A BPMN process flow can start in one pool and end in the collaborating pool.
FALSECorrect
A Class is a separately identifiable collection of business relationships.
FALSECorrect
A company would like to implement a management information system that integrates all functional areas within an organization to allow information exchange and collaboration among all parties involved in business operations. Which of the following systems is most effective for this application?
An enterprise resource planning system.Correct
A company's audit committee is responsible for fraud risk assessments.
FALSECorrect
A labor plan class would establish standard overhead allocation rates.
TRUECorrect
A pool in a BPMN model does not actually have to display any activities.
TRUECorrect
A supply chain system does not include information about.
Prospective customersCorrect
A supply chain:
Refers to the flow of materials, information, payments and services.Correct
A systems analyst analyzes a business problem that might be addressed by an information system and recommends software or systems to address that problem.
TRUECorrect
A value chain is defined as the flow of materials, information, payments, and services from customer to supplier.
FALSECorrect
Access offers modules, which are defined by users to automate processes like opening a specific form.
FALSECorrect
According to COSO, which of the following components of the enterprise risk management addresses an entity's integrity and ethical values?
Internal environment.Correct
According to the Sarbanes-Oxley Act of 2002, it is the responsibility of the Board of Directors to establish and maintain the effectiveness of internal control.
FALSECorrect
Accounting and Finance is a primary activity in the value chain.
FALSECorrect
Accounting information systems are:
Records, processes and reportsCorrect
Accounting Information Systems at this date are all computerized.
FALSECorrect
An accounting information system (AIS) is defined as being an information system that records, processes and reports on transactions to provide financial information for decision making and control.
TRUECorrect
An enterprise resource planning system has which of the following advantages over multiple independent functional systems?
Increased responsiveness and flexibility while aiding in the decision-making process.Correct
An enterprise system is a centralized database that collects data from throughout the firm. This includes data from orders, customers, sales, inventory and employees.
TRUECorrect
An entity doing business on the internet most likely could use any of the following methods to prevent unauthorized intruders from accessing proprietary information except:
Batch processing.Correct
An information technology director collected the names and locations of key vendors, current hardware configuration, names of team members, and an alternative processing location. What is the director most likely preparing?
Disaster recovery plan.Correct
An intermediate error event can be used to model process exceptions.
TRUECorrect
Application controls limit who can change records in a system.
FALSECorrect
Asymmetric-key encryption is suitable for encrypting large data sets or messages.
FALSECorrect
Bacchus, Inc. is a large multinational corporation with various business units around the world. After a fire destroyed the corporation headquarters and largest manufacturing site, plans for which of the following would help Bacchus ensure a timely recovery?
Business continuity.Correct
Business models provide value in all of the following areas except which one?
Employee performance appraisalCorrect
Business rules describe appropriate actions to take based on process conditions.
TRUECorrect
Certificate Authority (CA) issues digital certificates to bond the subscriber with a public key and a private key.
TRUECorrect
Classes could be grouped into Resources (R), Entity (E), and Assets (A) in data modeling.
FALSECorrect
Cloud computing is an internet-based computing where shared resources, software, and information is provided to firms on demand.
TRUECorrect
COBIT (Control Objectives for Information and related Technology) is a generally accepted framework for IT governance in the U.S.
TRUECorrect
Computer-assisted audit techniques (CAAT) are often used when auditing a company's IT infrastructure.
FALSECorrect
Consider the following BPMN diagram of a subprocess. Which of the following is required to correct an error in the diagram?
Add a sequence flow to an end event after the discard errors activity.Correct
Conversion labor costs become part of cost of goods sold.
TRUECorrect
Data governance is the convergence of data quality, data management, data policies, business process management, and risk management surrounding the handling of data in a company.
TRUECorrect
Data is defined as being information organized in a meaningful way to be useful to the user.
TRUECorrect
Data mining is the process of searching for patterns in the data in a data warehouse and to analyze the patterns for decision making.
