Information Technology Governance Flashcards

1
Q

Relating to IT governance, what is the best action an LARGE organization can take to increase internal control effectiveness? This does not apply to small organizations.

A

Segregation of duties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Relating to IT governance, what is the best action an SMALL organization can take to increase internal control effectiveness?

A

Engaging the owner in the activities of the business. This is an important COMPENSATING control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. The uniformity of transaction processing is higher in automated than manual systems. True or false?
  2. A greater level of control is necessary in automated than manual systems. True or false?
A

Statement one = true

Statement two = false

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An automated computerized accounting system ________ the incidences of clerical errors and __________ the incidences of systematic errors.

A
  1. Reduce instances of clerical errors. System automatically checks for errors.
  2. Increases instances of systematic errors. Errors in programming can occur.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Do computerized systems increase or decrease the need for access controls (logical and physical)?

A

Increase. Because computerized systems actually increase the number of points where the system can be accessed, increasing the need for both physical and logical access controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a key characteristic that distinguishes computer processing to manual processing? (Hint: related to data entry)

A

Computer processing virtually eliminates computational errors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does computerized accounting systems (online real-time processing) differ from manual accounting systems with regards to job functions?

A

It is common for computerized systems to combine functions that would be considered incompatible in a manual system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

With regards to accounting systems, ledgers, journals, and invoices are part of what accounting system?

A

Manual

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

With regards to accounting systems, e-vouchers, automated transactions, and concentration of information are part of what accounting system?

A

Automated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Are audit trails easier to follow and more transparent in automated or manual accounting systems?

A

Automated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Processing speed, fewer idiosyncratic errors, and lower likelihood of intrusion are advantages of what accounting system?

A

Automated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An automated system requires controls related to people, software, and hardware. Are access controls more or less of important in automated system as to manual?

A

More important. Highly important.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Compared to manual systems, automated systems have
1. ________ risks related to remote access
2. ________ risks related to concentration of information
3. ________ opportunities for directly observing processes
Answer: Either increase or decrease

A
  1. Increase risks for remote access
  2. Increase risks for concentration of info
  3. Decreased opportunities for observing processes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

______ processing errors are the MOST IMPORTANT risk related to computer accounting systems.

A

Systematic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Authorization is often _____ in online systems. (Hint: automated or manual)

A

Automated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Do both manual and automated accounting systems require stringent internal controls? Can they both produce inaccuracy in financial reporting?

A

Yes and yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Balancing risk versus return is over IT and its processes and strategically managing and acquiring IT resources in support of the organization’s mission is the primary goal of what?

A

IT Governance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Is COBIT (Control Objectives for Information and related Technology) a required framework that should be adopted and implemented?

A

No it’s not required. There are many IT governance models and frameworks that an organization can implement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

There are four domains and processes of IT COBIT framework. They are?

A
  1. Planning and organization
  2. Acquisition and implementation
  3. Delivery and support
  4. Monitoring
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are seven desired information attributes of COBIT framework?

A
  1. Effective
  2. Efficient
  3. Confidential
  4. Integrity
  5. Available
  6. Compliant
  7. Reliable
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

COBIT provides a framework for ______ and management of _________.

A
  1. IT Governance

2. Enterprise IT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Guiding managers, users, and auditors to adopt best practices related to the management of information technology is an important purpose of what?

A

COBIT.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Using the company’s IT strategic plan to consider how implementing something detracts or aligns with company’s business objectives is part of what domain in COBIT?

A

Planning and organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Assessing how to acquire, implement, or develop IT solutions that address business objectives and integrate with critical business process is part of what domain of COBIT?

A

Acquisition and implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Relating to strategic decisions for IT management, which three of the four are the most important strategic decisions?
A. How a system can contribute to long-range business plan
B. How system would support daily business operations
C. How indicators can be developed to measure achievement of business objectives
D. How system reduces operating costs

A

First three are important. Reducing operating costs are least important.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What are the four IT monitoring processes of COBIT model?

