Domain 2: Governance and Management of IT Part 2A Flashcards
After an organization completed a threat and vulnerability analysis as part of a risk assessment, the final report suggested that an intrusion prevention system (IPS) should be installed at the main Internet gateways and that all business units should be separated via a proxy firewall. Which of the following is the BEST method to determine whether the controls should be implemented?
A cost-benefit analysis
After the merger of two organizations, multiple self-developed legacy applications from both organizations are to be replaced by a new common platform. Which of the following is the GREATEST risk?
The replacement effort consists of several independent projects without integrating the resource allocation in a portfolio management approach.
As a driver of IT governance, transparency of IT’s cost, value and risk is primarily achieved through:
performance measurement.
As an outcome of information security governance, strategic alignment provides:
security requirements driven by enterprise requirements.
As result of profitability pressure, senior management of an enterprise decided to keep investments in information security at an inadequate level, which of the following is the BEST recommendation of an IS auditor?
Request that senior management accept the risk.
Assessing IT risk is BEST achieved by:
evaluating threats and vulnerabilities associated with existing IT assets and IT projects.
A benefit of open system architecture is that it:
facilitates interoperability within different systems.
A business unit has selected a new accounting application and did not consult with IT early in the selection process. The PRIMARY risk is that:
the application technology may be inconsistent with the enterprise architecture.
By evaluating application development projects against the capability maturity model (CMM), an IS auditor should be able to verify that:
predictable software processes are followed.
A comprehensive and effective email policy should address the issues of email structure, policy enforcement, monitoring and:
retention.
Corporate IT policy for a call center requires that all users be assigned unique user accounts. On discovering that this is not the case for all current users, what is the MOST appropriate recommendation?
Implement individual user accounts for all staff.
During an audit, an IS auditor notices that the IT department of a medium-sized organization has no separate risk management function, and the organization’s operational risk documentation only contains a few broadly described types of IT risk. What is the MOST appropriate recommendation in this situation?
Establish regular IT risk management meetings to identify and assess risk and create a mitigation plan as input to the organization’s risk management.
During an audit, the IS auditor discovers that the human resources (HR) department uses a cloud-based application to manage employee records. The HR department engaged in a contract outside of the normal vendor management process and manages the application on its own. Which of the following is of GREATEST concern?
During an audit, the IS auditor discovers that the human resources (HR) department uses a cloud-based application to manage employee records. The HR department engaged in a contract outside of the normal vendor management process and manages the application on its own. Which of the following is of GREATEST concern?
Effective IT governance ensures that the IT plan is consistent with the organization’s:
business plan.
Effective IT governance requires organizational structures and processes to ensure that:
the IT strategy extends the organization’s strategies and objectives.
An enterprise’s risk appetite is BEST established by:
the steering committee.
Errors in audit procedures PRIMARILY impact which of the following risk types?
Detection risk
Establishing the level of acceptable risk is the responsibility of:
senior business management.
A financial enterprise has had difficulties establishing clear responsibilities between its IT strategy committee and its IT steering committee. Which of the following responsibilities would MOST likely be assigned to its IT steering committee?
Approving IT project plans and budgets
A financial services enterprise has a small IT department, and individuals perform more than one role. Which of the following practices represents the GREATEST risk?
The developers promote code into the production environment.
Forahealthcareorganization,whichone of the following reasons MOST likely indicates that the patient benefit data warehouse should remain in-house rather than be outsourced to an offshore operation?
Thereare regulations regarding data privacy.
From a control perspective, the key element in job descriptions is that they:
establish responsibility and accountability for the employee’s actions.
From an IT governance perspective, what is the PRIMARY responsibility of the board of directors? To ensure that the IT strategy:
is aligned with the business strategy.
The initial step in establishing an information security program is the:
adoption of a corporate information security policy statement.