Exam Questions Flashcards
One reason why IT auditing evolved from traditional auditing was that:
A. Auditors realized that computers had impacted their ability to perform the attestation function.
B. Computers and information processing were not a key resource.
C. Professional Associations such as AICPA and ISACA did not recognize the need.
D. Government did not recognize the need.
A. Auditors realized that computers had impacted their ability to perform the attestation function.
IT auditing may involve:
A. Organizational IT audits
B. Application IT audits
C. Development / implementation IT audits
D. All of the above.
D. All of the above
Breadth and depth of knowledge required to audit IT and systems are extensive and may include:
A. Application of risk-oriented audit approaches
B. Reporting to management and performing follow-up review to insure action taken
C. Assessment of security and privacy issues that can put the organization at risk
D. All of the above
D. All of the above
COBIT stands for:
A. A computer language
B. A derafel agency
C. Control Objective for Information and Related Technology
D. None of the above
C. Control Objective for Information and Related Technology.
ISACA stands for:
A. Information Systems Security Association
B. Institute of Internal Auditors.
C. Information Systems Audit and Control Association.
D. International Association for Computer Educators.
C. Information Systems Audit and Control Association
ISO is:
A. A government organization
B. A private company
C. International Organization for Standardization
D. None of the above
C. International Organization for Standardization
Federal government plan for improving security on the Internet is called:
A. FIP 102 Computer Security and Accreditation
B. National Strategy for Securing Cyberspace
C. Computer Abuse Act of 1984
D. Privacy Act of 1974
B. National Strategy for Securing Cyberspace
Sarbanes-Oxley Act of 2002:
A. Does not affect the attestation function
B. Applies only to the Big Four accounting firms
C. Requires auditor rotation
D. Does not apply to small accounting / audit firms
C. Requires auditor rotation.
Which is the most recent federal law that addresses computer security or privacy?
A. Computer Fraud and Abuse Act
B. Computer Security Act
C. Homeland Security Act
D. Electronic Communications Privacy Act
C. Homeland Security Act.
Which act has a provision where punishment can be up to life in prison if electronic hackers are found guilty of causing death to others through their actions/
A. Computer Fraud and Abuse Act
B. Freedom of Information Act
C. Communications DeenDcey Ac
D. Homeland Security Act
D. Homeland Security Act.
According to a recent CSI and FBI study:
A. 90 percent of respondents have detected computer security breaches within the last 12 months
B. 74 percent cited their Internet connection as the frequent point of attack
C. 80 percent acknowledged financial losses due to computer security breaches
D. All of the above
D. All of the above
Cyber law is:
A. State law
B. Federal law
C. Law governing use of the computer and the internet
D. International law
C. Law governing use of the computer and the internet
Software piracy costs the computer industry more than
A. $1 billion per year
B. $4 billion per year
C. $9 billion per year
D. More than $10 billion per year
D. More than $10 billion per year
CFAA covers:
A. Fraudulent trespass
B. Intentional destructive trespass
C. Reckless destructive trespass
D. All of the above
D. All of the above
Sarbanes-Oxley Act requires that the board of an organization must:
A. Register public accounting firms
B. Establish or adopt, by rule, auditing, quality control, ethics, independence, and other standards related to preparation of the audit report for issuers
C. Conduct inspections of accounting firms
D. All of the above
D. All of the above
Cyber Security Enhancement Act as incorporated into the Homeland Security Act of 2002.
A. Demands life sentences for those hackers who recklessly endanger lives
B. Does not require ISPs to hand over records
C. Does not outlaw publications such as details of PGP
D. None of the above
A. Demands life sentences for those hackers who recklessly endanger lives
Key areas to look at in IT contracts are:
A. Vendor contract terms that limit vendor liability
B. Contract objectives and performance measurements to ensure objectives have been met
C. Review and inclusion in future contracts specific clauses for protecting customer interests
D. All of the above.
D. All of the above.
A federal agency that protects consumers and has increased its monitoring and review of the Internet for customer and identity theft is the:
A. NSA
B. CIA
C. FTC
D. None of the above
C. FTC
National Strategy for Securing Cyberspace:
A. Applies only to defense area
B. Applies only to medical records
C. Provides a framework for protecting the nation’s infrastructures that is essential to the economy, security, and the way of life
D. None of the above
C. Provides a framework for protecting the nation’s infrastructures that is essential to the economy, security, and the way of life
Which act is the first ever federal privacy standard to protect patients’ medical records
A. Encrypted Communications Privacy Act of 1966
B. Privacy Act of 1974
C. HIPAA of 1996
D. All of the above
C. HIPAA of 1996
Which of the following is not one of the 10 top reasons for the start up of IT audit?