A
  1. Monitor and evaluate IT performance (reviewing system response time logs)
  2. Monitor and evaluate Internal controls
  3. Ensure regulatory compliance
  4. Provide IT guidance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Assessing how to best deliver required IT services including operations, security, and training is part of what domain in COBIT?

A

Delivery and support

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

A formal review process to assess how to best assess IT quality and compliance with control requirements is part of what domain in COBIT?

A

Monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

COBIT is primarily focused on _______ organizational IT processes. COSO is primarily focus on ______ processes. (Hint: Answer is either internal or external)

A

COBIT - Internal

COSO - External

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

The primary target audience for COBIT is? (Hint: type of auditor)

A

Internal auditors. COBIT is primary focused on internal organization IT processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

The primary target audience for COSO is? (Hint: type of auditor)

A

External auditors. COSO focuses primary of external processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Review of outsourcing contracts and policies to improve service quality is part of what domain of COBIT model?

A

Delivery and support. This is part of assessing how to best deliver required IT services including operations, security, and training.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Reviewing to determine if company complied with privacy REGULATIONS regarding customer data is part of what domain of COBIT model?

A

Monitoring. Analyzing compliance with privacy regulations is part of a formal review process to assess how to best assess IT quality and compliance with control requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Assessing whether to purchase, or internally develop, a new CRM (customer relationship management) system is part of what domain of COBIT model?

A

Acquisition and implementation. This is a part of assessing how to acquire, implement, or develop IT solutions that address business objectives and integrate with critical business process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

IT staff, computer servers, network structure, and routers are examples of what? (Hint: IT _______)

A

IT resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Standards for user response times is an example of what?

A

Information criterion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Improving responsiveness and flexibility, and aiding the decision-making processes in an organization, are important goals of an _________.

A

ERP system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

An important goal of ERP is to ______ data redundancy and an ERP will _____ the costs of implementation and training.

A
  • reduce data redundancy

- increase the costs of implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Regarding cloud service delivery models, _____ is the use of the cloud to access virtual hardware.

A

IaaS (Infrastructure as a service)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Regarding cloud service delivery models, ______ is the use of the cloud to create (not access) software.

A

PaaS (Platform as a service)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Regarding cloud service delivery models, _____ is the use of the cloud to use (not create) software.

A

SaaS (Software as a service). Example Office 365.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

The _______________ incorporates data warehouse and data mining capabilities within the ERP.

A

Online analytical processing system (OLAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

The _______________ (1) records the day-to-day operational transactions and enhances the visibility of these transactions throughout the system. It is primarily the ____ (2)and not the ____, (3) that provides an integrated view of transactions in all parts of the system.

A
  1. OLTP
  2. OLAP
  3. OLTP
44
Q

The _______ is primary concerned with collecting data (and not analyzing it) across the organization.

A

Online transaction processing system (OLTP)

45
Q

What is a key distinction between OLAP and OLTP with regards to data?

A

OLAP analyzes data

OLTP collects data

46
Q

________ provide information to mid- and upper-level managers to assist them in managing non-routine problems and in long-range planning. (Hint: Type of system)

A

Decision support system (DSS)

47
Q

_________ are a subset of DSS especially designed for forecasting and making long-range, strategic decisions; thus, these systems have a greater emphasis on external data. (Hint: Type of system)

A

Executive support system (ESS)

48
Q

This system facilitate the work of clerical employees by providing information relevant to their day-to-day activities.

A

Office automation system

49
Q

What is the most effective system to implement that integrates all functional areas within an organization to allow information exchange and collaboration among all parties involved in business operations?

A

Enterprise resource planning system

50
Q

___ provide transaction processing, management support, and decision-making support in a single, integrated package. By integrating all data and processes of an organization into a unified system, ____ attempt to eliminate many of the problems faced by organizations when they attempt to consolidate information from operations in multiple departments, regions, or divisions. (Hint: Same answer for both blanks)

A

ERPs

51
Q

Explain the primary objective of enterprise resource planning systems?

