Review 2 Flashcards

1
Q

The cost of ongoing operations when a disaster recovery plan (DRP) is in place, compared to not having a DRP, will MOST likely:

A) increase.
B) decrease.
C) remain the same.
D) be unpredictable.

A

Answer: A) increase.

Increase is correct. Due to the additional cost of testing, maintaining and implementing disaster recovery plan (DRP) measures, the cost of normal operations for any organization will always increase after a DRP implementation (i.e., the cost of normal operations during a nondisaster period will be more than the cost of operations during a nondisaster period when no DRP was in place).

Decrease is incorrect. The implementation of a DRP will always result in additional costs to the organization.

Remain the same is incorrect. The implementation of a DRP will always result in additional costs to the organization.

Be unpredictable is incorrect. The costs of a DRP are fairly predictable and consistent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An IS auditor evaluating logical access controls should FIRST:

A) document the controls applied to the potential access paths to the system.
B) test controls over the access paths to determine if they are functional.
C) evaluate the security environment in relation to written policies and practices.
D) obtain an understanding of the security risk to information processing.

A

Answer: D) obtain an understanding of the security risk to information processing.

Obtain an understanding of the security risk to information processing is correct. When evaluating logical access controls, an IS auditor should first obtain an understanding of the security risk facing information processing by reviewing relevant documentation, by inquiries, and conducting a risk assessment. This is necessary so that the IS auditor can ensure the controls are adequate to address risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An organization completed a business impact analysis as part of business continuity planning. The NEXT step in the process is to develop:

A) a business continuity strategy.
B) a test and exercise plan.
C) a user training program.
D) the business continuity plan.

A

Answer: A) a business continuity strategy.

A business continuity strategy is correct. This is the next phase because it identifies the best way to recover. The criticality of the business process, the cost, the time required to recover, and security must be considered during this phase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

While auditing a third-party IT service provider, an IS auditor discovered that access reviews were not being performed as required by the contract. The IS auditor should:

A) report the issue to IT management.
B) discuss the issue with the service provider.
C) perform a risk assessment.
D) perform an access review.

A

Answer: A) report the issue to IT management

Report the issue to IT management is correct. During an audit, if there are material issues that are of concern, they need to be reported to management in the audit report.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

As part of the business continuity planning process, which of the following should be identified FIRST in the business impact analysis?

A) Risk such as single point-of-failure and infrastructure risk
B) Threats to critical business processes
C) Critical business processes for ascertaining the priority for recovery
D) Resources required for resumption of business

A

Answer: C) Critical business processes for ascertaining the priority for recovery.

Critical business processes for ascertaining the priority for recovery is correct. The identification of critical business processes should be addressed first so that the priorities and time lines for recovery can be documented.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following sampling methods would be the MOST effective to determine whether purchase orders issued to vendors have been authorized as per the authorization matrix?

A) Variable sampling
B) Stratified mean per unit
C) Attribute sampling
D) Unstratified mean per unit

A

Answer: C) Attribute sampling

Attribute sampling is correct. This is the method used for compliance testing. In this scenario, the operation of a control is being evaluated, and therefore, the attribute of whether each purchase order was correctly authorized would be used to determine compliance with the control.

Variable sampling is incorrect. This is the method used for substantive testing, which involves testing transactions for quantitative aspects such as monetary values.

Stratified mean per unit is incorrect. This is used in variable sampling.

Unstratified mean per unit is incorrect. This is used in variable sampling.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An IS auditor wants to analyze audit trails on critical servers to discover potential anomalies in user or system behavior. Which of the following is the MOST suitable for performing that task?

A. Computer-aided software engineering tools
B. Embedded data collection tools
C. Trend/variance detection tools
D. Heuristic scanning tools

A

C. Trend/variance detection tools are

correct. They look for anomalies in user or system behavior, such as invoices with increasing invoice numbers.

Computer-aided software engineering tools is incorrect. These are used to assist in software development.

Embedded data collection tools is incorrect. Embedded (audit) data collection software, such as systems control audit review file or systems audit review file, is used to provide sampling and production statistics, but not to conduct an audit log analysis.

