Documente Academic
Documente Profesional
Documente Cultură
Question Answer
No
1 XML stands for_________ Extensible Markup Language
2 XML is a ___________ Recommendation. W3C
3 XML is a language that is very similar to which language ? HTML
4 DTD stands for ___________, which is called XML Schema. Document Type Definition
5 The extension of a XML document is ______________. (.xml)
To create a XML Map from XML schema, Go to which Tab in Excel Developer
6
____________.
7 XML is case-sensitive ? TRUE
8 Excel works primarily with ________ types of XML files. 2
9 What is the file extension of Schema file which contain schema tags ? (.xsd)
10 VBA stands for_______________ . Visual Basic for Applications
11 Macro enabled workbook file extension is _______________ .xlsm
12 There are _________ ways to open a Macro enabled workbook. 3
13 ANOVA stands for___________ Analysis of Variance
14 A function doesn’t require an argument is___________. TODAY()
15 In Excel, there are __________ functions for calculation of depreciation. 5
Which option allows you to Bold all the negative values within the selected Conditional Formatting
53
cell range?
_____________ allow us to perform calculations or operations that would Worksheet functions
54
otherwise be too cumbersome or impossible altogether.
55 Statistical functions in Excel help to calculate __________________ Arithmetic Mean,Median,Mode
56 Discounting Factor formula is ___________________ = 1 / (1+r) ^ n
________________ is considered as non cash expenditure and occupies Depreciation
57
a prominent place in Profit & Loss Account.
The value which can be realized at the end of life of fixed asset by selling it Salvage Value
58
is called _________________
____________ is prepared for planning for future as far as movement of Cash budget
59
cash is concerned.
____________ is the process of determining the present value of a
60 Discounting
payment or a stream of payments that is to be received in the future.
____________ is one of the core principals of finance and is the primary
61 factor used in pricing a stream of cash flows, such as those found in a Discounting
traditional bond or annuity.
62 XML schemas in Excel are called XML _____________. Elements
Financial analysis,Equity
Excel allows us to use various functions and even simple mathematical analysis,Leasing decisions and the list
63
calculations which can be used for _____________. goes on
Which cell reference show the reference to other sheet or reference to Sheet2!C4
64
other workbook in excel ?
65 Which of them is not a Range References? A1, A2 , A3, A4
66 Interest Coverage Ratio equals to _________. EBIT / Debt interest
If particular workbook have to open each time Excel started, where the XLSTART folder
67
workbook should be placed?
There is an absolute reference to cell
68 If the cell B1 contains the formula=$A$1, which of the statement is true ? A1.
__________ is a computerized mathematical technique that allows people Monte Carlo Simulation
69
to account for risk in quantitative analysis and decision making.
________ is the process of meeting the financial goals through the proper Financial planning
70
management of finances.
___________ can be defined as the process of setting the procedures in Corporate Planning
71
the organization for achieving the predefined goals.
________ shows ability of company to pay back long term loans along Interest Coverage Ratio
72
with interest or other charges from generation of profit from its operations.
77 The exact syntax of IPMT function is__________________. IPMT(rate, per, nper, pv, [fv], [type])
80 Method of tax calculations shall change according to _________. Annual Income,DOB,status of assess
Popular methods of capital budgeting include _________ and payback discounted cash flow,internal rate of
89 return,net present value
period.
_________ is the value of all future cash inflows less future cash outflows Net present value
90
as on today.
___________is the process of defining and analyzing the dangers to
91 individuals, businesses and government agencies posed by potential Risk analysis
natural and human-caused adverse events.
__________ which is used more often, does not involve numerical Qualitative risk analysis
92
probabilities or predictions of loss.
________ are generally used to present information in a simple and better Charts
93
way and also be used to analyse the risk in a better way.
It is a technique used to determine how different values of an independent
94 variable will impact a particular dependent variable under a given set of Sensitivity analysis
assumptions.
_______ involves computing different reinvestment rates for expected Scenario analysis
95
returns that are reinvested during the investment horizon.
