Chapter 2 - Auditing IT Governance Controls: True/False
Chapter 2 - Auditing IT Governance Controls: True/False
TRUE/FALSE
1. To fulfill the segregation of duties control objective, computer processing functions (like
authorization of credit and billing) are separated.
ANS: F PTS: 1
2. To ensure sound internal control, program coding and program processing should be separated.
ANS: T PTS: 1
3. Some systems professionals have unrestricted access to the organization's programs and data.
ANS: T PTS: 1
ANS: T PTS: 1
5. Distributed data processing places the control IT recourses under end users.
ANS: T PTS: 1
6. An advantage of distributed data processing is that redundant tasks are greatly eliminated
ANS: F PTS: 1
7. Certain duties that are deemed incompatible in a manual system may be combined in a
computer-based information system environment.
ANS: T PTS: 1
8. To improve control and efficiency, the CBIS tasks of new systems development and program
maintenance should be performed by the same individual or group.
ANS: F PTS: 1
9. In a CBIS environment, data consolidation protects corporate data from computer fraud and
losses from disaster.
ANS: F PTS: 1
ANS: T PTS: 1
11. A disaster recovery plan is a comprehensive statement of all actions to be taken after a disaster.
ANS: T PTS: 1
12. RAID is the use of parallel disks that contain redundant elements of data and applications.
ANS: T PTS: 1
13. Transaction cost economics (TCE) theory suggests that firms should outsource specific
noncore IT assets
ANS: F PTS: 1
14. Commodity IT assets easily acquired in the marketplace and should be outsourced under the
core competency theory.
ANS: F PTS: 1
15. A database administrator is responsible for the receipt, storage, retrieval, and custody of data
files.
ANS: F PTS: 1
16. A ROC usually involves two or more user organizations that buy or lease a building and
remodel it into a computer site, but without the computer and peripheral equipment.
ANS: F PTS: 1
17. Fault tolerance is the ability of the system to continue operation when part of the system fails
due to hardware failure, application program error, or operator error.
ANS: T PTS: 1
ANS: T PTS: 1
ANS: T PTS: 1
ANS: T PTS: 1
ANS: F PTS: 1
22. An advantage of distributed data processing is that individual end user groups set specific IT
standards without concern for the broader corporate needs.
ANS: F PTS: 1
23. A mutual aid is the lowest cost disaster recovery option, but has shown to be effective and low
risk.
ANS: F PTS: 1
24. Critical applications should be identified and prioritized by the user departments, accountants,
and auditors.
ANS: T PTS: 1
ANS: T PTS: 1
MULTIPLE CHOICE
6. Which is the most critical segregation of duties in the centralized computer services function?
a. systems development from data processing
b. data operations from data librarian
c. data preparation from data control
d. data control from data librarian
ANS: A PTS: 1
9. All of the following are control risks associated with the distributed data processing structure
except
a. lack of separation of duties
b. system incompatibilities
c. system interdependency
d. lack of documentation standards
ANS: C PTS: 1
10. Which of the following is not an essential feature of a disaster recovery plan?
a. off-site storage of backups
b. computer services function
c. second site backup
d. critical applications identified
ANS: B PTS: 1
12. The major disadvantage of an empty shell solution as a second site backup is
a. the host site may be unwilling to disrupt its processing needs to process the critical
applications of the disaster stricken company
b. intense competition for shell resources during a widespread disaster
c. maintenance of excess hardware capacity
d. the control of the shell site is an administrative drain on the company
ANS: B PTS: 1
14. For most companies, which of the following is the least critical application for disaster recovery
purposes?
a. month-end adjustments
b. accounts receivable
c. accounts payable
d. order entry/billing
ANS: A PTS: 1
17. All of the following are recommended features of a fire protection system for a computer center
except
a. clearly marked exits
b. an elaborate water sprinkler system
c. manual fire extinguishers in strategic locations
d. automatic and manual alarms in strategic locations
ANS: B PTS: 1
18. All of the following tests of controls will provide evidence about the physical security of the
computer center except
a. review of fire marshal records
b. review of the test of the backup power supply
c. verification of the second site backup location
d. observation of procedures surrounding visitor access to the computer center
ANS: C PTS: 1
19. All of the following tests of controls will provide evidence about the adequacy of the disaster
recovery plan except
a. inspection of the second site backup
b. analysis of the fire detection system at the primary site
c. review of the critical applications list
d. composition of the disaster recovery team
ANS: B PTS: 1
ANS: C PTS: 1
21. The following are examples of specific assets except
a. application maintenance
b. data warehousing
c. highly skilled employees
d. server maintenance
ANS: D PTS: 1
ANS: B PTS: 1
ANS: D PTS: 1
ANS: A PTS: 1
ANS: C PTS: 1
ANS: A PTS: 1
ANS: B PTS: 1
28. Which of the following is NOT a control implication of distributed data processing?
a. redundancy
b. user satisfaction
c. incompatibility
d. lack of standards
ANS: B PTS: 1
29. Which of the following disaster recovery techniques may be least optimal in the case of a
disaster?
a. empty shell
b. mutual aid pact
c. internally provided backup
d. they are all equally beneficial
ANS: B PTS: 1
ANS: B PTS: 1
31. Which of the following disaster recovery techniques is has the least risk associated with it?
a. empty shell
b. ROC
c. internally provided backup
d. they are all equally risky
ANS: C PTS: 1
32. Which of the following is NOT a potential threat to computer hardware and peripherals?
a. low humidity
b. high humidity
c. carbon dioxide fire extinguishers
d. water sprinkler fire extinguishers
ANS: C PTS: 1
33. Which of the following would strengthen organizational control over a large-scale data
processing center?
a. Requiring the user departments to specify the general control standards necessary for
processing transactions.
b. Requiring that requests and instructions for data processing services be submitted
directly to the computer operator in the data center.
c. Having the database administrator report to the manager of computer operations.
d. Assigning maintenance responsibility to the original system designer who best knows its
logic.
ANS: A PTS: 1
ANS: B PTS: 1