safely.

Which of the following is a key difference between Bitcoin and Ethereum?

Only Bitcoin uses blockchain technology.
Only Bitcoin provides mining rewards.
Ethereum employs smart contracts.
Ethereum has no cryptocurrency.

Ethereum employs smart contracts.

Which of the following statement is correct regarding internal control?
A well-designed internal control environment ensures the achievement of an entity's control objectives.
An inherent limitation to internal control is the fact that controls can be circumvented by management override.
A well-designed and operated internal control environment should detect collusion perpetrated by two people.
Internal control in a necessary business function and should be designed and operated to detect errors and fraud.

An inherent limitation to internal control is the fact that controls can be circumvented by management override.

Which of the following is not an example of vulnerability within the process of IT operations?
Software not patched.
Inappropriate data classification.
Ineffective training.
Poor firewall rules.

Software not patched.

Which of the following best describes the AICPA's Audit Data Standards (ADS)?

The base level of testing procedures that should be performed on AIS data.
A set of analytic procedures designed to be used with modern ERPs' large datasets.
A set of standards for data files and fields designed to support external audits.
The codification of all auditing guidelines pertaining to the data generated by AISs.

A set of standards for data files and fields designed to support external audits.

Which of the following is often used as the main repository of a company's historical data (i.e., its corporate memory)?

The UML Class Diagram.
The data warehouse.
The XBRL instance document.
Its digital dashboard.

The data warehouse.

A manufacturing firm identified that it would have difficulty sourcing raw materials locally, so it decided to relocate its production facilities. According to COSO, this decision represents which of the following response to the risk?

Risk reduction.
Prospect theory.
Risk sharing.
Risk acceptance.

Risk reduction.

Which of the following metrics would be most likely to show up on a Digital Dashboard for a retail organization?

Abandoned Shopping Carts for retailer's website.
Weather forecast.
Account Reconciliations.
Work in process.

Abandoned Shopping Carts for retailer's website.

As described in the text, which of the following best defines the term data analytics?

The ability extra and load large datasets.
The science of moving data from Access to Enterprise Reporting Tools to draw conculsions for decision making.
The process of organizing extremely large datasets to create more managability.
The science of examining raw data, removing excess noise, and organizing it in order to draw conclusions for decision making.

The science of examining raw data, removing excess noise, and organizing it in order to draw conclusions for decision making.

Which statement below describes the relationship between artificial intelligence and machine learning?

Artificial intelligence is like a city and machine learning is like the state.
Artificial intelligence is like a database and machine learning is like a table in the database.
Machine learning is like a library and artificial intelligence is like a book.
Machine learning is like the general ledger and artificial intelligence is like an account.

Artificial intelligence is like a database and machine learning is like a table in the database.

Which of the following is a component of COSO ERM 2017?

Governance and culture.
Strategy and objective setting.
Performance.
Review and revision.
All of the choices are correct.

All of the choices are correct.

Which statement best describes data visualization?

Data visualization was created to help accessibility issues.
Data visualization is one way we share the story.
Data visualization helps users understand a UML diagram.
Data visualization is they way we input data into tables.

Data visualization is one way we share the story.

Ethical principals are derived from all of the following except:

Personal attitudes on issues of right and wrong.
Cost benefit analysis.
Cultural values.
Societal traditions.

Cost benefit analysis

Which type of blockchain offers economic reward for the computational proof of work in mining?

Private.
Public.
Consortium.
Supply Chain Block.

Public

Which of the following best describes what is meant by corporate governance?

The organizational structure and responsibilities of the executive team and board of directors of a corporation.

Regulatory bodies, such as the SEC and PCAOB, that govern the behavior of corporations.

The ability of a corporation's management team to meet earnings forecasts over an extended period of time.

Management's processes, policies, and ethical approach to safeguarding stakeholder interests.

Management's processes, policies, and ethical approach to safeguarding stakeholder interests.

In a computerized environment, internal controls can be categorized into which of the following?

General controls and application controls.
Detective controls and protective controls.
Network controls and transaction controls.
Preventive controls and mandatory controls.

General controls and application controls.

When using an analytical mindset which of the following is the first task?

Master the data.
Share the story.
Ask the right question.
Request data

Ask the right question.

Review the following diagram. Which answer provides the best interpretation of the multiplicities for the association between the Employees and the Labor Operations classes?

Each employee that creates a Material Issue must record at least one Labor Operation.

