CISA Flashcards
QUESTION 1 - (Topic 1)
Structured programming is BEST described as a technique that:
A. provides knowledge of program functions to other programmers via peer reviews.
B. reduces the maintenance time of programs by the use of small-scale program modules.
C. makes the readable coding reflect as closely as possible the dynamic execution of the program.
D. controls the coding and testing of the high-level functions of the program in the development process.
Answer: B
Explanation:
A characteristic of structured programming is smaller, workable units. Structured programming has evolved because
smaller, workable units are easier to maintain. Structured programming is a style of programming which restricts the
kinds of control structures. This limitation is not crippling. Any program can be written with allowed control structures.
Structured programming is sometimes referred to as go-to-less programming, since a go-to statement is not allowed. This
is perhaps the most well known restriction of the style, since go-to statements were common at the time structured
programming was becoming more popular. Statement labels also become unnecessary, except in languages where
subroutines are identified by labels.
QUESTION 2 - (Topic 1)
After identifying potential security vulnerabilities, what should be the IS auditor’s next step?
A. To evaluate potential countermeasures and compensatory controls
B. To implement effective countermeasures and compensatory controls
C. To perform a business impact analysis of the threats that would exploit the vulnerabilities
D. To immediately advise senior management of the findings
Answer: C
Explanation: After identifying potential security vulnerabilities, the IS auditor’s next step is to perform a business impact
analysis of the threats that would exploit the vulnerabilities.
QUESTION 3 - (Topic 1) When should an application-level edit check to verify that availability of funds was completed at the electronic funds transfer (EFT) interface? A. Before transaction completion B. Immediately after an EFT is initiated C. During run-to-run total testing D. Before an EFT is initiated
Answer: D
Explanation: An application-level edit check to verify availability of funds should be completed at the electronic funds
transfer (EFT) interface before an EFT is initiated.
QUESTION 4 - (Topic 1)
Why does the IS auditor often review the system logs?
A. To get evidence of password spoofing
B. To get evidence of data copy activities
C. To determine the existence of unauthorized access to data by a user or program
D. To get evidence of password sharing
Answer: C
Explanation: When trying to determine the existence of unauthorized access to data by a user or program, the IS auditor
will often review the system logs
QUESTION 5 - (Topic 1) Which of the following is a telecommunication device that translates data from digital form to analog form and back to digital? A. Multiplexer B. Modem C. Protocol converter D. Concentrator
Answer: B
Explanation:
A modem is a device that translates data from digital to analog and back to digital.
QUESTION 6 - (Topic 1)
The initial step in establishing an information security program is the:
A. development and implementation of an information security standards manual.
B. performance of a comprehensive security control review by the IS auditor.
C. adoption of a corporate information security policy statement.
D. purchase of security access control software.
Answer: C
Explanation:
A policy statement reflects the intent and support provided by executive management for proper security and establishes
a starting point for developing the security program.
QUESTION 7 - (Topic 1)
Establishing data ownership is an important first step for which of the following processes? Choose the BEST answer.
A. Assigning user access privileges
B. Developing organizational security policies
C. Creating roles and responsibilities
D. Classifying data
Answer: D
Explanation: To properly implement data classification, establishing data ownership is an important first step.
QUESTION 8 - (Topic 1)
Which of the following is the MOST critical step in planning an audit?
A. Implementing a prescribed auditing framework such as COBIT
B. Identifying current controls
C. Identifying high-risk audit targets
D. Testing controls
Answer: C
Explanation: In planning an audit, the most critical step is identifying the areas of high risk.
QUESTION 9 - (Topic 1) What is used as a control to detect loss, corruption, or duplication of data? A. Redundancy check B. Reasonableness check C. Hash totals D. Accuracy check
Answer: C
Explanation: Hash totals are used as a control to detect loss, corruption, or duplication of
data
QUESTION 10 - (Topic 1)
Which of the following best characterizes “worms”?
A. Malicious programs that can run independently and can propagate without the aid of a carrier program such as email
B. Programming code errors that cause a program to repeatedly dump data
C. Malicious programs that require the aid of a carrier program such as email
D. Malicious programs that masquerade as common applications such as screensavers or macro-enabled Word documents
Answer: A
Explanation: Worms are malicious programs that can run independently and can propagate without the aid of a carrier program such as email
11 - (Topic 1) The use of statistical sampling procedures helps minimize: A. Detection risk B. Business risk C. Controls risk D. Compliance risk
Answer: A
Explanation: The use of statistical sampling procedures helps minimize detection risk.
QUESTION 12 - (Topic 1) Any changes in systems assets, such as replacement of hardware, should be immediately recorded within the assets inventory of which of the following? Choose the BEST answer. A. IT strategic plan B. Business continuity plan C. Business impact analysis D. Incident response plan
Answer: B
Explanation: Any changes in systems assets, such as replacement of hardware, should be immediately recorded within the assets inventory of a business continuity plan.
