CISA Flashcards
QUESTION 1 - (Topic 1)
Structured programming is BEST described as a technique that:
A. provides knowledge of program functions to other programmers via peer reviews.
B. reduces the maintenance time of programs by the use of small-scale program modules.
C. makes the readable coding reflect as closely as possible the dynamic execution of the program.
D. controls the coding and testing of the high-level functions of the program in the development process.
Answer: B
Explanation:
A characteristic of structured programming is smaller, workable units. Structured programming has evolved because
smaller, workable units are easier to maintain. Structured programming is a style of programming which restricts the
kinds of control structures. This limitation is not crippling. Any program can be written with allowed control structures.
Structured programming is sometimes referred to as go-to-less programming, since a go-to statement is not allowed. This
is perhaps the most well known restriction of the style, since go-to statements were common at the time structured
programming was becoming more popular. Statement labels also become unnecessary, except in languages where
subroutines are identified by labels.
QUESTION 2 - (Topic 1)
After identifying potential security vulnerabilities, what should be the IS auditor’s next step?
A. To evaluate potential countermeasures and compensatory controls
B. To implement effective countermeasures and compensatory controls
C. To perform a business impact analysis of the threats that would exploit the vulnerabilities
D. To immediately advise senior management of the findings
Answer: C
Explanation: After identifying potential security vulnerabilities, the IS auditor’s next step is to perform a business impact
analysis of the threats that would exploit the vulnerabilities.
QUESTION 3 - (Topic 1) When should an application-level edit check to verify that availability of funds was completed at the electronic funds transfer (EFT) interface? A. Before transaction completion B. Immediately after an EFT is initiated C. During run-to-run total testing D. Before an EFT is initiated
Answer: D
Explanation: An application-level edit check to verify availability of funds should be completed at the electronic funds
transfer (EFT) interface before an EFT is initiated.
QUESTION 4 - (Topic 1)
Why does the IS auditor often review the system logs?
A. To get evidence of password spoofing
B. To get evidence of data copy activities
C. To determine the existence of unauthorized access to data by a user or program
D. To get evidence of password sharing
Answer: C
Explanation: When trying to determine the existence of unauthorized access to data by a user or program, the IS auditor
will often review the system logs
QUESTION 5 - (Topic 1) Which of the following is a telecommunication device that translates data from digital form to analog form and back to digital? A. Multiplexer B. Modem C. Protocol converter D. Concentrator
Answer: B
Explanation:
A modem is a device that translates data from digital to analog and back to digital.
QUESTION 6 - (Topic 1)
The initial step in establishing an information security program is the:
A. development and implementation of an information security standards manual.
B. performance of a comprehensive security control review by the IS auditor.
C. adoption of a corporate information security policy statement.
D. purchase of security access control software.
Answer: C
Explanation:
A policy statement reflects the intent and support provided by executive management for proper security and establishes
a starting point for developing the security program.
QUESTION 7 - (Topic 1)
Establishing data ownership is an important first step for which of the following processes? Choose the BEST answer.
A. Assigning user access privileges
B. Developing organizational security policies
C. Creating roles and responsibilities
D. Classifying data
Answer: D
Explanation: To properly implement data classification, establishing data ownership is an important first step.
QUESTION 8 - (Topic 1)
Which of the following is the MOST critical step in planning an audit?
A. Implementing a prescribed auditing framework such as COBIT
B. Identifying current controls
C. Identifying high-risk audit targets
D. Testing controls
Answer: C
Explanation: In planning an audit, the most critical step is identifying the areas of high risk.
QUESTION 9 - (Topic 1) What is used as a control to detect loss, corruption, or duplication of data? A. Redundancy check B. Reasonableness check C. Hash totals D. Accuracy check
Answer: C
Explanation: Hash totals are used as a control to detect loss, corruption, or duplication of
data
QUESTION 10 - (Topic 1)
Which of the following best characterizes “worms”?
A. Malicious programs that can run independently and can propagate without the aid of a carrier program such as email
B. Programming code errors that cause a program to repeatedly dump data
C. Malicious programs that require the aid of a carrier program such as email
D. Malicious programs that masquerade as common applications such as screensavers or macro-enabled Word documents
Answer: A
Explanation: Worms are malicious programs that can run independently and can propagate without the aid of a carrier program such as email
11 - (Topic 1) The use of statistical sampling procedures helps minimize: A. Detection risk B. Business risk C. Controls risk D. Compliance risk
Answer: A
Explanation: The use of statistical sampling procedures helps minimize detection risk.
QUESTION 12 - (Topic 1) Any changes in systems assets, such as replacement of hardware, should be immediately recorded within the assets inventory of which of the following? Choose the BEST answer. A. IT strategic plan B. Business continuity plan C. Business impact analysis D. Incident response plan
Answer: B
Explanation: Any changes in systems assets, such as replacement of hardware, should be immediately recorded within the assets inventory of a business continuity plan.
