CISA Flashcards

1
Q

Common Control Considerations

What is Common Control Consideration 1?

A. Central Development and Implementation of Controls

B. This means that the rules or procedures for keeping our systems safe and working well are made by the main group in charge and have to be followed exactly the same way by everyone, no matter where they work. This means there’s a central place where we watch over things like who accesses what, how systems are managed, and if everything is secure.

C. Example 1: Let’s say the CIO make a rule about how we handle databases like Oracle, SQL, Progress, and DB2. They say everyone in every office has to follow this rule exactly as it is, without changing anything. So, whether you’re in New York, London, or Tokyo, everyone has to manage those databases in the same exact way according to the rule from headquarters.

D. All are exhibits of Common Control Consideration 1

A

D. All are exhibits of Common Control Consideration 1

Common Control Consideration 1:
A: Centeral Development and Implementation of Controls

This means that the rules or procedures for keeping our systems safe and working well are made by the main group in charge and have to be followed exactly the same way by everyone, no matter where they work. This means there’s a central place where we watch over things like who accesses what, how systems are managed, and if everything is secure.

Example 1: Let’s say the CIO make a rule about how we handle databases like Oracle, SQL, Progress, and DB2. They say everyone in every office has to follow this rule exactly as it is, without changing anything. So, whether you’re in New York, London, or Tokyo, everyone has to manage those databases in the same exact way according to the rule from headquarters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Common Control Consideration 2?

A. Consideration 2: Consistency in Control Performance and Monitoring

B. This means that the people who check if our systems are working well and secure should have similar jobs and skills, no matter where they work in the company.

C. Example: Let’s say there’s a rule in place that says we need to regularly check if our computer systems are secure. The people responsible for doing this check should have similar roles and skills, whether they’re working in the main office, a branch office, or a warehouse. For instance, if we have IT specialists checking security in one office, we should have similar IT specialists doing the same job in all other locations. This ensures that the checks are done consistently and effectively everywhere in the company.

D. All are exhibits of Common Control Consideration 2- Consistency in Control Performance and Monitoring

A

D. All are exhibits of Common Control Consideration 2- Consistency in Control Performance and Monitoring

Consideration 2: Consistency in Control Performance and Monitoring

This means that the people who check if our systems are working well and secure should have similar jobs and skills, no matter where they work in the company.

Example: Let’s say there’s a rule in place that says we need to regularly check if our computer systems are secure. The people responsible for doing this check should have similar roles and skills, whether they’re working in the main office, a branch office, or a warehouse. For instance, if we have IT specialists checking security in one office, we should have similar IT specialists doing the same job in all other locations. This ensures that the checks are done consistently and effectively everywhere in the company.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Common Control Consideration 3?

A. Consideration 3: Consistency in Automated Control Configuration

B. Explanation: If we use computer programs or systems to manage certain tasks automatically, do we set up these programs the same way across all parts of the company?

C. Example: Imagine we have a program that automatically checks if people are using strong passwords to access our systems. If this program is used in different offices or departments, it should be set up in exactly the same way in each place. For instance, if we set the program to require passwords with a minimum of 8 characters and at least one number in the main office, the same rules should apply in all other locations. This ensures that the automated checks are consistent and reliable throughout the company.

D. All are exhibits of Common Control Consideration 2- Consistency in Control Performance and Monitoring

A

Consideration 3: Consistency in Automated Control Configuration

Explanation: If we use computer programs or systems to manage certain tasks automatically, do we set up these programs the same way across all parts of the company?

Example: Imagine we have a program that automatically checks if people are using strong passwords to access our systems. If this program is used in different offices or departments, it should be set up in exactly the same way in each place. For instance, if we set the program to require passwords with a minimum of 8 characters and at least one number in the main office, the same rules should apply in all other locations. This ensures that the automated checks are consistent and reliable throughout the company.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Common Control Consideration 4?

A. Consideration 4: Consistency in Automated Control Configuration

B. Explanation: If we’re using information from our computer systems to check if everything is running smoothly, are these systems the same in all parts of the company?

C. Example: Let’s say we have a system that keeps track of who accesses certain files on our company network. If we’re using this system to make sure only authorized people are accessing sensitive information, we need to ensure that the system is the same across all offices and departments. For instance, if one office uses a high-security access system while another office has a less secure one, the data we gather might not be reliable. So, we need to make sure that the systems generating this data are consistent everywhere to get accurate results and maintain security standards across the company.

D. All the Above

A

Consideration 4: Consistency in Automated Control Configuration

Explanation: If we’re using information from our computer systems to check if everything is running smoothly, are these systems the same in all parts of the company?

Example: Let’s say we have a system that keeps track of who accesses certain files on our company network. If we’re using this system to make sure only authorized people are accessing sensitive information, we need to ensure that the system is the same across all offices and departments. For instance, if one office uses a high-security access system while another office has a less secure one, the data we gather might not be reliable. So, we need to make sure that the systems generating this data are consistent everywhere to get accurate results and maintain security standards across the company.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Common Control Consideration 5?

A. Consideration Central Monitoring of Controls

B. Explanation: This means keeping an eye on important rules or procedures from one central place to ensure they’re followed consistently throughout the company.

C. Example: Imagine there’s a rule that says we need to regularly update our computer software to keep it secure. Instead of each department managing this on their own, there’s a central team responsible for making sure everyone follows the rule. They monitor updates across all departments to ensure nobody falls behind or skips updates, thus maintaining security across the organization.

D. All the Above

A

D. All the Above

Consideration 5: Central Monitoring of Controls

Explanation: This means keeping an eye on important rules or procedures from one central place to ensure they’re followed consistently throughout the company.

Example: Imagine there’s a rule that says we need to regularly update our computer software to keep it secure. Instead of each department managing this on their own, there’s a central team responsible for making sure everyone follows the rule. They monitor updates across all departments to ensure nobody falls behind or skips updates, thus maintaining security across the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

________ we’re basically looking at how your company manages any changes or updates to its computer systems. This can include: Application development, System development, and program change management.

To a business client, we’re focusing on how your company handles the development and management of software programs, overall computer systems, and changes within those programs. We want to make sure that these changes are managed effectively to minimize risks and ensure that your systems continue to work smoothly and securely.

A. System Change Control
B. IT Audit
C. Change Management
D. Physical Security

A

A. System Change Control

“system change control,” we’re basically looking at how your company manages any changes or updates to its computer systems.

To a business client, we’re focusing on how your company handles the development and management of software programs, overall computer systems, and changes within those programs. We want to make sure that these changes are managed effectively to minimize risks and ensure that your systems continue to work smoothly and securely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

_____ This refers to creating or updating software programs that your company uses for different tasks. For example, if you develop a new app for managing inventory or customer orders, that’s part of application development.

A. Application Development
B. IT Audit
C. Change Management
D. Physical Security

A

Application Development: This refers to creating or updating software programs that your company uses for different tasks. For example, if you develop a new app for managing inventory or customer orders, that’s part of application development.

Example: Let’s say your company decides to create a new mobile app for customers to place orders. The process of designing, coding, testing, and deploying this app is part of application development.

