CISA++ - Chapter 2 Flashcards

1
Q

Why is an IT governance framework important?

?
Manages IT risks
Improves decision-making
Enhances accountability
Facilitates compliance

A

Aligns IT with business goals: Ensures technology supports the company’s strategic objectives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why is an IT governance framework important?

Aligns IT with business goals
?
Improves decision-making
Enhances accountability
Facilitates compliance

A

Manages IT risks: Identifies and addresses potential threats to IT systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why is an IT governance framework important?

Aligns IT with business goals
Manages IT risks
?
Enhances accountability
Facilitates compliance

A

Improves decision-making: Provides a structured approach to IT investments and resource allocation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why is an IT governance framework important?

Aligns IT with business goals
Manages IT risks
Improves decision-making
?
Facilitates compliance

A

Enhances accountability: Defines roles and responsibilities for IT management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why is an IT governance framework important?

Aligns IT with business goals
Manages IT risks
Improves decision-making
Enhances accountability
?

A

Facilitates compliance: Helps meet industry regulations and standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an IT governance framework?

A

System that enables the stewardship of IT resources and keeps the organization on track.

Think of a governor of a state :D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is IT Risk Management?

A

The process of identifying, assessing, and controlling risks to an organization’s information technology (IT) infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

IT Risk Management is important in 3 major areas:

Protecting critical assets
Supporting business objectives
?

A

Compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an IS auditor’s role when it comes to an IT governance framework and IT risk management practices?

A

Provide recommendations to senior management and provide qualitative assessments on improving GEIT initiatives.

Gotta talk to the big bosses!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why is IT Risk Management important with regards to critical assets?

A

It safeguards critical assets like sensitive data, systems, and networks from threats like cyberattacks, natural disasters, and human error.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why is IT Risk Management important with regards to business objectives?

A

It supports business objectives by ensuring IT aligns with business goals while mitigating risks that could hinder operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why is IT Risk Management important with regards to compliance?

A

Compliance: Helps organizations adhere to industry regulations and standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IT Risk Management is important in 3 major areas:

?
Supporting business objectives
Compliance

A

Protecting critical assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

IT Risk Management is important in 3 major areas:

Protecting critical assets
?
Compliance

A

Supporting business objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How should an IS auditor handle undefined responsibilities regarding IT management and governance roles?

  1. Document the Finding
  2. ?
  3. Recommend a solution
  4. Follow-up
A

Assess the Risk: Determine the level of risk associated with the undefined roles. This includes evaluating the potential for errors, inefficiencies, or security breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How should an IS auditor handle undefined responsibilities regarding IT management and governance roles?

  1. ?
  2. Assess the Risk
  3. Recommend a solution
  4. Follow-up
A

Document the Finding: Clearly outline the specific roles and responsibilities that are undefined and the potential impact on IT governance and operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How should an IS auditor handle undefined responsibilities regarding IT management and governance roles?

  1. Document the Finding
  2. Assess the Risk
  3. ?
  4. Follow-up
A

Recommend a Solution: Propose clear recommendations to address the issue.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

How should an IS auditor handle undefined responsibilities regarding IT management and governance roles?

  1. Document the Finding
  2. Assess the Risk
  3. Recommend a solution
  4. ?
A

Follow-up: Monitor the organization’s progress in addressing the issue and provide additional guidance if necessary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What does an IT manager do?

A

IT Manager: Oversees day-to-day IT operations, manages IT staff, and ensures IT services are delivered efficiently.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What does a Network Engineer do?

A

Network Engineer: Manages and maintains the organization’s network infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What does a System Administrator do?

A

System Administrator: Manages and supports computer systems and servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What does a Database Administrator (DBA) do?

A

Database Administrator (DBA): Manages and maintains databases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What does a Software Developer do?

A

Software Developer: Designs, develops, and tests software applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What does a Web Developer do?

A

Web Developer: Creates and maintains websites and web applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What does a Systems Analyst do?

A

Systems Analyst: Analyzes business requirements and designs IT solutions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What does a IT Project Manager do?

