Auditing-IT-Governance-Controls_CIS Flashcards

Understand the risks of incompatible functions and how to structure the IT function. Be familiar with the controls and precautions required to ensure the security of an organization’s computer facilities. Understand the key elements of a disaster recovery plan. Be familiar with the benefits, risks, and audit issues related to IT outsourcing.

1
Q

What are the key objectives of IT governance?

A

Reduce risk and ensure investments in IT resources add value to the corporation

All corporate stakeholders must be active participants in key IT decisions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What issues are addressed by SOX and the COSO internal control framework in IT governance?

A
  • Organizational structure of the IT function
  • Computer center operations
  • Disaster recovery planning
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What characterizes centralized data processing?

A

All data processing performed at a central site with end users competing for resources based on need.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What roles are included in the primary service areas of centralized data processing?

A
  • Database administrator
  • Data control/data entry
  • Computer operations
  • Data library
  • System development and maintenance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the role of the database administrator (DBA) in centralized data processing?

A

Responsible for the security and integrity of the database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the functions of the data processing group?

A
  • Data conversion
  • Computer operations
  • Data library
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the purpose of segregation of incompatible IT functions?

A

To prevent errors and fraud by separating systems development from computer operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

True or False: The DBA should have involvement in entering data or running applications.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the risks associated with Distributed Data Processing (DDP)?

A
  • Inefficient use of resources
  • Destruction of audit trails
  • Inadequate segregation of duties
  • Hiring qualified professionals
  • Lack of standards
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the advantages of Distributed Data Processing (DDP)?

A
  • Cost reductions
  • Improved cost control responsibility
  • Improved user satisfaction
  • Backup flexibility
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What should be evaluated during an audit of the IT function?

A

Ensure individuals in incompatible areas are segregated in accordance with risk levels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are some key areas of potential exposure in a computer center?

A
  • Physical location
  • Construction
  • Access
  • Air conditioning
  • Fire suppression
  • Fault tolerance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a Disaster Recovery Plan (DRP)?

A

A comprehensive statement of all actions to be taken before, during, and after any type of disaster.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are essential elements of an effective DRP?

A
  • Identify critical applications
  • Create a disaster recovery team
  • Provide site backup
  • Specify backup and off-site storage procedures
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the significance of identifying critical applications in disaster recovery?

A

Recovery efforts must concentrate on restoring applications critical to the organization’s short-term survival.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the most common options for providing second-site backup?

A
  • Mutual aid pact
  • Empty shell (cold site)
  • Recovery operations center (hot site)
  • Internally provided backup
17
Q

What are the risks inherent to IT outsourcing?

A
  • Failure to perform
  • Vendor exploitation
  • Outsourcing costs exceed benefits
  • Reduced security
  • Loss of strategic advantage
18
Q

What does SAS 70 provide for auditors regarding IT outsourcing?

A

Knowledge that processes and controls at third-party vendors are adequate to prevent or detect material errors.

19
Q

Fill in the blank: The ability of the system to continue operation when part of the system fails is known as _______.

A

Fault tolerance

20
Q

What should be included in tests for a disaster recovery plan (DRP)?

A
  • Evaluate adequacy of backup site arrangements
  • Review list of critical applications for completeness
  • Verify copies of critical applications and operating systems are stored off-site