GTG For iT II Flashcards

1
Q

WHAT would be considered an example of a General Control?

A

Controls for documenting and approving programs and changes to programs

NOTE: General Controls are controls related to the organization’s IT environment as a whole (which is why this example is accurate)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

WHAT is an assertion made under the COBIT 5 framework?

A

THE creation of stakeholder value is the fundamental goal of any enterprise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

WHAT IT Control would most likely detect computer-related fraud?

A

Reviewing the systems access log

i.e. reviewing the systems-access log may detect improper access related to fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

WHAT is one function of a Decision Support System (DSS)?

A

IT allows certain aspects of a problem to be preprogrammed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

WHAT is a critical aspect of separation of duties within information systems?

A

Programmers and Computer Operators

WHY? - Because a computer operator should not be assigned programming responsibility and have the opportunity to make changes in programs as he operates the equipment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

WHAT is XML?

A

XML (eXtensible Markup Language)

i.e. IT is useful for putting structured data into a text file and used on the content of the data

NOTE: XML can be used to extract and tag structured information from a database for transmission and subsequent use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Fill in the Blank.

Remote batch processing avoids the need for having ______.

A

File updating at each user location

WHY? - Because Remote batch processing (remote job entry) entails collection and entry of data from places other than the location of the file updating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

WHAT is an effective control to prevent a firm’s batch check-writing program from preparing checks for unauthorized vendors (i.e. not yet included in the vendor file)?

A

Implementing a record lookup for vendors during data entry

i.e. Verifying valid vendors at the point of entry is the most cost-effective means of preventing incorrect data from entering the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

WHAT is Program Documentation?

A

A control designed primarily to ensure that Programs are kept up to date and perform as intended

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

WHAT would be considered an example of a validity check?

A

A computer flags transmissions of which the control field value does not match an existing file record

WHY? - Because validity checks test identification numbers or transaction codes for validity by comparison with items already known to be correct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

WHAT is considered a critical success factor in data mining a large data store?

A

Pattern Recognition

WHY? - Because typical applications of data mining are identification of potential customers and purchasing power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

WHAT is the role of the IT Systems Analyst?

A

Designing systems
Preparing specifications for programmers; and
Serving as intermediary between users and programmers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

WHAT is the primary function of a database management system?

A

TO create and modify the database

WHY? - Because it is an integrated set of software tools superimposed on the data files that helps maintain the integrity of the underlying database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

WHAT is an important function of the Database Administrator?

A

“Redefining” and “Restructuring” the database

i.e. THEY have the overall responsibility for developing and maintaining the database

Thus, the Database Administrator (DA) also establishes controls over the integrity of the database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

WHAT is an added benefit of using computer-aided software engineering (CASE) technology?

A

IT can ensure that data integrity rules are applied consistently

e.g. Data integrity rules such as validation and access, are applied consistently across all files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

WHAT is an important element of a Decision Support System (DSS)?

A

They facilitate solving relatively unstructured problems

i.e. It assists decision makers by allowing them to access data and test different solutions to problems

NOTE: This ONLY supplies support and should not take the place of the decision maker’s insights and judgment

17
Q

WHAT is System Authentication?

A

THE process by which a System verifies the identity of a user

i. e. Authentication is the process of determining that individuals are who they say they are
e. g. a password may identify but not authenticate its user if it is known by more than one individual

18
Q

WHAT are Utility Programs?

A

Computer programs that perform routine processing functions, such as sorting and merging

i.e. These programs are provided by manufacturers of equipment to perform routine processing tasks required by both clients and auditors

19
Q

WHAT is the hierarchy of storage commonly found in computerized databases, from least complex to most complex?

A

Byte, field, record, file

i.e. A byte is a group of bits (binary 1s and 0s). A field is a group of bytes. A record is a group of fields. A file is a group of records

20
Q

WHAT is a distributed denial-of-service attack?

A

An attack on computer networks that uses the computers of innocent parties infected with Trojan horse programs