Chapter 2 Self Assessment Flashcards

1
Q

In order for management to effectively monitor the compliance of processes and applications, which of the following would be the MOST ideal?

A. A central document repository
B. A knowledge management system
C. A dashboard
D. Benchmarking

A

C. A dashboard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following would be included in an IS strategic plan?

A. Specifications for planned hardware purchases
B. Analysis of future business objectives
C. Target dates for development projects
D. Annual budgetary targets for the IT department

A

B. Analysis of future business objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following BEST describes an IT department’s strategic planning process?

A. The IT department will have either short- or long-range plans depending on the organization’s broader plans and objectives.
B. The IT department’s strategic plan must be time- and project- oriented but not so detailed as to address and help determine priorities to meet business needs.
C. Long-range planning for the IT department should recognize organizational goals, technological advances and regulatory requirements.
D. Short-range planning for the IT department does not need to be integrated into the short-range plans of the organization since technological advances will drive the IT department plans much quicker than organizational plans.

A

C. Long-range planning for the IT department should recognize organizational goals, technological advances and regulatory requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The MOST important responsibility of a data security officer in an organization is:

A. recommending and monitoring data security policies.
B. promoting security awareness within the organization.
C. establishing procedures for IT security policies.
D. administering physical and logical access controls.

A

A. recommending and monitoring data security policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is considered the MOST critical element for the successful implementation of an information security program?

A. An effective enterprise risk management framework (ERM)
B. Senior management commitment
C. An adequate budgeting process
D. Meticulous program planning

A

B. Senior management commitment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An IS auditor should ensure that IT governance performance measures:

A. evaluate the activities of IT oversight committees.
B. provide strategic IT drivers.
C. adhere to regulatory reporting standards and definitions.
D. evaluate the IT department.

A

A. evaluate the activities of IT oversight committees.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following tasks may be performed by the same person in a well- controlled information processing computer center?

A. Security administration and change management
B. Computer operations and system development
C. System development and change management
D. System development and system maintenance

A

D. System development and system maintenance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following is the MOST critical control over database administration (DBA)?

A. Approval of DBA activities
B. Segregation of duties in regard to access rights granting/revoking
C. Review of access logs and activities
D. Review of the use of database tools

A

B. Segregation of duties in regard to access rights granting/revoking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When a complete segregation of duties cannot be achieved in an online system environment, which of the following functions should be separated from the others?

A. Origination
B. Authorization
C. Recording
D. Correction

A

B. Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In a small organization where segregation of duties (SoD) is not practical, an employee performs the function of computer operator and application programmer. Which of the following controls should the IS auditor recommend?

A. Automated logging of changes to development libraries
B. Additional staff to provide SoD
C. Procedures that verify that only approved program changes are implemented
D. Access controls to prevent the operator from making program modifications

A

C. Procedures that verify that only approved program changes are implemented

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following control documents describes a software-improvement process that is characterized by five levels, where each level describes a higher level of maturity?

A. ISO 17799
B. CMM
C. COSO
D. CobiT

A

B. CMM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A network administrator should not share the duties of which of the following roles?

A. Quality assurance
B. Systems administrator
C. Application programmer
D. Systems analyst

A

C. Application programmer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

You are auditing a credit card payment system. Which of the following methods provides the best assurance that information is entered correctly?

A. Audit trails
B. Separation of data entry and computer operator duties
C. Key verification
D. Supervisory review

A

C. Key verification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which level of the CMM is characterized by its capability to measure results by qualitative measures?

A. Level 1
B. Level 2
C. Level 3
D. Level 4

A

C. Level 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following is most closely associated with bottom-up policy development?

A. Aligns policy with strategy
B. Is a very slow process
C. Does not address concerns of employees
D. Involves risk assessment

A

D. Involves risk assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following offers the best explanation of a balanced score card?

A. Used for benchmarking a preferred level of service
B. Used to measure the effectiveness of IT services by customers and clients
C. Verifies that the organization’s strategy and IT services match
D. Measures the evaluation of help-desk employees

A

C. Verifies that the organization’s strategy and IT services match

17
Q

Your organization is considering using a new ISP now that the current contract is complete. From an audit perspective, which of the following would be the most important item to review?

A. The service level agreement
B. The physical security of the ISP site
C. References from other clients of the ISP
D. Background checks of the ISP’s employees

A

A. The service level agreement

18
Q

Separation of duties is one way to limit fraud and misuse. Of the four separation-of-duties con- trols, which most closely matches this explanation: “This control allows employees access to cash or valuables”?

A. Authorization
B. Custody
C. Record keeping
D. Reconciliation

A

B. Custody

19
Q

Which of the following job roles can be combined to create the least amount of risk or opportunity for malicious acts?

A. Systems analyst and quality assurance
B. Computer operator and systems programmer
C. Security administrator and application programmer
D. Database administrator and systems analyst

A

D. Database administrator and systems analyst

20
Q

You have been asked to perform a new audit assignment. Your first task is to review the organiza- tion’s strategic plan. Which of the following should be the first item reviewed?

A. Documentation that details the existing infrastructure
B. Previous and planned budgets
C. Organizational charts
D. The business plan

A

D. The business plan