0% found this document useful (0 votes)
275 views16 pages

MCQs - CH 3 Information Systems & Its Components - Done

The document consists of multiple-choice questions related to Information Systems and its components, covering topics such as database models, network security, data entry errors, and audit controls. It includes questions on various aspects of information systems, including their functions, types of controls, and the roles of different personnel in managing these systems. The content is structured to test knowledge and understanding of key concepts in information systems as of November 2023.

Uploaded by

dolly.varwani
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
275 views16 pages

MCQs - CH 3 Information Systems & Its Components - Done

The document consists of multiple-choice questions related to Information Systems and its components, covering topics such as database models, network security, data entry errors, and audit controls. It includes questions on various aspects of information systems, including their functions, types of controls, and the roles of different personnel in managing these systems. The content is structured to test knowledge and understanding of key concepts in information systems as of November 2023.

Uploaded by

dolly.varwani
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Information Systems and Its Components – Nov 23

C HAPTER 3

INFORMATION SYSTEMS AND ITS COMPONENTS

1. IC AI M U L T I PL E C H O I CE Q U E S TIO NS (ICAI MCQ B O O KL E T + RTP S + MTP S TI L L M A Y 23)

1. Information Systems not only establish communication but also support decision making within an
organization. Below mentioned are many components that comprise an Information system except
one. Identify that odd one out.

(a) People (b) Data


(c) Network (d) Transaction

2. Communication controls responsible to handle exposures caused during the internetwork communication
are categorized further based on the specific functions performed. Which of following communication
control incorporates features that mitigate the possible effects of exposure?

(a) Line Error Control (b) Flow Control


(c) Channel Access Control (d) Physical Component Control

3. In a computer system, a _____ memory which is volatile in nature and can read and modify the
information is referred as _____.

(a) Primary, Random Access Memory (b) Secondary, Random Access Memory
(c) Secondary, Cache Memory (d) Primary, Virtual Memory

4. In DBMS, Relational Database Model allows the data and its related operations like storage, retrieval
and integrity in a Table structure. All the terms mentioned below are associated with Relational
Database Model except one. Pick that odd one out.

(a) Relations (b) Attributes


(c) Objects (d) Domains

5. Corrective controls are designed to reduce the impact or correct an error once it has been detected.
Which of the following is not an example of Corrective Control?

(a) Backup Procedure (b) Rerun Procedure


(c) Contingency Planning (d) Hash Totals

Harder you work, luckier you get P a g e | 3.1


6. Mr. Y, a senior network administrator of HKL Pvt Ltd., sent a confidential data of the company to its
Chief Financial Officer. For transmission in networking, technique that converts data into a secret code
for storage in databases and ensures that the transmission is secure.

(a) Encapsulation (b) Encryption


(c) Decryption (d) Logging

7. The data entry operator of GC College is responsible to enter the amount of fees paid by the students.
Accidentally, while making the entry, the fee amount of Ms. X of the amount INR 9854 was entered as
INR 8954 in the software, leading to the reverse of two digits in the amount. Under Data Coding Control,
which of the following error is made by data entry operator in this case?

(a) Transposition Error (b) Substitution Error


(c) Addition Error (d) Truncation Error

8. As a system administrator of a newly established start-up KJL Ltd., Mr. Kamal sets up its computer
network in such a way that enables the network to recover from any kind of error like connection
failure, loss of data etc. In computer network, which of the following term’s definition takes care of
the said activities?

(a) Routing (b) Resilience


(c) Contention (d) Bandwidth

9. Every time when a user attempts to gain access to and employs system resources in an application,
the chronology of each such event is maintained. Which control under Application Controls is
responsible to do so?

(a) Boundary Controls (b) Input Controls


(c) Communication Controls (d) Processing Controls of Information Systems

10. Under Application Controls of Information System, __________ maintains the chronology of events
that occur either to the database definition or the database itself.

