Domain 2: Governance and Management of IT Flashcards

1
Q

For management to effectively monitor the compliance of processes and applications, what would be the MOST ideal?

A

dashboard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following would be included in an information systems (IS) strategic plan?

A

Analysis of future business objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What BEST describes an IT department’s strategic planning process?

A

Long-range planning for the IT department should recognize enterprise goals, technological advances and regulatory requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the MOST important responsibility of a data security officer in an enterprise?

A

recommending and monitoring data security policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is considered the MOST critical element for successfully implementing an information security program?

A

senior management commitment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An IS auditor should ensure that IT governance performance measures:

A

evaluate the activities of IT oversight committees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which tasks may be performed by the same person in a well-controlled information processing computer center?

A

system development and system maintenance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the MOST critical control over database administration?

A

separation of duties regarding access rights (granting/revoking)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When complete separation of duties cannot be achieved in an online system environment, what function should be separated from the others?

A

authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In a small enterprise, where separation of duties is not practical, an employee performs the functions of computer operator and application programmer. What control(s) should the IS auditor recommend?

A

Procedures that verify that only approved program changes are implemented

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is the MOST important information systems (IS) audit consideration when an organization outsources a customer credit review system to a third-party service provider? The provider:
A.claims to meet or exceed industry security standards.
B.agrees to be subject to external security reviews.
C.has a good market reputation for service and experience.
D.complies with security policies of the organization.

A

B. An independent security review of an outsourcing vendor is critical because customer credit information will be kept with the vendor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following inputs adds the MOST value to the strategic IT initiative decision-making process?
A.Maturity of the project management process
B.Regulatory environment
C.Past audit findings
D.IT project portfolio analysis

A

D. Portfolio analysis provides the best input into the decision-making process relating to planning strategic IT initiatives. An analysis of the IT portfolio provides comparable information of planned initiatives, projects and ongoing IT services, which allows the IT strategy to be aligned with the business strategy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An information systems (IS) auditor finds that not all employees are aware of the enterprise’s information security policy. The IS auditor should conclude that:
A.this lack of knowledge may lead to unintentional disclosure of sensitive information.
B.information security is not critical to all functions.
C.IS audit should provide security training to the employees.
D.the audit finding will cause management to provide continuous training to staff.

A

A. All employees should be aware of the enterprise’s information security policy to prevent unintentional disclosure of sensitive information. Training is a preventive control. Security awareness programs for employees can prevent unintentional disclosure of sensitive information to outsiders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following is the MOST important element for the successful implementation of IT governance?
A.Implementing an IT scorecard
B.Identifying organizational strategies
C.Performing a risk assessment
D.Creating a formal security policy

A

B. The key objective of an IT governance program is to support the business; therefore, the identification of organizational strategies is necessary to ensure alignment between IT and corporate governance. Without identification of organizational strategies, the remaining choices—even if implemented—would be ineffective.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The PRIMARY control purpose of required vacations or job rotations is to:
A.allow cross-training for development.
B.help preserve employee morale.
C.detect improper or illegal employee acts.
D.provide a competitive employee benefit.

A

C. The practice of having another individual perform a job function is a control used to detect possible irregularities or fraud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

During a feasibility study regarding outsourcing IT processing, the relevance for the information systems (IS) auditor of reviewing the vendor’s business continuity plan is to:
A.evaluate the adequacy of the service levels that the vendor can provide in a contingency.
B.evaluate the financial stability of the service bureau and its ability to fulfill the contract.
C.review the experience of the vendor’s staff.
D.test the business continuity plan.

A

A. A key factor in a successful outsourcing environment is the capability of the vendor to face a contingency and continue to support the organization’s processing requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

During an audit, the information systems (IS) auditor observed that a user can log in to post a transaction and then change role to authorize the same. Which of the following is the BEST course of action for the IS auditor?
A.Ask the system administrator to suspend the user’s access.
B.Check for suitable compensating controls.
C.Ask the database administrator to merge the two roles into a single role.
D.Record the finding in the audit report.

A

B. If a violation of segregation/separation of duties (SoD) is observed, the IS auditor should first look for compensating controls before concluding the findings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following IT governance good practices improves strategic alignment?
A.Supplier and partner risk is managed.
B.A knowledge base of customers, products, markets and processes is in place.
C.A structure is provided that facilitates the creation and sharing of business information.
D.Top management mediates between the imperatives of business and technology.

A

D. Top management mediating between the imperatives of business and technology is an IT strategic alignment good practice.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following is responsible for the approval of an information security policy?
A.IT department
B.Security committee
C.Security administrator
D.Board of directors

A

D. Normally, the approval of an information systems security policy is the responsibility of top management or the board of directors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A decision support system (DSS) is used to help high-level management:
A.solve highly structured problems.
B.combine the use of decision models with predetermined criteria.
C.make decisions based on data analysis and interactive models.
D.support only structured decision-making tasks.

A

C. A DSS emphasizes flexibility in the decision-making approach of management through data analysis and the use of interactive models, not fixed criteria.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

To gain an understanding of the effectiveness of an organization’s planning and management of investments in IT assets, an information systems (IS) auditor should review the:
A.enterprise data model.
B.IT balanced scorecard (BSC).
C.IT organizational structure.
D.historical financial statements.

A

B. The IT balanced scorecard (BSC) is a tool that provides the bridge between IT objectives and business objectives by supplementing the traditional financial evaluation with measures to evaluate customer satisfaction, internal processes and the ability to innovate. In this way, the auditor can measure the success of the IT investment and strategy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which of the following situations is addressed by a software escrow agreement?
A.The system administrator requires access to software to recover from a disaster.
B.A user requests to have software reloaded onto a replacement hard drive.
C.The vendor of custom-written software goes out of business.
D.An information systems (IS) auditor requires access to software code written by the organization.

A

C. A software escrow is a legal agreement between a software vendor and a customer to guarantee access to source code. The application source code is held by a trusted third party, according to the contract. This agreement is necessary in the event that the software vendor goes out of business, there is a contractual dispute with the customer or the software vendor fails to maintain an update of the software as promised in the software license agreement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which of the following is MOST important to consider when reviewing the classification levels of information assets?
A.Potential loss
B.Financial cost
C.Potential threats
D.Cost of insurance

A

A. The best basis for asset classification is an understanding of the total losses that a business may incur if the asset is compromised. Typically, estimating these losses requires a review of criticality and sensitivity beyond financial cost, such as operational and strategic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

During an audit, the information systems (IS) auditor discovers that the HR department uses a cloud-based application to manage employee records. The HR department engaged in a contract outside of the normal vendor management process and manages the application on its own. Which of the following is of GREATEST concern?
A.Maximum acceptable downtime metrics have not been defined in the contract.
B.The IT department does not manage the relationship with the cloud vendor.
C.The help desk call center is in a different country, with different privacy requirements.
D.Organization-defined security policies are not applied to the cloud application.

A

D. Cloud applications should adhere to the organization-defined security policies to ensure that the data in the cloud are protected in a manner consistent with internal applications. These include, but are not limited to, the password policy, user access management policy and data classification policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Involvement of senior management is MOST important in the development of:
A.strategic plans.
B.IT policies.
C.IT procedures.
D.standards and guidelines.

A

A. Strategic plans provide the basis for ensuring that the enterprise meets its goals and objectives. Involvement of senior management is critical to ensuring that the plan adequately addresses the established goals and objectives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

An enterprise is looking to obtain cloud hosting services from a cloud vendor with a high level of maturity. Which of the following is MOST important for the auditor to ensure continued alignment with the enterprise’s security requirements?
A.The vendor provides the latest third-party audit report for verification.
B.The vendor provides the latest internal audit report for verification.
C.The vendor agrees to implement controls in alignment with the enterprise.
D.The vendor agrees to provide annual external audit reports in the contract.

A

D. The only way to ensure that any potential risk is mitigated today and in the future is to include a clause within the contract that the vendor will provide future external audit reports. Without the audit clause, the vendor can choose to forego future audits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

The risk associated with electronic evidence gathering is MOST likely reduced by an email:
A.destruction policy.
B.security policy.
C.archive policy.
D.audit policy.

A

C. With a policy requiring well-archived email records, access to or retrieval of specific email records to comply with legal requirements is possible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Due to profitability pressure, senior management of an enterprise decided to keep investments in information security at an inadequate level. Which of the following is the BEST recommendation for an information systems (IS) auditor?
A.Use cloud providers for low-risk operations.
B.Revise compliance enforcement processes.
C.Request that senior management accept the risk.
D.Postpone low-priority security procedures.

A

C. Senior management determines resource allocations. Having established that the level of security is inadequate, it is imperative that senior management accept the risk resulting from their decisions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Information systems (IS) control objectives are useful to IS auditors because they provide the basis for understanding the:
A.desired result or purpose of implementing specific control procedures.
B.best information systems (IS) security control practices relevant to a specific entity.
C.techniques for securing information.
D.security policy.
Justification

A

A. An information systems (IS) control objective is defined as the statement of the desired result or purpose to be achieved by implementing control procedures in a particular IS activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

A poor choice of passwords and unencrypted data transmissions over unprotected communications lines are examples of:
A.vulnerabilities.
B.threats.
C.probabilities.
D.impacts.

A

A. Vulnerabilities represent weaknesses of information resources that may be exploited by a threat. Because these are weaknesses that can be addressed by the security specialist, they are examples of vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Which of the following factors is MOST critical when evaluating the effectiveness of an IT governance implementation?
A.Ensure that assurance objectives are defined.
B.Determine stakeholder requirements and involvement.
C.Identify relevant risk and related opportunities.
D.Determine relevant enablers and their applicability.

A

B. The most critical factor to be considered in auditing an IT governance implementation is to determine stakeholder requirements and involvement. This drives the success of the project. Based on this, the assurance scope and objectives are determined.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

An enterprise hosts its data center onsite and has outsourced the management of its key financial applications to a service provider. Which of the following controls BEST ensures that the service provider’s employees adhere to the security policies?
A.Sign-off is required on the enterprise’s security policies for all users.
B.An indemnity clause is included in the contract with the service provider.
C.Mandatory security awareness training is implemented for all users.
D.Security policies should be modified to address compliance by third-party users.

