Why Choose Us?
0% AI Guarantee
Human-written only.
24/7 Support
Anytime, anywhere.
Plagiarism Free
100% Original.
Expert Tutors
Masters & PhDs.
100% Confidential
Your privacy matters.
On-Time Delivery
Never miss a deadline.
Harvard University AUDIT 111 Chapter 2-Auditing IT Governance Controls TRUE/FALSE 1)To fulfill the segregation of duties control objective, computer processing functions (like authorization of credit and billing) are separated
Harvard University
AUDIT 111
Chapter 2-Auditing IT Governance Controls
TRUE/FALSE
1)To fulfill the segregation of duties control objective, computer processing functions (like authorization of credit and billing) are separated.
- To ensure sound internal control, program coding and program processing should be separated.
- Some systems professionals have unrestricted access to the organization's programs and data.
- 44IT governance focuses on the management and assessment of strategic IT resources
- Distributed data processing places the control IT recourses under end users.
- An advantage of distributed data processing is that redundant tasks are greatly eliminated
- Certain duties that are deemed incompatible in a manual system may be combined in a computer-based information system environment.
- To improve control and efficiency, the CBIS tasks of new systems development and program maintenance should be performed by the same individual or group.
- In a CBIS environment, data consolidation protects corporate data from computer fraud and losses from disaster.
- The database administrator should be separated from systems development.
- A disaster recovery plan is a comprehensive statement of all actions to be taken after a
disaster.
- RAID is the use of parallel disks that contain redundant elements of data and applications.
- Transaction cost economics (TCE) theory suggests that firms should outsource specific noncore IT assets
- Commodity IT assets easily acquired in the marketplace and should be outsourced under the core competency theory.
- A database administrator is responsible for the receipt, storage, retrieval, and custody of data files.
- A ROC usually involves two or more user organizations that buy or lease a building and remodel it into a computer site, but without the computer and peripheral equipment.
- Fault tolerance is the ability of the system to continue operation when part of the system fails due to hardware failure, application program error, or operator error.
- An often-cited benefit of IT outsourcing is improved core business performance.
- Commodity IT assets include such things are network management.
- Specific IT assets support an organization’s strategic objectives.
- A generally accepted advantage of IT outsourcing is improved security.
- An advantage of distributed data processing is that individual end user groups set specific IT standards without concern for the broader corporate needs.
- A mutual aid is the lowest cost disaster recovery option, but has shown to be effective and low risk.
- Critical applications should be identified and prioritized by the user departments, accountants, and auditors.
- A widespread natural disaster is a risk associated with a ROC.
MULTIPLE CHOICE
- All of the following are issues of computer security except
|
a. |
releasing incorrect data to authorized individuals |
|
b. |
permitting computer operators unlimited access to the computer room |
|
c. |
permitting access to data by unauthorized individuals |
|
d. |
providing correct data to unauthorized individuals |
- Segregation of duties in the computer-based information system includes
|
a. |
separating the programmer from the computer operator |
|
b. |
preventing management override |
|
c. |
separating the inventory process from the billing process |
|
d. |
performing independent verifications by the computer operator |
- In a computer-based information system, which of the following duties needs to be separated?
|
a. |
program coding from program operations |
|
b. |
program operations from program maintenance |
|
c. |
program maintenance from program coding |
|
d. |
all of the above duties should be separated |
- Supervision in a computerized environment is more complex than in a manual environment for all of the following reasons except
|
a. |
rapid turnover of systems professionals complicates management's task of assessing the competence and honesty of prospective employees |
|
b. |
many systems professionals have direct and unrestricted access to the organization's programs and data |
|
c. |
rapid changes in technology make staffing the systems environment challenging |
|
d. |
systems professionals and their supervisors work at the same physical location |
- Adequate backups will protect against all of the following except
|
a. |
natural disasters such as fires |
|
b. |
unauthorized access |
|
c. |
data corruption caused by program errors |
|
d. |
system crashes |
- Which is the most critical segregation of duties in the centralized computer services function?
|
a. |
systems development from data processing |
|
b. |
data operations from data librarian |
|
c. |
data preparation from data control |
|
d. |
data control from data librarian |
- Systems development is separated from data processing activities because failure to do
so
|
a. |
weakens database access security |
|
b. |
allows programmers access to make unauthorized changes to applications during execution |
|
c. |
results in inadequate documentation |
|
d. |
results in master files being inadvertently erased |
- Which organizational structure is most likely to result in good documentation procedures?
|
a. |
separate systems development from systems maintenance |
|
b. |
separate systems analysis from application programming |
|
c. |
separate systems development from data processing |
|
d. |
separate database administrator from data processing |
- All of the following are control risks associated with the distributed data processing structure except
|
a. |
lack of separation of duties |
|
b. |
system incompatibilities |
|
c. |
system interdependency |
|
d. |
lack of documentation standards |
- Which of the following is not an essential feature of a disaster recovery plan?
