Domain 1- Risk Management Flashcards

1
Q

Audit Plan

A

Detailed Risk Assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

continuous audit approach

A

Continuous audit allows audit and response to audit issues in a timely manner because audit findings are gathered in near real time.Responsibility for enforcement and monitoring of controls is primarily the responsibility of management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

risk-based audit strategy,

A

In developing a risk-based audit strategy, it is critical that the risk and vulnerabilities be understood. This will determine the areas to be audited and the extent of coverage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IS audit charter

A

ole of the IS audit function.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

emerging risk

A

The implementation of continuous auditing enables a real-time feed of information to management through automated reporting processes so that management may implement corrective actions more quickly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

computer-assisted audit techniques (CAATs)

A

Using software tools such as computer-assisted audit techniques (CAATs) to analyze transaction data can provide detailed analysis of trends and potential risk, but it is not as effective as continuous auditing, because there may be a time differential between executing the software and analyzing the results.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Risk Analysis Process

A
  1. Identify threats
  2. Potential impacts- including assests and systems
  3. existing controls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Control self-assessment (CSA)

A

Control self-assessment (CSA) is predicated on the review of high-risk areas that either need immediate attention or may require a more thorough review at a later date.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Project management

A

Audits often involve resource management, deliverables, scheduling and deadlines similar to project management good practices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

validity check

A

A validity check would be the most useful for the verification of passwords because it would verify that the required format has been used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

complying with privacy requirements

A

To ensure that the organization is complying with privacy issues, an IS auditor should address legal and regulatory requirements first. To comply with legal and regulatory requirements, organizations need to adopt the appropriate infrastructure. After understanding the legal and regulatory requirements, an IS auditor should evaluate organizational policies, standards and procedures to determine whether they adequately address the privacy requirements, and then review the adherence to these specific policies, standards and procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

source code comparison

A

When an IS auditor uses a source code comparison to examine source program changes without information from IS personnel, the IS auditor has an objective, independent and relatively complete assurance of program changes because the source code comparison will identify the changes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Trend/variance detection tools

A

Trend/variance detection tools look for anomalies in user or system behavior, such as invoices with increasing invoice numbers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Heuristic scanning tools

A

Heuristic scanning tools are a type of virus scanning used to indicate possible infected traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

lower confidence coefficient

A

will enable the use of a smaller sample size.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

risk-based audit approach

A

In a risk-based audit approach, the IS auditor identifies risk to the organization based on the nature of the business. In order to plan an annual audit cycle, the types of risk must be ranked. To rank the types of risk, the auditor must first define the audit universe by considering the IT strategic plan, organizational structure and authorization matrix.

17
Q

Integrated test facility (ITF)

A

An integrated test facility (ITF) is an audit technique to test the accuracy of the processes in the application system. It may find control flaws in the application system, but it would be difficult to find the overlap in key controls.

18
Q

sampling

A

A. Stop-or-go is a sampling method that helps limit the size of a sample and allows the test to be stopped at the earliest possible moment.

B. Classical variable sampling is associated with dollar amounts and has a sample based on a representative sample of the population but is not focused on fraud.

C. Discovery sampling is used when an IS auditor is trying to determine whether a type of event has occurred, and therefore it is suited to assess the risk of fraud and to identify whether a single occurrence has taken place.

D. Probability-proportional-to-size sampling is typically associated with cluster sampling when there are groups within a sample. The question does not indicate that an IS auditor is searching for a threshold of fraud.

19
Q

Applicable statutory requirements

A

A. The effect of applicable statutory requirements must be factored in while planning an IS audit—the IS auditor has no options in this respect because there can be no limitation of scope in respect to statutory requirements

20
Q

Types of testing

A

A. Substantive testing obtains audit evidence on the completeness, accuracy or existence of activities or transactions during the audit period.

B. Compliance testing is evidence gathering for the purpose of testing an enterprise’s compliance with control procedures. This differs from substantive testing in which evidence is gathered to evaluate the integrity of individual transactions, data or other information.

C. Analytical testing evaluates the relationship of two sets of data and discerns inconsistencies in the relationship.

D. Control testing is the same as compliance testing.

21
Q

statistical sampling and not judgmental (nonstatistical) sampling, when:

A

. Given an expected error rate and confidence level, statistical sampling is an objective method of sampling, which helps an IS auditor determine the sample size and quantify the probability of error (confidence coefficient).

22
Q

Generalized audit software

A

Generalized audit software features include mathematical computations, stratification, statistical analysis, sequence checking, duplicate checking and recomputations. An IS auditor, using generalized audit software, could design appropriate tests to recompute the payroll, thereby determining whether there were overpayments and to whom they were made.

23
Q

corrective control

A

identifies an issue and then corrects it

24
Q

risk-based audit plan

A

Developing a risk-based audit plan must start with the identification of key business processes, which will determine and identify the risk that needs to be addressed.

25
Q

Professional standards from ISACA, The Institute of Internal Auditors (IIA) and the International Federation of Accountants (IFAC)

A

require supervision of audit staff to accomplish audit objectives and comply with competence, professional proficiency and documentation requirements, and more.

26
Q

observations and interviews,

A

By observing the IS staff performing their tasks, an IS auditor can identify whether they are performing any incompatible operations, and by interviewing the IT staff, the auditor can get an overview of the tasks performed.

27
Q

Vulnerability

A

lack of adequate control