Another example could be updating your company’s website to include new features, such as an online chat support system. The team responsible for designing and implementing these new features is engaged in application development.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

_____ This involves building or modifying the overall computer systems that your company relies on. It could include things like setting up new servers, upgrading network infrastructure, or integrating different software systems to work together smoothly.

A. Application Development
B. System Development
C. Change Management
D. Physical Security

A

System Development: This involves building or modifying the overall computer systems that your company relies on. It could include things like setting up new servers, upgrading network infrastructure, or integrating different software systems to work together smoothly.

Example: Your company decides to upgrade its entire network infrastructure to support higher bandwidth and better security. This involves installing new servers, routers, and switches, as well as configuring them to work together efficiently. This comprehensive upgrade process is part of system development.

Another example could be implementing a new Enterprise Resource Planning (ERP) system to streamline business processes across various departments. The planning, installation, customization, and integration of this new system into your company’s existing infrastructure constitute system development.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

_______ This is about how changes are managed within the programs or software applications themselves. For instance, if you need to fix a bug in your accounting software or add new features to your customer relationship management system, that falls under program change management.

A. Application Development
B. System Development
C. Program Change Management
D. Physical Security

A

Program Change Management: This is about how changes are managed within the programs or software applications themselves. For instance, if you need to fix a bug in your accounting software or add new features to your customer relationship management system, that falls under program change management.

Example: Suppose there’s a bug in your company’s accounting software that causes incorrect calculations in financial reports. The process of identifying, fixing, and testing this bug, as well as deploying the updated version of the software, falls under program change management.

Another example could be adding new features to your company’s Customer Relationship Management (CRM) software based on user feedback. Managing the entire lifecycle of these changes, from requirements gathering to deployment, is part of program change management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the Risk of Control (RAIT) of (LA4)- Provisioning?

A. Production systems, programs, and/or job results in inaccurate, incomplete, or unauthorized processing of data

B. Uses have access privliges beyond those necessary to perform their assigned duties, which may create improper segregation of duties.

C. Data cnversion from legacy systems indroduces errors

D, none of above

A

(LA4)- Provisioning-

The risk is:
B. Users have access privileges beyond those necessary to perform their assigned duties, which may create improper segregation of duties.

REASONING: mitigate the risks associated with excessive access privileges, improper segregation of duties, insider threats, compliance violations, and data loss or theft. By evaluating provisioning processes and access rights management, auditors help ensure that organizations maintain a secure and compliant environment for managing user access to systems and data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the Control Description of (LA4)- Default Accounts on Provisioning?

A.User have access privileges beyond those necessary to perform their assigned duties, which may create improper segregation of duties.

B. Management approves the nature and extent of user-access privileges for new and modified user access, including standard application profiles roles, critical financial reporting transactions, and segregation of duties.

C. User access is periodically reviewed

D. Privileged level access is authorized and appropriately restriced.

A

B. Management approves the nature and extent of user-access privileges for new and modified user access, including standard application profiles roles, critical financial reporting transactions, and segregation of duties.

Control Description of (LA4)- Default Accounts of Provisioning

Management approves the nature and extent of user-access privileges for new and modified user access, including standard application profiles roles, critical financial reporting transactions, and segregation of duties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the Control Description of (LA3)- PRIVILEGED ACCESS?

A.User have access privileges beyond those necessary to perform their assigned duties, which may create improper segregation of duties.

B. Management approves the nature and extent of user-access privileges for new and modified user access, including standard application profiles roles, critical financial reporting transactions, and segregation of duties.

C. User access is periodically reviewed

D. Privileged level access is authorized and appropriately restricted.

A

The Control Description of (LA3)- PRIVILEGED ACCESS

D. Privileged level access is authorized and appropriately restricted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the Control Description of (LA2)- Passwords?

A.User have access privileges beyond those necessary to perform their assigned duties, which may create improper segregation of duties.

B. Access is authenticated through unique user IDs and passwords or other methods as a mechanism for validating that users are authorized to gain access to the system. Password parameters meet company and/or industry standards (e.g. password minimum length and complexity, expiration, account lockout).

Obtain evidence of authentication and security configurations to evaluate if they are implemented consistent with the control design.

C. User access is periodically reviewed

D. Privileged level access is authorized and appropriately restricted.

A

Control Description of (LA2)- Passwords

B. Access is authenticated through unique user IDs and passwords or other methods as a mechanism for validating that users are authorized to gain access to the system. Password parameters meet company and/or industry standards (e.g. password minimum length and complexity, expiration, account lockout).

Obtain evidence of authentication and security configurations to evaluate if they are implemented consistent with the control design.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the Risk of Control (RAIT) of (LA2)- Passwords?

A. Production systems, programs, and/or job results in inaccurate, incomplete, or unauthorized processing of data

B. Uses have access privliges beyond those necessary to perform their assigned duties, which may create improper segregation of duties.

C. Data cnversion from legacy systems indroduces errors

D, Systems are not adequately configured or updated to restrict system access to properly authorized and appropriate users.

A

Risk of Control (RAIT) of (LA2)- Passwords

D. Systems are not adequately configured or updated to restrict system access to properly authorized and appropriate users.

REASONING: mitigate the risks associated with unauthorized access, data breaches, insider threats, data integrity issues, compliance violations, and reputation damage. By evaluating password policies, enforcement mechanisms, and access controls, auditors help ensure that organizations maintain a secure and compliant IT environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the Risk of Control (RAIT) of (MC1)- Application Change Management?

A. Production systems, programs, and/or job results in inaccurate, incomplete, or unauthorized processing of data

B. Uses have access privliges beyond those necessary to perform their assigned duties, which may create improper segregation of duties.

C. Inappropriate changes are made to application systems or programs that contain relevant automated controls (i.e. configurable settings, automated algorithms, automated calculations, ad automated data extractions), and/or report logic

D, Systems are not adequately configured or updated to restrict system access to properly authorized and appropriate users.

A

Risk of Control (RAIT) of (MC1)- Application Change Management

C. Inappropriate changes are made to application systems or programs that contain relevant automated controls (i.e. configurable settings, automated algorithms, automated calculations, ad automated data extractions), and/or report logic

REASONING: help safeguard data integrity, operational continuity, and regulatory compliance within the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the Risk of Control (RAIT) of (OP2)- Job Scheduler Access?

A. Production systems, programs, and/or job results in inaccurate, incomplete, or unauthorized processing of data

B. Production systems, programs, and/or jobs result in inaccurate, incomplete, or unauthorized processing of data.

C. Inappropriate changes are made to application systems or programs that contain relevant automated controls (i.e. configurable settings, automated algorithms, automated calculations, ad automated data extractions), and/or report logic

D, Systems are not adequately configured or updated to restrict system access to properly authorized and appropriate users.

