Exam 4 Flashcards
An IS auditor should expect which of the following items to be included in the request for proposal (RFP) when IS is procuring services from an independent service provider (ISP)?
A. References from other customers
B. Service level agreement (SLA) template
C. Maintenance agreement
D. Conversion plan
A. References from other customers
To aid management in achieving IT and business alignment, an IS auditor should recommend the use of:
A. control self-assessments.
B. a business impact analysis.
C. an IT balanced scorecard.
D. business process reengineering.
C. an IT balanced scorecard.
A poor choice of passwords and transmission over unprotected communications lines are examples of:
A. vulnerabilities.
B. threats.
C. probabilities.
D. impacts.
A. vulnerabilities.
To support an organization’s goals, an IS department should have:
A. a low-cost philosophy.
B. long- and short-range plans.
C .leading-edge technology.
D. plans to acquire new hardware and software.
B. long- and short-range plans.
A local area network (LAN) administrator normally would be restricted from:
A. having end-user responsibilities.
B. reporting to the end-user manager.
C. having programming responsibilities.
D. being responsible for LAN security administration.
C. having programming responsibilities.
To minimize costs and improve service levels an outsourcer should seek which of the following contract clauses?
A. O/S and hardware refresh frequencies
B. Gain-sharing performance bonuses
C. Penalties for noncompliance
D. Charges tied to variable cost metrics
B. Gain-sharing performance bonuses
Which of the following is a mechanism for mitigating risks?
A. Security and control practices
B. Property and liability insurance
C. Audit and certification
D. Contracts and service level agreements (SLAs)
A. Security and control practices
Which of the following is the BEST information source for management to use as an aid in the identification of assets that are subject to laws and regulations?
A. Security incident summaries
B. Vendor best practices
C. CERT coordination center
D. Significant contracts
D. Significant contracts
The management of an organization has decided to establish a security awareness program. Which of the following would MOST likely be a part of the program?
A. Utilization of an intrusion detection system to report incidents
B. Mandating the use of passwords to access all software
C. Installing an efficient user log system to track the actions of each user
D. Training provided on a regular basis to all current and new employees
D. Training provided on a regular basis to all current and new employee
A comprehensive and effective e-mail policy should address the issues of e-mail structure, policy enforcement, monitoring and:
A. recovery.
B. retention.
C. rebuilding.
D. reuse.
B. retention.
When performing a review of the structure of an electronic funds transfer (EFT) system, an IS auditor observes that the technological infrastructure is based on a centralized processing scheme that
has been outsourced to a provider in another country. Based on this information, which of the following conclusions should be the main concern of the IS auditor?
A. There could be a question regarding the legal jurisdiction.
B. Having a provider abroad will cause excessive costs in future audits.
C. The auditing process will be difficult because of the distance.
D. There could be different auditing norms.
A. There could be a question regarding the legal jurisdiction.
The risks associated with electronic evidence gathering would MOST likely be reduced by an e-mail:
A. destruction policy.
B. security policy.
C. archive policy.
D. audit policy.
C. archive policy.
Effective IT governance requires organizational structures and processes to ensure that:
A. the organization’s strategies and objectives extend the IT strategy.
B. the business strategy is derived from an IT strategy.
C. IT governance is separate and distinct from the overall governance.
D. the IT strategy extends the organization’s strategies and objectives.
D. the IT strategy extends the organization’s strategies and objectives
Which of the following would an IS auditor consider to be the MOST important when evaluating an organization’s IS strategy? That it:
A. has been approved by line management.
B. does not vary from the IS department’s preliminary budget.
C. complies with procurement procedures.
D. supports the business objectives of the organization.
D. supports the business objectives of the organization.
Which of the following would MOST likely indicate that a customer data warehouse should remain in-house rather than be outsourced to an offshore operation?
A. Time zone differences could impede communications between IT teams.
B. Telecommunications cost could be much higher in the first year.
C. Privacy laws could prevent cross-border flow of information.
D. Software development may require more detailed specifications.
C. Privacy laws could prevent cross-border flow of information.
When reviewing IS strategies, an IS auditor can BEST assess whether IS strategy supports the organizations; business objectives by determining if IS:
A. has all the personnel and equipment it needs.
B. plans are consistent with management strategy.
C. uses its equipment and personnel efficiently and effectively.
D. has sufficient excess capacity to respond to changing directions.
B. plans are consistent with management strategy.
An IS auditor should be concerned when a telecommunication analyst:
A. monitors systems performance and tracks problems resulting from program changes.
B. reviews network load requirements in terms of current and future transaction volumes.
C. assesses the impact of the network load on terminal response times and network data transfer rates.
D. recommends network balancing procedures and improvements.
A. monitors systems performance and tracks problems resulting from program changes.
In reviewing the IS short-range (tactical) plan, an IS auditor should determine whether:
A. there is an integration of IS and business staffs within projects.
B. there is a clear definition of the IS mission and vision.
C. a strategic information technology planning methodology is in place.
D. the plan correlates business objectives to IS goals and objectives.
A. there is an integration of IS and business staffs within projects.