Information Technology Flashcards
What is an advantage of using generalized audit software packages for a client that has EDP
It allows an auditor to perform audit tests on clients computer files while having only a limited understanding of the client’s IT environment
What is a Hot site
It has a redundant hardware and software ALREADy configured and ready to go so you have continuity of your operations in the event of a disaster
What is the difference between a limit test and a validity test
Limit test - also called a reasonable test - designed to assure that all inputs are in an appropriate range of data ( example - someone can’t enter a birthdate that is before 1900) or enter a date like April 31st
A validity check - this is when data that has been input is compared to a list located permanently in the company. If they do not match the input amount is rejected
Validity and limit tests are both tests that ensure the accuracy of processing - therefore they are both processing controls
What is private key for encryption and what are its disadvantages
It a tiny bit of code that is used in asymmetric encryption used to transform an encrypted message into a readable format
one disadvantage is that both a sender and a receiver must have the key for it to work
Activity logs that indicate failed transactions provide information on what
They provide documentation about the existence of transactions that become part of the audit trail
Its an essential element of the audit trail in an EDI system
What is an integrated test facility and what does it allow you to do
You run fictitious transactions through a client’s system along with the client’s data to make certain that it is receiving the same treatment .
You can compare the actual results to the expected results.
What happens in a parallel simulation
This is when you run the client’s data through an auditor developed software packaged.
Auditor can then compare the results to see if the client’s system processed the data similarly
What is current or concurrency control and an example
This is a control that allows users to access limited resources on a first come - first serve basis and lock out all remaining once capacity has been filled
Example - Airline reservations. Passenger 1 - hits enter 2 seconds before passenger 2 locking 2 out of the last seat
What is a compensating control
this is a tat security measure that compensates for some other security measure that is deemed too difficult or impractical to implement
What is a data entry control?
A data entry control validates data
EDI
- Transactions are all uniformly formatted - using strict standards
- Still will use software maintenance agreement because will need to update the software periodically
- It is regulated by contract law - like all ordinary commerce
- If you use a VAN to do your EDI - value added network - the cost is higher than using the internet because a VAN is privately owned
What does a systems analyst do
They are responsible for the DESIGN of the system
- need to make sure there is adequate documentation so that if the system analyst leaves someone else can follow their work
What is a definition of cloud computing
t is a model that allows organizations to use the internet to access and use services on remote third-party technology infrastructure
what is virtualization
This is a model where several virtual servers run on one physical host.
It is used for rapid application deployment
What is a VPN
Virtual Private Network
Using a VPN you can access network resources from remote locations
What techniques are used to see if all data has been processed
record counts and hash totals
Why and how do you use redundant data checks
Redundant data checks compare datant from two or more files to determine if they match
This is to make sure the computer has read the data properly
How do you use check digit verification
This is one digit in a number that is created from a mathematical formula from other number in the field
It is used to identify inappropriate information in the field - lie a invalid product number
What is an input control and what are examples
An input control are computer controls designed to provide reasonable assurance that transactions are:
- properly authorized before being processed by the computer
- accurately converted before being recorded on the computer
- and that is they are inaccurate are rejected, or corrected
Example - Edit Check - this is used to test the validity of data entered into a program for processing
What is a mirrored web server
This is a complete duplicate of a computer system
- it can be put into service immediately
- it provides the best assurance of service continuity in the event of a natural disaster
Why do you use cryptocurrency - bitcoin
It allows customers to pay for goods or services from a website while maintaining financial privacy
It uses an intermediary so that you do not have to expose any sensitive or private credit or bank account information
What is a sight draft
A sight draft is a type of bill or exchange - the exporter holds the title of the goods transferred until the importer receives and pays for them
What are application controls
These are designed to ensure that an individual computer application or process performs properly
It is particular to a specific process or subsystem
What is a VAN and what does it do
Value added net work - it is privately owned
- it is a way to link different companies computer files together
- It routes datait transactions between trading partners
- It is more expensive that the plain internet because it is private
- its a private data communication system between business partners - because it is private - it is more secure
What is the difference between a cold, hot and warm site for disaster recovery
Cold - space available - but no equipment so will been d computers, and data loaded before operations can begin. It is when there is space available for operations. It would be when the delivery of duplicate computer hardware is prearranged, but not installed or read to operate.
Hot - off site location - completely ready to take over -
Warm site - it contains the hardware and equipment, but no copies of backed up data
What is an ERP system
It is software that integrates all the business processes of an organization and incorporates data from all aspects of the organization’s activities
What are some of the benefits of a EDI system
This is when you electronically transfer funds from one entity to another
- It reduces the time it takes to receive payment
- This shortens the business cycle
- This reduced the average and year-end receivables balances
- must rely more on Internal controls because there is decreased documentation so an auditor will need to increase testing
It uses a an inventory program which can be used to automatically send an order to a supplier when quantities in stock drop below a certain level - so it reduces stock outs
If you want to use the internet as a commercial network what must you do
As a company you need to be concerned about access to company information by unauthorized users - so you need to use firewalls
What are example of preventive, detective and corrective controls
Preventive - access controls to prevent unauthorized individuals from accessing the system
Detective - hash total is a detective contro. Echo check sis one as well (this is when you send the transmitted data back to the point of origin to compare it to the original data)
Corrective - contingency planning - designed to correct an error or irregularity and minimize consequences
What is in a systems specification document
This details what the program will do and how it will operate. Included are the data elements needed of rte program to operate properly
What are the control risks associated with micro computers
- Data and software are generally more accessible in a microcomputer environment so unauthorized individuals can more readily access records and modify software
A micro computer is a small computer like a pc
What are general controls for a computer system
They ensure the integrity of software and data files in the environment where computer systems are developed, maintained, and operated.
Biometric devices are an example
What do you use to detect unauthorized program changes
examine source code or program documentation to see if changes have been made
What is translation software and when is it used
It is needed to convert transactions from the entity’s internal former to a standard EDI format
- electronic data format
- this is a computer to computer exchange of business documents using a standard electronic format between business partners
What is continuity planning
It focuses on how a company can most effectively restore and continue business operations following a disaster