2 - Governance and Management of IT Flashcards
PASS THE CISA
During a risk analysis, an IS auditor identifies threats and potential impacts. Next, the IS auditor should:
A.ensure the risk assessment is aligned to management’s risk assessment process.
B.identify information assets and the underlying systems.
C.disclose the threats and impacts to management.
D.identify and evaluate the existing controls.
D. identify and evaluate the existing controls.
It is important for an IS auditor to identify and evaluate the existence and effectiveness of existing and planned controls so that the risk level can be calculated after the potential threats and possible impacts are identified.
After an organization completed a threat and vulnerability analysis as part of a risk assessment, the final report suggested that an intrusion prevention system (IPS) should be installed at the main Internet gateways and that all business units should be separated via a proxy firewall. Which of the following is the BEST method to determine whether the controls should be implemented?
A. A cost-benefit analysis
B. An annual loss expectancy calculation
C. A comparison of the cost of the IPS and firewall and the cost of the business systems
D. A business impact analysis
A. A cost-benefit analysis
In a cost-benefit analysis, the total expected purchase and operational/support costs, and a qualitative value for all actions are weighted against the total expected benefits to choose the best technical, most profitable, least expensive or acceptable risk option.
The PRIMARY benefit of implementing a security program as part of a security governance framework is the:
A. alignment of the IT activities with IS audit recommendations.
B. enforcement of the management of security risk.
C. implementation of the chief information security officer’s recommendations.
D. reduction of the cost for IT security.
B. enforcement of the management of security risk.
The major benefit of implementing a security program is management’s assessment of risk and its mitigation to an appropriate level, and monitoring of the residual risk.
An IS auditor reviewing the IT organization is MOST concerned if the IT steering committee:
A. is responsible for project approval and prioritization.
B. is responsible for developing the long-term IT plan.
C. reports the status of IT projects to the board of directors.
D. is responsible for determining business goals.
D. is responsible for determining business goals.
Determining the business goals is the responsibility of senior management and not of the IT steering committee. IT should support business goals and be driven by the business—not the other way around.
Which of the following insurance types provide for a loss arising from fraudulent acts by employees?
A. Business interruption
B. Fidelity coverage
C. Errors and omissions
D. Extra expense
B. Fidelity coverage
This type of insurance covers the loss arising from dishonest or fraudulent acts by employees.
Which of the following goals do you expect to find in an organization’s strategic plan?
A. Results of new software testing
B. An evaluation of information technology needs
C. Short-term project plans for a new planning system
D. Approved suppliers for products offered by the company
D. Approved suppliers for products offered by the company
Approved suppliers of choice for the product is a strategic business objective that is intended to focus the overall direction of the business and, thus, is a part of the organization’s strategic plan.
A business unit has selected a new accounting application and did not consult with IT early in the selection process. The PRIMARY risk is that:
A. the security controls of the application may not meet requirements.
B. the application may not meet the requirements of the business users.
C. the application technology may be inconsistent with the enterprise architecture.
D. the application may create unanticipated support issues for IT.
C. the application technology may be inconsistent with the enterprise architecture.
The primary focus of the enterprise architecture (EA) is to ensure that technology investments are consistent with the platform, data and development standards of the IT organization. The EA defines both a current and future state in areas such as the use of standard platforms, databases or programming languages. If a business unit selected an application using a database or operating system that is not part of the EA for the business, this increases the cost and complexity of the solution and ultimately delivers less value to the business.
When auditing the IT governance framework and IT risk management practices that exist within an organization, the IS auditor identified some undefined responsibilities regarding IT management and governance roles. Which of the following recommendations is the MOST appropriate?
A. Review the strategic alignment of IT with the business.
B. Implement accountability rules within the organization.
C. Ensure that independent IS audits are conducted periodically.
D. Create a chief risk officer role in the organization.
B. Implement accountability rules within the organization.
IT risk is managed by embedding accountability into the enterprise. The IS auditor should recommend the implementation of accountability rules to ensure that all responsibilities are defined within the organization. Note that this question asks for the best recommendation—not about the finding itself.
Which of the following is an advantage of prototyping?
A. The finished system normally has strong internal controls.
B. Prototype systems can provide significant time and cost savings.
C. Change control is often less complicated with prototype systems.
D. It ensures that functions or extras are not added to the intended system.
B. Prototype systems can provide significant time and cost savings.
Prototype systems can provide significant time and cost savings through better user interaction and the ability to rapidly adapt to changing requirements; however, they also have several disadvantages, including loss of overall security focus, project oversight and implementation of a prototype that is not yet ready for production.
Which of the following inputs adds the MOST value to the strategic IT initiative decision-making process?
