Chapter 2 Flashcards

1
Q
  1. What is data conversion in an IT environment?
A

The data conversion function transcribes transaction data from hard-copy source documents into computer input. For example, data conversion could involve keystroking sales orders into a sale order application in modern systems, or transcribing data into magnetic media (tape or disk) suitable for computer processing in legacy type systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. Why does the temperature in a computer room need to be controlled?
A

Computers function best in an airconditioned environment, and providing adequate air conditioning is often a requirement of the vendor’s warranty. Computers operate best in a temperature range of 70 to 75 degrees Fahrenheit and a relative humidity of 50 percent. Logic errors can occur in computer hardware when temperatures depart significantly from this optimal range. Also, the risk of circuit damage from static electricity is increased when humidity drops. In contrast, high humidity can cause molds to grow and paper products (such as source documents) to swell and jam equipment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

3-5 Primary IT services/ functions of a centralized data processing structure

A
  1. Database administration
  2. Data processing
  3. Systems development and maintenance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. The area of the IT department which provides safe storage of offline data files, original copies of commercial software and their licenses.
A

Data Library

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

7-9 Technically, who are considered system professionals?

A

analysts, database designers, and programmers who design and build the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

10 - 11 What are some problems encountered when a client utilizes systems programmers to perform program maintenance functions?

A
  1. Inadequate documentation
  2. Potential for program fraud
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. Why is it difficult to hire qualified IT professionals in a DDP?
A

If the organizational unit into which a new employee is entering is small, the opportunity for personal growth, continuing education, and promotion may be limited.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

13 - 15 Give three (3) potential problems arising from implementing DDP.

A
  1. Inefficient use of resources
  2. Destruction of audit trails
  3. Inadequate segregation of duties
  4. Difficulty in hiring qualified professionals
  5. Lack of standards
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

16 - 17 What does IT governance intend to achieve or what are its objectives?

A
  1. To reduce risk
  2. To ensure that investments in IT resources add value to the corporation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. What is a compensating control
A

in small organizations or in
functional areas that lack sufficient personnel, management must compensate for the absence of segregation controls with close supervision.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

19-22 What are the services / functions of a corporate IT group formed for the purpose of controlling a DDP environment?

A
  1. Central Testing of Commercial Software and Hardware
  2. User Services
  3. Standard-setting Body
  4. Personnel Review
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

23 - 25 Give three (3) audit procedures to verify that the structure of the IT department provides for the segregation of incompatible functions in a CDP.

A
  1. Review relevant documentation, including the current organizational chart, mission statement, and job descriptions for key functions, to determine if individuals or groups are performing incompatible functions.
  2. Review systems documentation and maintenance records for a sample of applications. Verify that maintenance programmers assigned to specific projects are not also the original design programmers.
  3. Verify that computer operators do not have access to the operational details of a system’s internal logic. Systems documentation, such as systems flowcharts, logic flowcharts, and program code listings, should not be part of the operation’s docu-
    mentation set.
  4. Through observation, determine that segregation policy is being followed in practice. Review operations room access logs to determine whether programmers enter the facility for reasons other than system failures.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

26 - 28 What IT functions should be segregated? (Give at least 2 incompatible functions in each number)

A
  1. Separating Systems Development from Computer Operations
  2. Separating Database Administration from Other Functions
  3. Separating New Systems Development from Maintenance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

29 - 30 Give some advantages of adapting DDP.

A
  1. Cost reductions
  2. Improved Cost Control Responsibility
  3. Improved User Satisfaction
  4. Backup flexibility
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. Give the meaning of RAID.
A

Redundant arrays of independent disks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

32 - 35 Give one audit procedure to test the compliance of our client to standards on the computer center on: (what documents to check (reasons why) what items to look for) #s

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
  1. physical construction
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
  1. RAID
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
  1. Access control
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
  1. Insurance coverage
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What do accountants examine during their annual audit of the computer center?

A

Accountants routinely examine the physical environment of the computer center as part of their annual audit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the objective of assessing the computer center?

A

The objective is to present computer center risks and the controls that help to mitigate risk and create a secure environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What factors should be considered regarding the physical location of a computer center?

A

The computer center should be away from human-made and natural hazards, such as processing plants, water mains, airports, high-crime areas, flood plains, and geological faults.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the ideal construction for a computer center?

A

A computer center should ideally be located in a single-story building of solid construction with controlled access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What type of access control should be implemented for a computer center?

A

Access should be limited to operators and employees, using physical controls like locked doors, keypads, or swipe cards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is the optimal temperature and humidity range for computer operation?

A

Computers operate best in a temperature range of 70 to 75 degrees Fahrenheit and a relative humidity of 50 percent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is the most serious threat to a firm’s computer equipment?

A

Fire is the most serious threat to a firm’s computer equipment.

28
Q

What are key features of an effective fire suppression system?

A

Key features include automatic and manual alarms, an automatic fire extinguishing system, manual fire extinguishers, sound construction to withstand water damage, and clearly marked fire exits.

29
Q

Areas of potential exposure that can impact the quality of information, accounting
records, transaction processing, and the effectiveness of other more conventional internal
controls.

A
  1. Physical Location
  2. Construction
  3. Access
  4. Air conditioning
  5. Fire Suppression
  6. Fault Tolerance
32
Q

What is fault tolerance?

A

The ability of the system to continue operation when part of the system fails due to hardware failure, application program error, or operator error.

33
Q

What is the purpose of implementing fault tolerance control?