A

Risk of Control (RAIT) of (OP2)- Job Scheduler Access

B. Production systems, programs, and/or jobs result in inaccurate, incomplete, or unauthorized processing of data.

REASONING: verifying the effectiveness of monitoring mechanisms in controlling access, detecting anomalies, and ensuring the accurate and secure execution of scheduled jobs. It helps in safeguarding data integrity, regulatory compliance, and overall IT risk management within the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the Risk of Control (RAIT) of (MC6)- Job Data Conversions?

A. Production systems, programs, and/or job results in inaccurate, incomplete, or unauthorized processing of data

B. Production systems, programs, and/or jobs result in inaccurate, incomplete, or unauthorized processing of data.

C. Data converted from legacy systems or previous versions introduces data errors if the conversion transfers incomplete, redundant, obsolete, or inaccurate data.

D, Systems are not adequately configured or updated to restrict system access to properly authorized and appropriate users.

A

Risk of Control (RAIT) of (MC6)- Job Data Conversions

C. Data converted from legacy systems or previous versions introduces data errors if the conversion transfers incomplete, redundant, obsolete, or inaccurate data.

REASONING: Job Data Conversions is essential for verifying the effectiveness of monitoring systems in ensuring the accuracy, completeness, and integrity of converted data. It helps in detecting and correcting errors promptly, thereby safeguarding business operations, data reliability, and regulatory compliance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Question: What is the Control Description of (OP3)-Job Monitoring?

A) Ensuring all employees have access to necessary job resources.
B) Regularly updating software applications to the latest versions.
C) Checking the temperature of the server room to prevent overheating.
D) Critical systems, programs, and/or jobs are monitored, and processing errors are corrected to ensure successful completion.

A

Control Description of (OP3)-Job Monitoring

D) Critical systems, programs, and/or jobs are monitored, and processing errors are corrected to ensure successful completion.

REASONING: Job Monitoring in IT audit is essential for verifying the effectiveness of systems and processes in detecting, correcting, and preventing errors during data processing. It ensures the reliability, integrity, and continuity of critical operations within the organization, contributing to overall business resilience and compliance with regulatory requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Question: What is the Control Description of (MC1)-Application Change Management?

A) Ensuring employees attend regular training sessions on new software updates.
B) Allowing any employee to make changes to applications as needed.
C) Application changes are appropriately tested and approved before moved into the production environment.
D) Keeping a log of office supply purchases for inventory tracking.

A

The Control Description of (MC1)-Application Change Management

C) Application changes are appropriately tested and approved before moved into the production environment.

Reasoning: Change Management ensures that any changes made to the company’s software applications are properly vetted and verified before being implemented in the live environment, minimizing the risk of disruptions or errors that could impact operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are risks for (MC1)-Application Change Management

A. Inappropriate Changes.
B. Improper Segregation of Duties
C. Data Integrity Compromise
D. All of the Above

A

D. All of the Above
risks for (MC1)-Application Change Management
-Inappropriate changes
-improper segregation of duties
-data integrity compromise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the risk for Provisioning Accounts (LA4)?

A. Excessive access privileges
B. Improper segregation of duties
C. Insider threats
D. Compliance Violations
E. Data Loss or Theft
F. All the Above
G. Only A through C.

A

F. All the Above
risk for Provisioning Accounts (LA4)
-Excessive access privileges
-Improper segreation of duties
-insider threats
-compliance violations
-data loss or theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the risk for Passwords (LA2)?

A. Unauthorized access
B. Data Breaches
C. Insider Threats
D. Data Integrity Issues
E. Compliance Violations
F. Reputational Damage
G. All the Above
H. Only A, B, & E

A

G. All the Above
risk for Passwords (LA2)
-Unauthorized access
- Data Breaches
- Insider Threats
- Data Integrity Issues
- Compliance Violations
- Reputational Damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

_________ an account that is used by multiple individuals to access systems or data

a. shared account
b. service account

A

a. shared account

shared account that is used by multiple individuals to access systems or data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

-WiFi
-Classrooms
-Computer Labs
-Additionals shared applications that require profile specific settings are all examples of:

a. shared account
b. service account

A

a. shared account

Shared account example include:
-WiFi
-Classrooms
-Computer Labs
-Additionals shared applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

_______ an account that is used by an automated process and is NOT used in an interactive way by a user. account is like a special user account for computers. It’s not for people to use directly, but rather for automated tasks or programs.

a. shared account
b. service account

A

b. service account

SERVICE account: account that is used by an automated process and is NOT used in an interactive way by a user.

service account is like a special user account for computers. It’s not for people to use directly, but rather for automated tasks or programs. So, it’s like a behind-the-scenes worker that computers use to get things done automatically without needing input from a person.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Question: In cases of service accounts, where must the password be kept?

A) Written on a sticky note attached to the computer monitor.
B) Shared among team members through email for easy access.
C) Stored in a secure password vault with auditing capabilities.
D) Memorized by all employees for quick retrieval.

A

C) Stored in a secure password vault with auditing capabilities.

Ex. of Auditing Capabilities
-Character length: 12-32 character length
-Complexity requirements: (upper case, lower case, number, symbol)
-Password lifespan (less than 72 hours of termination)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Question: IPE stands for:

A) International Privacy Encryption
B) Internal Policy Enforcement
C) Information Processing Efficiency
D) Information Produced by Entity

A

D) Information Produced by Entity

IPE = Information Produced by Entity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Question: What are all the forms of audit evidence?

A) Customer feedback and satisfaction surveys
B) Financial statements and balance sheets
C) Risk Assessment Procedures, Tests of Operating Effectiveness of Relevant Controls, Substantive Procedures outside the scope of the chapter (Correct Answer)
D) Employee attendance records and time sheets

A

Forms of audit evidence

C) Risk Assessment Procedures, Tests of Operating Effectiveness of Relevant Controls, Substantive Procedures outside the scope of the chapter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Question: What makes up an IT Infrastructure?

A) Software, Hardware, and Firmware
B) CPU, RAM, and Hard Drive
C) Database, Operating System, and Network
D) Keyboard, Mouse, and Monitor

A

C) Database, Operating System, and Network

IT Infrastructure is made up on:
-Database
-OS
-Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Question: What is an Application System?

A) A collection of computer hardware components
B) A set of instructions that tell the computer how to perform a specific task
C) A group of related applications designed to allow a user to store/retrieve data in a logical and meaningful manner and apply predefined business rules to that data
D) A network of interconnected computers and devices

A

C) A group of related applications designed to allow a user to store/retrieve data in a logical and meaningful manner and apply predefined business rules to that data

Examples: SAP, Peoplesoft, JD Edwards, Oracle, Hyperion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Question: What example: SAP, PeopleSoft, JD Edwards, Oracle, and Hyperion are all examples of what form of technology element?

