Exam 3 Flashcards
The success of control self-assessment depends highly on:
A) assigning staff managers, the responsibility for building controls.
B) the implementation of a stringent control policy and rule-driven controls.
C) line managers assuming a portion of the responsibility for control monitoring.
D) the implementation of supervision and monitoring of controls of assigned duties.
C) line managers assuming a portion of the responsibility for control monitoring.
Line managers assuming a portion of the responsibility for control monitoring is correct. The primary objective of a control self-assessment (CSA) program is to leverage the internal audit function by shifting some of the control monitoring responsibilities to the functional area line managers. The success of a CSA program depends on the degree to which line managers assume responsibility for controls. This enables line managers to detect and respond to control errors promptly.
An enterprise is looking to obtain cloud hosting services from a cloud vendor with a high level of maturity. Which of the following is MOST important for the auditor to ensure continued alignment with the enterprise’s security requirements?
A) The vendor agrees to implement controls in alignment with the enterprise.
B) The vendor agrees to provide annual external audit reports in the contract.
C) The vendor provides the latest internal audit report for verification.
D) The vendor provides the latest third- party audit report for verification.
B) The vendor agrees to provide annual external audit reports in the contract.
The vendor agrees to provide annual external audit reports in the contract is correct. The only way to ensure that any potential risk is mitigated today and in the future is to include a clause within the contract that the vendor will provide future external audit reports. Without the audit clause the vendor can choose to forego future audits.
What is the purpose of using data flow diagrams, used by the IS auditors?
A) identify key controls.
B) highlight high-level data definitions.
C) portray step-by-step details of data generation.
D) graphically summarize data paths and storage.
D) graphically summarize data paths and storage.
Graphically summarize data paths and storage is correct. Data flow diagrams are used as aids to graph or chart data flow and storage. They trace data from their origination to destination, highlighting the paths and storage of data.
The MOST serious challenge in the operation of an intrusion detection system is:
A) learning vendor specific protocols.
B) blocking eligible connections.
C) filtering false positive alerts.
D) updating vendor-specific protocols.
C) filtering false positive alerts.
Filtering false-positives alerts is correct. Because of the configuration and the way intrusion detection system (IDS) technology operates, the main problem in operating IDSs is the recognition (detection) of events that are not really security incidents—false positives, the equivalent of a false alarm. An IS auditor needs to be aware of this and should check for implementation of related controls (such as IDS tuning) and incident handling procedures (such as the screening process) to know if an event is a security incident or a false positive.
A company’s development team does not follow generally accepted system development life cycle practices. Which of the following is MOST likely to cause problems for software development projects?
A) Functional verification of the prototypes is assigned to end users.
B) Project responsibilities are not formally defined at the beginning of a project.
C) Program documentation is inadequate.
D) The project is implemented while minor issues are open from user acceptance testing.
B) Project responsibilities are not formally defined at the beginning of a project.
Project responsibilities are not formally defined at the beginning of a project is correct. Errors or lack of attention in the initial phases of a project may cause costly errors and inefficiencies in later phases. Proper planning is required at the beginning of a project.
Which of the following is the MOST important skill that an IS auditor should develop to understand the constraints of conducting an audit?
A) Allocating resources
B) Attention to detail
C) Managing audit staff
D) Project management
D) Project management
Project management is correct. Audits often involve resource management, deliverables, scheduling and deadlines that are similar to project management good practices.
Which of the following BEST helps prioritize the recovery of IT assets when planning for a disaster?
A) Business impact analysis
B) Incident response plan
C) Recovery time objective
D) Threat and risk analysis
A) Business impact analysis
Business impact analysis is correct. Incorporating the business impact analysis (BIA) into the IT disaster recovery planning process is critical to ensure that IT assets are prioritized to align with the business.
An IS auditor reviewing an outsourcing contract of IT facilities expects it to define the:
A) hardware configuration.
B) ownership of intellectual property.
C) application development methodology.
D) access control software.
