Information Technology

Help Questions

CPA Business Environment and Concepts (BEC) › Information Technology

Questions 1 - 10
1

______ is a way of distributing software through applications hosted by a vendor and made available to customers over the web.

Software as a service

Platform as a service

Infrastructure as a service

IT as a service

Explanation

IT as a service is not a term, software as a service relates to applications hosted by a vendor, and platform as a service allows customers to host their own applications.

2

______ is a way of distributing software through applications hosted by a vendor and made available to customers over the web.

Software as a service

Platform as a service

Infrastructure as a service

IT as a service

Explanation

IT as a service is not a term, software as a service relates to applications hosted by a vendor, and platform as a service allows customers to host their own applications.

3

Which of the following types of business planning focuses on how a company can most effectively restore business operations following a disaster?

Capacity planning

Budget planning

Strategy planning

Continuity planning

Explanation

Business continuity planning focuses on restoring and continuing operations in the event a disaster occurs that affects an organization.

4

Which of the following types of business planning focuses on how a company can most effectively restore business operations following a disaster?

Capacity planning

Budget planning

Strategy planning

Continuity planning

Explanation

Business continuity planning focuses on restoring and continuing operations in the event a disaster occurs that affects an organization.

5

Which of the following best describes a hot site?

Location equipped with the necessary hardware and possibly software

Location within the company that is most vulnerable to disaster

Location that is considered too close to a potential disaster area

Location where a company can install data processing equipment on short notice

Explanation

A hot site will have hardware that can be configured to be used for the processing needs of the client.

6

Which of the following best describes a hot site?

Location equipped with the necessary hardware and possibly software

Location within the company that is most vulnerable to disaster

Location that is considered too close to a potential disaster area

Location where a company can install data processing equipment on short notice

Explanation

A hot site will have hardware that can be configured to be used for the processing needs of the client.

7

In which of the following locations should a copy of the accounting system data backup of year end information be stored?

Fireproof cabinet in the data network room

Secure off site location

Data backup server in the network room

Locked file cabinet in the accounting department

Explanation

The accounting system data backup of year end information should be stored in some kind of secure off site location and not in any of the other locations.

8

In which of the following locations should a copy of the accounting system data backup of year end information be stored?

Fireproof cabinet in the data network room

Secure off site location

Data backup server in the network room

Locked file cabinet in the accounting department

Explanation

The accounting system data backup of year end information should be stored in some kind of secure off site location and not in any of the other locations.

9

The protective device that allows private intranet users to access the Internet without allowing Internet users access to private Intranet information is called a:

Browser

Anti virus program

Password

Firewall

Explanation

A firewall is a protective device that allows private intranet users to access the Internet without allowing Internet users access to private Intranet information.

10

The protective device that allows private intranet users to access the Internet without allowing Internet users access to private Intranet information is called a:

Browser

Anti virus program

Password

Firewall

Explanation

A firewall is a protective device that allows private intranet users to access the Internet without allowing Internet users access to private Intranet information.

Page 1 of 5
Return to subject