Ch. 4 Flashcards

1
Q

Which areas should be included in cybersecurity risk assessment?

A
  1. identity management
  2. end-user education
  3. disaster recovery/business continuity planning

Malware protection, along with next-generation firewalls, DNS (domain name system) filtering, antivirus software, and email security solutions, is an example of technology used to protect against the risk of cyber attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are examples of technology used to protect against the risk of cyber attacks?

A
  1. malware protection
  2. firewalls
  3. domain name system (DNS) filtering
  4. antivirus software
  5. email security solutions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Users should have update access for production ____.

A

data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Application programmers and users should not be able to change production _____?

A

programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Application programmers should NEVER have update access to production ______.

A

data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Who submits change to the change control unit to update programs?

A

Application programmers submit change to the change control unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is one-for-one checking?

A

involves retaining copies of all unnumbered documents submitted for processing and checking them off individually against a report of transactions processed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What type of control do batch totals require?

A

numerical control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Computer sequence checks require that transactions be _______.

A

numbered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Computer matching is performed by the program or user?

A

program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a smart card?

A

A smart card continuously generates new and unique passwords, helping to minimize the risk of unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Who are the intended users of SOC 1 reports?

A

management of the service organization, user entities, and user auditors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Who are the intended users of SOC 2 reports?

A

Parties that are knowledgeable about the nature of the service provided by the service organization. Restricted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Who are the intended users of SOC 3 reports?

A

no restrictions and can be distributed to anyone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Who is responsible to plan and provide oversight to the information systems function?

A

information systems steering committee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is fail-soft protection?

A

The capability to continue processing at all sites except a nonfunctioning one

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is an example of strategic information system?

A

computer system that converts the inputs into data that allows management to make unstructured decisions concerning the company’s future

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is Customer relationship management (CRM)?

A
  1. cloud-based system
  2. stores customer and prospect contact information, accounts, leads and sales opportunities
  3. stored in one central database
  4. CRM refers to practices, strategies, and technologies that businesses use to interact, analyze, forecast, and manage customer relationships, trends, and behaviors.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What system assists with nonroutine decisions, serves strategic levels of the organization, and helps answer questions regarding what a company’s competitors are doing, as well as identifies new acquisitions that would protect the company from cyclical business swings?

A

Executive support system

The word “strategic” tells you this system provides information at a high level, the executive level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

In a microcomputer system, the place where parts of the operating system program and language translator program are permanently stored is _____?

A

read-only memory (ROM)

ROM may only be read from to prevent these important programs from being accidentally altered or deleted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the central element of a Management Information System (MIS)?

The use of what?

A

The use of decision models to organize data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are the 5 Trust Services criteria? (aka principles)

A
Security
Availability
Processing Integrity
Privacy
Confidentiality
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are disk and magnetic tapes?

What is a bar coding device?

What is magnetic ink character recognition?

A

Storage devices

Data entry device used with an optical character reader

Most often used by banks to read the magnetic ink on checks and deposit slips

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

To minimize the likelihood of computer viruses infecting any of its systems, the company should also do what when installing software?

A

test all new software on a stand-alone PC before installing it on networked computers in the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is a digital signature primarily used to determine?

A

that a message is unaltered in transmission.

allows the creator of a message to digitally “sign” the data and provides proof of authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What position performs following: Developing, coding, and testing computer programs

A

systems analysts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

An advantage of decentralizing data processing facilities is:

A

that system failure is of lesser significance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What are all of the components of the data processing cycle?

A

Collection, refinement, processing, maintenance, output

The usual definition of the data processing cycle (DPC) is “input-processing-output.” The correct answer substitutes the term “collection” for “input.” Refinement refers to classifying and/or batching. Maintenance refers to processing-related operations such as calculation and storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

The concept of a management information system (MIS) continues to evolve over time. Which of the following is generally understood to be a central element of an MIS?

A

Processing of data items is based on decision models.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

An information system should fulfill all of the following functions

A
  1. safeguard an organization’s assets and data.
  2. insure that the information produced was reliable and accurate.
  3. collect and store data.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Text-mining technology

A

(not data mining) enables entities to analyze text data from the web, comment fields, books, and other text-based sources to uncover insights not previously identified. Text mining uses machine learning or natural language processing technology to comb through documents such as emails, blogs, and Twitter feeds to analyze large amounts of information and discover new topics and term relationships. Data mining technology helps examine large amounts of data to discover patterns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Hadoop:

A

a free, open-source software framework that stores large amounts of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Predictive analytics technology:

A

uses data, statistical algorithms, and machine-learning techniques to identify the likelihood of future outcomes based on historical data

34
Q

Big data:

A

a term that describes the large volume of diverse and complex data available to businesses on a day-to-day basis

35
Q

In terms of the overall success of the internal control system, human resource policies can be said to:

A

be relevant to the internal control system’s goal of employee satisfaction.

