2 - Governance and Management of IT Flashcards
PASS THE CISA (107 cards)
During a risk analysis, an IS auditor identifies threats and potential impacts. Next, the IS auditor should:
A.ensure the risk assessment is aligned to management’s risk assessment process.
B.identify information assets and the underlying systems.
C.disclose the threats and impacts to management.
D.identify and evaluate the existing controls.
D. identify and evaluate the existing controls.
It is important for an IS auditor to identify and evaluate the existence and effectiveness of existing and planned controls so that the risk level can be calculated after the potential threats and possible impacts are identified.
After an organization completed a threat and vulnerability analysis as part of a risk assessment, the final report suggested that an intrusion prevention system (IPS) should be installed at the main Internet gateways and that all business units should be separated via a proxy firewall. Which of the following is the BEST method to determine whether the controls should be implemented?
A. A cost-benefit analysis
B. An annual loss expectancy calculation
C. A comparison of the cost of the IPS and firewall and the cost of the business systems
D. A business impact analysis
A. A cost-benefit analysis
In a cost-benefit analysis, the total expected purchase and operational/support costs, and a qualitative value for all actions are weighted against the total expected benefits to choose the best technical, most profitable, least expensive or acceptable risk option.
The PRIMARY benefit of implementing a security program as part of a security governance framework is the:
A. alignment of the IT activities with IS audit recommendations.
B. enforcement of the management of security risk.
C. implementation of the chief information security officer’s recommendations.
D. reduction of the cost for IT security.
B. enforcement of the management of security risk.
The major benefit of implementing a security program is management’s assessment of risk and its mitigation to an appropriate level, and monitoring of the residual risk.
An IS auditor reviewing the IT organization is MOST concerned if the IT steering committee:
A. is responsible for project approval and prioritization.
B. is responsible for developing the long-term IT plan.
C. reports the status of IT projects to the board of directors.
D. is responsible for determining business goals.
D. is responsible for determining business goals.
Determining the business goals is the responsibility of senior management and not of the IT steering committee. IT should support business goals and be driven by the business—not the other way around.
Which of the following insurance types provide for a loss arising from fraudulent acts by employees?
A. Business interruption
B. Fidelity coverage
C. Errors and omissions
D. Extra expense
B. Fidelity coverage
This type of insurance covers the loss arising from dishonest or fraudulent acts by employees.
Which of the following goals do you expect to find in an organization’s strategic plan?
A. Results of new software testing
B. An evaluation of information technology needs
C. Short-term project plans for a new planning system
D. Approved suppliers for products offered by the company
D. Approved suppliers for products offered by the company
Approved suppliers of choice for the product is a strategic business objective that is intended to focus the overall direction of the business and, thus, is a part of the organization’s strategic plan.
A business unit has selected a new accounting application and did not consult with IT early in the selection process. The PRIMARY risk is that:
A. the security controls of the application may not meet requirements.
B. the application may not meet the requirements of the business users.
C. the application technology may be inconsistent with the enterprise architecture.
D. the application may create unanticipated support issues for IT.
C. the application technology may be inconsistent with the enterprise architecture.
The primary focus of the enterprise architecture (EA) is to ensure that technology investments are consistent with the platform, data and development standards of the IT organization. The EA defines both a current and future state in areas such as the use of standard platforms, databases or programming languages. If a business unit selected an application using a database or operating system that is not part of the EA for the business, this increases the cost and complexity of the solution and ultimately delivers less value to the business.
When auditing the IT governance framework and IT risk management practices that exist within an organization, the IS auditor identified some undefined responsibilities regarding IT management and governance roles. Which of the following recommendations is the MOST appropriate?
A. Review the strategic alignment of IT with the business.
B. Implement accountability rules within the organization.
C. Ensure that independent IS audits are conducted periodically.
D. Create a chief risk officer role in the organization.
B. Implement accountability rules within the organization.
IT risk is managed by embedding accountability into the enterprise. The IS auditor should recommend the implementation of accountability rules to ensure that all responsibilities are defined within the organization. Note that this question asks for the best recommendation—not about the finding itself.