(a) Output Controls (b) Input Controls


(c) Database Controls (d) Processing Controls

11. Big Data has captured the attention of Businesses for its processing power to analyse the data for
many benefits that it provides. Below are mentioned some of its benefits, except one. Identify it.

a) Access to social data from search Engine.


b) Early Identification of risk to the services.
c) Big data can be used to read and evaluate consumers’ response.
d) Increases computational power of application software.

12. Ms. Shilpi is a final year student of B. Tech who is required to submit her project report on Library
Management System based on Relational Database Model. Which of the following example does not
belong to Relational Database?
Information Systems and Its Components – Nov 23
(a) Microsoft Access (b) MySQL
(c) Java (d) Oracle

13. Nice Collection is women apparel store with many branches in various cities of India. The management
of store uses data mining technique to make analysis to determine the sale on weekends of festive
month in cities with population less than 70,000. Which of following is not involved in technique used?

(a) Data Integration (b) Data Selection


(c) Data Transformation (d) Data distribution

14. An IS Auditor is using an audit tool that involves embedding audit software modules within a host
application system to provide continuous monitoring of the system’s transactions. Which audit tool
does it refer to?

(a) Audit hooks (b) System Control Audit Review File (SCARF)
(c) Integrated Test Facility (ITF) (d) Continuous and Intermittent Simulation (CIS)

15. Mr. Ashu works in a Network Service provider Company where his job responsibility includes performing
routine tasks in the network such as making minor configuration changes and monitoring event logs.
Which of the following role he performs in the company?

(a) Network Administrator (b) Network Architect


(c) Network Engineer (d) System Analyst

16. Mr. Y used duplicate keys to enter in prohibited area zone of JKH Ltd. company and stole some
important documents of the company. Which of the following control you think has been compromised
to make such an incident happen?

a) Environmental control b) Physical access control


c) Network Access Control d) Logical access control

17. Below mentioned are the steps that are involved in the Data Mining process. Select the step at which
the data is collected from all the different sources to initiate the process.

(a) Data Selection (b) Data Integration


(c) Data Transformation (d) Data Cleaning

18. Output Controls are responsible to ensure that the data delivered to users will be presented,
formatted and delivered in a consistent and secured manner. Which of the following activity does not
belong under the purview of Output Control?

(a) Spooling (b) Storage and Logging of sensitive, critical forms


(c) Asset Safeguarding (d) Control over printing

19. Which of following statement does not belong to Read Only Memory?

(a) Non-volatile in nature. (b) Used by manufacturers to store the data.


(c) Used to store small amount of information (d) It is a secondary memory.

Harder you work, luckier you get P a g e | 3.3


for quick reference by CPU

20. Operating System Software provides Application Program Interfaces (API) which can be used by
application developers to create application software. This is referred to as _____.

(a) Memory Management (b) Hardware Independence


(c) Task Management (d) File Management

21. Identify from the following controls of Information System that deals with framing of high-level IT
policies, procedures, and standards on a holistic view.

a) Management Controls b) Environmental Controls


c) Access Controls d) Physical Controls

22. Mr. Neeraj is working on a project on healthcare system where he has to perform data mining on the
database of patients of last five years in ABC Hospital. The hospital provided him inconsistent data
with lots of errors and missing values. He has to apply various techniques to get rid of these
anomalies. Identify from the following process which he can use to get rid of these anomalies.

a) Data Cleaning b) Data Selection


c) Data Integration d) Data Transformation

23. The Chief sales head of the company wants to evaluate an annual sale made by sales revenue of the
company’s branches in different regions. Being the Sales manager of the company, Mr. Kumar is
asked to prepare the spreadsheets using computer software. Which of the following software he may
be working on?

a) Application software b) Operating Systems Software


c) System Software d) Asset Management Software

24. A Database Model is a type of data model that determines the logical structure of a database and
fundamentally determines in which manner data can be stored, organized and manipulated. Which of
the following database model stores and organizes data in a table structure?

