M5-Processing Integrity Flashcards

1
Q

Information output is a major function of transaction processing along with data input, data storage, and data processing. (true or false)

A

true

Analysis of data is not a major function of transaction processing. Analysis is typically performed subsequent to transaction processing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

As part of batch processing, a manual total will be calculated for each transaction file and compared to a computer-generated batch control total. Any financial discrepancies (such as an error or an employee paycheck) will be identified and resolved as part of this process. (true or false)

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A reasonableness check is used to verify the data input before acceptance by a system. For a payroll system, a reasonableness check validates the proper entry of hours worked for each of the company’s employees. (true or false)

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Users are any workers who enter data into a system or who use the information processed by the system. Users could be secretaries, administrators, accountants, auditors, CEOs, and so on. (true or false)

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Audit logs are detective security controls. They are generally chronological records that provide documentary evidence of the sequence of activities that can be used to detect errors or irregularities. (true or false)

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When changing from a manual system to a computer system, the controls almost always are different. That does not mean that they are better or are worse, but they certainly are different. (true or false)

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The objective of data security controls is to ensure that storage media are only accessed, changed, or deleted after appropriate authorization. The objective is to protect information. (true or false)

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In an IT environment, a systems analyst is generally responsible for designing systems, preparing specifications for programmers, and serving as an intermediary between users and programmers. For internally developed systems, the analyst designs the overall application system but when the system is purchased, the analyst becomes a system integrator that adapts system design to processes. (true or false)

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A firewall is a system of user identification and authentication that prevents unauthorized users from gaining access to network resources. (true or false)

A

true

A firewall isolates a private network of some type from a public network (or a network segment from the main network). It also maintains a (controlled) connection between those two networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Access control software is a preventive control. It prevents “bad people” from accessing an organization’s systems and data. (true or false)

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Contingency planning would be considered a corrective control. (true or false)

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A hash total is a detective control, not a preventive control. A hash total attempts to detect if numbers that are not normally added (such as account numbers) have been processed incorrectly. A batch total is used for numbers such as dollars that are normally added. (true or false)

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly