GTG FoR IT Flashcards
WHAT is the role of the Systems Analyst?
(1) Designing systems
(2) Preparing specifications for programmers; and
(3) Serving as intermediary between users and programmers
NOTE: Analysts and Programmers should NEVER be able to make changes directly to programs that are used in “live” production
WHAT is an example of data security control?
Ensuring that storage media are subject to authorization prior to access, change, or destruction
WHAT is an advantage of a computer-based system over a manual-system?
THE Computer-based system will be more efficient at producing financial statements
i.e. the computer-based system can perform complex calculations in high volume
WHAT is a key difference in controls when changing from a manual system to a computer system?
THE Methodologies for implementing controls change
i.e. THE design and implementation are different in a computerized system compared to the manual one
WHAT is a likely disadvantage for a company that keeps data files prepared by personal computers rather than manually prepared files?
IT is usually easier for unauthorized persons to access and alter the files
WHAT would be considered “General” Controls?
Developing, modifying, and maintaining computer programs
i.e. General controls are policies and procedures that relate to the entity’s overall IT environment
WHAT is a validity check?
Tests of identification numbers or transaction codes for validity by comparison with items already known to be correct or authorized
e.g. Social Security numbers on payroll input records can be compared with Social Security numbers authorized by the personnel department
WHAT is a console log?
A log of activities of the computer system and the actions taken by the computer operator
i.e. IT can tell a computer operator whether a job had already been run that day
WHAT is a proxy-server?
A firewall system that limits access to a computer by routing users to replicated Web pages
i.e. IT maintains copies of web pages to be accessed by specified users
WHAT are Parity and Echo Checks examples of?
Hardware Controls
i. e. these controls are built into equipment by manufacturers
- THEY ensure the proper internal handling of data as they are moved and stored
WHAT is a Logic Test?
A type of application control that confirms if input value is appropriate
e.g., a letter cannot appear in a field that should be a number
WHAT is considered a significant function of Hardware Controls?
THEY ensure the proper execution of machine instructions
WHAT are Preventive Controls in an IT environment?
Measures taken in advance so that anticipated problems associated with performance of an activity will not occur
WHAT would be considered a policy used to protect a company’s vital information resources from computer viruses?
Prudent management procedures
**instituted in conjunction with technological safeguards
WHAT is an example of a computer program that appears legitimate BUT performs illicit activities when ran?
A Trojan Horse
e.g. A computer game that contains an application destructive to the computer system