B) ownership of intellectual property.
Ownership of intellectual property is correct. The contract must specify who owns the intellectual property (i.e., information being processed and application programs). Ownership of intellectual property is a significant cost and is a key aspect to be defined in an outsourcing contract.
A legacy payroll application is migrated to a new application. Which of the following stakeholders should be PRIMARILY responsible for reviewing and signing-off on the accuracy and completeness of the data before going live?
A) Project manager
B) Data owner
C) IS auditor
D) Database administrator
B) Data owner
Data owner is correct. During the data conversion stage of a project, the data owner is primarily responsible for reviewing and signing-off that the data are migrated completely and accurately and are valid.
Establishing the level of acceptable risk is the responsibility of:
A) the chief information officer.
B) quality assurance management.
C) senior business management.
D) the chief security officer.
C) senior business management.
Senior business management is correct. Senior management should establish the acceptable risk level because they have the ultimate or final responsibility for the effective and efficient operation of the organization as a senior manager of the business process. The person can be the quality assurance (QA), chief information officer (CIO), or the chief security officer (CSO), but the responsibility rests with the business manager.
An IS auditor reviewing the process of log monitoring wants to evaluate the organization’s manual review process. Which of the following audit techniques would the auditor MOST likely employ to fulfill this purpose?
A) Inquiry
B) Walk-through
C) Re-performance
D) Inspection
B) Walk-through
Walk-through is correct. These procedures usually include a combination of inquiry, observation, inspection of relevant documentation and reperformance of controls. A walk-through of the manual log review process follows the manual log review process from start to finish to gain a thorough understanding of the overall process and identify potential control weaknesses.
An IS auditor reviewing a cloud computing environment that is managed by a third party should be MOST concerned when:
A) the service level agreement does not address the responsibility of the vendor in the case of a security breach.
B) the organization is not permitted to assess the controls in the participating vendor’s site.
C) the organization is using an older version of a browser and is vulnerable to certain types of security risk.
D) laws and regulations are different in the countries of the organization and the vendor.
A) the service level agreement does not address the responsibility of the vendor in the case of a security breach.
The service level agreement does not address the responsibility of the vendor in the case of a security breach is correct. Administration of cloud computing occurs over the Internet and involves more than one participating entity. It is the responsibility of each of the partners in the cloud computing environment to take care of security issues in their own environments. When there is a security breach, the party responsible for the breach should be identified and made accountable. This is not possible if the service level agreement (SLA) does not address the responsibilities of the partners during a security breach.
The ultimate purpose of IT governance is to:
A) reduce IT costs.
B) encourage optimal use of IT.
C) centralize control of IT.
D) decentralize IT resources
B) encourage optimal use of IT.
Encourage optimal use of IT is correct. IT governance is intended to specify the combination of decision rights and accountability that is best for the enterprise. It is different for every enterprise.
Which of the following user profiles should be of MOST concern to an IS auditor when performing an audit of an electronic funds transfer (EFT) system?
A) Three users with the ability to capture and verify the messages of other users and to send their own messages
B) Five users with the ability to verify other users and to send their own messages
C) Five users with the ability to capture and send their own messages
D) Three users with the ability to capture and verify their own messages
D) Three users with the ability to capture and verify their own messages
Three users with the ability to capture and verify their own messages is correct. The ability of one individual to capture and verify their own messages represents an inadequate segregation because messages can be taken as correct and as if they had already been verified. The verification of messages should not be allowed by the person who sent the message.
The IS auditor is reviewing a recently completed conversion to a new enterprise resource planning system. In the final stage of the conversion process, the organization ran the old and new systems in parallel for 30 days before allowing the new system to run on its own. What is the MOST significant advantage to the organization by using this strategy?