A) Operating Systems
B) Computer Hardware
C) Application Systems (Correct Answer)
D) Internet Browsers

A

C) Application Systems

An Application System - A group of related applications designed to allow a user to store/retrieve data in a logical and meaningful manner and apply predefined business rules to that data

Examples: SAP, Peoplesoft, JD Edwards, Oracle, Hyperion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is the primary objective of IT audit?
A) Ensuring compliance with tax regulations
B) Evaluating the effectiveness of IT controls
C) Optimizing network performance
D) Conducting market research

A

B) Evaluating the effectiveness of IT controls

REASONING: The primary objective of IT audit is to assess the effectiveness of controls implemented within the IT environment to ensure that they are operating as intended and mitigating risks appropriately.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is the purpose of risk assessment in IT audit?
A) Identifying vulnerabilities in software
B) Assessing the potential impact of security breaches
C) Estimating the budget for IT projects
D) Evaluating employee productivity

A

B) Assessing the potential impact of security breaches

REASONING: Risk assessment in IT audit involves identifying and evaluating potential threats and vulnerabilities to assess their potential impact on the organization’s information assets and operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Which of the following is an example of a general IT control?
A) Patch management
B) Employee training
C) Data encryption
D) Customer support

A

A) Patch management

REASONING: Patch management is an example of a general IT control that involves managing and applying updates to software systems to address known vulnerabilities and improve security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What does the acronym “COSO” stand for in the context of IT audit?
A) Committee of Security Officers
B) Control Objectives for Information and Related Technologies
C) Committee of Sensitive Operations
D) Committee of Sponsoring Organizations of the Treadway Commission

A

D) Committee of Sponsoring Organizations of the Treadway Commission

Committee of Sponsoring Organizations of the Treadway Commission (COSO): COSO is a framework commonly referenced in IT audit that provides guidance on internal control, risk management, and governance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

In IT audit, what does the term “SOC” refer to?
A) System on Chip
B) Service Oriented Computing
C) Service Organization Control
D) System Operation Center

A

C) Service Organization Control

SOC reports are commonly used in IT audit to assess the effectiveness of controls at service organizations, particularly those that provide services relevant to financial reporting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is the purpose of segregation of duties in IT audit?
A) Reducing the risk of errors and fraud
B) Increasing employee collaboration
C) Enhancing system performance
D) Streamlining business processes

A

A) Reducing the risk of errors and fraud

Segregation of duties is a fundamental control principle aimed at reducing the risk of errors and fraud by separating key duties and responsibilities among different individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Which of the following is NOT a phase of the IT audit process?
A) Planning
B) Execution
C) Monitoring
D) Reporting

A

C) Monitoring

Monitoring: Monitoring is a phase of the IT audit process where ongoing activities are observed and assessed to ensure that controls remain effective and operational.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What is the main objective of testing controls in IT audit?
A) Identifying vulnerabilities
B) Ensuring compliance with regulations
C) Evaluating the effectiveness of controls
D) Generating revenue for the organization

A

C) Evaluating the effectiveness of controls

Testing controls in IT audit involves assessing whether controls are operating effectively to mitigate risks and achieve desired outcomes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Which of the following is an example of an IT governance framework?
A) ISO/IEC 27001
B) Windows Firewall
C) Microsoft Office Suite
D) Apache Web Server

A

A) ISO/IEC 27001

ISO/IEC 27001: ISO/IEC 27001 is a widely recognized standard for information security management systems, often used as a framework for implementing and auditing information security controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What is the purpose of a vulnerability assessment in IT audit?
A) Evaluating employee performance
B) Identifying weaknesses in IT systems
C) Assessing customer satisfaction
D) Calculating network bandwidth

A

B) Identifying weaknesses in IT systems

Vulnerability assessment is a process used in IT audit to identify weaknesses and vulnerabilities in IT systems that could be exploited by attackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What does the term “penetration testing” refer to in IT audit?
A) Assessing the market penetration of IT products
B) Testing the strength of physical barriers
C) Evaluating the security of IT systems by simulating cyberattacks
D) Analyzing the performance of computer processors

A

C) Evaluating the security of IT systems by simulating cyberattacks

Penetration testing involves simulating cyberattacks against IT systems to identify vulnerabilities and assess their security posture.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Which of the following is NOT an example of a control objective in IT audit?
A) Confidentiality
B) Availability
C) Reliability
D) Profitability

A

D) Profitability

Profitability: Control objectives in IT audit typically focus on ensuring the confidentiality, integrity, and availability of information assets, rather than profitability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What is the purpose of an IT audit report?
A) Providing recommendations for improvement
B) Advertising IT products
C) Analyzing market trends
D) Promoting employee morale

A

A) Providing recommendations for improvement

REASONING: Providing recommendations for improvement: IT audit reports typically include findings and recommendations for improving controls and addressing identified risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What is the primary focus of an IT audit of financial systems?
A) Evaluating the efficiency of IT helpdesk services
B) Ensuring compliance with tax regulations
C) Assessing the accuracy and reliability of financial data
D) Testing network security protocols

A

C) Assessing the accuracy and reliability of financial data

REASONING:
IT audit of financial systems focuses on evaluating controls related to financial reporting processes to ensure the accuracy and reliability of financial data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Which of the following is NOT a type of IT audit?
A) Compliance audit
B) Operational audit
C) Performance audit
D) Marketing audit

A

D) Marketing audit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What is the purpose of continuous monitoring in IT audit?
A) Generating quarterly financial reports
B) Identifying and addressing IT risks in real-time
C) Conducting employee performance evaluations
D) Upgrading software applications annually

A

B) Identifying and addressing IT risks in real-time

Continuous monitoring in IT audit involves ongoing surveillance of IT systems and processes to detect and respond to IT risks and security incidents in real-time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Which of the following is an example of an IT control?
A) Employee dress code policy
B) Corporate social responsibility initiatives
C) Password complexity requirements
D) Marketing campaign strategy

A

C) Password complexity requirements

Password complexity requirements are an example of an IT control aimed at ensuring the security of user accounts and preventing unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What is the purpose of an IT audit program?
A) Installing antivirus software
B) Monitoring employee internet usage
C) Providing guidelines for conducting IT audits
D) Developing software applications

A

C) Providing guidelines for conducting IT audits

An IT audit program provides guidance and instructions for planning, executing, and reporting on IT audit activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

What is the primary goal of IT risk management?
A) Eliminating all IT risks
B) Reducing the impact of IT risks on business objectives
C) Increasing IT complexity
D) Ignoring IT risks

A

B) Reducing the impact of IT risks on business objectives

The primary goal of IT risk management is to identify, assess, and mitigate IT-related risks to minimize their impact on business objectives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What is the purpose of user access reviews in IT audit?
A) Ensuring compliance with environmental regulations
B) Reviewing employee performance
C) Evaluating the effectiveness of marketing campaigns
D) Assessing the appropriateness of user access rights

A

A) Ensuring compliance with environmental regulations

User access reviews are conducted in IT audit to ensure that user access rights are appropriate and comply with organizational policies and regulatory requirements, rather than environmental regulations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

What is the purpose of a disaster recovery plan in IT audit?
A) Enhancing customer service
B) Minimizing the impact of disruptive events on IT operations
C) Increasing corporate profits
D) Optimizing network bandwidth

A

B) Minimizing the impact of disruptive events on IT operations

A disaster recovery plan is specifically designed to minimize the impact of disruptive events, such as natural disasters, cyberattacks, or equipment failures, on IT operations. By outlining procedures for restoring critical systems and services, it helps ensure business continuity and reduces downtime during such events.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

What is the purpose of IT controls testing in IT audit?
A) Evaluating employee satisfaction
B) Assessing the effectiveness of IT controls
C) Generating revenue for the organization
D) Increasing employee turnover

A

B) Assessing the effectiveness of IT controls

The primary purpose of IT controls testing in IT audit is to assess the effectiveness of existing controls in mitigating IT-related risks and achieving business objectives. By conducting tests such as walkthroughs, inquiries, and substantive testing, auditors evaluate whether controls are operating as intended and providing the desired level of assurance over IT processes and systems.