A

B. Having the service provider sign an indemnity clause ensures compliance with the enterprise’s security policies, because any violations discovered will lead to a financial liability for the service provider. This will also prompt the enterprise to monitor security violations closely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is the PRIMARY consideration for an information systems (IS) auditor reviewing the prioritization and coordination of IT projects and program management?
A.Projects are aligned with the organization’s strategy.
B.Identified project risk is monitored and mitigated.
C.Controls related to project planning and budgeting are appropriate.
D.IT project metrics are reported accurately.

A

A. The primary goal of IT projects is to add value to the business, so they must be aligned with the business strategy to achieve the intended results. Therefore, the information systems (IS) auditor should first focus on ensuring this alignment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Before implementing an IT balanced scorecard, an organization must:
A.deliver effective and efficient services.
B.define key performance indicators.
C.provide business value to IT projects.
D.control IT expenses.

A

B. Because a BSC is a way to measure performance, a definition of key performance indicators is required before implementing an IT BSC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Enterprise governance of IT frameworks has been developed MAINLY to help an organization’s leaders:
A.use resources responsibly and manage information systems risk.
B.realize benefits and manage the performance of practices and processes.
C.deliver value to stakeholders and preserve the value created.
D.establish accountability and manage information security risk.

A

C. Enterprise governance of IT frameworks help an organization’s leaders to deliver value to stakeholders by using resources responsibly, realizing value delivered, establishing roles and responsibilities, preserving value through information risk management, and maintaining the required levels of performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Which of the following MOST likely indicates that a customer data warehouse should remain in-house rather than be outsourced to an offshore operation?
A.Time-zone differences can impede communications between IT teams.
B.Telecommunications cost can be much higher in the first year.
C.Privacy laws can prevent cross-border flow of information.
D.Software development may require more detailed specifications.

A

C. Privacy laws prohibiting the cross-border flow of personally identifiable information make it impossible to locate a data warehouse containing customer information in another country.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Which of the following is expected to approve the audit charter?
A.Chief financial officer
B.CEO
C.Audit steering committee
D.Audit committee

A

D. One of the primary functions of the audit committee is to create and approve the audit charter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

A benefit of open system architecture is that it:
A.facilitates interoperability within different systems.
B.facilitates the integration of proprietary components.
C.is a basis for volume discounts from equipment vendors.
D.allows for the achievement of more economies of scale for equipment.

A

A. Open systems are those for which suppliers provide components whose interfaces are defined by public standards, thus facilitating interoperability between systems made by different vendors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Many organizations require an employee to take a mandatory vacation (holiday) of a week or more to:
A.ensure that the employee maintains a good quality of life, which will lead to greater productivity.
B.reduce the opportunity for an employee to commit an improper or illegal act.
C.provide proper cross-training for another employee.
D.eliminate the potential disruption caused when an employee takes vacation one day at a time.

A

B. Required vacations/holidays of a week or more in duration in which someone other than the regular employee performs the job function of the employee on vacation is often mandatory for sensitive positions because this reduces the opportunity to commit improper or illegal acts. During this time off, it may be possible to discover any fraudulent activity that was taking place.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

A team conducting a risk analysis is having difficulty projecting the financial losses that can result from a risk. To evaluate the potential impact, the team should:
A.compute the amortization of the related assets.
B.calculate a return on investment (ROI).
C.apply a qualitative approach.
D.spend the time needed to define the loss amount exactly.

A

C. The common practice when it is difficult to calculate the financial losses is to take a qualitative approach, in which the manager affected by the risk defines the impact in terms of a weighted factor (e.g., one is a very low impact to the business and five is a very high impact).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Which of the following is a function of an IT steering committee?
A.Monitoring vendor-controlled change control and testing
B.Ensuring a separation of duties within the information’s processing environment
C.Approving and monitoring the status of IT plans and budgets
D.Liaising between the IT department and end users

A

C. The IT steering committee typically serves as a general review board for major IT projects and should not become involved in routine operations; therefore, one of its functions is to approve and monitor major projects, such as the status of IT plans and budgets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

The MOST likely effect of the lack of senior management commitment to IT strategic planning is:
A.lack of investment in technology.
B.lack of a methodology for systems development.
C.Technology not aligning with organization objectives.
D.absence of control over technology contracts.

A

C. A steering committee should exist to ensure that the IT strategies support the organization’s goals. The absence of an information technology committee or a committee not composed of senior managers is an indication of a lack of top-level management commitment. This condition increases the risk that IT is not aligned with organization strategy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Regarding the outsourcing of IT services, which of the following conditions should be of GREATEST concern to an information systems (IS) auditor?
A.Core activities that provide a differentiated advantage to the organization have been outsourced.
B.Periodic renegotiation is not specified in the outsourcing contract.
C.The outsourcing contract fails to cover every action required by the business.
D.Similar activities are outsourced to more than one vendor.

A

A. An organization’s core activities generally should not be outsourced because they are what the organization does best; an information systems (IS) auditor observing that condition should be concerned.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Which of the following user profiles should be of MOST concern to an information systems (IS) auditor when performing an audit of an electronic funds transfer system?
A.Three users with the ability to capture and verify their own messages
B.Five users with the ability to capture and send their own messages
C.Five users with the ability to verify other users and to send their own messages
D.Three users with the ability to capture and verify the messages of other users and to send their own messages

A

A. The ability of one individual to capture and verify their own messages represents an inadequate segregation because messages can be taken as correct and appear like they had already been verified. The verification of messages should not be allowed by the person who sent the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

An information systems (IS) auditor is evaluating the IT governance framework of an organization. Which of the following is the GREATEST concern?
A.Senior management has limited involvement.
B.Return on investment (ROI) is not measured.
C.Chargeback of IT cost is not consistent.
D.Risk appetite is not quantified.

A

A. To ensure that the IT governance framework is effectively in place, senior management must be involved and aware of their roles and responsibilities. Therefore, it is essential to ensure the involvement of senior management when evaluating the soundness of IT governance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

An organization has outsourced its help desk activities. An information systems (IS) auditor’s GREATEST concern when reviewing the contract and associated service level agreement between the organization and vendor should be the provisions for:
A.documentation of staff background checks.
B.independent audit reports or full audit access.
C.reporting the year-to-year incremental cost reductions.
D.reporting staff turnover, development or training.

A

B. When the functions of an IT department are outsourced, an information systems (IS) auditor should ensure that a provision is made for independent audit reports that cover all essential areas, or that the outsourcer has full audit access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Which of the following insurance types provide for a loss arising from fraudulent acts by employees?
A.Business interruption
B.Fidelity coverage
C.Errors and omissions
D.Extra expense

A

B. Fidelity insurance covers the loss arising from dishonest or fraudulent acts by employees.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

A local area network (LAN) administrator normally is restricted from:
A.having end-user responsibilities.
B.reporting to the end-user manager.
C.having programming responsibilities.
D.being responsible for LAN security administration.

A

C. A LAN administrator should not have programming responsibilities because that can allow modification of production programs without proper separation of duties, but the LAN administrator may have end-user responsibilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

As an outcome of information security governance, strategic alignment provides:
A.security requirements driven by enterprise requirements.
B.baseline security following good practices.
C.institutionalized and commoditized solutions.
D.an understanding of risk exposure.

A

A. Information security governance, when properly implemented, should provide four basic outcomes: strategic alignment, value delivery, risk management and performance measurement. Strategic alignment provides input for security requirements driven by enterprise requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

An information systems (IS) auditor reviewing an outsourcing contract of IT facilities expects it to define the:
A.hardware configuration.
B.access control software.
C.ownership of intellectual property (IP).
D.application development methodology.

A

C. The contract must specify who owns the intellectual property (IP) (i.e., information being processed and application programs). Ownership of IP is a significant cost and is a key aspect to be defined in an outsourcing contract.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

A small organization has only one database administrator (DBA) and one system administrator. The DBA has root access to the UNIX server, which hosts the database application. How should separation of duties be enforced in this scenario?
A.Hire a second DBA and split the duties between the two individuals.
B.Remove the DBA’s root access on all UNIX servers.
C.Ensure that all actions of the DBA are logged and that all logs are backed up to removable media.
D.Ensure that database logs are forwarded to a UNIX server where the DBA does not have root access.

A

D. By creating logs that the DBA cannot erase or modify, separation of duties is enforced.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

An information systems (IS) auditor reviewing an organization that uses cross-training practices should assess the risk of:
A.dependency on a single person.
B.inadequate succession planning.
C.one person knowing all parts of a system.
D.a disruption of operations.

A

C. Cross-training is a process of training more than one individual to perform a specific job or procedure. However, before using this approach, it is prudent to assess the risk of any person knowing all parts of a system and the related potential exposures related to abuse of privilege.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Which of the following is the BEST reference for an information systems (IS) auditor to determine a vendor’s ability to meet service level agreement requirements for a critical IT security service?
A.Compliance with the master contract
B.Agreed-on key performance indicators (KPIs)
C.Results of business continuity tests
D.Results of independent audit reports

A

B. Key performance indicators (KPIs) are metrics that allow for a means to measure performance. Service level agreements (SLAs) are statements related to expected service levels. For example, an Internet service provider (ISP) may guarantee that their service will be available 99.99 percent of the time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

In reviewing the IT short-range (tactical) plan, an information systems (IS) auditor should determine whether:
A.there is an integration of IT and business personnel within projects.
B.there is a clear definition of the IT mission and vision.
C.a strategic information technology planning scorecard is in place.
D.the plan correlates business objectives to IT goals and objectives.

A

A. The integration of IT and business personnel in projects is an operational issue and should be considered while reviewing the short-range plan. A strategic plan provides a framework for the IT short-range plan.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

An information systems (IS) auditor was hired to review ebusiness security. The IS auditor’s first task was to examine each existing ebusiness application, looking for vulnerabilities. What is the IS auditor’s next task?
A.Immediately report the risk to the chief information officer and chief executive officer.
B.Examine the ebusiness application in development.
C.Identify threats and the likelihood of occurrence.
D.Check the budget available for risk management.

