Domain 2: Governance and Management of IT Part 2A Flashcards

1
Q

After an organization completed a threat and vulnerability analysis as part of a risk assessment, the final report suggested that an intrusion prevention system (IPS) should be installed at the main Internet gateways and that all business units should be separated via a proxy firewall. Which of the following is the BEST method to determine whether the controls should be implemented?

A

A cost-benefit analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

After the merger of two organizations, multiple self-developed legacy applications from both organizations are to be replaced by a new common platform. Which of the following is the GREATEST risk?

A

The replacement effort consists of several independent projects without integrating the resource allocation in a portfolio management approach.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

As a driver of IT governance, transparency of IT’s cost, value and risk is primarily achieved through:

A

performance measurement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

As an outcome of information security governance, strategic alignment provides:

A

security requirements driven by enterprise requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

As result of profitability pressure, senior management of an enterprise decided to keep investments in information security at an inadequate level, which of the following is the BEST recommendation of an IS auditor?

A

Request that senior management accept the risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Assessing IT risk is BEST achieved by:

A

evaluating threats and vulnerabilities associated with existing IT assets and IT projects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A benefit of open system architecture is that it:

A

facilitates interoperability within different systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A business unit has selected a new accounting application and did not consult with IT early in the selection process. The PRIMARY risk is that:

A

the application technology may be inconsistent with the enterprise architecture.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

By evaluating application development projects against the capability maturity model (CMM), an IS auditor should be able to verify that:

A

predictable software processes are followed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A comprehensive and effective email policy should address the issues of email structure, policy enforcement, monitoring and:

A

retention.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Corporate IT policy for a call center requires that all users be assigned unique user accounts. On discovering that this is not the case for all current users, what is the MOST appropriate recommendation?

A

Implement individual user accounts for all staff.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

During an audit, an IS auditor notices that the IT department of a medium-sized organization has no separate risk management function, and the organization’s operational risk documentation only contains a few broadly described types of IT risk. What is the MOST appropriate recommendation in this situation?

A

Establish regular IT risk management meetings to identify and assess risk and create a mitigation plan as input to the organization’s risk management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

During an audit, the IS auditor discovers that the human resources (HR) department uses a cloud-based application to manage employee records. The HR department engaged in a contract outside of the normal vendor management process and manages the application on its own. Which of the following is of GREATEST concern?

A

During an audit, the IS auditor discovers that the human resources (HR) department uses a cloud-based application to manage employee records. The HR department engaged in a contract outside of the normal vendor management process and manages the application on its own. Which of the following is of GREATEST concern?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Effective IT governance ensures that the IT plan is consistent with the organization’s:

A

business plan.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Effective IT governance requires organizational structures and processes to ensure that:

A

the IT strategy extends the organization’s strategies and objectives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An enterprise’s risk appetite is BEST established by:

A

the steering committee.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Errors in audit procedures PRIMARILY impact which of the following risk types?

A

Detection risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Establishing the level of acceptable risk is the responsibility of:

A

senior business management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A financial enterprise has had difficulties establishing clear responsibilities between its IT strategy committee and its IT steering committee. Which of the following responsibilities would MOST likely be assigned to its IT steering committee?

A

Approving IT project plans and budgets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A financial services enterprise has a small IT department, and individuals perform more than one role. Which of the following practices represents the GREATEST risk?

A

The developers promote code into the production environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Forahealthcareorganization,whichone of the following reasons MOST likely indicates that the patient benefit data warehouse should remain in-house rather than be outsourced to an offshore operation?

A

Thereare regulations regarding data privacy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

From a control perspective, the key element in job descriptions is that they:

A

establish responsibility and accountability for the employee’s actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

From an IT governance perspective, what is the PRIMARY responsibility of the board of directors? To ensure that the IT strategy:

A

is aligned with the business strategy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The initial step in establishing an information security program is the:

A

adoption of a corporate information security policy statement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

In the context of effective information security governance, the primary objective of value delivery is to:

A

optimize security investments in support of business objectives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Involvement of senior management is MOST important in the development of:

A

strategic plans.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

An IS audit department is planning to minimize the risk of short-term employees. Activities contributing to this objective are documented procedures, knowledge sharing, cross-training and:

A

succession planning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

An IS auditor discovers several IT- based projects were implemented and not approved by the steering committee. What is the GREATEST concern for the IS auditor?

