Domain 1: The Process of Auditing Information Systems - PART 1 B Flashcards
After identifying the findings, the IS auditor should FIRST:
gain agreement on the findings.
After initial investigation, an IS auditor has reasons to believe that fraud may be present. The IS auditor should:
expand activities to determine whether an investigation is warranted.
After reviewing the disaster recovery planning process of an organization, an IS auditor requests a meeting with organization management to discuss the findings. Which of the following BEST describes the main goal of this meeting?
Confirming factual accuracy of the findings
An auditee disagrees with an audit finding. Which of the following is the BEST course of action for the IT auditor to take?
Discuss the finding with the IT auditor’s manager.
The BEST method of confirming the accuracy of a system tax calculation is by:
preparing simulated transactions for processing and comparing the results to predetermined results.
Corrective action has been taken by an auditee immediately after the identification of a reportable finding. The auditor should:
include the finding in the final report, because the IS auditor is responsible for an accurate report of all findings.
The decisions and actions of an IS auditor are MOST likely to affect which of the following types of risk?
Detection
During an audit, the IS auditor notes the application developer also performs quality assurance testing on another application. Which of the following is the MOST important course of action for the auditor?
Report the identified condition.
During an IS audit, which is the BEST method for an IS auditor to evaluate the implementation of segregation of duties within an IT department?
Discuss it with the IT managers.
During the course of an application software review, an IS auditor identified minor weaknesses in a relevant database environment that is out of scope for the audit. The BEST option is to:
report the weaknesses as observed.
The effect of which of the following should have priority in planning the scope and objectives of an IS audit?
Applicable statutory requirements
In a risk-based IS audit, where both inherent and control risk have been assessed as high, an IS auditor would MOST likely compensate for this scenario by performing additional:
substantive testing.
The internal IS audit team is auditing controls over sales returns and is concerned about fraud. Which of the following sampling methods would BEST assist the IS auditors?
Discovery
In the process of evaluating program change controls, an IS auditor would use source code comparison software to:
examine source program changes without information from IS personnel.
An IS audit department is considering implementing continuous auditing techniques for a multinational retail enterprise that processes a large volume of transactions per day. A PRIMARY benefit of continuous auditing is that:
fraud can be detected more quickly.
An IS auditor conducting a review of disaster recovery planning (DRP) at a financial processing organization has discovered the following:
> The existing DRP was compiled two years earlier by a systems analyst in the organization’s IT department using transaction flow projections from the operations department.
> The DRP was presented to the deputy chief executive officer (CEO) for approval and formal issue, but it is still awaiting attention.
> The DRP has never been updated, tested or circulated to key management and staff, although interviews show that each would know what action to take for its area if a disruptive incident occurred.. The IS auditor’s report should recommend that:
a manager coordinates the creation of a new or revised plan within a defined time limit.
An IS auditor conducting a review of software usage and licensing discovers that numerous PCs contain unauthorized software. Which of the following actions should the IS auditor take?
Report the use of the unauthorized software and the need to prevent recurrence.
An IS auditor discovers a potential material finding. The BEST course of action is to:
perform additional testing.
An IS auditor finds a small number of user access requests that were not authorized by managers through the normal predefined workflow steps and escalation rules. The IS auditor should:
perform an additional analysis.
An IS auditor finds that a disaster recovery plan for critical business functions does not cover all systems. Which of the following is the MOST appropriate course of action for the IS auditor?
Alert management and evaluate the impact of not covering all systems.
An IS auditor finds that the answers received during an interview with a payroll clerk do not support job descriptions and documented procedures. Under these circumstances, the IS auditor should:
expand the scope to include substantive testing.
An IS auditor is carrying out a system configuration review. Which of the following would be the BEST evidence in support of the current system configuration settings?
Standard report with configuration values retrieved from the system by the IS auditor
An IS auditor is comparing equipment in production with inventory records. This type of testing is an example of:
substantive testing.
An IS auditor is conducting a compliance test to determine whether controls support management policies and procedures. The test will assist the IS auditor to determine:
that the control is operating as designed.
An IS auditor is determining the appropriate sample size for testing the existence of program change approvals. Previous audits did not indicate any exceptions, and management has confirmed that no exceptions have been reported for the review period. In this context, the IS auditor can adopt a:
lower confidence coefficient, resulting in a smaller sample size.
An IS auditor is planning to evaluate the control design effectiveness related to an automated billing process. Which of the following is the MOST effective approach for the auditor to adopt?
Walk-through
An IS auditor is reviewing access to an application to determine whether recently added accounts were appropriately authorized. This is an example of:
compliance testing.
An IS auditor is reviewing security controls for a critical web-based system prior to implementation. The results of the penetration test are inconclusive, and the results will not be finalized prior to implementation. Which of the following is the BEST option for the IS auditor?
Publish a report based on the available information, highlighting the potential security weaknesses and the requirement for follow-up audit testing.