54
Q

What is the primary objective of incident response in IT audit?
A) Monitoring employee attendance
B) Restoring IT services after disruptions
C) Conducting employee performance evaluations
D) Analyzing customer feedback

A

B) Restoring IT services after disruptions

Incident response in IT audit focuses on promptly detecting, responding to, and recovering from cybersecurity incidents, IT disruptions, or breaches to minimize their impact on business operations and data integrity. The primary objective is to restore IT services to normal operations as quickly as possible, thereby reducing downtime, financial losses, and reputational damage associated with incidents.

55
Q

Which of the following is an example of an IT audit standard?
A) International Organization for Standardization (ISO) 9001
B) Generally Accepted Accounting Principles (GAAP)
C) Information Systems Audit and Control Association (ISACA) COBIT
D) American Institute of Certified Public Accountants (AICPA) Code of Professional Conduct

A

C) Information Systems Audit and Control Association (ISACA) COBIT

ISACA’s Control Objectives for Information and Related Technology (COBIT) is a globally recognized IT audit standard that provides a comprehensive framework for governing and managing enterprise IT environments. COBIT offers best practices, principles, and guidelines for aligning IT with business objectives, managing IT-related risks, and ensuring compliance with regulations and standards. It serves as a valuable resource for IT auditors in assessing the effectiveness of IT governance, control, and assurance processes within organizations.

56
Q

What IT Audit Framework deals with Cybersecurity standards?

A) ISO/IEC 27001
B) COBIT (Control Objectives for Information and Related Technology)
C) HIPAA (Health Insurance Portability and Accountability Act)
D) National Institute of Standards and Technology (Correct Answer)

A

D) National Institute of Standards and Technology

57
Q

What IT Audit Framework deals with Data Regulation and Protection?

A) ISO/IEC 27001
B) HIPAA (Health Insurance Portability and Accountability Act)
C) COBIT (Control Objectives for Information and Related Technology)
D) General Data Protection Regulation (GDPR) (Correct Answer)

A

D) General Data Protection Regulation (GDPR)

58
Q

What framework system is used to establish integration of internal controls into business processes, such as over financial reporting and Section 404 of SOX Act?

A) PCI DSS (Payment Card Industry Data Security Standard)
B) HIPAA (Health Insurance Portability and Accountability Act)
C) COSO Framework
D) GDPR (General Data Protection Regulation)

A

C) COSO Framework

59
Q

Question: Which objective of COSO deals with the effectiveness and efficiency of business operations?

A) COSO Objective 2 - Reporting
B) COSO Objective 3 - Compliance
C) COSO Objective 1 - Operation (Correct Answer)
D) COSO Objective 4 - Strategy and Objective Setting

A

C) COSO Objective 1 - Operation

60
Q

Question: Which objective of COSO deals with reliable financial and non-financial reporting?

A) COSO Objective 1 - Operation
B) COSO Objective 3 - Compliance
C) COSO Objective 2 - Reporting (Correct Answer)
D) COSO Objective 4 - Strategy and Objective Setting

A

C) COSO Objective 2 - Reporting

61
Q

Question: Which objective of COSO deals with compliance with laws and regulations and industry standards?

A) COSO Objective 1 - Operation
B) COSO Objective 2 - Reporting
C) COSO Objective 3 - Compliance (Correct Answer)
D) COSO Objective 4 - Strategy and Objective Setting

A

C) COSO Objective 3 - Compliance

62
Q

Question: Which component of COSO deals with policies and procedures that guide the organization, such as how management assigns authority?

A) COSO Component 2 - Risk Assessment
B) COSO Component 3 - Control Activities
C) COSO Component 1 - Control Environment (Correct Answer)
D) COSO Component 4 - Information and Communication

A

C) COSO Component 1 - Control Environment

63
Q

Question: Which component of COSO deals with the adoption of risk management plans?

A) COSO Component 1 - Control Environment
B) COSO Component 3 - Control Activities
C) COSO Component 2 - Risk Assessment
D) COSO Component 4 - Information and Communication

A

C) COSO Component 2 - Risk Assessment

64
Q

Question: What component of COSO deals with internal controls in place and operation effectively over a period of time?

A) COSO Component 1 - Control Environment
B) COSO Component 2 - Risk Assessment
C) COSO Component 3 - Control Activities
D) COSO Component 4 - Information and Communication

A

C) COSO Component 3 - Control Activities (Correct Answer)

65
Q

What component of COSO involves communicating expectations to internal and external users? Otherwords how is mgmt communicating with each other?

A) COSO Component 1 - Control Environment
B) COSO Component 2 - Risk Assessment
C) COSO Component 3 - Control Activities
D) COSO Component 4 - Information & Communication

A

D) COSO Component 4 - Information & Communication (Correct Answer)

66
Q

Question: What framework system is used to design and implement a secure IT infrastructure related to business management and governance (This framework is a mixture of frameworks, resources, and standards)?

A) ISO/IEC 27001
B) HIPAA (Health Insurance Portability and Accountability Act)
C) COSO (Committee of Sponsoring Organizations of the Treadway Commission)
D) COBIT Framework (Correct Answer)

A
67
Q

Which COBIT Framework 5 Key Principle advocates for separating governance implementation and management in your organization?

A) Meeting Stakeholder Needs

B) Covering the Enterprise End-to-End

C) Apply a Single Integrated Framework

D) Separating Governance from Management

A

D) Separating Governance from Management

68
Q

Which COBIT Framework 5 Key Principle emphasizes that the entire organization should work as a single unit?

A) Meeting Stakeholder Needs

B) Covering the Enterprise End-to-End

C) Apply a Single Integrated Framework

D) Enabling a Holistic Approach

A

D) Enabling a Holistic Approach

69
Q

Which COBIT Framework 5 Key Principle focuses on the integration of relevant frameworks and governance standards like COSO, ITIL, ISO, GDPR, etc.?

A) Meeting Stakeholder Needs

B) Covering the Enterprise End-to-End

C) Apply a Single Integrated Framework

D) Enabling a Holistic Approach

A

C) Apply a Single Integrated Framework

70
Q

Question: What framework ensures that an organization’s IT system enhances and strengthens internal controls?

A) ISO/IEC 27001
B) HIPAA (Health Insurance Portability and Accountability Act)
C) COSO (Committee of Sponsoring Organizations of the Treadway Commission)
D) COBIT Framework

A

D) COBIT Framework (Correct Answer)

71
Q

Question: What framework provides fraud prevention through implementing effective internal controls and risk management?