QUESTION 13 - (Topic 1) Which of the following hardware devices relieves the central computer from performing network control, format conversion and message handling tasks? A. Spool B. Cluster controller C. Protocol converter D. Front end processor
Answer: D
Explanation:
A front-end processor is a hardware device that connects all communication lines to a central computer to relieve the central computer.
QUESTION 14 - (Topic 1)
What kind of testing should programmers perform following any changes to an application or system?
A. Unit, module, and full regression testing
B. Module testing
C. Unit testing
D. Regression testing
Answer: A
Explanation: Programmers should perform unit, module, and full regression testing following any changes to an
application or system.
QUESTION 15 - (Topic 1) For which of the following applications would rapid recovery be MOST crucial? A. Point-of-sale system B. Corporate planning C. Regulatory reporting D. Departmental chargeback
Answer: A
Explanation:
A point-of-sale system is a critical online system that when inoperable will jeopardize the ability of Company.com to
generate revenue and track inventory properly.
QUESTION 16 - (Topic 1)
________________ (fill in the blank) is/are ultimately accountable for the functionality, reliability, and security within IT governance. Choose the BEST answer.
A. Data custodians
B. The board of directors and executive officers
C. IT security administration
D. Business unit managers
Answer: B
Explanation: The board of directors and executive officers are ultimately accountable for the functionality, reliability,
and security within IT governance.
QUESTION 17 - (Topic 1) Which of the following is MOST is critical during the business impact assessment phase of business continuity planning? A. End-user involvement B. Senior management involvement C. Security administration involvement D. IS auditing involvement
Answer: A
Explanation: End-user involvement is critical during the business impact assessment phase of business continuity
planning.
QUESTION 18 - (Topic 1)
What is the recommended initial step for an IS auditor to implement continuous-monitoring systems?
A. Document existing internal controls
B. Perform compliance testing on internal controls
C. Establish a controls-monitoring steering committee
D. Identify high-risk areas within the organization
Answer: D
Explanation: When implementing continuous-monitoring systems, an IS auditor’s first step is to identify high risk areas within the organization.
QUESTION 19 - (Topic 1)
Which of the following is a guiding best practice for implementing logical access controls?
A. Implementing the Biba Integrity Model
B. Access is granted on a least-privilege basis, per the organization’s data owners
C. Implementing the Take-Grant access control model
D. Classifying data according to the subject’s requirements
Answer: B
Explanation: Logical access controls should be reviewed to ensure that access is granted on a least-privilege basis, per the organization’s data owners.
QUESTION 20 - (Topic 1)
Which of the following is an effective method for controlling downloading of files via FTP? Choose the BEST answer.
A. An application-layer gateway, or proxy firewall, but not stateful inspection firewalls
B. An application-layer gateway, or proxy firewall
C. A circuit-level gateway
D. A first-generation packet-filtering firewall
Answer: B
Explanation: Application-layer gateways, or proxy firewalls, are an effective method for controlling downloading of files via FTP. Because FTP is an OSI application-layer protocol, the most effective firewall needs to be capable of inspecting through the application layer.
QUESTION 21 - (Topic 1)
When participating in a systems-development project, an IS auditor should focus on system controls rather than ensuring that adequate and complete documentation exists for all projects. True or false?
A. True
B. False
Answer: B
Explanation: When participating in a systems-development project, an IS auditor should also strive to ensure that
adequate and complete documentation exists for all projects.
QUESTION 22 - (Topic 1)
Fourth-Generation Languages (4GLs) are most appropriate for designing the application’s graphical user interface (GUI).
They are inappropriate for designing any intensive data-calculation procedures. True or false?
A. True
B. False
Answer: A
Explanation: Fourth-generation languages(4GLs) are most appropriate for designing the application’s graphical user
interface (GUI). They are inappropriate for designing any
intensive data-calculation procedures.
QUESTION 23 - (Topic 1) Which of the following can help detect transmission errors by appending specially calculated bits onto the end of each segment of data? A. Redundancy check B. Completeness check C. Accuracy check D. Parity check
Answer: A
Explanation: A redundancy check can help detect transmission errors by appending especially calculated bits onto the
end of each segment of data
QUESTION 24 - (Topic 1) If an IS auditor observes that individual modules of a system perform correctly in development project tests, the auditor should inform management of the positive results and recommend further: A. Documentation development B. Comprehensive integration testing C. Full unit testing D. Full regression testing
Answer: B
Explanation: If an IS auditor observes that individual modules of a system perform correctly in development project tests, the auditor should inform management of the positive results and recommend further comprehensive integration testing.