A

C. To determine the risk associated with ebusiness, an information systems (IS) auditor must identify the assets, look for vulnerabilities, and then identify the threats and the likelihood of occurrence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Which of the following is the GREATEST risk of an inadequate policy definition for ownership of data and systems?
A.User management coordination does not exist.
B.Specific user accountability cannot be established.
C.Unauthorized users may have access to modify data.
D.Audit recommendations may not be implemented.

A

C. Without a policy defining who has the responsibility for granting access to specific systems, there is an increased risk that individuals can gain (be given) system access when they should not have authorization. The ability of unauthorized users to modify data is greater than the risk of authorized user accounts not being controlled properly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

An information systems (IS) audit department is planning to minimize the risk of short-term employees. Activities contributing to this objective are documented procedures, knowledge sharing, cross-training and:
A.succession planning.
B.staff job evaluation.
C.responsibilities definitions.
D.employee award programs.

A

A. Succession planning ensures that internal personnel with the potential to fill key positions in the organization are identified and developed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

On which of the following factors should an information systems (IS) auditor PRIMARILY focus when determining the appropriate level of protection for an information asset?
A.Results of a risk assessment
B.Relative value to the business
C.Results of a vulnerability assessment
D.Cost of security controls

A

A. The appropriate level of protection for an asset is determined based on the risk associated with the asset. The results of the risk assessment are, therefore, the primary information that the information systems (IS) auditor should review.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

When reviewing an organization’s approved software product list, which of the following is the MOST important thing to verify?
A.The risk associated with the use of the products is periodically assessed.
B.The latest version of software is listed for each product.
C.Due to licensing issues, the list does not contain open-source software.
D.After-hours support is offered.

A

A. Because the business conditions surrounding vendors may change, it is important for an organization to conduct periodic risk assessments of the vendor software list. This may be best incorporated into the IT risk management process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Which of the following is the BEST reason to implement a policy that places conditions on secondary employment for IT employees?
A.To prevent the misuse of corporate resources
B.To prevent conflicts of interest
C.To prevent employee performance issues
D.To prevent theft of IT assets

A

B. The best reason to implement and enforce a policy governing secondary employment is to prevent conflicts of interest. Policies should be in place to control IT employees seeking secondary employment from releasing sensitive information or working for a competing organization. Conflicts of interest can result in serious risk, such as fraud, theft of intellectual property or other improprieties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Which of the following is the PRIMARY objective of an IT performance measurement process?
A.Minimize errors
B.Gather performance data
C.Establish performance baselines
D.Optimize performance

A

D. An IT performance measurement process can be used to optimize performance, measure and manage products/services, assure accountability, and make budget decisions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Effective IT governance requires organizational structures and processes to ensure that:
A.risk is maintained at a level acceptable for IT management.
B.the business strategy is derived from an IT strategy.
C.IT governance is separate and distinct from overall governance.
D.the IT strategy extends the organization strategies and objectives.

A

D. Effective IT governance requires that board and executive management extend governance to IT and provide the leadership, organizational structures and processes that ensure that the organization IT sustains and extends the organization strategies and objectives, and that the strategy is aligned with business strategy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Which of the following should be included in an organization’s information security policy?
A.A list of key IT resources to be secured
B.The basis for access control authorization
C.Identity of sensitive security assets
D.Relevant software security features

A

B. The security policy provides a broad framework of security as laid down and approved by senior management. It includes a definition of those authorized to grant access and the basis for granting the access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

An information systems (IS) auditor is assigned to review an organization’s information security policy. Which of the following issues represents the HIGHEST potential risk?
A.The policy has not been updated in more than one year.
B.The policy includes no revision history.
C.The policy is approved by the security administrator.
D.The organization does not have an information security policy committee.

A

C. The information security policy should have an owner who has management responsibility for the development, review, approval and evaluation of the security policy. The position of security administrator is typically a staff-level position (not management), and therefore does not have the authority to approve the policy. In addition, an individual in a more independent position should also review the policy. Without proper management approval, enforcing the policy may be problematic, leading to compliance or security issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

The output of the risk management process is an input for making:
A.business plans.
B.audit charters.
C.security policy decisions.
D.software design decisions.

A

C. The risk management process is about making specific, security-related decisions, such as the level of acceptable risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

While conducting an audit of a service provider for a government program involving confidential information, an information systems (IS) auditor noted that the service provider delegated a part of the IS work to another subcontractor. Which of the following provides the MOST assurance that the requirements for protecting confidentiality of information are met?
A.Monthly committee meetings include the subcontractor’s IS manager.
B.Management reviews weekly reports from the subcontractor.
C.Permission is obtained from the government agent regarding the contract.
D.Periodic independent audits are performed of the work delegated to the subcontractor.

A

D. Periodic independent audits provide reasonable assurance that the requirements for protecting confidentiality of information are not compromised.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

An organization has contracted with a vendor for a turnkey solution for its electronic toll collection system (ETCS). The vendor has provided its proprietary application software as part of the solution. The contract should require that:
A.a backup server is available to run ETCS operations with up-to-date data.
B.a backup server is loaded with all relevant software and data.
C.the systems staff of the organization is trained to handle any event.
D.source code of the ETCS application is placed in escrow.

A

D. Whenever proprietary application software is purchased, the contract should provide for a source code escrow agreement. This agreement ensures that the purchasing organization can modify the software if the vendor ceases to be in business.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

When developing a formal enterprise security program, the MOST critical success factor (CSF) is the:
A.establishment of a review board.
B.creation of a security unit.
C.effective support of an executive sponsor.
D.selection of a security process owner.

A

C. The executive sponsor is in charge of supporting the organization’s strategic security program and aids in directing the organization’s overall security management activities. Therefore, support by the executive level of management is the most critical success factor (CSF).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

When auditing the IT governance framework and IT risk management practices existing within an enterprise, the information systems (IS) auditor identified some undefined responsibilities regarding IT management and governance roles. Which of the following recommendations is the MOST appropriate?
A.Review the strategic alignment of IT with the business.
B.Implement accountability rules within the enterprise.
C.Ensure that independent IS audits are conducted periodically.
D.Create a chief risk officer role in the enterprise.

A

B. IT risk is managed by embedding accountability into the enterprise. The information systems (IS) auditor should recommend the implementation of accountability rules to ensure that all responsibilities are defined within the enterprise. Note that this question asks for the best recommendation—not about the finding itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Which of the following is the MOST important function to be performed by IT management when a service has been outsourced?
A.Ensuring that invoices are paid to the provider
B.Participating in systems design with the provider
C.Renegotiating the provider’s fees
D.Monitoring the outsourcing provider’s performance

A

D. In an outsourcing environment, the enterprise is dependent on the performance of the service provider. Therefore, it is critical that the outsourcing provider’s performance is monitored to ensure that services are delivered to the enterprise as required.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Which of the following should be of GREATEST concern to an information systems (IS) auditor when reviewing an information security policy? The policy:
A.is driven by an IT department’s objectives.
B.is published, but users are not required to read the policy.
C.does not include information security procedures.
D.has not been updated in over a year.

A

A. Business objectives drive the information security policy, and the information security policy drives the selection of IT department objectives. A policy driven by IT objectives is at risk of not being aligned with business goals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

An information systems (IS) auditor is evaluating a newly developed IT policy for an organization. Which of the following factors does the IS auditor consider MOST important to facilitate compliance with the policy upon its implementation?
A.Existing IT mechanisms enabling compliance
B.Alignment of the policy to the business strategy
C.Current and future technology initiatives
D.Regulatory compliance objectives defined in the policy

A

A. The organization should be able to comply with a policy when it is implemented. The most important consideration when evaluating the new policy should be the existing mechanisms in place that enable the organization and its employees to comply with the policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

While reviewing the IT governance processes of an organization, an information systems (IS) auditor discovers the firm has recently implemented an IT balanced scorecard (BSC). The implementation is complete; however, the IS auditor notices that performance indicators are not objectively measurable. What is the PRIMARY risk presented by this situation?
A.Key performance indicators are not reported to management and management cannot determine the effectiveness of the BSC.
B.IT projects could suffer from cost overruns.
C.Misleading indications of IT performance may be presented to management.
D.IT service level agreements may not be accurate.

A

C. The IT balanced scorecard is designed to measure IT performance. To measure performance, a sufficient number of performance drivers (key performance indicators [KPIs]) must be defined and measured over time. Failure to have objective KPIs may result in arbitrary, subjective measures that may be misleading and lead to unsound decisions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

An information systems (IS) auditor is verifying IT policies and finds that some of the policies have not been approved by management (as required by policy), but the employees strictly follow the policies. What should the IS auditor do FIRST?
A.Ignore the absence of management approval because employees follow the policies.
B.Recommend immediate management approval of the policies.
C.Emphasize the importance of approval to management.
D.Report the absence of documented approval.

A

D. The IS auditor must report the finding. Unapproved policies may present a potential risk to the organization, even if they are being followed, because this technicality may prevent management from enforcing the policies in some cases and may present legal issues. For example, if an employee was terminated as a result of violating an organizational policy, and it was discovered that the policies had not been approved, the organization may face a lawsuit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

An information systems (IS) auditor discovers several IT-based projects were implemented and not approved by the steering committee. What is the GREATEST concern for the IS auditor?
A.The IT department’s projects will not be adequately funded.
B.IT projects are not following the system development life cycle (SDLC) process.
C.IT projects are not consistently formally approved.
D.The IT department may not be working toward a common goal.

A

D. The steering committee provides direction and control over projects to ensure that the enterprise is making appropriate investments. Without approval, the project may or may not be working toward the enterprise goals.

76
Q

While conducting an audit of a service provider, an information systems (IS) auditor observes that the service provider has outsourced a part of the work to another provider. Because the work involves confidential information, the IS auditor’s PRIMARY concern should be that the:
A.requirement for securely protecting information can be compromised.
B.contract may be terminated because prior permission from the outsourcer was not obtained.
C.other service provider to whom work has been outsourced is not subject to audit.
D.outsourcer will approach the other service provider directly for further work.