Heuristic scanning tools is incorrect. These are a type of virus scanning used to indicate possible infected traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

While reviewing a quality management system, the IS auditor should PRIMARILY focus on collecting evidence to show that:

A. quality management systems comply with good practices.
B. continuous improvement targets are being monitored.
C. standard operating procedures of IT are updated annually.
D. key performance indicators are defined.

A

B. Continuous improvement targets are being monitored is correct. Continuous and measurable improvement of quality is the primary requirement to achieve the business objective for the quality management system (QMS).

Quality management systems comply with good practices is incorrect. Generally, good practices are adopted according to business requirements. Therefore, conforming to good practices may or may not be a requirement of the business.

Standard operating procedures of it are updated annually is incorrect. Updating operating procedures is part of implementing the QMS; however, it must be part of change management and not an annual activity.

Key performance indicators are defined is incorrect. Key performance indicators may be defined in a QMS, but they are of little value if they are not being monitored.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

During an audit, the IS auditor discovers that the human resources (HR) department uses a cloud-based application to manage employee records. The HR department engaged in a contract outside of the normal vendor management process and manages the application on its own. Which of the following is of GREATEST concern?

A) Maximum acceptable downtime metrics have not been defined in the contract.
B) The IT department does not manage the relationship with the cloud vendor.
C) The help desk call center is in a different country, with different privacy requirements.
D) Organization-defined security policies are not applied to the cloud application.

A

?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An IS auditor is evaluating a newly developed IT policy for an organization. Which of the following factors does the IS auditor consider MOST important to facilitate compliance with the policy upon its implementation?

A) Existing IT mechanisms enabling compliance
B) Alignment of the policy to the business strategy
C) Current and future technology initiatives
D) Regulatory compliance objectives defined in the policy

A

A) Existing IT mechanisms enabling compliance is correct.

The organization should be able to comply with a policy when it is implemented. The most important consideration when evaluating the new policy should be the existing mechanisms in place that enable the organization and its employees to comply with the policy.

Alignment of the policy to the business strategy is incorrect. Policies should be aligned with the business strategy, but this does not affect an organization’s ability to comply with the policy upon implementation.

Current and future technology initiatives is incorrect. They should be driven by the needs of the business and would not affect an organization’s ability to comply with the policy.

Regulatory compliance objectives defined in the policy is incorrect. Regulatory compliance objectives may be defined in the IT policy, but that would not facilitate compliance with the policy. Defining objectives would only result in the organization knowing the desired state and would not aid in achieving compliance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following inputs adds the MOST value to the strategic IT initiative decision-making process?

A) The maturity of the project management process
B) The regulatory environment
C) Past audit findings
D) The IT project portfolio analysis.

A

The IT project portfolio analysis is correct.

Portfolio analysis provides the best input into the decision-making process relating to planning strategic IT initiatives. An analysis of the IT portfolio provides comparable information of planned initiatives, projects and ongoing IT services, which allows the IT strategy to be aligned with the business strategy.

The maturity of the project management process is incorrect. The maturity of the project management process is more important with respect to managing the day-to-day operations of IT versus performing strategic planning.

The regulatory environment is incorrect. Regulatory requirements may drive investment in certain technologies and initiatives; however, having to meet regulatory requirements is not typically the main focus of the IT and business strategy.

Past audit findings is incorrect. Past audit findings may drive investment in certain technologies and initiatives; however, having to remediate past audit findings is not the main focus of the IT and business strategy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following represents an example of a preventive control with respect to IT personnel?

A) A security guard stationed at the server room door
B) An intrusion detection system
C) Implementation of a badge entry system for the IT facility
D) A fire suppression system in the server room

A

C) Implementation of a badge entry system for the IT facility is correct.

Preventive controls are used to reduce the probability of an adverse event. A badge entry system prevents unauthorized entry to the facility.

A security guard stationed at the server room door is incorrect. A security guard stationed at the server room door is a deterrent control.

An intrusion detection system is incorrect. An intrusion detection system is a detective control.

A fire suppression system in the server room is incorrect. A fire suppression system is a corrective control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is the MOST important skill that an IS auditor should develop to understand the constraints of conducting an audit?

A) Managing audit staff
B) Allocating resources
C) Project management
D) Attention to detail

A

C) Project management is correct.