a) Network data model b) Hierarchical data model


c) Object oriented database model d) Relational database model

25. Under Asynchronous attacks in a telecommunication network system, __________ involves spying on
information being transmitted over communication network.

a) Wire-tapping b) Data Leakage


c) Subversive Attacks d) Piggybacking

26. While doing a concurrent audit in a bank, Mr. X noticed that some changes have been made to advance
master data files of the database. He uses an audit technique to identify such suspicious transactions.
This technique shall be defined as _____________.
Information Systems and Its Components – Nov 23
a) Continuous and Intermittent Simulation (CIS) b) System Control Audit Review File (SCARF)
c) Audit Hook d) Integrated Test Facility (ITF)

27. A new system has been developed that ensures that as soon as inventory level goes below re-order level
in INVENTORY SYSTEM, a purchase requisition is generated from PURCHASE SYSTEM. Which testing
method shall be best suited to check whether the two systems are working properly?

a) Unit Testing b) Program Testing


c) Integration Testing d) Whole-of-Program Testing

28. Database is a collection of Data. Various database models are used. The database models having using a
primary key is _______________.

a) OODBMS b) RDBMS
c) Network Database Model d) Hierarchical Database Model

29. Pick the ODD one out.

a) Accounting Information System b) Input


c) Output d) Process

30. Which of the following does not belong to activities executed by Operating System?

a) It allows more than one user to use the system. b) It uses minimal memory.
c) It provides logical security to identify and d) It keeps the track of data stored.
authenticate various users.

31. While Auditing the Input Controls in an enterprise ABC, which of the following controls will not fall under
the purview of Input Controls?

a) Source Document Controls b) Data Coding Controls


c) Boundary Controls d) Batch Controls

32. In ABC, financial institution, the authorized officials identified existence of numerous accounts numbers
of inactive accounts in their usage data of active customers. Complaint was reported to their IT team.
Which type of controls can be exercised by the IT Team in the given case?

a) Corrective Controls b) Detective Controls


c) Preventive Controls d) Compensatory Controls

33. Provide the correct sequence of phases of Program Development Life Cycle. (1) Operations and
Maintenance, (2) Coding, (3) Control, (4) Design, (5) Testing and (6) Planning

a) (4)-(6)-(2)-(3)-(1)-(5) b) (6)-(3)-(4)-(2)-(5)-(1)
c) (1)-(6)-(3)-(5)-(4)-(2) d) (3)-(5)-(2)-(1)-(6)-(4)

34. Tick the incorrect statement.


a) In Relational Database model, the named columns of the relation are called Domain.
b) In Relational Database model, a Relation is a table with rows and columns

Harder you work, luckier you get P a g e | 3.5


c) In Relational Database model, the named columns of the relation are called Attributes.
d) In Relational Database model, the Domain is the set of the values an attribute can take.

35. Which of the following does not fit into best practices while dealing with passwords in order to avoid
system failures?

a) Periodic change of passwords b) Unlimited number of entry attempts


c) Minimum password length d) Hashing of passwords

36. Which activity is not incorporated during audit of Environmental Controls?

a) Backup Power b) Water Detection


c) Fire detection and Suppression d) Guards and Dogs

37. As an Information Systems Auditor, mention the activity that does not form part of audit of Logical
Access Controls?

a) Access Violations b) Intrusion Detection and Prevention


c) Backup Power d) Shared Accounts

38. A Business Continuity Plan (BCP) is an example of _____________.

a) Managerial b) Application
c) Preventive d) Corrective

39. In telecommunication network, ____________ is the act of following an authorized person through a
secured door or electronically attaching to an authorized telecommunication link that intercepts and
alters transmissions. This involves intercepting communication between the operating system and the
user and modifying them or substituting new messages.

a) Wire tapping b) Piggybacking


c) Subversive attacks d) Data Leakage

40. Database Management Systems (DBMS) helps the organization to do various operations on the files
except _____________.

