Practice Exam 1 Flashcards
- Which of the following is the MOST important consideration when defining recovery point objectives (RPOs)?
A. Minimum operating requirements
B. Acceptable data loss
C. Mean time between failures
D. Acceptable time for recovery
B. Recovery point objectives (RPOs) are the level of data loss/reworking an organization is willing to accept.
- An information systems (IS) auditor reviewing a cloud computing environment that is managed by a third party should be MOST concerned when:
A. The enterprise is not permitted to assess the controls in the participating vendor’s site.
B. The service level agreement (SLA) does not address the responsibility of the vendor in the case of a security breach.
C. Laws and regulations are different in the countries of the enterprise and the vendor.
D. The enterprise is using an older version of a browser and is vulnerable to certain types of security risk.
B. Administration of cloud computing occurs over the Internet and involves more than one participating entity. It is the responsibility of each of the partners in the cloud computing environment to take care of security issues in their own environments. When there is a security breach, the party responsible for the breach should be identified and made accountable. This is not possible if the service level agreement (SLA) does not address the responsibilities of the partners during a security breach.
- Which of the following preventive controls BEST helps secure a web application?
A. Password masking
B. Developer training
C. Use of encryption
D. Vulnerability testing
B. Of the given choices, teaching developers to write secure code is the best way to secure a web application.
- The information systems (IS) auditor is reviewing the implementation of a storage area network (SAN). The SAN administrator indicates that logging and monitoring is active, hard zoning is used to isolate data belonging to different business units and all unused SAN ports are disabled. The administrator implemented the system, performed and documented security testing during implementation and is the only user with administrative rights to the system. What should the IS auditor’s initial determination be?
A. There is no significant potential risk.
B. Soft zoning presents a potential risk.
C. Disabling unused ports presents a potential risk.
D. The SAN administrator presents a potential risk.
D. The potential risk in this scenario is posed by the SAN administrator. One concern is having a single point of failure. Because only one administrator has the knowledge and access required to administer the system, the enterprise is susceptible to risk. For example, if the SAN administrator decided to quit unexpectedly or was otherwise unavailable, the enterprise may not be able to adequately administer the SAN. In addition, having a single administrator for a large, complex system, such as a SAN, also presents a separation of duties risk. The enterprise currently relies entirely on the SAN administrator to implement, maintain and validate all security controls; this means that the SAN administrator can modify or remove those controls without detection.
- Which of the following processes should an information systems (IS) auditor recommend to assist in the recording of baselines for software releases?
A. User acceptance testing (UAT)
B. Backup and recovery
C. Incident management
D. Configuration management
D. The configuration management process may include automated tools that provide an automated recording of software release baselines. If the new release fails, the baseline will provide a point to which to return.
- Corrective action has been taken by an auditee immediately after the identification of a reportable finding. The information systems (IS) auditor should:
A. include the finding in the final report because the IS auditor is responsible for an accurate report of all findings.
B. not include the finding in the final report because management resolved the item.
C. not include the finding in the final report because corrective action can be verified by the IS auditor during the audit.
D. include the finding in the closing meeting for discussion purposes only.
A. Including the finding in the final report is a generally accepted audit practice. If an action is taken after the audit started and before it ended, the audit report should identify the finding and describe the corrective action taken. An audit report should reflect the situation, as it existed at the start of the audit. All corrective actions taken by the auditee should be reported in writing.
- If inadequate, which of the following is the MOST likely contributor (DoS) attack?
A. Router configuration and rules
B. Design of the internal network
C. Updates to the router system software
D. Audit testing and review techniques
A. Improper router configuration and rules can lead to denial-of-service (DoS) attacks.
- An information systems (IS) auditor discovers several IT-based projects were implemented and not approved by the steering committee. What is the GREATEST concern for the IS auditor?
A. The IT department’s projects will not be adequately funded.
B. IT projects are not following the system development life cycle (SDLC) process.
C. IT projects are not consistently formally approved.
D. The IT department may not be working toward a common goal.
D. The steering committee provides direction and control over projects to ensure that the enterprise is making appropriate investments. Without approval, the project may or may not be working toward the enterprise goals.
- The PRIMARY objective of performing a postincident review is that it presents an opportunity to:
A. improve the internal control process.
B. harden the network to industry good practices.
C. highlight the importance of incident response management to management.
D. improve employee awareness of the incident response process.
A. A postincident review examines the cause and response to an incident. The lessons
learned from the review can be used to improve internal controls. Understanding the purpose and structure of postincident reviews and follow-up procedures enables the information security manager to continuously improve the security program.
Improving the incident response plan based on the incident review is an internal (corrective) control.
- Which of the following does a lack of adequate controls represent?