Audits often involve resource management, deliverables, scheduling and deadlines that are similar to project management good practices.

Managing audit staff is incorrect. This is not the only aspect of conducting an audit.

Allocating resources is incorrect. These resources, including time and personnel, are needed for overall project management skills.

Attention to detail is incorrect. This is needed, but it is not a constraint of conducting audits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Depending on the complexity of an organization’s business continuity plan (BCP), it may be developed as a set of plans to address various aspects of business continuity and disaster recovery. In such an environment, it is essential that:

A) each plan is consistent with one another.
B) all plans are integrated into a single plan.
C) each plan is dependent on one another.
D) the sequence for implementation of all plans is defined.

A

A) Each plan is consistent with one another is correct.

Depending on the complexity of an organization, there could be more than one plan to address various aspects of business continuity and disaster recovery, but the plans must be consistent to be effective.

All plans are integrated into a single plan is incorrect. The plans do not necessarily have to be integrated into one single plan.

Each plan is dependent on one another is incorrect. Although each plan may be independent, each plan has to be consistent with other plans to have a viable business continuity planning strategy.

The sequence for implementation of all plans is defined is incorrect. It may not be possible to define a sequence in which plans have to be implemented because it may be dependent on the nature of disaster, criticality, recovery time, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An IS auditor of a large organization is reviewing the roles and responsibilities of the IT function and finds some individuals serving multiple roles. Which one of the following combinations of roles should be of GREATEST concern for the IS auditor?

A) Network administrators are responsible for quality assurance.
B) System administrators are application programmers.
C) End users are security administrators for critical applications.
D) Systems analysts are database administrators.

A

C) System administrators are application programmers is correct.

When individuals serve multiple roles, this represents a separation-of-duties problem with associated risk. System administrators should not be application programmers, due to the associated rights of both functions. A person with both system and programming rights can do almost anything on a system, including creating a back door. The other combinations of roles are valid from a separation of duties perspective.

Network administrators are responsible for quality assurance is incorrect. Ideally, network administrators should not be responsible for quality assurance because they could approve their own work. However, that is not as serious as the combination of system administrator and application programmer, which would allow nearly unlimited abuse of privilege.

End users are security administrators for critical applications is incorrect. End users are security administrators for critical applications is incorrect. In some distributed environments, especially with small staffing levels, users may also manage security.

Systems analysts are database administrators is incorrect. While a database administrator is a very privileged position it would not be in conflict with the role of a systems analyst.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An IS auditor notes daily reconciliation of visitor access card inventory is not aligned with the organization’s procedures. Which of the following is the auditor’s BEST course of action?

A) Do not report the lack of reconciliation.
B) Recommend regular physical inventory counts.
C) Report the lack of daily reconciliations.
D) Recommend the implementation of a more secure access system.

A

C) Report the lack of daily reconciliations is correct.

The IS auditor should report the lack of daily reconciliation as an exception, because a physical inventory count gives assurance only at a point in time and the practice is not in compliance with management’s mandated activity.

Do not report the lack of reconciliation is incorrect. Absence of discrepancy in physical count only confirms absence of any impact but cannot be a reason to overlook failure of operation of the control. The issue should be reported because the control was not followed.

Recommend regular physical inventory counts is incorrect. While the IS auditor may in some cases recommend a change in procedures, the primary goal is to observe and report when the current process is deficient.

Recommend the implementation of a more secure access system is incorrect. While the IS auditor may in some cases recommend a more secure solution, the primary goal is to observe and report when the current process is deficient.

17
Q

An IS auditor is reviewing an IT security risk management program. Measures of security risk should:

A) address all of the network risk.
B) be tracked over time against the IT strategic plan.
C) consider the entire IT environment.
D) result in the identification of vulnerability tolerances.

A

C) Consider the entire IT environment is correct.

When assessing IT security risk, it is important to consider the entire IT environment.

Address all of the network risk is incorrect. Measures of security risk should not be limited to network risk, but rather focus on those areas with the highest criticality so as to achieve maximum risk reduction at the lowest possible cost.

