ExamTopics Flashcards

1
Q

Which of the following should be of GREATEST concern to an IS auditor reviewing an organization’s business continuity plan (BCP)?

A. The BCP has not been tested since it was first issued.
B. The BCP is not version-controlled.
C. The BCP’s contact information needs to be updated.
D. The BCP has not been approved by senior management.

A

A. The BCP has not been tested since it was first issued.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following would be MOST useful when analyzing computer performance?

A. Tuning of system software to optimize resource usage.
B. Operations report of user dissatisfaction with response time.
C. Statistical metrics measuring capacity utilization.
D. Report of off-peak utilization and response time.

A

C. Statistical metrics measuring capacity utilization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is the GREATEST risk if two users have concurrent access to the same database record?
A. Entity integrity
B. Availability integrity
C. Referential integrity
D. Data integrity

A

D. Data integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is the MOST effective way for an organization to help ensure agreed-upon action plans from an IS audit will be implemented?
A. Ensure ownership is assigned.
B. Test corrective actions upon completion.
C. Ensure sufficient audit resources are allocated.
D. Communicate audit results organization-wide.

A

A. Ensure ownership is assigned.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following issues associated with a data center’s closed circuit television (CCTV) surveillance cameras should be of MOST concern to an IS auditor?
A. CCTV recordings are not regularly reviewed.
B. CCTV records are deleted after one year.
C. CCTV footage is not recorded 24 x 7.
D. CCTV cameras are not installed in break rooms.

A

A. CCTV recordings are not regularly reviewed.

Closed circuit television (CCTV) surveillance cameras are used in data centers to monitor the physical security of the facility. It is important for an IS auditor to ensure that the CCTV system is properly designed, implemented, and maintained to provide an effective level of security. Among the issues associated with CCTV surveillance cameras, the lack of regular review of CCTV recordings is the MOST concerning to an IS auditor.

Regular review of CCTV recordings is important for detecting and responding to security incidents or breaches. If the recordings are not regularly reviewed, potential security incidents may go undetected, which can lead to unauthorized access, theft, or other security breaches. Regular review of CCTV recordings is also important for compliance purposes, as it can help demonstrate compliance with regulations and industry standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An IS auditor has been asked to audit the proposed acquisition of new computer hardware. The auditor’s PRIMARY concern is that:
A. a clear business case has been established.
B. the new hardware meets established security standards.
C. a full, visible audit trail will be included.
D. the implementation plan meets user requirements.

A

A. a clear business case has been established.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

To confirm integrity for a hashed message, the receiver should use:
A. the same hashing algorithm as the sender’s to create a binary image of the file.
B. a different hashing algorithm from the sender’s to create a numerical representation of the file.
C. a different hashing algorithm from the sender’s to create a binary image of the file.
D. the same hashing algorithm as the sender’s to create a numerical representation of the file.

A

D. the same hashing algorithm as the sender’s to create a numerical representation of the file.

To verify the integrity of a message or file, the receiver should use the same hashing algorithm that was used by the sender to create the original hash value. The receiver can then apply the same algorithm to the received message or file and compare the resulting hash value with the original hash value. If the hash values match, this indicates that the message or file has not been altered in transit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An organization is implementing a new system that supports a month-end business process. Which of the following implementation strategies would be MOST efficient to decrease business downtime?
A. Cutover
B. Phased
C. Pilot
D. Parallel

A

C. Pilot

The pilot implementation strategy involves implementing the new system in a limited area or for a specific user group.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following should be the FIRST step in managing the impact of a recently discovered zero-day attack?
A. Estimating potential damage.
B. Identifying vulnerable assets.
C. Evaluating the likelihood of attack.
D. Assessing the impact of vulnerabilities.

A

B. Identifying vulnerable assets

he FIRST step in managing the impact of a recently discovered zero-day attack should be identifying vulnerable assets. This involves determining which systems and assets are potentially affected by the zero-day vulnerability, and prioritizing them based on their criticality and potential impact on the organization.

Once vulnerable assets have been identified, the organization can then take steps to mitigate the risk, such as applying vendor patches or workarounds, implementing compensating controls, or isolating or quarantining vulnerable systems.

