General Flashcards

1
Q

what is continuous auditing

A

a real-time feed of information to management through automated reporting processes so that management may implement corrective actions more quickly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

WHAT IS AUTOMATED SYSTEMS BALANCING

A

Automated systems balancing checks any imbalance between total inputs and total outputs would be reported for investigation and correction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what are validation controls

A

comparing for input and output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is a VPN

A

. The most secure method is a virtual private network, using encryption, authentication and tunneling to allow data to travel securely from a private network to the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following would be BEST prevented by a raised floor in the computer machine room?

A

damage of wires around the computers and servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what defines the strategy of a Disaster recovery strategies how

A

maximum tolerable downtime and data loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is RTO

A

It is the time within which a business process must be restored after a disaster in order to avoid unacceptable consequences associated with a break in continuity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is RPO

A

Point in recovery where data has to be restored as the last backup was until then

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what does Hash Algorithms does

A

It provides a finger print to ensure authentication. it does not provide encryption, authorization and identification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

governance of IT should be whose stakeholders

A

Board of Directors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is the actual purpose of audit trails

A

It is to determine accountability and NOT help the IS auditor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what does row level and column level access controls do

A

they restrict access to certain types of information that require additional security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is the diff between Data warehouse and database

A

data warehouse pulls data from multiple sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is being considered the most for reciprocal agreements as a recovery alternative

A

they must not be in close proximity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is most concern when orgn outsouces IS processing

A

the lack of right to audit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what ensures accountability when updating data in a production database

A

review of audit logs

17
Q

what is a web site certificate

A

it is to prove the authenticity of the site

18
Q

Digital signatures requires what keys

A

It requires the sender to have his private key and the receiver to have a public key

19
Q

what is a IT project portfolio analysis

A

provides information of planned initiatives, and ongoing IT services

20
Q

what is a table link / reference checks

A

table linking errors (completeness and accuracy of contents of the database

21
Q

which is the greatest concern

1) DR is invalid and need to be revised
2) Data may be lost in event of system failure
3) new vendor is not familiar with orgn policies
4) application owners were not informed of the change

A

application owners were not informed of the change

22
Q

what is the most impt thing for IS auditor to consider to faciliate new policy implementation

A

esiting IT mechanisms to enable compliance

23
Q

in a change management process, what does a IS auditor look out for most

A

the test plans are followed and complied

24
Q

what is the critical success factor of a succesful implementation

1) assimilation of the framweork and intent of the written policy by all appropriate parties
2) management support ?

A

1) assimilation of framework and intent of the written policy

25
Q

what is a integriyt constraints in a database

A

set of parameteres in a predefined table which prevent undefined data from being entered