A. The maturity of the project management process
B. The regulatory environment
C. Past audit findings
D. The IT project portfolio analysis
D. The IT project portfolio analysis
Portfolio analysis provides the best input into the decision-making process relating to planning strategic IT initiatives. An analysis of the IT portfolio provides comparable information of planned initiatives, projects and ongoing IT services, which allows the IT strategy to be aligned with the business strategy.
An IS auditor is assigned to review IT structures and activities recently outsourced to various providers. Which of the following should the IS auditor determine FIRST?
A. An audit clause is present in all contracts.
B. The service level agreement of each contract is substantiated by appropriate key performance indicators.
C. The contractual warranties of the providers support the business needs of the organization.
D. At contract termination, support is guaranteed by each outsourcer for new outsourcers.
C. The contractual warranties of the providers support the business needs of the organization.
Aligns with business objectives: Ensuring that the outsourced services meet the organization’s specific needs is paramount.
Risk mitigation: By verifying that contractual warranties align with business needs, the auditor can identify potential gaps in service delivery.
Performance evaluation: Assessing the adequacy of service warranties provides a baseline for evaluating the vendor’s performance.
An IS auditor is performing a review of an organization’s governance model. Which of the following should be of MOST concern to the auditor?
A.The information security policy is not periodically reviewed by senior management.
B.A policy ensuring systems are patched in a timely manner does not exist.
C.The audit committee did not review the organization’s global mission statement.
D.An organizational policy related to information asset protection does not exist.
A.The information security policy is not periodically reviewed by senior management.
Data security policies should be reviewed/refreshed once every year to reflect changes in the organization’s environment. Policies are fundamental to the organization’s governance structure, and, therefore, this is the greatest concern.
Question
The MOST important point of consideration for an IS auditor while reviewing an enterprise’s project portfolio is that it:
A.does not exceed the existing IT budget.
B.is aligned with the investment strategy.
C.has been approved by the IT steering committee.
D.is aligned with the business plan.
D.is aligned with the business plan.
Portfolio management takes a holistic view of an enterprise’s overall IT strategy, which, in turn, should be aligned with the business strategy. A business plan provides the justification for each of the projects in the project portfolio, and that is the major consideration for an IS auditor.
A local area network (LAN) administrator normally is restricted from:
A.having end-user responsibilities.
B.reporting to the end-user manager.
C.having programming responsibilities.
D.being responsible for LAN security administration.
C.having programming responsibilities.
A Local area network (LAN) Administrator is a person who manages and maintains the local network infrastructure—the interconnected computers, servers, switches, and other devices that form the backbone of communication within a specific physical area, such as an office building or campus.
A local area network (LAN) administrator should not have programming responsibilities because that could allow modification of production programs without proper separation of duties, but the LAN administrator may have end-user responsibilities.
An IS auditor identifies that reports on product profitability produced by an organization’s finance and marketing departments give different results. Further investigation reveals that the product definition being used by the two departments is different. What should the IS auditor recommend?
A.User acceptance testing occurs for all reports before release into production
B.Organizational data governance practices are put in place
C.Standard software tools are used for report development
D.Management signs-off on requirements for new reports
B.Organizational data governance practices are put in place
This choice directly addresses the problem. An organization-wide approach is needed to achieve effective management of data assets and reporting standards. This includes enforcing standard definitions of data elements, which is part of a data governance initiative.
When implementing an IT governance framework in an organization the MOST important objective is:
A.IT alignment with the business.
B.accountability.
C.value realization with IT.
D.enhancing the return on IT investments.
A.IT alignment with the business.
The goals of IT governance are to improve IT performance, deliver optimum business value and ensure regulatory compliance. The key practice in support of these goals is the strategic alignment of IT with the business. To achieve alignment, all other choices need to be tied to business practices and strategies.
Question
In a review of the human resources policies and procedures within an organization, an IS auditor is MOST concerned with the absence of a:
A.requirement for periodic job rotations.
B.process for formalized exit interviews.
C.termination checklist.
D.requirement for new employees to sign a nondisclosure agreement.
C.termination checklist.
A termination checklist is critical to ensure the logical and physical security of an enterprise. In addition to preventing the loss of enterprise property that was issued to the employee, there is the risk of unauthorized access, intellectual property theft and even sabotage by a disgruntled former employee.
When reviewing the IT strategic planning process, an IS auditor should ensure that the plan:
A.incorporates state of the art technology.
B.addresses the required operational controls.
C.articulates the IT mission and vision.
D.specifies project management practices.
C.articulates the IT mission and vision.
The IT strategic plan must include a clear articulation of the IT mission and vision.
The PRIMARY control purpose of required vacations or job rotations is to:
A.allow cross-training for development.