A) Significant cost savings over other testing approaches
B) Assurance that new, faster hardware is compatible with the new system
C) Assurance that the new system meets functional requirements
D) Increased resiliency during the parallel processing time
C) Assurance that the new system meets functional requirements
Assurance that the new system meets functional requirements is correct. Parallel operation is designed to provide assurance that a new system meets its functional requirements. This is the safest form of system conversion testing because, if the new system fails, the old system is still available for production use. In addition, this form of testing allows the application developers and administrators to simultaneously run operational tasks (e.g., batch jobs and backups) on both systems, to ensure that the new system is reliable before unplugging the old system.
Which of the following is normally a responsibility of the chief information security officer?
A) Executing user application and software testing and evaluation
B) Granting and revoking user access to IT resources
C) Approving access to data and applications
D) Periodically reviewing and evaluating the security policy
D) Periodically reviewing and evaluating the security policy
Periodically reviewing and evaluating the security policy is correct. The role of the chief information security officer is to ensure that the corporate security policy and controls are adequate to prevent unauthorized access to the enterprise assets, including data, programs and equipment.
Which of the following types of penetration tests simulates a real attack and is used to test incident handling and response capability of the target?
A) Blind testing
B) Double-blind testing
C) External testing
D) Targeted testing
B) Double-blind testing
Double-blind testing is correct. This is also known as zero-knowledge testing. This refers to a test where the penetration tester is not given any information and the target organization is not given any warning—both parties are “blind” to the test. This is the best scenario for testing response capability because the target will react as if the attack were real.
A company has decided to implement an electronic signature scheme based on a public key infrastructure. The user’s private key will be stored on the computer’s hard drive and protected by a password. The MOST significant risk of this approach is:
A) use of the user’s electronic signature by another person if the password is compromised.
B) impersonation of a user by substitution of the user’s public key with another person’s public key.
C) forgery by using another user’s private key to sign a message with an electronic signature.
D) forgery by substitution of another person’s private key on the computer.
A) use of the user’s electronic signature by another person if the password is compromised.
Use of the user’s electronic signature by another person if the password is compromised is correct. The user’s digital signature is only protected by a password. Compromise of the password would enable access to the signature. This is the most significant risk.
Users are issued security tokens to be used in combination with a personal identification number (PIN) to access the corporate virtual private network. Regarding the PIN, what is the MOST important rule to be included in a security policy?
A) Users should never write down their PIN
B) Users must never keep the token in the same bag as their laptop computer.
C) Users should select a PIN that is completely random, with no repeating digits.
D) Users should not leave tokens where they could be stolen.
A) Users should never write down their PIN
Users should never write down their personal identification number (PIN) is correct. If a user writes their PIN on a slip of paper, an individual with the token, the slip of paper, and the computer could access the corporate network. A token and the PIN is a two-factor authentication method.
The purpose of code signing is to provide assurance that:
A) the private key of the signer has not been compromised.
B) the signer of the application is trusted.
C) the application can safely interface with another signed application.
D) the software has not been subsequently modified.
D) the software has not been subsequently modified.
The software has not been subsequently modified is correct. Code signing ensures that the executable code came from a reputable source and has not been modified after being signed.
During a human resources (HR) audit, an IS auditor is informed that there is a verbal agreement between the IT and HR departments as to the level of IT services expected. In this situation, what should the IS auditor do FIRST?
A) Draft a service level agreement for the two departments.
B) Postpone the audit until the agreement is documented.
C) Report the existence of the undocumented agreement to senior management.
D) Confirm the content of the agreement with both departments.
D) Confirm the content of the agreement with both departments.
Confirm the content of the agreement with both departments is correct. An IS auditor should first confirm and understand the current practice before making any recommendations. Part of this will be to ensure that both parties agree with the terms of the agreement.
An IS auditor has identified a business process to be audited. The IS auditor should NEXT identify the:
A) IS audit resources to be deployed.
B) most valuable information assets.
C) control objectives and activities.
D) auditee personnel to be interviewed.
C) control objectives and activities.
Control objectives and activities is correct. After the business process is identified, the IS auditor should first identify the control objectives and activities associated with the business process that should be validated in the audit.
