Podcast
Questions and Answers
What are the roles of internal auditors in change management? (Select all that apply)
What are the roles of internal auditors in change management? (Select all that apply)
Which of the following are internal audit engagements associated with systems and application development? (Select all that apply)
Which of the following are internal audit engagements associated with systems and application development? (Select all that apply)
Rapid Application Development (RAD) typically involves creating a working model of the system, demonstrating it, obtaining feedback, and making changes iteratively until user satisfaction is achieved.
Rapid Application Development (RAD) typically involves creating a working model of the system, demonstrating it, obtaining feedback, and making changes iteratively until user satisfaction is achieved.
True
Computer-aided software engineering (CASE) focuses on manual documentation of system designs.
Computer-aided software engineering (CASE) focuses on manual documentation of system designs.
Signup and view all the answers
What are some potential risks associated with end-user computing (EUC)? (Select all that apply)
What are some potential risks associated with end-user computing (EUC)? (Select all that apply)
Signup and view all the answers
Which of the following challenges are associated with end-user application development? (Select all that apply)
Which of the following challenges are associated with end-user application development? (Select all that apply)
Signup and view all the answers
What are organizational levels of responsibility for control of end-user computing (EUC)? (Select all that apply)
What are organizational levels of responsibility for control of end-user computing (EUC)? (Select all that apply)
Signup and view all the answers
What is the primary function of systems software?
What is the primary function of systems software?
Signup and view all the answers
What is the purpose of an operating system?
What is the purpose of an operating system?
Signup and view all the answers
Which of the following are controls over operating systems? (Select all that apply)
Which of the following are controls over operating systems? (Select all that apply)
Signup and view all the answers
What is the role of internal auditors in reviewing controls over operating systems?
What is the role of internal auditors in reviewing controls over operating systems?
Signup and view all the answers
What is a computer program?
What is a computer program?
Signup and view all the answers
Utility programs are sometimes considered privileged software because they can potentially access sensitive data or system configurations.
Utility programs are sometimes considered privileged software because they can potentially access sensitive data or system configurations.
Signup and view all the answers
What are some examples of basic data maintenance tasks performed by utility programs? (Select all that apply)
What are some examples of basic data maintenance tasks performed by utility programs? (Select all that apply)
Signup and view all the answers
It is essential to encrypt passwords before storing them in a file to safeguard against unauthorized access.
It is essential to encrypt passwords before storing them in a file to safeguard against unauthorized access.
Signup and view all the answers
Access to utility programs should be restricted to authorized personnel.
Access to utility programs should be restricted to authorized personnel.
Signup and view all the answers
What is a graphical user interface (GUI)?
What is a graphical user interface (GUI)?
Signup and view all the answers
How does a GUI simplify data transfer between applications?
How does a GUI simplify data transfer between applications?
Signup and view all the answers
What is optical character recognition (OCR)?
What is optical character recognition (OCR)?
Signup and view all the answers
What are the two main components of networks? (Select all that apply)
What are the two main components of networks? (Select all that apply)
Signup and view all the answers
What is a network interface card (NIC)?
What is a network interface card (NIC)?
Signup and view all the answers
What is a local area network (LAN)?
What is a local area network (LAN)?
Signup and view all the answers
What is a peer-to-peer network?
What is a peer-to-peer network?
Signup and view all the answers
Peer-to-peer networks become easier to manage as more devices are added.
Peer-to-peer networks become easier to manage as more devices are added.
Signup and view all the answers
Describe the client-server network model.
Describe the client-server network model.
Signup and view all the answers
Which of the following are examples of servers in a client-server network? (Select all that apply)
Which of the following are examples of servers in a client-server network? (Select all that apply)
Signup and view all the answers
What is the key advantage of the client-server model?
What is the key advantage of the client-server model?
Signup and view all the answers
Client-server systems often have specialized equipment from multiple vendors.
Client-server systems often have specialized equipment from multiple vendors.
Signup and view all the answers
What are the primary benefits of using cloud computing? (Select all that apply)
What are the primary benefits of using cloud computing? (Select all that apply)
Signup and view all the answers
Cloud computing poses no security risks.
Cloud computing poses no security risks.
Signup and view all the answers
What are the three primary types of cloud services? (Select all that apply)
What are the three primary types of cloud services? (Select all that apply)
Signup and view all the answers
The rise of smartphones and tablets has had no impact on cloud computing.
The rise of smartphones and tablets has had no impact on cloud computing.
Signup and view all the answers
What is the role of a network administrator?
What is the role of a network administrator?
Signup and view all the answers
What are the responsibilities of a system administrator?
What are the responsibilities of a system administrator?
Signup and view all the answers
System administrator responsibilities never overlap with network administrator responsibilities.
System administrator responsibilities never overlap with network administrator responsibilities.
Signup and view all the answers
What is a protocol? (Select all that apply)
What is a protocol? (Select all that apply)
Signup and view all the answers
What is the most successful protocol for LAN transmission?
What is the most successful protocol for LAN transmission?
Signup and view all the answers
The Ethernet protocol uses a collision-detection method for communication.
The Ethernet protocol uses a collision-detection method for communication.
Signup and view all the answers
What is the main advantage of a switched network? (Hint: Consider the limitations of a LAN with numerous users)
What is the main advantage of a switched network? (Hint: Consider the limitations of a LAN with numerous users)
Signup and view all the answers
What is a router, and how does it work?
What is a router, and how does it work?
Signup and view all the answers
What is the purpose of TCP/IP?
What is the purpose of TCP/IP?
Signup and view all the answers
Dynamic Host Configuration Protocol (DHCP) helps ensure that each device on a network has a unique IP address.
Dynamic Host Configuration Protocol (DHCP) helps ensure that each device on a network has a unique IP address.
Signup and view all the answers
What is a Wi-Fi network, and what are its key features?
What is a Wi-Fi network, and what are its key features?
Signup and view all the answers
Bluetooth operates over a larger range than Wi-Fi.
Bluetooth operates over a larger range than Wi-Fi.
Signup and view all the answers
What are some common applications of RFID technology? (Select all that apply)
What are some common applications of RFID technology? (Select all that apply)
Signup and view all the answers
Describe the bus network topology and its strengths and weaknesses.
Describe the bus network topology and its strengths and weaknesses.
Signup and view all the answers
Shareware is a type of software that is always free of charge.
Shareware is a type of software that is always free of charge.
Signup and view all the answers
What is the main purpose of a software licensing agreement?
What is the main purpose of a software licensing agreement?
Signup and view all the answers
What measures should be taken to avoid legal liability related to the use of unlicensed software?
What measures should be taken to avoid legal liability related to the use of unlicensed software?
Signup and view all the answers
What is the purpose of a diskless workstation?
What is the purpose of a diskless workstation?
Signup and view all the answers
What are the primary benefits of using electronic software distribution (ESD)?
What are the primary benefits of using electronic software distribution (ESD)?
Signup and view all the answers
What is a management information system (MIS)?
What is a management information system (MIS)?
Signup and view all the answers
What are the key functions of an accounting information system (AIS)?
What are the key functions of an accounting information system (AIS)?
Signup and view all the answers
An enterprise resource planning (ERP) system is the most comprehensive integrated system.
An enterprise resource planning (ERP) system is the most comprehensive integrated system.
Signup and view all the answers
Study Notes
Internal Auditors and Change Management
- Internal auditors assist in change management by understanding the organization's IT objectives.
- They assist in identifying risks to IT objectives.
- Auditors assess whether risks are aligned with the organization's risk appetite and tolerances.
- They assist in deciding the appropriate risk management response (e.g., avoid, accept, reduce, or share).
- Internal auditors understand the controls used to manage risks and carry out risk responses.
- They promote a culture of effective change management.
Internal Audit Engagements
- Internal audit engagements associated with systems and application development include access control reviews, application control reviews, source code reviews, system design reviews, and post-implementation reviews.
- An access control review evaluates whether controls effectively prevent and detect unauthorized access.
- An application control review evaluates whether application controls effectively manage related risks.
- A source code review evaluates whether the program's source code is effectively managed and controlled.
- A system design review evaluates whether the system to be developed meets business requirements.
- A post-implementation review evaluates whether the system or application meets expectations.
Rapid Application Development (RAD)
- Rapid application development (RAD) enables programmers to develop software with minimal planning and without beginning from scratch.
- Prototyping is an alternative approach to application development that involves creating a working model, demonstrating it to the user, obtaining feedback, and making changes to the underlying code.
- This process repeats until the user is satisfied with the system's functionality.
- Computer-aided software engineering (CASE) is another form of RAD.
- CASE applies the computer to software design and development.
- CASE maintains system documentation like data flow diagrams, data dictionaries, and pseudocode.
- It develops executable input and output screens and generates program code.
End-User vs. Centralized Computing
- End-user computing (EUC) involves user-created or user-acquired systems maintained outside of traditional information systems controls.
- EUC has environmental control risks like copyright violations from unauthorized copies of software or unauthorized access to application programs and related data.
- EUC lacks physical access controls, application-level controls, and other controls found in mainframe or networked environments.
- EUC may lack adequate backup, recovery, and contingency planning.
Program Development
- Program development, documentation, and maintenance can lack centralized control.
- Allowing end-users to develop their own applications may decentralize control.
- These applications may not be subject to appropriate standards, controls, and quality assurance procedures.
