CPA Business Environment and Concepts (BEC) : Information Technology

Study concepts, example questions & explanations for CPA Business Environment and Concepts (BEC)

varsity tutors app store varsity tutors android store

All CPA Business Environment and Concepts (BEC) Resources

77 Practice Tests Question of the Day Flashcards Learn by Concept

Example Questions

Example Question #1 : Risk And Controls

A digital signature is used primarily to determine that a message is:

Possible Answers:

Not intercepted in route

Received by the intended recipient

From an authentic sender

Sent to the correct address

Correct answer:

From an authentic sender

Explanation:

A digital signature is a means of ensuring that the sender of a message is authentic.

Example Question #4 : Risk And Controls

A(n) _______ requires a full backup of all available data, regardless of whether or not it was saved before.

Possible Answers:

Full backup

Incremental backup

Negative backup

Partial backup

Correct answer:

Full backup

Explanation:

An incremental backup saves time by not having to duplicate data. A full backup would duplicate all saved data. The other terms are distractors.

Example Question #1 : Emerging Technologies

What type of data processing system would be most appropriate for a company that is opening a new retail location?

Possible Answers:

Sequential file processing

Batch processing

Real time processing

Direct access processing

Correct answer:

Real time processing

Explanation:

A new retail location would be significantly improved with real time processing in inventory.

Example Question #2 : Emerging Technologies

Which of the following can be discovered using a data mining process?

Possible Answers:

Artificial intelligence

Data structure

Previously unknown information

Standard query reporting

Correct answer:

Previously unknown information

Explanation:

Data mining can be used to sort through data in order to discover previously unknown information.

Example Question #3 : Emerging Technologies

Analysis of large and diverse amounts of data included in data warehouses is often referred to as:

Possible Answers:

Electronic Data Interchange

Data mining

Data processing

Systems analysis

Correct answer:

Data mining

Explanation:

This is the definition of the process of data mining.

Example Question #4 : Emerging Technologies

General controls in an information system include each of the following except:

Possible Answers:

Software acquisition

Information technology infrastructure

Security management

Logic tests

Correct answer:

Logic tests

Explanation:

General controls ensure that an organization's control environment is well managed and stable. Logic tests are not one of the components of general controls.

Example Question #5 : Emerging Technologies

Which of the following activities would most likely detect computer related fraud?

Possible Answers:

Conducting fraud awareness training

Using data encryption

Performing validity checks

Reviewing the systems access log

Correct answer:

Reviewing the systems access log

Explanation:

System access logs are electronic lists of who has accessed or has attempted to access systems or parts of systems or data or subsets of data.

Example Question #1 : Emerging Technologies

______ is a way of distributing software through applications hosted by a vendor and made available to customers over the web.

Possible Answers:

Platform as a service

Infrastructure as a service

IT as a service

Software as a service

Correct answer:

Software as a service

Explanation:

IT as a service is not a term, software as a service relates to applications hosted by a vendor, and platform as a service allows customers to host their own applications.

Example Question #1 : Cobit Model

Which organization created the COBIT framework?

Possible Answers:

FASB

ISACA (Information Systems Audit and Control Association)

US Government IT Commission

Treadway Commission

Correct answer:

ISACA (Information Systems Audit and Control Association)

Explanation:

The ISACA is the organization which created the COBIT framework.

Example Question #2 : Cobit Model

Per ISACA, beneficiaries of an implemented COBIT framework would include all of the following except:

Possible Answers:

Audit committee members

Process owners

Risk committee

Hourly employees

Correct answer:

Hourly employees

Explanation:

The beneficiaries of an implemented COBIT framework should be those with more of a stake in the operations of the company.

All CPA Business Environment and Concepts (BEC) Resources

77 Practice Tests Question of the Day Flashcards Learn by Concept
Learning Tools by Varsity Tutors