Domain 4: Information Systems Operations and Business Resilience- PART 4A Flashcards
An advantage of using unshielded twisted-pair (UTP) cable for data communication over other copper-based cables is that UTP cable:
Reduces crosstalk between pairs.
Although management has stated otherwise, an IS auditor has reasons to believe that the organization is using software that is not licensed. In this situation, the IS auditor should FIRST:
Verify the software is in use through testing.
The application systems of an organization using open-source software have no single recognized developer producing patches. Which of the following would be the MOST secure way of updating open- source software?
Identify and test suitable patches before applying them.
As part of the business continuity planning process, which of the following should be identified FIRST in the business impact analysis?
Critical business processes for ascertaining the priority for recovery
Authorizing access to application data is the responsibility of the:
Data owner.
A batch transaction job failed in production; however, the same job returned no issues during user acceptance testing (UAT). Analysis of the production batch job indicates that it was altered after UAT. Which of the following ways would be the BEST to mitigate this risk in the future?
Ensure that developers do not have access to code after testing.
The BEST audit procedure to determine if unauthorized changes have been made to production code is to:
examine object code to find instances of changes and trace them back to change control records.
Business units are concerned about the performance of a newly implemented system. Which of the following should an IS auditor recommend?
Develop a baseline and monitor system usage.
A clerk changed the interest rate for a loan on a master file. The rate entered is outside the normal range for such a loan. Which of the following controls is MOST effective in providing reasonable assurance that the change was authorized?
The system will not process the change until the clerk’s manager confirms the change by entering an approval code.
Code erroneously excluded from a production release was subsequently moved into the production environment, bypassing normal change procedures. Which of the following choices is of MOST concern to the IS auditor performing a postimplementation review?
The change did not have change management approval.
A database administrator (DBA) who needs to make emergency changes to a database after normal working hours should log in:
With their named account to make the changes.
A database administrator has detected a performance problem with some tables, which could be solved through denormalization. This situation will increase the risk of:
a loss of data integrity.
The database administrator suggests that database efficiency can be improved by denormalizing some tables. This would result in:
increased redundancy.
Data flow diagrams are used by IS auditors to:
graphically summarize data paths and storage.
Doing which of the following during peak production hours could result in unexpected downtime?
Doing which of the following during peak production hours could result in unexpected downtime?
Due to resource constraints, a developer requires full access to production data to support certain problems reported by production users. Which of the following choices would be a good compensating control for controlling unauthorized changes in production?
Provide and monitor separate developer login IDs for programming and for production support
During a change control audit of a production system, an IS auditor finds that the change management process is not formally documented and that some migration procedures failed. What should the IS auditor do next?
Gain more assurance on the findings through root cause analysis.
During a data center audit, an IS auditor observes that some parameters in the tape management system are set to bypass or ignore tape header records. Which of the following is the MOST effective compensating control for this weakness?
Staging and job setup
During a human resources (HR) audit, an IS auditor is informed that there is a verbal agreement between the IT and HR departments as to the level of IT services expected. In this situation, what should the IS auditor do FIRST?
Confirm the content of the agreement with both departments.
During an application audit, an IS auditor is asked to provide assurance of the database referential integrity. Which of the following should be reviewed?
Foreign key structure
During an application audit, the IS auditor finds several problems related to corrupt data in the database. Which of the following is a CORRECTIVE control that the IS auditor should recommend?
Proceed with restore procedures.
During an assessment of software development practices, an IS auditor finds that open source software components were used in an application designed for a client. What is the GREATEST concern the auditor would have about the use of open source software?
The organization and client must comply with open source software license terms.
During an audit of a small company that provides medical transcription services, an IS auditor observes several issues related to the backup and restore process. Which of the following should be the auditor’s GREATEST concern?
The company stores transcription backup tapes offsite using a third-party service provider, which inventories backup tapes annually.
During an audit of a small enterprise, the IS auditor noted that the IS director has superuser-privilege access that allows the director to process requests for changes to the application access roles (access types). Which of the following should the IS auditor recommend?
Implement a properly documented process for application role change requests.