CISA 201 -300 Flashcards
The activation of an enterprise’s business continuity plan should be based on predetermined criteria that address the:
A. duration of the outage.
B. type of outage.
C. probability of the outage.
D. cause of the outage.
A. duration of the outage.
After an organization completed a threat and vulnerability analysis as part of a risk assessment, the final report suggested that an intrusion prevention system (IPS) should be installed at the main Internet gateways, and that all business units should be separated via a proxy firewall. Which of the following is the BEST method to determine whether the controls should be implemented?
A. A cost-benefit analysis
B. An annual loss expectancy (ALE) calculation
C. A comparison of the cost of the IPS and firewall and the cost of the business systems
D. A business impact analysis (BIA)
A. A cost-benefit analysis
After completing the business impact analysis (BIA), what is the NEXT step in the business continuity planning (BCP) process?
A. Test and maintain the plan.
B. Develop a specific plan.
C. Develop recovery strategies.
D. Implement the plan.
C. Develop recovery strategies.
As a driver of IT governance, transparency of IT’s cost, value and risk is primarily achieved through:
A. performance measurement.
B. strategic alignment.
C. value delivery.
D. resource management.
A. performance measurement.
As part of the business continuity planning (BCP) process, which of the following should be identified FIRST in the business impact analysis (BIA)?
A. Risk such as single point-of-failure and infrastructure risk
B. Threats to critical business processes
C. Critical business processes for ascertaining the priority for recovery
D. Resources required for resumption of business
C. Critical business processes for ascertaining the priority for recovery
Assessing IT risk is BEST achieved by:
A. evaluating threats and vulnerabilities associated with existing IT assets and IT projects.
B. using the firm’s past actual loss experience to determine current exposure.
C. reviewing published loss statistics from comparable organizations.
D. reviewing IT control weaknesses identified in audit reports.
A. evaluating threats and vulnerabilities associated with existing IT assets and IT projects.
Before implementing an IT balanced scorecard (BSC), an organization must:
A. deliver effective and efficient services.
B. define key performance indicators.
C. provide business value to IT projects.
D. control IT expenses.
B. define key performance indicators.
The BEST method for assessing the effectiveness of a business continuity plan is to review the:
A. plans and compare them to appropriate standards.
B. results from previous tests.
C. emergency procedures and employee training.
D. offsite storage and environmental controls.
B. results from previous tests.
By evaluating application development projects against the capability maturity model (CMM), an IS auditor should be able to verify that:
A. reliable products are guaranteed.
B. programmers’ efficiency is improved.
C. security requirements are designed.
D. predictable software processes are followed.
D. predictable software processes are followed.
Change control for business application systems being developed using prototyping could be complicated by the:
A. iterative nature of prototyping.
B. rapid pace of modifications in requirements and design.
C. emphasis on reports and screens.
D. lack of integrated tools.
B. rapid pace of modifications in requirements and design.
Depending on the complexity of an organization’s business continuity plan (BCP), it may be developed as a set of plans to address various aspects of business continuity and disaster recovery. In such an environment, it is essential that:
A. each plan is consistent with one another.
B. all plans are integrated into a single plan.
C. each plan is dependent on one another.
D. the sequence for implementation of all plans is defined.
A. each plan is consistent with one another.
The development of an application has been outsourced to an offshore vendor. Which of the following should be of GREATEST concern to an IS auditor?
A. The right to audit clause was not included in the contract.
B. The business case was not established.
C. There was no source code escrow agreement.
D. The contract does not cover change management procedures.
B. The business case was not established.
Disaster recovery planning (DRP) addresses the:
A. technological aspect of business continuity planning (BCP).
B. operational part of business continuity planning.
C. functional aspect of business continuity planning.
D. overall coordination of business continuity planning.
A. technological aspect of business continuity planning (BCP).
Documentation of a business case used in an IT development project should be retained until:
A. the end of the system’s life cycle.
B. the project is approved.
C. user acceptance of the system.
D. the system is in production.
A. the end of the system’s life cycle.
During an audit, an IS auditor notices that the IT department of a medium-sized organization has no separate risk management function, and the organization’s operational risk documentation only contains a few broadly described types of IT risk. What is the MOST appropriate recommendation in this situation?
A. Create an IT risk management department and establish an IT risk framework with the aid of external risk management experts.
B. Use common industry standard aids to divide the existing risk documentation into several individual types of risk which will be easier to handle.
C. No recommendation is necessary because the current approach is appropriate for a medium-sized organization.
D. Establish regular IT risk management meetings to identify and assess risk, and create a mitigation plan as input to the organization’s risk management.
