Chapter 3 - Problems With Answers
Chapter 3 - Problems With Answers
The MOST likely explanation for the use of applets in an Internet application is
that:
A. it is sent over the network from the server.
B. the server does not run the program and the output is not sent over the
network.
C. they improve the performance of the web server and network.
D. it is a JAVA program downloaded through the web browser and executed by
the web server of the client machine
The correct answer is C.
An applet is a JAVA program that is sent over the network from the web server,
through a web browser and to the client machine; the code is then run on the
machine. Since the server does not run the program and the output is not sent over
the network, the performance on the web server and networkover which the
server and client are connecteddrastically improves through the use of applets.
Performance improvement is more important than the reasons offered in choices A
and B. Since JAVA virtual machine (JVM) is embedded in most web browsers, the
applet download through the web browser runs on the client machine from the web
browser, not from the web server, making choice D incorrect.
2. During the system testing phase of an application development project the IS
auditor should review the:
A. conceptual design specifications.
B. vendor contract.
C. error reports.
D. program change requests.
The correct answer is C.
Testing is crucial in determining that user requirements have been validated. The IS
auditor should be involved in this phase and review error reports for their precision
in recognizing erroneous data and review the procedures for resolving errors. A
conceptual design specification is a document prepared during the requirements
definition phase. A vendor contract is prepared during a software acquisition
process. Program change requests would normally be reviewed as a part of the
postimplementation phase.
3. Ideally, stress testing should be carried out in a:
A. test environment using test data.
B. production environment using live workloads.
C. test environment using live workloads.
D. production environment using test data.
The correct answer is C.
Stress testing is carried out to ensure a system can cope with production workloads.
A test environment should always be used to avoid damaging the production
environment. Hence, testing should never take place in a production environment
(choices B and D), and if only test data is used, there is no certainty that the system
was stress tested adequately.
4. An advantage in using a bottom-up vs. a top-down approach to software testing
is that:
A. interface errors are detected earlier.
B. confidence in the system is achieved earlier.
C. errors in critical modules are detected earlier.
D. major functions and processing are tested earlier.
The correct answer is C.
The bottom-up approach to software testing begins with the testing of atomic units,
such as programs and modules, and works upward until a complete system testing
has taken place. The advantages of using a bottom-up approach to software testing
are the fact that there is no need for stubs or drivers and errors in critical modules
are found earlier. The other choices in this question all refer to advantages of a topdown approach, which follows the opposite path, either in depth-first or breadth-first
search order.
5. The knowledge base of an expert system that uses questionnaires to lead the
user through a series of choices before a conclusion is reached is known as:
A. rules.
B. decision trees.
C. semantic nets.
D. dataflow diagrams.
The correct answer is B.
Decision trees use questionnaires to lead a user through a series of choices until a
conclusion is reached. Rules refer to the expression of declarative knowledge
through the use of if-then relationships. Semantic nets consist of a graph in which
nodes represent physical or conceptual objects and the arcs describe the
relationship between the nodes. Semantic nets resemble a dataflow diagram and
make use of an inheritance mechanism to prevent duplication of data.
6. An IS auditor's PRIMARY concern when application developers wish to use a copy
of yesterday's production transaction file for volume tests is that:
A. users may prefer to use contrived data for testing.
B. unauthorized access to sensitive data may result.
C. error handling and credibility checks may not be fully proven.
D. the full functionality of the new process may not necessarily be tested.
The correct answer is B.
Unless the data are sanitized, there is a risk of disclosing sensitive data.
7. The IS auditor is reviewing a recently completed conversion to a new enterprise
resource planning (ERP) system. As the final stage of the conversion process, the
organization ran the old and new systems in parallel for 30 days before allowing
the new system to run on its own. What is the MOST significant advantage to the
organization by using this strategy?