A. Auditing around the computer was becoming unsatisfactory for the purposes of database reliance
B. Accessibility of personal computers for office and home use
C. Very little advancement in technology
D. Growth of corporate hackers
C. Very little advancement in technology
Professional associations that have Standards of Practice:
A. IIA
B. ISACA
C. AICPA
D. All of the above
D. All of the above
A federal agency that develops and issues government auditing standards is:
A. GSA
B. GAO
C. Federal Bureau of Investigation (FBI)
D. Federal Trade Commission (FTC)
B. GAO
A special condition where an auditor must be free of any bias or influence, and have
A. IT skills
B. Good writing skills
C. Professional development
D. Independence
D. Independence.
I’m not sure of the context of this question, it will be interesting to actually see if it’s on the exam.
Which federal law was developed and passed by the U.S. lawmakers in reaction to recent financial frauds such as Enron?
A. FCPA
B. SEC Act
C. Sarbanes-Oxley Act
D. Computer Fraud and Abuse Act
C. Sarbanes-Oxley Act
In the author’s opinion, an auditor must have:
A. High ethical standards
B. Limited training
C. Poor communication skills
D. Poor time management skills
A. High ethical standards
GAAS was developed and issued by:
A. NIST
B. AICPA
C. FTC
D. NSA
B. AICPA
Certifications that may be helpful to an IT auditor are:
A. CIA
B. CFE
C. CISSP
D. All of the above
D. All of the above
An auditor who works for IBM directly and is on its audit staff is considered to be:
A. An external auditor
B. An internal auditor
C. A consultant
D. None of the above
B. An internal auditor
Computer forensic specialists are experts who:
A. Investigate under extreme secrecy so that other individuals do not know exactly what they are doing or what information they have gathered
B. May testify in court where an independent opinion is needed on complex technical issues
C. Have an extensive background working with computers and dealing with technical issues and are, of course, familiar with gathered information and the methods used to acquire that information
D. All of the above
D. All of the above
Which audit area involves definition of audit scope, initial contacts and communication with auditees, and audit team selection?
A. Fact gathering
B. Audit tests
C. Audit preparation
D. Audit objectives
C. Audit preparation
Which audit area involves a formal plan for reviewing and testing each significant audit subject area disclosed during fact gathering?
A. Audit objectives
B. Audit program
C. Audit tests
D. Use of audit tools
C. Audit tests
Which IT audit area involves formal statements that describe a course of action that should be implemented to restore or provide accuracy, efficiency, or adequate control of an audit subject?