Which of the following is an advantage of prototyping?
A. The finished system normally has strong internal controls.
B. Prototype systems can provide significant time and cost savings.
C. Change control is often less complicated with prototype systems.
D. It ensures that functions or extras are not added to the intended system.
B. Prototype systems can provide significant time and cost savings.
Prototype systems can provide significant time and cost savings through better user interaction and the ability to rapidly adapt to changing requirements; however, they also have several disadvantages, including loss of overall security focus, project oversight and implementation of a prototype that is not yet ready for production.
Which of the following inputs adds the MOST value to the strategic IT initiative decision-making process?
A. The maturity of the project management process
B. The regulatory environment
C. Past audit findings
D. The IT project portfolio analysis
D. The IT project portfolio analysis
Portfolio analysis provides the best input into the decision-making process relating to planning strategic IT initiatives. An analysis of the IT portfolio provides comparable information of planned initiatives, projects and ongoing IT services, which allows the IT strategy to be aligned with the business strategy.
An IS auditor is assigned to review IT structures and activities recently outsourced to various providers. Which of the following should the IS auditor determine FIRST?
A. An audit clause is present in all contracts.
B. The service level agreement of each contract is substantiated by appropriate key performance indicators.
C. The contractual warranties of the providers support the business needs of the organization.
D. At contract termination, support is guaranteed by each outsourcer for new outsourcers.
C. The contractual warranties of the providers support the business needs of the organization.
Aligns with business objectives: Ensuring that the outsourced services meet the organization’s specific needs is paramount.
Risk mitigation: By verifying that contractual warranties align with business needs, the auditor can identify potential gaps in service delivery.
Performance evaluation: Assessing the adequacy of service warranties provides a baseline for evaluating the vendor’s performance.
An IS auditor is performing a review of an organization’s governance model. Which of the following should be of MOST concern to the auditor?
A.The information security policy is not periodically reviewed by senior management.
B.A policy ensuring systems are patched in a timely manner does not exist.
C.The audit committee did not review the organization’s global mission statement.
D.An organizational policy related to information asset protection does not exist.
A.The information security policy is not periodically reviewed by senior management.
Data security policies should be reviewed/refreshed once every year to reflect changes in the organization’s environment. Policies are fundamental to the organization’s governance structure, and, therefore, this is the greatest concern.
Question
The MOST important point of consideration for an IS auditor while reviewing an enterprise’s project portfolio is that it:
A.does not exceed the existing IT budget.
B.is aligned with the investment strategy.
C.has been approved by the IT steering committee.
D.is aligned with the business plan.
D.is aligned with the business plan.
Portfolio management takes a holistic view of an enterprise’s overall IT strategy, which, in turn, should be aligned with the business strategy. A business plan provides the justification for each of the projects in the project portfolio, and that is the major consideration for an IS auditor.
A local area network (LAN) administrator normally is restricted from:
A.having end-user responsibilities.
B.reporting to the end-user manager.
C.having programming responsibilities.
D.being responsible for LAN security administration.
C.having programming responsibilities.
A Local area network (LAN) Administrator is a person who manages and maintains the local network infrastructure—the interconnected computers, servers, switches, and other devices that form the backbone of communication within a specific physical area, such as an office building or campus.
A local area network (LAN) administrator should not have programming responsibilities because that could allow modification of production programs without proper separation of duties, but the LAN administrator may have end-user responsibilities.
An IS auditor identifies that reports on product profitability produced by an organization’s finance and marketing departments give different results. Further investigation reveals that the product definition being used by the two departments is different. What should the IS auditor recommend?