At least one production worker and one supervisor must perform labor operations for each production run.

The association between Labor Operations and Employees will be implemented in the database with a Type Image class.

An employee may not perform any labor operations.

An employee may not perform any labor operations.

Which of the following is not a common element of performing and sharing data analysis amongst visualization tools?

Get data.
Set relationships.
Create data.
Select and modify the visualization.

Create data

All of the following are examples of internal control procedures except

Using pre-numbered documents
Reconciling the bank statement
Processing customer satisfaction surveys
Insistence that employees take vacations

Processing customer satisfaction surveys

Data mining may uncover relationships in which no causality should be implied. In these cases, which of the following phases would be most appropriate?

"A improves B."
"A has an impact on B."
"A is associated with B."
"A enhances B."

"A is associated with B."

Which of the following represents an inherent risk for a financial institution?

Bank reconciliations are not performed on a timely basis.
The economy goes into a recession.
Customer credit check not performed.
An error occurs in a loan loss calculation.

The economy goes into a recession.

What Microsoft tool would most likely be used to create a pivot table?

Word.
Excel.
Power BI.
Powerpoint.

Excel

The tool that defines and describes each key data element (e.g., total assets, accounts, payable, net income, etc.) in XBRL is called _____:

XBRL specification.
XBRL taxonomy.
XBRL style sheet.
XBRL instance document.

XBRL taxonomy.

Which of the following IT controls would best prevent a currency trader from concealing his/her trading errors?

End user access to source code.
Multifactor authentication.
Symmetric encryption.
Use of a private key.

End user access to source code.

Reconciliation of cash accounts may be referred to as what type of control?

Detective.
Preventive.
Adjustive.
Non-routine.

Detective.

Review of the audit log is an example of which of the following types of security control?

Governance.
Detective.
Preventive.
Corrective.

Detective.

An information technology director collected the names and locations of key vendors, current hardware configuration, names of team members, and an alternative processing location. What is the director most likely preparing?

Data restoration plan.
Disaster recovery plan.
System security policy.
System hardware policy.

Disaster recovery plan.

In addition to finding statistical correlations, proper application of Data Mining techniques should include which of the following?

Good use of the REA framework.
Professional judgment.
Use of the most current XBRL taxonomy.
Digital dashboards.

Professional judgment

Why do Certificate Authority (CA) play an important role in a company's information security management?

Using a CA is required by SOX in managing information security.
A CA is responsible to generate session keys for encryption purposes.
Most companies use CA to manage their employees' public keys.
CA creates and maintains both the public and private keys for a company's employees.

Most companies use CA to manage their employees' public keys.

Which of the following is the best reason that a collaboration model would not be used to diagram the conversion process?

All conversion activities are internal to the organization.
A collaboration model does not include swimlanes.
The orchestration of the activities is not shown in a collaboration model.
The choreography between pools is not shown in a collaboration model.

All conversion activities are internal to the organization.

Which of the following describes the recommended prerequisites for managing vulnerabilities?

Implement the COSO ERM framework, and identify key vulnerabilities.
Determine the main objective of vulnerability management, and assign roles and responsibilities.
Identify the key vulnerabilities, and implement appropriate controls to minimize the vulnerabilities.
Implement suitable controls, and assess those controls for potential vulnerabilities.

Determine the main objective of vulnerability management, and assign roles and responsibilities.

Which of the following general ledger accounts would likely not be impacted in a conversion process?

Sales Revenue.
Inventory.
Cost of Goods Sold.
Work-in-Process.

Sales Revenue.

All of the following are the primary functions of internal controls except:

Prevention.
Reflection.
Detection.
Correction.

Reflection

The internal control provisions of SOX apply to which companies in the United States?

All companies.
SEC registrants.
All issuer (public) companies and nonissuer (nonpublic) companies with more than $100,000,000 of net worth.
All nonissuer companies.

SEC registrants.

The Sarbanes-Oxley Act (SOX) was passed as a response to which of the following events?

The savings & loan scandals of the 1980s.
The bust of dot-com bubble companies such as pets.com and Webvan.
Corporate reporting scandals by companies such as WorldCom, Enron, and Tyco.
Securities manipulation and insider trading in the 1930s.

Corporate reporting scandals by companies such as WorldCom, Enron, and Tyco.

A customer intended to order 100 units of a product A, but incorrectly ordered nonexistent product B. Which of the following controls most likely would detect this error?