A

IT Project Manager: Plans, executes, and closes IT projects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What does a Information Security Officer (ISO) do?

A

Information Security Officer (ISO): Develops and implements information security policies and procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What does a Security Analyst do?

A

Security Analyst: Monitors for security threats and incidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Why is it concerning for individuals to serve in multiple roles under the IT function?

A

Some regulations require clear segregation of duties to prevent fraud or errors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Which are the most concerning roles for one individual to concurrently have under the IT function and why?

A

The most concerning role overlap in IT is between security and development functions. This combination can lead to vulnerabilities and exploits that compromise system integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What are the responsibilities of the IT Steering Committee?

A

An IT Steering Committee (ITSC) is responsible for providing strategic direction, oversight, and governance for an organization’s IT initiatives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What does the IT steering committee’s responsibility of Vendor Management cover?

A

Overseeing relationships with IT vendors and service providers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What does the IT steering committees responsibility of Strategic Alignment cover?

A

Ensuring IT initiatives support overall business objectives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What does the IT steering committee responsibility of Resource Allocation cover?

A

Prioritizing IT projects and allocating budgets accordingly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What does the ITSC’s responsibility of Risk Management cover?

A

Identifying, assessing, and mitigating IT-related risks.

36
Q

What does the ITSC’s responsibility of Performance Measurement cover?

A

Establishing key performance indicators (KPIs) to measure IT performance.

37
Q

What does the ITSC’s responsibility of Decision Making cover?

A

Approving major IT projects and initiatives.

38
Q

What does the ITSC’s responsibility of Communication cover?

A

Communicating IT plans and progress to senior management and the board.

39
Q

Why is the IT Steering Committee the best group to determine an enterprise’s risk appetite?

A

ACTUALLY, it’s not the ITSC - it’s the Board of Directors (BoD) who is responsible for establishing the risk appetite.

The IT Steering Committee’s role is to align IT risks with the overall enterprise risk appetite and develop strategies to manage IT-specific risks.

tl;dr:
BoD says what the risk appetite is
ITSC says how to align IT risks with the appetite

40
Q

How does an IS auditor perform a risk assessment for information assets?

Identify Information Assets
Threat Identification
Vulnerability Assessment
Impact Assessment
Risk Calculation
Risk Prioritization
Risk Response

A
41
Q

How does an IS auditor perform a risk assessment for information assets?

?
Threat Identification
Vulnerability Assessment
Impact Assessment
Risk Calculation
Risk Prioritization
Risk Response

A

Identify Information Assets: Determine the organization’s critical assets, including data, systems, and networks.

42
Q

How does an IS auditor perform a risk assessment for information assets?

Identify Information Assets
?
Vulnerability Assessment
Impact Assessment
Risk Calculation
Risk Prioritization
Risk Response

A

Threat Identification: Identify potential threats to these assets, such as natural disasters, cyberattacks, human error, and unauthorized access.

43
Q

How does an IS auditor perform a risk assessment for information assets?

Identify Information Assets
Threat Identification
?
Impact Assessment
Risk Calculation
Risk Prioritization
Risk Response

A

Vulnerability Assessment: Evaluate the weaknesses or gaps in the organization’s security controls that could be exploited by threats.

44
Q

How does an IS auditor perform a risk assessment for information assets?

Identify Information Assets
Threat Identification
Vulnerability Assessment
?
Risk Calculation
Risk Prioritization
Risk Response

A

Impact Assessment: Determine the potential consequences of each identified risk, including financial, reputational, and operational impacts.

45
Q

How does an IS auditor perform a risk assessment for information assets?

Identify Information Assets
Threat Identification
Vulnerability Assessment
Impact Assessment
?
Risk Prioritization
Risk Response

A

Risk Calculation: Combine the likelihood of a threat occurring with the potential impact to calculate the overall risk level.

46
Q

How does an IS auditor perform a risk assessment for information assets?

Identify Information Assets
Threat Identification
Vulnerability Assessment
Impact Assessment
Risk Calculation
?
Risk Response

A

Risk Prioritization: Rank risks based on their severity and likelihood to inform resource allocation and mitigation efforts.

