Exam 1 Flashcards
When installing an intrusion detection system, which of the following is MOST important?
A) Identifying messages that need to be quarantined
B) Properly locating it in the network architecture
C) Preventing denial-of-service attacks
D) Minimizing the rejection errors
B) Properly locating it in the network architecture
An organization is proposing to establish a wireless local area network (WLAN). Management asks the IS auditor to recommend security controls for the WLAN. Which of the following would be the MOST appropriate recommendation?
A) Implement the Simple Network Management Protocol to allow active monitoring.
B) Use service set identifiers that clearly identify the organization.
C) Encrypt traffic using the Wired Equivalent Privacy mechanism.
D) Physically secure wireless access points to prevent tampering.
D) Physically secure wireless access points to prevent tampering.
During the review of an in-house developed application, the GREATEST concern to an IS auditor is if a:
A) manager approves a change request and then reviews it in production.
B) programmer codes a change in the development environment and tests it in the test environment.
C) manager initiates a change request and subsequently approves it.
D) user raises a change request and tests it in the test environment.
C) manager initiates a change request and subsequently approves it.
To protect a Voice-over Internet Protocol infrastructure against a denial-of- service attack, it is MOST important to secure the:
A) intrusion detection system.
B) session border controllers.
C) backbone gateways.
D) access control servers
B) session border controllers.
An IS auditor is reviewing the change management process for an enterprise resource planning application. Which of the following is the BEST method for testing program changes?
A) Select a sample of change tickets and review them for authorization.
B) Use query software to analyze all change tickets for missing fields.
C) Trace a sample of modified programs to supporting change tickets.
D) Perform a walk-through by tracing a program change from start to finish.
C) Trace a sample of modified programs to supporting change tickets.
Company XYZ has outsourced production support to service provider ABC located in another country. The ABC service provider personnel remotely connect to the corporate network of the XYZ outsourcing entity over the Internet. Which of the following would BEST provide assurance that transmission of information is secure while the production support team at ABC is providing support to XYZ?
A) Hash functions
B) Secret key encryption
C) Dynamic Internet protocol address and port
D) Virtual private network tunnel
D) Virtual private network tunnel
A long-term IT employee with a strong technical background and broad managerial experience has applied for a vacant position in the IS audit department. Determining whether to hire this individual for this position should be PRIMARILY based on the individual’s experience and -
A) age, because training in audit techniques may be impractical.
B) length of service, because this will help ensure technical competence.
C) IT knowledge, because this will bring enhanced credibility to the audit function.
D) ability, as an IS auditor, to be independent of existing IT relationships.
D) ability, as an IS auditor, to be independent of existing IT relationships.
An appropriate control for ensuring the authenticity of orders received in an electronic data interchange system application is to:
A) encrypt electronic orders.
B) perform reasonableness checks on quantities ordered before filling orders.
C) acknowledge receipt of electronic orders with a confirmation message.
D) verify the identity of senders and determine if orders correspond to contract terms.
D) verify the identity of senders and determine if orders correspond to contract terms.
An internal audit function is reviewing an internally developed common gateway interface script for a web application. The IS auditor discovers that the script was not reviewed and tested by the quality control function. Which of the following types of risk is of GREATEST concern?
A) Unauthorized access
B) System unavailability
C) Exposure to malware
D) System integrity
A) Unauthorized access
Which of the following would MOST likely be considered a conflict of interest for an IS auditor who is reviewing a cybersecurity implementation?
A) Designing the cybersecurity controls
B) Conducting the vulnerability assessment
C) Delivering cybersecurity awareness training
D) Advising on the cybersecurity framework
A) Designing the cybersecurity controls
An IS auditor suspects an incident is occurring while an audit is being performed on a financial system. What should the IS auditor do FIRST?
A) Request that the system be shut down to preserve evidence.
B) Ask for immediate suspension of the suspect accounts.
C) Investigate the source and nature of the incident.
D) Report the incident to management.
D) Report the incident to management.
The internal audit division of an organization is planning a general IS audit as part of their internal IS audit function. Which of the following activities takes place during the FIRST step of the planning phase?