Validity check
Record count
Hash total
Parity check

Validity check

Which type of chart is best for categorical data?

Vertical bar

Which of the following statements is incorrect?

A fraud prevention program starts with a fraud risk assessment across the entire firm
The audit committee typically has an oversight role in risk assessment process
Communicating a firm's policy file to employees is one of the most important responsibilities of management
A fraud prevention program should include an evaluation on the efficiency of business processes.

A fraud prevention program should include an evaluation on the efficiency of business processes.

A disaster recovery approach should include which of the following elements?

Encryption.
Firewalls.
Regular backups.
Surge protectors.

Regular backups

Ford may use business intelligence for all of the following except:

Compare competitor vehicle sales to Ford vehicle sales.
Review website activity.
Prepare activity models using BPM.
Analyze the correlation of gas prices to vehicle sales.

Prepare activity models using BPM.

Which visualization tool creates dashboards and stories?

Power Point.
Access.
Excel.
Tableau.

Tableau.

How often is a block added to Ethereum?

Every 10 minutes.
Every 12-15 seconds.
Every 16-22 minutes.
Every second.

Every 12-15 seconds.

How do data analysts use confusion matrices?

To understand a model's prediction results.

What is the first step to prepare Excel data?

Select Insert>Table.

Asymmetric-key encryption uses which of the following techniques to allow users to communicate securely?

A public key and a private key.

Which type of chart would best show each division's relative profit within a corporation?

Pie Chart

Which of the following is an example of a validity check?

The computer ensures that a numerical amount in a record does not exceed some predetermined amount.

As the computer corrects errors and data are successfully resubmitted to the system, the causes of the errors are printed out.

The computer flags any transmission for which the control field value did not match that of an existing file record.

After data for a transaction are entered, the computer sends certain data back to the terminal for comparison with data originally sent.

The computer flags any transmission for which the control field value did not match that of an existing file record.

Which of the following is a password security weakness?

Users are assigned passwords when accounts are created, but do not change them.
Users have accounts on several systems with different passwords.
Users write down their passwords on a note paper, and carry it with them.
Users select passwords that are not part of an online password dictionary.

Users are assigned passwords when accounts are created, but do not change them.

Review the conversion process BPMN activity diagram presented below. In the diagram, the symbol (lighting bolt) indicates which of the following?

Exception event.

XBRL stands for

eXtensible Business Reporting Language

Which type of company does the Securities and Exchange Commission (SEC) require to format their financial statements using XBRL?

Large accelerated filers

Which of the following metrics would be least likely to show up on a Digital Dashboard?

Accumulated depreciation for the previous year.
Month-to-date sales.
Budget variances.
Number of accident-free days.

Accumulated depreciation for the previous year.

What must first be added to the page when creating a visualization in Power BI?

Table

Which type of chart is best to describe exam results for a class?

Histogram.

Which of the following is not an example of a vulnerability within an Information System?

Outdated intrusion detection/prevention system.
Lack of a disaster recovery plan.
Improper system configuration.
Failure to audit and terminate unused accounts in a timely manner.

Lack of a disaster recovery plan.

A document containing XBRL elements is called a(n):

XBRL Instance Document.

Which of the following best describes the use of XBRL style sheets?

Style sheets determine which elements may be used when companies submit their XBRL filing.

Style sheets are another name for XBRL instance documents.

Style sheets allow for presentation of selected data from XBRL documents in a way that humans can read.

Style sheets determine the formatting of numbers and text in the XBRL taxonomy.

Style sheets allow for presentation of selected data from XBRL documents in a way that humans can read.

Which of the following is not an example of a physical security vulnerability?

Unescorted visitors on the premises.
Poor choice of passwords.
Lack of a smoke detector in the room housing servers.
Lack of disaster recovery plan.

Poor choice of passwords.

When client's accounts payable computer system was relocated, the administrator provided support through a dial-up connection to server. Subsequently, the administrator left the company. No changes were made to the accounts payable system at that time. Which of the following situations represents the greatest security risk?

User passwords are not required to the in alpha-numeric format.
Management procedures for user accounts are not documented.
User accounts are not removed upon termination of employees.
Security logs are not periodically reviewed for violations.

User accounts are not removed upon termination of employees.

All of the following are challenges for auditors when auditing records residing in a blockchain network except:

Programming skills may be needed.
Complicated protocols may be difficult to understand.
Smart contracts cannot be used as evidence.
Converting traditional audit approaches to blockchain technology.

