Chapter 2 Self Assessment Flashcards
In order for management to effectively monitor the compliance of processes and applications, which of the following would be the MOST ideal?
A. A central document repository
B. A knowledge management system
C. A dashboard
D. Benchmarking
C. A dashboard
Which of the following would be included in an IS strategic plan?
A. Specifications for planned hardware purchases
B. Analysis of future business objectives
C. Target dates for development projects
D. Annual budgetary targets for the IT department
B. Analysis of future business objectives
Which of the following BEST describes an IT department’s strategic planning process?
A. The IT department will have either short- or long-range plans depending on the organization’s broader plans and objectives.
B. The IT department’s strategic plan must be time- and project- oriented but not so detailed as to address and help determine priorities to meet business needs.
C. Long-range planning for the IT department should recognize organizational goals, technological advances and regulatory requirements.
D. Short-range planning for the IT department does not need to be integrated into the short-range plans of the organization since technological advances will drive the IT department plans much quicker than organizational plans.
C. Long-range planning for the IT department should recognize organizational goals, technological advances and regulatory requirements.
The MOST important responsibility of a data security officer in an organization is:
A. recommending and monitoring data security policies.
B. promoting security awareness within the organization.
C. establishing procedures for IT security policies.
D. administering physical and logical access controls.
A. recommending and monitoring data security policies.
What is considered the MOST critical element for the successful implementation of an information security program?
A. An effective enterprise risk management framework (ERM)
B. Senior management commitment
C. An adequate budgeting process
D. Meticulous program planning
B. Senior management commitment
An IS auditor should ensure that IT governance performance measures:
A. evaluate the activities of IT oversight committees.
B. provide strategic IT drivers.
C. adhere to regulatory reporting standards and definitions.
D. evaluate the IT department.
A. evaluate the activities of IT oversight committees.
Which of the following tasks may be performed by the same person in a well- controlled information processing computer center?
A. Security administration and change management
B. Computer operations and system development
C. System development and change management
D. System development and system maintenance
D. System development and system maintenance
Which of the following is the MOST critical control over database administration (DBA)?
A. Approval of DBA activities
B. Segregation of duties in regard to access rights granting/revoking
C. Review of access logs and activities
D. Review of the use of database tools
B. Segregation of duties in regard to access rights granting/revoking
When a complete segregation of duties cannot be achieved in an online system environment, which of the following functions should be separated from the others?
A. Origination
B. Authorization
C. Recording
D. Correction
B. Authorization
In a small organization where segregation of duties (SoD) is not practical, an employee performs the function of computer operator and application programmer. Which of the following controls should the IS auditor recommend?
A. Automated logging of changes to development libraries
B. Additional staff to provide SoD
C. Procedures that verify that only approved program changes are implemented
D. Access controls to prevent the operator from making program modifications
C. Procedures that verify that only approved program changes are implemented
Which of the following control documents describes a software-improvement process that is characterized by five levels, where each level describes a higher level of maturity?
A. ISO 17799
B. CMM
C. COSO
D. CobiT
B. CMM
A network administrator should not share the duties of which of the following roles?
A. Quality assurance
B. Systems administrator
C. Application programmer
D. Systems analyst
C. Application programmer
You are auditing a credit card payment system. Which of the following methods provides the best assurance that information is entered correctly?
A. Audit trails
B. Separation of data entry and computer operator duties
C. Key verification
D. Supervisory review
C. Key verification
Which level of the CMM is characterized by its capability to measure results by qualitative measures?
A. Level 1
B. Level 2
C. Level 3
D. Level 4
C. Level 3
Which of the following is most closely associated with bottom-up policy development?
A. Aligns policy with strategy
B. Is a very slow process
C. Does not address concerns of employees
D. Involves risk assessment
D. Involves risk assessment