96 NPER stands for______________________________ Number of Periods
Which function that is used to calculate the payment for specific loan terms PMT
97
____________
98 ________helps to break down the Return on Equity Du Point Analysis
_______ is a common method for financing property, facilities, and Leasing
99
equipment.
Structure, store, and transport
100 Find the correct sequence in case of XML file, are information.
The approach to ERP is to first develop a ______________ comprising the Business Model
116
business processes or activities that are the essence of a business.
119 Business Intelligence Systems are data-driven ___________________. Decision Support Systems
120 Finacle developed by _________ Infosys
121 Flexcube developed by ________ I-Flex
122 Quarz developed by ____ TCS
The server is a sophisticated computer that accepts service requests from Clients
123
different machines which are called__________
__________ server has to be a powerful and robust system as it has to Application Server
124
perform all the core banking operations.
125 ATMS stands for_________ Automated Teller Machine Server
143 __________controls check that the data entered is complete and correct. Input Controls
Logs of the various activities in CBS can be deleted immediately and also FALSE
151
be accessed by anybody.
152 CRR stands for _________________________ in terms of CBS. Cash Reserve Ratio
Does the IS Audit also include audit of the outsourcing activites carried out Yes
153
in the CBS system?
154 DRP stands for ___________________________ in terms of CBS. Disaster Recovery Planning
_____________are soultions applied when any kind of vulnerabilities Patches
155
discovered in networks in the CBS system.
156 __________can be viewed only by the DBA of an organisation. Database Log
Is performing periodic vulnerability assessment of the networks is Yes
157
necessary?
KYC stands for _________________________________ in terms
158 Know Your Customer
banking.
In CBS, the Accounts Management module deals with Creation of Savings Account,Creation
159 of Current Account,Overdraf
_____________________
160 Soft copy of the ATM journal rolls is called_____________ Electronic Journal
161 The ATM switch consists of a _____________________ computer,server
_______________testing should be done to check the unauthorised Penetration
162
access to the network in CBS.
_________enables transfer of money from one bank to another in "Real RTGS
163
time" and on "Gross" basis.
In _______system money transfers are done on a one to one basis while RTGS,NEFT
164
in _______system transfer is done in batches.
All the money transfers take place in the books of the Central bank(RBI)
165
_________________
166 EFT and NEFT work on _______________basis DNS
167 ________system of money transfer is primarily used for large transactions. RTGS
In RTGS, the STP generates an ___________for every outbound RTGS UTR
168
transaction.
169 UTR full form _________________________________ in terms of CBS. Unique Transaction Reference
170 STP stands for ________________________________ in terms of CBS. Straight Through Processing
171 CMS stands for ______________________________ in terms of CBS. Cash Management System
173 The Management Controls does not include ___________ Managing of Assets
_______is supported by advanced technology infrastructure and has high Core Banking Solution
174
standards of business functionality.
175 Which type of joins not available in Access 2010? Full join
A join returns only those rows from both tables that match on the joining Inner join
176
field is___________ in MS Access 2010.
The query returns all of the rows from left table, and also those rows from Lef outer join
177
the right table that is known as____________.
The query using ___________ returns all the rows from right table, and
178 also those rows from the left table that share a common value on both Right outer join
sides of join.
179 How can we add a table to the Query Design window_________? Select Design -> Show Table
180 ___________can be considered a questions in a data base. Queries
181 Operands can be_________ in MS Access 2010. Literals,Identifiers,Function
182 In example "Hello"+" " +" everyone" ,hello is _____ Text Literal
183 Length("Ms Access") will return the count of charcters is __________. 9
184 AND ,OR is a kind of ________ in MS-Access 2010. Logical
185 Comparision operators is also known as_______ in MS-Access 2010. Relational
186 LIKE operator works with______in MS Access 2010. Text,Date
187 IN operator is used __________ in MS Access 2010. To match the value to a set of values
195 Data warehouses are not the optimal environment for ____________ data. Unstructured
198 _________________ is the process of extracting patterns from data. Data Mining
___________________ is an approach to quickly answer multi- Online Analytical Processing
199
dimensional analytical queries.
