Chapter 2 Auditing IT Governance Controls
Chapter 2 Auditing IT Governance Controls
Chapter 2 Auditing IT Governance Controls
1. To fulfill the segregation of duties control objective, computer processing functions (like authorization of
credit and billing) are separated.
ANS: F PTS: 1
2. To ensure sound internal control, program coding and program processing should be separated.
ANS: T PTS: 1
3. Some systems professionals have unrestricted access to the organization's programs and data.
ANS: T PTS: 1
ANS: T PTS: 1
5. Distributed data processing places the control IT recourses under end users.
ANS: T PTS: 1
6. An advantage of distributed data processing is that redundant tasks are greatly eliminated
ANS: F PTS: 1
7. Certain duties that are deemed incompatible in a manual system may be combined in a computer-based
information system environment.
ANS: T PTS: 1
8. To improve control and efficiency, new systems development and program maintenance should be
performed by the same individual or group.
ANS: F PTS: 1
ANS: F PTS: 1
ANS: T PTS: 1
A disaster recovery plan is a comprehensive statement of all actions to be taken after a disaster.
ANS: T PTS: 1
12. RAID is the use of parallel disks that contain redundant elements of data and applications.
ANS: T PTS: 1
13. Transaction cost economics (TCE) theory suggests that firms should outsource specific noncore IT
assets
ANS: F PTS: 1
14. Commodity IT assets easily acquired in the marketplace and should be outsourced under the core
competency theory.
ANS: F PTS: 1
15. A database administrator is responsible for the receipt, storage, retrieval, and custody of data files.
ANS: F PTS: 1
ANS: T PTS: 1
17. Fault tolerance is the ability of the system to continue operation when part of the system fails due to
hardware failure, application program error, or operator error.
ANS: T PTS: 1
ANS: T PTS: 1
ANS: T PTS: 1
ANS: T PTS: 1
ANS: F PTS: 1
An advantage of distributed data processing is that individual end user groups set specific IT standards
without concern for the broader corporate needs.
ANS: F PTS: 1
23. A mutual aid is the lowest cost disaster recovery option, but has shown to be effective and low risk.
ANS: F PTS: 1
24. Critical applications should be identified and prioritized by the user departments, accountants, and
auditors.
ANS: T PTS: 1
ANS: T PTS: 1
MULTIPLE CHOICE
9. All of the following are control risks associated with the distributed data processing structure except
a. lack of separation of duties
b. system incompatibilities
c. system interdependency
d. lack of documentation standards
ANS: C PTS: 1
12. The major disadvantage of an empty shell solution as a second site backup is
a. the host site may be unwilling to disrupt its processing needs to process the critical
applications of the disaster stricken company
b. recovery depends on the availability of necessary computer hardware
c. maintenance of excess hardware capacity
d. the control of the shell site is an administrative drain on the company
ANS: B PTS: 1
14. For most companies, which of the following is the least critical application for disaster recovery
purposes?
a. month-end adjustments
b. accounts receivable
c. accounts payable
d. order entry/billing
ANS: A PTS: 1