A) Identification of key information owners
B) Development of a risk assessment
C) Define the audit scope
D) Development of an audit program
B) Development of a risk assessment
The feature of a digital signature that ensures the sender cannot later deny generating and sending the message is called:
A) authentication.
B) data integrity.
C) nonrepudiation.
D) replay protection.
C) nonrepudiation.
The Secure Sockets Layer protocol ensures the confidentiality of a message by using:
A) message authentication codes.
B) symmetric encryption.
C) hash function.
D) digital signature certificates.
B) symmetric encryption.
An auditee disagrees with an audit finding. Which of the following is the BEST course of action for the IT auditor to take?
A) Retest the control to confirm the finding.
B) Discuss the finding with the IT auditor’s manager.
C) Elevate the risk associated with the control.
D) Discuss the finding with the auditee’s manager.
B) Discuss the finding with the IT auditor’s manager.
The computer security incident response team of an organization disseminates detailed descriptions of recent threats. An IS auditor’s GREATEST concern should be that the users may:
A) implement individual solutions.
B) use this information to launch attacks.
C) fail to understand the threat.
D)forward the security alert.
B) use this information to launch attacks.
Which of the following is the BEST indicator that a newly developed system will be used after it is in production?
A) Regression testing
B) Sociability testing
C) User acceptance testing
D) Parallel testing
C) User acceptance testing
Which of the following is the INITIAL step in creating a firewall policy?
A) A cost-benefit analysis of methods for securing the applications
B) Identification of vulnerabilities associated with network applications to be externally accessed
C) Identification of network applications to be externally accessed
D) Creation of an application traffic matrix showing protection methods
C) Identification of network applications to be externally accessed
From a control perspective, the key element in job descriptions is that they -
A) are current, documented and readily available to the employee.
B) establish responsibility and accountability for the employee’s actions.
C) provide instructions on how to do the job and define authority.
D) communicate management’s specific job performance expectations.
B) establish responsibility and accountability for the employee’s actions.
What is the PRIMARY control purpose of required vacations or job rotations?
A) allow cross-training for development.
B) provide a competitive employee benefit.
C) detect improper or illegal employee acts.
D) help preserve employee morale.
C) detect improper or illegal employee acts.
An IS auditor performing an audit of the newly installed Voice- over Internet Protocol system was inspecting the wiring closets on each floor of a building. What would be the GREATEST concern?
A) Network cabling is disorganized and not properly labeled.
B) The telephones are using the same cable used for LAN connections.
C) wiring closet also contains power lines and breaker panels.
D) The local area network (LAN) switches are not connected to uninterruptible power supply units.
D) The local area network (LAN) switches are not connected to uninterruptible power supply units.
An IS audit group has been involved in the integration of an automated audit tool kit with an existing enterprise resource planning system. Due to performance issues, the audit tool kit is not permitted to go live. What should the IS auditor’s BEST recommendation be?
A) Review the results of stress tests during user acceptance testing.
B) Request vendor technical support to resolve performance issues.
C) Request additional IS audit resources.
D) Review the implementation of selected integrated controls.
A) Review the results of stress tests during user acceptance testing.
An IS auditor reviewing an organization that uses cross-training practices should assess the risk of -
A) dependency on a single person.
B) one person knowing all parts of a system.
C) inadequate succession planning.
D) a disruption of operations.
B) one person knowing all parts of a system.
When testing for compliance, which of the following sampling methods is MOST useful?
A) Difference estimation sampling
B) Variable sampling
C) Stratified mean per unit sampling
D) Attribute sampling
D) Attribute sampling
Which of the following is the BEST control to mitigate the risk of pharming attacks to an Internet banking application?
A) User security awareness
B) Use of intrusion detection/intrusion prevention systems
C) Domain name system server security hardening
D) User registration and password policies
C) Domain name system server security hardening
Once an organization has finished the business process reengineering (BPR) of all its critical operations, an IS auditor would MOST likely focus on a review of:
A) continuous improvement and monitoring plans.
B) post-BPR process flowcharts.
C) pre-BPR process flowcharts.
D) BPR project plans.
B) post-BPR process flowcharts.
An IS auditor is reviewing a contract management process to determine the financial viability of a software vendor for a critical business application. An IS auditor should determine whether the vendor being considered -
A) can support the organization in the long term.