The Output of an OLAP query is typically displayed in a ___________ Matrix
200
format.
______________ companies is planning to support tens of millions of B2C
201
customers with just hundreds of employees.
Increased Complexities,Legal
202 Which of the following is the limitation of Open Source ERP? Complexities,Unsuitable for
conventional applications
203 Which of the following is not an Open ERP software? Open-Project
_____ is the process of integrating all the business functions and ERP
204
processes in an organization to achieve numerous benefits.
________ must consider the fundamental issues of system integration by Manager
205
analyzing the organization's vision and corporate objectives.
206 The more the number of __________, the longer the implementation time. units
Customization of ERP systems is one of the major challenges in auditing TRUE
207
ERP security.
Tally.ERP 9 provides graphical analysis of data which helps the user to TRUE
208
perform deeper analysis.
The user can ________ the company data into multiple companies as per Split
209
financial periods required.
E-Filing of Returns refers to the process of electronically filing your tax Internet
210
returns through the ___________.
Tally.ERP 9 does not allows you to export the ETDS forms in NSDL
211 compliant formats as well as facilitates printing of TDS Forms in Physical FALSE
Form.
212 Tally.ERP 9 offers a data encryption option called _______________. Tally Vault
___________________ is the process of exchanging Tally.ERP 9 data Synchronization
213
between two or more locations.
The Tally website offers _______________, by which a user can Tally Chat
214
communicate with a Tally representative and get required information.
215 Tally.NET use _______________ for centralised Account Management. Control Centre
The data is transferred between the remote location and the server using a Encryption
216
secured mechanism called __________________.
217 Sales Tax Ledger falls under which Group? Duties and Taxes
219 If we purchase any Fixed asset in credit, we can pass it from _________. Journal mode
220 To save entry without any amount, we have to use _____________. Allow 0 value entry
Transfer of materials from one godown to another godown, use Stock Journal
221
______________.
222 While exporting Ledgers from Tally to Web Page, we use _________. HTML Format
224 In Service tax Credit Adjustment (%) should be either ____________. 0.2,1
225 Service Tax Report can be seen from _________________. Display > Statutory Reports
226 Can we allow Expenses/Fixed Assets in Purchase vouchers? Yes
Transfer from Main Cash to Petty Cash we require to pass _______ Contra
227
voucher.
228 Income Tax number of the Company will appear in which report? None of these
229 A business model is not a ___________ model. mathematical
230 OLAP systems use concept of OLAP cube called a ______________ cube multi dimensional
The data which is to be exported from Tally.ERP 9 can be in ________ XML,HTML,ASCII
231
format.
232 In Tally ERP-9 Remote Access is also known as __________. Tally.Net
Accessing data store on a remote location using Internet in Tally.ERP9 is Remote Data
233
called____________.
234 Tally.ERP9 can be classified user in two categories are___________. Local User,Remote User
Which of the following is not a predefined security level provided by Public User
235
Tally.ERP 9?
The business model is represented in the graphical form using flowcharts, flow diagrams
236
______________ and ________________
258 Tally.ERP 9 follows the DES __________ method to safeguard the data. encryption
Immediate posting and updation of books of accounts as soon as the Real Time Processing
259
transactions are entered. This is called as __________
Form 26, Annexure to 26,Form 27,
260 Which of the following ETDS forms are available in Tally.ERP 9? Annexure to 27,Form 26Q, Annexure
to 26Q
The exported eTDS file from Tally.ERP 9 can be validated through NSDL's File Validation Utility
261
freely downloadable utility called __________________
With ______________ technology the characters are reduced in breadth
262 and user is allowed to input additional characters which would make the Tally Fit
account name, entity complete and readable.
In Tally.ERP 9 __________________ provides the user with administrator
263 rights and the capability to check the entries made by the authorised users Audit Feature
and alter these entries, if necessary.
__________________ is an enabling framework which establishes a
264 connection through which the remote user can access the Client's data Tally.NET
without copying/transferring the data.