A

The IT department may not be working toward a common goal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

An IS auditor finds that not all employees are aware of the enterprise’s information security policy. The IS auditor should conclude that:

A

this lack of knowledge may lead to unintentional disclosure of sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

An IS auditor found that the enterprise architecture (EA) recently adopted by an organization has an adequate current-state representation. However, the organization has started a separate project to develop a future-state representation. The IS auditor should:

A

report this issue as a finding in the audit report.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

An IS auditor has been assigned to review an organization’s information security policy. Which of the following issues represents the HIGHEST potential risk?

A

The policy is approved by the security administrator.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

An IS auditor identifies that reports on product profitability produced by an organization’s finance and marketing departments give different results. Further investigation reveals that the product definition being used by the two departments is different. What should the IS auditor recommend?

A

Organizational data governance practices are put in place

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

An IS auditor is evaluating a newly developed IT policy for an organization. Which of the following factors does the IS auditor consider MOST important to facilitate compliance with the policy upon its implementation?

A

Existing IT mechanisms enabling compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

An IS auditor is evaluating management’s risk assessment of information systems. The IS auditor should FIRST review:

A

threats/vulnerabilities affecting the assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

An IS auditor is evaluating the IT governance framework of an organization. Which of the following is the GREATEST concern?

A

Senior management has limited involvement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

An IS auditor is performing a review of an organization’s governance model. Which of the following should be of MOST concern to the auditor?

A

The information security policy is not periodically reviewed by senior management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

An IS auditor is performing a review of the software quality management process in an organization. The FIRST step should be to:

A

request all standards adopted by the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

An IS auditor is reviewing an IT security risk management program. Measures of security risk should:

A

consider the entire IT environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

An IS auditor is reviewing the risk management process. Which of the following is the MOST important consideration during this review?

A

IT risk is presented in business terms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

An IS auditor is verifying IT policies and finds that some of the policies have not been approved by management (as required by policy), but the employees strictly follow the policies. What should the IS auditor do FIRST?

A

Report the absence of documented approval.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

An IS auditor of a large organization is reviewing the roles and responsibilities of the IT function and finds some individuals serving multiple roles. Which one of the following combinations of roles should be of GREATEST concern for the IS auditor?

A

System administrators are application programmers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

An IS auditor reviewing the IT organization is MOST concerned if the IT steering committee:

A

is responsible for determining business goals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

An IS auditor reviews an organizational chart PRIMARILY for:

A

understanding the responsibilities and authority of individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

An IS auditor was hired to review e- business security. The IS auditor’s first task was to examine each existing e-business application, looking for vulnerabilities. What is the next task?

A

Identify threats and the likelihood of occurrence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

IS control objectives are useful to IS auditors because they provide the basis for understanding the:

A

desired result or purpose of implementing specific control procedures.

46
Q

IT governance is PRIMARILY the responsibility of the:

A

board of directors.

47
Q

An IT steering committee should:

A

maintain minutes of its meetings and keep the board of directors informed.

48
Q

A local area network (LAN) administrator normally is restricted from:

A

having programming responsibilities.

49
Q

The MOST important element for the effective design of an information security policy is the:

A

enterprise risk appetite.

50
Q

The MOST important point of consideration for an IS auditor while reviewing an enterprise’s project portfolio is that it:

A

is aligned with the business plan.

51
Q

The MOST likely effect of the lack of senior management commitment to IT strategic planning is:

A

technology not aligning with organization objectives.

52
Q

On which of the following factors should an IS auditor PRIMARILY focus when determining the appropriate level of protection for an information asset?