a) Adding or deleting files from database b) Inserting or modifying existing files


c) Retrieving or deleting data from existing files d) Duplicating Files

41. Except one, following are the means through which protection can be achieved in case an internet
connection exposes an organization to the harmful elements of the outside world. Identify it.

a) Security of network services b) Call back devices


c) Access Token d) Segregation of Networks

42. NMN Ltd. has its five branches in different cities of India. All branches are interconnected and use
centralized mechanism for data sharing and storage. To have a secure communication between its
Information Systems and Its Components – Nov 23
various branches, the company has installed anti-virus software and intrusion prevention system. The
installation of these systems is covered under which type of control?

a) Detective Control b) Preventive Control


c) Community Control d) Application Control

43. Mr. Amit is appointed as an IS auditor by GH Financial services. He uses continuous audit techniques to
check whether the accounting systems of the company restricts the cash payment in excess of 50,000/-
or not. He enters a dummy entity in the application file to test this condition. Which of the following
continuous audit technique is being used by Mr. Amit for this audit?

a) Snapshot b) Integrated Test Facility


c) Continuous and Intermittent Simulation d) System Control Audit Review File

44. The Information Systems Auditing is defined as the process of attesting various objectives that are
mentioned below:

i) Asset safeguarding

ii) Data integrity

iii) System effectiveness

iv) System efficiency

The underpinned definition of these objectives is as under:

I. This involves protecting of various resources like hardware, software, data files etc. by using internal
controls from unauthorized access.

II. This involves whether a system reports information in a way that facilitates its users in decision -
making or not.

III. This involves use of various Information system resources minimally with their optimum utilization.

IV. This involves maintaining the accuracy, completeness, reliability, and transparency of the data.

Match the objectives with their definitions:


a) (i) – I, (ii) – IV, (iii) - II, (iv) – III b) (i) – I, (ii) – II, (iii) - III, (iv) – IV
c) (i) – IV, (ii) – III, (iii) - II, (iv) – I d) (i) – II, (ii) – III, (iii) - I, (iv) – IV

45. Refer below mentioned statements are related to memory of Computer System.

i) It is made up of semi-conductors.

ii) It is directly accessed by the CPU.

iii) Data is permanently stored in this memory.

iv) It is made up of magnetic and optical material.

v) It is volatile in nature.

Choose the correct set of true statements w.r.t. Primary Memory of the Computer System.

Harder you work, luckier you get P a g e | 3.7


a) i, ii, v b) i, ii, iv
c) iii, iv, v d) i, iii, v

46. Following information w.r.t Telecommunication sector is stored somewhere in Database Management
System.
(i) The information related to monthly bill details, call records, minimum balance etc.
(ii) The information regarding product promotions, decisions related to sales, cash back offers etc.
(iii) The information analyzed by using different techniques to find out call duration w.r.t a particular
age group from the entire data available.
The relevant term for their appropriate storage could be any of the following:
(A) Datawarehouse
(B) Data Mining
(C) Database
Choose the correct match from the following:
a) (i) – (C), (ii) – (B), (iii) – (A) b) (i) – (B), (ii) – (C), (iii) – (A)
c) (i) – (C), (ii) – (A), (iii) – (B) d) (i) – (A), (ii) – (B), (iii) – (C)

47. The key areas that an auditor should emphasize while auditing an Application Control Framework of
an organization are mentioned below.