A) ISO/IEC 27001
B) HIPAA (Health Insurance Portability and Accountability Act)
C) COSO Framework (
D) COBIT (Control Objectives for Information and Related Technology) Framework

A

C) COSO Framework

72
Q

Question: What type of audits are SOC - Service Organization Control?

A) Financial Audits
B) IT Audits
C) Operational Audits
D) Attestation Engagement

A

D) Attestation Engagement

73
Q

Question: What type of audit evaluates process changes, procedures, pricing, resource allocation, and associated internal control activities to determine the impact on attaining organizational goals and objectives?

A) Financial Audit
B) IT Audit
C) Compliance Audit
D) Operational Audit

A

D) Operational Audit

74
Q

Question: What type of audit ensures adherence to laws, regulations, internal and external policies, and terms of contracts?

A) Financial Audit
B) IT Audit
C) Operational Audit
D) Compliance Audit

A

D) Compliance Audit

75
Q

Question: What type of audit examines information and transaction processing systems and how people use those systems?

A) Financial Audit
B) Compliance Audit
C) Operational Audit
D) Information Systems Audit

A

D) Information Systems Audit

76
Q

Question: What type of audit identifies gaps in systems, internal controls, and processes before an external audit?

A) Financial Audit
B) Compliance Audit
C) Operational Audit
D) Audit Readiness

A

D) Audit Readiness

77
Q

Question: What is a procedure or policy that provides reasonable assurance that an IT environment operates as intended, that data is reliable, and that the organization complies with applicable laws and regulations? Additionally, what is any action, policy, or procedure that helps mitigate risk?

A) Compliance Audit
B) Financial Audit
C) IT Control
D) Operational Audit

A

C) IT Control

78
Q

Question: What type of control relates to the overall management of the information systems and processing environments?

A) Application Controls
B) Access Controls
C) IT General Controls
D) Security Controls

A

C) IT General Controls

79
Q

Question: What type of control relates to specific computer software applications needed to manage an organization’s IT environment?

A) IT General Controls
B) Access Controls
C) Security Controls
D) IT Application Controls (ITAC)

A

D) IT Application Controls (ITAC)

80
Q

Question: What term refers to the examination of IT General and Application Controls of an organization’s IT infrastructure to determine if those controls are designed appropriately and operating effectively?

A) Financial Audit
B) Compliance Audit
C) Operational Audit
D) IT Audit

A

D) IT Audit

81
Q

Question: What should be included in access controls (both logical and physical ITGC) for them to be designed appropriately and operating effectively?

A) Ensuring all employees attend cybersecurity training sessions
B) Allowing unrestricted physical access to IT resources
C) Utilizing weak password parameters that are non-compliant with policies and best practices
D) Access provisioning and de-provisioning, restricting physical access to IT resources, monitoring logical access processes, ensuring password parameters are appropriate and compliant, determining if user access is authorized and appropriately established, and segregating incompatible duties within the access control environment

A

D) Access provisioning and de-provisioning, restricting physical access to IT resources, monitoring logical access processes, ensuring password parameters are appropriate and compliant, determining if user access is authorized and appropriately established, and segregating incompatible duties within the access control environment

82
Q

Question: What should be included in Change Management- ITGC for the control to be designed appropriately and operating effectively?

A) All employees having unrestricted access to make changes
B) Skipping the testing and approval process for changes before deployment to the production environment
C) Ignoring vulnerability scans and not assessing vulnerabilities for remediation
D) Ensure changes are appropriately requested, authorized, tested and approved before deployment to production environment, and segregation of incompatible duties (SOD)

A

D) Ensure changes are appropriately requested, authorized, tested and approved before deployment to production environment, and segregation of incompatible duties (SOD)

83
Q

Question: What is the main objective of Data Backups and Recovery Control?

A) Ensuring that information systems are always available
B) Storing backups in an easily accessible location
C) Only focusing on creating backups without considering recovery
D) Ensuring availability of information systems and testing the business’s ability to recover from backup data

A

D) Ensuring availability of information systems and testing the business’s ability to recover from backup data

84
Q

Question: What should be included in Data Backups and Recovery- ITGC for the control to be designed appropriately and operating effectively?

A) Allowing unapproved and untested changes to be deployed
B) Not having a disaster recovery plan in place
C) Ignoring production errors and not resolving them
D) Ensuring data is appropriately backed up, having a disaster recovery plan, identifying and resolving production errors, and deploying only approved and tested changes

A

D) Ensuring data is appropriately backed up, having a disaster recovery plan, identifying and resolving production errors, and deploying only approved and tested changes

85
Q

Question: What should be included in System Development Life Cycle (SDLC)- ITGC for the control to be designed appropriately and operating effectively?

A) Skipping the documentation of changes to systems
B) Allowing changes to systems without authorization or documentation
C) Ignoring testing and approval of changes before deployment to the production environment
D) Ensuring changes to systems are requested and documented, authorized and documented, tested and approved before deployment to the production environment, and monitoring and resolving issues encountered during program development

A

D) Ensuring changes to systems are requested and documented, authorized and documented, tested and approved before deployment to the production environment, and monitoring and resolving issues encountered during program development

86
Q

Question: What is the main objective of System Development Life Cycle (SDLC)?

A) Speed up the development process regardless of quality
B) Ensure the development of new systems leads to data corruption
C) Prevent any changes to existing systems
D) Ensure development of new systems does not lead to data corruption

A

D) Ensure development of new systems does not lead to data corruption

87
Q

Question: What type of IT Application Control (ITAC) authenticates information entered into a system?

A) Output Controls
B) Process Controls
C) Batch Controls
D) Input Controls

A

D) Input Controls

88
Q

Question: What type of IT Application Control (ITAC) verifies information transmitted within the system?

A) Input Controls
B) Output Controls
C) Batch Controls
D) Processing Controls

A

D) Processing Controls

89
Q

Question: What type of IT Application Control (ITAC) validates information being sent out of the system?

A) Input Controls
B) Processing Controls
C) Batch Controls
D) Output Controls

A

D) Output Controls

90
Q

Question: What are examples of “Input Control - Check for Data Accuracy and Completeness”?

A) Ensuring all employees attend cybersecurity training sessions
B) Skipping the testing and approval process for changes before deployment to the production environment
C) Ignoring vulnerability scans and not assessing vulnerabilities for remediation
D) Data input authorization, data conversion, data editing, error handling (Correct Answer)

A

D) Data input authorization, data conversion, data editing, error handling

91
Q

Question: In Input Controls- IT Application Control (ITAC), what do we check for?

A) Ensuring data is encrypted during transmission
B) Checking for outdated software versions
C) Verifying the authenticity of information entered into the system
D) Checking for data accuracy and completeness

A

D) Checking for data accuracy and completeness

92
Q

Question: In Processing Controls- IT Application Control (ITAC), what do we check for?

