The IT team of a company created a disaster recovery plan for their employer. The plan
includes several versions of backups of data and systems, including at least one copy kept
off site. The plan also includes an off-site location selected for its reduced chance of natural
disasters like floods and hurricanes. This location is guarded by a security service. The IT
manager has a copy of the plan at home, and the plan is regularly tested. Select the
statement below that best describes the plan.
Answer (D) is correct.
A disaster recovery plan should include instructions for appointing a
recovery team. Especially in larger disasters, personnel may be
indefinitely unavailable, rendering preconceived recovery team structures
useless if no other authority exists for determining the makeup of the
disaster recovery team.
A company’s IT manager has been asked to ensure that the company’s data are protected
in the event they are intercepted during transmission. Which one of the following is
the best control to implement from the selection below?
Answer (B) is correct.
Encryption technology converts data into a code. Unauthorized users
may still be able to access the data; however, without the encryption key,
they cannot decode the data. Encryption would thus be the best control in
order to ensure that the company’s data are protected in the event they
Ed Lassiter is the accounting manager that oversees the payment process. The
external auditor has been examining the operation for efficiency and control. The auditor has asked
Lassiter to provide documentation of the process to see how the payments move through the process.
Which of the following statements represents the best documentation that Lassiter could provide?
Answer (B) is correct.
A flowchart can represent a process using symbols. It is a useful tool for auditors who
want to gain an understanding of internal control. The auditors can become familiar with
payments processing by following the steps in a flowchart, which enables them to identify
Friendly Skies Airline is about to create an Internet site to capture the flight reservations and ticket payments. Which one of the following best demonstrates the inherent risks of the Internet?
Answer (B) is correct. The theft of confidential information is one of the biggest risks that comes along with using the Internet. Therefore, many controls have been created to mitigate this risk, such as passwords and encryption.