|
a. |
off-site storage of backups |
|
b. |
computer services function |
|
c. |
second site backup |
|
d. |
critical applications identified |
- A cold site backup approach is also known as
|
a. |
internally provided backup |
|
b. |
recovery operations center |
|
c. |
empty shell |
|
d. |
mutual aid pact |
- The major disadvantage of an empty shell solution as a second site backup is
|
a. |
the host site may be unwilling to disrupt its processing needs to process the critical applications of the disaster stricken company |
|
b. |
intense competition for shell resources during a widespread disaster |
|
c. |
maintenance of excess hardware capacity |
|
d. |
the control of the shell site is an administrative drain on the company |
- An advantage of a recovery operations center is that
|
a. |
this is an inexpensive solution |
|
b. |
the initial recovery period is very quick |
|
c. |
the company has sole control over the administration of the center |
|
d. |
none of the above are advantages of the recovery operations center |
- For most companies, which of the following is the least critical application for disaster recovery purposes?
|
a. |
month-end adjustments |
|
b. |
accounts receivable |
|
c. |
accounts payable |
|
d. |
order entry/billing |
- The least important item to store off-site in case of an emergency is
|
a. |
backups of systems software |
|
b. |
backups of application software |
|
c. |
documentation and blank forms |
|
d. |
results of the latest test of the disaster recovery program |
- Some companies separate systems analysis from programming/program maintenance. All of the following are control weaknesses that may occur with this organizational structure except
|
a. |
systems documentation is inadequate because of pressures to begin coding a new program before documenting the current program |
|
b. |
illegal lines of code are hidden among legitimate code and a fraud is covered up for a long period of time |
|
c. |
a new systems analyst has difficulty in understanding the logic of the program |
|
d. |
inadequate systems documentation is prepared because this provides a sense of job security to the programmer |
- All of the following are recommended features of a fire protection system for a computer center except
|
a. |
clearly marked exits |
|
b. |
an elaborate water sprinkler system |
|
c. |
manual fire extinguishers in strategic locations |
|
d. |
automatic and manual alarms in strategic locations |
- All of the following tests of controls will provide evidence about the physical security of the computer center except
|
a. |
review of fire marshal records |
|
b. |
review of the test of the backup power supply |
|
c. |
verification of the second site backup location |
|
d. |
observation of procedures surrounding visitor access to the computer center |
- All of the following tests of controls will provide evidence about the adequacy of the disaster recovery plan except
|
a. |
inspection of the second site backup |
|
b. |
analysis of the fire detection system at the primary site |
|
c. |
review of the critical applications list |
|
d. |
composition of the disaster recovery team |
- The following are examples of commodity assets except
|
a. |
network management |
|
b. |
systems operations |
|
c. |
systems development |
|
d. |
server maintenance |
- The following are examples of specific assets except
- application maintenance
- data warehousing
- highly skilled employees
- server maintenance
- Which of the following is true?
-
- Core competency theory argues that an organization should outsource specific core assets.
- Core competency theory argues that an organization should focus exclusively on its core business competencies
- Core competency theory argues that an organization should not outsource specific commodity assets.
- Core competency theory argues that an organization should retain certain specific noncore assets in-house.
-
- Which of the following is not true?
- Large-scale IT outsourcing involves transferring specific assets to a vendor
- Specific assets, while valuable to the client, are of little value to the vendor
- Once an organization outsources its specific assets, it may not be able to return to its pre-outsource state.
- Specific assets are of value to vendors because, once acquired, vendors can achieve economies of scale by employing them with other clients
- Which of the following is not true?
- When management outsources their organization’s IT functions, they also outsource responsibility for internal control.
- Once a client firm has outsourced specific IT assets, its performance becomes linked to the vendor’s performance.
- IT outsourcing may affect incongruence between a firm’s IT strategic planning and its business planning functions.
- The financial justification for IT outsourcing depends upon the vendor achieving economies of scale.
- Which of the following is not true?
-
- Management may outsource their organizations’ IT functions, but they cannot outsource their management responsibilities for internal control.
- section 404 requires the explicit testing of outsourced controls.
- The SAS 70 report, which is prepared by the outsourcer’s auditor, attests to the adequacy of the vendor’s internal controls.
- Auditors issue two types of SAS 70 reports: SAS 70 Type I report and SAS 70 Type II report.
-
- Segregation of duties in the computer-based information system includes
|
a. |
separating the programmer from the computer operator |
|
b. |
preventing management override |
|
c. |
separating the inventory process from the billing process |
|
d. |
performing independent verifications by the computer operator |
- A disadvantage of distributed data processing is
-
- the increased time between job request and job completion.
