Section 4A&E Flashcards
Ensuring system reliability is a top management issue. To successfully implement systems reliability principles, management must do all of the following except:
design and employ appropriate and cost-beneficial control procedures to implement the policies.
develop and document a comprehensive set of control policies at the same time that specific control procedures are designed and implemented.
effectively communicate policies to all employees
customers, suppliers, and other authorized users.
monitor the system and take corrective action to maintain compliance with policies.
develop and document a comprehensive set of control policies at the same time that specific control procedures are designed and implemented.
To successfully implement systems reliability principles, a company must develop and document a comprehensive set of control policies before (not at the same time as) designing and implementing specific control procedures; effectively communicate policies to all employees, customers, suppliers, and other authorized users; design and employ appropriate and cost-beneficial control procedures to implement the policies; and monitor the system and take corrective action to maintain compliance with policies.
To successfully implement systems reliability principles, a company must:
- Develop and ocument a comprehensive set of ___ policies before designing and implementing control procedures
- Effectively ___policies to all employees, customers, suppliers, authorized users.
- ____appropriate and cost-beneficial control procedures to implement the policeis
- Monitor the system and take ___to maintain compliance w/ policies
RANDOM
To ensure system ___, companies must implement a set of preventive controls and supplement them with methods for detecting incidents and procedures for taking corrective remedial action.
A company must also employ multiple layers of controls so that if one control fails or is ___, another control will prevent, detect, or correct the reliability breakdown.
Control policies
communicate
Design and employ
corrective action
Reliability
circumvented
Which of the following statements is correct regarding information technology (IT) governance?
A primary goal of IT governance is to balance risk versus return over IT and its processes.
IT governance is an appropriate issue for organizations at the level of the board of directors only.
IT goals should be independent of strategic goals.
IT governance requires that the Control Objectives for Information and Related Technology (COBIT) framework be adopted and implemented.
A primary goal of IT governance is to balance risk versus return over IT and its processes.
By devising appropriate strategies (i.e., balancing risk versus reward) and making decisions on allocating its resources (e.g., staff and capital) to pursue those strategies, an organization’s IT governance can help ensure that the entity’s overall goals will be achieved.
RANDOM
One of management’s major responsibilities is to make sure a company’s information resources are secure and adequately controlled. T/F
True
The following five principles have been developed by the AICPA and CICA (Canadian Institute of Chartered Accountants) for use by practitioners in the performance of Trust Services engagements:
Security – system is protected against ___ physical and logical access
Availability - system is available for operation and use as agreed
Process Integrity - System processing is complet/accurate/timely/authorized
Confidentiality - Info. designated as confidential is protected as committed
Privacy - Personal info. is used in conformity w/ the commitments
Unauthorized
True to all
___is an organization’s formal process of defining its future course or direction.
Strategic planning
Companies can minimize IT control and security risks be taking proactive steps such as the following:
Hiring full-time ___
Making control problems and solutions a major part of _
Establishing formal __policies and enforcing them
Building controls into systems during the __rather than adding them after the fact
Establishing a __) which requires periodic backup of all data (not only sensitive data) to a safe and secure environment
security and control staff
employee training
information security
initial design stage
business continuity plan (i.e., disaster recovery
The accuracy, control, and efficiency of data input are improved by
- Using well designed ___documents
- __related data together
- Using good shading/borders to __data
- Using _source documents
- Providing __about data collected
- Using check-off boxes to present __
- Using ___turnaround documents
- Using source data automation devices (ATM/Bank Magnetic Ink, POS Scanners, Barcode Scanners) T/F
source Grouping separate prenumbered instructions avail options machine-readable True
Because an organization makes heavy use of client/server architecture, end users have much of its critical and sensitive information on their personal computers (PCs) and departmental file servers. The chief financial officer has asked the auditors for input for developing an end-user computing policy. The policy requires a long-range, end-user computing plan. Which of the following documents should most strongly influence the development of this plan?
The multi-year audit plan
The information security policy
The systems development methodology
The organization’s strategic operational plan
The organization’s strategic operational plan
Strategic goals outline how the organization will use information systems to create a competitive advantage, and the strategic operational plan is, therefore, one of the most important influences on the development of the end-user computing strategic plan.
An ___is part of the strategic plan and describes short-term methods of achieving milestones
operational plan
During a post-implementation review of an accounting information system (AIS), a CPA learned that an AIS with few customized features had been budgeted and scheduled to be installed over 9 months for $3 million (including hardware, software, and consulting fees). An in-house programmer was assigned as the project manager and had difficulty keeping the project on schedule. The implementation took 18 months, and actual costs were 30% over budget. Many features were added to the system on an ad-hoc basis, with the project manager’s authorization. The end users are very satisfied with the new system. The steering committee, however, is dissatisfied about the scope creep and would like a recommendation to consider before approving initiation of another large project. Based on those findings, the CPA should recommend implementing a:
change control system.
contract management system.
budgeting system.
project timekeeping system.
change control system.
Change control is the process of requesting a change, reviewing the effectiveness of the change, approving the change, and implementing the change
Change control procedures include the following:
Approval of the change by the ___; assign a __
The project leader ensures all required ___and authorities have been received for a given change.
Establish and assign ___and tasks for individuals involved in the project.
All personnel involved in the project vote to adhere to the assigned work. T/F
Test, approve, and implement the change. T/f
change control board, project leader.
project leader.
schedules
FALSE - they MUST adhere to the assigned work
true
In a large organization, the biggest risk in not having an adequately staffed information center help desk is:
increased difficulty in performing application audits.
inadequate documentation for application systems.
increased likelihood of use of unauthorized program code.
persistent errors in user interaction with systems.
persistent errors in user interaction with systems.
Information output is presented in three forms:
Document
Report
Queries
Information output is presented in three forms: Document, Report, Queries
DOCUMENTS are records/transactions of company data
- They can be printed/stored electronically T/F
- Some are meant for 3rd parties and others internally T/F
- Source doc are the beginning of a process
- ___ documents are generated at hte END of a transaction processing activity
REPORTS are prepped both externally and internally
- Employees use reports to control __ activities
- Managers use reports to ___ and develop ___
- External parties use reports to comply with ___
QUERIES
- Arise from problems & questions that need rapid __
- Queries find the info, retrieve it, and display as req.
- Users can have ___queries T/F
Companies are not allowed to let suppliers to query their databases so the suppliers can better meet their needs
T
T
T
Operational
Operational
make decisiions and develop biz strategies
laws and regulations
Action/answers
True
Predetermined
False - They are allowed
In a large organization, the biggest risk in not having an adequately staffed information center help desk is:
increased difficulty in performing application audits.
inadequate documentation for application systems.
increased likelihood of use of unauthorized program code.
persistent errors in user interaction with systems.
persistent errors in user interaction with systems.
Which of the following represents the procedure managers use to identify whether the company has information that unauthorized individuals want, how these individuals could obtain the information, the value of the information, and the probability of unauthorized access occurring?
Disaster recovery plan assessment
Systems assessment
Risk assessment
Test of controls
Risk Assessment
A risk assessment is the process by which management would get the information necessary to resolve the question of attractiveness of the information and the desire of unauthorized individuals to attempt access to it.