i. Auditors should determine whether the report collection, distribution and printing controls are well
executed in an organization or not.
ii. Auditors should assess the performance of the validation controls to check for any data
processing errors.
iii. Auditors need to determine how well the safeguard assets are used & preserve data integrity.
iv. Auditors need to comprehend various approaches used to enter data into an application system
and their relative strengths and weaknesses.
v. Auditors must assess the topological controls to review the logical arrangement of various nodes
and their connectivity using various internetworking devices in a network.
The auditing of Application Control Framework can be categorized as under:
I. Auditing Input Controls
II. Auditing Communication Controls
III. Auditing Boundary Controls
IV. Auditing Output Controls
V. Auditing Processing Controls
Match the key area with its corresponding category of auditing of Application Control:
a. (i)– I, (ii) – II, (iii) – III, (iv) – IV, (v) – V
b. (i) – IV, (ii) – V, (iii) – III, (iv) – I, (v) – II
c. (i) – V, (ii) – III, (iii) – I, (iv) – IV, (v) – II
d. (i) – I, (ii) – V, (iii) – III, (iv) – II, (v) – IV
Information Systems and Its Components – Nov 23
48. Studious Library is a public library which provides each of its subscribers a unique membership-id and
PIN number as an access control mechanism to access its e-books/research papers and journals through
its app. Under which of following Application control does this specific access control mechanism fall.

a) Physical Control b) Boundary Control


c) Communication Control d) Input Control

49. Various risks that may persist in the working environment of an organisation are controlled using
following measures.
(I) Fire Alarms
(II) Identification Badges
(III) Privilege Management
(IV) Firewall
(V) Password Management System
The controls under which the aforementioned measures are categorized as under:
(A) Network Access Control
(B) User Access Management
(C) Physical Controls
(D) Environmental Controls
(E) Operating System Access Control
Choose the correct option that pairs the measure/factors with its associated controls.
a) (I)–(A), (II)-(B), (III)-(C), (IV)–(D), (V)–(E)
b) (IV)–(B), (I)-(A), (II)-(D), (IV)–(E), (V)–(C)
c) (I)–(D), (II)-(C), (III)-(B), (IV)–(A), (V)–(E)
d) (I)–(D), (II)-(B), (III)-(A), (IV)–(C), (V)–(E)
50. To avoid any discrepancy in the calculation of the salary based on number of working days of each
employee, a company has implemented Biometric Attendance System for employees in its working
environment. Which of the following control is applied by company in this case?
a) Preventive Control e) Detective Control
b) Corrective Control c) Manual Control

2. A D D IT IO NA L MCQ S

51. Which of the following refers to process of deciding on how to communicate the data from source to
destination in a network?

a) Routing b) Bandwidth
c) Resilience d) Contention

52. Which of the following is not values provided by Telecommunications?

Harder you work, luckier you get P a g e | 3.9


a) Time compression b) Better Understanding of Data
c) Overcoming geographical dispersion d) Restructuring business relationships

53. Which is the high-speed memory unit CPU for storing small amount of data?

a) Control unit b) Arithmetic & logical unit


c) Registers d) Local area network

54. Which is the advantage of DBMS?

a) Permitting data sharing b) Integrity can be maintained


c) Program & file consistency d) All of the above

55. _________ is the conversion of data into a secret code for storage in databases and transmission over
networks.

(a) Cipher Text (b) Encryption


(c) Decryption (d) Logging

56. Which of these is not a mobile operating system?

(a) Android (b) iOS


(c) Tywin (d) Windows Phone OS

57. SCARF stands for ____________.

(a) System Control Audit Review File (b) System Control Audit Report File
(c) Simulation Control Audit Review File (d) System Control Audit Review Format

58. Which function of the processing device performs operation as addition, subtraction, multiplication, &
logical comparison of numbers?

a) Control unit b) Arithmetic & logical unit


c) Registers d) Local area network

59. Which is the imaginary memory supported by some operating system in conjunction with the hardware?

a) Primary memory b) Secondary memory


c) Virtual memory d) Internal memory

60. Which database model allows the definition of the data & their structures, storage and retrieval
operations & integrity constrains that can be organized in a table structure?

a) Hierarchical database model b) Network database model


c) Relational database model d) Object oriented database model

61. Which of the following is not a characteristic of corrective control?

a) Minimizing the impact of threat b) Identifying cause of problem


c) Minimizing future occurrence of incidents d) Surprise checks by supervisor
Information Systems and Its Components – Nov 23
62. Who are the logical access violators?

a) Hackers b) Employees
c) IS personnel d) All of the above

63. Which of the following performs validation checks to identify error during processing of data?

a) Real memory control b) Virtual memory control


c) Application software control d) Processor control

64. Tracing a transaction is a computerized system can be performed with the help of _________.

a) Audit hooks b) Integrated test facility


c) Snapshot d) None of these

65. Fire damage, power spikes and water damage are the example of _______.

a) Environmental control b) Physical access control


c) Logical access control d) None of these

66. Which is not the example of User Access Management control?

a) User registration b) Privilege management


c) User password management d) Segregation of networks

67. Which type of output is used for individual who are blind as raised lines drawing?

a) Textual output b) Audio output


c) Tactile output d) Video output

68. Which approach starts by creating small data warehouse, called data marts, to solve specific business
problems?

a) Bottom up b) Top down


c) Big data d) None of the above

69. Which of the following is not the example of network access control?

a) Segregation of network b) Firewall


c) Encryption d) User registration

70. Which of the following is not the function of operation management control?

a) Computer operation b) Network operation


c) Management of outsourced function d) Access token

71. Which error occur when one digit in a code is replaced with another?
Or

83276 is recorded as 83266. Which type of error is it?

a) Additional error b) Truncation error


c) Substitution error d) None of these

Harder you work, luckier you get P a g e | 3.11


72. In which data processing control two or more fields can be compared and cross verified to ensure their
correctness?

a) Run to run totals b) Edit checks


c) Exception report d) Reasonable verification

73. Which of the following are audit routines that flag suspicious transaction?

a) Snapshots b) Audit hooks


c) ITF d) SCARF

74. Which approach suggest that we should start by creating an enterprise-wide data warehouse?

a) Bottom up b) Top down


c) Big data d) None of these

75. Which of these refers to the situation that arises when there is conflict for some common resource in a
network?

a) Routing b) Bandwidth
c) Resilience d) Contention

76. Which of the following is not type of batch Control Totals?

a) Financial totals b) Field Total


c) Document/Record Counts d) Hash totals

77. Well known example of Trojan due to which users cannot save their half-finished work.

a) Bomb b) Worm
c) Trap doors d) Christmas cards

78. Which is a system that enforces access control between two networks?

a) Firewall b) Encryption
c) Callback devices d) Routing control

79. Which error occur when two adjacent digits are reversed?
Or
12345 is recorded as 21345. Which type of error is it?

a) Single transportation error b) Multiple transportation error


c) Truncation error d) None of these

80. Which are trails that can be designed to record activity at the system, application, & user level?

a) Audit trails b) Audit hooks


c) Snapshots d) Polling

81. Which control maintains the chronology of events that occur either to the database definition or the
database itself?
Information Systems and Its Components – Nov 23
a) Processing controls b) Output controls
c) Communication controls d) Database controls

82. Which is a set of computer program that manages computer hardware resources & act as an interface
with computer application program?

a) Operating system b) Maintenance system


c) Supporting system d) Installation system

83. Which is a process of analyzing data to find previously unknown trends, pattern & association to make
decision?

a) Data appetite b) Data management


c) Data orientation d) Data mining

84. Which is the benefit of computer network?

a) Computational power b) Reliability


c) User communication d) All of the above

85. _______ is needed because nodes in network can differ in terms of the rate at which they can send,
received and process data.

a) Flow control b) Link control


c) Topological control d) None of these

86. Which feature of operating system helps in operating resources to make optimum utilization of
resources?

a) Memory management b) Network capability


c) Task management d) File management

87. Define correct sequence of business process flow:

i) interpretation/ evaluation, ii) data transformation, iii) selection, iv) data mining

a) i, iv, iii, ii b) iii, ii, iv, i


c) ii, iii, i, iv d) iv, i, iii, i

88. In which of the following door lock, a magnetic or embedded chip-based plastic card key or token may
be entered a reader to gain access in these systems?

a) Cipher locks b) Bolting door locks


c) Electronics door locks d) Plastic cards

89. Which of the following activity is considered under audit environment control?

a) Power conditioning b) Backup power


c) Cleanliness d) All of the above

90. Google & yahoo are the example of _______ which should consult to see what information about
organization is available?