Smart contracts cannot be used as evidence.

Review the following BPMN activity diagram. In this conversion process, the quantities of raw materials to be released is calculated based on which information?
Authorize Production >Issue Raw Materials>Perform work>Complete production

The Bills of Materials.

According to COSO which of the following is not a component of internal control?

Control risk.
Control activities.
Monitoring.
Control environment.

Control risk.

Which of the following best describes the skill sets used in data analytics?

Building data warehouses; Populating data structures; Mining the data.
Acquiring/cleansing data; Creating data structures/models; Mining/analyzing data.
Developing data structures/models; Acquiring storage capacity; Analyzing the data.
Creating data; Building data structures; Piloting data studies.

Acquiring/cleansing data; Creating data structures/models; Mining/analyzing data.

Which of the following is the least likely use case for implementing blockchain?

A grocery store would like to modernize their payroll systems.

Consider the following BPMN diagram of a subprocess. Which of the following is required to correct an error in the diagram?

Add a sequence flow to an end event after the discard errors activity.

Which of the following control activities should be taken to reduce the risk of incorrect processing in a newly installed computerized accounting system?

Segregation of duties.
Ensure proper authorization of transactions.
Adequately safeguard assets.
Independently verify the transactions.

Independently verify the transactions.

A data warehouse may include:

General Economic Information

When an accounting team automates account reconciliations this is an example of:

Robotic process automation.

Which of the following is not considered a data visualization tool?

Excel.
Chart Maker.
Power BI.
Python.

Chart Maker

An entity doing business on the internet most likely could use any of the following methods to prevent unauthorized intruders from accessing proprietary information except:

Batch processing.

Which of the following best describes why firms choose to create codes of ethics?

Because most people will not behave ethically without a written set of guidelines.

Codes of ethics protect firms against lawsuits that may be filed due to corporate fraud.

They allow firms to create a formal set of expectations for employees who may have different sets of personal values.

Companies must have a written code of ethics in order to conduct interstate commerce in the U.S.

They allow firms to create a formal set of expectations for employees who may have different sets of personal values.

Smart contracts do all of the following except:

Define miners.

Which of the following best describes how external auditors' interactions with their clients is likely to change due to the use of data analytics in the audit process?

External auditors will spend less time on audits and will not need to spend time with clients outside the audit.

External auditors will spend more time on detailed audit tasks, resulting in longer audit engagements.

External auditors will only interact with their clients virtually.

External auditors will stay engaged with clients beyond the audit.

External auditors will stay engaged with clients beyond the audit.

Which of the following best describes the purpose of a bill of material class?

Links each raw material item to one or more finished good items.
Shows the issues of raw material items into work in process.
Links finished goods to production.
Shows the raw material usage variance.

Links each raw material item to one or more finished good items.

Data mining is considered a technique of:

Business Intelligence

The framework to be used by management in its internal control assessment under requirements of SOX is the:

COSO internal control framework.
COSO enterprise risk management framework.
COBIT framework.
All of the choices are correct.

All of the choices are correct

Select a correct statement regarding a hashing process.

It is reversible.
The outcome is a message digest.
It is not necessary to use a hashing process in creating a digital signature.
It is used for authentication.

The outcome is a message digest.

What Microsoft tool would most likely be used to create a complex visualization using a large amount of data?

Power BI.

When an accounting team automates account reconciliations this is an example of

Robotic process automation.

Which of the following is the most likely foreign key for the Production_Authorizations table?

Special_handling
Product_Number
Product_unit_of_sale
Materials_issue_number

Product_Number

Which of the following is an example of natural language processing?

A product that creates a language based confusion matrix.
A product which provides voice and visual communications.
A product which creates training manuals which are easy to understand.
A product which reads contracts and helps accountants with revenue recognition.

A product which reads contracts and helps accountants with revenue recognition.

A well controlled conversion process would likely have which of the following roles seperated into swimlanes?

Accounts Payable Manager and Receiving Employee.

Which of the following is not an example of a measure in Tableau?

Quantity.
Price.
Volume.
All of these are examples of measures.

All of these are examples of measures.

To prevent invalid data input, a bank added an extra number at the end of each account number and subjected the new number to an algorithm. This technique is known as:

check digit verification.