Which of the following represents an example of a preventive control with respect to IT personnel?
A) An intrusion detection system
B) A security guard stationed at the server room door
C) Implementation of a badge entry system for the IT facility
D) A fire suppression system in the server room
C) Implementation of a badge entry system for the IT facility
Implementation of a badge entry system for the IT facility is correct. Preventive controls are used to reduce the probability of an adverse event. A badge entry system prevents unauthorized entry to the facility
The PRIMARY objective of conducting a post-implementation review for a business process automation project is to:
A) confirm compliance with regulatory requirements.
B) evaluate the adequacy of controls.
C) ensure that the project meets the intended business requirements.
D) confirm compliance with technological standards.
C) ensure that the project meets the intended business requirements.
Ensure that the project meets the intended business requirements is correct. This is the primary objective of a post-implementation review.
During a post-implementation review of an enterprise resource management system, an IS auditor would MOST likely:
A) evaluate system testing.
B) review access control configuration.
C) review detailed design documentation.
D) evaluate interface testing.
B) review access control configuration.
Review access control configuration is correct. Reviewing access control configuration would be the first task performed to determine whether security has been appropriately mapped in the system.
A team conducting a risk analysis is having difficulty projecting the financial losses that could result from a risk. To evaluate the potential impact, the team should:
A) apply a qualitative approach.
B) calculate a return on investment.
C) compute the amortization of the related assets.
D) spend the time needed to define the loss amount exactly.
A) apply a qualitative approach.
Apply a qualitative approach is correct. The common practice when it is difficult to calculate the financial losses is to take a qualitative approach, in which the manager affected by the risk defines the impact in terms of a weighted factor (e.g., one is a very low impact to the business and five is a very high impact).
While reviewing an ongoing project, the IS auditor notes that the development team has spent eight hours of activity on the first day against a budget of 24 hours (over three days). The projected time to complete the remainder of the activity is 20 hours. The IS auditor should report that the project:
A) cannot be evaluated until the activity is completed.
B) is on schedule.
C) is ahead of schedule.
D) is behind schedule.
D) is behind schedule.
Is behind schedule is correct. Earned value analysis (EVA) is based on the premise that if a project task is assigned 24 hours for completion, it can be reasonably completed during that time frame. According to EVA, the project is behind schedule because the value of the eight hours spent on the task should be only four hours, considering that 20 hours of effort remain to be completed.
A business unit has selected a new accounting application and did not consult with IT early in the selection process. The PRIMARY risk is that:
A) the application may not meet the requirements of the business users.
B) the application technology may be inconsistent with the enterprise architecture.
C) the application may create unanticipated support issues for IT.
D) the security controls of the application may not meet requirements.
B) the application technology may be inconsistent with the enterprise architecture.
The application technology may be inconsistent with the enterprise architecture is correct. The primary focus of the enterprise architecture (EA) is to ensure that technology investments are consistent with the platform, data and development standards of the IT organization. The EA defines both a current and future state in areas such as the use of standard platforms, databases or programming languages. If a business unit selected an application using a database or operating system that is not part of the EA for the business, this increases the cost and complexity of the solution and ultimately delivers less value to the business.
Which of the following should an incident response team address FIRST after a major incident in an information processing facility?
A) Documentation of the facility B) Restoration at the facility
C) Monitoring of the facility
D) Containment at the facility
D) Containment at the facility
Containment at the facility is correct. The first priority (after addressing life safety) is the containment of the incident at the facility so that spread of the damage is minimized. The incident team must gain control of the situation.
An enterprise uses privileged accounts to process configuration changes for mission- critical applications. Which of the following would be the BEST and appropriate control to limit the risk in such a situation?
A) Ensure that audit trails are accurate and specific.
B) Ensure that personnel background checks are performed for critical personnel.
C) Ensure that personnel have adequate training.
D) Ensure that supervisory approval and review are performed for critical changes.
D) Ensure that supervisory approval and review are performed for critical changes.
