ExamGecko
Question list
Search
Search

Related questions

Question 1027 - CISA discussion

Report
Export

Which of the following is the MOST significant risk when an application uses individual end-user accounts to access the underlying database?

A.
Multiple connects to the database are used and slow the process_
Answers
A.
Multiple connects to the database are used and slow the process_
B.
User accounts may remain active after a termination.
Answers
B.
User accounts may remain active after a termination.
C.
Users may be able to circumvent application controls.
Answers
C.
Users may be able to circumvent application controls.
D.
Application may not capture a complete audit trail.
Answers
D.
Application may not capture a complete audit trail.
Suggested answer: C

Explanation:

The most significant risk when an application uses individual end-user accounts to access the underlying database is that users may be able to circumvent application controls. Application controls are the policies, procedures, and mechanisms that ensure the accuracy, completeness, validity, and authorization of transactions and data within an application. Application controls can include input validation, output verification, processing logic, reconciliation, exception handling, and audit trails. Application controls can help prevent or detect errors, fraud, or unauthorized access or modification of data.

However, if an application uses individual end-user accounts to access the underlying database, it means that the users have direct access to the database without going through the application layer. This can expose the database to potential risks such as:

Users may be able to bypass the application controls and manipulate the data in the database directly using SQL commands or other tools. For example, users may be able to change their own or others' salaries, grades, or balances without proper authorization or validation.

Users may be able to access or disclose sensitive or confidential data that they are not supposed to see or share. For example, users may be able to view other users' personal information, passwords, or credit card numbers.

Users may be able to introduce errors or inconsistencies in the data by entering invalid or incorrect data or by deleting or modifying existing data. For example, users may be able to create duplicate records, break referential integrity, or cause data loss or corruption.

Users may be able to compromise the security and performance of the database by creating unauthorized objects, granting excessive privileges, executing malicious code, or consuming excessive resources. For example, users may be able to create backdoors, viruses, or denial-of-service attacks.

Therefore, using individual end-user accounts to access the underlying database can pose a serious threat to the integrity, confidentiality, availability, and reliability of the data and the application.

The other options are not as significant as option C. Multiple connects to the database are used and slow the process is a performance issue that can affect the efficiency and responsiveness of the application and the database, but it does not necessarily compromise the data quality or security. User accounts may remain active after a termination is a security issue that can increase the risk of unauthorized access or misuse of data by former employees or others who have access to their credentials, but it can be mitigated by implementing proper account management and monitoring processes. Application may not capture a complete audit trail is a compliance issue that can affect the accountability and traceability of transactions and data within the application and the database, but it does not directly affect the data accuracy or protection.

Should application users be database users?- Stack Overflow1

An Approach Toward Sarbanes-Oxley ITGC Risk Assessment - ISACA2

ISACA CISA Certified Information Systems Auditor Exam ... - PUPUWEB3

Why inactive accounts are a security risk | Stratosphere4

asked 18/09/2024
Zulkarnain Hashim
39 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first