A2-1 - 152 Flashcards
Organizations requiring employees to take a mandatory vacation each year PRIMARILY want to ensure:
A. adequate cross-training exists between functions
B. an effective internal control environment is in place by increasing morale.
C. potential irregularities in processing are identified by a temporary replacement
D. the risk of processing errors is reduced.
C. potential irregularities in processing are identified by a temporary replacement
An IS auditor is verifying IT policies and finds that some of the policies have not been approved by management (as required by policy), but the employees strictly follow the policies. What should the IS auditor do FIRST?
A. Ignore the absence of management approval because employees follow the policies.
B. Recommend immediate management approval of the policies.
C. Emphasize the importance of approval to management
D. Report the absence of documented approval.
D. Report the absence of documented approval.
What is the PRIMARY consideration fo an IS auditor reviewing the prioritization and coordination of IT projects and program management?
A. Projects are aligned with the organization’s strategy
B. Identified project risk is monitored and mitigated
C. Controls repeated to project planning and budget are appropriate.
D. IT project metrics are reported accurately.
A. Projects are aligned with the organization’s strategy
In a review of human resource policies and procedures within an organization, an IS auditor is MOST concerned with the absence of a:
A. requirement for periodic job rotations.
B. process for formalized exit interviews
C. termination checklist
D. requirement for new employees to sign a nondisclosure agreement
C. termination checklist
Which of the following factors is MOST critical when evaluating the effectiveness of an IT governance implementation?
A. Ensure the assurance objects are defined.
B. Determine stakeholder requirements and involvement
C. Identify relevant risk and related opportunities.
D. Determine relevant enablers and their applicability.
B. Determine stakeholder requirements and involvement
Which of the following is the BEST reason to implement a policy that places conditions on secondary employment for IT employees?
A. To prevent the misuse of corporate resources
B. To prevent conflicts of interest.
C. To prevent employee performance issue
D. To prevent the theft of IT assets.
B. To prevent conflicts of interest.
An IS auditor has been assigned to review an organization’s information security policy. Which of the following issues represents the HIGHEST potential risk?
A. The policy has not been updated in more than one year.
B. The policy includes no revision history.
C. The policy is approved by the security administrator.
D. The company does not have an information security policy committee.
C. The policy is approved by the security administrator.
When performing a review of a business process re-engineering (BPR) effort, which of the following is of PRIMARY concern?
A. Controls are eliminated as part of the streamlining BPR effort.
B. Resources are not adequate to support the BPR process
C. The audit department does not have a consulting role in the BPR effort.
D. The BPR effort includes employees with limited knowledge of the process area.
A. Controls are eliminated as part of the streamlining BPR effort.
When auditing the IT governance framework and IT risk management practices existing within an organization, the IS auditor identified some undefined responsibilities regarding IT management and governance roles. Which of the following recommendations is the MOST appropriate?
A. Review the strategic alignment of IT with the business.
B. Implement accountability rules within the organization.
C. Ensure that independent IS audits are conducted periodically.
D. Create a chief risk officer role in the organization.
B. Implement accountability rules within the organization.
An IS auditor is performing a review of the software quality management process in an organization. The FIRST step should be to:
A. Verify how the organization complies the standards.
B. Identify and report the existing controls
C. Review the metrics for quality evaluation.
D. Request all standards adopted by the organization.
D. Request all standards adopted by the organization.
An IS auditor found that the enterprise architecture (EA) recently adopted by an organization has an adequate current- state representation. However, the organization has started a separate project to develop a future-state representation. The IS auditor should:
A. Recommend that this separate project be completed as soon as possible.
B. Report this issue as a finding in the audit report.
C. Recommend the adoption of the Zachmann framework.
D. Rescope the audit to include the separate project as part of the current audit.
B. Report this issue as a finding in the audit report.
An IS auditor is evaluating management’s risk assessment of information systems. The IS auditor should FIRST review:
A. Controls in place.
B. Effectiveness of the controls.
C. Mechanism for monitoring the risk.
D. Threats/vulnerabilities affecting the assets.
D. Threats/vulnerabilities affecting the assets.
The PRIMARY benefit of an enterprise architecture initiate is to:
A. Enable the organization to invest in the most appropriate technology
B. Ensure security controls are implemented on critical platforms.
C. Allow development teams to be more responsive to business requirements.
D. Provide business units with greater autonomy to select it solutions that fit their needs.
A. Enable the organization to invest in the most appropriate technology
Which of the following situations is addressed by a software escrow agreement?
A. The system administrator requires access to software to recover from a disaster.
B. A user requests to have software reloaded onto a replacement hard drive.
C. The vendor of custom-written software goes out of business.
D. An IS auditor requires
C. The vendor of custom-written software goes out of business.
An IS auditor reviews an organizational chart PRIMARILY for:
A. Understanding of the complexity of the organizational structure.
B. Investigating various communication channels.
C. Understanding the responsibilities and authority of individuals.
D. Investigating the network connected to different employees.
C. Understanding the responsibilities and authority of individuals.