A) Ensuring all employees attend cybersecurity training sessions
B) Ignoring the validation of data during processing
C) Verifying the authenticity of information entered into the system
D) Checking for data accuracy and completeness, and ensuring rules for processing data are followed

A

D) Checking for data accuracy and completeness, and ensuring rules for processing data are followed

93
Q

Question: In Output Controls- IT Application Control (ITAC), what do we check for?

A) Ignoring the validation of data during processing
B) Ensuring data is encrypted during transmission
C) Verifying the authenticity of information entered into the system
D) Checking for data accuracy and completeness, and ensuring access authorization

A

D) Checking for data accuracy and completeness, and ensuring access authorization (Correct Answer)

94
Q

Question: What is the 4th Step of the IT Audit Process?

A) Implementing controls
B) Reviewing previous audit reports
C) Reporting findings
D) Follow-Up

A

D) Follow-Up

94
Q

Question: What is the 3rd Step of the IT Audit Process?

A) Planning
B) Fieldwork
C) Implementing controls
D) Reporting

A

D) Reporting

95
Q

A) Analyzing findings
B) Reporting results
C) Reviewing previous audit reports
D) Fieldwork

A

D) Fieldwork

95
Q

Question: What is the 1st Step of the IT Audit Process?

A) Implementing controls
B) Reviewing previous audit reports
C) Ignoring risk assessment
D) Planning

A

D) Planning

96
Q

Question: What IT Audit Process deals with Notification & Request for Information Kick off Meeting?

A) Planning
B) Fieldwork
C) Reporting
D) Follow-Up

A

A) Planning

97
Q

Question: What IT Audit Process deals with Walkthroughs, Test of Design, Test of Operating Effectiveness, and Status of Meetings / Issues?

A) Planning
B) Fieldwork
C) Reporting
D) Follow-Up

A

B) Fieldwork

98
Q

Question: What IT Audit Process deals with Draft Report, Management Response, Closing Meeting, and Report Distribution?

A) Planning
B) Fieldwork
C) Reporting
D) Follow-Up

A

C) Reporting

99
Q

Question: What IT Audit Process deals with determining the audit objective, scope, risk consideration, and evidence to be collected?

A) Fieldwork
B) Reporting
C) Follow-Up
D) Planning

A

D) Planning

100
Q

Question: In the Planning Stage, what does the Objective ask, and what should the auditor consider?

A) Ensuring all employees attend cybersecurity training sessions
B) Reviewing previous audit reports
C) Identifying why are we conducting this review, considering Compliance with Policies, Achievement of Goals, Reliability of Data or Documents, Efficient use of Resources, and Safeguard of Assets
D) Conducting a risk assessment

A

C) Identifying why are we conducting this review, considering Compliance with Policies, Achievement of Goals, Reliability of Data or Documents, Efficient use of Resources, and Safeguard of Assets

101
Q

Question: What does a server do?

A) Stores physical documents
B) Sends emails to clients
C) Manages data processing and serves files to clients
D) Controls network security measures

A

C) Manages data processing and serves files to clients

102
Q

Question: What are the 3 types of ITAC (I.T. App Control)?

A) Data backups, password protection, and encryption
B) Firewalls, antivirus software, and intrusion detection systems
C) Input Controls, Process Controls, and Output Controls
D) User training, policy development, and incident response plans
E) All of the above

A

C) Input Controls, Process Controls, and Output Controls

3 Types of ITAC , IT App Control
1. Input Control
2. Process Control
3. Output Controls

103
Q

Question: What are the 4 types of ITGC (IT General Controls)?

A) Email security, network monitoring, software updates, and data backups
B) User training, incident response, encryption, and firewalls
C) Access, Change Management, IT Operations, SDLC
D) Compliance audits, risk assessments, financial audits, and internal controls testing
E) All of the above

A

C) Access, Change Management, IT Operations, SDLC (Correct Answer)

4 Types of ITGC
1. Access
2. Change Management
3. IT Operations
4. SDLC

104
Q

Question: What are the 3 types of Generic ID / Privilege Accounts?

A) User accounts, guest accounts, and service accounts
B) System Configuration, Application Configuration, and Administrator Actions
C) Database accounts, email accounts, and social media accounts
D) Standard accounts, privileged accounts, and guest accounts
E) All of the above

A

B) System Configuration, Application Configuration, and Administrator Actions

3 Types of Generic ID Privilege Accounts
1. System Configuration
2. Application Configuration
3. Administrator Actions

105
Q

Question: What are the 3 Main Functions of SOD?

A) User access, network security, and data encryption
B) System Configuration, Application Configuration, and Administrator Actions
C) Having Custody of Assets, Authorize the Use of Assets, and Recordkeeping of Assets
D) Compliance audits, risk assessments, and internal controls testing
E) All of the above

A

C) Having Custody of Assets, Authorize the Use of Assets, and Recordkeeping of Assets

3 Functions of SOD
1. Having Custody of Asset
2. Authorize the Use of Assets
3. Recordkeeping of Assets

106
Q

Question: Which Report deals with Internal Controls of Financial Reporting (ICFR)?

A) SOC 1 (Correct Answer)
B) SOC 2
C) SOC 3
D) ISO 27001
E) All of the above

A

A) SOC 1

SOC 1- ICFR, Internal Controls of Finances

107
Q

Question: Which Report deals with Private Internal Controls (Security, Privacy, Confidentiality, and Integrity)?

A) SOC 2 (Correct Answer)
B) SOC 1
C) SOC 3
D) ISO 27001
E) All of the above

A

A) SOC 2

SOC 2- Private Internal Controls

108
Q

Question: Which Report deals with Public Internal Controls (Security, Privacy, Confidentiality, and Integrity)?

A) SOC 3 (Correct Answer)
B) SOC 1
C) SOC 2
D) ISO 27001
E) All of the above

A

A) SOC 3

SOC 3- Public Internal Controls

109
Q

Question: Which SOC Report Type deals with Suitability & Effectiveness of Controls?

A) Type 2
B) Type 1
C) Type 3
D) SOC 3
E) All of the above

A

A) Type 2

SOC Report Type 2- Suitability & Effectiveness

110
Q

Question: Which are the 4 Sections of the SOC Report?

A) Period
B) Management Facts
C) Description of Systems
D) Testing of Controls
E) All of the above

A

E) All of the above

4 Sections of SOC
1. Period
2. Management Facts
3. Description of Systems
4. Testing of Controls

111
Q

Question: Which Outcome is considered Passing?

A) No Control Gap
B) Control Design Appropriate
C) Control Operating Effectively
D) All of the above

A

D) All of the above (correct answer)

Outcome of Passing Controls
1. No Control Gap
2. Control Design Appropriately
3. Control Operating Effectively

112
Q

Question: Which outcome is considered failing?

A) Control Gap
B) Not Designed Appropriately
C) Not Operating Effectively
D) All of the above

A

Outcome of Failing Control

  1. Control Gap
  2. Not Designed Appropriately
  3. Not Operatingly Effectively
113
Q

Question: What is the process for User Access Authorization?