A. Significant cost savings over other testing approaches
B. Assurance that new, faster hardware is compatible with the new system
C. Assurance that the new system meets functional requirements
D. Increased resiliency during the parallel processing time
The correct answer is C
Parallel operation is designed to provide assurance that a new system meets its
functional requirements. This is the safest form of system conversion testing
because, if the new system fails, the old system is ready for production use. In
addition, this form of testing allows the application developers and administrators to
simultaneously run operational tasks (batch jobs, backups) on both systems to
ensure that the new system is reliable before unplugging the old system. Although
parallel operation is generally very expensive, it provides a high level of assurance
that the new system functions properly compared to the old system. Parallel
operation is generally expensive and would not provide a cost savings over most
other testing approaches. In many cases, parallel operation is the most expensive
form of system testing due to the need for dual data entry, dual sets of hardware,
dual maintenance, dual backupsit's twice the amount of work as running a
production system and therefore costs more time and money. As a result, option A is
not the correct answer. Hardware compatibility should be determined and tested
much earlier in the conversion project and is not an advantage of parallel operation.
Compatibility is generally determined based on the application's published
specifications and on system testing in a lab environment. Parallel operation is
designed to test the application's effectiveness and integrity of application data, not
hardware compatibility. In general, hardware compatibility relates more to the
operating system level than to a particular application. While new hardware in a
system conversion must be tested under a real production load, this can be done
without parallel systems, so option B is not the correct answer. Increased resiliency
during parallel processing is a legitimate outcome from this scenario, but the
advantage it provides is temporary and minor, so option D is not the correct answer.
8. Which of the following is the most important element in the design of a data
warehouse?
A. Quality of the metadata
B. Speed of the transactions
C. Volatility of the data
D. Vulnerability of the system
The answer is A.
Quality of the metadata is the most important element in the design of a data
warehouse. A data warehouse is a copy of transaction data specifically structured
for query and analysis. Metadata aim to provide a table of contents to the
information stored in the data warehouse. Companies that have built warehouses
believe that metadata are the most important component of the warehouse.
9. An organization has an integrated development environment (IDE) on which the
program libraries reside on the server, but modification/development and testing
are done from PC workstations. Which of the following would be a strength of an
IDE?
A. Controls the proliferation of multiple versions of programs
B. Expands the programming resources and aids available
C. Increases program and processing integrity
D. Prevents valid changes from being overwritten by other changes
The correct answer is B.
A strength of an IDE is that it expands the programming resources and aids
available. The other choices are IDE weaknesses.
10.A manufacturing firm wants to automate its invoice payment system. Objectives
state that the system should require considerably less time for review and
authorization and the system should be capable of identifying errors that require
follow up. Which of the following would BEST meet these objectives?
A. Establishing an inter-networked system of client servers with suppliers for
increased efficiencies
B. Outsourcing the function to a firm specializing in automated payments and
accounts receivable/invoice processing
C. Establishing an EDI system of electronic business documents and
transactions with key suppliers, computer to computer, in a standard format
D. Reengineering the existing processing and redesigning the existing system
The correct answer is C.
EDI is the best answer. Properly implemented (e.g., agreements with trading
partners transaction standards, controls over network security mechanisms in
conjunction with application controls), EDI is best suited to identify and follow up on
errors more quickly, given reduced opportunities for review and authorization.
11.The waterfall life cycle model of software development is most appropriately
used when:
A. requirements are well understood and are expected to remain stable, as is
the business environment in which the system will operate.
B. requirements are well understood and the project is subject to time
pressures.
C. the project intends to apply an object-oriented design and programming
approach.
D. the project will involve the use of new technology.
The answer is A
Historically, the waterfall model has been best suited to the stable conditions
described in choice A. When the degree of uncertainty of the system to be delivered
and the conditions in which it will be used rises, the waterfall model has not been
successful. In these circumstances, the various forms of iterative development life
cycle gives the advantage of breaking down the scope of the overall system to be
delivered, making the requirements gathering and design activities more
manageable. The ability to deliver working software earlier also acts to alleviate
uncertainty and may allow an earlier realization of benefits. The choice of a design
and programming approach is not itself a determining factor of the type of software
development life cycle that is appropriate. The use of new technology in a project
introduces a significant element of risk. An iterative form of development,
particularly one of the agile methods that focuses on early development of actual
working software, is likely to be the better option to manage this uncertainty.