B.help preserve employee morale.
C.detect improper or illegal employee acts.
D.provide a competitive employee benefit.
C.detect improper or illegal employee acts.
The practice of having another individual perform a job function is a control used to detect possible irregularities or fraud.
The PRIMARY benefit of an enterprise architecture initiative is to:
A.enable the organization to invest in the most appropriate technology.
B.ensure security controls are implemented on critical platforms.
C.allow development teams to be more responsive to business requirements.
D.provide business units with greater autonomy to select IT solutions that fit their needs.
A.enable the organization to invest in the most appropriate technology.
The primary focus of the enterprise architecture (EA) is to ensure that technology investments are consistent with the platform, data and development standards of the IT organization; therefore, the goal of the EA is to help the organization to implement the technology that is most effective.
To gain an understanding of the effectiveness of an organization’s planning and management of investments in IT assets, an IS auditor should review the:
A.enterprise data model.
B.IT balanced scorecard.
C.IT organizational structure.
D.historical financial statements.
B.IT balanced scorecard.
IT balanced Scorecard measures customer satisfaction, internal processes and the ability to innovate. In this way, the auditor can measure the success of the IT investment and strategy.
The risk associated with electronic evidence gathering is MOST likely reduced by an email:
A.destruction policy.
B.security policy.
C.archive policy.
D.audit policy.
C. Archive Policy
With a policy of well-archived email records, access to or retrieval of specific email records to comply with legal requirements is possible.
Can’t be destruction because there are rules on email retention
Effective IT governance requires organizational structures and processes to ensure that:
A.risk is maintained at a level acceptable for IT management.
B.the business strategy is derived from an IT strategy.
C.IT governance is separate and distinct from the overall governance.
D.the IT strategy extends the organization’s strategies and objectives.
D.the IT strategy extends the organization’s strategies and objectives.
Effective IT governance requires that board and executive management extend governance to IT and provide the leadership, organizational structures and processes that ensure that the organization’s IT sustains and extends the organization’s strategies and objectives, and that the strategy is aligned with business strategy.
Question
Which of the following BEST supports the prioritization of new IT projects?
A.Internal control self-assessment
B.Information systems audit
C.Investment portfolio analysis
D.Business risk assessment
C.Investment portfolio analysis
An investment portfolio analysis, which will present not only a clear focus on investment strategy but also provide the rationale for terminating nonperforming IT projects.
The MOST important element for the effective design of an information security policy is the:
A.threat landscape.
B.prior security incidents.
C.emerging technologies.
D.enterprise risk appetite.
D.enterprise risk appetite.
The risk appetite is the amount of risk that an entity is willing to accept in pursuit of its mission to meet its strategic objectives. The purpose of the information security policy is to manage information risk to an acceptable level, so that the policy is principally aligned with the risk appetite.
Not threat landscape because this can change over time
From an IT governance perspective, what is the PRIMARY responsibility of the board of directors? To ensure that the IT strategy:
A.is cost-effective.
B.is future thinking and innovative.
C.is aligned with the business strategy.
D.has the appropriate priority level assigned.
C.is aligned with the business strategy.
The board of directors is responsible for ensuring that the IT strategy is aligned with the business strategy.
An IS auditor of a large organization is reviewing the roles and responsibilities of the IT function and finds some individuals serving multiple roles. Which one of the following combinations of roles should be of GREATEST concern for the IS auditor?
A.Network administrators are responsible for quality assurance.
B.System administrators are application programmers.
C.End users are security administrators for critical applications.
D.Systems analysts are database administrators.
B.System administrators are application programmers.
This represents a separation-of-duties problem. System administrators should not be application programmers, due to the associated rights of both functions. A person with both system and programming rights can do almost anything on a system, including creating a back door.
An IS auditor has been assigned to review an organization’s information security policy. Which of the following issues represents the HIGHEST potential risk?
A.The policy has not been updated in more than one year.
B.The policy includes no revision history.
C.The policy is approved by the security administrator.
D.The company does not have an information security policy committee.
C.The policy is approved by the security administrator.
The position of security administrator is typically a staff-level position (not management), and therefore does not have the authority to approve the policy. In addition, an individual in a more independent position should also review the policy. Without proper management approval, enforcing the policy may be problematic, leading to compliance or security issues.
A financial enterprise has had difficulties establishing clear responsibilities between its IT strategy committee and its IT steering committee. Which of the following responsibilities would MOST likely be assigned to its IT steering committee?
A.Approving IT project plans and budgets
B.Aligning IT to business objectives
C.Advising on IT compliance risk
D.Promoting IT governance practices
A.Approving IT project plans and budgets
An IT steering committee typically has a variety of responsibilities, including approving IT project plans and budgets.
