Domain 1: The Process of Auditing Information Systems - PART 1 A Flashcards
An appropriate control for ensuring the AUTHENTICITY of orders received in an electronic data interchange system application is to:
VERIFY the identity of senders and determine if orders correspond to contract terms.
As part of audit planning, an IS auditor is designing various data validation tests to effectively detect transposition and transcription errors. Which of the following will BEST help in detecting these errors?
Check digit
An AUDIT CHARTER should (3):
OUTLINE the overall (1) authority, (2) scope and (3) responsibilities of the audit FUNCTION.
A centralized antivirus system DETERMINES whether each personal computer has the latest signature files and installs the latest signature files before allowing a PC to connect to the network. This is an example of a:
CORRECTIVE control.
A company has recently upgraded its purchase system to incorporate electronic data interchange (EDI) transmissions. Which of the following CONTROLS should be implemented in the EDI interface to provide for efficient data mapping?
Functional ACKNOWLEDGEMENTS
Due to unexpected resource constraints of the IS audit team, the AUDIT PLAN, as originally approved, cannot be completed. Assuming the situation is communicated in the audit report, which course of action is MOST acceptable?
FOCUS on auditing high-RISK areas.
During a compliance audit of a small bank, the IS auditor notes that BOTH the IT and accounting FUNCTIONS are being performed by the same user of the financial system. Which of the following reviews conducted by the user’s supervisor would represent the BEST compensating control?
Examine computer LOG files that show INDIVIDUAL transactions.
During an exit interview, in cases where there is disagreement regarding the impact of a finding, an IS auditor should:
Elaborate on the significance of the finding and the risk of not correcting it.
During a risk analysis, an IS auditor identifies threats and potential impacts. Next, the IS auditor should:
Identify and evaluate the existing controls.
During a security audit of IT processes, an IS auditor FOUND that documented security procedures did NOT EXIST. The IS auditor should:
IDENTIFY and EVALUATE existing practices.
During the PLANNING stage of an IS audit, the PRIMARY goal of an IS auditor is to:
Address audit OBJECTIVES
The EXTENT to which data will be collected during an IS audit should be determined based on the:
PURPOSE and scope of the audit being done.
An external IS auditor discovers that systems in the scope of the audit were implemented by an associate. In such a circumstance, IS audit management should:
DISCLOSE the issue to the client.
An external IS auditor issues an audit report pointing out the lack of firewall protection features at the perimeter network gateway and RECOMMENDING a SPECIFIC vendor product to address this vulnerability. The IS auditor has failed to exercise:
Professional INDEPENDENCE.
The FINAL decision to include a material finding in an audit REPORT should be made by the:
IS auditor
A financial institution with multiple branch offices has an AUTOMATED control that requires the branch manager to APROVE transactions more than a certain amount. What type of audit control is this?
Preventive
For a retail business with a large volume of transactions, which of the following audit techniques is the MOST appropriate for addressing EMERGING risk?
CONTINUOUS auditing
In a small organization, the FUNCTION of release manager and application programmer are performed by the SAME employee. What is the BEST compensating CONTROL in this scenario?
VERIFY that only approved program changes are implemented
In PLANNING an IS audit, the MOST critical STEP is:
The IDENTIFICATION of the areas of SIGNIFICANT risk.
The internal audit department has written some scripts that are used for continuous auditing of some information systems. The IT department has asked for copies of the scripts so that they can use them for setting up a continuous monitoring process on key systems. Would sharing these scripts with IT affect the ability of the IS auditors to independently and objectively audit the IT function?
Sharing the scripts is permissible as long as IT recognizes that audits may still be conducted in areas not covered in the scripts.
An internal IS audit function is planning a general IS audit. Which of the following activities takes place during the FIRST step of the planning phase?
Development of a risk assessment
An IS auditor discovers that devices connected to the network are not included in a network diagram that had been used to develop the scope of the audit. The chief information officer explains that the diagram is being updated and awaiting final approval. The IS auditor should FIRST:
Evaluate the impact of the undocumented devices on the audit scope.
An IS auditor has identified a business process to be audited. The IS auditor should NEXT identify the:
Control objectives and activities.
An IS auditor is developing an audit plan for an environment that includes new systems. The organization’s management wants the IS auditor to focus on recently implemented systems. How should the IS auditor respond?
Determine the highest-risk systems and plan accordingly.
An IS auditor is reviewing a project risk assessment and notices that the overall residual risk level is high due to confidentiality requirements. Which of the following types of risk is normally high due to the number of unauthorized users the project may affect?
Inherent risk
An IS auditor is reviewing a software application that is built on the principles of service-oriented architecture. What is the INITIAL step?
Understanding services and their allocation to business processes by reviewing the service repository documentation.
An IS auditor is reviewing risk and controls of a bank wire transfer system. To ensure that the bank’s financial risk is properly addressed, the IS auditor will most likely review which of the following?
Wire transfer procedures
An IS auditor notes that failed login attempts to a core financial system are automatically logged and the logs are retained for a year by the organization. This logging is:
Not an adequate control.
An IS auditor performing an audit of the risk assessment process should FIRST confirm that:
Assets have been identified and ranked
An IS auditor performing a review of application controls would evaluate the:
Impact of any exposures discovered.
An IS auditor reviewing the process of log monitoring wants to evaluate the organization’s manual review process. Which of the following audit techniques would the auditor MOST likely employ to fulfill this purpose?
Walk-through
An IS auditor should ensure that review of online electronic funds transfer reconciliation procedures should include:
Tracing.