A.User acceptance testing occurs for all reports before release into production
B.Organizational data governance practices are put in place
C.Standard software tools are used for report development
D.Management signs-off on requirements for new reports
B.Organizational data governance practices are put in place
This choice directly addresses the problem. An organization-wide approach is needed to achieve effective management of data assets and reporting standards. This includes enforcing standard definitions of data elements, which is part of a data governance initiative.
When implementing an IT governance framework in an organization the MOST important objective is:
A.IT alignment with the business.
B.accountability.
C.value realization with IT.
D.enhancing the return on IT investments.
A.IT alignment with the business.
The goals of IT governance are to improve IT performance, deliver optimum business value and ensure regulatory compliance. The key practice in support of these goals is the strategic alignment of IT with the business. To achieve alignment, all other choices need to be tied to business practices and strategies.
Question
In a review of the human resources policies and procedures within an organization, an IS auditor is MOST concerned with the absence of a:
A.requirement for periodic job rotations.
B.process for formalized exit interviews.
C.termination checklist.
D.requirement for new employees to sign a nondisclosure agreement.
C.termination checklist.
A termination checklist is critical to ensure the logical and physical security of an enterprise. In addition to preventing the loss of enterprise property that was issued to the employee, there is the risk of unauthorized access, intellectual property theft and even sabotage by a disgruntled former employee.
When reviewing the IT strategic planning process, an IS auditor should ensure that the plan:
A.incorporates state of the art technology.
B.addresses the required operational controls.
C.articulates the IT mission and vision.
D.specifies project management practices.
C.articulates the IT mission and vision.
The IT strategic plan must include a clear articulation of the IT mission and vision.
The PRIMARY control purpose of required vacations or job rotations is to:
A.allow cross-training for development.
B.help preserve employee morale.
C.detect improper or illegal employee acts.
D.provide a competitive employee benefit.
C.detect improper or illegal employee acts.
The practice of having another individual perform a job function is a control used to detect possible irregularities or fraud.
The PRIMARY benefit of an enterprise architecture initiative is to:
A.enable the organization to invest in the most appropriate technology.
B.ensure security controls are implemented on critical platforms.
C.allow development teams to be more responsive to business requirements.
D.provide business units with greater autonomy to select IT solutions that fit their needs.
A.enable the organization to invest in the most appropriate technology.
The primary focus of the enterprise architecture (EA) is to ensure that technology investments are consistent with the platform, data and development standards of the IT organization; therefore, the goal of the EA is to help the organization to implement the technology that is most effective.
To gain an understanding of the effectiveness of an organization’s planning and management of investments in IT assets, an IS auditor should review the:
A.enterprise data model.
B.IT balanced scorecard.
C.IT organizational structure.
D.historical financial statements.
B.IT balanced scorecard.
IT balanced Scorecard measures customer satisfaction, internal processes and the ability to innovate. In this way, the auditor can measure the success of the IT investment and strategy.
The risk associated with electronic evidence gathering is MOST likely reduced by an email:
A.destruction policy.
B.security policy.
C.archive policy.
D.audit policy.
C. Archive Policy
With a policy of well-archived email records, access to or retrieval of specific email records to comply with legal requirements is possible.
Can’t be destruction because there are rules on email retention
Effective IT governance requires organizational structures and processes to ensure that:
A.risk is maintained at a level acceptable for IT management.
B.the business strategy is derived from an IT strategy.
C.IT governance is separate and distinct from the overall governance.
D.the IT strategy extends the organization’s strategies and objectives.
D.the IT strategy extends the organization’s strategies and objectives.
Effective IT governance requires that board and executive management extend governance to IT and provide the leadership, organizational structures and processes that ensure that the organization’s IT sustains and extends the organization’s strategies and objectives, and that the strategy is aligned with business strategy.
Question
Which of the following BEST supports the prioritization of new IT projects?
A.Internal control self-assessment
B.Information systems audit
C.Investment portfolio analysis
D.Business risk assessment
C.Investment portfolio analysis
An investment portfolio analysis, which will present not only a clear focus on investment strategy but also provide the rationale for terminating nonperforming IT projects.