If we want the company to be connected automatically for remote access Contact On Load
265
on load, the property __________ needs to be set it as Yes.
266 _______ is centralized Banking Application Software. Core Banking Solution
_________has several components which have been designed to meet CBS
267
the demands of the banking industry.
Core Banking Solutions is a combination of an application software and
268 Network devices
________
______ is a large data housing infrastructure that provides high band width Data Centre
269
access to its clients.
Application servers,Data Base
270 Data centre servers are known as_____________. Servers,Web server
________ is a method of creating virtual networks within a physical VLAN
271
network.
Data communication between ______ VLANs can be controlled as per 2
272
business requirements.
273 Bank mate is developed by the _______ HCL Technologies
CBS Software resides in a Central application server which is located in Central Office Data Centre.
274
the ___________
A________ that runs the core banking solutions (CBS) and is centrally Central Application Server
275
accessed by the branches.
The _________of the application is capable of only entering the data at Client version
276
the end point that is branches.
The application server would be placed in a trusted inside zone in a Virtual Local Area Network
277
separate ____________
278 Application software would access the ________ Data base server
__________ are capable of being connected only when devices are Virtual Networks
279
connected to a switch.
A special feature of STP is that _____________ number for any outbound Uniform Transaction Reference
280
RTGS transaction is generated by the STP System.
_____________refers to the process of developing software which would
281 produce the required output from the input provided of course, using the System Development
necessary hardware and communication systems.
The______________is essential to ensure that computer security records Log management
282
are stored in sufficient detail for appropriate period of time.
Which of the following is “False“ in case of penetration testing in an IT Ensure recoverability of data in case
283 of system failure.
environment of CBS?
It is important that correct latest
Which of the following is erroneous statement in case of Change version of programe is used but
284
Management Control? version number need not be changed.
With respect to the customer changing the Pin at the ATM which procedure Old offset value used to derive new
285 PIN.
is the ”false“ procedure?
IN CBS, changes to the application server are not made directly to it, Test Server
286
instead done first on a __________
All the various servers in the central data centre are seggregated through VLANs
287
_______
When the central Data base is busy with central end of day activities or for
289 any other reason, the file containing the account balance of the customer Positive Balance File
is sent to the ATM switch. Such a file is called __________
290 The IBDS is located in a ____________ demilitarised zone
291 The main components of Internet Banking system consist of __________ Web server,IBAS,IBDS
Copy of the Anti Virus Software was updated promptly and regularly at the
292 Data Centre and pushed into all of the servers and in all the systems in the Push-pull method
branches by ________
The __________which is also residing in the server at the branch actually Application Sofware
293
does the banking operations.
In Core Banking concept all the systems of the bank are connected to the
294 Central office by means of a connectivity which may be either a Leased line
_________ or a dial up line.
The ________ is generated by the software and directly sent to equipment Personal Identification Number
295
for printed the Pin Mailer.
____________would also include the existence of built in controls in the
296 system to ensure proper processing of input data so as to provide the Process Control
required output.
____________refers to an arrangement wherein the issuing bank acts on Letter of Credit
297
the request and instructions of a customer.
_______________ is a process by which the bank ensures the Business Continuity Planning
298
maintenance and recovery of operations.
299 At which phase of testing the version of software is called “ beta version”? Programmer testing,User testing
In an Organization structure of IT Department which of the following Network administrator and Database
300 Administrator.
function is incompatible?
The number that is stored in the ATM switch is the difference of which of Pin No - Natural Pin
301
the following number?
The information retrieval of transactions taking place at ATM located at Sof copy of Electronic journal
302
remote locations is through _________
The number that is generated as soon as the customer inserts the card in Natural Pin
303
the ATM machine is __________
304 Which is not a Database management system. Unix
305 The _________ operator is used to find the null records in a table. IS NULL
When you create relationship between two tables, the Common field's data Same data type
306
type should be
307 SQL stands for____________________. Structured Query Language
MS Acces 2010 reads and writes to the .accdb file format in chunks also Pages
308
known as_____________.
