The impact of EDI on internal controls will be:

A. that fewer opportunities for review and authorization
will exist.

B. an inherent authentication.

C. a proper distribution of EDI transactions while in the
possession of third parties.

D. that IPF management will have increased responsibilities
over data center controls.



The impact of EDI on internal controls will be: A. that fewer opportunities for review and author..

Answer / guest

Answer: A

EDI promotes a more efficient paperless environment, but at
the same time, less human intervention makes it more
difficult for reviewing and authorizing. Choice B is
incorrect since the interaction between parties is
electronic there is no inherent authentication occurring.
Computerized data can look the same no matter what the
source and does not include any distinguishing human element
or signature. Choice C is incorrect because this is a
security risk associated with EDI. Choice D is incorrect
because there are relatively few, if any, additional data
center controls associated with the implementation of EDI
applications. Instead, more control will need to be
exercised by the user's application system to replace manual
controls, such as site reviews of documents. More emphasis
will need to be placed on control over data transmission
(network management controls).

Is This Answer Correct ?    2 Yes 0 No

Post New Answer

More CISA Certification Interview Questions

Which of the following audit techniques would an IS auditor place the MOST reliance on when determining whether an employee practices good preventive and detective security measures? A. Observation B. Detail testing C. Compliance testing D. Risk assessment

1 Answers  


Which of the following is the most important element in the design of a data warehouse? A. Quality of the metadata B. Speed of the transactions C. Volatility of the data D. Vulnerability of the system

1 Answers  


Access rules normally are included in which of the following documentation categories? A. Technical reference documentation B. User manuals C. Functional design specifications D. System development methodology documents

1 Answers  


A digital signature contains a message digest to: A. show if the message has been altered after transmission. B. define the encryption algorithm. C. confirm the identity of the originator. D. enable message transmission in a digital format.

2 Answers  


Which of the following is the MOST reasonable option for recovering a noncritical system? A. Warm site B. Mobile site C. Hot site D. Cold site

2 Answers  






At the end of the testing phase of software development, an IS auditor observes that an intermittent software error has not been corrected. No action has been taken to resolve the error. The IS auditor should: A. report the error as a finding and leave further exploration to the auditee's discretion. B. attempt to resolve the error. C. recommend that problem resolution be escalated. D. ignore the error, as it is not possible to get objective evidence for the software error.

1 Answers  


Which of the following BEST determines that complete encryption and authentication protocols exist for protecting information while transmitted? A. A digital signature with RSA has been implemented. B. Work is being done in tunnel mode with the nested services of AH and ESP C. Digital certificates with RSA are being used. D. Work is being done in transport mode, with the nested services of AH and ESP

1 Answers  


When developing a risk-based audit strategy, an IS auditor should conduct a risk assessment to ensure that:

6 Answers  


The use of a GANTT chart can: A. aid in scheduling project tasks. B. determine project checkpoints. C. ensure documentation standards. D. direct the post-implementation review.

2 Answers  


Which of the following translates e-mail formats from one network to another so that the message can travel through all the networks? A. Gateway B. Protocol converter C. Front-end communication processor D. Concentrator/multiplexor

2 Answers  


A large chain of shops with EFT at point-of-sale devices has a central communications processor for connecting to the banking network. Which of the following is the BEST disaster recovery plan for the communications processor? A. Offsite storage of daily backups B. Alternative standby processor onsite C. Installation of duplex communication links D. Alternative standby processor at another network node

1 Answers  


In addition to the backup considerations for all systems, which of the following is an important consideration in providing backup for online systems? A. Maintaining system software parameters B. Ensuring periodic dumps of transaction logs C. Ensuring grandfather-father-son file backups D. Maintaining important data at an off-site location

1 Answers  


Categories
  • Cisco Certifications Interview Questions Cisco Certifications (2321)
  • Microsoft Certifications Interview Questions Microsoft Certifications (171)
  • Sun Certifications Interview Questions Sun Certifications (45)
  • CISA Certification Interview Questions CISA Certification (744)
  • Oracle Certifications Interview Questions Oracle Certifications (64)
  • ISTQB Certification Interview Questions ISTQB Certification (109)
  • Certifications AllOther Interview Questions Certifications AllOther (295)