Ensure that supervisory approval and review are performed for critical changes is correct. Supervisory approval and review of critical changes by the accountable managers in the enterprise are required to avoid and detect any unauthorized change. In addition to authorization, supervision enforces a separation of duties and prevents an unauthorized attempt by any single employee.
Vendors have released patches fixing security flaws in their software. Which of the following should an IS auditor recommend in this situation?
A) Decline to deal with these vendors in the future.
B) Assess the impact of patches prior to installation.
C) Install the security patch immediately.
D) Ask the vendors for a new software version with all fixes included.
B) Assess the impact of patches prior to installation.
Assess the impact of patches prior to installation is correct. The effect of installing the patch should be immediately evaluated and installation should occur based on the results of the evaluation. There are numerous cases where a patch from one vendor has affected other systems; therefore, it is necessary to test the patches as much as possible before rolling them out to the entire organization.
An IS auditor who was involved in designing an organization’s business continuity plan (BCP) has been assigned to audit the plan. The IS auditor should:
A) inform management of the possible conflict of interest after completing the audit assignment.
B) communicate the possibility of conflict of interest to audit management prior to starting the assignment.
C) inform the BCP team of the possible conflict of interest prior to beginning the assignment.
D) decline the assignment.
B) communicate the possibility of conflict of interest to audit management prior to starting the assignment.
Communicate the possibility of conflict of interest to audit management prior to starting the assignment is correct. A possible conflict of interest, likely to affect the IS auditor’s independence, should be brought to the attention of management prior to starting the assignment.
IT governance is PRIMARILY the responsibility of the:
A) IT steering committee.
B) board of directors.
C) audit committee.
D) chief executive officer.
B) board of directors.
Board of directors is correct. IT governance is primarily the responsibility of the executives and shareholders (as represented by the board of directors).
Involvement of senior management is MOST important in the development of:
A) standards and guidelines.
B) strategic plans.
C) IT policies.
D) IT procedures.
B) strategic plans.
Strategic plans is correct. These provide the basis for ensuring that the enterprise meets its goals and objectives. Involvement of senior management is critical to ensuring that the plan adequately addresses the established goals and objectives.
Which of the following does an IS auditor FIRST reference when performing an IS audit?
A) Internal standards
B) Approved policies
C) Implemented procedures
D) Documented practices
B) Approved policies
Approved policies is correct. Policies are high-level documents that represent the corporate philosophy of an organization. Internal standards, procedures and practices are subordinate to policy.
Which of the following is widely accepted as one of the critical components in networking management?
A) Proxy server troubleshooting
B) Configuration and change management
C) Application of monitoring tools
D) Topological mappings
B) Configuration and change management
Configuration and change management is correct. Configuration management is widely accepted as one of the key components of any network because it establishes how the network will function internally and externally. It also deals with the management of configuration and monitoring performance. Change management ensures that the setup and management of the network is done properly, including managing changes to the configuration, removal of default passwords and possibly hardening the network by disabling unneeded services.
An IS auditor is validating a control that involves a review of system-generated exception reports. Which of the following is the BEST evidence of the effectiveness of the control?
A) System-generated exception reports for the review period with the reviewer’s sign-off
B) Management’s confirmation of the effectiveness of the control for the review period
C) Walk-through with the reviewer of the operation of the control
D) A sample system- generated exception report for the review period, with follow-up action items noted by the reviewer
D) A sample system- generated exception report for the review period, with follow-up action items noted by the reviewer
A sample system-generated exception report for the review period, with follow- up action items noted by the reviewer is correct. This represents the best possible evidence of the effective operation of the control, because there is documented evidence that the reviewer reviewed the exception report and took actions based on the exception report.
Which of the following is the MOST secure and economical method for connecting a private network over the Internet in a small- to medium- sized organization?
A) Dedicated line
B) Leased line
C) Virtual private network
D) Integrated services digital network
C) Virtual private network
Virtual private network is correct. The most secure method is a virtual private network, using encryption, authentication and tunneling to allow data to travel securely from a private network to the Internet.