309 DDL stands for ____________ Data Definition Language
310 DML stands for _____________ Data Manipulation Language
311 Whenever a tables gets update, the dependent query will update automatically
To extract the records based on date field, which of the symbol should be #
312
used
313 The data can be entered into a table in the ____________ view. Datasheet
314 In a Query the data can be sorted based Single column,Multiple columns
When you create a field using text data type in MS Access 2010, by 255
315
default field will have ____ character.
If we are using the same table for main query and sub-query,we need to Alternate names to the tables,Aliases
316 name to the tables
provide___________.
317 Update Query can be used to update_________ in MS Access 2010. Single Record,More than 1 record
318 Delete Query can be used to delete Single Record,More than 1 record
319 How many Primary key constraints can create in a table______. Only one
Unmatched Query can help to find records that have no corresponding TRUE
320
reord in other tables.
MS Access 2010 provides queries that can be used for obtaining the Sum(),Count(),Avg()
321
aggregated results instead of individual records are____________.
A function that Counts the set of values that satisfy the given criteria in MS Count()
322
Access 2010 is___________.
323 Aggreagate Query also known as___________. Group By queries,Total query
324 Which Query wizard is used to find repeated records in a table? Duplicate Query Wizard
325 Append Query is used to ______________ in a table in MS Access. Add Records
How does a query-based report differ in design to a report based on just It doesn’t
326
one table?
Use the Mailing label wizard text
327 How would you include some plain text into a mailing label report? option.
In a Microsoft Access 2010 report, the page numbering would most likely Page Footer
328
be placed into the:
If you wished to present a professionally looking form on screen that would All The tools of the form design
329 show all the necessary information, which of the following form design control gallery.
tools would you most likely use?
331 An .ACCDE file is a ___________ version of the original .ACCDB file. Locked-down
Which type of the query is used to accept the value from the user while Parameter Query
332
executing the query and fetch records accordingly
To encrypt the databse in Access 2010 must be opened in the Open Exclusive mode
333
__________________.
334 FIX() is a kind of ____ function in MS-Access 2010. Math
MS-Access 2010 has added new features of ______ to eliminate the need
335 Macro
of VBA code
Encrypting a database does not restrict access to database objects, but to Open
336
__________ the database.
File Tab ->Access Options, and
The setting for the Security option can be handled selecting the Trust Centre tab from
337
using_______________________ in Access 2010. the Access Option window
Third Party Encryption Technology can also be applied to the database of TRUE
338
Microsoft Access 2010.
339 To create a split database in MS Access 2010 go to which tab? Database Tools
340 After spliting database,frontend database holds_________________. Forms,Query,Report
341 After spliting database,backend database holds_________________. Tables
When an Access database is split, it creates two A back-end database & front-end
342 database
files_________________.
A Data Access Page is a special type of _________ that allows users to Web page
343
interface with database using Internet Explorer.
MS Access provide__________ datatype to create link to a web Hyperlink
344
page,file,or email address.
Set as Switchboard startup Option in
345 To make a switchboard appear while opening the database. Access Option
To add or delete buttons to Switchboard, which option is used in Edit Option
346
Switchboard Manager is used.
The Switchboard Manager is a dialog box that allows creating a TRUE
347
switchboard for an Access database.
348 A macro can automate data entry in Access 2010. TRUE
349 Which of the following data-type is not available in MS-ACCESS AlphaNumeric
350 The validation can be defined at____________ level in Access 2010 Table,Form
A macro can be attached to an event of a A form,A report,A button
351
control_________________________.
377 Which record will be retrieved if the query criteria is < #1/1/11#? Records with date before 2011
The tab in Expression Builder in which we write expressions is known as Expression Box
378
_____________.
379 The criteria expression LIKE?B*. Will match all text starting from B
__________ queries are useful for summarizing information, and are Crosstab query
380
somewhat similar to pivot tables in MS-Excel.
