Interview Prep

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/51

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

52 Terms

1
New cards

IT General Controls (ITGCs)

Foundational controls that support system reliability and financial reporting, including access management, change management, and IT operations.

2
New cards

Access Management

Controls ensuring only authorized users can access systems and data, including provisioning, deprovisioning, MFA, and password policies.

3
New cards

Change Management

The process ensuring system changes are approved, tested, and implemented properly to prevent unauthorized or faulty changes.

4
New cards

IT Operations Controls

Controls over backups, batch processing, incident management, and job scheduling.

5
New cards

Computer Operations Controls

Controls related to system monitoring, error handling, and maintaining system availability.

6
New cards

SOX (Sarbanes–Oxley Act)

A U.S. law requiring companies to maintain strong internal controls over financial reporting.

7
New cards

SOX Section 404

Requirement for management to assess and report on internal controls over financial reporting.

8
New cards

Importance of ITGCs for SOX

ITGCs support the reliability of financial systems and ensure accurate financial reporting.

9
New cards

SOC 1 Report

Evaluates controls relevant to financial reporting (ICFR).

10
New cards

SOC 2 Report

Evaluates controls related to Security, Availability, Processing Integrity, Confidentiality, and Privacy.

11
New cards

SOC 3 Report

Public-facing version of SOC 2 with less detail.

12
New cards

Internal Controls

Processes designed to ensure accurate financial reporting, compliance, asset protection, and operational efficiency.

13
New cards

Control Design

Whether a control is structured effectively to address a risk.

14
New cards

Operating Effectiveness

Whether a control works consistently in practice.

15
New cards

Walkthrough

Following a transaction end-to-end to understand the process and controls.

16
New cards

Design Testing

Evaluating whether a control is logically designed to mitigate a risk.

17
New cards

Operating Effectiveness Testing

Testing whether a control functions consistently over time.

18
New cards

Control Exception

A failure or deviation in how a control operates.

19
New cards

Risk

A potential event that could negatively impact objectives.

20
New cards

Inherent Risk

Risk before any controls are applied.

21
New cards

Residual Risk

Risk remaining after controls are applied.

22
New cards

Risk Mitigation

Actions taken to reduce risk.

23
New cards

Emerging Risks

New or evolving risks such as AI, cloud, or cybersecurity threats.

24
New cards

ERP System

Enterprise software like SAP, Oracle, or Workday that manages core business processes.

25
New cards

Cloud Computing

Using remote servers (AWS, Azure, GCP) to store and process data, introducing shared responsibility risks.

26
New cards

Cybersecurity Controls

Controls like firewalls, encryption, MFA, and monitoring to protect systems and data.

27
New cards

Data Integrity

Ensuring data is accurate, complete, and consistent.

28
New cards

Segregation of Duties (SoD)

Ensuring no single person controls all steps of a critical process.

29
New cards

Workpapers

Documentation supporting audit conclusions and testing.

30
New cards

Examples of Change Management Controls

Formal Change Request Form, Approval Workflow, Segregation of Duties, Testing before Deployment, Rollback Procedures, Change Logs/Audit Trails

31
New cards

Formal Change Request Form

Every system change must be documented with purpose, impact, and approval.

32
New cards

Approval Workflow

Changes require sign‑off from management, system owners, and sometimes security teams.

33
New cards

Testing Before Deployment

All changes must be tested in a QA or staging environment before going live.

34
New cards

Rollback Procedures

A documented plan exists to revert the system if the change fails.

35
New cards

Change Logs / Audit Trails

Systems automatically record who made a change, when, and what was changed.

36
New cards

Emergency Change Controls

Urgent fixes are allowed but must be documented and reviewed afterward

37
New cards

Examples of IT Operations Controls

Backup and Recover Procedures, Job Scheduling Controls, Incident Management Process, Capacity Monitoring, Patch Management, Service Level Agreements (SLAs), Access Review for Operational Tools

38
New cards

Backup and Recovery Procedures

Regular backups of critical systems with periodic restoration testing.

39
New cards

Job Scheduling Controls

Automated jobs (e.g., payroll runs, data loads) are monitored for success or failure.

40
New cards

Incident Management Process

A structured workflow for logging, prioritizing, and resolving IT issues

41
New cards

Capacity Monitoring

Monitoring storage, CPU, and memory to prevent system outages.

42
New cards

Patch Management

Regular updates to operating systems and applications to address vulnerabilities.

43
New cards

Service Level Agreements (SLAs)

Defined expectations for system uptime and response times

44
New cards

Access Review for Operational Tools

Ensuring only authorized staff can run or modify operational jobs

45
New cards

Computer Operations Controls examples

system monitoring dashboards, error handling procedures, batch processing controls, environmental controls, file integrity checks, automated alerts, system restart/recovery procedures

46
New cards

System Monitoring Dashboards

Real‑time monitoring of servers, applications, and network performance.

47
New cards

Error Handling Procedures

Defined steps for addressing failed jobs, corrupted files, or system errors

48
New cards

Batch Processing Controls

Ensuring batch jobs run in the correct order and complete successfully.

49
New cards

Environmental Controls

Physical controls like temperature monitoring, fire suppression, and power backups in data centers.

50
New cards

File Integrity Checks

Automated checks to ensure files are complete and unaltered before processing.

51
New cards

Automated Alerts

Notifications sent to IT staff when systems exceed thresholds or fail

52
New cards

System Restart/Recovery Procedures

Documented steps for restarting systems after outages.