A. Audit tests
B. Findings of the audit reports
C. Recommendations of an audit report
D. Conclusion of an audit report
D. Conclusion of an audit report
At the minimum, an audit plan should include all but:
A. Definition of scope
B. Objectives stated
C. An orderly, structured approach
D. A lack of flexibility in approach
D. A lack of flexibility in approach
Activities of a preliminary review may include:
A. General data gathering
B. Identifying financial application areas
C. Preparing the audit plan
B. All of the above
B. Identifying financial application areas
The first step in conducting fieldwork and implementing audit methodology is:
A. Design audit procedures
B. Define audit objectives
C. Evaluate results
D. Build a detailed understanding of the area being audited
B. Define audit objectives
Purpose of follow up is to:
A. Determine if the audit recommendations have been implemented
B. Determine the progress made in implementing the audit recommendations
C. Assess any potential savings / value added as a result of the recommendations
D. All of the above
D. All of the above
The advantage of tying the audit universe to organization objectives is that:
A. Links the entire audit process to business objectives
B. Improves management’s understanding of the audit process
C. Develops the communication plan for the audit
D. None of the above
A. Links the entire audit process to business objectives
Audit risk assessment is an important step in the audit process because:
A. It leverages the abilities of the audit staff by minimizing redundant activity
B. It provides a framework for communicating audit results
C. It provides a framework for allocating audit resources to achieve maximum benefit
D. None of the above
C. It provides a framework for allocating audit resources to achieve maximum benefit
Auditing is a cyclical process because
A. Performing audit tests is an iterative process
B. Audit results are used in subsequent risk assessments
C. The audit universe is aligned to the business cycle
D. All of the above
B. Audit results are used in subsequent risk assessments
Audit productivity tools can be used in:
A. Planning and tracking
B. Documentation and presentations
C. Communications and data transfer
D. All of the above
D. All of the above
Generalized audit software can:
A. Validate calculations
B. Select specific records for examination
C. Analyze and compare files
D. All of the above
D. All of the above
The task of examining a spreadsheet for reasonableness checks and comparison with known outputs is:
A. Documentation
B. Extent of training
C. Verification of logic
D. Support commitment
C. Verification of logic
Which is not a database integrity control?
A. Value constraints
B. Biometrics
C. Backup and recovery protection
D. Referential integrity
B. Biometrics
A testing approach used to validate processing by setting up a fictitious company or branch in an application for testing transaction processing is called
A. Snapshot
B. SARF
C. Integrated test facility
D. Transaction tagging
C. Integrated test facility
WHY? I’m not sure of this answer - google it
A technique used to follow a selected transaction through the entire application to verify the integrity, validity, and reliability is called:
A. Snapshot
B. Transaction tagging
C. SCARF
D. Test data
B. Transaction tagging
Which of the following are categories of computer audit functions?
A. Items of audit interest.
B. Data analysis
C. Systems validation
D. All of the above
D. All of the above
Histogram analysis technique allows the auditor to:
A. Apply judgment in identifying and selecting appropriate testing techniques
B. Validate transmission of data
C. Prepare the audit plan
D. All of the above.
A. Apply judgment in identifying and selecting appropriate testing techniques
Which automated technique can apply a sampling methodology to the collection of transaction or records?
A. Test data
B. Snapshot
C. SARF
D. None of the above
C. SARF
Computer forensic tools are increasingly used to:
A. Support law enforcement
B. Support computer security investigations
C. Support computer audit investigations
D. All of the above
D. All of the above
Some of the following elements should be included in a career development plan:
A. Career path planning with management support
B. Definition of knowledge, skills, and abilities
C. Performance assessment and counseling
D. All of the above
D. All of the above
Which professional certification can be helpful to an IT auditor’s career?
A. CISA
B. CISSP
C. CPA
D. All of the above
D. All of the above
Which IT audit area involves audit selection, definition of audit scope, initial contacts and communication with auditees and audit team selection?
A. Fact gathering
B. Audit tests
C. Audit preparation
D. Audit objectives
C. Audit preparation
Which IT audit area involves a formal plan for reviewing and testing each significant audit subject area disclosed during the fact gathering?
A. Audit objectives
B. Audit program
C. Audit tests
D. Use of audit tools
B. Audit program
Which IT audit area involves formal statements that describe a course of action that should be implemented to restore or provide accuracy, efficiency, or adequate control of an audit subject?
A. Audit status
B. Finding on an audit report
C. Recommendations of an audit report
D. Conclusion of an audit report
C. Recommendations of an audit report
IT audit assessment is very important and, at a minimum, consists of reviewing:
A. Completeness of the audit
B. Pertinence of the information presented
C. Accuracy of the audit work and supporting work papers
D. All of the above
D. All of the above
Some of the areas that one can assess for the IT auditor’s individual performance are:
A. Communication skills
B. Judgment
C. Auditing knowledge
D. All of the above
D. All of the above
Why is it important to learn about best practices?