While entering record in Datasheet view, in which order the records can be At the end of the table
381
entered
382 When you delete the record in form, it deletes the record from__________. Form & Table
383 Having clause is used in the aggregate query in MS Access 2010 TRUE
The controls that are not linked to any field of the table or query on the Unbounded Controls
384
form are known as ________.
Which property of the form can be used to insert a background image in Picture
385
MS Access 2010?
___________ is a report that is inserted in another report in MS Access Inside-Report
386
2010.
A bound main report is based on a ______________ and its Table or query,Sub-Report
387
_____________ contain realted information.
A___________used to compare multiple values of categories or
388 Column Chart
differences over a period of time.
389 A________used to compare trends over a period of time. Line Chart
To create a read-only copy of the database, which of the following file .ACCDE
390
format can be used?
The database administrator created a split database and created a front-
391 end database and back-end database file.Which of the file should be Back-end database
stored on the server ?
To make database package and digitally sign using which option in Access File->Save&Publish->Save Database
392 as->Package and sign
2010 ?
In which formats can the Collect Data through email message feature can HTML and InfoPath
393
send the data entry form?
Once a mail is sent using the collect data through email message feature
394 in Access 2010. The mail status can be checked Manage replies
using________________.
The ___________ type of data cannot be collected using Collect data AutoNumber
395
through email messages.
396 What is the memo data type field used for? For long text entries
Those records that match an entity in
397 The filter By selection feature allows you to filter: a field
398 Which editor was provided for use with Access Basic? Notepad
Click the report, and on the Pivot
How do you update Pivot Table report data after changes are made to the Table toolbar, click the refresh data
399
source data? button
Which Of The Following Creates A Drop Down List Of Values To Choose Lookup Wizard
401
From?
A __________ Enables You To View Data From A Table Based On A Query
402
Specific Criterion
The Database Language That Allows You To Access Or Maintain Data In A DCL
403
Database
Authorizing Access And Other Control
404 DCL Provides Commands To Perform Actions Like Over Database
405 Which is not a Database Model ? Structureed Database Model
406 Which Of The Field Has Width 8 Bytes? Date/time
This Is The Stage In Database Design Where One Gathers And List All Data Definition
407
The Necessary Fields For The Database Project.
The Third Stage In Designing A Database Is When We Analyze Our Tables Relationship
408
More Closely And Create A ___________ Between Tables
What is the purpose of the Switchboard Manager in Microsoft Access To build a main switchboard form that
409 controls all other forms.
2010?
Identify an audit finding w.r.t.
410 Which of the following is a benefit of using CAATs? materiality in an IT environment
411 Is there a fixed qualification for internal auditor_________. FALSE
__________________ refers to use software/applications to automatically
perform tasks such as accounting,preparing trial balance, financial Office automation
412
statements etc. and electronically transmit data or information using
internet..
________,___________,__________ are commonly referred to as CIA in Confidentiality,Integrity and
413 Availability
information security parlance.
_____________means information available in the organization should not Integrity
414
be altered or modified by unauthorized personnel.
The process of identifying an individual, usually based on user id and Authentication
415
password in an organization is called______________.
Which of the following is not a software equipment required in a CA's None of the Above
416
office?
417 Which of the following is not an application arranged by ICAI? ICAI-TOC
418 How many stages are there in the sales cycle? 3
419 PBX stands for ________ Private Branch exchange
420 Which of the following will not appear in the home page of K-Doc? Paste Document
To change an email header so that the message appears to have
421 originated from someone or somewhere other than the actual source is Email Spoofing.
known as___________.
422 To playfully satirize a website is known as_____________. Web spoofing
_________is the complete package to manage the billing requirements of Billing and Accounting sofware
423
a CA firm on cash system of accounting.
424 Which of the following is not a/an feature of eSecretary? Share certificate printing
425 Annual return preparation can be done using ________. ICAI-ROC application
________is correspondence automation & management software that is eSecretary
426
seamlessly integrated with Microsoft Office.
Which application helps the management to allocate the revenue to the Client management
431
credit of the right employee who identified the opportunity?