A

A. Many countries have enacted regulations to protect the confidentiality of information maintained in their countries and/or exchanged with other countries. When a service provider outsources part of its services to another service provider, there is a potential risk that the confidentiality of the information will be compromised.

77
Q

An organization is considering making a major investment to upgrade technology. Which of the following choices is the MOST important to consider?
A.A cost analysis
B.The security risk of the current technology
C.Compatibility with existing systems
D.A risk analysis

A

D. Prior to implementing new technology, an organization should perform a risk assessment, which is then presented to business unit management for review and acceptance.

78
Q

When reviewing the IT strategy, an information systems (IS) auditor can BEST assess whether the strategy supports the organizations’ business objectives by determining whether IT:
A.has all the personnel and equipment it needs.
B.plans are consistent with management strategy.
C.uses its equipment and personnel efficiently and effectively.
D.has sufficient excess capacity to respond to changing directions.

A

B. The only way to know if IT strategy meets business objectives is to determine if the IT plan is consistent with management strategy and that it relates IT planning to business plans.

79
Q

Value delivery from IT to the business is MOST effectively achieved by:
A.aligning the IT strategy with the enterprise strategy
B.embedding accountability in the enterprise
C.providing a positive return on investment
D.establishing an enterprisewide risk management process

A

A. IT’s value delivery to the business is driven by aligning IT with the enterprise’s strategy.

80
Q

An information systems (IS) auditor is performing a review of the software quality management process in an organization. The FIRST step should be to:
A.Verify how the organization complies with the standards.
B.Identify and report the existing controls.
C.Review the metrics for quality evaluation.
D.Request all standards adopted by the organization.

A

D. Because an audit measures compliance with the standards of the organization, the first step of the review of the software quality management process should be to determine the evaluation criteria in the form of standards adopted by the organization. The evaluation of how well the organization follows its own standards cannot be performed until the information systems (IS) auditor has determined what standards exist.

81
Q

An information systems (IS) auditor is evaluating management’s risk assessment of information systems. The IS auditor should FIRST review the:
A.controls in place.
B.effectiveness of the controls.
C.mechanism for monitoring the risk.
D.threats/vulnerabilities affecting the assets.

A

D. One of the key factors to be considered while assessing the information systems risk is the value of the systems (the assets) and the threats and vulnerabilities affecting the assets. The risk related to the use of information assets should be evaluated in isolation from the installed controls.

82
Q

Which of the following BEST describes the focus of an information systems (IS) auditor when auditing the enterprise architecture (EA)? The IS auditor should:
A.follow the overall EA and use the EA as the main source of information.
B.use the EA organizational requirements as the audit criteria to assess the conformity of the EA against those requirements.
C.ensure that the information systems are in line with the EA and meet the enterprise’s objectives.
D.review the EA documentation to assess whether the EA conforms with the enterprise’s requirements.

A

C. The aim of conducting an audit on the EA is to know whether information systems are in line with the EA and meet the enterprise’s objectives.

83
Q

Which of the following BEST describes the goal of business process-driven enterprise architecture? It attempts to better understand an organization in terms of:
A.its strategies, policies and standards.
B.its laws, regulations and contractual commitments.
C.its organizational structure, roles and responsibilities.
D.its core value-adding and supporting processes.

A

D. Business process-driven enterprise architecture improves a business by understanding core business processes, their constituent parts and the technology that supports them to progressively redesign and replace them.

84
Q

The PRIMARY purpose of an enterprise architecture is to:
A.respond to the increasing complexity of IT and modern organizations.
B.align IT with the business strategy and ensure that IT investments deliver real returns.
C.facilitate understanding, management and planning for IT investments.
D.develop roadmaps to enable safe and successful change from the current state to the desired state.

A

B. The main purpose of EA is to enable the enterprise to most effectively achieve its mission, business strategy and goals through successful alignment between IT and the strategic direction of the business.

85
Q

Which of the following does an information systems (IS) auditor FIRST reference when performing an IS audit?
A.Implemented procedures
B.Approved policies
C.Internal standards
D.Documented practices

A

B. Policies are high-level documents that represent the corporate philosophy of an organization. Internal standards, procedures and practices are subordinate to policy.

86
Q

IT governance is PRIMARILY the responsibility of the:
A.CEO.
B.board of directors.
C.IT steering committee.
D.audit committee.

A

B. IT governance is primarily the responsibility of the executives and shareholders (as represented by the board of directors).

87
Q

Which of the following would BEST facilitate the successful implementation of an IT-related framework?
A.Documenting IT-related policies and procedures
B.Ensuring the appropriate business representation within the framework
C.Following the latest industry best practices to implement the framework
D.Creating a committee to oversee the framework implementation

A

B. Ensuring the appropriate business representation in the IT framework is the best way to align IT framework with business.

88
Q

Which of the following is the PRIMARY objective of an enterprise architecture (EA) framework?
A.To provide a business case for developing and implementing IT systems and applications
B.To manage IT-related risk and ensure compliance with legal and regulatory requirements
C.To ensure the efficient and effective use of IT resources and capabilities
D.To align IT with business objectives and strategy and facilitate decision making and innovation

A

D. EA provides a holistic and integrated view of the enterprise’s IT architecture and aligns IT with its business objectives and strategy. The primary objective of EA is to facilitate decision making, innovation and agility by providing a comprehensive and up-to-date understanding of the enterprise’s IT capabilities and resources and how they can be leveraged to support the enterprise’s goals.

89
Q

After an organization completed a threat and vulnerability analysis as part of a risk assessment, the final report suggested that an intrusion prevention system (IPS) should be installed at the main Internet gateways and that all business units should be separated via a proxy firewall. Which of the following is the BEST method to determine whether the controls should be implemented?
A.Cost-benefit analysis
B.Annual loss expectancy calculation
C.Comparison of the cost of the IPS and firewall and the cost of the business systems
D.Business impact analysis (BIA)

A

A. In a cost-benefit analysis, the total expected purchase and operational/support costs, and a qualitative value for all actions are weighed against the total expected benefits to choose the best technical, most profitable, least expensive or acceptable risk option.

90
Q

When an organization’s disaster recovery plan (DRP) has a reciprocal agreement, which of the following risk treatment approaches is being applied?
A.Transfer
B.Mitigation
C.Avoidance
D.Acceptance

A

B. A reciprocal agreement in which two organizations agree to provide computing resources to each other in the event of a disaster is a form of risk mitigation. This usually works well if both organizations have similar information processing facilities. Because the intended effect of reciprocal agreements is to have a functional disaster recovery plan (DRP), it is a risk mitigation strategy.

91
Q

Which of the following is the BEST enabler for strategic alignment between business and IT?
A.Maturity model
B.Goals and metrics
C.Control objectives
D.Responsible, accountable, consulted, informed (RACI) chart

A

B. Goals and metrics ensure that IT goals are set based on business goals, and they are the best enablers of strategic alignment.

92
Q

When implementing an IT governance framework in an organization, the MOST important objective is:
A.IT alignment with the business.
B.accountability.
C.value realization with IT.
D.enhancing the return on IT investments.

A

A. The goals of IT governance are to improve IT performance, deliver optimum business value and ensure regulatory compliance. The key practice in support of these goals is the strategic alignment of IT with the business. To achieve alignment, all other choices need to be tied to business practices and strategies.

93
Q

Who is MOST likely responsible for implementing a technical control to mitigate an identified risk?
A.Custodian
B.Compliance officer
C.Risk owner
D.Senior management

A

C. The implementation of a technical control requires that the control is surrounded by proper procedures, the personnel who operate it are adequately trained, a person is assigned ownership of the control (often the person who owns the risk), and the control is monitored and tested to ensure its correct operation and effectiveness.

94
Q

The MOST important element for the effective design of an information security policy is the:
A.threat landscape.
B.prior security incidents.
C.emerging technologies.
D.enterprise risk appetite.

A

D. The risk appetite is the amount of risk on a broad level that an entity is willing to accept in pursuit of its mission to meet its strategic objectives. The purpose of the information security policy is to manage information risk to an acceptable level, so that the policy is principally aligned with the risk appetite.

95
Q

Measures of security risk should:
A.address all of the network risk.
B.be tracked over time against the IT strategic plan.
C.consider the entire IT environment.
D.result in the identification of vulnerability tolerances.

A

C. When assessing IT security risk, it is important to consider the entire IT environment.

96
Q

An information systems (IS) auditor reviews an organizational chart PRIMARILY for:
A.understanding of the complexity of the organizational structure.
B.investigating various communication channels.
C.understanding the responsibilities and authority of individuals.
D.investigating the network connected to different employees.

A

C. An organizational chart provides information about the responsibilities and authority of individuals in the organization. This helps an information systems (IS) auditor to know if there is a proper segregation of functions.

97
Q

After the merger of two organizations, multiple self-developed legacy applications from both organizations are to be replaced by a new common platform. Which of the following is the GREATEST risk?
A.Project management and progress reporting are combined in a project management office that is driven by external consultants.
B.The replacement effort consists of several independent projects without integrating the resource allocation in a portfolio management approach.
C.The resources of each of the organizations are inefficiently allocated while they are being familiarized with the other organization’s legacy systems.
D.The new platform will force the business areas of both organizations to change their work processes, which will result in extensive training needs.

A

B. The efforts should be consolidated to ensure alignment with the overall strategy of the postmerger organization. If resource allocation is not centralized, the separate projects are at risk of overestimating the availability of key knowledge resources for the in-house-developed legacy applications.

98
Q

An information systems (IS) auditor is assigned to review IT structures and activities recently outsourced to various providers. Which of the following should the IS auditor determine FIRST?
A.An audit clause is present in all contracts.
B.The service level agreement (SLA) of each contract is substantiated by appropriate key performance indicators (KPIs).
C.The contractual warranties of the providers support the business needs of the organization.
D.At contract termination, support is guaranteed by each outsourcer for new outsourcers.