Issues related to business objectives, risk and governance are responsibilities that are generally assigned to an IT strategy committee, because it provides insight and advice to the board.
When reviewing the development of information security policies, the PRIMARY focus of an IS auditor should be on assuring that these policies:
A.are aligned with globally accepted industry good practices.
B.are approved by the board of directors and senior management.
C.strike a balance between business and security requirements.
D.provide direction for implementing security procedures.
C.strike a balance between business and security requirements.
Because information security policies must be aligned with an organization’s business and security objectives, this is the primary focus of the IS auditor when reviewing the development of information security policies.
Question
Which of the following is of MOST interest to an IS auditor reviewing an organization’s risk strategy?
A.All risk is mitigated effectively.
B.Residual risk is zero after control implementation.
C.All likely risk is identified and ranked.
D.The organization uses an established risk framework.
C.All likely risk is identified and ranked.
Risk that is likely to impact the organization should be identified and documented as part of the risk strategy. Without knowing the risk, there is no risk strategy.
While reviewing a quality management system, the IS auditor should PRIMARILY focus on collecting evidence to show that:
A.quality management systems comply with good practices.
B.continuous improvement targets are being monitored.
C.standard operating procedures of IT are updated annually.
D.key performance indicators are defined.
B.continuous improvement targets are being monitored.
Continuous and measurable improvement of quality is the primary requirement to achieve the business objective for the quality management system (QMS).
What is the primary focus of an IT steering committee?
Overseeing the day-to-day operations of the IT department and ensuring alignment with business strategy.
What is the primary focus of an IT strategy committee?
Developing and maintaining the long-term IT strategy for the organization.
Which committee is responsible for prioritizing IT projects based on business needs
IT Steering Committee
Which committee is typically composed of senior executives and board members?
IT Strategy Committee
A top-down approach to the development of operational policies helps to ensure:
A.that they are consistent across the organization.
B.that they are implemented as a part of risk assessment.
C.compliance with all policies.
D.that they are reviewed periodically.
Deriving lower-level policies from corporate policies (a top-down approach) aids in ensuring consistency across the organization and consistency with other policies.
What are the pros and cons of a top down approach?
Pros:
- Clear direction and focus
- Faster decision-making
- Effective in crisis situations
Cons:
- Limited employee input: Can stifle creativity and innovation.
- Potential for decreased morale: Employees may feel disengaged if not involved in decision-making.
- Risk of overlooking valuable insights from frontline employees.
What are the pros and cons of a bottom-up approach?
Pros:
- Increased employee engagement and morale: Employees feel valued and empowered.
- Generates innovative ideas and solutions
- Improves decision quality: Incorporates diverse perspectives and insights.
Cons:
- Slower decision-making process
- Potential for conflicting ideas and priorities
- Requires strong leadership to guide the process and make final decisions.
Which of the following should be of GREATEST concern to an IS auditor when reviewing an information security policy? The policy:
A.is driven by an IT department’s objectives.
B.is published, but users are not required to read the policy.
C.does not include information security procedures.
D.has not been updated in over a year.
A.is driven by an IT department’s objectives.
Business objectives drive the information security policy, and the information security policy drives the selection of IT department objectives. A policy driven by IT objectives is at risk of not being aligned with business goals.
During an audit, the IS auditor discovers that the human resources (HR) department uses a cloud-based application to manage employee records. The HR department engaged in a contract outside of the normal vendor management process and manages the application on its own. Which of the following is of GREATEST concern?
A.Maximum acceptable downtime metrics have not been defined in the contract.
B.The IT department does not manage the relationship with the cloud vendor.
C.The help desk call center is in a different country, with different privacy requirements.
D.Organization-defined security policies are not applied to the cloud application.
D.Organization-defined security policies are not applied to the cloud application.
Cloud applications should adhere to the organization-defined security policies to ensure that the data in the cloud are protected in a manner consistent with internal applications. These include, but are not limited to, the password policy, user access management policy and data classification policy.
Which of the following is MOST critical for the successful implementation and maintenance of a security policy?
A.Assimilation of the framework and intent of a written security policy by all appropriate parties
B.Management support and approval for the implementation and maintenance of a security policy
C.Enforcement of security rules by providing punitive actions for any violation of security rules
D.Stringent implementation, monitoring and enforcing of rules by the security officer through access control software
A.Assimilation of the framework and intent of a written security policy by all appropriate parties
While management support is crucial, it’s the understanding and acceptance of the policy by those who must implement and adhere to it that truly drives success. Without this assimilation, even with strong management backing, the policy’s effectiveness can be compromised.