A

Results of a risk assessment

53
Q

An organization has a well-established risk management process. Which of the following risk management practices would MOST likely expose the organization to the greatest amount of compliance risk?

A

Risk transfer

54
Q

An organization is considering making a major investment in upgrading technology. Which of the following choices is the MOST important to consider?

A

A risk analysis

55
Q

The output of the risk management process is an input for making;

A

security policy decisions.

56
Q

Overall quantitative business risk for a particular threat can be expressed as:

A

a product of the likelihood and magnitude of the impact if a threat successfully exploits a vulnerability.

57
Q

A poor choice of passwords and unencrypted data transmissions over unprotected communications lines are examples of:

A

vulnerabilities.

58
Q

The PRIMARY benefit of implementing a security program as part of a security governance framework is the:

A

enforcement of the management of security risk.

59
Q

The PRIMARY objective of implementing corporate governance is to:

A

provide strategic direction.

60
Q

The rate of change in technology increases the importance of:

A

implementing and enforcing sound processes.

61
Q

Responsibility for the governance of IT should rest with the:

A

board of directors.

62
Q

The risk associated with electronic evidence gathering is MOST likely reduced by an email:

A

archive policy.

63
Q

Sharing risk is a key factor in which of the following methods of managing risk?

A

Transferring risk

64
Q

A small organization has only one database administrator (DBA) and one system administrator. The DBA has root access to the UNIX server, which hosts the database application. How should segregation of duties be enforced in this scenario?

A

Ensure that database logs are forwarded to a UNIX server where the DBA does not have root access.

65
Q

A team conducting a risk analysis is having difficulty projecting the financial losses that could result from a risk. To evaluate the potential impact, the team should:

A

apply a qualitative approach.

66
Q

To address the risk of operations staff’s failure to perform the daily backup, management requires that the systems administrator sign off on the daily backup. This is an example of risk:

A

mitigation.

67
Q

To aid management in achieving IT and business alignment, an IS auditor should recommend the use of:

A

an IT balanced scorecard.

68
Q

To gain an understanding of the effectiveness of an organization’s planning and management of investments in IT assets, an IS auditor should review the:

A

IT balanced scorecard.

69
Q

A top-down approach to the development of operational policies helps to ensure:

A

that they are consistent across the organization.

70
Q

The ultimate purpose of IT governance is to:

A

encourage optimal use of IT.

71
Q

What is the PRIMARY consideration for an IS auditor reviewing the prioritization and coordination of IT projects and program management?

A

Projects are aligned with the organization’s strategy.

72
Q

When auditing the IT governance framework and IT risk management practices that exist within an organization, the IS auditor identified some undefined responsibilities regarding IT management and governance roles. Which of the following recommendations is the MOST appropriate?

A

Implement accountability rules within the organization.

73
Q

When developing a formal enterprise security program, the MOST critical success factor is the:

A

effective support of an executive sponsor.

74
Q

When developing a security architecture, which of the following steps should be executed FIRST?

A

Defining a security policy

75
Q

When implementing an IT governance framework in an organization the MOST important objective is:

A

IT alignment with the business.

76
Q

When performing a review of a business process reengineering (BPR) effort, which of the following is of PRIMARY concern?

A

Controls are eliminated as part of the streamlining BPR effort.

77
Q

When reviewing an organization’s strategic IT plan, an IS auditor should expect to find:

A

an assessment of the fit of the organization’s application portfolio with business objectives.

78
Q

When reviewing the development of information security policies, the PRIMARY focus of an IS auditor should be on assuring that these policies:

A

strike a balance between business and security requirements.

79
Q

When reviewing the IT strategic planning process, an IS auditor should ensure that the plan:

A

articulates the IT mission and vision.

80
Q

When reviewing the IT strategy, an IS auditor can BEST assess whether the strategy supports the organizations’ business objectives by determining whether IT:

A

plans are consistent with management strategy.

81
Q

When segregation of duties concerns exist between IT support staff and end users, what would be a suitable compensating control?

