Exam 2: Auditing IT Governance Controls

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

To fulfill the segregation of duties control objective, computer processing functions (like authorization of credit and billing) are separated.

Free
(True/False)
4.7/5
(36)
Correct Answer:
Verified

False

Distributed data processing reduces the risk of operational inefficiencies.

Free
(True/False)
4.8/5
(40)
Correct Answer:
Verified

False

Adequate backups will protect against all of the following except

Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
Verified

B

List five risks associated with IT outsourcing.

(Short Answer)
4.8/5
(46)

Certain duties that are deemed incompatible in a manual system may be combined in a computer-based information system environment.

(True/False)
4.9/5
(32)

Which of the following is a feature of fault tolerance control?

(Multiple Choice)
4.8/5
(39)

All of the following are control risks associated with the distributed data processing structure except

(Multiple Choice)
4.8/5
(43)

List three pairs of system functions that should be separated in the centralized computer services organization. Describe a risk exposure if the functions are not separated. List three pairs of system functions that should be separated in the centralized computer services organization. Describe a risk exposure if the functions are not separated.

(Essay)
4.9/5
(34)

Which of the following disaster recovery techniques is has the least risk associated with it?

(Multiple Choice)
4.9/5
(37)

Specific IT assets support an organization's strategic objectives.

(True/False)
4.9/5
(36)

What problems may occur as a result of combining applications programming and maintenance tasks into one position?

(Essay)
4.8/5
(36)

Commodity IT assets easily acquired in the marketplace and should be outsourced under the core competency theory.

(True/False)
4.9/5
(41)

Explain the outsourcing risk of failure to perform.

(Essay)
4.8/5
(37)

The least important item to store off-site in case of an emergency is

(Multiple Choice)
4.9/5
(37)

Critical applications should be identified and prioritized by the user departments, accountants, and auditors.

(True/False)
4.8/5
(40)

A mutual aid is the lowest cost disaster recovery option, but has shown to be effective and low risk.

(True/False)
4.8/5
(31)

All of the following tests of controls will provide evidence about the adequacy of the disaster recovery plan except

(Multiple Choice)
4.8/5
(39)

Discuss the advantages and disadvantages of the second site backup options.

(Essay)
4.7/5
(36)

All of the following tests of controls will provide evidence about the physical security of the computer center except

(Multiple Choice)
5.0/5
(42)

Describe two tests that an auditor would perform to ensure that the disaster recovery plan is adequate.

(Essay)
5.0/5
(37)
Showing 1 - 20 of 91
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)