Test Bank For Information Technology Auditing 4e James A Hall

Original price was: $55.00.Current price is: $25.00.

Digital item No Waiting Time Instant Download

ISBN: 9781133949886

SKU: 00078600079 Category:

Description

Test Bank For Information Technology Auditing 4e James A Hall

Chapter 2— Auditing IT Governance Controls

TRUE/FALSE

1.To fulfill the segregation of duties control objective, computer processing functions (like authorization of credit and billing) are separated.

ANS: F PTS: 1

2.To ensure sound internal control, program coding and program processing should be separated.

ANS: T PTS: 1

3.Some systems professionals have unrestricted access to the organization’s programs and data.

ANS: T PTS: 1

4.44IT governance focuses on the management and assessment of strategic IT resources

ANS: T PTS: 1

5.Distributed data processing places the control IT recourses under end users.  

ANS: T PTS: 1

6.  An advantage of distributed data processing is that redundant tasks are greatly eliminated

ANS: F PTS: 1

7. Certain duties that are deemed incompatible in a manual system may be combined in a computer-based information system environment.  

ANS: T PTS: 1

8.To improve control and efficiency, new systems development and program maintenance should be performed by the same individual or group.

ANS: F PTS: 1

9. Distributed data processing reduces the risk of operational inefficiencies. 

ANS: F PTS: 1

10.The database administrator should be separated from systems development.

ANS: T PTS: 1

11.A disaster recovery plan is a comprehensive statement of all actions to be taken after a disaster.

ANS: T PTS: 1

12. RAID is the use of parallel disks that contain redundant elements of data and applications.

ANS: T PTS: 1

13. Transaction cost economics (TCE) theory suggests that firms should outsource specific noncore IT assets

ANS: F PTS: 1

14. Commodity IT assets easily acquired in the marketplace and should be outsourced under the core competency theory.

ANS: F PTS: 1

15. A database administrator is responsible for the receipt, storage, retrieval, and custody of data files.

ANS: F PTS: 1

16. Virtualization is the technology that unleased cloud computing.

ANS: T PTS: 1

17. Fault tolerance is the ability of the system to continue operation when part of the system fails due to hardware failure, application program error, or operator error.

ANS: T PTS: 1

18. An often-cited benefit of IT outsourcing is improved core business performance. 

ANS: T PTS: 1

19. Commodity IT assets include such things are network management.

ANS: T PTS: 1

20. Specific IT assets support an organization’s strategic objectives.  

ANS: T PTS: 1

21. A generally accepted advantage of IT outsourcing is improved security.

ANS: F PTS: 1

22. An advantage of distributed data processing is that individual end user groups set specific IT standards without concern for the broader corporate needs. 

ANS: F PTS: 1

23. A mutual aid is the lowest cost disaster recovery option, but has shown to be effective and low risk.

ANS: F PTS: 1

24. Critical applications should be identified and prioritized by the user departments, accountants, and auditors.

ANS: T PTS: 1

25. A ROC is generally shared with multiple companies.

ANS: T PTS: 1

MULTIPLE CHOICE

1.All of the following are issues of computer security except

a.

releasing incorrect data to authorized individuals

b.

permitting computer operators unlimited access to the computer room

c.

permitting access to data by unauthorized individuals

d.

providing correct data to unauthorized individuals

ANS: B PTS: 1

2.Segregation of duties in the computer-based information system includes

a.

separating the programmer from the computer operator

b.

preventing management override

c.

separating the inventory process from the billing process

d.

performing independent verifications by the computer operator

ANS: A PTS: 1

3.In a computer-based information system, which of the following duties needs to be separated?

a.

program coding from program operations

b.

program operations from program maintenance

c.

program maintenance from program coding

d.

all of the above duties should be separated

ANS: D PTS: 1

4.Participation in system development activities include:

a.

system analysts, database designers and programmers

b.

managers and operating personnel who work directly with the system

c.

accountants and auditors

d.

all of the above

ANS: D PTS: 1

5.Adequate backups will protect against all of the following except

a.

natural disasters such as fires

b.

unauthorized access

c.

data corruption caused by program errors

d.

system crashes

ANS: B PTS: 1

6.Which is the most critical segregation of duties in the centralized computer services function?

a.

systems development from data processing

b.

data operations from data librarian

c.

data preparation from data control

d.

data control from data librarian

ANS: A PTS: 1

7.Systems development is separated from data processing activities because failure to do so

a.

weakens database access security

b.

allows programmers access to make unauthorized changes to applications during execution

c.

results in inadequate documentation

d.

results in master files being inadvertently erased

ANS: B PTS: 1

8.Which organizational structure is most likely to result in good documentation procedures?

a.

separate systems development from systems maintenance

b.

separate systems analysis from application programming

c.

separate systems development from data processing

d.

separate database administrator from data processing

ANS: A PTS: 1

9.All of the following are control risks associated with the distributed data processing structure except

a.

lack of separation of duties

b.

system incompatibilities

c.

system interdependency

d.

lack of documentation standards

ANS: C PTS: 1

10.Which of the following is not an essential feature of a disaster recovery plan?

a.

off-site storage of backups

b.

computer services function

c.

second site backup

d.

critical applications identified

ANS: B PTS: 1

Be the first to review “Test Bank For Information Technology Auditing 4e James A Hall”