D. Establish regular IT risk management meetings to identify and assess risk, and create a mitigation plan as input to the organization’s risk management.
During an audit of a business continuity plan (BCP), an IS auditor found that, although all departments were housed in the same building, each department had a separate BCP. The IS auditor recommended that the BCPs be reconciled. Which of the following areas should be reconciled FIRST?
A. Evacuation plan
B. Recovery priorities
C. Backup storages
D. Call tree
A. Evacuation plan
During a review of a business continuity plan, an IS auditor noticed that the point at which a situation is declared to be a crisis has not been defined. The MAJOR risk associated with this is that:
A. assessment of the situation may be delayed.
B. execution of the disaster recovery plan could be impacted.
C. notification of the teams might not occur.
D. potential crisis recognition might be delayed.
B. execution of the disaster recovery plan could be impacted.
During the design of a business continuity plan, the business impact analysis (BIA) identifies critical processes and supporting applications. This will PRIMARILY influence the:
A. responsibility for maintaining the business continuity plan.
B. criteria for selecting a recovery site provider.
C. recovery strategy.
D. responsibilities of key personnel.
C. recovery strategy.
An enterprise hosts its data center onsite and has outsourced the management of its key financial applications to a service provider. Which of the following controls BEST ensures that the service provider’s employees adhere to the security policies?
A. Sign-off is required on the enterprise’s security policies for all users.
B. An indemnity clause is included in the contract with the service provider.
C. Mandatory security awareness training is implemented for all users.
D. Security policies should be modified to address compliance by third-party users.
B. An indemnity clause is included in the contract with the service provider.
Establishing the level of acceptable risk is the responsibility of:
A. quality assurance (QA) management.
B. senior business management.
C. the chief information officer (CIO).
D. the chief security officer (CSO).
B. senior business management.
For effective implementation after a business continuity plan (BCP) has been developed, it is MOST important that the BCP be:
A. stored in a secure, offsite facility.
B. approved by senior management
C. communicated to appropriate personnel.
D. made available through the enterprise’s intranet.
C. communicated to appropriate personnel.
The GREATEST advantage of using web services for the exchange of information between two systems is:
A. secure communication.
B. improved performance.
C. efficient interfacing.
D. enhanced documentation
C. efficient interfacing.
The PRIMARY benefit of implementing a security program as part of a security governance framework is the:
A. alignment of the IT activities with IS audit recommendations.
B. enforcement of the management of security risk.
C. implementation of the chief information security officer’s (CISO’s) recommendations.
D. reduction of the cost for IT security.
B. enforcement of the management of security risk.
In determining the acceptable time period for the resumption of critical business processes:
A. only downtime costs need to be considered.
B. recovery operations should be analyzed.
C. both downtime costs and recovery costs need to be evaluated.
D. indirect downtime costs should be ignored.
C. both downtime costs and recovery costs need to be evaluated.
Integrating the business continuity plan (BCP) into IT project management aids in:
A. the testing of the business continuity requirements.
B. the development of a more comprehensive set of requirements.
C. the development of a transaction flowchart.
D. ensuring the application meets the user’s needs.
B. the development of a more comprehensive set of requirements.
An IS auditor can verify that an organization’s business continuity plan (BCP) is effective by reviewing the:
A. alignment of the BCP with industry good practices.
B. results of business continuity tests performed by IS and end-user personnel.
C. offsite facility, its contents, security and environmental controls.
D. annual financial cost of the BCP activities versus the expected benefit of the implementation of the plan.
B. results of business continuity tests performed by IS and end-user personnel.
An IS auditor conducting a review of disaster recovery planning (DRP) at a financial processing organization has discovered the following:
The existing DRP was compiled two years earlier by a systems analyst in the organization’s IT department using transaction flow projections from the operations department.
The DRP was presented to the deputy chief executive officer (CEO) for approval and formal issue, but it is still awaiting their attention.
The DRP has never been updated, tested or circulated to key management and staff, though interviews show that each would know what action to take for its area in the event of a disruptive incident.
The IS auditor’s report should recommend that:
A. the deputy CEO be censured for failure to approve the plan.
B. a board of senior managers is set up to review the existing plan.
C. the existing plan is approved and circulated to all key management and staff.
D. a manager coordinates the creation of a new or revised plan within a defined time limit.
D. a manager coordinates the creation of a new or revised plan within a defined time limit.
An IS auditor has been assigned to review IT structures and activities recently outsourced to various providers. Which of the following should the IS auditor determine FIRST?
