1. What process uses test data as part of a comprehensive test of program controls in a continuous online manner?
A) Test data/deck B) Base-case system evaluation C) Integrated test facility (ITF) D) Parallel simulation
2. What control detects transmission errors by appending calculated bits onto the end of each segment of data?
A) Reasonableness check B) Parity check C) Redundancy check D) Check digits
3. Which of the following is the GREATEST risk when implementing a data warehouse?
A) increased response time on the production systems B) Access controls that are not adequate to prevent data modification C) Data duplication D) Data that is not updated or current
4. Which of the following will BEST ensure the successful offshore development of business applications?
A) Stringent contract management practices B) Detailed and correctly applied specifications C) Awareness of cultural and political differences D) Post implementation reviews
5. Which of the following is the GREATEST risk to the effectiveness of application system controls?
A) Removal of manual processing steps B) inadequate procedure manuals C) Collusion between employees D) Unresolved regulatory compliance issues
1. Right Answer: B Explanation: A base-case system evaluation uses test data sets developed as part of comprehensive testing programs, it is used to verify correct systems operations before acceptance, as well as periodic validation. Test data/deck simulates transactions through real programs. An ITF creates fictitious files in the database with test transactions processed simultaneously with live input. Parallel simulation is the production of data processed using computer programs that simulate application program logic.
2. Right Answer: C Explanation: A redundancy check detects transmission errors by appending calculated bits onto the end of each segment of data. A reasonableness check compares data to predefined reasonability limits or occurrence rates established for the data. A parity check is a hardware control that detects data errors when data are read from one computer to another, from memory or during transmission.Check digits detect transposition and transcription errors.
3. Right Answer: B Explanation: Once the data is in a warehouse, no modifications should be made to it and access controls should be in place to prevent data modification. Increased response time on the production systems is not a risk, because a data warehouse does not impact production data. Based on data replication, data duplication is inherent in a data warehouse. Transformation of data from operational systems to a data warehouse is done at predefined intervals, and as such, data may not be current.
4. Right Answer: B Explanation: When dealing with offshore operations, it is essential that detailed specifications be created. Language differences and a lack of interaction between developers and physically remote end users could create gaps in communication in which assumptions and modifications may not be adequately communicated. Contract management practices, cultural and political differences, and post implementation reviews, although important, are not as pivotal to the success of the project.
5. Right Answer: C Explanation: Collusion is an active attack that can be sustained and is difficult to identify since even well-thought-out application controls may be circumvented. The other choices do not impact well-designed application controls.
Leave a comment