QUESTION 13 - (Topic 1) Which of the following hardware devices relieves the central computer from performing network control, format conversion and message handling tasks? A. Spool B. Cluster controller C. Protocol converter D. Front end processor
Answer: D
Explanation:
A front-end processor is a hardware device that connects all communication lines to a central computer to relieve the central computer.
QUESTION 14 - (Topic 1)
What kind of testing should programmers perform following any changes to an application or system?
A. Unit, module, and full regression testing
B. Module testing
C. Unit testing
D. Regression testing
Answer: A
Explanation: Programmers should perform unit, module, and full regression testing following any changes to an
application or system.
QUESTION 15 - (Topic 1) For which of the following applications would rapid recovery be MOST crucial? A. Point-of-sale system B. Corporate planning C. Regulatory reporting D. Departmental chargeback
Answer: A
Explanation:
A point-of-sale system is a critical online system that when inoperable will jeopardize the ability of Company.com to
generate revenue and track inventory properly.
QUESTION 16 - (Topic 1)
________________ (fill in the blank) is/are ultimately accountable for the functionality, reliability, and security within IT governance. Choose the BEST answer.
A. Data custodians
B. The board of directors and executive officers
C. IT security administration
D. Business unit managers
Answer: B
Explanation: The board of directors and executive officers are ultimately accountable for the functionality, reliability,
and security within IT governance.
QUESTION 17 - (Topic 1) Which of the following is MOST is critical during the business impact assessment phase of business continuity planning? A. End-user involvement B. Senior management involvement C. Security administration involvement D. IS auditing involvement
Answer: A
Explanation: End-user involvement is critical during the business impact assessment phase of business continuity
planning.
QUESTION 18 - (Topic 1)
What is the recommended initial step for an IS auditor to implement continuous-monitoring systems?
A. Document existing internal controls
B. Perform compliance testing on internal controls
C. Establish a controls-monitoring steering committee
D. Identify high-risk areas within the organization
Answer: D
Explanation: When implementing continuous-monitoring systems, an IS auditor’s first step is to identify high risk areas within the organization.
QUESTION 19 - (Topic 1)
Which of the following is a guiding best practice for implementing logical access controls?
A. Implementing the Biba Integrity Model
B. Access is granted on a least-privilege basis, per the organization’s data owners
C. Implementing the Take-Grant access control model
D. Classifying data according to the subject’s requirements
Answer: B
Explanation: Logical access controls should be reviewed to ensure that access is granted on a least-privilege basis, per the organization’s data owners.
QUESTION 20 - (Topic 1)
Which of the following is an effective method for controlling downloading of files via FTP? Choose the BEST answer.
A. An application-layer gateway, or proxy firewall, but not stateful inspection firewalls
B. An application-layer gateway, or proxy firewall
C. A circuit-level gateway
D. A first-generation packet-filtering firewall
Answer: B
Explanation: Application-layer gateways, or proxy firewalls, are an effective method for controlling downloading of files via FTP. Because FTP is an OSI application-layer protocol, the most effective firewall needs to be capable of inspecting through the application layer.
QUESTION 21 - (Topic 1)
When participating in a systems-development project, an IS auditor should focus on system controls rather than ensuring that adequate and complete documentation exists for all projects. True or false?
A. True
B. False
Answer: B
Explanation: When participating in a systems-development project, an IS auditor should also strive to ensure that
adequate and complete documentation exists for all projects.
QUESTION 22 - (Topic 1)
Fourth-Generation Languages (4GLs) are most appropriate for designing the application’s graphical user interface (GUI).
They are inappropriate for designing any intensive data-calculation procedures. True or false?
A. True
B. False
Answer: A
Explanation: Fourth-generation languages(4GLs) are most appropriate for designing the application’s graphical user
interface (GUI). They are inappropriate for designing any
intensive data-calculation procedures.
QUESTION 23 - (Topic 1) Which of the following can help detect transmission errors by appending specially calculated bits onto the end of each segment of data? A. Redundancy check B. Completeness check C. Accuracy check D. Parity check
Answer: A
Explanation: A redundancy check can help detect transmission errors by appending especially calculated bits onto the
end of each segment of data
QUESTION 24 - (Topic 1) If an IS auditor observes that individual modules of a system perform correctly in development project tests, the auditor should inform management of the positive results and recommend further: A. Documentation development B. Comprehensive integration testing C. Full unit testing D. Full regression testing
Answer: B
Explanation: If an IS auditor observes that individual modules of a system perform correctly in development project tests, the auditor should inform management of the positive results and recommend further comprehensive integration testing.