QUESTION 25 - (Topic 1)
The quality of the metadata produced from a data warehouse is _______________ in the warehouse’s design. Choose the
BEST answer.
A. Often hard to determine because the data is derived from a heterogeneous data
environment
B. The most important consideration
C. Independent of the quality of the warehoused databases
D. Of secondary importance to data warehouse content
Answer: B
Explanation: The quality of the metadata produced from a data warehouse is the most important consideration in the
warehouse’s design.
QUESTION 26 - (Topic 1)
What protects an application purchaser’s ability to fix or change an application in case the application vendor goes out of business?
A. Assigning copyright to the organization
B. Program back doors
C. Source code escrow
D. Internal programming expertise
Answer: C
Explanation: Source code escrow protects an application purchaser’s ability to fix or change an application in case the application vendor goes out of business.
QUESTION 27 - (Topic 1) Which of the following devices extends the network and has the capacity to store frames and act as a storage and forward device? A. Router B. Bridge C. Repeater D. Gateway
Answer: B
Explanation:
A bridge connects two separate networks to form a logical network (e.g., joining an ethernet and token network) and has the storage capacity to store frames and act as a storage and forward device. Bridges operate at the OSI data link layer by examining the media access control header of a data packet.
QUESTION 28 - (Topic 1)
What is essential for the IS auditor to obtain a clear understanding of network management?
A. Security administrator access to systems
B. Systems logs of all hosts providing application services
C. A graphical map of the network topology
D. Administrator access to systems
Answer: C
Explanation: A graphical interface to the map of the network topology is essential for the IS auditor to obtain a clear understanding of net work management.
QUESTION 29 - (Topic 1)
What is often the most difficult part of initial efforts in application development? Choose the BEST answer.
A. Configuring software
B. Planning security
C. Determining time and resource requirements
D. Configuring hardware
Answer: C
Explanation: Determining time and resource requirements for an application-development project is often the most
difficult part of initial efforts in application development.
QUESTION 30 - (Topic 1) What kind of protocols does the OSI Transport Layer of the TCP/IP protocol suite provide to ensure reliable communication? A. Nonconnection-oriented protocols B. Connection-oriented protocols C. Session-oriented protocols D. Nonsession-oriented protocols
Answer: B
Explanation: The transport layer of the TCP/IP protocol suite provides for connection-oriented protocols to ensure
reliable communication.
QUESTION 31 - (Topic 1) Which of the following provides the BEST single-factor authentication? A. Biometrics B. Password C. Token D. PIN
Answer: A
Explanation: Although biometrics provides only single-factor authentication, many consider it to be an excellent method for user authentication.
QUESTION 32 - (Topic 1)
IS auditors are MOST likely to perform compliance tests of internal controls if, after their initial evaluation of the
controls, they conclude that control risks are within the acceptable limits. True or false?
A. True
B. False
Answer: A
Explanation: IS auditors are most likely to perform compliance tests of internal controls if, after their initial evaluation of the controls, they conclude that control risks are within the acceptable limits. Think of it this way: If any reliance is placed on internal controls, that reliance must be validated through compliance testing. High control risk results in little reliance on internal controls, which results in additional substantive testing.
QUESTION 33 - (Topic 1)
Why is a clause for requiring source code escrow in an application vendor agreement important?
A. To segregate systems development and live environments
B. To protect the organization from copyright disputes
C. To ensure that sufficient code is available when needed
D. To ensure that the source code remains available even if the application vendor goes out of business
Answer: D
Explanation: A clause for requiring source code escrow in an application vendor agreement is important to ensure that the source code remains available even if the application vendor goes out of business.
QUESTION 34 - (Topic 1)
Which of the following could lead to an unintentional loss of confidentiality? Choose the BEST answer.
A. Lack of employee awareness of a company’s information security policy
B. Failure to comply with a company’s information security policy
C. A momentary lapse of reason
D. Lack of security policy enforcement procedures
Answer: A
Explanation: Lack of employee awareness of a company’s information security policy could lead to an unintentional loss of confidentiality.
QUESTION 35 - (Topic 1)
Whenever an application is modified, what should be tested to determine the full impact of the change? Choose the BEST answer.
A. Interface systems with other applications or systems
B. The entire program, including any interface systems with other applications or systems
C. All programs, including interface systems with other applications or systems
D. Mission-critical functions and any interface systems with other applications or systems
Answer: B
Explanation: Whenever an application is modified, the entire program, including any interface systems with other
applications or systems, should be tested to determine the full impact of the change.
QUESTION 36 - (Topic 1)
Database snapshots can provide an excellent audit trail for an IS auditor. True or false?
A. True
B. False
Answer: A
Explanation: Database snapshots can provide an excellent audit trail for an IS auditor.