A

C. The primary requirement is for the services provided by the outsource supplier to meet the needs of the business.

99
Q

An organization has a well-established risk management process. Which of the following risk management practices would MOST likely expose the organization to the greatest amount of compliance risk?
A.Risk reduction
B.Risk transfer
C.Risk avoidance
D.Risk mitigation

A

B. Risk transfer spreads the risk by either transferring some or all of it to a third party (e.g., through insurance or outsourcing) or applying the resources of multiple teams to hedge against possible losses. Risk transfer typically addresses financial risk and does not always address compliance risk.

100
Q

Which of the following is the PRIMARY critical success factor of a control self-assessment (CSA) program?
A.Assigning a knowledgeable and experienced information systems (IS) auditor as a facilitator for the CSA program
B.Conducting a meeting with the business unit representatives, including relevant staff and management
C.Developing the measures of success for each CSA phase (planning, implementation and monitoring)
D.Identifying the actions needed to increase the likelihood of achieving the business unit’s objective

A

B. The meeting with the business unit representatives at the beginning of the process is crucial to identify the business unit’s primary objective to determine the reliability of the internal control system afterward.

101
Q

Which of the following should an information systems (IS) auditor recommend to BEST enforce alignment of an IT project portfolio with strategic organizational priorities?
A.Define a balanced scorecard (BSC) for measuring performance.
B.Consider user satisfaction in the key performance indicators (KPIs).
C.Select projects according to business benefits and risk.
D.Modify the yearly process of defining the project portfolio.

A

C. Prioritization of projects on the basis of their expected benefit(s) to business, and the related risk, is the best measure for achieving alignment of the project portfolio to an organization’s strategic priorities.

102
Q

Which of the following choices is the PRIMARY benefit of requiring a steering committee to oversee IT investment?
A.To conduct a feasibility study to demonstrate IT value
B.To ensure that investments are made according to business requirements
C.To ensure that proper security controls are enforced
D.To ensure that a standard development methodology is implemented

A

B. A steering committee consists of representatives from the business and IT and ensures that IT investment is based on business objectives rather than on IT priorities.

103
Q

When reviewing an organization’s strategic IT plan, an information systems (IS) auditor should expect to find:
A.an assessment of the fit of the organization’s application portfolio with business objectives.
B.actions to reduce hardware procurement cost.
C.a listing of approved suppliers of IT contract resources.
D.a description of the technical architecture for the organization’s network perimeter security.

A

A. An assessment of how well an organization’s application portfolio supports the organization’s business objectives is a key component of the overall IT strategic planning process. This assessment drives the demand side of IT planning and should convert into a set of strategic IT intentions. Further assessment can then be made of how well the overall IT organization, encompassing applications, infrastructure, services, management processes, etc. can support the business objectives. The purpose of an IT strategic plan is to set out how IT will be used to achieve or support an organization’s business objectives.

104
Q

A driver of IT governance, transparency of IT cost, value and risk is primarily achieved through:
A.performance measurement.
B.strategic alignment.
C.value delivery.
D.resource management.

A

A. Performance measurement includes setting and monitoring measurable objectives that the IT processes need to achieve to deliver (process outcome), and how they deliver it (process capability and performance). Transparency is primarily achieved through performance measurement because it provides information to the stakeholders on how well the enterprise is performing when compared to objectives.

105
Q

Establishing the level of acceptable risk is the responsibility of:
A.quality assurance management.
B.senior business management.
C.the chief information officer.
D.the chief security officer.

A

B. Senior management should establish the acceptable risk level because it has the ultimate or final responsibility for the effective and efficient operation of the organization as senior management of the business process. The person can be the QA manager, chief information officer (CIO) or chief security officer (CSO), if they are the business manager. Responsibility for establishing the level of acceptable risk rests with the business manager.

106
Q

To aid management in achieving IT and business alignment, an information systems (IS) auditor should recommend the use of:
A.control self-assessments (CSAs).
B.a business impact analysis (BIA).
C.an IT balanced scorecard (BSC).
D.business process reengineering.

A

C. An IT balanced scorecard (BSC) provides the bridge between IT objectives and business objectives by supplementing the traditional financial evaluation with measures to evaluate customer satisfaction, internal processes and the ability to innovate.

107
Q

When developing a security architecture, which of the following steps should be executed FIRST?
A.Developing security procedures
B.Defining a security policy
C.Specifying an access control methodology
D.Defining roles and responsibilities

A

B. Defining a security policy for information and related technology is the first step toward building a security architecture. A security policy communicates a coherent security standard to users, management and technical staff. Security policies often set the stage in terms of the tools and procedures that are needed for an organization.

108
Q

When reviewing the development of information security policies, the PRIMARY focus of an information systems (IS) auditor should be on assuring that these policies:
A.are aligned with globally accepted industry good practices.
B.are approved by the board of directors and senior management.
C.strike a balance between business and security requirements.
D.provide direction for implementing security procedures.

A

C. Because information security policies must be aligned with an organization’s business and security objectives, this is the primary focus of the information systems (IS) auditor when reviewing the development of information security policies.

109
Q

An information systems (IS) auditor is performing a review of an organization’s governance model. Which of the following should be of MOST concern to the auditor?
A.The information security policy is not periodically reviewed by senior management.
B.A policy ensuring systems are patched in a timely manner does not exist.
C.The audit committee did not review the organization’s mission statement.
D.An organizational policy related to information asset protection does not exist.

A

A. Data security policies should be reviewed/refreshed once every year to reflect changes in the organization’s environment. Policies are fundamental to the organization’s governance structure, and, therefore, this is the greatest concern.

110
Q

Sharing risk is a key factor in which of the following methods of managing risk?
A.Transferring risk
B.Tolerating risk
C.Terminating risk
D.Treating risk

A

A. Transferring risk (e.g., by taking an insurance policy) is a way to share risk.

111
Q

A financial enterprise has had difficulties establishing clear responsibilities between its IT strategy committee and its IT steering committee. Which of the following responsibilities would MOST likely be assigned to its IT steering committee?
A.Approving IT project plans and budgets
B.Aligning IT to business objectives
C.Advising on IT compliance risk
D.Promoting IT governance practices

A

A. An IT steering committee typically has a variety of responsibilities, including approving IT project plans and budgets. Issues related to business objectives, risk and governance are responsibilities that are generally assigned to an IT strategy committee because it provides insight and advice to the board.

112
Q

An information systems (IS) auditor identifies that reports on product profitability produced by an organization’s finance and marketing departments give different results. Further investigation reveals that the product definition being used by the two departments is different. What should the IS auditor recommend?
A.User acceptance testing occurs for all reports before release into production.
B.Organizational data governance practices are put in place.
C.Standard software tools are used for report development.
D.Management signs off on requirements for new reports.

A

B. Data governance directly addresses the problem. An organizationwide approach is needed to achieve effective management of data assets and reporting standards. This includes enforcing standard definitions of data elements, which is part of a data governance initiative.

113
Q

Enterprise risk appetite is BEST established by:
A.the chief legal officer (CLO).
B.security management.
C.the audit committee.
D.the board of directors.

A

D. Risk appetite is set by the board of directors and should align with strategic objectives that the enterprise wants to achieve. Strategic objectives and/or highly ambitious targets that are more difficult to reach typically require a higher risk appetite.

114
Q

When reviewing the IT strategic planning process, an information systems (IS) auditor should ensure that the plan:
A.incorporates state-of-the-art technology.
B.addresses the required operational controls.
C.articulates the IT mission and vision.
D.specifies project management practices.

A

C. The IT strategic plan must include a clear articulation of the IT mission and vision.

115
Q

An information systems (IS) auditor found that the enterprise architecture (EA) recently adopted by an organization has an adequate current-state representation. However, the organization has started a separate project to develop a future-state representation. The IS auditor should:
A.Recommend that this separate project be completed as soon as possible.
B.Report this issue as a finding in the audit report.
C.Recommend the adoption of the Zachmann framework.
D.Rescope the audit to include the separate project as part of the current audit.

A

B. It is critical for the EA to include the future state because the gap between the current state and the future state will determine IT strategic and tactical plans. If the EA does not include a future-state representation, it is not complete, and this issue should be reported as a finding.

116
Q

Which of the following should be the MOST important consideration when deciding on areas of priority for IT governance implementations?
A.Process maturity
B.Performance indicators
C.Business risk
D.Assurance reports

A

C. Priority should be given to those business areas of the enterprise operations that face real risk based on the probability of occurrence and the magnitude of the impact.

117
Q

To ensure that an enterprise is complying with privacy requirements, an information systems (IS) auditor should FIRST review:
A.the IT infrastructure.
B.organizational policies, standards and procedures.
C.legal and regulatory requirements.
D.adherence to organizational policies, standards and procedures.

A

C. To ensure that the enterprise is complying with privacy issues, an IS auditor should address legal and regulatory requirements first. To comply with legal and regulatory requirements, enterprises need to adopt the appropriate infrastructure. After understanding the legal and regulatory requirements, an IS auditor should evaluate organizational policies, standards and procedures to determine whether they adequately address the privacy requirements, and then review the adherence to these specific policies, standards and procedures.

118
Q

The GREATEST benefit of having well-defined data classification policies and procedures is:
A.a more accurate inventory of information assets.
B.a decreased cost and improvement of controls.
C.a reduced risk of inappropriate system access.
D.an improved regulatory compliance.

A

B. An important benefit of a well-defined data classification process is to lower the cost of protecting data by ensuring that the appropriate controls are applied with respect to the sensitivity of the data. Without a proper classification framework, some security controls may be greater and, therefore, costlier than what is required based on the data classification.

119
Q

Which of the following is the responsibility of information asset owners?
A.Implementation of information security within applications
B.Assignment of criticality levels to data
C.Implementation of access rules to data and programs
D.Provision of physical and logical security for data

A

B. It is the responsibility of owners to define the criticality (and sensitivity) levels of information assets.

120
Q

Which of the following goals do you expect to find in an organization’s strategic plan?
A.Results of new software testing
B.An evaluation of information technology needs
C.Short-term project plans for a new planning system
D.Approved suppliers for products offered by the organization

A

D. Approved suppliers of choice for the product is a strategic business objective that is intended to focus the overall direction of the business and, thus, is a part of the organization’s strategic plan.

