Review Flashcards

1
Q

The success of control self-assessment depends highly on:

A

line managers assuming a portion of the responsibility for control monitoring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The primary objective of a control self-assessment (CSA) program is to leverage the internal audit function by

A

shifting some of the control monitoring responsibilities to the functional area line managers. The success of a CSA program depends on the degree to which line managers assume responsibility for controls. This enables line managers to detect and respond to control errors promptly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is MOST important for the auditor to ensure continued alignment with the enterprise’s security requirements?

A

The vendor agrees to provide annual external audit reports in the contract is correct. The only way to ensure that any potential risk is mitigated today and in the future is to include a clause within the contract that the vendor will provide future external audit reports. Without the audit clause the vendor can choose to forego future audits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Without a(n) ____________ clause in the contract, an agreement to implement controls does not provide assurance that controls will continue to be implemented in alignment with the enterprise

A

audit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

the purpose of using data flow diagrams

A

graphically summarize data paths and storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data flow diagrams are used as aids to graph or chart data flow and storage.

A

They trace data from their origination to destination, highlighting the paths and storage of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The MOST serious challenge in the operation of an intrusion detection system is

A

filtering false positive alerts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Because of the configuration and the way intrusion detection system (IDS) technology operates, the main problem in operating IDSs is the recognition (detection) of events

A

that are not really security incidents—false positives, the equivalent of a false alarm. An IS auditor needs to be aware of this and should check for implementation of related controls (such as IDS tuning) and incident handling procedures (such as the screening process) to know if an event is a security incident or a false positive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Blocking suspicious connections is a characteristic of intrusion prevention systems, which are different type of network security systems than

A

IDS (Intrusion detection system)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A company’s development team does not follow generally accepted system development life cycle practices. Which of the following is MOST likely to cause problems for software development projects?

A

Project responsibilities are not formally defined at the beginning of a project.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Errors or lack of attention in the initial phases of a project may cause

A

costly errors and inefficiencies in later phases. Proper planning is required at the beginning of a project.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Prototypes are verified

A

by users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

User acceptance testing is seldom completely successful. If errors are not critical,

A

they may be corrected after implementation without seriously affecting usage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Lack of adequate program documentation, while a concern, is

A

not as big a risk as the lack of assigned responsibilities during the initial stages of the project.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

the MOST important skill that an IS auditor should develop to understand the constraints of conducting an audit?

A

Project management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Audits often involve resource management, deliverables, scheduling and deadlines that are similar to

A

project management good practices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following BEST helps prioritize the recovery of IT assets when planning for a disaster?

A

Business impact analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Incorporating the business impact analysis (BIA) into the IT disaster recovery planning process is critical to ensure

A

that IT assets are prioritized to align with the business.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

An incident response plan is an organized approach to addressing and managing

A

a security breach or attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

An incident response plan

A

defines what constitutes an incident and the process to follow when an incident occurs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

An incident response plan

A

does NOT prioritize recovery during a disaster.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Identifying threats and analyzing risk to the business is an important part of disaster planning, but it does NOT determine the priority of recovery.

A

determine the priority of recovery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The recovery time objective (RTO) is

A

the amount of time allowed for the recovery of a business function or resource after a disaster occurs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The recovery time objective (RTO) is

A

is included as part of the BIA and used to represent the prioritization of recovery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

An IS auditor reviewing an outsourcing contract of IT facilities expects it to define the:

A

ownership of intellectual property.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

An outsourcing contract must specify

A

who owns the intellectual property (i.e., information being processed and application programs). Ownership of intellectual property is a significant cost and is a key aspect to be defined in an outsourcing contract.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Stakeholders PRIMARILY responsible for reviewing and signing-off on the accuracy and completeness of the data before going live?

A

Data owner

28
Q

An IS auditor

A

should ensure that there is a review and sign-off by the data owner during the data conversion stage of the project.

29
Q

A database administrator’s primary responsibility is to

A

maintain the integrity of the database and make the database available to users. A database administrator is not responsible for reviewing migrated data.

30
Q

A project manager provides

A

day-to-day management and leadership of the project but is not responsible for the accuracy and integrity of the data.

31
Q

Senior management should

A

establish the acceptable risk level because they have the ultimate or final responsibility for the effective and efficient operation of the organization as a senior manager of the business process. The person can be the quality assurance (QA), chief information officer (CIO), or the chief security officer (CSO), but the responsibility rests with the business manager.

32
Q

Quality assurance management is

A

is concerned with reliability and consistency of processes. The QA team is not responsible for determining an acceptable risk level.

33
Q

Establishing the level of acceptable risk is the responsibility of:

A

senior business management.

34
Q

The CIO is the

A

most senior official of the enterprise who is accountable for IT advocacy; aligning IT and business strategies; and planning, resourcing and managing the delivery of IT services, information and the deployment of associated human resources. The CIO is rarely the person that determines acceptable risk levels because this could be a conflict of interest unless the CIO is the senior business process owner.

35
Q

The chief security officer is

A

responsible for enforcing the decisions of the senior management team unless the CIO is the business process manager.

36
Q

An IS auditor reviewing the process of log monitoring wants to evaluate the organization’s manual review process. Which of the following audit techniques would the auditor MOST likely employ to fulfill this purpose?

