IT Chapter 3 Flashcards

(30 cards)

1
Q

Where is the greatest information security risk?

A

Accidental employee error.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the three control environment sub componenets?

A

Managerial philosophy
Org Structure
Steering committee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is logical security concerned with?

A

Safeguarding software to protect software and data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is org security concerned with?

A

Segregating the functions of the IS department and the end user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Restricting documentation, hardware and data follows into what control?

A

Access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are output controls there for?

A

Procedures ensure the accuracy of output including reports, data updates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is SOX? What is the policy in Canada?

A

Requirement to have external auditors examine the internal controls. In Canada, does not have to be external auditors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is COBIT a governance model of?

A

IT Governance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a disaster recovery plan?

A

Set of policies and procedures to protect and recover IT infrastructure in the even of disaster.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Infrastrcture-as-a-service?

A

Cloud-computing categary where an org oursoucres hardware, storage, servers and networking to a service prodiver.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the most common computer crime?

A

Input manipulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is program manipulation?

A

Involves changing or altering existing programs in the computer system or inserting new programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the salami technique?

A

Nearly unnoticeable thin slices of financial transactions are repeatedly removed and transferred to another account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the focus of a financial audit?

A

Focused on providing reasonable assurance over financial records and documentattion of financial information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is an IT audit?

A

Evaluates if information systems are safeguarding assets, and maintaining data integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the stages of a financial audit?

A
  1. Client acceptance
  2. Audit planning stage
  3. Control testing stage
  4. Substantive testing stage
  5. Opinion formulation stage
17
Q

What are the auditing process for IT audits?

A
  1. Physical and environment review
  2. System admin review
  3. Network security review
  4. Business continuity review
  5. Data integrity review
18
Q

What is substantive testing?

A

Focuses on finding direct evidence that certain activities are happening as they should.

19
Q

What does CAAT stand for?

A

Computer assisted audit techniques

20
Q

What are the functions of CAAT?

A

Can sift through records looking for patterns.
100% verification
Detect fraud.

21
Q

Which two control procedures are classified as access,input, processing, output, procedural and documentation control procedures?

A

Physical and logical

22
Q

What are three features of physical security?

A

Safeguarding hardware
Network authentication of users
Server room security

23
Q

What is the subset goal of data input controls?

A

To protect data integrity

24
Q

What are the two most common IT governance framework for SOX compliance?

A

COBIT and COSO

25
What has resulted in simplifying disaster recovery plans?
Virtualization
26
What is the formal term for the collected techniques of securing communications?
Cryptology
27
Three types of data processing fraud?
Input, program, output
28
What is the main focus of substantive testing?
Direct evidence that certain activities such as calculations are happening as they should.
29
What is the most common BI method deployed using CAAT?
Pattern recognition.
30
What is COSO
A model to ensure accurate financial reporting, efficient operations and law compliance.