Chapter 4 Self Assessment Flashcards

1
Q

Which one of the following provides the BEST method for determining the level of performance provided by similar information processing facility environments?

A. User satisfaction
B. Goal accomplishment
C. Benchmarking
D. Capacity and growth planning

A

C. Benchmarking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

For mission critical systems with a low tolerance to interruption and a high cost of recovery, the IS auditor, in principle, recommends the use of which of the following recovery options?

A. Mobile site
B. Warm site
C. Cold site
D. Hot site

A

D. Hot site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is the MOST effective method for an IS auditor to use in testing the program change management process?

A. Trace from system-generated information to the change management documentation
B. Examine change management documentation for evidence ofaccuracy
C. Trace from the change management documentation to a system- generated audit trail
D. Examine change management documentation for evidence of
completeness

A

A. Trace from system-generated information to the change management documentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following would allow an enterprise to extend its intranet across the Internet to its business partners?

A. Virtual private network
B. Client-server
C. Dial-up access
D. Network service provider

A

A. Virtual private network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The classification based on criticality of a software application as part of an IS business continuity plan is determined by the:

A. nature of the business and the value of the application to the business.
B. replacement cost of the application.
C. vendor support available for the application.
D. associated threats and vulnerabilities of the application

A

A. nature of the business and the value of the application to the business.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When conducting an audit of client-server database security, the IS auditor should be MOST concerned about the availability of:

A. system utilities.
B. application program generators.
C. systems security documentation.
D. access to stored procedures.

A

A. system utilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When reviewing a network used for Internet communications, an IS auditor will FIRST examine the:

A. validity of password change occurrences.
B. architecture of the client-server application.
C. network architecture and design.
D. firewall protection and proxy servers.

A

C. network architecture and design.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An IS auditor should be involved in:

A. observing tests of the disaster recovery plan.
B. developing the disaster recovery plan.
C. maintaining the disaster recovery plan.
D. reviewing the disaster recovery requirements of supplier contracts.

A

A. observing tests of the disaster recovery plan.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data mirroring should be implemented as a recovery strategy when:

A. recovery point objective (RPO) is low.
B. recovery point objective (RPO) is high.
C. recovery time objective (RTO) is high.
D. disaster tolerance is high.

A

A. recovery point objective (RPO) is low.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following components of a business continuity plan is
PRIMARILY the responsibility of an organization’s IS department?

A. Developing the business continuity plan
B. Selecting and approving the recovery strategies used in the business continuity plan
C. Declaring a disaster
D. Restoring the IT systems and data after a disaster

A

D. Restoring the IT systems and data after a disaster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is the highest level of incident classification?

a. Major
b. Minor
c. Defined
d. Crisis

A

d. Crisis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

From an audit perspective, what best defines how current the data must be or how much data an organization can afford to lose?

a. RTO
b. RPO
c. MTD
d. WRT

A

b. RPO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following specifies the maximum elapsed time to recover an ap- plication at an alternate site?

a. RTO
b. RPO
c. MTD
d. WRT

A

a. RTO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following defines the maximum amount of time the organiza- tion can provide services at the alternate site? This value can be determined by items such as contractual values.

a. SDO
b. SLA
c. MTD
d. WRT

A

c. MTD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following activities are specifically required for critical processes and produce revenue?

a. Core processing
b. Non-discretionary processes
c. Maximum acceptable outage
d. Supporting processes

A

a. Core processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which version of RAID offers no fault tolerance?

a. RAID 0
b. RAID 1
c. RAID 10
d. RAID 15

A

a. RAID 0

17
Q

This tape-rotation scheme is named after a mathematical puzzle.

a. Grandfather, Father, Son
b. Complex
c. Simple
d. Tower of Hanoi

A

d. Tower of Hanoi

18
Q

This recovery option is sometimes referred to as a gentleman’s agreement.

a. Hot site
b. Redundant site
c. Reciprocal
d. Grandfather, father, son

A

c. Reciprocal

19
Q

Which of the following would be used to describe a non-repairable item that has reached end of life?

a. MTTR
b. MTTF
c. MTBF
d. SLA

A

b. MTTF

20
Q

Which of the following is the lowest level of incident classification?

a. Major
b. Minor
c. Negligible
d. Crisis

A

c. Negligible