47
Q

How does an IS auditor perform a risk assessment for information assets?

Identify Information Assets
Threat Identification
Vulnerability Assessment
Impact Assessment
Risk Calculation
Risk Prioritization
?

A

Risk Response: Develop strategies to mitigate, transfer, accept, or avoid identified risks.

48
Q

Why is a risk assessment the primary focus for an IS auditor when determining the appropriate level of protection for an information asset?

A

Well-conducted risk assessment helps organizations safeguard their valuable information assets and minimize potential losses.

49
Q

What is Inherent Risk?

A

Inherent Risk: The potential for loss or damage in the absence of any controls.

50
Q

What is Residual Risk?

A

Residual Risk: The risk that remains after controls have been implemented.

51
Q

What is Control Risk?

A

Control Risk: The risk that internal controls will fail to prevent or detect and correct misstatements on a timely basis.

52
Q

What is Detection Risk?

A

Detection Risk: The risk that the auditor will fail to detect a material misstatement.

53
Q

What is Business Risk?

A

Business Risk: The potential for an organization to suffer loss or harm due to uncertain events or conditions.

54
Q

What is an IS auditor’s high-level role for an organization that’s undergoing a business process reengineering (BPR) effort?

A

Ensures that the new processes are secure, efficient, and aligned with the organization’s overall objectives.

55
Q

The IS auditor covers the following responsibilities during a BPR (business process reengineering) effort:

?
Control evaluation
Security evaluation

A

Risk assessment: Identifying potential IT-related risks associated with the new processes.

56
Q

The IS auditor covers the following responsibilities during a BPR (business process reengineering) effort:

Risk assessment
?
Security evaluation

A

Control evaluation: Assessing the adequacy of existing controls and recommending improvements.

57
Q

The IS auditor covers the following responsibilities during a BPR (business process reengineering) effort:

Risk assessment
Control evaluation
?

A

Security evaluation: Ensuring that the new processes maintain an appropriate level of security.

58
Q

What are the main goals of a BPR (business process reengineering) effort?

?
Enhance customer satisfaction
Gain a competitive advantage

A

Improve efficiency: Streamline processes to reduce costs and increase productivity.

59
Q

What are the main goals of a BPR (business process reengineering) effort?

Improve efficiency
?
Gain a competitive advantage

A

Enhance customer satisfaction: Deliver products or services that better meet customer needs.

60
Q

What are the main goals of a BPR (business process reengineering) effort?

Improve efficiency
Enhance customer satisfaction
?

A

Gain a competitive advantage: Differentiate the organization from competitors.

61
Q

Why do businesses go through a BPR (business process reengineering) effort?

?
There’s a need for a major overhaul
New technologies offer opportunities
Market conditions change
Mergers or acquisitions occur

A

They face significant challenges: This could include declining profits, increased competition, or outdated processes that are hindering efficiency.

62
Q

Why do businesses go through a BPR (business process reengineering) effort?

They face significant challenges
?
New technologies offer opportunities
Market conditions change
Mergers or acquisitions occur

A

There’s a need for a major overhaul: BPR is often considered when incremental improvements are not enough to address fundamental issues.

63
Q

Why do businesses go through a BPR (business process reengineering) effort?

They face significant challenges
There’s a need for a major overhaul
?
Market conditions change
Mergers or acquisitions occur

A

New technologies offer opportunities: Advances in technology can enable new ways of doing business, making BPR a viable option.

64
Q

Why do businesses go through a BPR (business process reengineering) effort?

They face significant challenges
There’s a need for a major overhaul
New technologies offer opportunities
?
Mergers or acquisitions occur

A

Market conditions change: Shifts in customer preferences, industry regulations, or economic factors can necessitate a rethinking of business processes.

65
Q

Why do businesses go through a BPR (business process reengineering) effort?

They face significant challenges
There’s a need for a major overhaul
New technologies offer opportunities
Market conditions change
?

A

Mergers or acquisitions occur: Integrating different business cultures and operations can require a significant overhaul of processes.

