Domain 3: Information Systems Acquisition, Development, and Implementation - PART 3A Flashcards
Assignment of process ownership is essential in system development projects because it:
ensures that system design is based on business needs.
Before implementing controls in a newly developed system, management should PRIMARILY ensure that the controls:
satisfy a requirement in addressing a risk.
The BEST time for an IS auditor to assess the control specifications of a new application software package which is being considered for acquisition is during:
during the requirements gathering process.
A company has implemented a new client- server enterprise resource planning (ERP) system. Local branches transmit customer orders to a central manufacturing facility. Which of the following would BEST ensure that the orders are processed accurately, and the corresponding products are produced?
Verifying production of customer orders
A company’s development team does not follow generally accepted system development life cycle practices. Which of the following is MOST likely to cause problems for software development projects?
Project responsibilities are not formally defined at the beginning of a project.
A company undertakes a business process reengineering project in support of a new and direct marketing approach to its customers. Which of the following would be an IS auditor’s main concern about the new process?
Whether key controls are in place to protect assets and information resources
The development of an application has been outsourced to an offshore vendor. Which of the following should be of GREATEST concern to an IS auditor?
The business case was not established.
Documentation of a business case used in an IT development project should be retained until:
the end of the system’s life cycle.
Due to a reorganization, a business application system will be extended to other departments. Which of the following should be of the GREATEST concern for an IS auditor?
Process owners have not been identified.
During a system development life cycle audit of a human resources and payroll application, the IS auditor notes that the data used for user acceptance testing have been masked. The purpose of masking the data is to ensure the:
confidentiality of the data.
During the audit of an acquired software package, an IS auditor finds that the software purchase was based on information obtained through the Internet, rather than from responses to a request for proposal. The IS auditor should FIRST:
ensure that the procedure had been approved.
During the review of a web-based software development project, an IS auditor realizes that coding standards are not enforced, and code reviews are rarely carried out. This will MOST likely increase the likelihood of a successful:
buffer overflow.
The editing/validation of data entered at a remote site is performed MOST effectively at the:
remote processing site PRIOR to transmission of the data to the central processing site.
An enterprise is developing a strategy to upgrade to a newer version of its database software. Which of the following tasks can an IS auditor perform without compromising the objectivity of the IS audit function?
Review the acceptance test case documentation BEFORE the tests are carried out.
Following good practices, formal plans for implementation of new information systems are developed during the:
Design Phase.
Information for detecting unauthorized input from a user workstation would be BEST provided by the:
transaction journal.
An IS auditor assesses the project management process for an internal software development project. In respect to the software functionality, the IS auditor should look for sign-off by:
business unit management.
An IS auditor has been asked to participate in project initiation meetings for a critical project. The IS auditor’s MAIN concern should be that the:
complexity and risk associated with the project have been analyzed.
An IS auditor has found time constraints and expanded needs to be the root causes for recent violations of corporate data definition standards in a new business intelligence project. Which of the following is the MOST appropriate suggestion for an auditor to make?
Achieve standards alignment through an increase of resources devoted to the project.
An IS auditor invited to a project development meeting notes that no project risk has been documented. When the IS auditor raises this issue, the project manager responds that it is too early to identify risk and that, if risk starts impacting the project, a risk manager will be hired. The appropriate response of the IS auditor would be to:
Stress the importance of spending time at this point in the project to consider and DOCUMENT risk and to develop contingency plans.
An IS auditor is assigned to audit a software development project, which is more than 80 percent complete, but has already overrun time by 10 percent and costs by 25 percent. Which of the following actions should the IS auditor take?
Review the business case and project management.
An IS auditor is performing a post- implementation review of an organization’s system and identifies output errors within an accounting application. The IS auditor determined this was caused by input errors. Which of the following controls should the IS auditor recommend to management?
Limit checks
An IS auditor is reviewing IT projects for a large company and wants to determine whether the IT projects undertaken in a given year are those which have been assigned the highest priority by the business and which will generate the greatest business value. Which of the following is MOST relevant?
Portfolio management
An IS auditor is reviewing the software development capabilities of an organization that has adopted the agile methodology. The IS auditor would be the MOST concerned if:
certain project iterations produce proof-of- concept deliverables and unfinished code.
An IS auditor performing a review of a major software development project finds that it is on schedule and under budget even though the software developers have worked considerable amounts of unplanned overtime. The IS auditor should:
investigate further to determine whether the project plan may not be accurate.
An IS auditor recommends that an initial validation control be programmed into a credit card transaction capture application. The initial validation process would MOST likely:
verify the format of the number entered, then locate it on the database.
An IS auditor reviewing a proposed application software acquisition should ensure that the:
product is compatible with the current or planned OS.
An IS auditor reviewing a series of completed projects finds that the implemented functionality often exceeded requirements and most of the projects ran significantly over budget. Which of these areas of the organization’s project management process is the MOST likely cause of this issue?
Project scope management
An IS auditor reviewing the IT project management process is reviewing a feasibility study for a critical project to build a new data center. The IS auditor is MOST concerned about the fact that:
the organizational impact of the project has not been assessed.
An IS auditor who is auditing the software acquisition process will ensure that the:
contract is reviewed and approved by the legal counsel before it is signed.
A large industrial organization is replacing an obsolete legacy system and evaluating whether to buy a custom solution or develop a system in-house. Which of the following will MOST likely influence the decision?
Technical skills and knowledge within the organization related to sourcing and software development
The MAIN purpose of a transaction audit trail is to:
determine accountability and responsibility for processed transactions.
The MAJOR advantage of a component- based development approach is the:
support of multiple development environments.
The MAJOR consideration for an IS auditor reviewing an organization’s IT project portfolio is the:
business plan.