A

Integrate data from all aspects of an organization’s activities.

52
Q

What type of management reporting system would encompass querying a data warehouse and drilling down into transaction and trend information via various network set-ups?

A

OLAP. On-line analytical processing system.

53
Q

Data loss, vendor security failure, and system hacks are all risks of what? (Hint: type of computing)

A

Cloud-based computing.

Global visibility not a risk

54
Q

The below are all motivations to implement what type of system?

  1. Reducing data redundancy
  2. Improving organizational agility
  3. Improving data analytic capabilities
A

ERP

55
Q

ERPs increase or decrease system complexity?

A

Increase

56
Q

What are the three most likely reasons an ERP system fails?

A
  1. Poor system development process
  2. Lack of management support
  3. Underestimating system implementation
57
Q

Analyzing customer sales to determine optimal opening and closing times would be part of what type of system?

A

OLAP. This is an example of a data mining application within an online analytical processing (OLAP) system.

58
Q

The preparation of a simple payroll report is an application of an ___________ system.

A

Online transaction processing system (OLTP). This deals with data collection.

59
Q

Using ERM to determine which accounts would provide most profitable returns to a company would a be an application of what type of system?

A

CRM (Customer relationship management)

60
Q

ERP (Enterprise resource planning) is an application software most likely to be used by what type of size organization?

A

Medium to large size

61
Q

What are the three main functional areas within most IT departments?

A
  1. Applications development
  2. Systems administration and programming
  3. Computer operations
62
Q

The functions below all relate to what functional area within IT department?

  1. Network maintenance
  2. Wireless access
  3. Antivirus management
A

Systems administration

Responsibilities do not need to be segregated

63
Q

The functions below all relate to what functional area within IT department?

  1. Data entry
  2. Quality assurance
A

Operations

Responsibilities do not need to be segregated

64
Q

Application programming occurs within what function of an IT department?

A

Applications development

65
Q

With regards to IT departmental responsibilities, these should be segregated to different individuals ideally based on?

A

Different functional areas of IT

66
Q

Why does data entry (operations) and application programming (development) need to be delegated to separate individuals? (Hint: Two reasons)

A
  1. This is because if one both enters data and changes the programs into which those data are entered, one can perpetrate consequential financial frauds
  2. Those responsibilities are in different functions (operations vs development)
67
Q

With regards to IT responsibilities and functions, this position is responsible for managing the flow of documents and reports in and out of the computer operations department. What position is it?

A

Data control clerk

68
Q

With regards to IT responsibilities and functions, this position keys (i.e.) enters, hand-written or printed records to convert them into electronic media. What position?

A

Data entry clerk

69
Q

With regards to IT responsibilities and functions, this position is responsible for operating the computer, including loading program and data files, running the programs, and producing the output. What position?

A

Computer operator

70
Q

With regards to IT responsibilities and functions, this position is responsible for maintaining control over the computer operations files, but not for controlling the flow of documents into and out of the computer operations department. What position?

A

File librarian

71
Q

Managing remote access to the systems they control is a responsibility of who? (Hint: type of position)

A

Network administrator (or system administrator).

72
Q

When a programmer who writes applications also has access to a file library, why is this is problem?

A

If she changes both live and archive copies of programs, changes that she has made may not be detected.

73
Q

Evaluating the quality and nature of IT department staff training is essential to retaining ____________________,

A

Competent individuals within an organization

74
Q

When a network administrator provides support to server (via dial-up connection) and then leaves the company, if the company fails to remove user account(s) among an employee leaving, then this will be a ____ risk to the company.

A

Control

75
Q

Coding approved changes to a payroll program is an appropriate responsibility of an application programmer. Which of the following are should not be responsibilities of this position?
A. Have access to operating software to make modifications
B. Correcting data entry errors
C. Have access to program code or archive documentation

A

All of the above

76
Q

This position is responsible for maintaining the hardware and software aspects of a computer network. What position is it?

A

Network administrator

77
Q

Developing application programs is a function of what position?

