GTG FoR IT Flashcards

1
Q

WHAT is the role of the Systems Analyst?

A

(1) Designing systems
(2) Preparing specifications for programmers; and
(3) Serving as intermediary between users and programmers

NOTE: Analysts and Programmers should NEVER be able to make changes directly to programs that are used in “live” production

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

WHAT is an example of data security control?

A

Ensuring that storage media are subject to authorization prior to access, change, or destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

WHAT is an advantage of a computer-based system over a manual-system?

A

THE Computer-based system will be more efficient at producing financial statements

i.e. the computer-based system can perform complex calculations in high volume

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

WHAT is a key difference in controls when changing from a manual system to a computer system?

A

THE Methodologies for implementing controls change

i.e. THE design and implementation are different in a computerized system compared to the manual one

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

WHAT is a likely disadvantage for a company that keeps data files prepared by personal computers rather than manually prepared files?

A

IT is usually easier for unauthorized persons to access and alter the files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

WHAT would be considered “General” Controls?

A

Developing, modifying, and maintaining computer programs

i.e. General controls are policies and procedures that relate to the entity’s overall IT environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

WHAT is a validity check?

A

Tests of identification numbers or transaction codes for validity by comparison with items already known to be correct or authorized

e.g. Social Security numbers on payroll input records can be compared with Social Security numbers authorized by the personnel department

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

WHAT is a console log?

A

A log of activities of the computer system and the actions taken by the computer operator

i.e. IT can tell a computer operator whether a job had already been run that day

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

WHAT is a proxy-server?

A

A firewall system that limits access to a computer by routing users to replicated Web pages

i.e. IT maintains copies of web pages to be accessed by specified users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

WHAT are Parity and Echo Checks examples of?

A

Hardware Controls

i. e. these controls are built into equipment by manufacturers
- THEY ensure the proper internal handling of data as they are moved and stored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

WHAT is a Logic Test?

A

A type of application control that confirms if input value is appropriate

e.g., a letter cannot appear in a field that should be a number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

WHAT is considered a significant function of Hardware Controls?

A

THEY ensure the proper execution of machine instructions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

WHAT are Preventive Controls in an IT environment?

A

Measures taken in advance so that anticipated problems associated with performance of an activity will not occur

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

WHAT would be considered a policy used to protect a company’s vital information resources from computer viruses?

A

Prudent management procedures

**instituted in conjunction with technological safeguards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

WHAT is an example of a computer program that appears legitimate BUT performs illicit activities when ran?

A

A Trojan Horse

e.g. A computer game that contains an application destructive to the computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

WHO within a company maintains custody of its data?

A

The Data Librarian

i.e. THEY maintain control over and accountability for documentation, programs, and data storage media

17
Q

WHAT is a control that most likely could prevent computer personnel from modifying programs to bypass programmed controls?

A

Segregation of duties for computer programming and operations

i.e. Programmers and analysts have the ability to modify programs, data files and controls

Thus, they should have no access to programs used to process transactions

18
Q

WHAT type of validation routine is not likely to be appropriate in a real-time operation?

A

Sequence Checks

i.e. This control would NOT apply in a real-time operation because records are not processed sequentially

19
Q

WHAT are some “enablers” of the COBIT 5 framework?

A

Information and organizational structures

i.e. THEY support comprehensive IT governance and management

20
Q

WHAT would be considered a Distributed Denial-of-Service attack?

A

Computers of innocent parties infected with Trojan horse programs