Auditing Infrastructure and Operations MCQs – CISA

Share on facebook
Share on twitter
Share on linkedin
Share on pinterest
Share on reddit
Share on whatsapp

SHARE THIS

The review of the capacity management procedures for hardware and performance evaluation procedures is performed to determine whether they will ensure
Auditing Infrastructure and Operations MCQs

Auditing Infrastructure and Operations MCQs

The review of the capacity management procedures for hardware and performance evaluation procedures is performed to determine whether they will ensure continuous review of hardware and system software performance and capacity. Here on MCQs.club we have prepared easy and useful Multiple-Choice Questions (MCQs) on Auditing Infrastructure and Operations that fully cover MCQs on Information Systems and I.T. Audit, IT Audit MCQs, Information Technology Audit MCQ, information system audit mcqs with answers. These mcq on information technology controls are useful for Competitive exams, Business management exams, Professional accountancy exams.

  1. The review of the capacity management procedures for hardware and performance evaluation procedures is performed to determine:
    1. Whether they will ensure continuous review of hardware and system software performance and capacity
    2. Whether the criteria used in IS management’s hardware performance monitoring pan are based on historical data and analysis obtained from the IS trouble logs, processing schedules.
    3. Both A&B
    4. None
  1. The review of the hardware acquisition plan is performed to determine:
    1. Whether the hardware acquisition plan is compared regularly to management’s business plan
    2. Whether IS management’s hardware acquisition plan is in synchronization with the IS plans to identify any deficiencies in the former
    3. Both A&B
    4. None
  1. The review of the Operating System (OS) acquisition criteria is performed to determine:
    1. Requests for the application of microcomputers are supported by cost benefit analysis
    2. All OSs are purchased through the IS purchasing department to take advantage of volume discounts or other quality benefits
    3. Controls relating to software maintenance/testing, System documentation etc.
    4. All of the above
  1. The review change management controls is performed to determine:
    1. Determine if the individual responsible for scheduling was advised in a timely manner regarding changes to hardware configuration
    2. Verify that IS management has developed and enforced change schedules that allow time for adequate installation and testing of new hardware
    3. Evaluate the effectiveness of changes to assure that they do not interfere with normal application production processing
    4. All of the above
  1. Logical access controls ensure that access to systems, data and programs is restricted to authorized users only by:
    1. Passwords
    2. Physical possession ID
    3. Biometric ID
    4. Compatibility tests
    5. All of the above
  1. The accounting audit trail must allow a message to be traced through each node in a network. Examples of data items that might be kept in the accounting audit trail follow:
    1. Unique identifier of the source node
    2. Message sequence number
    3. Image of message received at each node traversed in the network
    4. All of the above
  1. The operation audit trail in the communication sub-system is especially important. Examples of data items that might be kept in the operations audit trail follow:
    1. Number of messages that have traversed each link
    2. Queue lengths at each node
    3. Log errors to identify locations and patterns of errors
    4. All of the above

  1. The availability of high-quality network control software is essential to network supervisors being able to make effective use of the operations audit trail.
    1. True
    2. False
  1. Computer operations controls relate to the day-to-day operation of the hardware and software within the IS organization. The Computer operations control include:
    1. Restricting operator access capabilities
    2. Executing re-run handling
    3. Both A&B
    4. None
  1. Data entry controls include:
    1. Authorization of input documents
    2. Reconciliation of batch total
    3. Segregation of duties between the person-who-keys-the-data and the person who reviews the keyed data for accuracy and errors
    4. All of the above
  1. Audit procedures for data entry should include a review of the controls and the procedures to determine whether:
    1. Adequate controls exist
    2. IS personnel are adhering to the established policies
    3. Proper segregation of duties is being maintained
    4. All of the above
  1. Lights out operations – is the automation of key computer room operations whereby tasks can take place without human intervention. The types of tasks being automated with the use of system operations software are:
    1. Job scheduling, Console operation
    2. Report balancing and distribution
    3. Tape mounting and management
    4. All of the above
  1. Advantages of Lights Out Operations are:
    1. Cost containment and reduction in IS operations
    2. Continuous operations
    3. Reduced number of system errors and interruptions
    4. All of the above
  1. Application controls – are controls over input, processing and output functions. Application controls include methods for ensuring that:
    1. Only complete accurate and valid data are entered and updated in a computer system
    2. Processing results meet expectations
    3. Both A&B
    4. None

  1. Processing controls ensure the completeness and accuracy of accumulated data. The processing control techniques that can be used to address the issues of completeness and accuracy of accumulated data include:
    1. Manual recalculations
    2. Reasonableness verification of calculated amounts
    3. Limit checks of calculated amounts
    4. All of the above
  1. Input/output (I/O) control personnel are responsible for ensuring that batch processing information is processed accurately and completely in accordance with IS management’s intent and authorization.
    1. The above is correct
    2. The above is incorrect
  1. Input authorization verifies that all transactions have been authorized and approved by management. Types of authorization include:
    1. Signatures on batch forms provide evidence of proper authorization.
    2. Online Access Controls ensure that only authorized individuals may access data or perform sensitive functions.
    3. Terminal Identification can be used to limit input to specific terminals as well as to individuals.
    4. All of the above
  1. Source document layout should:
    1. Emphasize ease of use and readability
    2. Provide pre-determined input codes to reduce errors
    3. Both A&B
    4. None
  1. Input error handling call be processed by:
    1. Rejecting only transactions with errors
    2. Accepting batch in suspense
    3. Rejecting the whole batch of transactions
    4. Accepting batch and flagging error transactions
    5. All of the above
  1. Input control techniques include:
    1. Transaction log
    2. Reconciliation of data
    3. Documentation of data
    4. All of the above
  1. Output controls – provide assurance that the data delivered to users will be presented, formatted and delivered in a consistent and secure manner. Output controls include:
    1. Logging and storage of negotiable, sensitive and critical forms in a secure place
    2. Report distribution
    3. Verification of receipt of reports
    4. All of the above

  1. Which of the following documentation should be reviewed to gain an understanding of an application’s development?
    1. System development methodology documents
    2. Functional design specifications
    3. User manuals
    4. All of the above
  1. Procedures covering the tasks to be performed by the technical support personnel must be established in accordance with an organization’s overall strategies and policies. The support functions include:
    1. Determining the source of computer problems and taking appropriate corrective actions
    2. Initiating problem reports as required and ensuring that problems are resolved in a timely manner
    3. Both A&B
    4. None
  1. Scheduling Reviews –
    1. It is a major function within the IS department. The schedule includes the jobs that must be run.
    2. The sequence or job execution and the conditions that cause program execution.
    3. It permits the scheduling of low priority jobs if time becomes available.
    4. All of the above

—More to come soon—

Read more
Read more
Read more

Leave a Reply

Sign up for Free MCQs

MCQs Club

Log in to continue. IT'S FREE

OR

Don’t have an account? Sign up