432 Who has full privileges in the financial accounting application? System administrator
_________is the centre point of the financial accounting application as any
433 transactions having financial impact carried out in any other module will GL module
reflect in this module.
In Financial Accounting Application,the transactions flow from GL (General FALSE
434
ledger) to other modules.
Which of the functionalities is not provided in the purchasing module of Comparison with budgets
435
Financial Accounting Application.
In Financial Accounting Application,automatic sequence number of Expense Management
436
documents control is not required in which of the following module?
Which module of Financial Accounting Application can be used for Sales
437
assigning credit limit to customers?
438 Which of these will trigger/alert for timely payment ? Expense Management
We can manage interviews,offers and job vacancies by using which of the HR and Payroll applications
439
application?
___________provides information about updation of project cost based on Timesheet application
440
time spent by employees on various projects.
Employee designation and reporting
441 Which of the follwing is not a/an functionality provided by PMS? structure
___________automates the calculation of salary for taking inputs from the
442 timesheet application, leaves from Leave Management System and salary Payroll System
details from the HR master data.
443 Which of the follwing is not a control in Leave Management System? Error free capture of leave details
444 Permanent Audit File are obtained once but updated on __________basis. yearly
________is a type of training in which user logon on the training server E-Learning
447
with a user ID and password.
In some cases, trainee is supposed to appear for the examination/test at E-Learning
448
the end of the training is____________.
449 ________ are the hardware/infrastructure equipments used in a CA firm. PC,Application Server,WAN
450 Which of these is/are the standard email program used in an organization? Microsof Exchange,Lotus Notes
453 Which types of information assets need to be secured in a CA Office? Client data,Own data,Own documents
The extent and level of _________ would depend on the nature of Confidentiality
454
information.
__________ of information might be affected due to denial of service Availability
455
attack or some other reasons.
__________means the sender cannot deny having sent a message and Non-Repudiation
456
receiver cannot deny receiving the message.
457 Risk may not be _______ in nature. vulnerable
Items of audit interest,Data
458 Which of the following are categories of computer audit function ? Analysis,System validation
459 In the following list which is not an audit function ? Export
460 In the following list which is a audit function? Stratification
Review Programming
Which is the following step involved in a source code review standards,Understand program
461 specifications,Formulate flaw
methodology ?
hypotheses
In which sampling,selecting sampling units using a fixed interval between Systematic
462
selections is_______________.
Ensures that all combinations of sampling units in the population have an Random
463
equal chance of selection is____________.
In Audit tool, to built relation between two tables, both table should Common Field
464
have_____________.
465 Input Control method is a part of Application Control Group. TRUE
Which is the following type of check that can be run when data is input Field check
466
through terminal ?
Which is the following is the correct types of Field checks on processed Overflow,Range,Sign Test
467
data ?
Which is the following is the correct types of Record checks on input Resonableness
468
data ?
469 Which is the correct types of Batch Checks ? Control Totals
Data Integrity,Controls are required
470 Which is the need for table level tests ? for authorization
Which is the software used by the auditor to take a view of a file of data or Snapshots
472
transaction passing through the system at a particular point of time ?
Which is the software used by the auditor to compare the source version Souce comparison
473
of a program with a secure master copy ?
Which is the techniques whereby the auditor arranges or manipulates data
474 either real or fictitious, in order to see that a specific program or screen On-line Testing
edit test is doing its work ?
Which is the software used by the auditor to list un-used program Mapping
475
instruction ?
Which is the software used by auditor to read and analyze records of Log Analyzers Sofware
476
machine activity ?
Lack of Visible Transaction
477 Which of the following reason strongly call for Control & Audit Function ? Trail,Absence of Input Document
478 Which is the correct types of Field checks on input data ? Both type
To ensure the input data is valid
479 Which is the major points to be consider with respect to System tests ? before entering the value
In Data analysis techniques, which law is used to idenfity statistical report Benford Law
480
on numeric data ?
481 Which is not a feature of File reorganization with an auditor perspective? Filtering
Functions involving use of arithmetic operators, which enable performing Arithmetic function
483
re-computations and re-performance of results is an example of?