An IS auditor performing a telecommunication access control review should be concerned PRIMARILY with the:
A) accountability system and the ability to identify any terminal accessing system resources.
B) maintenance of access logs of usage of various system resources.
C) authorization and authentication of the user prior to granting access to system resources.
D) adequate protection of stored data on servers by encryption or other means.
C) authorization and authentication of the user prior to granting access to system resources.
During an audit of a small enterprise, the IS auditor noted that the IS director has superuser- privilege access that allows the director to process requests for changes to the application access roles (access types). Which of the following should the IS auditor recommend?
A) Hire additional staff to provide a segregation of duties for application role changes.
B) Implement a properly documented process for application role change requests.
C) Document the current procedure in detail and make it available on the enterprise intranet.
D) Implement an automated process for changing application roles.
B) Implement a properly documented process for application role change requests.
Implement a properly documented process for application role change requests is correct. The IS auditor should recommend implementation of processes that could prevent or detect improper changes from being made to the major application roles. The application role change request process should start and be approved by the business owner; then, the IS director can make the changes to the application.
An IS auditor discovers that the disaster recovery plan (DRP) for a company does not include a critical application hosted in the cloud. Management’s response states that the cloud vendor is responsible for disaster recovery (DR) and DR- related testing. What is the NEXT course of action for the IS auditor to pursue?
A) Plan an audit of the cloud vendor.
B) Review an independent auditor’s report of the cloud vendor.
C) Review the vendor contract to determine its DR capabilities.
D) Request a copy of the DRP from the cloud vendor.
C) Review the vendor contract to determine its DR capabilities.
Review the vendor contract to determine its disaster recovery (DR) capabilities is correct. DR services can only be expected from the vendor when explicitly listed in the contract with well-defined recovery time objectives and recovery point objectives. Without the contractual language, the vendor is not required to provide DR services.
An IS auditor is reviewing an organization’s network operations center (NOC). Which of the following choices is of the GREATEST concern? The use of:
A) a rented rack space in the NOC.
B) a wet pipe-based fire suppression system.
C) a carbon dioxide-based fire suppression system.
D) an uninterrupted power supply with 10 minutes of backup power.
C) a carbon dioxide-based fire suppression system.
A carbon dioxide (CO2)-based fire suppression system is correct. CO2 systems should not be used in areas where people are present, because their function will cause suffocation in the event of a fire. Controls should consider personnel safety first.
What is the BEST method to facilitate successful user testing and acceptance of a new enterprise resource planning payroll system that is replacing an existing legacy system?
A) Prototype testing
B) Parallel testing
C) Multiple testing
D) Integration testing
B) Parallel testing
Parallel testing is correct. This is the best method for testing data results and system behavior because it allows the users to compare results from both systems before decommissioning the legacy system. Parallel testing also results in better user adoption of the new system.
An IS auditor wants to determine the number of purchase orders not appropriately approved. Which of the following sampling techniques should an IS auditor use to draw such conclusions?
A) Variable
B) Attribute
C) Stop-or-go
D) Judgment
B) Attribute
Attribute is correct. Attribute sampling is used to test compliance of transactions to controls—in this instance, the existence of appropriate approval.
Which of the following types of transmission media provide the BEST security against unauthorized access?
A) Fiber-optic cables
B) Copper wire
C) Shielded twisted pair
D) Coaxial cables
A) Fiber-optic cables
Fiber-optic cables is correct. Fiber-optic cables have proven to be more secure and more difficult to tap than the other media.
An organization has experienced a large amount of traffic being re-routed from its Voice-over Internet Protocol packet network. The organization believes it is a victim of eavesdropping. Which of the following could result in eavesdropping of VoIP traffic?
