BEC - Information Technology Flashcards

1
Q

Objective of Logical Security Controls

A

To restrict access to specific data and resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Self Checking Digit

A

Generated when the data element is input. Prescribed arithmetic operation is automatically done and stored on this element. The operation is then performed later on to ensure that the number has not been recorded incorrectly.

  • Compatibility test validates data within the field
  • Hash total is total of nonquantitative field such as account number to be sure all records are processed
  • Record Count summarized the # of records processed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Data Mining

A

Help examine large amounts of data to discover previously unknown information and patterns. It can identify trends and outcomes that are not easily identifiable by looking at higher-level or summary data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Master File

A

Used in electronic data processing and contains permanent information used for reference and updated periodically. PERMANENT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Query Utility Program

A

Used to access information contained in databases. Provide users with online access to database information items and characterized by their ability to design an ad hoc query to only retrieve information needed by the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Quality Assurance Function(s)

A

Determine if change achieved their objectives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data Loading Process

A
  1. ) Extraction - Process of gathering and retrieving data captured within unstructured sources (email, social media, images, barcodes)
  2. ) Data Cleansing & Transformation - increases efficiency of analytic and business processes to enable better data-driven decisions. Can Happen during extraction. After this comes Data Mapping.
  3. ) Data Loading - Loading data into a target data warehouse database. Final Step.

Data Cleansing - Checking data against predefined rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Batch Processing

A

Updating Master Files periodically to reflect all transactions that occurred during a given time period. Transactions are processed as a batch, can cause time delays.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Systems Development Life Cycle (SDLC) 5 Stages

A
  1. ) System Analysis
  2. ) Conceptual Design
  3. ) Physical Design
  4. ) Implementation and Conversion
  5. ) Maintenance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SOC 1 Report

A

System and Organization Controls 1 reports on the controls at a service organization relevant to user entities’ internal control over financial reporting (ICFR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Run-to-Run Controls

A

Able to accumulate separate totals for all transactions processed during the day and agree to the totals to the total of items accepted for processing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Hash Total

A

Type of batch control total, it is the summation of a quantitative but noninformational data field

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Revenue Cycle

Financing/Treasury Cycle

A

A recurring set of business and data processing activities associated with selling goods and services to customers in exchange for cash. It produces info that is used by other accounting cycles.

This is where companies obtain funds from investors and creditors. Not a business activity with selling goods and services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Range Checking

A

Involves checking a number in a transaction to determine whether that number falls within a specified range.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Application Controls

A

Refer to the transactions and data relating to each computer-based application system and are specific to each process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Check Digit

A

Specific type of input control, consisting of a single digit at the end of an ID code that is computed from other digits in a field.

17
Q

Edit Checks

A

Type of Input (App or procedural) control. They are by the computer to check the validity, accuracy, and reasonableness of the input data from source documents.

18
Q

Encryption

A

Transforming data, called plaintext, into unreadable gibberish called ciphertext.

Decryption reverses this process, transforming ciphertext back into plaintext.

19
Q

What does an access control matrix consist of:

A
  • A List of all authorized user code #s and passwords
  • A list of all files and programs maintained on the system
  • A record of the type of access to which each user is entitled
20
Q

Data Extraction

A

Process of gathering and retrieving data captured within unstructured and semi-structured sources for conversion into structured data.

21
Q

DSS (Decision Support System)

A

Provides interactive problem-solving assistance.
It provides the decision maker with access to the computational capabilities, models, and data resources of the system to help in exploring the problem and developing potential solutions.

22
Q

DSS (Decision Support System)

A

Provides interactive problem-solving assistance.
It provides the decision maker with access to the computational capabilities, models, and data resources of the system to help in exploring the problem and developing potential solutions.

23
Q

ERP (Enterprise Resource Planning)

A

These systems integrate all aspects of a company’s operations with its I.S.

Errors during the implementation phase can cause the most damage.

24
Q

Infrastructure as a service (IaaS)

A

Provides the basic building blocks for cloud IT and typically provides access to IT infrastructure assets (Servers and Virtual Machines (VMs), storage, networks, operating systems) from a cloud provider who charges on a pay-as-you-go basis.