A

Walk-through

37
Q

Walk-through procedures include

A

a combination of inquiry, observation, inspection of relevant documentation and reperformance of controls. A walk-through of the manual log review process follows the manual log review process from start to finish to gain a thorough understanding of the overall process and identify potential control weaknesses.

38
Q

Inspection

A

is just one component of a walk-through and by itself does not supply enough information to provide a full understanding of the overall process and identify potential control weaknesses.

39
Q

Inquiry

A

provides only general information on how the control is executed. It does not necessarily enable the IS auditor to determine whether the control performer has an in-depth understanding of the control.

40
Q

Reperformance of the control is carried out by

A

the IS auditor and does not provide assurance of the competency of the auditee.

41
Q

An IS auditor reviewing a cloud computing environment that is managed by a third party should be MOST concerned when

A

the service level agreement does not address the responsibility of the vendor in the case of a security breach

42
Q

The ultimate purpose of IT governance is to:

A

encourage optimal use of IT.

43
Q

IT governance is intended to

A

specify the combination of decision rights and accountability that is best for the enterprise. It is different for every enterprise.

44
Q

Parallel operation is designed to

A

provide assurance that a new system meets its functional requirements. This is the safest form of system conversion testing because, if the new system fails, the old system is still available for production use. In addition, this form of testing allows the application developers and administrators to simultaneously run operational tasks (e.g., batch jobs and backups) on both systems, to ensure that the new system is reliable before unplugging the old system.

45
Q

Parallel operation provides a high level of assurance that the new system functions properly compared to the old system. Parallel operation is generally expensive and does not provide a cost savings over most other testing approaches. In many cases, parallel operation is the most

A

expensive form of system testing due to the need for dual data entry, dual sets of hardware, dual maintenance and dual backups—it is twice the amount of work as running a production system and, therefore, costs more time and money.

46
Q

The IS auditor is reviewing a recently completed conversion to a new enterprise resource planning system. In the final stage of the conversion process, the organization ran the old and new systems in parallel for 30 days before allowing the new system to run on its own. What is the MOST significant advantage to the organization by using this strategy?

A

Assurance that the new system meets functional requirements

47
Q

Parallel operation is designed to test the application’s effectiveness and integrity of application data, not

A

hardware compatibility.

48
Q

a responsibility of the chief information security officer?

A

Periodically reviewing and evaluating the security policy

49
Q

The role of the chief information security officer is to ensure that the corporate

A

security policy and controls are adequate to prevent unauthorized access to the enterprise assets, including data, programs and equipment.

50
Q

User application and other software testing and evaluation normally are the responsibility of the

A

staff assigned to development and maintenance.

51
Q

Granting and revoking user access to IT resources

A

is usually a function of system, network or database administrators.

52
Q

Approval of access to data and applications is

A

the duty of the data or application owner.

53
Q

Which type of penetration test simulates a real attack and is used to test incident handling and response capability of the target?

A

Double-blind testing

54
Q

Double-blind testing is also known as

A

zero-knowledge testing. This refers to a test where the penetration tester is not given any information and the target organization is not given any warning—both parties are “blind” to the test. This is the best scenario for testing response capability because the target will react as if the attack were real.

55
Q

Blind testing is

A

also known as black-box testing.

56
Q

Black-box testing

A

refers to a test where the penetration tester is not given any information and is forced to rely on publicly available information. This test simulates a real attack, except that the target organization is aware of the test being conducted.

57
Q

Targeted testing is

A

also known as white-box testing

58
Q

White-box testing

A

refers to a test where the penetration tester is provided with information and the target organization is also aware of the testing activities. In some cases, the tester is also provided with a limited-privilege account to be used as a starting point.

59
Q

External testing

A

refers to a test where an external penetration tester launches attacks on the target’s network perimeter from outside the target network (typically from the Internet).

60
Q

A company has decided to implement an electronic signature scheme based on a public key infrastructure. The user’s private key will be stored on the computer’s hard drive and protected by a password. The MOST significant risk of this approach is:

A

use of the user’s electronic signature by another person if the password is compromised.

61
Q

Creating a digital signature with another user’s private key would indicate that the message

A

from a different person, and therefore, the true user’s credentials would not be forged.

62
Q

Impersonation of a user by substitution of the user’s public key with another person’s public key

A

would require the modification of the certificate issued by the certificate authority. This is very difficult and least likely.

63
Q

Forgery by substitution of another person’s private key on the computer i

A

would not work because the digital signature would be validated with the original user’s public key.

64
Q

Regarding a PIN, what is the MOST important rule to be included in a security policy?

A

Users should never write down their PIN

If a user writes their PIN on a slip of paper, an individual with the token, the slip of paper, and the computer could access the corporate network. A token and the PIN is a two-factor authentication method.

65
Q

The purpose of code signing is to provide assurance that:

A

the software has not been subsequently modified.

66
Q

Code signing ensures that the executable code came from a reputable source and

A

has not been modified after being signed.

67
Q

Code signing will provide assurance of the source but will not ensure that the source is

A

trusted. The code signing will, however, ensure that the code has not been modified.