The COSO ERM framework encourages a review of risks as they apply to achieving firms' objectives. Which of the following is not one of the listed categories of objectives to be considered?

Environment.
Operations.
Strategic.
Compliance.

Environment.

At its core, data analytics fits into the information value chain in which of the following ways?

The process of data analytics aims at transforming raw data into valuable information.

Which of the following is not one of the main components of vulnerability management and assessment?

Identification.
Remediation.
Internalization.
Maintenance.

Internalization.

Which of the following is not a good example of how accountants might use data analytics to help evaluate estimates used to value financial statement accounts?

Assess the likelihood and level of expected warranty claims.
Estimate the collectibility of accounts receivable balances.
Automate the order entry process for online customers.
Assess property, plant & equipment values based on current comparable prices.

Automate the order entry process for online customers.

Which of the following is an activity performed as part of data visualization?

Selecting the data visualization tool.
Creating a value chain.
Addressing privacy concerns.
Asking the appropriate questions.

Selecting the data visualization tool.

Which of the following best summarizes the two key limiting factors for business systems when dealing with Big Data?

Data storage capacity and processing power.
Data availability and software tools.
Database organization and transaction volume.
Analytic skills and software tools.

Data storage capacity and processing power.

Which of the following is not one of the responses to risk presented in COSO ERM?

Share the risk.
Accept the risk.
Eliminate the risk.
Reduce the risk.

Eliminate the risk.

Which of the following best illustrates the use of multifactor authentication?

Requiring password changes every 30, 60, or 90 days.
Requiring the use of a smart card and a password.
Requiring the use of upper case, lower case, numeric, and special characters for a password.
The use of a fingerprint scanner for access to a device.

Requiring the use of a smart card and a password.

Which of the following statements regarding authentication in conducting e-business is incorrect?

It is a process that establishes the origin of information or determines the identity of a user, process, or device.
Only one key is used for encryption and decryption purposes in the authentication process.
Successful authentication can prevent repudiation in electronic transactions.
We need to use asymmetric-key encryption to authenticate the sender of a document or data set.

Only one key is used for encryption and decryption purposes in the authentication process.

Which of the following is not a component of COSO ERM 2017?

Information communication and reporting.
Strategy and objective setting.
Control activities
Review and revision.

Control activities.

Which of the following is not a component of internal control as defined by COSO?

Control environment.
Control activities.
Inherent risk.
Monitoring.

Inherent risk.

Which of the following is least likely to appear in a Digital Dashboard:

Website clicks
Current month sales
Expected Fed Fund rate changes
Store openings

Expected Fed Fund rate changes

Which of the following is not a common step in preparing data and developing visualizations?

Assess the data cost versus its value.
Select visualization.
Set relationships among tables.
Select attributes.

Assess the data cost versus its value.

Raw data often must be scrubbed to remove extraneous data and other noise in order to become useful. This technique is known as:

Extract, Transform, and Load.

Which of the following areas of financial reporting is most suitable for applying data analytics techniques?

Evaluation of estimates and valuations.
Variance reporting.
Calculating the components of equity.
Depreciation.

Evaluation of estimates and valuations.

In the conversion process, indirect labor is first recorded to which of the following accounts?

Finished Goods.
Raw Material Inventory.
Work-in-Process Inventory.
Manufacturing Overhead.

Manufacturing Overhead.

When computer programs or files can be accessed from terminals, users should be required to enter a(n):

Password as a personal identification code

Which of the following is not an example of data questions which arise during the second step of the AMPS model, mastering the data?

Data reliability.
Data integrity.
Data serviceability.
Data accessibility.

Data serviceability.

If a machine is attempting to reduce the dimensions in a dataset it is using:

Unsupervised Learning.

Which of the following roles is least likely to use data in XBRL format:

Financial analysts.
Loan officers.
Marketing officers.
Regulatory bodies.

Marketing officers.

Tableau can source data from all of the following except?

Microsoft Excel.
Miscrosoft Access.
.CSV files.
Microsoft Power Point.

Microsoft Power Point

The four Vs are considered a defining feature of big data.

Volume, veracity, velocity, & variety.

Which of the following best describes the purpose of an intermediate error event?

Interupts the normal flow of the process
Alerts users to control risks
Waits for external messages
Directs a sequence to repeat

Interupts the normal flow of the process

Review the following diagram. Which answer provides the best interpretation Bill of Materials class and its associations?

Bills of Materials act as a type image class that specifies the details of the implied association between products and materials.