The human resources department allows employees to make some payroll-related changes, such as new withholdings, changes in retirement allocations, and name changes. This empowers employees and increases morale and employee satisfaction.

36
Q

Statement of Financial Accounting Concepts (SFAC) 1, paragraph 34, Objectives of Financial Reporting by Business Enterprises, states:

A

“Financial reporting should provide information that is useful to present and potential investors and creditors and other users in making rational investment, credit, and similar decisions.” Thus, the objectives of financial reporting are based on user needs.

37
Q

To develop and implement a systems reliability plan, an organization’s IT governance should assign plan responsibility and accountability to who?

A

top-level IT manager

38
Q

What are the five Trust Services criteria?

A
Security, 
availability, 
processing integrity, 
privacy
confidentiality,

SAPPC

39
Q

COBIT helps to do what 3 things?

A
  1. balance risk and controls information systems,
  2. provides assurance that security and IT controls are adequate, and
  3. guides auditors and internal controls.
40
Q

Business processes are comprised of which of the following items?

A
  1. input(s),
  2. actor(s) (either automated, like a computer, or an actual person),
  3. the actual activity or process that transforms the input(s), and
  4. output(s) (the final result)
41
Q

What is the difference between systems?

strategic information system

Transaction processing system

office automation system

Decision support systems

A

strategic information system provides information that may allow an organization to make strategic, competitive decisions. It converts the inputs into data that allows management to make unstructured decisions concerning the company’s future

Transaction processing systems support basic routine business functions.

office automation system is used by clerical personnel to process existing information.

Decision support systems process semi-structured and unstructured problems.

42
Q

Which of the following lists best describes the probable control activities likely to be employed at the cash register/sales counter level in these cases?

A
  1. Proper authorization of transactions,
  2. design and use of documents, and
  3. independent checks on performance
43
Q

Risk of a distributed database, in which data about individuals would reside on computers at local offices but would be accessible to managers worldwide, has what risks?

A

Database integrity might not be preserved during a network or computer failure because of the complexity of updates, the time delays when multiple sites are involved, and the number of nodes to be coordinated.

Both the centralized and distributed systems permitted access to all data, so if access security is maintained at the same levels, there should be no difference in the vulnerability of the database to outsiders.

44
Q

In terms of the overall success of the internal control system, human resource policies can be said to:

A

be relevant to the internal control system’s goal of employee satisfaction.

45
Q

If certain data elements were not defined in the online database expansion, the following problem could result:

A

Incomplete transaction processing

46
Q

In an accounting information system, which of the following types of computer files most likely would be a master file?

A

Inventory subsidiary

A master file is used in electronic data processing and contains relatively permanent information used for reference and updated periodically. An inventory file lists the inventory on hand at a point in time. It is an asset, a balance sheet account.

47
Q

When should system librarian accept program into production?

A

The system librarian should only accept a modified program that has been properly tested by someone independent of the programmer to make sure that no unauthorized changes have been made.

48
Q

Who studies the existing information system?

A

Studying the existing information system is a task typically assigned to a systems analyst in the operational and maintenance phase of the system development life cycle; it is not an example of change control.

49
Q

What 3 things does managing the information system function include?

A
  1. charging user departments for computer services,
  2. project development planning (e.g., using Gantt charts), and
  3. responsibility accounting principles.
50
Q

What type of review determines if the project’s anticipated benefits were achieved, and to encourage accurate and objective initial cost and benefit estimates?

A

POST-implementation reviews

51
Q

Password protection for a screensaver program can be

A

easily bypassed.

Setting up a password for the screensaver program on the notebook computer would provide the least security for sensitive data stored on a notebook computer

52
Q

The best control technique to detect paying a terminated employee using employee identification numbers would be a:

A

hash total.

53
Q

To assist in maintaining control over such access, many systems use tests that are maintained through an internal access control matrix which consists of:

A

authorized user code numbers,
passwords,
lists of all files and programs, and
a record of the type of access each user is entitled to have for each file and program.

54
Q

A systems program manipulates:

A

application programs.

By definition, systems software consists of programs that act on the instructions provided in application programs. Stated another way, a systems program manipulates application programs.

55
Q

Name 3 computer machine language

A
  1. on/off electrical switches
  2. internal binary code is usually arranged as a
  3. hexadecimal (base 16) code.
56
Q

Identifying inputs and outputs would occur at what stage?

A

systems design and development phase, preceding implementation.

