IT Chapter 3 Flashcards

1
Q

Where is the greatest information security risk?

A

Accidental employee error.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the three control environment sub componenets?

A

Managerial philosophy
Org Structure
Steering committee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is logical security concerned with?

A

Safeguarding software to protect software and data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is org security concerned with?

A

Segregating the functions of the IS department and the end user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Restricting documentation, hardware and data follows into what control?

A

Access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are output controls there for?

A

Procedures ensure the accuracy of output including reports, data updates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is SOX? What is the policy in Canada?

A

Requirement to have external auditors examine the internal controls. In Canada, does not have to be external auditors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is COBIT a governance model of?

A

IT Governance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a disaster recovery plan?

A

Set of policies and procedures to protect and recover IT infrastructure in the even of disaster.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Infrastrcture-as-a-service?

A

Cloud-computing categary where an org oursoucres hardware, storage, servers and networking to a service prodiver.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the most common computer crime?

A

Input manipulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is program manipulation?

A

Involves changing or altering existing programs in the computer system or inserting new programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the salami technique?

A

Nearly unnoticeable thin slices of financial transactions are repeatedly removed and transferred to another account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the focus of a financial audit?

A

Focused on providing reasonable assurance over financial records and documentattion of financial information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is an IT audit?

A

Evaluates if information systems are safeguarding assets, and maintaining data integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the stages of a financial audit?

A
  1. Client acceptance
  2. Audit planning stage
  3. Control testing stage
  4. Substantive testing stage
  5. Opinion formulation stage
17
Q

What are the auditing process for IT audits?

A
  1. Physical and environment review
  2. System admin review
  3. Network security review
  4. Business continuity review
  5. Data integrity review
18
Q

What is substantive testing?

A

Focuses on finding direct evidence that certain activities are happening as they should.

19
Q

What does CAAT stand for?

A

Computer assisted audit techniques

20
Q

What are the functions of CAAT?

A

Can sift through records looking for patterns.
100% verification
Detect fraud.

21
Q

Which two control procedures are classified as access,input, processing, output, procedural and documentation control procedures?

A

Physical and logical

22
Q

What are three features of physical security?

A

Safeguarding hardware
Network authentication of users
Server room security

23
Q

What is the subset goal of data input controls?

A

To protect data integrity

24
Q

What are the two most common IT governance framework for SOX compliance?

A

COBIT and COSO

25
Q

What has resulted in simplifying disaster recovery plans?

A

Virtualization

26
Q

What is the formal term for the collected techniques of securing communications?

A

Cryptology

27
Q

Three types of data processing fraud?

A

Input, program, output

28
Q

What is the main focus of substantive testing?

A

Direct evidence that certain activities such as calculations are happening as they should.

29
Q

What is the most common BI method deployed using CAAT?

A

Pattern recognition.

30
Q

What is COSO

A

A model to ensure accurate financial reporting, efficient operations and law compliance.