- End-user applications may not receive independent testing or adequate documentation.
- Segregation of duties may be insufficient if the same person performs programmer and operator functions.
- End-user applications often do not follow a structured and controlled development life cycle.
- User needs analysis may be insufficient when user and analyst functions are combined.
IT Infrastructure - Functional Areas of IT Operations
- Controls should ensure efficiency and effectiveness of IT operations.
- Control includes appropriate segregation of duties: systems analysts, programmers, operators, file librarians, and the control group.
- Segregation of duties is vital, but may not be feasible in an IT environment.
- Certain activities, like computer check printing and reconciliation, are customarily segregated in manual systems, but may co-exist in an IT environment.
- Compensating controls may be necessary in IT environments such as library controls, computer logs, effective supervision, and rotation of personnel.
IT Infrastructure - Web Infrastructure
- The Internet is a network of networks.
- A network is a collection of hardware devices interconnected for communication and data sharing.
- Internet facilitates inexpensive communication and information transfer among computers.
- Gateways allow mainframe computers to interface with personal computers.
- Internet backbones carry signals globally.
- Web-crawlers (spiders or bots) access and read webpage information.
- Internet users connect through Internet Service Providers (ISPs).
- Internet topology is complex, resembling a network rather than a simple spine.
- The Internet consists of servers (holding information), clients (viewing information), and the TCP/IP protocol suite for connectivity.
- A gateway allows communication between dissimilar networks.
- A bridge connects similar networks.
IT Infrastructure - Increasing Decentralization
- Improvements in technology have led to the decentralization of information processing.
- Mainframe computers were the primary arrangement in early data processing.
- Distributed processing arose as minicomputers evolved, decentralizing processing and data storage.
- Remote locations have processing units linked to a central server.
- This distributes processing tasks.
- Data needed locally can reside locally, reducing communications traffic.
IT Infrastructure - Servers
- A server is a dedicated computer/device managing resources.
- File servers function as librarians in a network.
- Web servers host websites.
- Enterprise servers handle organization-wide programs.
- Centrally located data might be subject to unauthorized changes without proper documentation or user awareness.
- Staff may not know when data needs to be updated.
IT Infrastructure - Languages and Protocols
- Tim Berners-Lee developed Hypertext Markup Language (HTML) and Hypertext Transfer Protocol (HTTP).
- HTML uses codes (tags) to describe web page structure and presentation.
- XML is an extensible variation of HTML, using tags to define data content.
- XML tags allow for computer interpretation of data content.
- HTML formatting describes how items are arranged on a page while XML tags define the content itself.
IT Infrastructure - Uses
- Locating specific information from numerous Internet resources is a common challenge.
- An organization's site on the Web is its website.
- Websites are composed of a home page and subsidiary pages.
- Every resource on the Web has a Uniform Resource Locator (URL), a unique address.
- Some URLs may not be accessible to every user due to security features.
- Domain names are used in URLs, with suffixes like .gov or .com reflecting different categories.
- Cookies are small text files used to recognize users and track preferences on websites.
- An intranet uses Internet connectivity standards within an organization.
- Intranets often restrict access to those within the organization except with identification.
- An extranet links the intranets of multiple organizations, often using the public Internet with passwords.
IT Infrastructure - Cloud Computing
- Cloud computing provides on-demand access to resources on the Internet.
- Cloud computing offers advantages, such as fast access to software, reduced IT infrastructure investment, and pay-as-you-go services.
- Security concerns can arise with the convenience and ease of access in cloud computing.
- Cloud services are categorized as Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), and Software-as-a-Service (SaaS).
IT Infrastructure - Software Systems
- Management Information Systems (MIS) receive input from Transaction Processing Systems (TPS), aggregating it to provide reports to mid-level managers.
- MIS are categorized by functions like Accounting (general ledger, accounts receivables), Finance (capital budgeting), Manufacturing (production planning), Logistics (inventory management), Marketing (sales analysis).
- Integrated systems, like Enterprise Resource Planning (ERP) systems, link multiple business activities across the entire enterprise.
- Accounting Information Systems (AIS) process routine financial and transactional data for managerial and financial accounting.
- AIS processes data for transactions with external parties and internal activities like cost accounting.
IT Infrastructure - Systems Software
- Systems software manages computer resources, with the operating system being a central component.
- Operating systems coordinate computer actions, including peripherals and memory.
- Controls over operating systems are crucial because they can affect the database.
- Controls include segregation of duties, testing procedures, and log maintenance.
- Utility programs perform common data maintenance tasks, such as sorting and merging data, copying or deleting files.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
This quiz explores the vital role of internal auditors in change management within organizations. It covers how auditors assess risks related to IT objectives and determine appropriate risk management responses. Additionally, it delves into engagement processes involved in system and application development.