66
Q

How does an IS auditor help an organization achieve a BPR (business process reengineering) effort?

A

By ensuring that the new processes are secure, efficient, and compliant

67
Q

How should IS auditors work with senior management?

?
Value-Added Services
Strategic Alignment

A

Proactive Reporting: Providing timely and actionable insights into IT risks and control weaknesses.

68
Q

How should IS auditors work with senior management?

Proactive Reporting
?
Strategic Alignment

A

Value-Added Services: Offering recommendations for improvement beyond audit findings.

69
Q

How should IS auditors work with senior management?

Proactive Reporting
Value-Added Services
?

A

Strategic Alignment: Demonstrating how audit findings contribute to the organization’s overall goals.

70
Q

What does it mean for a company’s senior management to accept the risk?

A

They formally acknowledge the risk and monitor it

71
Q

What is short-term planning for an IT department and why is it important?

A

Short-term planning in IT involves setting and achieving specific, achievable goals within a defined timeframe (usually less than a year). It’s about translating long-term IT strategies into actionable steps.

72
Q

What is an IS auditor’s role during short-term planning for an IT department?

?
Resource Allocation
Risk Mitigation

A

Focus and Prioritization: Helps IT teams concentrate on immediate tasks and deliverables.

73
Q

What is an IS auditor’s role during short-term planning for an IT department?

Focus and Prioritization
?
Risk Mitigation

A

Resource Allocation: Optimizes the use of personnel, budget, and technology.

74
Q

What is an IS auditor’s role during short-term planning for an IT department?

Focus and Prioritization
Resource Allocation
?

A

Risk Mitigation: Identifies potential challenges and develops contingency plans.

75
Q

What is a SLA (service level agreement)?

A

SLA: A broader contract between a service provider and a customer that outlines the expected level of service.

It includes metrics like response time, availability, and performance.

76
Q

What is an Uptime guarantee?

A

Uptime guarantee: A specific component of an SLA that promises a certain level of system or network availability. It’s often expressed as a percentage (e.g., 99.99% uptime).

77
Q

What are the most important considerations for an IS auditor when working with an organization that’s considering working with a third-party vendor?

A

IS auditor should require third party audit reports

78
Q

What is an uptime guarantee in relation to service level agreements?

A

An uptime guarantee is a quantifiable commitment within a broader service-level agreement. It ensures that the service provider is held accountable for system availability and performance.

79
Q

What is the role of an IS auditor when an organization is determining financial viability of working with a third-party vendor?

?
Identifying red flags
Evaluating business continuity plans

A

Assessing financial stability: Reviewing the vendor’s financial statements, cash flow, and debt-to-equity ratio to determine its overall financial health.

80
Q

What is the role of an IS auditor when an organization is determining financial viability of working with a third-party vendor?

Assessing financial stability
?
Evaluating business continuity plans

A

Identifying red flags: Looking for signs of financial distress, such as declining revenue, increasing debt, or negative cash flow.

81
Q

What is the role of an IS auditor when an organization is determining financial viability of working with a third-party vendor?

Assessing financial stability
Identifying red flags
?

A

Evaluating business continuity plans: Assessing the vendor’s ability to recover from financial setbacks.

82
Q

What should an IS auditor do when the organization they are auditing is considering outsourcing work to a third-party organization?

?
Analyze the best service provider
Ensure risks are mitigated
Inspect the SLA

A

Assess the sourcing strategy

83
Q

What should an IS auditor do when the organization they are auditing is considering outsourcing work to a third-party organization?

Assess the sourcing strategy
?
Ensure risks are mitigated
Inspect the SLA

A

Analyze the best service provider

84
Q

What should an IS auditor do when the organization they are auditing is considering outsourcing work to a third-party organization?

Assess the sourcing strategy
Analyze the best service provider
?
Inspect the SLA

A

Ensure risks are mitigated

85
Q

What should an IS auditor do when the organization they are auditing is considering outsourcing work to a third-party organization?

Assess the sourcing strategy
Analyze the best service provider
Ensure risks are mitigated
?

A

Inspect the SLA