Information Technology Flashcards
What is an advantage of using generalized audit software packages for a client that has EDP
It allows an auditor to perform audit tests on clients computer files while having only a limited understanding of the client’s IT environment
What is a Hot site
It has a redundant hardware and software ALREADy configured and ready to go so you have continuity of your operations in the event of a disaster
What is the difference between a limit test and a validity test
Limit test - also called a reasonable test - designed to assure that all inputs are in an appropriate range of data ( example - someone can’t enter a birthdate that is before 1900) or enter a date like April 31st
A validity check - this is when data that has been input is compared to a list located permanently in the company. If they do not match the input amount is rejected
Validity and limit tests are both tests that ensure the accuracy of processing - therefore they are both processing controls
What is private key for encryption and what are its disadvantages
It a tiny bit of code that is used in asymmetric encryption used to transform an encrypted message into a readable format
one disadvantage is that both a sender and a receiver must have the key for it to work
Activity logs that indicate failed transactions provide information on what
They provide documentation about the existence of transactions that become part of the audit trail
Its an essential element of the audit trail in an EDI system
What is an integrated test facility and what does it allow you to do
You run fictitious transactions through a client’s system along with the client’s data to make certain that it is receiving the same treatment .
You can compare the actual results to the expected results.
What happens in a parallel simulation
This is when you run the client’s data through an auditor developed software packaged.
Auditor can then compare the results to see if the client’s system processed the data similarly
What is current or concurrency control and an example
This is a control that allows users to access limited resources on a first come - first serve basis and lock out all remaining once capacity has been filled
Example - Airline reservations. Passenger 1 - hits enter 2 seconds before passenger 2 locking 2 out of the last seat
What is a compensating control
this is a tat security measure that compensates for some other security measure that is deemed too difficult or impractical to implement
What is a data entry control?
A data entry control validates data
EDI
- Transactions are all uniformly formatted - using strict standards
- Still will use software maintenance agreement because will need to update the software periodically
- It is regulated by contract law - like all ordinary commerce
- If you use a VAN to do your EDI - value added network - the cost is higher than using the internet because a VAN is privately owned
What does a systems analyst do
They are responsible for the DESIGN of the system
- need to make sure there is adequate documentation so that if the system analyst leaves someone else can follow their work
What is a definition of cloud computing
t is a model that allows organizations to use the internet to access and use services on remote third-party technology infrastructure
what is virtualization
This is a model where several virtual servers run on one physical host.
It is used for rapid application deployment
What is a VPN
Virtual Private Network
Using a VPN you can access network resources from remote locations
What techniques are used to see if all data has been processed
record counts and hash totals
Why and how do you use redundant data checks
Redundant data checks compare datant from two or more files to determine if they match
This is to make sure the computer has read the data properly
How do you use check digit verification
This is one digit in a number that is created from a mathematical formula from other number in the field
It is used to identify inappropriate information in the field - lie a invalid product number
What is an input control and what are examples
An input control are computer controls designed to provide reasonable assurance that transactions are:
- properly authorized before being processed by the computer
- accurately converted before being recorded on the computer
- and that is they are inaccurate are rejected, or corrected
Example - Edit Check - this is used to test the validity of data entered into a program for processing
What is a mirrored web server
This is a complete duplicate of a computer system
- it can be put into service immediately
- it provides the best assurance of service continuity in the event of a natural disaster
Why do you use cryptocurrency - bitcoin
It allows customers to pay for goods or services from a website while maintaining financial privacy
It uses an intermediary so that you do not have to expose any sensitive or private credit or bank account information
What is a sight draft
A sight draft is a type of bill or exchange - the exporter holds the title of the goods transferred until the importer receives and pays for them
What are application controls
These are designed to ensure that an individual computer application or process performs properly
It is particular to a specific process or subsystem
What is a VAN and what does it do
Value added net work - it is privately owned
- it is a way to link different companies computer files together
- It routes datait transactions between trading partners
- It is more expensive that the plain internet because it is private
- its a private data communication system between business partners - because it is private - it is more secure