GeT oN It Flashcards

1
Q

WHAT is Gray-box testing?

A

HAVING knowledge of internal data structures and algorithms for the purpose of designing tests, while executing those tests at the user, or black-box, level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

WHAT is Static Testing?

A

TESTING methods that examine a program’s code and associated documentation through reviews, walkthroughs, or inspections but does not require the program be executed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

WHAT would be considered a denial-of-service attack?

A

AN attempt to overload a system with messages so that the system cannot function

e.g. A company’s web server being overwhelmed with a sudden surge of false requests which cause their server to crash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

WHAT would be considered a detective IT Control?

A

While comparing reports, an employee notices that information sent to the subsystem was not fully processed

i.e. They noticed an error already in the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

WHAT control would prevent the unauthorized access of sensitive data of an unattended workstation?

A

USE of an automatic log-off of an inactive user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

WHAT is a control activity that should be taken to reduce the risk of incorrect processing in a newly installed computerized accounting system?

A

Independent verification of transactions

i.e. IT is an important compensating control in the absence of segregation of duties and reduced individual authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

WHAT are Application controls?

A

CONTROLS built into each computer application

i.e. THESE types of control plans are particular to a specific process or subsystem rather than to the timing of its occurrence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

WHAT is a job/ responsibility that should be assigned to the Network Administrator?

A

MANAGING remote access

WHY? - Because they are responsible for developing and maintaining the organization’s databases and for establishing controls to protect the database’s integrity

NOTE: network administrator are also known as “Database administrators (DBAs)”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

WHAT is the purpose of the “completeness test?”

A

TO check whether all data elements are entered before processing

i.e. THE interactive system can be programmed to notify the user to enter the number before accepting the receiving report

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

WHAT is an example of a run-to-run total?

A

AN online system creates separate totals that are accumulated for all transactions processed throughout the day

  • The computer then agrees these totals to the total of items accepted for processing

THE key here is that a run-to-run ensure the completeness of an update

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

WHAT errors would a batch financial total most likely detect?

A

A transposition error on one employee’s paycheck on a weekly payroll run

i.e. Batch financial totals compare the sum of the dollar amounts of the individual items as reported by the system with the amount calculated by the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

WHAT are the responsibilities of the application programmer within an information technology function?

A

TO code approved changes to a payroll program

i.e. Applications programmers design, write, test, and document computer programs according to specifications provided by the end users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

WHAT would be considered an application input control?

A

An Edit Check

WHY? - Because it prevents invalid characters from being accepted

i.e. Transactions that attempt to use an invalid character are rejected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

WHAT responsibility is normally assigned to a systems programmer in a computer system environment?

A

Operating Systems and Compilers

Systems programmers write systems software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

WHAT is the purpose of the Reasonableness checks?

A

TO perform checks based on known limits for given information

e.g. validation of proper entry of hours worked for each employee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

WHAT is the purpose of a Check Digit verification of an account number on an update transaction?

A

TO detect the transposition (change) of an account number entered into the system

i.e. IT is a detective control designed to establish the validity and appropriateness of numerical data elements, such as account numbers

17
Q

WHAT risk can be minimized by requiring all employees to use passwords when accessing their network system?

A

FIREWALL VULNERABILITY

i.e. Access controls are the most common authentication procedures - Password use is a common access control

18
Q

WHAT Control Activity would most likely detect computer-related fraud?

A

Reviewing the systems-access log

19
Q

WHAT is the most effective user account management control in preventing unauthorized computer system use?

A

Requiring employees to renew their accounts semi-annually

20
Q

WHAT is an appropriate edit check used to detect an error entered into a data field?

A

A Reasonableness (Limit) test

e. g. An employee mistakenly enters April 31 rather than April 30 into a date field
- April 31 would be rejected if the month end limit for April was programmed to be April 30