Types of Information Systems and Technology Risks Flashcards

1
Q

What are the four main technology risks?

A

Strategic, Operating, Financial, and Information Risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the threats in a computerized environment?

A

Virus, Worm, Trojan Horse, Denial-of-Service Attack, and Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the steps in disaster recovery?

A

Assess the risks, identify mission-critical applications and data, develop a plan, determine the respoinsibilities of the personnel involved, and test the disaster recovery plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What type of backup consists of an exact copy of the entire database?

A

Full backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What type of backup consist of copying only the data items that have changed since the last backup?

A

Incremental backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What type of backup consists of copying all changes made since the last full backup?

A

Differential backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What type of site is an off-site location that has all the electronic connections andother physical requirements for data processing, but it does not have the actual equipment?

A

Cold site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What type of site is an off-site location that is equipped to take over the company’s data processing.

A

Hot Site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What type of site is a facility that is already stocked with all the hardware that it takes to create a reasonable facsimile of the primary data center?

A

Warm Site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What type of control limits access to program documentation, data files, programs, and computer hardware to those who require it in the performance of their job responsibilities.

A

Access controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What type of control plan prevents, detects, and corrects transaction error and fraud and are application-specific, providing reasonable assurance?

A

Application Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which control plan is design to prevent potential problems from occurring?

A

Preventive Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What type of control plan is designed to fix problems that have occurred and that have been located by detective controls?

A

Corrective Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What type of control is designed to locate problems that have occurred so they can be fixed by corrective controls?

A

Detective Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the risk of choosing inappropriate technology?

A

Strategic Risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the risk of doing the right things in the wrong way?

A

Operating Risks

17
Q

What is the risk of having financial resources lost, wasted, or stolen?

A

Financial Risks

18
Q

What is the risk of loss of data integrity, incomplete transactions, or hackers?

A

Information Risks