CISA 201 -300 Flashcards
The activation of an enterprise’s business continuity plan should be based on predetermined criteria that address the:
A. duration of the outage.
B. type of outage.
C. probability of the outage.
D. cause of the outage.
A. duration of the outage.
After an organization completed a threat and vulnerability analysis as part of a risk assessment, the final report suggested that an intrusion prevention system (IPS) should be installed at the main Internet gateways, and that all business units should be separated via a proxy firewall. Which of the following is the BEST method to determine whether the controls should be implemented?
A. A cost-benefit analysis
B. An annual loss expectancy (ALE) calculation
C. A comparison of the cost of the IPS and firewall and the cost of the business systems
D. A business impact analysis (BIA)
A. A cost-benefit analysis
After completing the business impact analysis (BIA), what is the NEXT step in the business continuity planning (BCP) process?
A. Test and maintain the plan.
B. Develop a specific plan.
C. Develop recovery strategies.
D. Implement the plan.
C. Develop recovery strategies.
As a driver of IT governance, transparency of IT’s cost, value and risk is primarily achieved through:
A. performance measurement.
B. strategic alignment.
C. value delivery.
D. resource management.
A. performance measurement.
As part of the business continuity planning (BCP) process, which of the following should be identified FIRST in the business impact analysis (BIA)?
A. Risk such as single point-of-failure and infrastructure risk
B. Threats to critical business processes
C. Critical business processes for ascertaining the priority for recovery
D. Resources required for resumption of business
C. Critical business processes for ascertaining the priority for recovery
Assessing IT risk is BEST achieved by:
A. evaluating threats and vulnerabilities associated with existing IT assets and IT projects.
B. using the firm’s past actual loss experience to determine current exposure.
C. reviewing published loss statistics from comparable organizations.
D. reviewing IT control weaknesses identified in audit reports.
A. evaluating threats and vulnerabilities associated with existing IT assets and IT projects.
Before implementing an IT balanced scorecard (BSC), an organization must:
A. deliver effective and efficient services.
B. define key performance indicators.
C. provide business value to IT projects.
D. control IT expenses.
B. define key performance indicators.
The BEST method for assessing the effectiveness of a business continuity plan is to review the:
A. plans and compare them to appropriate standards.
B. results from previous tests.
C. emergency procedures and employee training.
D. offsite storage and environmental controls.
B. results from previous tests.
By evaluating application development projects against the capability maturity model (CMM), an IS auditor should be able to verify that:
A. reliable products are guaranteed.
B. programmers’ efficiency is improved.
C. security requirements are designed.
D. predictable software processes are followed.
D. predictable software processes are followed.
Change control for business application systems being developed using prototyping could be complicated by the:
A. iterative nature of prototyping.
B. rapid pace of modifications in requirements and design.
C. emphasis on reports and screens.
D. lack of integrated tools.
B. rapid pace of modifications in requirements and design.
Depending on the complexity of an organization’s business continuity plan (BCP), it may be developed as a set of plans to address various aspects of business continuity and disaster recovery. In such an environment, it is essential that:
A. each plan is consistent with one another.
B. all plans are integrated into a single plan.
C. each plan is dependent on one another.
D. the sequence for implementation of all plans is defined.
A. each plan is consistent with one another.
The development of an application has been outsourced to an offshore vendor. Which of the following should be of GREATEST concern to an IS auditor?
A. The right to audit clause was not included in the contract.
B. The business case was not established.
C. There was no source code escrow agreement.
D. The contract does not cover change management procedures.
B. The business case was not established.
Disaster recovery planning (DRP) addresses the:
A. technological aspect of business continuity planning (BCP).
B. operational part of business continuity planning.
C. functional aspect of business continuity planning.
D. overall coordination of business continuity planning.
A. technological aspect of business continuity planning (BCP).
Documentation of a business case used in an IT development project should be retained until:
A. the end of the system’s life cycle.
B. the project is approved.
C. user acceptance of the system.
D. the system is in production.
A. the end of the system’s life cycle.
During an audit, an IS auditor notices that the IT department of a medium-sized organization has no separate risk management function, and the organization’s operational risk documentation only contains a few broadly described types of IT risk. What is the MOST appropriate recommendation in this situation?
A. Create an IT risk management department and establish an IT risk framework with the aid of external risk management experts.
B. Use common industry standard aids to divide the existing risk documentation into several individual types of risk which will be easier to handle.
C. No recommendation is necessary because the current approach is appropriate for a medium-sized organization.
D. Establish regular IT risk management meetings to identify and assess risk, and create a mitigation plan as input to the organization’s risk management.
D. Establish regular IT risk management meetings to identify and assess risk, and create a mitigation plan as input to the organization’s risk management.
During an audit of a business continuity plan (BCP), an IS auditor found that, although all departments were housed in the same building, each department had a separate BCP. The IS auditor recommended that the BCPs be reconciled. Which of the following areas should be reconciled FIRST?
A. Evacuation plan
B. Recovery priorities
C. Backup storages
D. Call tree
A. Evacuation plan
During a review of a business continuity plan, an IS auditor noticed that the point at which a situation is declared to be a crisis has not been defined. The MAJOR risk associated with this is that:
A. assessment of the situation may be delayed.
B. execution of the disaster recovery plan could be impacted.
C. notification of the teams might not occur.
D. potential crisis recognition might be delayed.
B. execution of the disaster recovery plan could be impacted.
During the design of a business continuity plan, the business impact analysis (BIA) identifies critical processes and supporting applications. This will PRIMARILY influence the:
A. responsibility for maintaining the business continuity plan.
B. criteria for selecting a recovery site provider.
C. recovery strategy.
D. responsibilities of key personnel.
C. recovery strategy.
An enterprise hosts its data center onsite and has outsourced the management of its key financial applications to a service provider. Which of the following controls BEST ensures that the service provider’s employees adhere to the security policies?
A. Sign-off is required on the enterprise’s security policies for all users.
B. An indemnity clause is included in the contract with the service provider.
C. Mandatory security awareness training is implemented for all users.
D. Security policies should be modified to address compliance by third-party users.
B. An indemnity clause is included in the contract with the service provider.
Establishing the level of acceptable risk is the responsibility of:
A. quality assurance (QA) management.
B. senior business management.
C. the chief information officer (CIO).
D. the chief security officer (CSO).
B. senior business management.
For effective implementation after a business continuity plan (BCP) has been developed, it is MOST important that the BCP be:
A. stored in a secure, offsite facility.
B. approved by senior management
C. communicated to appropriate personnel.
D. made available through the enterprise’s intranet.
C. communicated to appropriate personnel.
The GREATEST advantage of using web services for the exchange of information between two systems is:
A. secure communication.
B. improved performance.
C. efficient interfacing.
D. enhanced documentation
C. efficient interfacing.
The PRIMARY benefit of implementing a security program as part of a security governance framework is the:
A. alignment of the IT activities with IS audit recommendations.
B. enforcement of the management of security risk.
C. implementation of the chief information security officer’s (CISO’s) recommendations.
D. reduction of the cost for IT security.
B. enforcement of the management of security risk.
In determining the acceptable time period for the resumption of critical business processes:
A. only downtime costs need to be considered.
B. recovery operations should be analyzed.
C. both downtime costs and recovery costs need to be evaluated.
D. indirect downtime costs should be ignored.
C. both downtime costs and recovery costs need to be evaluated.