The reason for having controls in an IS environment:
A. remains unchanged from a manual environment, but the
implemented control features may be different.
B. changes from a manual environment, therefore the
implemented control features may be different.
C. changes from a manual environment, but the implemented
control features will be the same.
D. remains unchanged from a manual environment and the
implemented control features will also be the same.
Answers were Sorted based on User's Feedback
Answer / guest
Answer: A
The internal control objectives apply to all areas, whether
manual or automated. There are additional objectives to be
achieved in the IS environment, when compared to the manual
environment. Common control objectives remain unchanged in
both the IS environment and manual environment, although the
implementation of the control functions may be different in
the IS environment, e.g., the adequacy of backup/recovery in
a common internal control objective for IS and manual
environment. The specific IS control objective may be to
adequately back up the files to allow for proper recovery.
This may be achieved by implementing proper control
procedures, such as business continuity policy, in the IS
department. Therefore, the implementation of the control
functions may be different in the IS environment. But the
common control objectives in an IS environment remains
unchanged from a manual environment.
| Is This Answer Correct ? | 7 Yes | 0 No |
An IS auditor performing a telecommunication access control review should be concerned PRIMARILY with the: A. maintenance of access logs of usage of various system resources. B. authorization and authentication of the user prior to granting access to system resources. C. adequate protection of stored data on servers by encryption or other means. D. accountability system and the ability to identify any terminal accessing system resources.
In a TCP/IP-based network, an IP address specifies a: A. network connection. B. router/gateway. C. computer in the network. D. device on the network.
After installing a network, an organization installed a vulnerability assessment tool or security scanner to identify possible weaknesses. Which is the MOST serious risk associated with such tools? A. Differential reporting B. False positive reporting C. False negative reporting D. Less detail reporting
To share data in a multivendor network environment, it is essential to implement program-to-program communication. With respect to program-to-program communication features that can be implemented in this environment, which of the following makes implementation and maintenance difficult? A. User isolation B. Controlled remote access C. Transparent remote access D. The network environments
The risk that an IS auditor uses an inadequate test procedure and concludes that material errors do not exist when, in fact, they do, is an example of: A. inherent risk. B.control risk. C. detection risk. D. audit risk.
In an online transaction processing system, data integrity is maintained by ensuring that a transaction is either completed in its entirety or not at all. This principle of data integrity is known as: A. isolation. B. consistency. C. atomicity. D. durability.
A data administrator is responsible for: A. maintaining database system software. B. defining data elements, data names and their relationship. C. developing physical database structures. D. developing data dictionary system software.
Which of the following types of controls is designed to provide the ability to verify data and record values through the stages of application processing? A. Range checks B. Run-to-run totals C. Limit checks on calculated amounts D. Exception reports
Java applets and ActiveX controls are distributed executable programs that execute in the background of a web browser client. This practice is considered reasonable when: A. a firewall exists. B. a secure web connection is used. C. the source of the executable is certain. D. the host website is part of your organization.
Which of the following would be included in an IS strategic plan?
Utilizing audit software to compare the object code of two programs is an audit technique used to test program: A. logic. B. changes. C. efficiency. D. computations.
The FIRST step in data classification is to: A. establish ownership. B. perform a criticality analysis. C. define access rules. D. create a data dictionary.