Which of the following is not a good example of how accountants might use data analytics to help evaluate estimates used to value financial statement accounts?

Assess the likelihood and level of expected warranty claims.

Estimate the collectibility of accounts receivable balances.

Automate the order entry process for online customers.

Assess property, plant & equipment values based on current comparable prices.

Automate the order entry process for online customers.

COBIT framework takes the view that all IT processes should provide clear links between all of the following except:

IT components.

Which of the following is considered an application input control?

Run control total.
Edit check.
Reporting distribution log.
Exception report.

Edit check.

Which of the following is not one of the common techniques for information security risks and attacks?

Botnet
Spam
TraceRT
Social Engineering

TraceRT

Which of the following may be the result of data mining?

Digital Dashboards.
Competitor sales by region.
Weather forecasts.
Items frequently bought in combination.

Items frequently bought in combination.

To be considered blockchain a technology must have all of the following except:

Decentralization
Immutability
Consensus
Rewardability

Rewardability

Which of the following

...

Bacchus, Inc., is a large multinational corporation with various business units around the world. After a fire destroyed the corporate headquarters and largest manufacturing site, plans for which of the following would help Bacchus ensure a timely recovery?

Business continuity

When a bank has an input file of FICO scores and uses machine learning to help predict credit loses for each customer, they are likely using which type of learning?

Supervised learning.

Which of the following statements is most accurate with regard to business continuity management (BCM) and disaster recovery planning (DRP)?

DRP is an important component of BCM

Which of the following does not represent a viable data backup method?

Disaster recovery plan.
Redundant arrays of independent drives.
Virtualization.
Cloud computing.

Disaster recovery plan.

An analyst may use which two features to explain the results of a complex analysis in the most robust manner possible using Tableau?

Dashboard or Story.

Which of the following is not a consensus algorithm?

Proof of miner.
Proof of work.
Proof of authority.
Proof of stake.

Proof of miner.

What type of chart is best to describe the economic conditions of each country?

Map.

For businesses considering a cloud computing solution, which of the following should they ask the cloud vendor to provide before entering into a contract for critical business operations?

SOC 2 Report.

Which type of question would accountants most likely use data analytics to answer?

Collectibility of Loans Receivable.

Each of the following types of controls is considered to be an entity-level control except those:

Regarding the company's annual stockholder meeting.

Which of the following best describes how external auditors' interactions with their clients is likely to change due to the use or data analytics in the audit process?

External auditors will stay engaged with clients beyond the audit.

Which of the following is not a part of the AMPS model?

Parse the data

Which of the following not one of the reasons that the conversion process is typically considered more complicated than the sales and collections and the purchases and payments processes?

Many companies do not have a conversion process.

Tracing shipping documents to pre-numbered sales invoices provides evidence that:

Shipments to customers were properly invoiced.

The use of data analytics will likely result in significant changes to clients' expectations of their auditors. Which of the following is most likely not one of those expected changes?

More time spent gathering and testing data.

The Public Company Accounting Oversight Board (PCAOB) is not responsible for standards related to:

Accounting practice.

Data analytics can help in accurately identifying organizational risks. All of the following are examples of such risk except:

"What-if" business forecasting.

The stated advantages of XBRL GL include:

Flexibility

What is the first step to get data when using Tableau?

Select Connect>To a file.

Which of the following is the best description of neural networks?

Mathematical models that convert inputs to outputs/predictions.
Intelligence exhibited by machines rather than humans.
A blockchain network where participants need permission to join the network.
A ledger where individual entries are separate in time and location.

Mathematical models that convert inputs to outputs/predictions.

Which of the following is the most likely primary key for the Materials table?

Product_ID
Materials_number
Materials_issue_number
Product_category_number

Materials_number

Which of the following best describes the Get Data step in preparing data and developing a visualization?

Modify data to .csv format.
Build connections among tables.
Understand and clean the data for use.
Select the appropriate chart.

Understand and clean the data for use.

Which of the following is not an example of a dimension in Tableau?

Property location.
Sale date.
Quantity sold.
Sales manager.

Quantity sold.

Which one of the following is not an example of machine learning assisting in an audit?

Reviewing journal entries.
Reviewing organization charts.
Reviewing cash transactions.
Reviewing journal entry descriptions.

Reviewing organization charts.

Which of the following is the best definition of the term big data?

Datasets that are too large and complex for businesses' existing systems utilizing traditional capabilities.