A. An impact
B. A vulnerability
C. An asset
D. A threat
B. The lack of adequate controls represents a vulnerability, exposing sensitive information and data to the risk of malicious damage, attack or unauthorized access by hackers, employee error, environmental threat, or equipment failure. This can result in a loss of sensitive information, financial loss, legal penalties or other losses.
- Which of the following would be a MAJOR concern for an information systems (IS) auditor reviewing a business continuity plan (BCP)?
A. The plan is approved by the chief information officer.
B. The plan contact lists have not been updated.
C. Test results are not adequately documented.
D. The training schedule for recovery personnel is not included.
C. The effectiveness of a BCP can best be determined through tests. If results of tests are not documented, then there is no basis for feedback, updates, etc.
- Which of the following types of testing determines whether a new or modified system can operate in its target environment without adversely impacting other existing systems?
A. Parallel testing
B. Pilot testing
C. Interface/integration testing
D. Sociability testing
D. The purpose of sociability testing is to confirm that a new or modified system can operate in its target environment without adversely impacting existing systems. This should cover the platform that will perform primary application processing and interfaces with other systems, and changes to the desktop in a client-server or web development.
- An information systems (IS) auditor performing a review of a major software development project finds that it is on schedule and under budget even though the software developers have worked considerable amounts of unplanned overtime. The IS auditor should:
A. conclude that the project is progressing as planned because dates are being met.
B. question the project manager further to identify whether overtime costs are being tracked accurately.
C. conclude that the programmers are intentionally working slowly to earn extra overtime pay.
D. investigate further to determine whether the project plan may not be accurate.
D. Although the dates on which key projects are completed are important, there may be issues with the project plan if an extraordinary amount of unplanned overtime is required to meet those dates. In most cases, the project plan is based on a certain number of hours, and requiring programmers to work considerable overtime is not a good practice. Although overtime costs may be an indicator that something is wrong with the plan, in many organizations, the programming staff may be salaried, so overtime costs may not be directly recorded.
- Which of the following distinguishes a business impact analysis (BIA) from a risk assessment?
A. Inventory of critical assets
B. Identification of vulnerabilities
C. Listing of threats
D. Determination of acceptable downtime
D. A determination of acceptable downtime is made only in a BIA.
- From an IT governance perspective, what is the PRIMARY responsibility of the board of directors? To ensure that the IT strategy:
A. is cost-effective.
B. is forward thinking and innovative.
C. is aligned with the business strategy.
D. has the appropriate priority level assigned.
C. The board of directors is responsible for ensuring that the IT strategy is aligned with the business strategy.
- Which of the following is the BEST audit procedure to determine if a firewall is configured in compliance with the enterprise security policy?
A. Review the parameter settings.
B. Interview the firewall administrator.
C. Review the actual procedures.
D. Review the device’s log file for recent attacks.
A. A review of the parameter settings provides a good basis for comparison of the actual configuration to the security policy and provides audit evidence documentation.
- An information systems (IS) auditor of a health care organization is reviewing contractual terms and conditions of a third-party cloud provider being considered to host patient health information. Which of the following contractual terms is the GREATEST risk to the customer organization?
A. Data ownership is retained by the customer organization.
B. The third-party provider reserves the right to access data to perform certain operations.
C. Bulk data withdrawal mechanisms are undefined.
D. The customer organization is responsible for backup, archiving and restoration.
B. Organizations must review the regulatory environment in which the cloud provider operates because it may have requirements or restrictions of its own. Some service providers reserve the right to access customer information (third-party access) to perform certain transactions and provide certain services. In the case of protected health information, regulations may restrict certain access. Organizations must then determine whether the cloud provider provides appropriate controls to ensure data security.
- Which of the following is of GREATEST concern to an information systems (IS) auditor when performing an audit of a client relationship management system migration project?
A. The technical migration is planned for a Friday preceding a long weekend, and the time window is too short for completing all tasks.
B. Employees pilot testing the system are concerned that the data representation in the new system is completely different from the old system.
C. A single implementation is planned, immediately decommissioning the legacy system.
D. Five weeks prior to the target date, there are still numerous defects in the printing functionality of the new system’s software.
C. Major system migrations should include a phase of parallel operation or a phased cutover to reduce implementation risk. Decommissioning or disposing of the old hardware would complicate any fallback strategy if the new system does not operate correctly.
- Which of the following types of transmission media provide the BEST security against unauthorized access?