B) can deliver on the immediate contract.
C) has significant financial obligations that can impose liability to the organization.
D) is of similar financial standing as the organization.
A) can support the organization in the long term.
Which of the following is a control that can be implemented to reduce risk of internal fraud if application programmers are allowed to move programs into the production environment in a small organization?
A) Post-implementation functional testing
B) User acceptance testing
C) Validation of user requirements
D) Registration and review of changes
D) Registration and review of changes
The IS auditor is reviewing the implementation of a storage area network (SAN). The SAN administrator indicates that logging and monitoring is active, hard zoning is used to isolate data from different business units and all unused SAN ports are disabled. The administrator implemented the system, performed and documented security testing during implementation, and is the only user with administrative rights to the system. What should the IS auditor’s initial determination be?
A) Disabling of unused ports presents a potential risk.
B) Soft zoning presents a potential risk.
C) There is no significant potential risk.
D) The SAN administrator presents a potential risk.
D) The SAN administrator presents a potential risk.
Which of the following is a form of two- factor user authentication?
A) An iris scan and a fingerprint scan
B) A smart card and personal identification number
C) A unique user ID and complex, non- dictionary password
D) A magnetic strip card and a proximity badge
B) A smart card and personal identification number
Which of the following BEST helps an IS auditor assess and measure the value of a newly implemented system?
A) Review of business requirements
B) System accreditation
C) System certification
D) Post-implementation review
D) Post-implementation review
During the planning stage of an IS audit, the PRIMARY goal of an IS auditor is to -
A) collect sufficient evidence.
B) minimize audit resources.
C) specify appropriate tests.
D) address audit objectives.
D) address audit objectives.
Electromagnetic emissions from a terminal represent a risk because they:
A) could damage or erase nearby storage media.
B) could have adverse health effects on personnel.
C) can disrupt processor functions.
D) can be detected and displayed.
D) can be detected and displayed.
To prevent Internet Protocol (IP) spoofing attacks, a firewall should be configured to drop a packet for which the sender of a packet:
A) allows use of dynamic routing instead of static routing (Open Shortest Path First protocol is enabled).
B) specifies the route that a packet should take through the network (the source routing field is enabled).
C) puts multiple destination hosts (the destination field has a broadcast address in the destination field).
D) indicates that the computer should immediately stop using the TCP connection (a reset flag is turned on).
B) specifies the route that a packet should take through the network (the source routing field is enabled).
Which of the following is the MOST reliable method to ensure identity of sender for messages transferred across Internet?
A) Asymmetric cryptography
B) Message authentication code
C) Digital certificates
D) Digital signatures
C) Digital certificates
In what capacity would an IS auditor MOST likely see a hash function applied?
A) Authorization
B) Identification
C) Authentication
D) Encryption
C) Authentication
Which of the following would be BEST prevented by a raised floor in the computer machine room?
A) Damage of wires around computers and servers
B) Shocks from earthquakes
C) Water flood damage
D) A power failure from static electricity
A) Damage of wires around computers and servers
An IS auditor has discovered that a new patch is available for an application, but the IT department has decided that the patch is not needed because other security controls are in place. What should the IS auditor recommend?
A) Modify the firewall rules to further protect the application server.
B) Implement a host-based intrusion detection system.
C) Apply the patch only after it has been thoroughly tested.
D) Assess the overall risk, then recommend whether to deploy the patch.
D) Assess the overall risk, then recommend whether to deploy the patch.
A substantive test to verify that tape library inventory records are accurate is -
A) checking whether receipts and issues of tapes are accurately recorded.
B) determining whether the movement of tapes is authorized.
C) determining whether bar code readers are installed.
D) conducting a physical count of the tape inventory
D) conducting a physical count of the tape inventory
Which of the following is the responsibility of information asset owners?
A) Implementation of access rules to data and programs
B) Implementation of information security within applications
C) Provision of physical and logical security for data
D) Assignment of criticality levels to data
D) Assignment of criticality levels to data
An IS auditor is reviewing the network infrastructure of a call center and determines that the internal telephone system is based on Voice-over Internet Protocol technology. Which of the following is the GREATEST concern?