Harder you work, luckier you get P a g e | 3.13


a) Search engine b) Social networking sites
c) Justification on online presence d) Online sales sites

91. Which is not the functional unit of processing device?

a) Control unit b) Arithmetic & logical unit


c) Registers d) Local area network

92. MS office 2019 has MS word, MS Excel, MS access etc. are examples of _______.

a) Content access software b) Media development


c) Application suit d) Information worker software

93. Which of these is collection of record?

a) Characters b) Field
c) Records d) File

94. Which is collection of computers & other hardware interconnected by communication channel that
allows Sharing of resource & information?

a) Computer network b) Computer hardware


c) Computer software d) Computer database

95. Anti- virus software & firewall are the example of ______

a) Preventive control b) Detective control


c) Corrective control d) None of these

96. Which control has a pair of doors that are typically found in entries to facilities such as computer room
and document station

a) controlled visitors’ access b) computer Terminal locks


c) bonded personnel d) Dead man door

97. Motivating, guiding & communicating with personal is known as ___________.

a) Leading b) Organizing
c) Planning d) Controlling

98. Which is not the example of biometric device:

a) Password b) Thumb print


c) Finger impression d) Eye retina

99. Which is the full form of SPOOL?

a) Simultaneous Peripherals Operations Online b) Simulation Peripherals Operations Online


c) Simultaneous Periodic Operations Online d) Simulation Periodic Operations Online

100. Which is not the role of IS auditor in auditing physical access control?
Information Systems and Its Components – Nov 23
a) Risk management b) Process management
c) Controls assessment d) Review of document

101. Facebook, LinkedIn, my space, and twitter are the examples of ______.

a) Search engine b) Social networking sites


c) Justification on online presence d) Online sale sites

102. Which of these is not objective of Audit Trail Objectives?

a) Statutory Requirement Fulfilment b) Reconstructing Events


c) Detecting Unauthorized Access d) Personal Accountability

103. Which of the following audit tool is not embedded in the Application System?

a) Snapshots b) System Control Audit Review File


c) Audit Hooks d) Continuous and Intermittent Simulation

104. Which of the following is not a type of maintenance of Programs?

a) Repair Maintenance b) Periodic Maintenance


c) Adaptive Maintenance d) Perfective Maintenance

105. Which of the following is not a type of Segregation of Duties controls?

a) Password Management b) Periodic reviews


c) Transaction Authorization d) Split custody of high-value assets

106. Auditing physical access requires the auditor to review the physical access risk and controls to form an
opinion on the effectiveness of the physical access controls. This involves the following:

a) Risk Assessment b) Controls Assessment


c) Review of Documents d) All of the above

Answer Key

1. D 2. D 3. A 4. C 5. D 6. B 7. A

8. B 9. A 10. C 11. D 12. C 13. D 14. B

15. A 16. B 17. B 18. C 19. D 20. B 21. A

22. A 23. A 24. D 25. A 26. C 27. C 28. B

29. A 30. B 31. C 32. B 33. B 34. A 35. B

36. D 37. C 38. D 39. B 40. D 41. C 42. B

43. B 44. A 45. A 46. C 47. B 48. B 49. C

50. A 51. A 52. B 53. C 54. D 55. B 56. C

57. A 58. B 59. C 60. C 61. D 62. D 63. C

Harder you work, luckier you get P a g e | 3.15


64. C 65. A 66. D 67. C 68. A 69. D 70. D

71. C 72. D 73. B 74. B 75. D 76. B 77. D

78. A 79. A 80. A 81. D 82. A 83. D 84. D

85. A 86. C 87. B 88. C 89. D 90. A 91. D

92. C 93. D 94. A 95. A 96. D 97. A 98. A

99. A 100. B 101. B 102. A 103. D 104. B 105. A

106. D

You might also like