12.An IS auditor is reviewing the software development process for an organization.
Which of the following functions would be appropriate for the end users to
perform?
A. Program output testing
B. System configuration
C. Program logic specification
D. Performance tuning
The answer is A.
A user can test program output by checking the program input and comparing it
with the system output. This task, although usually done by the programmer, can
also be done effectively by the user. System configuration is usually too technical to
be accomplished by a user and this situation could create security issues. Program
logic specification is a very technical task that is normally performed by a
programmer. Performance tuning also requires high levels of technical skill and will
not be effectively accomplished by a user. In addition, choices B, C and D could
introduce a segregation of duties issue.
13.Which testing approach is MOST appropriate to ensure that internal application
interface errors are identified as soon as possible?
A. Bottom up
B. Sociability testing
C. Top-down
D. System test
The correct answer is C.
The top-down approach to testing ensures that interface errors are detected early
and that testing of major functions is conducted early. A bottom-up approach to
testing begins with atomic units, such as programs and modules, and works upward
until a complete system test has taken place. Sociability testing and system tests
take place at a later stage in the development process.
14.Which of the following is a dynamic analysis tool for the purpose of testing
software modules?
A. Black box test
B. Desk checking
C. Structured walkthrough
D. Design and code
The answer is A.
A black box test is a dynamic analysis tool for testing software modules. During the
testing of software modules a black box test works first in a cohesive manner as a
single unit/entity consisting of numerous modules, and second with the user data
that flows across software modules. In some cases, this even drives the software
behavior. In choices B, C and D, the software (design or code) remains static and
someone closely examines it by applying their mind, without actually activating the
software. Therefore, these cannot be referred to as dynamic analysis tools.
15.An IS auditor is reviewing a project that is using an Agile software development
approach. Which of the following should the IS auditor expect to find?
A. Use of a process-based maturity model such as the capability maturity model
(CMM)
B. Regular monitoring of task-level progress against schedule
C. Extensive use of software development tools to maximize team productivity
D. Postiteration reviews that identify lessons learned for future use in the project
The correct answer is D.
A key tenet of the Agile approach to software project management is team learning
and the use of team learning to refine project management and software
development processes as the project progresses. One of the best ways to achieve
this is that, at the end of each iteration, the team considers and documents what
worked well and what could have worked better, and identifies improvements to be
implemented in subsequent iterations. CMM and Agile really sit at opposite poles.
CMM places heavy emphasis on predefined formal processes and formal project
management and software development deliverables. Agile projects, by contrast,
rely on refinement of process as dictated by the particular needs of the project and
team dynamics. Additionally, less importance is placed on formal paper-based
deliverables, with the preference being effective informal communication within the
team and with key outside contributors. Agile projects produce releasable software
in short iterations, typically ranging from 4 to 8 weeks. This, in itself, instills
considerable performance discipline within the team. This, combined with short
daily meetings to agree on what the team is doing and the identification of any
impediments, renders task-level tracking against a schedule redundant. Agile
projects do make use of suitable development tools; however, tools are not seen as
the primary means of achieving productivity. Team harmony, effective
communications and collective ability to solve challenges are of greater importance.
A.
B.
C.
D.
The
The
The
The
that the development and testing code base be separate. When defects are
identified they can be fixed in the development environment, without interrupting
testing, before being migrated in a controlled manner to the test environment. A
separate test environment can also be used as the final staging area from which
code is migrated to production. This enforces a separation between development
and production code. The logistics of setting up and refreshing customized test data
is easier if a separate environment is maintained. If developers and testers are
sharing the same environment, they have to work effectively at separate times of
the day. It is unlikely that this would provide optimum productivity. Use of a source
code control tool is a good practice, but it does not properly mitigate the lack of an
appropriate testing environment. Even low priority fixes run the risk of introducing
unintended results when combined with the rest of the system code. To prevent this,
regular regression testing covering all code changes should occur. A separate test
environment makes the logistics of regression testing easier to manage.