121
Q

While auditing an ecommerce architecture, an information systems (IS) auditor notes that customer master data are stored on the web server for six months after the transaction date and then purged due to inactivity. Which of the following is the PRIMARY concern for the IS auditor?
A.Availability of customer data
B.Integrity of customer data
C.Confidentiality of customer data
D.System storage performance

A

C. Due to its exposure to the Internet, storing customer data for six months raises concerns regarding confidentiality of customer data.

122
Q

The PRIMARY objective of implementing corporate governance is to:
A.provide strategic direction.
B.control business operations.
C.align IT with business.
D.implement good practices.

A

A. Corporate governance is a set of management practices to provide strategic direction to the organization as a whole, thereby ensuring that goals are achievable, risk is properly addressed and organizational resources are properly used. Hence, the primary objective of corporate governance is to provide strategic direction.

123
Q

The PRIMARY benefit of implementing a security program as part of a security governance framework is the:
A.alignment of the IT activities with information systems (IS) audit recommendations.
B.enforcement of the management of security risk.
C.implementation of the chief information security officer’s recommendations.
D.reduction of the cost for IT security.

A

B. The primary benefit of implementing a security program is management’s assessment of risk and its mitigation to an appropriate level, and monitoring of the residual risk.

124
Q

Assessing IT risk is BEST achieved by:
A.evaluating threats and vulnerabilities that are associated with existing IT assets and IT projects.
B.using the organization’s past actual loss experience to determine current exposure.
C.reviewing published loss statistics from comparable organizations.
D.reviewing IT control weaknesses identified in audit reports.

A

A. To assess IT risk, threats and vulnerabilities need to be evaluated using qualitative or quantitative risk assessment approaches.

125
Q

Which of the following choices BEST helps information owners to properly classify data?
A.Understanding of technical controls that protect data
B.Training on enterprise policies and standards
C.Use of an automated data leak prevention tool
D.Understanding which people need to access the data

A

B. While implementing data classification, it is most essential that enterprise policies and standards, including the data classification schema, are understood by the owner or custodian of the data so they can be properly classified.

126
Q

During a system development life cycle audit of a human resources and payroll application, the information systems (IS) auditor notes that the data used for user acceptance testing have been masked. The purpose of masking the data is to ensure the:
A.confidentiality of the data.
B.accuracy of the data.
C.completeness of the data.
D.reliability of the data.

A

A. Masking is used to ensure the confidentiality of data, especially in a user acceptance testing exercise where testers have access to data that they would not have access to in normal production environments.

127
Q

An information systems (IS) auditor discovers that some hard drives disposed of by an enterprise were not sanitized in a manner that would reasonably ensure that the data cannot be recovered. In addition, the enterprise does not have a written policy on data disposal. The IS auditor should FIRST:
A.draft an audit finding and discuss it with the auditor in charge.
B.determine the sensitivity of the information on the hard drives.
C.discuss with the IT manager good practices in data disposal.
D.develop an appropriate data disposal policy for the enterprise.

A

B. Although a policy is not available, the information systems (IS) auditor should determine the nature of the information on the hard drives to quantify, as much as possible, the risk.

128
Q

An IT steering committee should:
A.include a mix of members from different departments and staff levels.
B.ensure that information security policies and procedures have been executed properly.
C.maintain minutes of its meetings and keep the board of directors informed.
D.be briefed about new trends and products at each meeting by a vendor.

A

C. It is important to keep detailed IT steering committee minutes to document the decisions and activities of the IT steering committee. The board of directors should be informed about those decisions on a timely basis.

129
Q

During an information systems (IS) risk assessment of a health care organization regarding protected health information (PHI), an IS auditor interviews IS management. Which of the following findings from the interviews would be of MOST concern to the IS auditor?
A.The organization does not encrypt all of its outgoing email messages.
B.Staff have to type “[PHI]” in the subject field of email messages to be encrypted.
C.An individual’s computer screen saver function is disabled.
D.Server configuration requires the user to change the password annually.

A

B. There will always be human-error risk that staff members forget to type certain words in the subject field. The organization should have automated encryption set up for outgoing email for employees working with protected health information (PHI) to protect sensitive information.

130
Q

Which of the following is the MOST critical to the quality of data in a data warehouse?
A.Accuracy of the source data
B.Credibility of the data source
C.Accuracy of the extraction process
D.Accuracy of the data transformation

A

A. Accuracy of source data is a prerequisite for the quality of the data in a data warehouse. Inaccurate source data will corrupt the integrity of the data in the data warehouse.

131
Q

Which of the following is of MOST interest to an information systems (IS) auditor who is reviewing an organization’s risk strategy?
A.All risk is mitigated effectively.
B.Residual risk is zero after control implementation.
C.All likely risk is identified and ranked.
D.The organization uses an established risk framework.

A

C. Risk that is likely to impact the organization should be identified, ranked and documented as part of the risk strategy. Without knowing the risk, there is no risk strategy.

132
Q

The FIRST step in data classification is to:
A.establish ownership.
B.perform a criticality analysis.
C.define access rules.
D.create a data dictionary.

A

A. Data classification is necessary to define access rules based on a need-to-do and need-to-know basis. The data owner is responsible for defining the access rules; therefore, establishing ownership is the first step in data classification.

133
Q

Which of the following BEST provides assurance of the integrity of new staff?
A.Background screening
B.References
C.Bonding
D.Qualifications listed on a resume

A

A. A background screening is the primary method for assuring the integrity of a prospective staff member. This may include criminal history checks, driver’s license abstracts, financial status checks, verification of education, etc.

134
Q

Which of the following should be considered FIRST when implementing a risk management program?
A.An understanding of the organization’s threat, vulnerability and risk profile
B.An understanding of the risk exposures and the potential consequences of compromise
C.A determination of risk management priorities that are based on potential consequences
D.A risk mitigation strategy sufficient to keep risk consequences at an acceptable level

A

A. Implementing risk management—one of the outcomes of effective information security governance—requires a collective understanding of the organization’s threat, vulnerability and risk profile as a first step.

135
Q

Which of the following is the BEST way to ensure that organizational policies comply with legal requirements?
A.Inclusion of a blanket legal statement in each policy
B.Periodic review by subject matter experts
C.Annual sign-off by senior management on organizational policies
D.Policy alignment to the most restrictive regulations

A

B. Periodic review of policies by personnel with specific knowledge of regulatory and legal requirements best ensures that organizational policies are aligned with legal requirements.

136
Q

An information systems (IS) auditor reviewing the IT organization is MOST concerned if the IT steering committee:
A.is responsible for project approval and prioritization.
B.is responsible for developing the long-term IT plan.
C.reports the status of IT projects to the board of directors.
D.is responsible for determining business goals.

A

D. Determining the business goals is the responsibility of senior management and not of the IT steering committee. IT should support business goals and be driven by the business—not the other way around.

137
Q

An information systems (IS) audit group has been involved in the integration of an automated audit tool kit with an existing enterprise resource planning system. Due to enterprise resource planning (ERP) performance issues, the audit tool kit is not permitted to go live. What should the IS auditor’s BEST recommendation be?
A.Review the implementation of selected integrated controls.
B.Request additional information systems (IS) audit resources.
C.Request vendor technical support to resolve performance issues.
D.Review the results of stress tests during user acceptance testing.

A

D. The appropriate recommendation is to review the results of stress tests conducted during user acceptance testing that demonstrated the performance issues.

138
Q

From a control perspective, the key element in job descriptions is that they:
A.provide instructions on how to do the job and define authority.
B.are current, documented and readily available to the employee.
C.communicate management’s specific job performance expectations.
D.establish responsibility and accountability for the employee’s actions.

A

D. From a control perspective, a job description should establish responsibility and accountability. This aids in ensuring that users are given system access in accordance with their defined job responsibilities and are accountable for how they use that access.

139
Q

Which of the following does an information systems (IS) auditor consider to be MOST important when evaluating an organization’s IT strategy? That it:
A.was approved by line management.
B.does not vary from the IT department’s preliminary budget.
C.complies with procurement procedures.
D.supports the business objectives of the organization.

A

D. Strategic planning sets corporate or department objectives into motion. Both long-term and short-term strategic plans should be consistent with the organization’s broader plans and its business objectives for attaining these goals.

140
Q

Overall quantitative business risk for a particular threat can be expressed as:
A.a product of the likelihood and magnitude of the impact if a threat successfully exploits a vulnerability.
B.the magnitude of the impact if a threat source successfully exploits the vulnerability.
C.the likelihood of a given threat source exploiting a given vulnerability.
D.the collective judgment of the risk assessment team.

A

A. Quantitative risk analysis methods use numeric values to describe the likelihood and impacts of risk. Thus, the overall business risk can be expressed as the likelihood of the occurrence and magnitude of the impact when a threat exploits a vulnerability and provides the best measure of the risk to an asset.

141
Q

Which of the following does an information systems (IS) auditor consider the MOST relevant to short-term planning for an IT department?
A. A.Allocating resources
B. B.Adapting to changing technologies
C. C.Conducting control self-assessments (CSAs)
D. D.Evaluating hardware needs

A

A. The IT department should specifically consider the way resources are allocated in the short term. The information systems (IS) auditor ensures that the resources are being managed adequately.

142
Q

Effective IT governance ensures that the IT plan is consistent with the organization’s:
A.business plan.
B.audit plan.
C.security plan.
D.investment plan.

A

A. To govern IT effectively, IT and business should be moving in the same direction, requiring that the IT plans are aligned with an organization’s business plans.

143
Q

Who is ULTIMATELY responsible for data classification and protection?
A.Data steward
B.Data custodian
C.Data owner
D.Data controller

A

C. Data owners are responsible for data classification and protection. Their security responsibilities include authorizing access, ensuring that access rules are updated when personnel changes occur and regularly reviewing access rules for the data for which they are responsible.

144
Q

Which of the following should be of PRIMARY concern to an information systems (IS) auditor reviewing the management of external IT service providers?
A.Minimizing costs for the services provided
B.Prohibiting the provider from subcontracting services
C.Evaluating the process for transferring knowledge to the IT department
D.Determining if the services were provided as contracted

A

D. From an IS auditor’s perspective, the primary objective of auditing the management of service providers should be to determine if the services that were requested were provided in a way that is acceptable, seamless and in line with contractual agreements.