A. Copper wire
B. Shielded twisted pair
C. Fiber-optic cables
D. Coaxial cables
C. Fiber-optic cables have proven to be more secure and more difficult to tap than the other media.
- Enterprise governance of IT frameworks has been developed MAINLY to help an organization’s leaders:
A. use resources responsibly and manage information systems risk.
B. realize benefits and manage the performance of practices and processes.
C. deliver value to stakeholders and preserve the value created.
D. establish accountability and manage information security risk.
C. Enterprise governance of IT frameworks help an organization’s leaders to deliver value to stakeholders by using resources responsibly, realizing value delivered, establishing roles and responsibilities, preserving value through information risk management, and maintaining the required levels of performance.
- An organization is implementing an enterprise resource planning (ERP) application. Of the following, who is PRIMARILY responsible for overseeing the project to ensure that it is progressing in accordance with the project plan and that it will deliver the expected results?
A. Project sponsor
B. System development project team
C. Project steering committee
D. User project team
C. A project steering committee that provides an overall direction for the enterprise resource planning (ERP) implementation project is responsible for reviewing the project’s progress to ensure that it will deliver the expected results.
- An information systems (IS) auditor is assigned to review an organization’s information security policy. Which of the following issues represents the HIGHEST potential risk?
A. The policy has not been updated in more than one year.
B. The policy includes no revision history.
C. The policy is approved by the security administrator.
D. The organization does not have an information security policy committee.
C. The information security policy should have an owner who has management responsibility for the development, review, approval and evaluation of the security policy. The position of security administrator is typically a staff-level position (not management), and therefore does not have the authority to approve the policy. In addition, an individual in a more independent position should also review the policy. Without proper management approval, enforcing the policy may be problematic, leading to compliance or security issues.
- Which of the following is MOST critical for the successful implementation and maintenance of a security policy?
A. Assimilation of the framework and intent of a written security policy by all appropriate parties
B. Management support and approval for the implementation and maintenance of a security policy
C. Enforcement of security rules by providing punitive actions for any violation of security rules
D. Stringent implementation, monitoring and enforcing of rules by the security officer through access control software
A. Assimilation of the framework and intent of a written security policy by all levels of management and users of the system are critical to the successful implementation and maintenance of the security policy. If a policy is not assimilated into daily actions, it will not be effective.
- Which of the following is the MOST important skill that an information systems (IS) auditor should develop to understand the constraints of conducting an audit?
A. Managing audit staff
B. Allocating resources
C. Project management
D. Attention to detail
C. Audits often involve resource management, deliverables, scheduling and deadlines that are similar to project management good practices.
- Which of the following processes will be MOST effective in reducing the risk that unauthorized software on a backup server is distributed to the production server?
A. Manually copy files to accomplish replication.
B. Review changes in the software version control system.
C. Ensure that developers do not have access to the backup server.
D. Review the access control log of the backup server.
B. It is common practice for software changes to be tracked and controlled using version control software. An information systems (IS) auditor should review reports or logs from this system to identify the software that is promoted to production. Only moving the versions on the version control system program will prevent the transfer of development or earlier versions.
- The final decision to include a material finding in an audit report should be made by the:
A. audit committee.
B. auditee’s manager.
C. information systems (IS) auditor.
D. chief executive officer.
C. The IS auditor should make the final decision about what to include or exclude from the audit report.
- Which of the following tasks should be performed FIRST when preparing a disaster recovery plan (DRP)?
A. Develop a recovery strategy.
B. Perform a business impact analysis (BIA).
C. Map software systems, hardware and network components.
D. Appoint recovery teams with defined personnel, roles and hierarchy.
B. The first step in any disaster recovery plan (DRP) is to perform a BIA.
- Which of the following should an information systems (IS) auditor recommend to BEST
enforce alignment of an IT project portfolio with strategic organizational priorities?
A. Define a balanced scorecard (BSC) for measuring performance.
B. Consider user satisfaction in the key performance indicators (KPIs).
C. Select projects according to business benefits and risk.
D. Modify the yearly process of defining the project portfolio.
C. Prioritization of projects on the basis of their expected benefit(s) to business, and the related risk, is the best measure for achieving alignment of the project portfolio to an organization’s strategic priorities.
- Which of the following is an implementation risk within the process of decision support systems (DSSs)?
A. Management control
B. Semi-structured dimensions
C. Inability to specify purpose and usage patterns
D. Changes in decision processes
C. The inability to specify purpose and usage patterns is a risk that developers need to anticipate while implementing a DSS.
- An information systems (IS) auditor wants to analyze audit trails on critical servers to discover potential anomalies in user or system behavior. Which of the following is the MOST suitable for performing that task?
A. Computer-aided software engineering tools
B. Embedded data collection tools
C. Trend/variance detection tools
D. Heuristic scanning tools
C. Trend/variance detection tools look for anomalies in user or system behavior, such as invoices with increasing invoice numbers.