32.Which of the following is an advantage of the top-down approach to software
testing?
A. Interface errors are identified early
B. Testing can be started before all programs are complete
C. It is more effective than other testing approaches
D. Errors in critical modules are detected sooner
The answer is A.
The advantage of the top-down approach is that tests of major functions are
conducted early, thus enabling the detection of interface errors sooner. The most
effective testing approach is dependent on the environment being tested. Choices B
and D are advantages of the bottom-up approach to system testing.
33.Which of the following systems or tools can recognize that a credit card
transaction is more likely to have resulted from a stolen credit card than from the
holder of the credit card?
A. Intrusion detection systems
B. Data mining techniques
C. Firewalls
D. Packet filtering routers
The correct answer is B.
Data mining is a technique used to detect trends or patterns of transactions or data.
If the historical pattern of charges against a credit card account is changed, then it
is a flag that the transaction may have resulted from a fraudulent use of the card.
34.The phases and deliverables of a system development life cycle (SDLC) project
should be determined:
A. during the initial planning stages of the project.
B. after early planning has been completed, but before work has begun.
C. throughout the work stages, based on risks and exposures.
D. only after all risks and exposures have been identified and the IS auditor has
recommended appropriate controls.
The answer is A.
It is extremely important that the project be planned properly and that the specific
phases and deliverables be identified during the early stages of the project.
35.Which of the following is a prevalent risk in the development of end-user
computing (EUC) applications?
A. Applications may not be subject to testing and IT general controls
B. Increased development and maintenance costs
C. Increased application development time
D. Decision-making may be impaired due to diminished responsiveness to
requests for information
The answer is A.
End-user developed applications may not be subjected to an independent outside
review by systems analysts and frequently are not created in the context of a formal
development methodology. These applications may lack appropriate standards,
controls, quality assurance procedures, and documentation. A risk of end-user
applications is that management may rely on them as much as traditional
applications. End-user computing (EUC) systems typically result in reduced
application development and maintenance costs, and a reduced development cycle
time. EUC systems normally increase flexibility and responsiveness to
management's information requests.
36.An IS auditor reviewing a proposed application software acquisition should
ensure that the:
A. operating system (OS) being used is compatible with the existing hardware
platform.
B. planned OS updates have been scheduled to minimize negative impacts on
company needs.
C. OS has the latest versions and updates.
D. products are compatible with the current or planned OS.
The correct answer is D.
Choices A, B and C are incorrect because none of them are related to the area being
audited. In reviewing the proposed application the auditor should ensure that the
products to be purchased are compatible with the current or planned OS. Regarding
choice A, if the OS is currently being used, it is compatible with the existing
hardware platform, because if it is not it would not operate properly. In choice B, the
planned OS updates should be scheduled to minimize negative impacts on the
organization. For choice C, the installed OS should be equipped with the most recent
versions and updates (with sufficient history and stability).
The answer is A.
One of the major benefits of object-oriented design and development is the ability
to reuse modules. The other options do not normally benefit from the objectoriented technique
42.During the requirements definition phase of a software development project, the
aspects of software testing that should be addressed are developing:
A. test data covering critical applications.
B. detailed test plans.
C. quality assurance test specifications.
D. user acceptance testing specifications.
The correct answer is D.
A key objective in any software development project is to ensure that the developed
software will meet the business objectives and the requirements of the user. The
users should be involved in the requirements definition phase of a development
project and user acceptance test specification should be developed during this
phase. The other choices are generally performed during the system testing phase.
43.Which of the following is an object-oriented technology characteristic that
permits an enhanced degree of security over data?
A. Inheritance
B. Dynamic warehousing
C. Encapsulation
D. Polymorphism
The correct answer is C.
Encapsulation is a property of objects, and it prevents accessing either properties or
methods that have not been previously defined as public. This means that any
implementation of the behavior of an object is not accessible. An object defines a
communication interface with the exterior and only that which belongs to that
interface can be accessed.