A. Efficiency
B. Add value to client/auditee or organization
C. Advancement in technology
D. All of the above
D. All of the above.
“A” is the best practice that consists of a document that sets the tone or course of action you plan to take with your client / auditee:
A. Benchmarking
B. Planning memo
C. Risk analysis
D. None of the above
B. Planning memo
Reason for risk analysis are:
A. Loss or corruption of information and IS assets
B. Impaired and ineffective management decision making
C. Disruption to customer service or other critical operations
D. All of the above
D. All of the above
IT auditing involves:
A. People
B. Technology
C. Operations and systems
D. All of the above
D. All of the above
COBIT was developed and issued by
A. AICPA
B. IIA
C. ISACA
D. ACFE
C. ISACA
SAC reports were issued by
A. IIA
B. ISSA
C. ISACA
D. AICPA
A. IIA
Information assurance is defined as
A. Information integrity
B. Level of confidence and trust that can be placed on the information
C. Level of trust and confidence that can be placed on service availability
D. All of the above
D. All of the above
Which of the following US federal act has pledged almost a billion dollars toward curriculum, research, and skill development in IT audit, control, security, and information assurances issues:
A. Computer Fraud and Abuse Act of 1984
B. Computer Security Act of 1987
C. Cyber Security Research and Development Act
D. HIPAA Act of 1996
C. Cyber Security Research and Development Act
Which organization operating under U.S. national authority and its initiatives provides the foundation for a dramatic increase in the population of trained and professionalized security experts?
A. AICPA
B. ISACA
C. NIETP
D. None of the above
C. NIETP
Standards for information security officers have been issued by
A. CIA
B. FPI
C. GAO
D. NSTISSC
D. NSTISSC
A new field of opportunity and career growth is
A. Business systems analyst
B. Computer forensic analyst
C. Network administrator
D. None of the above
B. Computer forensic analyst
The number of universities within the United States identified as centers of excellence in information assurances is:
A. 10
B. 25
C. 40
D. Greater than 49
D. Greater than 49
An IT auditor’s role in IT governance can be as
A. A counselor
B. A partner of senior management
C. An educator
D. All of the above
D. All of the above
IT governance is
A. A process by which an enterprise’s IT is directed and controlled
B. An evaluation of computers and information processing not as key resources
C. Management that is only involved in making decisions
D. User dominance in IT decision making
A. A process by which an enterprise’s IT is directed and controlled
IT governance is controlled through a series of processes and procedures that:
A. Determine how investments are managed
B. Identify who can make decisions
C. Determine how results are measured
D. None of the above
D. None of the above
For IT to be an effective partner in organizational decision making, the CIO must
A. Offer proactive solutions to organizational needs
B. Get agreement on the measures of IT performance
C. Regularly attend board meetings
D. None of the above
A. Offer proactive solutions to organizational needs
Which of the following is not a main reason for ERM functions being established within organizations?
A. Increasing software patches
B. Magnitude of problem
C. Increasing business risks
D. Organizational oversight
A. Increasing software patches
Compliance with laws and regulations is a key business risk because of
A. Controls outlined in COBIT
B. Impact on security of an organization
C. Sheer number of laws and regulations
D. Automation of financial processes
C. Sheer number of laws and regulations
Continuous auditing is a technique used to
A. Create a sample of production data to test controls
B. Detect and report on control breakdowns as they occur
C. Provide a tool for business users to manage IT
D. All of the above
B. Detect and report on control breakdowns as they occur
Measuring IT performance is dependent on
A. Delivering successful projects
B. Keeping operations running
C. Reducing operating costs
D. Strategy and objectives of the organization
D. Strategy and objectives of the organization
Developing a successful measurement process requires
A. Alignment between IT organization objectives
B. Mature measurement processes
C. Support from IT and organizational management
D. Automated measurement tools to report accurate metrics
C. Support from IT and organizational management
A successful measurement process includes all of the following, except
A. Ownership of the measurement process from the area to be measured
B. Measure the effective use of resources and alignment with business objectives
C. Measurement of events and processes rather than individuals
D. Measurement must be meaningful, reliable, and accurately represent the area measured
B. Measure the effective use of resources and alignment with business objectives
IT governance requires management action taken at all levels to
A. Decrease the probability of carelessness
B. Reduce outside threat and the probability of hostile penetration
C. Decrease fraud and corruption within the organization
D. All of the above
D. All of the above