A

Reviewing transaction and application logs

82
Q

Which of the following BEST supports the prioritization of new IT projects?

A

Investment portfolio analysis

83
Q

Which of the following choices is the PRIMARY benefit of requiring a steering committee to oversee IT investment?

A

To ensure that investments are made according to business requirements

84
Q

Which of the following does a lack of adequate security controls represent?

A

Vulnerability

85
Q

Which of the following does an IS auditor consider to be MOST important when evaluating an organization’s IT strategy? That it:

A

supports the business objectives of the organization.

86
Q

Which of the following factors is MOST critical when evaluating the effectiveness of an IT governance implementation?

A

Determine stakeholder requirements and involvement.

87
Q

Which of the following inputs adds the MOST value to the strategic IT initiative decision-making process?

A

The IT project portfolio analysis

88
Q

Which of the following insurance types provide for a loss arising from fraudulent acts by employees?

A

Fidelity coverage

89
Q

Which of the following is a function of an IT steering committee?

A

Approving and monitoring the status of IT plans and budgets

90
Q

Which of the following is an implementation risk within the process of decision support systems?

A

Inability to specify purpose and usage patterns

91
Q

Which of the following is MOST critical for the successful implementation and maintenance of a security policy?

A

Assimilation of the framework and intent of a written security policy by all appropriate parties

92
Q

Which of the following is MOST important to consider when reviewing the classification levels of information assets?

A

Potential loss

93
Q

Which of the following is normally a responsibility of the chief information security officer?

A

Periodically reviewing and evaluating the security policy

94
Q

Which of the following is of MOST interest to an IS auditor reviewing an organization’s risk strategy?

A

All likely risk is identified and ranked.

95
Q

Which of the following is responsible for the approval of an information security policy?

A

Board of directors

96
Q

Which of the following is the BEST enabler for strategic alignment between business and IT?

A

Goals and metrics

97
Q

Which of the following is the BEST reason to implement a policy that places conditions on secondary employment for IT employees?

A

To prevent conflicts of interest

98
Q

Which of the following is the BEST way to ensure that organizational policies comply with legal requirements?

A

Periodic review by subject matter experts

99
Q

Which of the following is the GREATEST risk of an inadequate policy definition for ownership of data and systems?

A

Unauthorized users may have access to modify data.

100
Q

Which of the following is the initial step in creating a firewall policy?

A

Identification of network applications to be externally accessed

101
Q

Which of the following is the MOST important element for the successful implementation of IT governance?

A

Identifying organizational strategies

102
Q

Which of the following IT governance good practices improves strategic alignment?

A

Top management mediates between the imperatives of business and technology.

103
Q

Which of the following MOST likely indicates that a customer data warehouse should remain in-house rather than be outsourced to an offshore operation?

A

Privacy laws can prevent cross-border flow of information.

104
Q

Which of the following should an IS auditor recommend to BEST enforce alignment of an IT project portfolio with strategic organizational priorities?

A

Select projects according to business benefits and risk.

105
Q

Which of the following should be considered FIRST when implementing a risk management program?

A

An understanding of the organization’s threat, vulnerability and risk profile

106
Q

Which of the following should be included in an organization’s information security policy?

A

The basis for access control authorization

107
Q

Which of the following should be of GREATEST concern to an IS auditor when reviewing an information
security policy? The policy:

A

is driven by an IT department’s objectives.

108
Q

Which of the following should be the MOST important consideration when deciding on areas of priority for IT governance implementations?

A

Business risk

109
Q

Which of the following user profiles should be of MOST concern to an IS auditor when performing an audit of an electronic funds transfer (EFT) system?

A

Three users with the ability to capture and verify their own messages

110
Q

While reviewing the IT governance processes of an organization, an IS auditor discovers the firm has recently implemented an IT balanced scorecard (BSC). The implementation is complete; however, the IS auditor notices that performance indicators are not objectively measurable. What is the PRIMARY risk presented by this situation?

A

Misleading indications of IT performance may be presented to management.