Exam 5 Flashcards

1
Q

When performing an audit of an organization’s systems, the auditor’s first step should be to:

A. Develop a strategic audit plan
B. Gain an understanding of the focus of the business of the organization
C. Perform an initial risk assessment to provide the foundation for a risk-based audit
D. Determine and define audit scope and materiality

A

B. Gain an understanding of the focus of the business of the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Allowing applications programmers to access live production applications for patching and security maintenance breaches proper segregation of duties. True or false?

A. True
B. False

A

A. True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

These are steps included in business process re- engineering: a) Gain an understanding of the business process to be reviewed, b) Establish a continuous improvement process, c) Redesign and streamline the process, d) Define the areas to be reviewed, e) Implement and monitor the new process, f) Develop a project plan. What is the proper sequence of these steps?

A. d, f, a, c, e, b
B. a, f, d, c, e, b
C. f, a, d, c, e, b
D. d, a, f, c, e, b

A

A. d, f, a, c, e, b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Authorization is BEST characterized as:

A. Providing access to a resource according to the principle of least privilege
B. A user providing an identity and a password
C. Authenticating a user’s identity with a password
D. Certifying a user’s authority

A

A. Providing access to a resource according to the principle of least privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A bottom-up approach to the development of organizational policies is driven by:

A. A review of corporate goals and objectives.
B. A structured approach that maps policy objectives to corporate strategy.
C. A risk assessment of asset vulnerabilities.
D. A business impact analysis of known threats.

A

C. A risk assessment of asset vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A company is backing up its transactional database to an offsite location. Which of the following is the MOST important issue if the backups are not kept up-to-date and fully synchronized with the live transaction- processing databases?

A. The capability of the primary data to survive disruptive events without losing accuracy
B. The capability of the primary data to survive disruptive events without losing completeness
C. The capability of the primary data to survive disruptive events without losing availability
D. The capability of the primary data to survive disruptive events without losing confidentiality

A

B. The capability of the primary data to survive disruptive events without losing completeness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Critical real-time data such as that associated with transaction processing requires special backup procedures. Which of the following is recommended for backing up transaction- processing files?

A. Duplicate logging of transactions
B. Time stamping of transactions and communications data
C. Use of before-and-after images of master records
D. All of the above

A

D. All of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

“Dangling tuples” within a database represent a breach in which of the following?

A. Attribute integrity
B. Referential integrity
C. Relational integrity
D. Interface integrity

A

B. Referential integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data classification must begin with:

A. Determining specific data sensitivity according to organizational and legal requirements for data confidentiality and integrity
B. Determining data ownership
C. A review of organizational security policies
D. A review of logical access controls

A

B. Determining data ownership

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data mining is a technique that BEST detects which of the following?

A. Fraudulent transactions
B. Password compromise
C. Malicious network traffic
D. Malicious code

A

A. Fraudulent transactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly