Exam 3 Flashcards
The success of control self-assessment depends highly on:
A) assigning staff managers, the responsibility for building controls.
B) the implementation of a stringent control policy and rule-driven controls.
C) line managers assuming a portion of the responsibility for control monitoring.
D) the implementation of supervision and monitoring of controls of assigned duties.
C) line managers assuming a portion of the responsibility for control monitoring.
Line managers assuming a portion of the responsibility for control monitoring is correct. The primary objective of a control self-assessment (CSA) program is to leverage the internal audit function by shifting some of the control monitoring responsibilities to the functional area line managers. The success of a CSA program depends on the degree to which line managers assume responsibility for controls. This enables line managers to detect and respond to control errors promptly.
An enterprise is looking to obtain cloud hosting services from a cloud vendor with a high level of maturity. Which of the following is MOST important for the auditor to ensure continued alignment with the enterprise’s security requirements?
A) The vendor agrees to implement controls in alignment with the enterprise.
B) The vendor agrees to provide annual external audit reports in the contract.
C) The vendor provides the latest internal audit report for verification.
D) The vendor provides the latest third- party audit report for verification.
B) The vendor agrees to provide annual external audit reports in the contract.
The vendor agrees to provide annual external audit reports in the contract is correct. The only way to ensure that any potential risk is mitigated today and in the future is to include a clause within the contract that the vendor will provide future external audit reports. Without the audit clause the vendor can choose to forego future audits.
What is the purpose of using data flow diagrams, used by the IS auditors?
A) identify key controls.
B) highlight high-level data definitions.
C) portray step-by-step details of data generation.
D) graphically summarize data paths and storage.
D) graphically summarize data paths and storage.
Graphically summarize data paths and storage is correct. Data flow diagrams are used as aids to graph or chart data flow and storage. They trace data from their origination to destination, highlighting the paths and storage of data.
The MOST serious challenge in the operation of an intrusion detection system is:
A) learning vendor specific protocols.
B) blocking eligible connections.
C) filtering false positive alerts.
D) updating vendor-specific protocols.
C) filtering false positive alerts.
Filtering false-positives alerts is correct. Because of the configuration and the way intrusion detection system (IDS) technology operates, the main problem in operating IDSs is the recognition (detection) of events that are not really security incidents—false positives, the equivalent of a false alarm. An IS auditor needs to be aware of this and should check for implementation of related controls (such as IDS tuning) and incident handling procedures (such as the screening process) to know if an event is a security incident or a false positive.
A company’s development team does not follow generally accepted system development life cycle practices. Which of the following is MOST likely to cause problems for software development projects?
A) Functional verification of the prototypes is assigned to end users.
B) Project responsibilities are not formally defined at the beginning of a project.
C) Program documentation is inadequate.
D) The project is implemented while minor issues are open from user acceptance testing.
B) Project responsibilities are not formally defined at the beginning of a project.
Project responsibilities are not formally defined at the beginning of a project is correct. Errors or lack of attention in the initial phases of a project may cause costly errors and inefficiencies in later phases. Proper planning is required at the beginning of a project.
Which of the following is the MOST important skill that an IS auditor should develop to understand the constraints of conducting an audit?
A) Allocating resources
B) Attention to detail
C) Managing audit staff
D) Project management
D) Project management
Project management is correct. Audits often involve resource management, deliverables, scheduling and deadlines that are similar to project management good practices.
Which of the following BEST helps prioritize the recovery of IT assets when planning for a disaster?
A) Business impact analysis
B) Incident response plan
C) Recovery time objective
D) Threat and risk analysis
A) Business impact analysis
Business impact analysis is correct. Incorporating the business impact analysis (BIA) into the IT disaster recovery planning process is critical to ensure that IT assets are prioritized to align with the business.
An IS auditor reviewing an outsourcing contract of IT facilities expects it to define the:
A) hardware configuration.
B) ownership of intellectual property.
C) application development methodology.
D) access control software.
B) ownership of intellectual property.
Ownership of intellectual property is correct. The contract must specify who owns the intellectual property (i.e., information being processed and application programs). Ownership of intellectual property is a significant cost and is a key aspect to be defined in an outsourcing contract.
A legacy payroll application is migrated to a new application. Which of the following stakeholders should be PRIMARILY responsible for reviewing and signing-off on the accuracy and completeness of the data before going live?
A) Project manager
B) Data owner
C) IS auditor
D) Database administrator
B) Data owner
Data owner is correct. During the data conversion stage of a project, the data owner is primarily responsible for reviewing and signing-off that the data are migrated completely and accurately and are valid.
Establishing the level of acceptable risk is the responsibility of:
A) the chief information officer.
B) quality assurance management.
C) senior business management.
D) the chief security officer.
C) senior business management.
Senior business management is correct. Senior management should establish the acceptable risk level because they have the ultimate or final responsibility for the effective and efficient operation of the organization as a senior manager of the business process. The person can be the quality assurance (QA), chief information officer (CIO), or the chief security officer (CSO), but the responsibility rests with the business manager.
An IS auditor reviewing the process of log monitoring wants to evaluate the organization’s manual review process. Which of the following audit techniques would the auditor MOST likely employ to fulfill this purpose?
A) Inquiry
B) Walk-through
C) Re-performance
D) Inspection
B) Walk-through
Walk-through is correct. These procedures usually include a combination of inquiry, observation, inspection of relevant documentation and reperformance of controls. A walk-through of the manual log review process follows the manual log review process from start to finish to gain a thorough understanding of the overall process and identify potential control weaknesses.
An IS auditor reviewing a cloud computing environment that is managed by a third party should be MOST concerned when:
A) the service level agreement does not address the responsibility of the vendor in the case of a security breach.
B) the organization is not permitted to assess the controls in the participating vendor’s site.
C) the organization is using an older version of a browser and is vulnerable to certain types of security risk.
D) laws and regulations are different in the countries of the organization and the vendor.
A) the service level agreement does not address the responsibility of the vendor in the case of a security breach.
The service level agreement does not address the responsibility of the vendor in the case of a security breach is correct. Administration of cloud computing occurs over the Internet and involves more than one participating entity. It is the responsibility of each of the partners in the cloud computing environment to take care of security issues in their own environments. When there is a security breach, the party responsible for the breach should be identified and made accountable. This is not possible if the service level agreement (SLA) does not address the responsibilities of the partners during a security breach.
The ultimate purpose of IT governance is to:
A) reduce IT costs.
B) encourage optimal use of IT.
C) centralize control of IT.
D) decentralize IT resources
B) encourage optimal use of IT.
Encourage optimal use of IT is correct. IT governance is intended to specify the combination of decision rights and accountability that is best for the enterprise. It is different for every enterprise.
Which of the following user profiles should be of MOST concern to an IS auditor when performing an audit of an electronic funds transfer (EFT) system?
A) Three users with the ability to capture and verify the messages of other users and to send their own messages
B) Five users with the ability to verify other users and to send their own messages
C) Five users with the ability to capture and send their own messages
D) Three users with the ability to capture and verify their own messages
D) Three users with the ability to capture and verify their own messages
Three users with the ability to capture and verify their own messages is correct. The ability of one individual to capture and verify their own messages represents an inadequate segregation because messages can be taken as correct and as if they had already been verified. The verification of messages should not be allowed by the person who sent the message.
The IS auditor is reviewing a recently completed conversion to a new enterprise resource planning system. In the final stage of the conversion process, the organization ran the old and new systems in parallel for 30 days before allowing the new system to run on its own. What is the MOST significant advantage to the organization by using this strategy?
A) Significant cost savings over other testing approaches
B) Assurance that new, faster hardware is compatible with the new system
C) Assurance that the new system meets functional requirements
D) Increased resiliency during the parallel processing time
C) Assurance that the new system meets functional requirements
Assurance that the new system meets functional requirements is correct. Parallel operation is designed to provide assurance that a new system meets its functional requirements. This is the safest form of system conversion testing because, if the new system fails, the old system is still available for production use. In addition, this form of testing allows the application developers and administrators to simultaneously run operational tasks (e.g., batch jobs and backups) on both systems, to ensure that the new system is reliable before unplugging the old system.
Which of the following is normally a responsibility of the chief information security officer?
A) Executing user application and software testing and evaluation
B) Granting and revoking user access to IT resources
C) Approving access to data and applications
D) Periodically reviewing and evaluating the security policy
D) Periodically reviewing and evaluating the security policy
Periodically reviewing and evaluating the security policy is correct. The role of the chief information security officer is to ensure that the corporate security policy and controls are adequate to prevent unauthorized access to the enterprise assets, including data, programs and equipment.
Which of the following types of penetration tests simulates a real attack and is used to test incident handling and response capability of the target?
A) Blind testing
B) Double-blind testing
C) External testing
D) Targeted testing
B) Double-blind testing
Double-blind testing is correct. This is also known as zero-knowledge testing. This refers to a test where the penetration tester is not given any information and the target organization is not given any warning—both parties are “blind” to the test. This is the best scenario for testing response capability because the target will react as if the attack were real.
A company has decided to implement an electronic signature scheme based on a public key infrastructure. The user’s private key will be stored on the computer’s hard drive and protected by a password. The MOST significant risk of this approach is:
A) use of the user’s electronic signature by another person if the password is compromised.
B) impersonation of a user by substitution of the user’s public key with another person’s public key.
C) forgery by using another user’s private key to sign a message with an electronic signature.
D) forgery by substitution of another person’s private key on the computer.
A) use of the user’s electronic signature by another person if the password is compromised.
Use of the user’s electronic signature by another person if the password is compromised is correct. The user’s digital signature is only protected by a password. Compromise of the password would enable access to the signature. This is the most significant risk.
Users are issued security tokens to be used in combination with a personal identification number (PIN) to access the corporate virtual private network. Regarding the PIN, what is the MOST important rule to be included in a security policy?
A) Users should never write down their PIN
B) Users must never keep the token in the same bag as their laptop computer.
C) Users should select a PIN that is completely random, with no repeating digits.
D) Users should not leave tokens where they could be stolen.
A) Users should never write down their PIN
Users should never write down their personal identification number (PIN) is correct. If a user writes their PIN on a slip of paper, an individual with the token, the slip of paper, and the computer could access the corporate network. A token and the PIN is a two-factor authentication method.
The purpose of code signing is to provide assurance that:
A) the private key of the signer has not been compromised.
B) the signer of the application is trusted.
C) the application can safely interface with another signed application.
D) the software has not been subsequently modified.
D) the software has not been subsequently modified.
The software has not been subsequently modified is correct. Code signing ensures that the executable code came from a reputable source and has not been modified after being signed.
During a human resources (HR) audit, an IS auditor is informed that there is a verbal agreement between the IT and HR departments as to the level of IT services expected. In this situation, what should the IS auditor do FIRST?
A) Draft a service level agreement for the two departments.
B) Postpone the audit until the agreement is documented.
C) Report the existence of the undocumented agreement to senior management.
D) Confirm the content of the agreement with both departments.
D) Confirm the content of the agreement with both departments.
Confirm the content of the agreement with both departments is correct. An IS auditor should first confirm and understand the current practice before making any recommendations. Part of this will be to ensure that both parties agree with the terms of the agreement.
An IS auditor has identified a business process to be audited. The IS auditor should NEXT identify the:
A) IS audit resources to be deployed.
B) most valuable information assets.
C) control objectives and activities.
D) auditee personnel to be interviewed.
C) control objectives and activities.
Control objectives and activities is correct. After the business process is identified, the IS auditor should first identify the control objectives and activities associated with the business process that should be validated in the audit.
Which of the following represents an example of a preventive control with respect to IT personnel?
A) An intrusion detection system
B) A security guard stationed at the server room door
C) Implementation of a badge entry system for the IT facility
D) A fire suppression system in the server room
C) Implementation of a badge entry system for the IT facility
Implementation of a badge entry system for the IT facility is correct. Preventive controls are used to reduce the probability of an adverse event. A badge entry system prevents unauthorized entry to the facility
The PRIMARY objective of conducting a post-implementation review for a business process automation project is to:
A) confirm compliance with regulatory requirements.
B) evaluate the adequacy of controls.
C) ensure that the project meets the intended business requirements.
D) confirm compliance with technological standards.
C) ensure that the project meets the intended business requirements.
Ensure that the project meets the intended business requirements is correct. This is the primary objective of a post-implementation review.