4 - IT Flashcards

IT concepts on BEC exam

1
Q

What are the 3 basic processes in a manual AIS?

A

1 - Journalize
2 - Post
3 - Summarize

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 3 basic processes in a automated AIS?

A

1 - Input
2 - Process
3 - Output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the 6 risks that are heightened in a computer based system?

A

1 - Reliance on faulty programs
2 - Unauthorized access to data
3 - Unauthorized changes to master files, programs
4 - Failure to make necessary changes to systems, programs
5 - Inappropriate manual intervention (management override)
6 - Loss of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Physical ______ _______ are substantially reduced in a computerized environment, particularly in online, real-time systems.

A

audit trails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

These are built into better accounting information system software and created by maintaining a file of all transactions processed by the system, to include the username of the person who processed the transaction.

A

Electronic audit trails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In a computerized environment, many functions that are normally separated as part of ___________ controls are combined to be processed at the same time.

A

segregation of duties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Computerized systems have uniform transaction processing, which results in an increase in processing consistency and decreases the chance for ________. `

A

clerical errors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In a computerized environment, there is an increased risk of ___________, or errors in programming logic.

A

systematic errors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Computerized systems can gain efficiency by automatically generating transactions when conditions occur, but these transactions should be ___________.

A

Regularly reported and reviewed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

One benefit of computerized systems is the potential for increased __________ review.

A

Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The ____________ framework is a widely used international standard for identifying best practices in IT security and control

A

COBIT (Control Objectives for Information and Related Technology)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

COBIT bridges the gap between strategic business requirement, __________, and the delivery of supporting IT.

A

accounting control needs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

COBIT facilitates ____________ and helps ensure the _______ of information and information systems

A

IT governance; integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The IT function is divided into these 4 domains:

A

1 - Planning and organization
2 - Acquisition and implementation
3 - Delivery and support
4 - Monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

This domain of the COBIT IT function establishes a strategic vision for IT and develops tactics to plan, communicate, and realize the strategic vision

A

Planning and organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

This domain is concerned with acquiring, implementing, and developing IT solutions to address business objectives and integrate with critical business processes

A

Acquisition and implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

This domain is concerned with delivering IT services, including operations, security, and training

A

Delivery and support

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

This domain is concerned with assessing IT quality and compliance with control requirements.

A

Monitoring

19
Q

The COBIT model identifies 4 interrelated monitoring processes:

A

1 - Monitor and evaluate IT performance
2 - Monitor and evaluate internal control
3 - Ensure regulatory compliance
4 - Provide IT Guidance

20
Q

To have value to an organization, data must have the following 7 attributes:

A
1-Effectiveness
2-Efficiency
3-Confidentiality
4-Integrity
5-Availability
6-Compliance
7-Reliability
21
Q

The five physical resources that comprise an IT system include:

A
1 - People
2 - Applications
3 - Technology
4 - Facilities
5 - Data
22
Q

These systems provide transaction processing, management support, and decision making support in a single, integrated, organization-wide package.

A

Enterprise resource planning systems (also known as enterprise-wide systems

23
Q

What are the 4 goals of an ERP system?

A

1 - Global (organization wide) visibility
2 - Cost reductions
3 - Employee empowerment
4 - “Best practices”

24
Q

In __________, a virtual data pool is created by contracting with a third-party data storage provider.

A

Cloud-based system

25
Q

What are the 6 benefits of cloud-based systems:

A
1 - Universal access
2 - Cost reductions
3 - Scalability
4 - Outsourcing and economies of scale
5 - Enterprise-wide integration
6 - Deployment speed
26
Q

What are the 5 primary risks with cloud-based systems?

A

1 - Risk of data loss and outages
2 - Increased risk of system penetration by hackers
3 - Reliance on CSP competence, professionalism, and reliability.
4 - Data stored on community clouds may be vulnerable to other tenants
5 - Storing data with a high profile provide can make a company a high-profile target for cyber-attackers

27
Q

The _________ is responsible for the efficient and effective functions of existing systems and for planning for the development and technical resources for future systems

A

Chief Information Officer (aka VP of IT, etc.)

28
Q

What are the 3 main functional areas of an IT department:

A

1 - Application development
2 - Systems administration and programming
3 - Computer operations

29
Q

This functional area is responsible for creating new end-user applications and maintaining existing applications.

A

Application development

30
Q

These people are responsible for analyzing and designing computer systems; lead teams of programmers, and work with end-users to define problems and ID solutions.

A

Systems analyst

31
Q

These people work under the systems analyst and write the actual programs that process data and produce reports

A

Applications programmers

32
Q

New program development is completed in a _________ environment using copies of live data and existing programs.

A

test or “sandbox”

33
Q

This department maintains the computer hardware and infrastructure and works to grant access to system resources

A

Systems administration and programming

34
Q

Responsible for the management activities of systems they control

A

System administrators (could be web admin, network admin, database admin, etc.)

35
Q

These people are responsible for maintaining the various operating systems and related hardware. They also update the system and install new hardware.

A

System programmers

36
Q

The ___________ ensures that all applicable devices link to the organization’s network and that the networks operate securely and continuously.

A

Network managers.

37
Q

Ensures that all components of the system are protected from all internal or external threats

A

Security management

38
Q

This department is responsible for the day-to-day operations of the computer system.

A

Computer operations

39
Q

Computer operators and data entry personnel should never be allowed to act as ________.

A

Programmers

40
Q

Systems programmers should never have access to _________.

A

application program documentation

41
Q

Data administrators should not have access to ______.

A

computer operations, live data

42
Q

Application programmers and systems analysts should never have access to _________

A

computer operations, live data

43
Q

Application programmers and systems analysts should not ____________..

A

Control access to computer resources.