A. An audit clause is present in all contracts.
B. The service level agreement (SLA) of each contract is substantiated by appropriate key performance indicators (KPIs).
C. The contractual warranties of the providers support the business needs of the organization.
D. At contract termination, support is guaranteed by each outsourcer for new outsourcers.
C. The contractual warranties of the providers support the business needs of the organization.
An IS auditor is performing an audit in the data center when the fire alarm begins sounding. The audit scope includes disaster recovery, so the auditor observes the data center staff response to the alarm. Which of the following is the MOST important action for the data center staff to complete in this scenario?
A. Notify the local fire department of the alarm condition.
B. Prepare to activate the fire suppression system.
C. Ensure that all persons in the data center are evacuated.
D. Remove all backup tapes from the data center.
C. Ensure that all persons in the data center are evacuated.
An IS auditor is reviewing a contract management process to determine the financial viability of a software vendor for a critical business application. An IS auditor should determine whether the vendor being considered:
A. can deliver on the immediate contract.
B. is of similar financial standing as the organization.
C. has significant financial obligations that can impose liability to the organization.
D. can support the organization in the long term.
D. can support the organization in the long term.
An IS auditor is reviewing an IT security risk management program. Measures of security risk should:
A. address all of the network risk.
B. be tracked over time against the IT strategic plan.
C. take into account the entire IT environment.
D. result in the identification of vulnerability tolerances.
C. take into account the entire IT environment.
An IS auditor is reviewing an organization’s recovery from a disaster in which not all the critical data needed to resume business operations were retained. Which of the following was incorrectly defined?
A. The interruption window
B. The recovery time objective (RTO)
C. The service delivery objective (SDO)
D. The recovery point objective (RPO)
D. The recovery point objective (RPO)
An IS auditor is reviewing the risk management process. Which of the following is the MOST important consideration during this review?
A. Controls are implemented based on cost-benefit analysis.
B. The risk management framework is based on global standards.
C. The approval process for risk response is in place.
D. IT risk is presented in business terms.
D. IT risk is presented in business terms.
An IS auditor is told by IS management that the organization has recently reached the highest level of the software capability maturity model (CMM). The software quality process MOST recently added by the organization is:
A. continuous improvement.
B. quantitative quality goals.
C. a documented process.
D. a process tailored to specific projects
A. continuous improvement.
An IS auditor observes that an enterprise has outsourced software development to a third party that is a startup company. To ensure that the enterprise’s investment in software is protected, which of the following should be recommended by the IS auditor?
A. Due diligence should be performed on the software vendor.
B. A quarterly audit of the vendor facilities should be performed.
C. There should be a source code escrow agreement in place.
D. A high penalty clause should be included in the contract.
C. There should be a source code escrow agreement in place.
An IS auditor performing an audit of the risk assessment process should FIRST confirm that:
A. reasonable threats to the information assets are identified.
B. technical and organizational vulnerabilities have been analyzed.
C. assets have been identified and ranked.
D. the effects of potential security breaches have been evaluated.
C. assets have been identified and ranked.
An IS auditor reviewing an outsourcing contract of IT facilities would expect it to define the:
A. hardware configuration.
B. access control software.
C. ownership of intellectual property.
D. application development methodology.
C. ownership of intellectual property.
An IS auditor was hired to review e-business security. The IS auditor’s first task was to examine each existing e-business application, looking for vulnerabilities. What would be the next task?
A. Immediately report the risk to the chief information officer (CIO) and chief executive officer (CEO).
B. Examine the e-business application in development.
C. Identify threats and the likelihood of occurrence.
D. Check the budget available for risk management.
C. Identify threats and the likelihood of occurrence.
Many IT projects experience problems because the development time and/or resource requirements are underestimated. Which of the following techniques would provide the GREATEST assistance in developing an estimate of project duration?
A. Function point analysis (FPA)
B. Program evaluation review technique (PERT) chart
C. Rapid application development
D. Object-oriented system development
B. Program evaluation review technique (PERT) chart
A medium-sized organization, whose IT disaster recovery measures have been in place and regularly tested for years, has just developed a formal business continuity plan (BCP). A basic BCP tabletop exercise has been performed successfully. Which testing should an IS auditor recommend be performed NEXT to verify the adequacy of the new BCP?
A. Full-scale test with relocation of all departments, including IT, to the contingency site
B. Walk-through test of a series of predefined scenarios with all critical personnel involved
C. IT disaster recovery test with business departments involved in testing the critical applications
D. Functional test of a scenario with limited IT involvement
D. Functional test of a scenario with limited IT involvement