- the potential for hardware and software incompatibility among users.
-
-
-
- the disruption caused when the mainframe goes down.
- that users are not likely to be involved.
-
- Which of the following is NOT a control implication of distributed data processing?
-
- redundancy
- user satisfaction
- incompatibility
- lack of standards
-
- Which of the following disaster recovery techniques may be least optimal in the case of a disaster?
-
- empty shell
- mutual aid pact
- internally provided backup
- they are all equally beneficial
-
- Which of the following is a feature of fault tolerance control?
-
- interruptible power supplies
- RAID
- DDP
- MDP
-
- Which of the following disaster recovery techniques is has the least risk associated with it?
-
- empty shell
- ROC
- internally provided backup
- they are all equally risky
-
- Which of the following is NOT a potential threat to computer hardware and peripherals?
-
- low humidity
- high humidity
- carbon dioxide fire extinguishers
- water sprinkler fire extinguishers
-
- Which of the following would strengthen organizational control over a large- scale data processing center?
- Requiring the user departments to specify the general control standards necessary for process- ing transactions.
- Requiring that requests and instructions for data processing services be submitted directly to the computer operator in the data center.
- Having the database administrator report to the manager of computer operations.
- Assigning maintenance responsibility to the original system designer who best knows its logic.
- Which of the following is true?
- Core competency theory argues that an organization should outsource specific core assets.
- Core competency theory argues that an organization should focus exclusively on its core business competencies
- Core competency theory argues that an organization should not outsource specific commodity assets.
- Core competency theory argues that an organization should retain certain specific non-core assets in-house.
SHORT ANSWER
- Explain why certain duties that are deemed incompatible in a manual system may be combined in a CBIS computer based information system environment. Give an example.
- What are the three primary CBIS functions that must be separated?
- What exposures do data consolidation in a CBIS environment pose?
- What problems may occur as a result of combining applications programming and maintenance tasks into one position?
5.. Why is poor-quality systems documentation a prevalent problem?
- What is RAID?
- What primary IT functions must be separated in a centralized firm?
- List three pairs of system functions that should be separated in the centralized computer services organization. Describe a risk exposure if the functions are not separated.
|
Functions to Separate |
Risk Exposure |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
- For disaster recovery purposes, what criteria are used to identify an application or data as critical?
- Describe the components of a disaster recovery plan.
- What is a mirrored data center?
- What is a recovery operations center? What is its purpose?
- Why is inadequate documentation a chronic problem?
- The distributed data processing approach carries some control implications of which accountants should be aware. Discuss two.
- Describe two tests that an auditor would perform to ensure that the disaster recovery plan is adequate.
- What is an auditor looking for when testing computer center controls?
- What is IT Governance?
- Why should the tasks of systems development and maintenance be segregated from operations?
- Why should new systems development activities be segregated from the program change (maintenance) function.
- Briefly explain the core-competency theory.
- What are commodity IT assets?
- Briefly outline transaction cost economics as it relates to IT outsourcing.
- Briefly explain how a SAS 70 report is used in assessing internal controls of outsourced facilities.
- What are the often cited benefits of IT outsourcing?
- Define specific asset.
- List five risks associated with IT outsourcing.
- What are the objectives of IT Governance?
ESSAY
-
- Describe how a Corporate Computer Services Function can overcome some of the problems associated with distributed data processing.
-
- Discuss the advantages and disadvantages of the second site backup options.
-
- Auditors examine the physical environment of the computer center as part of their audit. Many characteristics of computer centers are of interest to auditors. What are they? Discuss.
-
- Explain why certain duties that are deemed incompatible in a manual system may be combined in an automated environment? Give an example.
-
- Compare and contrast the following disaster recovery options: empty shell, recovery operations center, and internally provided backup. Rank them from most risky to least risky, as well as most costly to least costly.
-
- What is a disaster recovery plan? What are the key features?
-
- Explain the outsourcing risk of failure to perform.
-
- Explain vendor exploitation.
-
- Explain why reduced security is an outsourcing risk.
.
-
- Explain how IT outsourcing can lead to loss of strategic advantage.
-
- Explain the role of a SAS 70 report in reviewing internal controls.
-
- How has the Sarbanes-Oxley Act had a significant impact on corporate governance?
-
- How is pre SOX IT governance different from post SOX IT governance?
-
- Although IT governance is a broad area, only three of them are discussed in the chapter. Name them and explain why these topics were chosen.
- organizational structure of the IT function,
- computer center operations, and
- disaster recovery planning.
Expert Solution
PFA
Archived Solution
You have full access to this solution. To save a copy with all formatting and attachments, use the button below.
For ready-to-submit work, please order a fresh solution below.