After vulnerable assets have been identified and prioritized, the organization can then move on to other steps such as evaluating the likelihood of an attack, estimating potential damage, and assessing the impact of vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is the BEST way to ensure that an application is performing according to its specifications?
A. Pilot testing
B. System testing
C. Integration testing
D. Unit testing

A

B. System testing

The BEST way to ensure that an application is performing according to its specifications is system testing.

System testing is a testing technique that evaluates the behavior of a complete, integrated system or application against its functional and non-functional requirements. It involves testing the entire system, including all components and subsystems, to ensure that they work together as intended and meet the specified requirements.

System testing can include a wide range of testing types, such as functional testing, performance testing, security testing, and usability testing. By performing comprehensive system testing, an organization can verify that the application meets its functional requirements, performs as expected under normal and abnormal conditions, and is secure and user-friendly.

While unit testing, integration testing, and pilot testing are all important testing techniques, they may not provide a complete picture of the application’s performance in a production environment. Unit testing only tests individual units of code, integration testing only verifies the interaction between components, and pilot testing only tests the application in a limited environment. System testing is necessary to ensure that the application works as intended in its entirety.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following would be MOST effective to protect information assets in a data center from theft by a vendor?
A. Conceal data devices and information labels.
B. Issue an access card to the vendor.
C. Monitor and restrict vendor activities.
D. Restrict use of portable and wireless devices.

A

C. Monitor and restrict vendor activities.

To protect information assets in a data center from theft by a vendor, the MOST effective measure would be to monitor and restrict vendor activities (option C). This involves implementing appropriate security controls and procedures to monitor and limit the access of vendors to data center facilities and information assets.

Restricting the use of portable and wireless devices (option D) may help prevent data leakage or unauthorized access, but it does not address the risk of theft by a vendor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An employee loses a mobile device resulting in loss of sensitive corporate data. Which of the following would have BEST prevented data leakage?
A. Data encryption on the mobile device.
B. The triggering of remote data wipe capabilities.
C. Awareness training for mobile device users.
D. Complex password policy for mobile devices.

A

A. Data encryption on the mobile device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

During the evaluation of controls over a major application development project, the MOST effective use of an IS auditor’s time would be to review and evaluate:
A. cost-benefit analysis.
B. acceptance testing.
C. application test cases.
D. project plans.

A

C. application test cases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Upon completion of audit work, an IS auditor should:
A. provide a report to the auditee stating the initial findings.
B. provide a report to senior management prior to discussion with the auditee.
C. distribute a summary of general findings to the members of the auditing team.
D. review the working papers with the auditee.

A

A. provide a report to the auditee stating the initial findings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

During an IT general controls audit of a high-risk area where both internal and external audit teams are reviewing the same areas simultaneously, which of the following is the BEST approach to optimize resources?
A. Leverage the work performed by external audit for the internal audit testing.
B. Ensure both the internal and external auditors perform the work simultaneously.
C. Roll forward the general controls audit to the subsequent audit year.
D. Request that the external audit team leverage the internal audit work.

A

A. Leverage the work performed by external audit for the internal audit testing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The GREATEST benefit of using a prototyping approach in software development is that it helps to:
A. improve efficiency of quality assurance (QA) testing.
B. conceptualize and clarify requirements.
C. decrease the time allocated for user testing and review.
D. minimize scope changes to the system.

A

B. conceptualize and clarify requirements.

17
Q

After an employee termination, a network account was removed, but the application account remained active. To keep this issue from recurring, which of the following is the BEST recommendation?
A. Integrate application accounts with network single sign-on.
B. Perform periodic access reviews.
C. Retrain system administration staff.
D. Leverage shared accounts for the application.

A

B. Perform periodic access reviews.

18
Q

During an IT governance audit, an IS auditor notes that IT policies and procedures are not regularly reviewed and updated. The GREATEST concern to the IS auditor is that policies and procedures might not:
A. reflect current practices.
B. be subject to adequate quality assurance (QA).
C. include new systems and corresponding process changes.
D. incorporate changes to relevant laws.

A

A. reflect current practices.

19
Q

Management receives information indicating a high level of risk associated with potential flooding near the organization’s data center with in the next few years. As a result, a decision has been made to move data center operations to another facility on higher ground. Which approach has been adopted?
A. Risk reduction
B. Risk acceptance
C. Risk transfer
D. Risk avoidance

A

D. Risk avoidance

20
Q

An emergency power-off switch should:
A. not be in the computer room.
B. not be identified
C. be protected.
D. be illuminated.

