Test 1 Flashcards

1
Q

In which of the following WAN message transmission technique does two network nodes establish a dedicated communications channel through the network before the nodes may communicate

A

Circuit switching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following type of network service stores information about the various resources in a central database on a network and help network devices locate services?

A

Directory Services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A computer network used for communication among the personal devices themselves (intrapersonal communication).

A

PAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A computer network in which two or more computers or communicating devices or networks which are geographically separated but in same metropolitan city

A

MAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Would be best suited to oversee the development of an information security policy?

A

Security Officers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What protocol uses serial interface for communication between two computers in WAN technology?

A

Point to point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which cloud deployment model can be shared by several organizations?

A

Community cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Who is responsible for providing technical support for the hardware and software environment by developing. installing and operating the requested system?

A

System development management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In a Data Warehouse, which layer from an enterprise data flow architecture captures all data of interest to an organization and organize it to assist in reporting and analysis?

A

Core Data Warehouse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A PRIMARY advantage of control self-assessment (CSA) techniques is that:

A

It ascertains high-risk areas that might need a detailed review later

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Main objective of a control self-assessment (CSA) program is to:

A

enhance audit responsibilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Evidence gathering to evaluate the integrity of individual transactions, data or other information is which type of testing?

A

Substantive testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An IS auditor is using a statistical sample to inventory the tape library. What type of test would this be considered?

A

Substantive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Using a statistical sample to inventory the tape library is what kind of test?

A

Substantive test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Statistical sampling reduces which risk: Detection, Inherent, Control, Audit

A

Detection risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Using a statistical sample to inventory the tape library

A

Substantive test

17
Q

With regard to confidence correlation, it can be said that if an auditor knows internal controls are strong,

A

the confidence coefficient may be lowered

18
Q

Statistical sampling reduces which of the following risk:

A

detection risk

19
Q

An IS auditor is using a statistical sample to inventory the tape library. What type of test would this be considered

A

Substantive

20
Q

Primary purpose of an audit charter is to:

A

to prescribe authority and responsibilities of audit department.

21
Q

In an audit of an inventory application, which approach would provide the BEST evidence that purchase orders are valid?

A

Testing whether inappropriate personnel can change application parameters.

22
Q

IS auditor discovered numerous customer name duplications arising from variations in customer first names. To determine the extent of the duplication, the IS auditor would use:

A

generalized audit software to search for address field duplications.

23
Q

In an IS audit of several critical servers, the IS auditor wants to analyze audit trails to discover potential anomalies in user or system behavior. Which of the following tools is MOST suitable for performing that task?

A

Trend/variance detection tools

24
Q

When developing a risk-based audit strategy, an IS auditor should conduct a risk assessment to ensure that:

A

vulnerabilities and threats are identified.

25
Q

An IS auditor has identified threats and potential impacts. Next, an IS auditor should:

A

identify and evaluate the existing controls.

26
Q

Outline the overall authority, scope and responsibilities of the audit function.

A

Audit Charter

27
Q

While planning an audit, an assessment of risk should be made to provide:

A

reasonable assurance that the audit will cover material items.

28
Q

An integrated test facility is considered a useful audit tool because it:

A

compares processing output with independently calculated data.

29
Q

The decisions and actions of an IS auditor are MOST likely to affect which of the following risks?

A

Detection

30
Q

When evaluating the collective effect of preventive, detective or corrective controls within a process, an IS auditor should be aware:

A

of the point at which controls are exercised as data flow through the system.

31
Q

The PRIMARY purpose of an audit charter is to:

A

Describe the authority and responsibilities of the audit department.

32
Q

Which one of the following could an IS auditor use to validate the effectiveness of edit and validation routines?

A

Referential integrity test