1.1a: Risk Assessment Quiz (Doshi) Flashcards
The MOST important step in a risk analysis is to identify (from available choices):
A. competitors.
B. controls.
C. vulnerabilities.
D. liabilities.
C. vulnerabilities
If vulnerabilities are not properly identified, controls and audit planning may not be relevant. Vulnerabilities are a key element in the conduct of a risk analysis
In a risk-based audit planning, an IS auditor’s FIRST step is to identify:
A. responsibilities of stakeholders.
B. high-risk areas within the organization.
C. cost center.
D. profit center.
B. high-risk areas within the organization.
The first and most critical step in the process is to identify high-risk areas within the organization. Once high-risk areas have been identified, audit planning to be done accordingly.
When developing a risk-based audit strategy, an IS auditor should conduct a risk assessment to ensure that:
A. segregation of duties to mitigate risks is in place.
B. all the relevant vulnerabilities and threats are identified.
C. regularity compliance is adhered to.
D. business is profitable.
B. all the relevant vulnerabilities and threats are identified.
In developing a risk-based audit strategy, it is critical that the risks and vulnerabilities be understood. This will determine the areas to be audited and the extent of coverage.
IS Auditor identified certain threats and vulnerabilities in a business process. NEXT, an IS auditor should:
A. identify stakeholder for that business process.
B. identifies information assets and the underlying systems.
C. discloses the threats and impacts to management.
D. identifies and evaluates the existing controls.
D. identifies and evaluates the existing controls.
Before reaching to any conclusion, IS Auditor should evaluate existing controls and its effectiveness. Upon completion of an audit an IS auditor should describe and discuss with management the threats and potential impacts on the assets.
Major advantage of risk-based approach for audit planning is:
A. Audit planning can be communicated to client in advance.
B. Audit activity can be completed within allotted budget.
C. Use of latest technology for audit activities.
D. Appropriate utilization of resources for high risk areas.
D. Appropriate utilization of resources for high risk areas.
The risk-based approach is designed to ensure audit time is spent on the areas of highest risk. The development of an audit schedule is not addressed by a risk-based approach. Audit schedules may be prepared months in advance using various scheduling methods. A risk approach does not have a direct correlation to the audit staff meeting time budgets on a particular audit, nor does it necessarily mean a wider variety of audits will be performed in a given year.
While determining the appropriate level of protection for an information asset an IS auditor should primarily focus on:
A. Criticality of information asset.
B. Cost of information asset.
C. Owner of information asset.
D. Result of vulnerability assessment.
A. Criticality of information asset.
The appropriate level of protection for an asset is determined based on the criticality of the assets. Other factors are not that relevant as compared to sensitivity of information asset to business.
The decisions and actions of an IS auditor are MOST likely to affect which of the following risks?
A. Inherent
B. Detection
C. Control
D. Business
B. Detection
Detection risks are directly affected by the auditor’s selection of audit procedures and techniques. Inherent risks usually are not affected by the IS auditor. Control risks are controlled by the actions of the company’s management. Business risks are not affected by the IS auditor.
The risk of an IS auditor certifying existence of proper system and procedures without using an inadequate test procedure is an example of:
A. inherent risk.
B. control risk.
C. detection risk.
D. audit risk.
C. detection risk.
This is an example of detection risk. Detection risk is the risk that the auditors fail to detect a material misstatement in the financial statements
Overall business risk for a particular threat can be expressed as:
A. a product of the probability and impact.
B. probability of occurrence.
C. magnitude of impact.
D. assumption of the risk assessment team.
A. a product of the probability and impact.
Choice A takes into consideration the likelihood and magnitude of the impact and provides the best measure of the risk to an asset.
Choice B provides only the likelihood of occurrence. Similarly, choice C considers only the magnitude of the damage and not the possibility
of a threat exploiting vulnerability.
Choice D defines the risk on an arbitrary basis and is not suitable for a scientific risk management process.
An IS auditor is evaluating management’s risk assessment of information systems. The IS auditor should FIRST review:
A. the controls already in place.
B. the effectiveness of the controls in place.
C. the mechanism for monitoring the risks related to the assets.
D. the threats/vulnerabilities affecting the assets.
D. the threats/vulnerabilities affecting the assets.
One of the key factors to be considered while assessing the risks related to the use of various information systems is the threats and vulnerabilities affecting the assets. Similarly, the effectiveness of the controls should be considered during the risk mitigation stage and not during the risk assessment phase. A mechanism to continuously monitor the risks related to assets should
be put in place during the risk monitoring function that follows the risk assessment phase.
An IS Auditor is reviewing data center security review. Which of the following steps would an IS auditor normally perform FIRST:
A. Evaluate physical access control.
B. Determine the vulnerabilities/threats to the data center site.
C. Review screening process for hiring security staff
D.Evaluate logical access control.
B. Determine the risks/threats to the data center site.
During planning, the IS auditor should get an overview of the functions being audited and evaluate the audit and business risks.
Choices A and D are part of the audit fieldwork process that occurs subsequent to this planning and preparation.
Choice C is not part of a security review.
Risk assessment approach is more suitable when determining the appropriate level of protection for an information asset because it ensures:
A. all information assets are protected.
B. a basic level of protection is applied regardless of asset value.
C. appropriate levels of protection are applied to information assets.
D. only most sensitive information assets are protected.
C. appropriate levels of protection are applied to information assets.
On the basis of risk assessment, assets are classified according to its criticality. Then appropriate level of security is provided to data as per classification
In a risk-based audit approach, an IS auditor should FIRST complete a(n):
A. inherent risk assessment.
B. control risk assessment.
C. test of control assessment.
D. substantive test assessment.
A. inherent risk assessment.
The first step in a risk-based audit approach is to gather information about the business and industry to evaluate the inherent risks. After completing the assessment of the inherent risks, the next step is to complete an assessment of the internal control structure. The
controls are then tested and, on the basis of the test results, substantive tests are carried out and assessed.
In planning an audit, the MOST critical step is the identification of the:
A. areas of high risk.
B. skill sets of the audit staff.
C. test steps in the audit.
D. time allotted for the audit.
A. areas of high risk.
When designing an audit plan, it is important to identify the areas of highest risk to determine the areas to be audited. The skill sets of the audit staff should have been considered before deciding and selecting the audit. Test steps for the audit are not as critical as identifying the areas of risk, and the time allotted for an audit is determined by the areas to be audited, which are
primarily selected based on the identification of risks.
Risk assessment process is:
A. subjective.
B. objective.
C. mathematical.
D. statistical.
A. subjective.
Risk assessment is based on perception of risk officer. There is no defined mathematical or statistical formula for risk assessment. All risk assessment methodologies rely on subjective judgments at some point in the process (e.g., for assigning weightings to the various
parameters).