44.The GREATEST advantage of rapid application development (RAD) over the
traditional system development life cycle (SDLC) is that it:
A. facilitates user involvement.
B. allows early testing of technical features.
C. facilitates conversion to the new system.
D. shortens the development time frame.
The correct answer is D.
The greatest advantage of RAD is the shorter time frame for the development of a
system. Choices A and B are true, but they are also true for the traditional systems
development life cycle. Choice C is not necessarily always true.
45.When a new system is to be implemented within a short time frame, it is MOST
important to:
A.
B.
C.
D.
resource allocation does not guarantee confidentiality of data. Choices C and D are
not related to the web application in production.
50.From a risk management point of view, the BEST approach when implementing
a large and complex IT infrastructure is:
A. a big bang deployment after proof of concept.
B. prototyping and a one-phase deployment.
C. a deployment plan based on sequenced phases.
D. to simulate the new infrastructure before deployment.
The correct answer is C.
When developing a large and complex IT infrastructure, the best practice is to use a
phased approach to fitting the entire system together. This will provide greater
assurance of quality results. The other choices are riskier approaches
51.Which of the following types of testing would determine whether a new or
modified system can operate in its target environment without adversely
impacting other existing systems?
A. Parallel testing
B. Pilot testing
C. Interface/integration testing
D. Sociability testing
The correct answer is D.
The purpose of sociability testing is to confirm that a new or modified system can
operate in its target environment without adversely impacting existing systems.
This should cover the platform that will perform primary application processing and
interfaces with other systems, as well as changes to the desktop in a client-server
or web development. Parallel testing is the process of feeding data into two systems
the modified system and an alternate systemand comparing the results. In this
approach, the old and new systems operate concurrently for a period of time and
perform the same processing functions. Pilot testing takes place first at one location
and is then extended to other locations. The purpose is to see if the new system
operates satisfactorily in one place before implementing it at other locations.
Interface/integration testing is a hardware or software test that evaluates the
connection of two or more components that pass information from one area to
another. The objective is to take unit-tested modules and build an integrated
structure.
52.Which of the following would impair the independence of a quality assurance
team?
A. Ensuring compliance with development methods
B. Checking the testing assumptions
C. Correcting coding errors during the testing process
D. Checking the code to ensure proper documentation
The most significant risk after a payroll system conversion is not being able to pay
employees in a timely and accurate manner. As a result, maintaining data integrity
and accuracy during migration is paramount. The other options are not as important
as long as the new payroll system functions as intended.
56.Which of the following is an implementation risk within the process of decision
support systems?
A. Management control
B. Semistructured dimensions
C. Inability to specify purpose and usage patterns
D. Changes in decision processes
The correct answer is C.
The inability to specify purpose and usage patterns is a risk that developers need to
anticipate while implementing a decision support system (DSS). Choices A, B and D
are not risks, but characteristics of a DSS.
57.Which of the following system and data conversion strategies provides the
GREATEST redundancy?
A. Direct cutover
B. Pilot study
C. Phased approach
D. Parallel run
The correct answer is D.
Parallel runs are the safestthough the most expensiveapproach, because both
the old and new systems are run, thus incurring what might appear to be double
costs. Direct cutover is actually quite risky, since it does not provide for a shake
down period nor does it provide an easy fallback option. Both a pilot study and a
phased approach are performed incrementally, making rollback procedures difficult
to execute.
58.An organization is migrating from a legacy system to an enterprise resource
planning (ERP) system. While reviewing the data migration activity, the MOST
important concern for the IS auditor is to determine that there is a:
A.
correlation of semantic characteristics of the data migrated between the two
systems.
B.
correlation of arithmetic characteristics of the data migrated between the two
systems.
C.
correlation of functional characteristics of the processes between the two
systems.
D.
relative efficiency of the processes between the two systems.
The answer is A.
