Information Systems Operations Flashcards

1
Q

What activity performed during peak production hours could result in unexpected downtime?

A

Performing preventive maintenance on electrical systems

e.g. A mishap or incident caused by a maintenance worker could result in unplanned downtime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How does “Atomicity” work?

A

It guarantees that either the entire transaction is processed or none of it is

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What would be considered a HIGH LEVEL exposure when auditing a database server?

A

THAT default global security settings for the database remain unchanged

i.e. This could allow issues such as blank user passwords or passwords that were the same as the username

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

WHAT should an IS auditor do after realizing that some tables in the database are not normalized?

A

Review the justification

WHY? - Because in some situations, denormalization is recommended for performance reasons

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What control would help mitigate the risk of undetected and unauthorized program changes to the production environment?

A

Hash keys are calculated periodically for programs and matched against hash keys calculated for the most recent authorized versions of the programs

i.e. This matching of hash keys over time would allow detection of changes to files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

WHAT would be considered an effective compensating control for bypassed or ignored tape header records?

A

Staging and job setup

i.e. this could help prevent the loading of the wrong tape and deleting or accessing data on the loaded tape

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the advantage of using web services for the exchange of information between two systems?

A

Efficient interfacing

WHY? - Because it facilitates the interoperable exchange of information between two systems regardless of the operating system or programming language used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does the use of library control software provide reasonable assurance of?

A

That program changes have been authorized

i.e. The main objective of library control software is to provide assurance that program changes have been authorized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What type of “key” would prevent primary key changes and record deletions (within a relational database)?

A

The foreign key

i.e. In a relational database with referential integrity, the use of foreign keys would prevent events such as primary key changes and record deletions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the Primary benefit of an IT manager monitoring technical capacity?

A

To ensure that the Service Level Requirements are met

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What would be considered an effective way to test the design effectiveness of a change control process?

A

Performing an end-to-end walkthrough of the process

i.e. Observation is the best and most effective method to test changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What would be considered the “First” step in execution of a problem management mechanism?

A

Exception Reporting

i.e. The reporting of operational issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What would be considered an effective method for testing program changes?

A

Tracing a sample of modified programs to supporting change tickets

i.e. This method would help identify instances in which a change was made without supporting documentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When are emergency changes that bypass the normal change control process acceptable?

A

WHEN management reviews and approves the changes after they have occurred

i.e. It is acceptable for changes to be reviewed and approved within a reasonable time period after they occur

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What control would provide the most assurance for database integrity?

A

Table link/reference checks

Why? - Because this method helps detect table linking errors (such as completeness and accuracy of the contents of the database)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What should an IS auditor recommend to avoid out-of-range data found in some tables of a database?

A

Implementing integrity constraints in a database

Why? - Because this control will check data against predefined tables or rules, preventing any undefined data from being entered

17
Q

What is an effective measure/ performance indicator for an organization that has outsourced its help desk function?

A

First call resolution rate

Why? - Because the percentage of incidents solved on the first call is a good way to measure the effectiveness of the supporting organization

i.e. This is something that can be controlled by the outsource supplier

18
Q

What is the IS auditor’s best way to ensure the integrity of transaction processing for online banking transactions?

A

Database commits and rollbacks

Why? - Because the data is saved after the transaction processing is completed

Note: Rollbacks ensures that the processing that has been partially completed as part of the transaction is reversed back and not saved if the entire transaction does not complete successfully

19
Q

What is the IS Auditor’s main concern when reviewing system parameters?

A

That they are set to meet both security and performance requirements

Why? - Because the primary concern is to find the balance between security and performance

20
Q

What is the MAIN reason for use of the Data Flow Diagram by the IS auditor?

A

To graphically summarize data paths and storage

i.e. They trace data from their origination to destination, highlighting the paths and storage of data