A

Application programmers

78
Q

Installing operating system upgrades is a function of what position?

A

System programmers

79
Q

Limited access to employee master files to authorized employees in the personnel department could prevent an employee from getting paid an appropriate hourly wage, why?

A

Limiting access to employee master files to authorized employees would help prevent unauthorized changes in the wage rates in the master files.

80
Q

When erroneous data are detected by computer program controls, such data may be excluded from processing and printed on an error report. The error report should most probably be reviewed and followed up by the?

A

Control group

81
Q

________ responsible for providing a continuous review function by supervising and monitoring input, operations, and the distribution of output. Has INTERNAL AUDIT responsibilities.

A

Control group

82
Q

This position has responsibility for the overall operation of the information systems department. What position?

A

Supervisor of computer operations

83
Q

This position is responsible for designing the system. What position?

A

Systems analyst.

84
Q

This position is charged with designing program flowcharts and writing computer programs based on the work of the systems analyst. What position?

A

Computer programmer

85
Q

Machine operators _______ (by nature of operating the system) have access to error messages and will distribute them to the control group. Machine operators _____ have access to the systems manual. Machine operators _____ be supervised by programmer (Should or should not).

A
  1. Should
  2. Should not
  3. Should not
86
Q

Good internal control in a computer system requires that operators, programmers, and the library function be _________.

A

Segregated

87
Q

Which of the following are effective control measures?

  1. Periodic rotation of operators
  2. Mandatory vacations
  3. Controlled access to the facility
  4. Segregation of personnel for controlling input and output
A

All of the above

88
Q

Modifying and adapting operating system software is a function of what position?

A

Systems programmer

89
Q

Correcting detected data entry errors for the cash disbursement system is a function of what person(s)?

A

Data control personnel

90
Q

Maintaining custody of the billing program code and its documentation is function of?

A

Data library personnel

91
Q

_______ have the ability to add or update documentation items in data dictionaries.

A

Database administrators

92
Q

_________ are given responsibility for maintaining system software, including operating systems and compilers.

A

Systems programmers

93
Q

_______ is responsible for developing systems. (Unit type)

A

Applications development unit

94
Q

The responsibility of ________ is to implement and maintain system-level software such as operating systems, access control software, and database systems software. (Unit type)

A

Systems programming unit

95
Q

Help desks are usually a responsibility of _________ because of the operational nature of their functions (for example, assisting users with systems problems involving prioritization and obtaining technical support/vendor assistance). (Unit type)

A

Computers operations unit

96
Q

The responsibility of ______ is to interact with application systems as planned.

A

User departments

97
Q

________ is responsible for designing the computer system, including the goals of the system and means of achieving those goals, based upon the nature of the business and its information needs. The _________ also must outline the data processing system for the computer programmer with system flowcharts. (same answer)

A

Systems analyst

98
Q

_______ write detailed programs based upon the work of the systems analyst.

A

Computer programmers

99
Q

The _____ has overall responsibility for the computer operations function (systems design, programming, operations, library, etc.).

A

Data processing manager

100
Q

Why would computer operators have access to operator instructions and detailed program listings lessen internal control?

A

computer operators who have access to detailed program listings have the opportunity to modify the programs.

101
Q

Should a systems programmer maintain output controls?

A

No.

102
Q

_________ are responsible for analyzing and designing computer systems; they generally lead a team of programmers who complete the actual coding for the system; they also work with end users to define the problem and identify the appropriate solution.

A

Systems analysts

103
Q

_____ work under the direction of the systems analyst to write the actual programs that process data and produce reports.

A

Application programmers

104
Q

______ responsible for management activities associated with the system they control. For example, they grant access to their system resources, usually with usernames and passwords.

A

Systems administrators (or network)

105
Q

______ maintain the various operating systems and related hardware. For example, they are responsible for updating the system for new software releases and installing new hardware.

A

System programmers

106
Q

______ must not be permitted to participate directly in systems operations.

A

System administrators

107
Q

______ not permitted to have access to information about application programs or data files.

A

System programmers