A

C. be protected.

21
Q

Which of the following is the PRIMARY role of the IS auditor in an organization’s information classification process?
A. Securing information assets in accordance with the classification assigned.
B. Validating that assets are protected according to assigned classification.
C. Ensuring classification levels align with regulatory guidelines.
D. Defining classification levels for information assets within the organization.

A

B. Validating that assets are protected according to assigned classification.

22
Q

When evaluating whether the expected benefits of a project have been achieved, it is MOST important for an IS auditor to review:
A. the project schedule.
B. quality assurance (QA) results.
C. post-implementation issues.
D. the business case.

A

D. the business case.

23
Q

Which of the following is the MOST important reason for IS auditors to perform post-implementation reviews for critical IT projects?
A. To determine whether vendors should be paid for project deliverables.
B. To provide the audit committee with an assessment of project team performance.
C. To provide guidance on the financial return on investment (ROI) of projects.
D. To determine whether the organization’s objectives were met as expected.

A

D. To determine whether the organization’s objectives were met as expected.

24
Q

Which of the following BEST indicates that an incident management process is effective?
A. Decreased number of calls to the help desk.
B. Increased number of incidents reviewed by IT management.
C. Decreased time for incident resolution.
D. Increased number of reported critical incidents.

A

D. Increased number of reported critical incidents.

25
Q

Which of the following MOST effectively minimizes downtime during system conversions?
A. Phased approach
B. Parallel run
C. Direct cutover
D. Pilot study

A

B. Parallel run

26
Q

Which of the following would MOST effectively ensure the integrity of data transmitted over a network?
A. Message encryption
B. Steganography
C. Certificate authority (CA)
D. Message digest

A

D. Message digest

When senders want to send a message and ensure that it has not been altered, they can compute the digest of the message and send it along with the message to the receiver. When the receiver receives the message and its digest, he/she independently computes the digest of the received message and ensures that the digest computed is the same as the digest sent with the message.

27
Q

Which of the following would be MOST useful to an IS auditor assessing the effectiveness of IT resource planning?
A. Budget execution status.
B. A capacity analysis of IT operations.
C. A succession plan for key IT personnel.
D. A list of new applications to be implemented.

A

B. A capacity analysis of IT operations.

27
Q

An IS auditor is evaluating controls for monitoring the regulatory compliance of a third party that provides IT services to the organization. Which of the following should be the auditor’s GREATEST concern?
A. A gap analysis against regulatory requirements has not been conducted.
B. The third-party disclosed a policy-related issue of noncompliance.
C. The organization has not reviewed the third party’s policies and procedures.
D. The organization has not communicated regulatory requirements to the third party.

A

D. The organization has not communicated regulatory requirements to the third party.

28
Q

Which of the following is an audit reviewer’s PRIMARY role with regard to evidence?
A. Ensuring appropriate statistical sampling methods were used.
B. Ensuring evidence is labeled to show it was obtained from an approved source.
C. Ensuring unauthorized individuals do not tamper with evidence after it has been captured.
D. Ensuring evidence is sufficient to support audit conclusions.

A

D. Ensuring evidence is sufficient to support audit conclusions.

29
Q

When an intrusion into an organization’s network is detected, which of the following should be done FIRST?
A. Contact law enforcement.
B. Identify nodes that have been compromised.
C. Block all compromised network nodes.
D. Notify senior management

A

B. Identify nodes that have been compromised.

30
Q

An IS auditor is reviewing processes for importing market price data from external data providers. Which of the following findings should the auditor consider MOST critical?
A. The quality of the data is not monitored.
B. The transfer protocol does not require authentication.
C. Imported data is not disposed frequently.
D. The transfer protocol is not encrypted.

A

A. The quality of the data is not monitored.

31
Q

In a controlled application development environment, the MOST important segregation of duties should be between the person who implements changes into the production environment and the:
A. application programmer.
B. quality assurance (QA) personnel.
C. computer operator.
D. systems programmer.

A

A. application programmer.

32
Q
A