4 - IT Flashcards

IT concepts on BEC exam

1
Q

What are the 3 basic processes in a manual AIS?

A

1 - Journalize
2 - Post
3 - Summarize

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 3 basic processes in a automated AIS?

A

1 - Input
2 - Process
3 - Output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the 6 risks that are heightened in a computer based system?

A

1 - Reliance on faulty programs
2 - Unauthorized access to data
3 - Unauthorized changes to master files, programs
4 - Failure to make necessary changes to systems, programs
5 - Inappropriate manual intervention (management override)
6 - Loss of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Physical ______ _______ are substantially reduced in a computerized environment, particularly in online, real-time systems.

A

audit trails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

These are built into better accounting information system software and created by maintaining a file of all transactions processed by the system, to include the username of the person who processed the transaction.

A

Electronic audit trails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In a computerized environment, many functions that are normally separated as part of ___________ controls are combined to be processed at the same time.

A

segregation of duties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Computerized systems have uniform transaction processing, which results in an increase in processing consistency and decreases the chance for ________. `

A

clerical errors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In a computerized environment, there is an increased risk of ___________, or errors in programming logic.

A

systematic errors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Computerized systems can gain efficiency by automatically generating transactions when conditions occur, but these transactions should be ___________.

A

Regularly reported and reviewed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

One benefit of computerized systems is the potential for increased __________ review.

A

Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The ____________ framework is a widely used international standard for identifying best practices in IT security and control

A

COBIT (Control Objectives for Information and Related Technology)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

COBIT bridges the gap between strategic business requirement, __________, and the delivery of supporting IT.

A

accounting control needs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

COBIT facilitates ____________ and helps ensure the _______ of information and information systems

A

IT governance; integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The IT function is divided into these 4 domains:

A

1 - Planning and organization
2 - Acquisition and implementation
3 - Delivery and support
4 - Monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

This domain of the COBIT IT function establishes a strategic vision for IT and develops tactics to plan, communicate, and realize the strategic vision

A

Planning and organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

This domain is concerned with acquiring, implementing, and developing IT solutions to address business objectives and integrate with critical business processes

A

Acquisition and implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

This domain is concerned with delivering IT services, including operations, security, and training

A

Delivery and support

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

This domain is concerned with assessing IT quality and compliance with control requirements.

A

Monitoring

19
Q

The COBIT model identifies 4 interrelated monitoring processes:

A

1 - Monitor and evaluate IT performance
2 - Monitor and evaluate internal control
3 - Ensure regulatory compliance
4 - Provide IT Guidance

20
Q

To have value to an organization, data must have the following 7 attributes:

A
1-Effectiveness
2-Efficiency
3-Confidentiality
4-Integrity
5-Availability
6-Compliance
7-Reliability
21
Q

The five physical resources that comprise an IT system include:

A
1 - People
2 - Applications
3 - Technology
4 - Facilities
5 - Data
22
Q

These systems provide transaction processing, management support, and decision making support in a single, integrated, organization-wide package.

A

Enterprise resource planning systems (also known as enterprise-wide systems

23
Q

What are the 4 goals of an ERP system?

A

1 - Global (organization wide) visibility
2 - Cost reductions
3 - Employee empowerment
4 - “Best practices”

24
Q

In __________, a virtual data pool is created by contracting with a third-party data storage provider.

A

Cloud-based system

25
What are the 6 benefits of cloud-based systems:
``` 1 - Universal access 2 - Cost reductions 3 - Scalability 4 - Outsourcing and economies of scale 5 - Enterprise-wide integration 6 - Deployment speed ```
26
What are the 5 primary risks with cloud-based systems?
1 - Risk of data loss and outages 2 - Increased risk of system penetration by hackers 3 - Reliance on CSP competence, professionalism, and reliability. 4 - Data stored on community clouds may be vulnerable to other tenants 5 - Storing data with a high profile provide can make a company a high-profile target for cyber-attackers
27
The _________ is responsible for the efficient and effective functions of existing systems and for planning for the development and technical resources for future systems
Chief Information Officer (aka VP of IT, etc.)
28
What are the 3 main functional areas of an IT department:
1 - Application development 2 - Systems administration and programming 3 - Computer operations
29
This functional area is responsible for creating new end-user applications and maintaining existing applications.
Application development
30
These people are responsible for analyzing and designing computer systems; lead teams of programmers, and work with end-users to define problems and ID solutions.
Systems analyst
31
These people work under the systems analyst and write the actual programs that process data and produce reports
Applications programmers
32
New program development is completed in a _________ environment using copies of live data and existing programs.
test or "sandbox"
33
This department maintains the computer hardware and infrastructure and works to grant access to system resources
Systems administration and programming
34
Responsible for the management activities of systems they control
System administrators (could be web admin, network admin, database admin, etc.)
35
These people are responsible for maintaining the various operating systems and related hardware. They also update the system and install new hardware.
System programmers
36
The ___________ ensures that all applicable devices link to the organization's network and that the networks operate securely and continuously.
Network managers.
37
Ensures that all components of the system are protected from all internal or external threats
Security management
38
This department is responsible for the day-to-day operations of the computer system.
Computer operations
39
Computer operators and data entry personnel should never be allowed to act as ________.
Programmers
40
Systems programmers should never have access to _________.
application program documentation
41
Data administrators should not have access to ______.
computer operations, live data
42
Application programmers and systems analysts should never have access to _________
computer operations, live data
43
Application programmers and systems analysts should not ____________..
Control access to computer resources.