A) Step 1: New User Request Form
B) Step 2: Manager Approves
C) Step 3: IT Team grants access
D) All of the above

A

D) All of the above

User Process for Access Authorization
1. New User Request form
2. Manager Approves
3. IT Team grants access

114
Q

Question: What is the process for Revoking Access?

A) Step 1: Manager Informs HR
B) Step 2: HR informs Tech Team
C) Step 3: IT Team removes Access
D) All of the above

A

D) All of the above

Revoking Access Process
1. Mgr. informs HR
2. HR informs Tech team
3. IT removes Access

115
Q

Question: What do you do if Password Configuration Fails?

A) Contact the system owner to reset the configuration
B) Reset the configuration to the needed settings
C) Use a compensating control, such as having users sign in with their domain password
D) All of the above

A

D) All of the above

  1. Contact the system owner to reset the configuration
    2 Reset the configuration to the needed settings
    3 Use a compensating control, such as having users sign in with their domain password
116
Q

Question: What steps are included in the Planning of IT Audit Process?

A) Review prior audit workpapers
B) Select team members and assign responsibilities
C) Create PBC (Prepare By Client List) - shows what controls are left
D) Conduct Kick Off Meeting
E) Have controls to be selected from Control Matrix
F) Determine audit objective, scope, considerations, and evidence to be collected
G) All of Above

A

G) All of Above

  1. Review prior audit workpapers
    2 Select team members and assign responsibilities
    3 Create PBC (Prepare By Client List) - shows what controls are left
    4 Conduct Kick Off Meeting
    5 Have controls to be selected from Control Matrix
    6 Determine audit objective, scope, considerations, and evidence to be collected
117
Q

Question: What steps are included in the Fieldwork stage of an IT Audit Process?

A) Schedule meetings with department personnel or head to discuss audit request
B) Conduct a walkthrough to understand the process/system
C) Test the design/controls
D) Test effectiveness of controls by selecting samples
E) Conduct status meetings with client or department (progress, delays, audit findings)
F) All of the Above

A

F) All of the Above

  1. Fieldwork Process
  2. Schedule meetings with department personnel or head to discuss audit request
  3. Conduct a walkthrough to understand the process/system
  4. Test the design/controls
  5. Test effectiveness of controls by selecting samples
  6. Conduct status meetings with client or department (progress, delays, audit findings)
118
Q

Question: What steps are included in the Reporting stage of an IT Audit Process?

A) Prepare draft report, include list of audit findings
B) Conduct exit meeting/exit memo
C) Request response from management
D) Distribute final audit report
E) All of the Above

A

E) All of the Above

Reporting Stage
1. Prepare draft report, include list of audit findings
2. Conduct exit meeting/exit memo
3. Request response from management
4. Distribute final audit report

119
Q

Question: What steps are included in the Follow-Up stage of an IT Audit Process?

A) Determine if control weaknesses are connected
B) Obtain evidence, or Retest control
C) Close deficiency
D) All of the Above

A

D) All of the Above

Follow-Up Stage

  1. Determine if control weaknesses are connected
  2. Obtain evidence, or Retest control
  3. Close deficiency
120
Q

Question: Which control weakness means “No Control in place”?

A) Control Gap
B) Control Breach
C) Control Breach
D) Control Void

A

A) Control Gap

Control Gap- No Control in Place

121
Q

Question: Which control weakness means “Control not operating effectively”?

A) Control Gap
B) Control Breakdown
C) Control Failure
D) Control Effectiveness

A

D) Control Effectiveness

Control Effectiveness-Control not operating effectively

122
Q

Question: What means “Material Impact on the Financial Statement”?

A) Key Control
B) Financial Liability
C) Non-Financial Impact
D) Audit Finding

A

A) Key Control

Material Impact on the Financial Statement

123
Q

Question: What means “Non-Material Impact on the financial statement”?

A) Non-Key Control
B) Financial Liability
C) Material Misstatement
D) Audit Finding

A

A) Non-Key Control

Non-Material Impact on the financial statement

124
Q

Steps for Testing Revoking Access

Step 1 Request list of employees within audit period
Step 2 Select sample from population
Step 3 Large population 10% or 25
Step 4 Obtain access request of samples
Step 5 Verify employees were only granted access to systems / application in line with job function
Step 6 : Verify that access granted by system admin is in line with approval

A

Steps for Testing Revoking Access

Step 1 Request list of employees within audit period
Step 2 Select sample from population
Step 3 Large population 10% or 25
Step 4 Obtain access request of samples
Step 5 Verify employees were only granted access to systems / application in line with job function
Step 6 : Verify that access granted by system admin is in line with approval

125
Q

Question: How do you Test for IT-Ops, Backups?

A) Review employee training records
B) Analyze customer feedback surveys
C) Confirm Backups are done, Determine frequency of backups, Completeness and Accuracy of data, Production errors are identified and resolved
D) Monitor network bandwidth usage

A

How to Test for IT-Ops / Backups
C) Confirm Backups are done, Determine frequency of backups, Completeness and Accuracy of data, Production errors are identified and resolved

126
Q

Question: How do you Test for SDLC?

A) Review employee training records
B) Conduct market research surveys
C) Inquire about the process of the SDLC, Obtain requests, obtain evidence of testing and approval before migration and obtain evidence that the new system has the appropriate controls, obtain issues encountered, and obtain signoff before going live.
D) Monitor network bandwidth usage

A

How do you Test for SDLC?

C) Inquire about the process of the SDLC, Obtain requests, obtain evidence of testing and approval before migration and obtain evidence that the new system has the appropriate controls, obtain issues encountered, and obtain signoff before going live.

127
Q

Question: How do you Test for Provisioning?

A) Review company financial statements
B) Conduct customer satisfaction surveys
C) Require list of employees within audit period, Select sample from population, Obtain access request evidence of samples, Verify employee samples were only granted access to systems / application in line with job functions, verify that access granted by system admin is in line with approval
D) Monitor server uptime statistics

A

How do you Test for Provisioning?

C) Require list of employees within audit period, Select sample from population, Obtain access request evidence of samples, Verify employee samples were only granted access to systems / application in line with job functions, verify that access granted by system admin is in line with approval

128
Q

Question: How do you Test for Password Configuration?

A) Conduct interviews with company executives
B) Analyze customer feedback on the company website
C) Obtain screenshot of password configuration or password policy from system owner. Ensure that the password policy of the Application meets the minimum requirement of the organization
D) Review employee attendance records

A

Test for Password Configuration

C) Obtain screenshot of password configuration or password policy from system owner. Ensure that the password policy of the Application meets the minimum requirement of the organization

129
Q

Question: How do you Test for Change Management?

A) Conduct interviews with department heads
B) Review the company’s financial statements
C) Obtain evidence of change request, obtain evidence of authorization and approval before changes into production migration, obtain evidence testing (UAT / QA signoff), Segregation of duties, Approval of change and change production
D) Review employee training records

A

How do you Test for Change Management?

C) Obtain evidence of change request, obtain evidence of authorization and approval before changes into production migration, obtain evidence testing (UAT / QA signoff), Segregation of duties, Approval of change and change production