CPA Business Environment and Concepts (BEC) : Information Technology

Study concepts, example questions & explanations for CPA Business Environment and Concepts (BEC)

varsity tutors app store varsity tutors android store

All CPA Business Environment and Concepts (BEC) Resources

77 Practice Tests Question of the Day Flashcards Learn by Concept

Example Questions

Example Question #1 : Information Technology

Which of the following types of business planning focuses on how a company can most effectively restore business operations following a disaster?

Possible Answers:

Continuity planning

Budget planning

Capacity planning

Strategy planning

Correct answer:

Continuity planning

Explanation:

Business continuity planning focuses on restoring and continuing operations in the event a disaster occurs that affects an organization.

Example Question #1 : Information Technology

Which of the following best describes a hot site?

Possible Answers:

Location within the company that is most vulnerable to disaster

Location equipped with the necessary hardware and possibly software

Location where a company can install data processing equipment on short notice

Location that is considered too close to a potential disaster area

Correct answer:

Location equipped with the necessary hardware and possibly software

Explanation:

A hot site will have hardware that can be configured to be used for the processing needs of the client.

Example Question #1 : Hot Sites/Cold Sites

In which of the following locations should a copy of the accounting system data backup of year end information be stored?

Possible Answers:

Fireproof cabinet in the data network room

Locked file cabinet in the accounting department

Data backup server in the network room

Secure off site location

Correct answer:

Secure off site location

Explanation:

The accounting system data backup of year end information should be stored in some kind of secure off site location and not in any of the other locations.

Example Question #3 : Information Technology

The protective device that allows private intranet users to access the Internet without allowing Internet users access to private Intranet information is called a:

Possible Answers:

Anti virus program

Browser

Firewall

Password

Correct answer:

Firewall

Explanation:

A firewall is a protective device that allows private intranet users to access the Internet without allowing Internet users access to private Intranet information.

Example Question #1 : Information Technology

Which of the following is the step where the intended recipient converts the ciphertext into plain text?

Possible Answers:

PKI

Decryption or decipherment

Digital certificates

Encryption

Correct answer:

Decryption or decipherment

Explanation:

This step is where the intended recipient converts the ciphertext into plain text.

Example Question #2 : Information Technology

A(n) _______ relates to copying data items that have been altered since the previous data backup.

Possible Answers:

Full backup

Incremental backup

Partial backup

Negative backup

Correct answer:

Incremental backup

Explanation:

An incremental backup saves time by not having to duplicate data. A full backup would duplicate all saved data. The other terms are distractors.

Example Question #1 : Information Technology

An enterprise resource planning system is designed to:

Possible Answers:

Allow nonexperts to make decisions about a particular problem

Help with the decision making process

Present executives with the information needed to make strategic plans

Integrate data from all aspects of an organization's activities

Correct answer:

Integrate data from all aspects of an organization's activities

Explanation:

ERP systems work to integrate data from all aspects of an organization's activities.

Example Question #2 : Information Technology

Which of the following factors has the greatest impact on the design of an effective management reporting system?

Possible Answers:

Types of decisions to be made

Number of transactions to be processed

Number of authorized users

Number of regulatory agencies to be satisfied

Correct answer:

Types of decisions to be made

Explanation:

The types of decisions to be made have the greatest impact on the design of an effective management reporting system.

Example Question #3 : Information Technology

Which of the following terms best describes a Decision Support System (DSS)?

Possible Answers:

Formalized system

Management reporting system

Structured system

Interactive system

Correct answer:

Interactive system

Explanation:

A DSS is an interactive system in order to facilitate with the decision-making process.

Example Question #4 : Information Technology

Which of the following types of control plans is particular to a specific process or subsystem rather than related to the timing of its occurrence?

Possible Answers:

Corrective

Application

Preventive

Detective

Correct answer:

Application

Explanation:

Application controls are written into the application and are specific to the particular process or subsystem.

All CPA Business Environment and Concepts (BEC) Resources

77 Practice Tests Question of the Day Flashcards Learn by Concept
Learning Tools by Varsity Tutors