A) End users having access to software tools such as packet sniffer applications
B) Corruption of the Address Resolution Protocol cache in Ethernet switches
C) Use of a default administrator password on the analog phone switch
D) Deploying virtual local area networks without enabling encryption
B) Corruption of the Address Resolution Protocol cache in Ethernet switches
Corruption of the Address Resolution Protocol (ARP) cache in Ethernet switches is correct. On an Ethernet switch there is a data table known as the ARP cache, which stores mappings between media access control and IP addresses. During normal operations, Ethernet switches only allow directed traffic to flow between the ports involved in the conversation and no other ports can see that traffic. However, if the ARP cache is intentionally corrupted with an ARP poisoning attack, some Ethernet switches simply “flood” the directed traffic to all ports of the switch, which could allow an attacker to monitor traffic not normally visible to the port where the attacker was connected, and thereby eavesdrop on Voice-over Internet Protocol (VoIP) traffic.
Web and email filtering tools are valuable to an organization PRIMARILY because they:
A) assist the organization in preventing legal issues
B) maximize employee performance.
C) protect the organization from viruses and non-business materials.
D) safeguard the organization’s image.
C) protect the organization from viruses and non-business materials.
Protect the organization from viruses and non-business materials is correct. The main reason for investing in web and email filtering tools is that they significantly reduce risk related to viruses, spam, mail chains, recreational surfing and recreational email.
The internal IS audit team is auditing controls over sales returns and is concerned about fraud. Which of the following sampling methods would BEST assist the IS auditors?
A) Discovery
B) Stop-or-go
C) Classical variable
D) Probability-proportional-to- size
A) Discovery
Discovery sampling is correct. This is used when an IS auditor is trying to determine whether a type of event has occurred. Therefore, it is suited to assess the risk of fraud and to identify whether a single occurrence has taken place.
When using public key encryption to secure data being transmitted across a network:
A) both the key used to encrypt and decrypt the data are public.
B) the key used to encrypt is private, but the key used to decrypt the data is public.
C) both the key used to encrypt and decrypt the data are private.
D) the key used to encrypt is public, but the key used to decrypt the data is private.
D) the key used to encrypt is public, but the key used to decrypt the data is private.
The key used to encrypt is public, but the key used to decrypt the data is private is correct. Public key encryption, also known as asymmetric key cryptography, uses a public key to encrypt the message and a private key to decrypt it.
The BEST time for an IS auditor to assess the control specifications of a new application software package which is being considered for acquisition is during:
A) the internal lab testing phase.
B) the implementation phase.
C) testing and prior to user acceptance.
D) the requirements gathering process.
C) testing and prior to user acceptance.
The requirements gathering process is correct. The best time for the involvement of an IS auditor is at the beginning of the requirements definition of the development or acquisition of applications software. This provides maximum opportunity for review of the vendors and their products. Early engagement of an IS auditor also minimizes the potential of a business commitment to a given solution that might be inadequate and more difficult to overcome as the process continues.
Which of the following would an IS auditor consider a weakness when performing an audit of an organization that uses a public key infrastructure with digital certificates for its business-to-consumer transactions via the Internet?
A) The CA has several data processing subcenters to administer certificates.
B) Customers can make their transactions from any computer or mobile device.
C) Customers are widely dispersed geographically, but the certificate authorities (CAs) are not.
D) The organization is the owner of the CA.
D) The organization is the owner of the CA.
The organization is the owner of the certificate authority( CA)is correct. If the CA belongs to the same organization, this would pose a risk. The management of a CA must be based on trusted and secure procedures. If the organization has not set in place the controls to manage the registration, distribution and revocation of certificates this could lead to a compromise of the certificates and loss of trust.
Which of the following situations could impair the independence of an IS auditor? The IS auditor -
A) implemented specific functionality during the development of an application.
B) provided consulting advice concerning application good practices.
C) designed an embedded audit module for auditing an application.
D) participated as a member of an application project team and did not have operational responsibilities.
A) implemented specific functionality during the development of an application.
Implemented specific functionality during the development of an application is correct. Independence may be impaired if an IS auditor is or has been, actively involved in the development, acquisition, and implementation of the application system.