145
Q

An information systems (IS) auditor observes a cryptocurrency miner on a staff member’s computer linked to their account. It is discovered that this is against IT policy. Which of the following would BEST help the enterprise detect these issues sooner?
A.Reviewing the computer resources usability and activity report
B.Enforcing the software accreditation policy to control software installation
C.Organizing awareness workshops on IT policy periodically for users
D.Monitoring application logs using an automated log monitoring solution

A

A. Cryptocurrency mining consumes a large amount of computing resources; therefore, regularly reviewing usability and activity reports of computing resources will help to detect unauthorized activity.

146
Q

The ultimate purpose of IT governance is to:
A.encourage optimal use of IT.
B.reduce IT costs.
C.decentralize IT resources across the organization.
D.centralize control of IT.

A

A. The purpose of IT governance is to direct the IT endeavors to ensure that IT performance meets the objectives of aligning IT with the enterprise’s objectives and the realization of promised benefits. Thus, generating business value and mitigating the risks associated with IT, results in the optimal use of IT.

147
Q

In a review of the human resources policies and procedures within an organization, an information systems (IS) auditor is MOST concerned with the absence of a:
A.requirement for periodic job rotations.
B.process for formalized exit interviews.
C.termination checklist.
D.requirement for new employees to sign a nondisclosure agreement.

A

C. A termination checklist is critical to ensure the logical and physical security of an enterprise. In addition to preventing the loss of enterprise property that was issued to the employee, there is the risk of unauthorized access, intellectual property theft and even sabotage by a disgruntled former employee.

148
Q

An enterprise selected a vendor to develop and implement a new software system. To ensure that the enterprise’s investment in software is protected, which of the following security clauses is MOST important to include in the master services agreement?
A.Limitation of liability
B.Service level requirements
C.Software escrow
D.Version control

A

C. Software escrow clauses in a contract ensure that the software source code will still be available to the organization in the event of a vendor issue, such as insolvency and copyright issues.

149
Q

Which of the following BEST supports the prioritization of new IT projects?
A.Internal control self-assessment (CSA)
B.Information systems (IS) audit
C.Investment portfolio analysis
D.Business risk assessment

A

C. It is most desirable to conduct an investment portfolio analysis, which not only presents a clear focus on investment strategy but also provides the rationale for terminating nonperforming IT projects.

150
Q

To address the risk of operations staff’s failure to perform the daily backup, management requires that the systems administrator sign off on the daily backup. This is an example of risk:
A.avoidance.
B.transfer.
C.mitigation.
D.acceptance.

A

C. Risk mitigation is the strategy that provides for the definition and implementation of controls to address the risk described. By requiring the system’s administrator to sign off on the completion of the backups, this is an administrative control that can be validated for compliance.

151
Q

During an audit, an information systems (IS) auditor notices that the IT department of a medium-sized organization has no separate risk management function, and the organization’s operational risk documentation only contains a few broadly described types of IT risk. What is the MOST appropriate recommendation in this situation?
A.Create an IT risk management department and establish an IT risk framework with the aid of external risk management experts.
B.Use common industry standard aids to divide the existing risk documentation into several individual types of risk, which will be easier to handle.
C.No recommendation is necessary because the current approach is appropriate for a medium-sized organization.
D.Establish regular IT risk management meetings to identify and assess risk and create a mitigation plan as input to the organization’s risk management.

A

D. Establishing regular IT risk management meetings is the best way to identify and assess IT-related risk in a medium-sized organization, to address responsibilities with the respective management and to keep the risk register and mitigation plans up to date.

152
Q

When separation of duties concerns exist between IT support staff and end users, what is a suitable compensating control?
A.Restricting physical access to computing equipment
B.Reviewing transaction and application logs
C.Performing background checks prior to hiring IT staff
D.Locking user sessions after a specified period of inactivity

A

B. Reviewing transaction and application logs directly addresses the threat posed by poor separation of duties. The review is a means of detecting inappropriate behavior and discourages abuse, because people who may otherwise be tempted to exploit the situation are aware of the likelihood of being caught.

153
Q

The initial step in establishing an information security program is:
A.developing and implementing an information security standards manual.
B.performing a comprehensive security control review by the information systems (IS) auditor.
C.adopting an enterprise information security policy statement.
D.purchasing security access control software.

A

C. A policy statement reflects the intent and support provided by executive management for proper security and establishes a starting point for developing the security program.

154
Q

From an IT governance perspective, what is the PRIMARY responsibility of the board of directors? To ensure that the IT strategy:
A.is cost-effective.
B.is forward thinking and innovative.
C.is aligned with the business strategy.
D.has the appropriate priority level assigned.

A

C. The board of directors is responsible for ensuring that the IT strategy is aligned with the business strategy.

155
Q

An employee who has access to highly confidential information resigned. Upon departure, which of the following should be done FIRST?
A.Conduct an exit interview with the employee.
B.Ensure succession plans are in place.
C.Revoke the employee’s access to all systems.
D.Review the employee’s job history.

A

C. If an employee has dealt with highly classified information, the first step is to revoke their access to all systems, to restrict access to the confidential information and thereby prevent exfiltration of data.

156
Q

Which of the following is the MOST important for an information systems (IS) auditor to consider when reviewing a service level agreement with an external IT service provider?
A.Payment terms
B.Uptime guarantee
C.Indemnification clause
D.Default resolution

A

B. The most important element of an SLA is the measurable terms of performance, such as uptime agreements.

157
Q

Which of the following is the initial step in creating a firewall policy?
A.A cost-benefit analysis of methods for securing the applications
B.Identification of network applications to be externally accessed
C.Identification of vulnerabilities associated with network applications to be externally accessed
D.Creation of an application traffic matrix showing protection methods

A

B. Identification of the applications required across the network should be the initial step. After identification, depending on the physical location of these applications in the network and the network model, the person in charge is able to understand the need for, and possible methods of, controlling access to these applications.

158
Q

In the context of effective information security governance, the PRIMARY objective of value delivery is to:
A.optimize security investments in support of business objectives.
B.implement a standard set of security practices.
C.institute a standards-based solution.
D.implement a continuous improvement culture.

A

A. Information security governance provides strategic direction for security activities and ensures that business objectives are achieved. Therefore, in the context of effective information security governance, value delivery is implemented to ensure optimization of security investments in support of business objectives.

159
Q

Which of the following is MOST critical for the successful implementation and maintenance of a security policy?
A.Assimilation of the framework and intent of a written security policy by all appropriate parties
B.Management support and approval for the implementation and maintenance of a security policy
C.Enforcement of security rules by providing punitive actions for any violation of security rules
D.Stringent implementation, monitoring and enforcing of rules by the security officer through access control software

A

A. Assimilation of the framework and intent of a written security policy by all levels of management and users of the system are critical to the successful implementation and maintenance of the security policy. If a policy is not assimilated into daily actions, it will not be effective.

160
Q

The PRIMARY benefit of an enterprise architecture initiative is to:
A.enable the enterprise to invest in the most appropriate technology.
B.ensure security controls are implemented on critical platforms.
C.allow development teams to be more responsive to business requirements.
D.provide business units with greater autonomy to select IT solutions that fit their needs.

A

A. The primary focus of the enterprise architecture (EA) is to ensure that technology investments are consistent with the platform, data and development standards of the IT organization; therefore, the goal of the EA is to help the organization to implement the technology that is most effective.

161
Q

When an employee is terminated from service, the MOST important action is to:
A.hand over all of the employee’s files to another designated employee.
B.complete a backup of the employee’s work.
C.notify other employees of the termination.
D.disable the employee’s logical access.

A

D. There is a probability that a terminated employee may misuse access rights; therefore, disabling the terminated employee’s logical access is the most important and immediate action to take.

162
Q

An information systems (IS) auditor is asked to review a contract for a vendor being considered to provide data center services. Which is the BEST way to determine whether the terms of the contract are adhered to after the contract is signed?
A.Require the vendor to provide monthly status reports.
B.Have periodic meetings with the client IT manager.
C.Conduct periodic audit reviews of the vendor.
D.Require that performance parameters be stated within the contract.

A

C. Conducting periodic reviews of the vendor ensures that the agreements within the contract are completed in a satisfactory manner. Without future audit reviews after the contract is signed, service level agreements and the client’s requirements for security controls may become less of a focus for the vendor, and the results may slip. Periodic audit reviews allow the client to look at the vendor’s current state to ensure that the vendor is one with which they want to continue to work.

163
Q

A comprehensive and effective email policy should address the issues of email structure, policy enforcement, monitoring and:
A.recovery.
B.retention.
C.rebuilding.
D.reuse.

A

B. In addition to being a good practice, laws and regulations may require an organization to keep information that has an impact on the financial statements. The prevalence of lawsuits in which email communication is held in the same regard as the official form of classic paper makes the retention policy of corporate email a necessity. All email generated on an organization’s hardware is the property of the organization, and an email policy should address the retention of messages, considering both known and unforeseen litigation. The policy should also address the destruction of emails after a specified time to protect the nature and confidentiality of the messages themselves.

164
Q

Responsibility for the governance of IT should rest with the:
A.IT strategy committee.
B.chief information officer (CIO).
C.audit committee.
D.board of directors.

A

D. Governance is the set of responsibilities and practices exercised by the board and executive management with the goal of providing strategic direction, ensuring that objectives are achieved, ascertaining that risk is managed appropriately and verifying that the enterprise’s resources are used responsibly.

165
Q

An information systems (IS) auditor is assessing services provided by an internet service provider (ISP) during an IS compliance audit of a nationwide corporation that operates a governmental program. Which of the following is MOST important?
A.Review the request for proposal.
B.Review monthly performance reports generated by the ISP.
C.Review the service level agreement (SLA).
D.Research other clients of the ISP.

A

C. An SLA provides the basis for an adequate assessment of the degree to which the provider is meeting the level of agreed-on service.