A) Voice communication uses the same equipment that is used for data communication.
B) The team that supports the data network also is responsible for the telephone system.
C) Voice communication is not encrypted on the local network.
D) Ethernet switches are not protected by uninterrupted power supply units.
D) Ethernet switches are not protected by uninterrupted power supply units.
Which of the following is MOST important to ensure before communicating the audit findings to top management during the closing meeting?
A) Findings are clearly tracked back to evidence.
B) Recommendations address root causes of findings.
C) Remediation plans are provided by responsible parties.
D) Risk statement includes an explanation of a business impact.
A) Findings are clearly tracked back to evidence.
Which of the following considerations is the MOST important while evaluating a business case for the acquisition of a new accounting application?
A) Return on investment to the company
B) Total cost of ownership of the application
C) The resources required for implementation
D) The cost and complexity of security requirements
A) Return on investment to the company
The responsibility for authorizing access to a business application system belongs to the:
A) data owner.
B) security administrator.
C) IT security manager.
D) requestor’s immediate supervisor.
A) data owner.
Which of the following network components is PRIMARILY set up to serve as a security measure by preventing unauthorized traffic between different segments of the network?
A) Routers
B) Virtual local area networks
C) Firewalls
D) Layer 2 switches
C) Firewalls
Assignment of process ownership is essential in system development projects because it:
A) enables the tracking of the development completion percentage.
B) ensures that system design is based on business needs.
C) minimizes the gaps between requirements and functionalities.
D) optimizes the design cost of user acceptance test cases.
B) ensures that system design is based on business needs.
Which of the following presents an inherent risk with no distinct identifiable preventive controls?
A) Unauthorized application shutdown
B) Viruses
C) Piggybacking
D) Data diddling
D) Data diddling
Confidentiality of transmitted data can best be delivered by encrypting the:
A) session key with the sender’s public key.
B) messages with the receiver’s private key.
C) message digest with the sender’s private key.
D) session key with the receiver’s public key.
D) session key with the receiver’s public key.
An IS auditor is reviewing the software development capabilities of an organization that has adopted the agile methodology. The IS auditor would be the MOST concerned if:
A) software development teams continually re-plan each step of their major projects.
B) application features and development processes are not extensively documented.
C) certain project iterations produce proof-of-concept deliverables and unfinished code.
D) project managers do not manage project resources, leaving that to project team members.
C) certain project iterations produce proof-of-concept deliverables and unfinished code.
During the collection of forensic evidence, which of the following actions would MOST likely result in the destruction or corruption of evidence on a compromised system?
A) Generating disk images of the compromised system
B) Rebooting the system
C) Removing the system from the network
D) Dumping the memory content to a file
B) Rebooting the system
An IS auditor performing an audit has determined that developers have been granted administrative access to the virtual machine management console to manage their own servers used for software development and testing. Which of the following choices would be of MOST concern for the IS auditor?
A) Developers could gain elevated access to production servers.
B) Developers have the ability to create or de- provision servers.
C) Developers can affect the performance of production servers with their applications.
D) Developers could install unapproved applications to any servers.
B) Developers have the ability to create or de- provision servers.
When preparing a business case to support the need of an electronic data warehouse solution, which of the following choices is the MOST important to assist management in the decision-making process?
A) Discuss a single solution.
B) Demonstrate feasibility.
C) Consider security controls.
D) Consult the audit department.
B) Demonstrate feasibility.
The IS auditor observes that the latest security-related software patches for a mission-critical system were released two months ago, but IT personnel have not yet installed the patches. The IS auditor should:
A) take no action, because the IT processes related to patch management appear to be adequate.
B) review the patch management policy and determine the risk associated with this condition.
C) recommend that IT systems personnel test and then install the patches immediately.
D) recommend that patches be applied every month or immediately upon release.
B) review the patch management policy and determine the risk associated with this condition.
This question refers to the following diagram. To detect attack attempts that the firewall is unable to recognize, an IS auditor should recommend placing a network intrusion detection system between the:
A) web server and the firewall.
B) Internet and the firewall.
C) Internet and the web server.
D) firewall and the organization’s network.
D) firewall and the organization’s network.