TRUECorrect
Disaster recovery planning and business continuity management are preventive controls.
FALSECorrect
Documentation can be thought of as a tool for information transmission and communication.
TRUECorrect
Documentation helps with training but won't help with regulatory compliance issues.
FALSECorrect
Each Purchase Order would be ultimately linked to one cash disbursement.
FALSECorrect
Encryption is a preventive control ensuring data confidentiality and privacy during transmission and for storage.
TRUECorrect
Firewalls are security systems comprised of hardware and software that is built using routers, servers, and a variety of software.
TRUECorrect
Fraud triangle includes incentive, opportunity and an attitude to rationalize the fraud.
TRUECorrect
In a basic UML diagram of the conversion process, which of the following best describes the purpose of a duality association?
Links work in process events to the original production authorization.Correct
In a BPMN collaboration model of the purchase process, one pool describes the focal organization's activities and the other pool describes what?
The supplier's activitiesCorrect
In a BPMN collaboration model of the purchase process, which of the following is the appropriate term for the message flows between pools?
ChoreographyCorrect
In a collaboration model using BPMN, the interaction between participants is called orchestration.
FALSECorrect
In a computerized environment, internal controls can be categorized as general controls and application controls.
TRUECorrect
In a hierarchical data model, data elements are related in many-to-many relationships.
FALSECorrect
In a large multinational organization, which of the following job responsibilities should be assigned to be network administrator?
Managing remote access.Correct
In a large pubic corporation, evaluating internal control procedures should be responsibility of:
Internal audit staff who report to the board of directors.Correct
In Access, users can edit database information in reports.
FALSECorrect
In Microsoft Access, we use tables in a database for:
Data storageCorrect
In Unified Modeling Language (UML) Class diagrams, Associations are represented by dashed lines.
FALSECorrect
In Unified Modeling Language (UML) the options for maximum multiplicity values are 1 and *.
TRUECorrect
In Unified Modeling Language (UML) the options for minimum multiplicity values are 0, 1, and 2.
FALSECorrect
In Unified Modeling Language (UML) the options for minimum multiplicity values are 1 and *.
FALSECorrect
Integrated test facility (ITF) is an automated technique that enables test data to be continually evaluated during the normal operation of a system.
TRUECorrect
Integrity of information means the information is:
A and B are correct.Correct
Internal controls guarantee the accuracy and reliability of accounting records.
FALSECorrect
Key distribution and key management are problematic under the symmetric-key encryption.
TRUECorrect
One type of fault tolerance is using redundant units to provide a system the ability to continue functioning when part of the system fails.
TRUECorrect
Outbound logistics are the activities associated with receiving and storing raw materials and other partially completed materials, and distributing those materials to manufacturing when and where they are needed.
FALSECorrect
Processing controls are IT general controls.
FALSECorrect
Queries in Access are utilized by users to enter data into tables and view existing records.
FALSECorrect
Refer to the following diagram. Which of the following answers provides the best interpretation of the multiplicities for the association between the Order class and the Products class?
An order may include many products.Correct
Review of the audit log is an example of which of the following types of security control?
Detective.Correct
Review the following diagram. Which answer provides the best interpretation of the multiplicities for the association between the Employees and Production Authorization classes?
One employee can authorize production multiple times.Correct
Review the following diagram. Which answer provides the best interpretation of the multiplicities for the association between the Products and Production Authorization classes?
Each production authorization is related to one product.Correct
Review the following diagram. Which answer provides the best interpretation of the multiplicities for the association between the Quote class and the Order class?
Each quote may result in many future Orders.Correct
Segregation of duties reduces the risk of errors and irregularities in accounting records.
TRUECorrect
Service Activities as defined in the value chain are those activities that provide the support of customers after the products and services are sold to them (e.g. warranty repairs, parts, instruction manuals, etc.).
TRUECorrect
Symmetric-key encryption method is used to authenticate users.
FALSECorrect
The "Where" SQL clause can be used to link two tables.