165
Q

Which of the following is an implementation risk within the process of decision support systems (DSSs)?
A.Management control
B.Semi-structured dimensions
C.Inability to specify purpose and usage patterns
D.Changes in decision processes

A

C. The inability to specify purpose and usage patterns is a risk that developers need to anticipate while implementing a DSS.

166
Q

Which of the following is normally a responsibility of the chief information security officer (CISO)?
A.Periodically reviewing and evaluating the security policy
B.Executing user application and software testing and evaluation
C.Granting and revoking user access to IT resources
D.Approving access to data and applications

A

A. The role of the chief information security officer (CISO) is to ensure that the corporate security policy and controls are adequate to prevent unauthorized access to the enterprise assets, including data, programs and equipment.

167
Q

Which of the following assures an enterprise of the existence and effectiveness of internal controls relative to the service provided by a third party?
A.Current service level agreement (SLA)
B.Recent independent third-party audit report
C.Current business continuity plan (BCP) procedures
D.Recent disaster recovery plan (DRP) test report

A

B. An independent third-party audit report, such as a Statements on Standards for Attestation Engagements 16, provides assurance of the existence and effectiveness of internal controls at the third party.

168
Q

During an audit, which of the following situations are MOST concerning for an organization that significantly outsources information systems (IS) processing to a private network?
A.The contract does not contain a right-to-audit clause for the third party.
B.The contract was not reviewed by an information security subject matter expert prior to signing.
C.The IS outsourcing guidelines are not approved by the board of directors.
D.There is a lack of well-defined IS performance evaluation procedures.

A

A. In the case of outsourcing to a private network, the organization should ensure that the third party has a minimum set of IT security controls in place and that they are operating effectively. The absence of a right-to-audit clause in the contract impacts the information systems (IS) auditor’s ability to perform the IS audit. Hence, the IS auditor is most concerned with such a situation.

169
Q

To support an organization’s goals, an IT department should have:
A.a low-cost philosophy.
B.long- and short-term plans.
C.leading-edge technology.
D.plans to acquire new hardware and software.

A

B. To ensure its contribution to the realization of an organization’s overall goals, the IT department should have long- and short-range plans that are consistent with the organization’s broader and strategic plans for attaining its goals.

170
Q

A top-down approach to the development of operational policies helps to ensure that:
A.they are consistent across the organization.
B.they are implemented as a part of risk assessment.
C.there is compliance with all policies.
D.they are reviewed periodically.

A

A. Deriving lower-level policies from corporate policies (a top-down approach) aids in ensuring consistency across the organization and consistency with other policies.

171
Q

A business unit has selected a new accounting application and did not consult with IT early in the selection process. The PRIMARY risk is that the:
A.security controls of the application may not meet requirements.
B.application may not meet the requirements of the business users.
C.application technology may be inconsistent with the enterprise architecture.
D.application may create unanticipated support issues for IT.

A

C. The primary focus of the EA is to ensure that technology investments are consistent with the platform, data and development standards of the IT organization. The EA defines both a current and future state in areas such as the use of standard platforms, databases or programming languages. If a business unit selected an application using a database or operating system that is not part of the EA for the business, this increases the cost and complexity of the solution and ultimately delivers less value to the business.

172
Q

Which of the following is the MOST important factor for IT management to consider in developing performance metrics?
A.Risk management and compliance with regulations
B.Key IT processes, including solution and service delivery
C.Business contribution, including financials
D.Critical processes in place to meet customer requirements

A

D. Identifying critical processes to meet customer requirements is one of the most important aspects of developing performance metrics. Others are identifying specific, quantifiable outputs of work from the identified processes and establishing targets against which results can be scored.

173
Q

An organization purchased a third-party application and made significant modifications. While auditing the development process for this critical customer-facing application, the information systems (IS) auditor noted that the vendor has been in business for only one year. Which of the following helps to mitigate the risk relating to continued application support?
A.Viability study on the vendor
B.Software escrow agreement
C.Financial evaluation of the vendor
D.Contractual agreement for future enhancements

A

B. Considering that the vendor has been in the business for only one year, the biggest concern is financial stability or viability of the vendor and the risk of the vendor going out of business. The best way that this risk can be addressed is to have a software escrow agreement for the source code of the application, which provides the entity access to the source code if the vendor goes out of business.

174
Q

The effectiveness and efficiency of IT governance are dependent FIRST in quality management of:
Options:
A.strategies and policies.
B.processes and procedures.
C.functions and services.
D.roles and responsibilities.

A

A. Strategies and policies are the first building blocks of quality management embedded into IT governance.

175
Q

An information systems (IS) auditor of a large organization is reviewing the roles and responsibilities of the IT function and finds some individuals serving multiple roles. Which one of the following combinations of roles should be of GREATEST concern for the IS auditor?
A.Network administrators are responsible for quality assurance.
B.System administrators are application programmers.
C.End users are security administrators for critical applications.
D.Systems analysts are database administrators (DBAs).

A

B. When individuals serve multiple roles, this represents a separation-of-duties problem with associated risk. System administrators should not be application programmers, due to the associated rights of both functions. A person with both system and programming rights can do almost anything on a system, including creating a back door. The other combinations of roles are valid from a separation-of-duties perspective.

176
Q

An information systems (IS) auditor is reviewing a contract management process to determine the financial viability of a software vendor for a critical business application. An IS auditor should determine whether the vendor being considered:
A.can deliver on the immediate contract.
B.is of similar financial standing as the organization.
C.has significant financial obligations that can impose liability to the organization.
D.can support the organization in the long term.

A

D. The long-term financial viability of a vendor is essential for deriving maximum value for the organization—it is more likely that a financially sound vendor will be in business for a long period of time and thereby more likely to be capable of providing long-term support for the purchased product.

177
Q

Which of the following reasons BEST describes the purpose of a mandatory vacation policy?
A.To ensure that employees are properly cross-trained in multiple functions.
B.To improve employee morale.
C.To identify potential errors or inconsistencies in business processes.
D.To be used as a cost-saving measure.

A

C. Mandatory vacations help uncover potential fraud or inconsistencies. Ensuring that people who have access to sensitive internal controls or processes take a mandatory vacation annually is often a regulatory requirement and, most importantly, a good way to uncover fraud.

178
Q

The corporate IT policy for a call center requires that all users be assigned unique user accounts. On discovering that this is not the case for all current users, what is the MOST appropriate recommendation?
A.Have the current configuration approved by operations management.
B.Ensure that there is an audit trail for all existing accounts.
C.Implement individual user accounts for all staff.
D.Amend the IT policy to allow shared accounts.

A

C. Individual user accounts allow for accountability of transactions and should be the most important recommendation, given the current scenario.

179
Q

The PRIMARY goal of using maturity models in (information systems (IS)) is to:
A.measure the current maturity levels of a certain aspect of an IS organization in a meaningful way.
B.prioritize what the organization should do to reach higher maturity levels.
C.help gain senior management understanding, commitment and support for IS.
D.enable stakeholders to clearly identify strengths and areas of improvement.

A

D. The main purpose of using maturity models is to enable stakeholders to clearly identify strengths and areas of improvement in IS after assessing the current maturity levels and to prioritize the improvement initiatives before gaining senior management support.

180
Q

The development, implementation and integration of capability and maturity modeling quality tools, techniques and processes will MAINLY facilitate and foster the quality of:
A.enterprise IT strategies and policies.
B.enterprise IT processes and procedures.
C.enterprise IT governance.
D.enterprise IT standards and frameworks.

A

C. Quality management strategies and policies embedded into IT governance outline how the IT strategies, policies, processes, procedures and standards are maintained, used and improved over time as the enterprise changes.

181
Q

Organizations requiring employees to take a mandatory vacation each year PRIMARILY want to ensure that:
A.adequate cross-training exists between functions.
B.an effective internal control environment is in place by increasing morale.
C.potential irregularities in processing are identified by a temporary replacement.
D.the risk of processing errors is reduced.

A

C. Employees who perform critical and sensitive functions within an organization should be required to take some time off to help ensure that irregularities and fraud are detected.

182
Q

Errors in audit procedures PRIMARILY impact which type of risk?
A.Detection risk
B.Inherent risk
C.Control risk
D.Business risk

A

A. Detection risk is a component of audit risk and is the probability that the audit procedures may fail to detect the existence of a material error or fraud.

183
Q

Which of the following BEST describes the function of control self-assessment?
A.Quality control
B.Quality assessment
C.Quality planning
D.Quality assurance (QA)

A

D. Quality assurance (QA) is often achieved by the information systems (IS) auditor serving as a consultant, advising and facilitating business areas to participate in process improvement and control. One such approach is through the process of control self-assessment.

184
Q

An information systems (IS) auditor is reviewing the risk management process. Which of the following is the MOST important consideration during this review?
A.Controls are implemented based on cost-benefit analysis.
B.The risk management framework is based on global standards.
C.The approval process for risk response is in place.
D.IT risk is presented in business terms.

A

D. For risk management to be effective, it is necessary to align IT risk with business objectives. This can be done by adopting acceptable terminology that is understood by all, and the best way to achieve this is to present IT risk in business terms.

185
Q

A financial services enterprise has a small IT department, and individuals perform more than one role. Which of the following practices represents the GREATEST risk?
A.The developers promote code into the production environment.
B.The business analyst writes the requirements and performs functional testing.
C.The IT manager also performs systems administration.
D.The database administrator (DBA) also performs data backups.

A

A. Developers with access to the production environment may run unauthorized code or migrate untested code to production resulting in system unavailability.

186
Q

An information systems (IS) auditor observes that an enterprise has outsourced software development to a third-party start-up organization. To ensure that the enterprise’s investment in software is protected, which of the following should be recommended by the IS auditor?
A.Due diligence should be performed on the software vendor.
B.A quarterly audit of the vendor facilities should be performed.
C.There should be a source code escrow agreement in place.
D.A high penalty clause should be included in the contract.

A

C. The objective of source code escrow is to ensure continued availability of software support and maintenance. Thus, it is primarily recommended to help protect the enterprise’s investment in software, because the source code will be available through a trusted third party and can be retrieved if the start-up vendor goes out of business.