Information Systems Operations 2 Flashcards

1
Q

How could an IS auditor most effectively detect when a programmer maliciously modified a production program to change the original code?

A

Reviewing system log files

Why? - Because this is more than likely the only trail that may provide information about the unauthorized activities in the production library

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an effective performance monitoring tool for an IS auditor?

A

Availability

i.e. the characteristic that is most directly affected by network monitoring is availability

Why? - Because network monitoring tools allow observation of network performance and problems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What method would be most effective for ensuring production source code and object code are synchronized?

A

Date and time-stamp reviews of source and object code

i.e. This would ensure that source code, which has been compiled, matches the production object code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the objective of concurrency control in a database system?

A

To ensure integrity when two processes attempt to update the same data at the same time

Note: Concurrency controls prevent data integrity problems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What would the effect of increased denormalization to tables within a system database cause?

A

Increased redundancy

Note: Normalization is a design or optimization process for a relational database that increases redundancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What would be considered a network diagnostic tool that monitors and records network information?

A

Protocol analyzer

i.e. This network diagnostic tool monitors and records network information from packets traveling in the link to which the analyzer is attached

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What measure would help to ensure the portability of an application connected to a database?

A

Use of Structured Query Language (SQL)

Why? - because it is an industry standard used by many systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a critical component in networking management?

A

Configuration and change management

Why? - Because on one end, configuration management establishes how the network will function internally and externally; and

  • Change management ensures that the setup and management of the network is done properly
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What audit procedure would help determine if unauthorized changes have been made to production code?

A

Examining object code to find instances of changes and tracing them back to change control records

i.e. The process begins by examining object code files to establish instances of code changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a prevalent risk in the development of end-user computing applications?

A

Applications may not be subject to testing and IT general controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

HOW would an IS auditor determine if unauthorized modifications were made to production programs?

A

By conducting Compliance testing

i.e. This would require the change management process be reviewed to evaluate the existence of a trail of documentary evidence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an IS auditor’s main concern when reviewing a hardware maintenance program

A

Whether the program has been validated against vendor-provided specifications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What database control would ensure integrity of transactions is maintained in a online transaction processing database?

A

Commitment and rollback controls

Why? - Because these controls ensure that database operations that form a logical transaction unit will be completed entirely or not at all

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What should an IS auditor recommend to protect specific sensitive information stored in a data warehouse?

A

Implement column- and row-level permissions

I.e. Column-level security prevents users from seeing one or more attributes on a table. With row-level security a certain grouping of information on a table is restricted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is an advantage of using unshielded twisted-pair (UTP) cable versus other copper-based cables

A

UTP cable reduces crosstalk between pairs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the most critical subject an incident response team should address FIRST after a major incident in an information processing facility?

A

Containment at the facility

i.e. reduction of further damage. The incident team must gain control of the situation.

17
Q

What would assist an IS auditor to best ensure that users have uninterrupted access to a critical, heavily used web-based application?

A

Load balancing

i.e. This helps ensure consistent response time for web applications

18
Q

What can an IS auditor recommend (as a corrective control) in the event that an application audit results in a corrupt database?

A

To proceed with restore procedures

WHY? - because this can be used to recover databases to their last-known archived version

19
Q

What would be an effective compensating control when an IS auditor observes that some parameters in the tape management system are set to bypass or ignore tape header records?

A

Staging and job setup

Otherwise, this could result in the loading the wrong tape and deleting or accessing data on the loaded tape.

20
Q

What should be the IS Auditor’s primary focus when reviewing the process for continuous monitoring of the capacity and performance of IT resources?

A

Providing accurate feedback on IT resource capacity