Exam 1 Flashcards
When installing an intrusion detection system, which of the following is MOST important?
A) Identifying messages that need to be quarantined
B) Properly locating it in the network architecture
C) Preventing denial-of-service attacks
D) Minimizing the rejection errors
B) Properly locating it in the network architecture
An organization is proposing to establish a wireless local area network (WLAN). Management asks the IS auditor to recommend security controls for the WLAN. Which of the following would be the MOST appropriate recommendation?
A) Implement the Simple Network Management Protocol to allow active monitoring.
B) Use service set identifiers that clearly identify the organization.
C) Encrypt traffic using the Wired Equivalent Privacy mechanism.
D) Physically secure wireless access points to prevent tampering.
D) Physically secure wireless access points to prevent tampering.
During the review of an in-house developed application, the GREATEST concern to an IS auditor is if a:
A) manager approves a change request and then reviews it in production.
B) programmer codes a change in the development environment and tests it in the test environment.
C) manager initiates a change request and subsequently approves it.
D) user raises a change request and tests it in the test environment.
C) manager initiates a change request and subsequently approves it.
To protect a Voice-over Internet Protocol infrastructure against a denial-of- service attack, it is MOST important to secure the:
A) intrusion detection system.
B) session border controllers.
C) backbone gateways.
D) access control servers
B) session border controllers.
An IS auditor is reviewing the change management process for an enterprise resource planning application. Which of the following is the BEST method for testing program changes?
A) Select a sample of change tickets and review them for authorization.
B) Use query software to analyze all change tickets for missing fields.
C) Trace a sample of modified programs to supporting change tickets.
D) Perform a walk-through by tracing a program change from start to finish.
C) Trace a sample of modified programs to supporting change tickets.
Company XYZ has outsourced production support to service provider ABC located in another country. The ABC service provider personnel remotely connect to the corporate network of the XYZ outsourcing entity over the Internet. Which of the following would BEST provide assurance that transmission of information is secure while the production support team at ABC is providing support to XYZ?
A) Hash functions
B) Secret key encryption
C) Dynamic Internet protocol address and port
D) Virtual private network tunnel
D) Virtual private network tunnel
A long-term IT employee with a strong technical background and broad managerial experience has applied for a vacant position in the IS audit department. Determining whether to hire this individual for this position should be PRIMARILY based on the individual’s experience and -
A) age, because training in audit techniques may be impractical.
B) length of service, because this will help ensure technical competence.
C) IT knowledge, because this will bring enhanced credibility to the audit function.
D) ability, as an IS auditor, to be independent of existing IT relationships.
D) ability, as an IS auditor, to be independent of existing IT relationships.
An appropriate control for ensuring the authenticity of orders received in an electronic data interchange system application is to:
A) encrypt electronic orders.
B) perform reasonableness checks on quantities ordered before filling orders.
C) acknowledge receipt of electronic orders with a confirmation message.
D) verify the identity of senders and determine if orders correspond to contract terms.
D) verify the identity of senders and determine if orders correspond to contract terms.
An internal audit function is reviewing an internally developed common gateway interface script for a web application. The IS auditor discovers that the script was not reviewed and tested by the quality control function. Which of the following types of risk is of GREATEST concern?
A) Unauthorized access
B) System unavailability
C) Exposure to malware
D) System integrity
A) Unauthorized access
Which of the following would MOST likely be considered a conflict of interest for an IS auditor who is reviewing a cybersecurity implementation?
A) Designing the cybersecurity controls
B) Conducting the vulnerability assessment
C) Delivering cybersecurity awareness training
D) Advising on the cybersecurity framework
A) Designing the cybersecurity controls
An IS auditor suspects an incident is occurring while an audit is being performed on a financial system. What should the IS auditor do FIRST?
A) Request that the system be shut down to preserve evidence.
B) Ask for immediate suspension of the suspect accounts.
C) Investigate the source and nature of the incident.
D) Report the incident to management.
D) Report the incident to management.
The internal audit division of an organization is planning a general IS audit as part of their internal IS audit function. Which of the following activities takes place during the FIRST step of the planning phase?
A) Identification of key information owners
B) Development of a risk assessment
C) Define the audit scope
D) Development of an audit program
B) Development of a risk assessment
The feature of a digital signature that ensures the sender cannot later deny generating and sending the message is called:
A) authentication.
B) data integrity.
C) nonrepudiation.
D) replay protection.
C) nonrepudiation.
The Secure Sockets Layer protocol ensures the confidentiality of a message by using:
A) message authentication codes.
B) symmetric encryption.
C) hash function.
D) digital signature certificates.
B) symmetric encryption.
An auditee disagrees with an audit finding. Which of the following is the BEST course of action for the IT auditor to take?
A) Retest the control to confirm the finding.
B) Discuss the finding with the IT auditor’s manager.
C) Elevate the risk associated with the control.
D) Discuss the finding with the auditee’s manager.
B) Discuss the finding with the IT auditor’s manager.
The computer security incident response team of an organization disseminates detailed descriptions of recent threats. An IS auditor’s GREATEST concern should be that the users may:
A) implement individual solutions.
B) use this information to launch attacks.
C) fail to understand the threat.
D)forward the security alert.
B) use this information to launch attacks.
Which of the following is the BEST indicator that a newly developed system will be used after it is in production?
A) Regression testing
B) Sociability testing
C) User acceptance testing
D) Parallel testing
C) User acceptance testing
Which of the following is the INITIAL step in creating a firewall policy?
A) A cost-benefit analysis of methods for securing the applications
B) Identification of vulnerabilities associated with network applications to be externally accessed
C) Identification of network applications to be externally accessed
D) Creation of an application traffic matrix showing protection methods
C) Identification of network applications to be externally accessed
From a control perspective, the key element in job descriptions is that they -
A) are current, documented and readily available to the employee.
B) establish responsibility and accountability for the employee’s actions.
C) provide instructions on how to do the job and define authority.
D) communicate management’s specific job performance expectations.
B) establish responsibility and accountability for the employee’s actions.
What is the PRIMARY control purpose of required vacations or job rotations?
A) allow cross-training for development.
B) provide a competitive employee benefit.
C) detect improper or illegal employee acts.
D) help preserve employee morale.
C) detect improper or illegal employee acts.
An IS auditor performing an audit of the newly installed Voice- over Internet Protocol system was inspecting the wiring closets on each floor of a building. What would be the GREATEST concern?
A) Network cabling is disorganized and not properly labeled.
B) The telephones are using the same cable used for LAN connections.
C) wiring closet also contains power lines and breaker panels.
D) The local area network (LAN) switches are not connected to uninterruptible power supply units.
D) The local area network (LAN) switches are not connected to uninterruptible power supply units.
An IS audit group has been involved in the integration of an automated audit tool kit with an existing enterprise resource planning system. Due to performance issues, the audit tool kit is not permitted to go live. What should the IS auditor’s BEST recommendation be?
A) Review the results of stress tests during user acceptance testing.
B) Request vendor technical support to resolve performance issues.
C) Request additional IS audit resources.
D) Review the implementation of selected integrated controls.
A) Review the results of stress tests during user acceptance testing.
An IS auditor reviewing an organization that uses cross-training practices should assess the risk of -
A) dependency on a single person.
B) one person knowing all parts of a system.
C) inadequate succession planning.
D) a disruption of operations.
B) one person knowing all parts of a system.
When testing for compliance, which of the following sampling methods is MOST useful?
A) Difference estimation sampling
B) Variable sampling
C) Stratified mean per unit sampling
D) Attribute sampling
D) Attribute sampling