IT/Business Continuity Flashcards

1
Q

A malicious program replicates itself at each node of access to a network and sends copies of itself to each location it can reach from that node without attaching itself to an existing program or code. The program eventually finds and exploits a hole in the network security prompting a security breach

A

WORM: It spreads by sending copies of itself to terminals throughout a network. Worms may act to open holes in network security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Malicious programs that try to appear harmless by using social engineering (rhetorical techniques designed to make messages appear to be friendly, innocent, or sent by familiar contacts).

A

Trojan horses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Software-based controls that check amounts or validate access based on logical rules.

A

Logic controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the three processes involved in Identity and Access Management

A
  1. Provisioning 2. Identity Management 3. Enforcement
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The need to maintain security and integrity of transmissions and the data they represent. One of the best means of managing the confidentiality of satellite transmissions would be.

A

Encryption: Encryption is the best means of managing the confidentiality of satellite transmissions because even if an unauthorized individual recorded the transmissions, they would not be intelligible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

To reduce security exposure when transmitting proprietary data over communication lines, a company should use?

A

Cryptographic devices protect data in transmission over communication lines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

List the steps in the SDLC ( Systems Development Life Cycle)

A
  1. Systems Planning 2. Systems Analysis 3. Systems design/system selection 4. Programming and customization/configuration 5. Conversion and implementation 6. Systems operation and refinement (feedback)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Give an example of a input control?

A

A validation check at data entry that verifies that a quantity field contains only numbers is an example of a programmatic means of ensuring the accuracy of the value in that no nonnumeric characters are permitted; this is an input control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which stage of the SDLC is most important for auditors to be involved in because they need to ensure specific controls are integrated?

A

Ensuring the system includes all of the necessary controls in the systems design stage is vital because such controls will be expensive if added later. For systems selection, auditors need to ensure specific controls are part of the selection criteria and should check that the controls actually exist once a package has been selected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

After implementation of a new software system, the project team should

A

determine if the development process was conducted in compliance with policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is an Echo Check?

A

An echo check is a hardware control that checks for accuracy in data transmission;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a sign check?

A

A sign check looks for positive or negative field restrictions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Buy side, sell side, back office, and enterprise resources planning (ERP) are subcategories of which of the following layers of IT?

A

Applications are programs that perform specific tasks related to business processes. They may be transactional or support applications. Transactional applications perform buy side (e.g., procurement), sell side (e.g., order processing), back office (e.g., invoicing for payables, recording receivables), and enterprise resource planning (ERP), software that integrates some of the other functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A device used to connect dissimilar networks is a

A

gateway, often implemented via software, translates between two or more different protocol families and makes connections between dissimilar networks possible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are gateways, routers, bridges, and repeaters?

A

Gateways connect Internet computers of dissimilar networks. Routers determine the best path for data. Bridges connect physically separate LANs. Repeaters strengthen signal strength

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

allows the use of batch totals and other controls, while simultaneously allowing changes to be viewed immediately

A

Memo posting is used by banks for financial transactions and others to create real-time entries that are posted to a temporary memo file. The memo file allows the updated information to be viewed; at a designated time, the memo file is batch processed to update the master file. Data is available immediately for viewing, but batch processing controls are applied before the changes become permanent.

17
Q

Describe Routers

A

includes intelligent processors that link network segments while keeping them separate and independent.

18
Q

Describe switches

A

which are devices that connect telecom circuits and may allow network management capabilities at Layer 3 and 4 of the OSI Model.

19
Q

What is distributed processing?

A

Distributed processing is a strategy where remote locations each have their own processing power, but all are networked together

20
Q

Concurrency controls are important to ensure that all updates to the database are recorded.

A

The controls address the problem of two users attempting to update the database at the same time.

21
Q

database elements would regulate whether a specific user role would have read-only access to particular data?

A

Schema, from schematic, are the rules for the overall database; subschema are files describing a portion of a database, including authorized read-only/full access users.