One of the largest challenges across the accounting industry for auditing firms which use blockchain is:

A gap in skillset.

Which of the following is not included in the remediation phase for vulnerability management?

Risk Response Plan.
Policy and procedures for remediation.
Vulnerability Prioritization.
Control Implementation.

Vulnerability Prioritization.

Which type of analysis assists with understanding why something happened during the third step of the AMPS model, performing the analysis?

Diagnostic

Business Intelligence is a technique that frequently makes use of all of the following except:

Spear Phishing.
Databases.
Web crawlers.
Data warehouses.

Spear Phishing

What is not a general function of blockchain technology?

Generation of bitcoin.

The IT Infrastructure Libarary (ITIL) is considered a de facto standard in which of the following regions?

Europe

In addition to focusing on controls, COBIT 5 expands the scope by incorporating which of the following perspectives?

How IT brings value to the firm.

Which of the following in Tableau allows modification of the visualization by changing color?

pages
pencil
marks
autofill

marks

Which of the following is not a basic activity in the conversion process?

authorize production
issue raw material
perform work and account for labor
ship products to stores

ship products to stores

Which type of chart would best show outbreaks of the flu by region?

Map

Which of the following is an example of a appropriate question to begin analyzing a business problem?

Why is out newest product not selling as expected in Kentucky?

Which type of chart would best compare hours studied and test scores?

Scatter Plot

According to AS 5, control risk should be assessed in terms of

Financial statement assertions

Which of the following types of business is least likely to employ a conversion process?

Retail Store

Both ISACA and the GTAG define vulnerability. Which of the following does not represent one of those definitions?

An organizations' exposure to disaster

Data mining uses which of the following approaches to analyze data and find new patterns and trends?

Sophisticated statistical techniques

The process of using sophisticated statistical techniques to extract and analyze data from large databases to discern patterns and trends that were not previously known is called

Data Mining

In a basic UML diagram of the conversion process, which of the following best describes the purpose of a duality association?

A. Shows the participation of employees in the process.

B. Links work in process events to the original production authorization.

C. Indicates issue of raw material into the process.

D. Tracks completion of work in process and increase to finished goods inventory.

b. Links work in process events to the original production authorization.

Review the following diagram. Which answer provides the best interpretation of the multiplicities for the association between the Employees and the Production Authorizations classes?

One employee can authorize production multiple times.

Which of the following is the primary overall objective of the conversion process?

Ensure that enough finished products are available to meet anticipated demand

Which of the following business rules illustrates a proper implementation of internal control?

The employee that authorizes production can't be the same employee that issues raw materials.

When creating a UML class diagram to support the conversion process, which of the following approaches a way to meet both accounting and general management information requirements.

The REA framework

Using a generic conversion UML class diagram as a starting point, which of the following best describes how to find work-in-process inventory?

It is calculated based on accumulated materials issued, labor, and overhead

The duality associations between the events in the generic conversion UML class diagram illustrate which of the following

The capture of actual material and labor costs for comparison with the original plan

Which of the following is most likely foreign key for the bill of materials table?

Product_ID

Which of the following is the recommended data type for the Product_number field in the conversion database?

Text

Which of the following is the most likely to order of a basis conversion activity model?

Authorize production> Issue Raw Materials > perform work > complete production

Each of the following types of controls is considered to be an entity-level control, except those:

Regarding the company's annual stockholder meeting.

Which type of chart is best to show a persons' weight over time?

line chart

Which type of blockchain would a corporation and their key supplier set up to facilitate transactions?

Consortium. (hybrid)

Before data from multiple sources can be loaded into the data warehouse, which of the following activities must be performed?

Data inconsistencies must be removed so that the warehouse has homogeneous data for analysis and reporting purposes.

What can users do with Tableau?

Create calculated fields.
Build relationships between data sources.
Create data visualizations.
All of the other answers are correct.

All of the other answers are correct.

Which of the following is the most likely foreign key for the Bill of Materials table?

Product_ID

Which of the following is a set of standards created by the AICPA for data files and fields in order to support external audits?

Audit Data Standards (ADS).

Which of the following IT controls would best prevent a developer from inappropriately accessing the system?

Secondary code review.

Which of the following is not accurate regarding blockchain?

Only the administrator keeps a copy of the entire database.

In a BPMN activity diagram, what does the following symbol represent? (reverse arrow & plus sign)

A looping collapsed subprocess.

