Information System Audit
Information System Audit
6. Which is the most critical segregation of duties in the centralized computer services function?
a. systems development from data processing
b. data operations from data librarian
c. data preparation from data control
d. data control from data librarian
7. Systems development is separated from data processing activities because failure to do so
a. weakens database access security
b. allows programmers access to make unauthorized changes to applications during
execution
c. results in inadequate documentation
d. results in master files being inadvertently erased
10. Which of the following is not an essential feature of a disaster recovery plan?
a. off-site storage of backups
b. computer services function
c. second site backup
d. critical applications identified
12. The major disadvantage of an empty shell solution as a second site backup is
a. the host site may be unwilling to disrupt its processing needs to process the critical
applications of the disaster stricken company
b. recovery depends on the availability of necessary computer hardware
c. maintenance of excess hardware capacity
d. the control of the shell site is an administrative drain on the company
13. An advantage of a recovery operations center is that
a. this is an inexpensive solution
b. the initial recovery period is very quick
c. the company has sole control over the administration of the center
d. none of the above are advantages of the recovery operations center
14. For most companies, which of the following is the least critical application for disaster recovery
purposes?
a. month-end adjustments
b. accounts receivable
c. accounts payable
d. order entry/billing
16. Some companies separate systems analysis from programming/program maintenance. All of the
following are control weaknesses that may occur with this organizational structure except
a. systems documentation is inadequate because of pressures to begin coding a new program
before documenting the current program
b. illegal lines of code are hidden among legitimate code and a fraud is covered up for a long
period of time
c. a new systems analyst has difficulty in understanding the logic of the program
d. inadequate systems documentation is prepared because this provides a sense of job
security to the programmer
17. All of the following are recommended features of a fire protection system for a computer center
except
a. clearly marked exits
b. an elaborate water sprinkler system
c. manual fire extinguishers in strategic locations
d. automatic and manual alarms in strategic locations
18. All of the following tests of controls will provide evidence about the physical security of the computer
center except
a. review of fire marshal records
b. review of the test of the backup power supply
c. verification of the second site backup location
d. observation of procedures surrounding visitor access to the computer center
19. All of the following tests of controls will provide evidence about the adequacy of the disaster
recovery plan except
a. inspection of the second site backup
b. analysis of the fire detection system at the primary site
c. review of the critical applications list
d. composition of the disaster recovery team
28. Which of the following is NOT a control implication of distributed data processing?
a. redundancy
b. user satisfaction
c. incompatibility
d. lack of standards
29. Which of the following disaster recovery techniques may be least optimal in the case of a disaster?
a. empty shell
b. mutual aid pact
c. recovery operation center
d. they are all equally beneficial
31. Which of the following disaster recovery techniques is has the least risk associated with it?
a. empty shell
b. ROC
c. internally provided backup
d. they are all equally risky
ESSAY
1. Compare and contrast the following disaster recovery options: empty shell, recovery operations
center, and internally provided backup. Rank them from most risky to least risky, as well as
most costly to least costly.
The lowest cost method is internally provided backup. With this method, organizations with multiple
data processing centers may invest in internal excess capacity and support themselves in the case of
disaster in one data processing center. This method is not risky as the mutual aid pact because reliance
on another organization is not a factor. In terms of cost, the next highest method is the empty shell
where two or more organizations buy or lease space for a data processing center. The space is made
ready for computer installation; however, no computer equipment is installed. This method requires
lease or mortgage payments, as well as payment for air conditioning and raised floors. The risk of this
method is that the hardware, software, and technicians may be difficult if not impossible, to have
available in the case of a natural disaster. Further, if multiple members’ systems crash simultaneously,
an allocation problem exists. The method with lowest risk and also the highest cost is the recovery
operations center. This method takes the empty shell concept one step further-the computer equipment
is actually purchased and software may even be installed. Assuming that this site is far enough away
from the disaster stricken area not to be affected by the disaster, this method can be a very good
safeguard.