A

To ensure that no single point of potential system failure exists.

34
Q

What can cause total failure in a system with fault tolerance?

A

Total failure can occur only if multiple components fail.

35
Q

What does RAID stand for?

A

Redundant arrays of independent disks.

36
Q

How does RAID work?

A

It involves using parallel disks that contain redundant elements of data and applications, allowing lost data to be reconstructed if one disk fails.

37
Q

True or False: Halon is a fire-fighting gas that is still allowed by federal law.

38
Q

What problems can commercially provided electrical power present?

A
  • Total power failures
  • Brownouts
  • Power fluctuations
  • Frequency variations
39
Q

What devices are used to control power problems in a computer center?

A
  • Voltage regulators
  • Surge protectors
  • Generators
  • Backup batteries
40
Q

What is the auditor’s objective regarding computer center security?

A

To evaluate the controls governing computer center security.

41
Q

What should the auditor verify about the controls in place?

A
  • Adequate protection from physical exposures
  • Compensation for destruction or damage to the computer center
42
Q

What should the auditor obtain to assess the physical construction of the computer center?

A

Architectural plans.

43
Q

What is important for the drainage system under a raised floor in a computer center?

A

It should allow water to flow away in the event of water damage.

44
Q

What should fire detection systems in a computer center be capable of detecting?

A
  • Smoke
  • Heat
  • Combustible fumes
45
Q

What access control measures should be in place for the computer center?

A

Routine access should be restricted to authorized employees.

46
Q

How can the auditor verify visitor access to the computer center?

A

By reviewing access logs detailing arrival and departure times, purpose, and frequency.

47
Q

What should the auditor do if the organization is not employing RAID?

A

Review alternative procedures for recovering from a disk failure.

48
Q

What periodic tests should be conducted on the uninterruptible power supply?

A

Tests to ensure sufficient capacity to run the computer and air conditioning.

49
Q

What should the auditor review annually regarding insurance?

A

The organization’s insurance coverage on its computer hardware, software, and physical facility.

50
Q

Fill in the blank: The insurance policy should reflect management’s needs in terms of _______.

A

[extent of coverage]

51
Q

What are the two types of insurance coverage a firm may seek?

A
  • Partial self-insurance with minimum coverage
  • Complete replacement-cost coverage
52
Q

What are the tests of physical security controls?

A
  1. Tests of Physical Construction
  2. Tests of the Fire Detection System
  3. Tests of Access Control
  4. Tests of Raid
  5. Tests of Uninterruptible Power Supply
  6. Tests for Insurance Coverage
53
Q

What should an insurance policy reflect in terms of management’s needs?

A

The extent of coverage, which may include partial self-insurance or complete replacement-cost coverage.

Insurance policies should align with the organization’s risk management strategy.

54
Q

What are the three categories of disasters that can impact an organization’s IT resources?

A
  • Natural disasters
  • Human-made disasters
  • System failures

These categories encompass a range of events from environmental to human errors.

55
Q

Which type of disaster is considered the most potentially devastating from a societal perspective?

A

Natural disasters, such as hurricanes, widespread flooding, and earthquakes.

These disasters can affect many organizations simultaneously.

56
Q

What is the impact of human-made disasters on organizations?

A

They can be destructive but tend to be limited in their scope of impact compared to natural disasters.

Examples include sabotage and human errors.

57
Q

What are system failures often less severe than but more likely to occur?

A

Natural and human-made disasters.

Examples of system failures include power outages and hard-drive failures.

58
Q

What can disasters deprive an organization of?

A

Data processing facilities and the ability to deliver products or services.

This can halt business functions reliant on technology.

59
Q

How can the impact of a disaster be mitigated?

A

Through careful contingency planning and a disaster recovery plan (DRP).

A well-prepared organization can absorb the disaster’s impact.

60
Q

What is a disaster recovery plan (DRP)?

A

A comprehensive statement of all actions to be taken before, during, and after any type of disaster.

It focuses on recovery and maintaining business continuity.

61
Q

What are the four common features of all workable disaster recovery plans?

A
  • Identify critical applications
  • Create a disaster recovery team
  • Provide site backup
  • Specify backup and off-site storage procedures

These features ensure an organized response to disasters.

62
Q

What is the first essential element of a DRP?

A

Identify the firm’s critical applications and associated data files.

Recovery efforts should focus on short-term survival.

63
Q

What should a DRP focus on immediately following a disaster?

A

Short-term survival and restoration of functions that generate cash flows.

This includes critical business operations that satisfy short-term obligations.

64
Q

List some functions that affect the cash flow position of a firm.

A
  • Customer sales and service
  • Fulfillment of legal obligations
  • Accounts receivable maintenance and collection
  • Production and distribution decisions
  • Purchasing functions
  • Cash disbursements (trade accounts and payroll)

These functions are vital for maintaining business continuity.

65
Q

Audit Procedures in verifying that management’s DRP is a realistic solution for dealing with a catastrophe:

A
  1. Critical Application List
  2. Software Backup
  3. Data Backup
  4. Backup Supplies, Documents, and Documentation
  5. Disaster Recovery Team
66
Q

Risks Inherent to IT Outsourcing

A
  1. Failure to Perform
  2. Vendor Exploitation
  3. Outsourcing Costs Exceed Benefits
  4. Reduced Security
  5. Loss of Strategic Advantage
67
Q

IT outsourcing includes:

A
  1. improved core business performance,
  2. improved IT performance (because of the vendor’s expertise),
  3. and reduced IT costs