Due to the fact that the two systems could have a different data representation,
including the database schema, the IS auditor's main concern should be to verify
that the interpretation of the data is the same in the new as it was in the old
system. Arithmetic characteristics represent aspects of data structure and internal
definition in the database, and therefore are less important than the semantic
characteristics. A review of the correlation of the functional characteristics or a
review of the relative efficiencies of the processes between the two systems is not
relevant to a data migration review.
59.During a postimplementation review, which of the following activities should be
performed?
A. User acceptance testing (UAT)
B. Return on investment (ROI) analysis
C. Activation of audit trails
D. Updates of the future state of enterprise architecture (EA) diagrams
The correct answer is B.
Following implementation, a cost-benefit analysis or ROI should be re-performed to
verify that the original business case benefits are delivered. UAT should be
performed during the development phase, not after the implementation. The audit
trail should be activated as soon as the application is implemented. While updating
the EA diagrams is a best practice, it would not normally be part of a
postimplementation review.
60.An IS auditor reports that the financial module of an enterprise resource
planning (ERP) application is very slow because the audit trails are activated on
some sensitive tables. The vendor has asked to disable audit trails on these
transactional tables and restrict auditing only to successful and unsuccessful
logons to the system. What is the GREATEST threat if this recommendation is
implemented?
A. The integrity of the financial data could not be guaranteed.
B. The integrity of the system logs could not be guaranteed.
C. Access to sensitive data is not logged.
D. Fraud could occur.
The answer is A.
Audit trails in ERP systems retain all the information on data changes, the author of
the changes, the dates of the changes, the values changed, etc. If the audit trails on
transactional data are not active, it would be difficult to identify changes to the data
and detect any unauthorized modification. Choice B is not valid because the system
logs are separate and distinct from the application audit trail. Choice C is not correct
because the access mode (read-only) is usually not logged with ERP audit trails and
so this is not a concern. Choice D is not correct because audit trails are not
preventive controls and do not prevent fraud.
finally checking the master file records for daily transactions. Vouching is usually
performed on manual or batch-processing systems. In this scenario, the funds are
transferred electronically and there is no manual processing. In online processing,
authorizations are normally done automatically by the system. Correction entries
are normally done by an individual other than the person entrusted to do
reconciliations.
64.A company uses a bank to process its weekly payroll. Time sheets and payroll
adjustment forms (e.g., hourly rate changes, terminations) are completed and
delivered to the bank, which prepares checks (cheques) and reports for
distribution. To BEST ensure payroll data accuracy:
A. payroll reports should be compared to input forms.
B. gross payroll should be recalculated manually.
C. checks (cheques) should be compared to input forms.
D. checks (cheques) should be reconciled with output reports.
The answer is A.
The best way to confirm data accuracy, when input is provided by the company and
output is generated by the bank, is to verify the data input (input forms) with the
results of the payroll reports. Hence, comparing payroll reports with input forms is
the best mechanism of verifying data accuracy. Recalculating gross payroll manually
would only verify whether the processing is correct and not the data accuracy of
inputs. Comparing checks (cheques) to input forms is not feasible as checks
(cheques) have the processed information and input forms have the input data.
Reconciling checks (cheques) with output reports only confirms that checks
(cheques) have been issued as per output reports.
65.An IS auditor who has discovered unauthorized transactions during a review of
EDI transactions is likely to recommend improving the:
A. EDI trading partner agreements.
B. physical controls for terminals.
C. authentication techniques for sending and receiving messages.
D. program change control procedures.
The correct answer is C.
Authentication techniques for sending and receiving messages play a key role in
minimizing exposure to unauthorized transactions. The EDI trading partner
agreements would minimize exposure to legal issues.
66.During an application audit, an IS auditor finds several problems related to
corrupted data in the database. Which of the following is a corrective control
that the IS auditor should recommend?
A. Implement data backup and recovery procedures.
B. Define standards and closely monitor for compliance.
C. Ensure that only authorized personnel can update the database.
D. Establish controls to handle concurrent access problems.
The answer is A.
