All CPA Business Environment and Concepts (BEC) Resources
Example Questions
Example Question #1 : Information Technology
Which of the following types of business planning focuses on how a company can most effectively restore business operations following a disaster?
Continuity planning
Budget planning
Capacity planning
Strategy planning
Continuity planning
Business continuity planning focuses on restoring and continuing operations in the event a disaster occurs that affects an organization.
Example Question #1 : Information Technology
Which of the following best describes a hot site?
Location equipped with the necessary hardware and possibly software
Location where a company can install data processing equipment on short notice
Location within the company that is most vulnerable to disaster
Location that is considered too close to a potential disaster area
Location equipped with the necessary hardware and possibly software
A hot site will have hardware that can be configured to be used for the processing needs of the client.
Example Question #1 : Hot Sites/Cold Sites
In which of the following locations should a copy of the accounting system data backup of year end information be stored?
Fireproof cabinet in the data network room
Locked file cabinet in the accounting department
Data backup server in the network room
Secure off site location
Secure off site location
The accounting system data backup of year end information should be stored in some kind of secure off site location and not in any of the other locations.
Example Question #3 : Information Technology
The protective device that allows private intranet users to access the Internet without allowing Internet users access to private Intranet information is called a:
Anti virus program
Browser
Firewall
Password
Firewall
A firewall is a protective device that allows private intranet users to access the Internet without allowing Internet users access to private Intranet information.
Example Question #1 : Information Technology
Which of the following is the step where the intended recipient converts the ciphertext into plain text?
PKI
Decryption or decipherment
Digital certificates
Encryption
Decryption or decipherment
This step is where the intended recipient converts the ciphertext into plain text.
Example Question #2 : Information Technology
A(n) _______ relates to copying data items that have been altered since the previous data backup.
Full backup
Incremental backup
Partial backup
Negative backup
Incremental backup
An incremental backup saves time by not having to duplicate data. A full backup would duplicate all saved data. The other terms are distractors.
Example Question #1 : Information Technology
An enterprise resource planning system is designed to:
Allow nonexperts to make decisions about a particular problem
Help with the decision making process
Present executives with the information needed to make strategic plans
Integrate data from all aspects of an organization's activities
Integrate data from all aspects of an organization's activities
ERP systems work to integrate data from all aspects of an organization's activities.
Example Question #2 : Information Technology
Which of the following factors has the greatest impact on the design of an effective management reporting system?
Types of decisions to be made
Number of transactions to be processed
Number of authorized users
Number of regulatory agencies to be satisfied
Types of decisions to be made
The types of decisions to be made have the greatest impact on the design of an effective management reporting system.
Example Question #3 : Information Technology
Which of the following terms best describes a Decision Support System (DSS)?
Formalized system
Management reporting system
Structured system
Interactive system
Interactive system
A DSS is an interactive system in order to facilitate with the decision-making process.
Example Question #4 : Information Technology
Which of the following types of control plans is particular to a specific process or subsystem rather than related to the timing of its occurrence?
Corrective
Application
Preventive
Detective
Application
Application controls are written into the application and are specific to the particular process or subsystem.
Certified Tutor
Certified Tutor