Both ISACA and the GTAG define vulnerability. Which of the following does not represent one of these definitions?

An organizations' exposure to disaster.

Which of the following represents an application control for a customer sale?

The customer name must be populated.

Blockchain was built to minimize the use of:

Intermediaries.

When using a Data Mining approach for business analysis, it is important to remember which of the following

Relationships between data items do not necessarily mean that one causes the other.

Which type of chart is best to describe the economic conditions of each country?

Map

What could result from the failure to audit and terminate unused accounts in a timely manner?

A disgruntled employee may tamper with company applications.

Which type of chart would best show enrollment between 2005-2020?

Line chart

Which type of analysis assists with understanding what is happening right now?

Descriptive.

Which of the following would not help create a appropriate question in the AMPS model?

Ensuring the data has integrity.

How does data analytics play a vital role in today's business world?

By examining data to generate models for predictions of patterns and trends.

Which of the following items is one of the eight components of COSO's enterprise risk management 2004 framework?

Monitoring

Which of the following is not a good example of how accountants might use data analytics to help evaluate estimates used to value financial statement accounts?

Automate the order entry process for online customers.

Which of the following is an example of an appropriate question to begin analyzing a business problem?

Why is our newest product not selling as expected in Kentucky?

A Public Key Infrastructure (PKI) provides the ability to do which of the following?

Issue, maintain, and revoke digital certificates.

In general, the goal of information security management is to protect all of the following except:

Redundancy.

Which of the following should an analyst not do when on the second step of the AMPS model, mastering the data?

Analyze the data.

The SEC's rule titled "Interactive Data to Improve Financial Reporting" resulted in which of the following?

Large accelerated filers must now format their financial statements using XBRL.

Why would companies want to use digital signatures when conducting e-business?

They can authenticate the document sender and maintain data integrity.

Review the following diagram. Which answer provides the best interpretation of the multiplicities for the association between the Products and Production Authorization classes?

Each production authorization is related to one product.

In which of the following situations would blockchain add value?

Multiple parties that do not trust each other want to collaborate.

Which type of blockchain would an accounting department of a large international firm set up to track control testing?

Private

Which of the following is not a type of analyses performed during the third step of the AMPS model, performing the analysis?

Reductive.

When using a Data Mining approach for business analysis, it is important to remember which of the following?

Relationships between data items do not necessarily mean that one causes the other.

Which of the following IT controls would best prevent a currency trader from concealing his/her trading errors?

End user access to source code.

Satoshi Nakamoto used all of the following when creating a distributed ledger system except:

Confusion Matrix.

The ISO 27000 Series of standards are designed to address which of the following?

Information security issues.

The duality associations between the events in the generic conversion UML class diagram illustrate which of the following?

The capture of actual material and labor costs for comparison with the original plan.

Which of the following is the best way to compensate for the lack of adequate segregation of duties in a small organization?

Providing greater management oversight of incompatible activities

Artificial Intelligence can include all of the following except:
Database programming.
Visual perception.
Logical thinking.
Language translation.

Database programming.

Power BI can source data from all of the following except?

Miscrosoft Excel.
Text files.
Power BI datasets.
All of the following are sources.

All of the following are sources.

Which of the following best describes why firms choose to create codes of ethics?

They allow firms to create a formal set of expectations for employees who may have different sets of personal values.

XBRL assurance is generally expected to include all of the following except:

Assurance that reports include all relevant financial and nonfinancial information.

Which of the following does not facilitate business decision-making activities?

UML Class Diagram.

XBRL GL, or XBRL Global Ledger Taxonomy, is different from XBRL US GAAP because it facilitates:

Efficient communication within a firm.

Which of the following least reflects the purpose of a business rule in the conversion process?

Return defective items to suppliers promptly.

Which of the following is not benefit of blockchain?

Past information is easily edited.

If a machine learns by trial and error, it is using:

Reinforcement Learning.

Which of the following provides the advantage of incorporating other widely accepted standards and frameworks?

COBIT 2019.

Encryption is a control that changes plain text into which of the following?

Cyphertext.

Which of the following does not desribe characteristics of the AMPS model?

Binary.

Data analytics professionals estimate that they spend how much of their time cleaning data in order to perform analysis on it?

50-90%.

If a Chief Technology Officer wanted to ensure a new system had appropriate input controls which of the following would he/she require?

Access control.