Which of the following systems or tools can recognize that a credit card transaction is more likely to have resulted from a stolen credit card than from the holder of the credit card?
A) Stateful inspection firewalls B) Intrusion detection systems C) Packet filtering routers
D) Data mining techniques
D) Data mining techniques
Data mining techniques is correct. Data mining is a technique used to detect trends or patterns of transactions or data. If the historical pattern of charges against a credit card account is changed, then it is a flag that the transaction may have resulted from a fraudulent use of the card.
Which of the following will BEST ensure the successful offshore development of business applications?
A) Stringent contract management practices
B) Detailed and correctly applied specifications
C) Post-implementation review
D) Awareness of cultural and political differences
B) Detailed and correctly applied specifications
Detailed and correctly applied specifications is correct. When dealing with offshore operations, it is essential that detailed specifications be created. Language differences and a lack of interaction between developers and physically remote end users could create gaps in communication in which assumptions and modifications may not be adequately communicated. Inaccurate specifications cannot easily be corrected.
The rate of change in technology increases the importance of:
A) outsourcing the IT function.
B) meeting user requirements.
C) implementing and enforcing sound processes.
D) hiring qualified personnel.
C) implementing and enforcing sound processes.
Implementing and enforcing sound processes is correct. Change control requires that good change management processes be implemented and enforced.
Email message authenticity and confidentiality is BEST achieved by signing the message using the:
A) receiver’s private key and encrypting the message using the sender’s public key.
B) sender’s private key and encrypting the message using the receiver’s public key.
C) sender’s public key and encrypting the message using the receiver’s private key.
D) receiver’s public key and encrypting the message using the sender’s private key.
B) sender’s private key and encrypting the message using the receiver’s public key.
Sender’s private key and encrypting the message using the receiver’s public key is correct. By signing the message with the sender’s private key, the receiver can verify its authenticity using the sender’s public key. Encrypting with the receiver’s public key provides confidentiality.
Which of the following would be the BEST access control procedure?
A) The data owner and an IS manager jointly create and update the user authorization tables.
B) The data owner formally authorizes access and an administrator implements the user authorization tables.
C) The data owner creates and updates the user authorization tables.
D) Authorized staff implements the user authorization tables and the data owner approves them.
B) The data owner formally authorizes access and an administrator implements the user authorization tables.
The data owner formally authorizes access and an administrator implements the user authorization tables is correct. The data owner holds the privilege and responsibility for formally establishing the access rights. An IS administrator should then implement or update user authorization tables at the direction of the owner.
An IS auditor discovers that the configuration settings for password controls are more stringent for business users than for IT developers. Which of the following is the BEST action for the IS auditor to take?
A) Recommend that all password configuration settings be identical.
B) Document the observation as an exception.
C) Determine whether this is a policy violation and document it
D) Recommend that logs of IT developer access are reviewed periodically.
C) Determine whether this is a policy violation and document it
Determine whether this is a policy violation and document it is correct. If the policy documents the purpose and approval for different procedures, then an IS auditor only needs to document observations and tests as to whether the procedures are followed.
Which of the following is the FIRST step in an IT risk assessment for a risk-based audit?
A) Identify all IT systems and controls that are relevant to audit objectives.
B) List all controls from the audit program to select ones matching with audit objectives.
C) Understand the business, its operating model and key processes.
D) Review the results of a risk self-assessment.
D) Review the results of a risk self-assessment.
Understand the business, its operating model and key processes is correct. Risk-based auditing must be based on the understanding of the business, operating model and environment. This is the first step in an IT risk assessment for a risk-based audit. Identify all
Which control is the BEST way to ensure that the data in a file have not been changed during transmission?
A) Hash values
B) Reasonableness check
C) Check digits
D) Parity bits
A) Hash values
Hash values is correct. These are calculated on the file and are very sensitive to any changes in the data values in the file. Thus, they are the best way to ensure that data has not changed.