57
Q

Which of the following input controls would prevent an incorrect state abbreviation from being accepted as legitimate data?

A

Validity check

58
Q

A reasonableness check or test would compare

A

the data entry to the database to make sure that the input was logically correct, not valid. In other words, does the entry make sense in light of the data required?

59
Q

A field check makes sure that the entry is

A

the correct type for the field (numeric or alphanumeric). Any letters would satisfy this requirement, whether or not they were a valid state abbreviation.

60
Q

A check digit verification uses

A

redundant digits to detect errors in data transcription. This check would not prevent an incorrect state abbreviation from being accepted as legitimate data.

61
Q

One of the steps companies should not take is

A

to outsource computer control and security staff.

62
Q

If the system must be available on a continuous basis, there is an important need for what?

A

Maintain redundant systems for instant availability to assure the flow of transactions

Data backups will enable reconstruction of lost information, but do not affect availability of the system to users.

63
Q

Only the program librarian should be allowed to

A

make changes to the production library.

64
Q

A system where several minicomputers are connected for communication and data transmission purposes, but where each computer can also process its own data, is known as a:

A

distributed data processing network.

65
Q

An advantage of having a computer maintain an automated error log in conjunction with computer edit programs is that:

A

reports can be developed that summarize the errors by type, cause, and person responsible.

66
Q

Which of the following areas of responsibility are normally assigned to a systems programmer in a computer system environment?

A

Operating systems and compilers

Systems programmers use the design developed by the analysts to develop an information system and write the computer programs. It follows, therefore, that the programmers would be concerned with the operating system and how it will handle various applications, as well as with compilers (computer programs that convert a source program into an object program, reducing the programming effort).

67
Q

The purpose of a software monitor is to:

A

collect data on the use of various hardware components during a computer run.

68
Q

Routines that utilize the computer to check the validity and accuracy of transaction data during input are called:

A

edit programs.

Edit programs may be used to examine selected fields of input data and to reject those transactions (or other types of data input) whose data fields do not meet preestablished standards of data quality.

69
Q

Which of the following transaction processing modes provides the most accurate and complete informa­tion for decision making?

A

Online

70
Q

Which of the following is responsible for authorizing and recording transactions and for correcting errors?

A

Users

The data control group logs data inputs, processing, and outputs, and makes sure that transactions have been authorized. They do not authorize or record transactions themselves.
Computer operators maintain and run daily computer operations.
Security management is responsible for preventing unauthorized physical and logical access to the system.

71
Q

Which of the following describes infrastructure as a service (IaaS)?

A

IaaS provides the basic building blocks for cloud IT and typically provides access to IT assets from a cloud provider who charges on a pay-as-you-go basis.

72
Q

All of the following are classifications of controls used to make systems more secure except:

A

nonphysical access controls.

The five classifications of controls used to make systems more secure are

  1. segregation of duties,
  2. physical access controls,
  3. logical access controls,
  4. personal computers and client/server network protection, and
  5. internet and telecommunications controls.
73
Q

Which of the following is a network node that is used to set up as a boundary that prevents traffic from one segment to cross over to another?

A

firewall

A firewall is a method used to isolate the company computers behind a device that acts as a gatekeeper. This gatekeeper prevents traffic from one segment from crossing over to another.

74
Q

The use of message encryption software:

A

increases system overhead.

The machine instructions necessary to encrypt and decrypt data constitute system overhead, which means that processing may be slowed down.

75
Q

To maintain effective segregation of duties within the information technology function, an application programmer should have which of the following responsibilities?

A

Code approved changes to a payroll program

76
Q

Which of the following database controls would be most effective in maintaining a segregation of duties appropriate to the users’ reporting structure within an organization?

A

Access security features

Access security features restrict users to functions and data compatible with organizational structure.

77
Q

Software change control procedures provide controls over what?

A

provide controls over software changes for application development functions.

78
Q

Dependency checks provide controls over what?

A

form and type of data entered by users.

79
Q

Backup and recovery procedures provide controls over what?

A

continued availability of data resources to users.

80
Q

An EDP control used to assure that paychecks had been written for all employees for a pay period would be the use of a:

A

hash total on employee Social Security numbers.

Record count simply calculates the number of records. It may be effective for the number of checks, but not validate the correct employees.

81
Q

Because of the sensitivity of its data, an online system for developing estimates and generating proposals was implemented with several layers of access control. Control over users’ initial log-in is a function of the:

A

operating system.

Initial log-in to a system is a function of the operating system–level access control software.

  • An integrated test facility is an audit approach to validating processing.
  • Database subschema authorizations control access to specific views of fields in a database.
  • Access to applications and their data is a function of application level software.