Implementing data backup and recovery procedure is a corrective control, because
backup and recovery procedures can be used to roll back database errors. Defining
or establishing standards is a preventive control, while monitoring for compliance is
a detective control. Ensuring that only authorized personnel can update the
database is a preventive control. Establishing controls to handle concurrent access
problems is also a preventive control.
67.Web application developers sometimes use hidden fields on web pages to save
information about a client session. This technique is used, in some cases, to
store session variables that enable persistence across web pages, such as
maintaining the contents of a shopping cart on a retail web site application.
The MOST likely web-based attack due to this practice is:
A. parameter tampering.
B. cross-site scripting.
C. cookie poisoning.
D. stealth commanding.
The answer is A.
Web application developers sometimes use hidden fields to save information about
a client session or to submit hidden parameters, such as the language of the end
user, to the underlying application. Since hidden form fields do not display in the
browser, developers may feel safe passing unvalidated data in the hidden fields (to
be validated later). This practice is not safe since an attacker can intercept, modify
and submit requests which can discover information or perform functions that the
web developer never intended. The malicious modification of web application
parameters is known as parameter tampering. Cross-site scripting involves the
compromise of the web page to redirect users to content on the attacker web site.
The use of hidden fields has no impact on the likelihood of a cross-site scripting
attack since these fields are static content that cannot ordinarily be modified to
create this type of attack. Web applications use cookies to save session state
information on the client machine so that the user does not need to log on every
time a page is visited. Cookie poisoning refers to the interception and modification
of session cookies in order to impersonate the user or steal logon credentials. The
use of hidden fields has no relation to cookie poisoning. Stealth commanding is the
hijacking of a web server by the installation of unauthorized code. While the use of
hidden forms may increase the risk of server compromise, the most common server
exploits involve vulnerabilities of the server operating system or web server.
68.When transmitting a payment instruction, which of the following will help verify
that the instruction was not duplicated?
A. Use of a cryptographic hashing algorithm
B. Enciphering the message digest
C. Deciphering the message digest
D. A sequence number and time stamp
D. Whether owners have been identified who will be responsible for the
process
The answer is A.
The audit team must advocate the inclusion of the key controls and verify that the
controls are in place before implementing the new process. Choices B, C and D are
objectives that the business process reengineering (BPR) process should achieve,
but they are not the auditor's primary concern.
72.The GREATEST advantage of using web services for the exchange of
information between two systems is:
A.
secure communications.
B.
improved performance.
C.
efficient interfacing.
D.
enhanced documentation.
The correct answer is C.
Web services facilitate the exchange of information between two systems,
regardless of the operating system or programming language used. Communication
is not necessarily securer or faster, and there is no documentation benefit in using
web services.
73.Which of the following is the MOST critical and contributes the greatest to the
quality of data in a data warehouse?
A. Accuracy of the source data
B. Credibility of the data source
C. Accuracy of the extraction process
D. Accuracy of the data transformation
The answer is A.
Accuracy of source data is a prerequisite for the quality of the data in a data
warehouse. Credibility of the data source, accurate extraction processes and
accurate transformation routines are all important, but would not change inaccurate
data into quality (accurate) data.
74.Which of the following would help to ensure the portability of an application
connected to a database?
A. Verification of database import and export procedures
B. Usage of a structured query language (SQL)
C. Analysis of stored procedures/triggers
D. Synchronization of the entity-relation model with the database physical
schema
The correct answer is B.
The use of SQL facilitates portability. Verification of import and export procedures
with other systems ensures better interfacing with other systems, analyzing stored
procedures/triggers ensures proper access/performance, and reviewing the design
entity-relation model will be helpful, but none of these contribute to the portability
of an application connecting to a database.
75.
data representation does not mean different data presentation at the front end.
Even when this is the case, this issue can be solved by adequate training and user
support. The printing functionality is commonly one of the last functions to be
tested in a new system because it is usually the last step performed in any business
event. Thus, meaningful testing and the respective error fixing are only possible
after all other parts of the software have been successfully tested.