You are on page 1of 2

Chapter 2 : IT Governance

Mention Briefly :

1. Describe the components of a disaster recovery plan.

Answer:
1) Identify critical operations
2) Create a disaster recovery team
3) Provide site backup
4) Specify backup and off site storage procedures.

2. What are the often cited benefits of IT outsourcing?

Answer:
1) Improved core business processes
2) Improved IT performance
3) Reduced IT costs

3. List five risks associated with IT outsourcing.

Answer:
1) Failure to perform
2) Vendor exploitation
3) Outsourcing costs exceed benefits
4) Reduced security
5) Loss of strategic advantage

4. Three advantages of Distributed Data Processing DDP.

Answer:
1) Cost reduction
2) Improved cost control responsibility
3) Improved user satisfaction
4) Backup flexibility

1
5. Three organization functions of the data processing department using a centralized
data processing approach.

Answer:
1) Data conversion 2) Computer operations 3) Data Library

6. Three risks associated with distributed data processing DDP


Answer:
1) Inefficient use of resources
2) Destruction of audit trails
3) Inadequate segregation of duties
4) Hiring unqualified personnel
5) Lack of standards

Forth : Answer the following Questions :

1. Auditing procedures for the computer center


1) Physical security ---------------------
2) Insurance coverage ---------------------
3) Proper documentation ---------------------
Answer:
1- Verify that routine access to the 2-Review insurance coverage on hardware, software,
computer is restricted to authorized and physical facility
employees by reviewing access logs
3- Review operator documentation for
completeness and accuracy

2. Audit procedures for a disaster recovery plan


1) Critical applications ---------------------
2) Disaster recovery team ---------------------
3) Back up ---------------------
Answer:
1- Review list of critical applications for 2-Verify that the disaster recovery team
completeness and accuracy knows its responsibilities
3- Verify that procedures are in place for
storing off-site copies of applications and data

You might also like