Be tracked over time against the IT strategic plan is incorrect. IT strategic plans are not granular enough to provide appropriate measures. Objective metrics must be tracked over time against measurable goals; thus, the management of risk is enhanced by comparing today’s results against results from last week, last month and last quarter. Risk measures will profile assets on a network to objectively measure vulnerability risk.

Result in the identification of vulnerability tolerances is incorrect. Measures of security risk do not identify tolerances

18
Q

During a review of a business continuity plan, an IS auditor noticed that the point at which a situation is declared to be a crisis has not been defined. The MAJOR risk associated with this is that:

A) assessment of the situation may be delayed.
B) execution of the disaster recovery plan could be impacted.
C) notification of the teams might not occur.
D) potential crisis recognition might be delayed.

A

B) Execution of the disaster recovery plan could be impacted is correct.

Execution of the business continuity and disaster recovery plans would be impacted if the organization does not know when to declare a crisis.

Assessment of the situation may be delayed is incorrect. Problem and severity assessment would provide information necessary in declaring a disaster, but the lack of a crisis declaration point would not delay the assessment.

Notification of the teams might not occur is incorrect. After a potential crisis is recognized, the teams responsible for crisis management need to be notified. Delaying the declaration of a disaster would impact or negate the effect of having response teams, but this is only one part of the larger impact.

Potential crisis recognition might be delayed is incorrect. Potential crisis recognition is the first step in recognizing or responding to a disaster and would occur prior to the declaration of a disaster.

19
Q

While observing a full simulation of the business continuity plan, an IS auditor notices that the notification systems within the organizational facilities could be severely impacted by infrastructure damage. The BEST recommendation the IS auditor can provide to the organization is to ensure:

A) the salvage team is trained to use the notification system.
B) the notification system provides for the recovery of the backup.
C) redundancies are built into the notification system.
D) the notification systems are stored in a vault.

A

C) Redundancies are built into the notification system is correct.

If the notification system has been severely impacted by the damage, redundancy would be the best control.

The salvage team is trained to use the notification system is incorrect. The salvage team would not be able to use a severely damaged notification system, even if they are trained to use it.

The notification system provides for the recovery of the backup is incorrect. The recovery of the backups has no bearing on the notification system.

The notification systems are stored in a vault is incorrect. Storing the notification system in a vault would be of little value if the building is damaged.

20
Q

The PRIMARY purpose of an IT forensic audit is:

A) to participate in investigations related to corporate fraud.
B) the systematic collection and analysis of evidence after a system irregularity.
C) to assess the correctness of an organization’s financial statements.
D) to preserve evidence of criminal activity.

A

B) The systematic collection and analysis of evidence after a system irregularity is correct.

This best describes a forensic audit. The evidence collected can then be analyzed and used in judicial proceedings.

To participate in investigations related to corporate fraud is incorrect. Forensic audits are not limited to corporate fraud.

To assess the correctness of an organization’s financial statements is incorrect. Assessing the correctness of an organization’s financial statements is not the primary purpose of most forensic audits.

To preserve evidence of criminal activity is incorrect. Forensics is the investigation of evidence related to a crime or misbehavior. Preserving evidence is the forensic process, but not the primary purpose.

21
Q

Which of the following is the initial step in creating a firewall policy?

A) A cost-benefit analysis of methods for securing the applications
B) Identification of network applications to be externally accessed
C) Identification of vulnerabilities associated with network applications to be externally accessed
D) Creation of an application traffic matrix showing protection methods

A

B) Identification of network applications to be externally accessed is correct.

Identification of the applications required across the network should be the initial step. After identification, depending on the physical location of these applications in the network and the network model, the person in charge will be able to understand the need for, and possible methods of, controlling access to these applications.

A cost-benefit analysis of methods for securing the applications is incorrect. Identifying methods to protect against identified vulnerabilities and their comparative cost-benefit analysis is the third step.

Identification of vulnerabilities associated with network applications to be externally is incorrect. Having identified the externally accessed applications, the second step is to identify vulnerabilities (weaknesses) associated with the network applications.

Creation of an application traffic matrix showing protection methods is incorrect. The fourth step is to analyze the application traffic and create a matrix showing how each type of traffic will be protected.

22
Q

When reviewing the IT strategic planning process, an IS auditor should ensure that the plan:

A) incorporates state of the art technology.
B) addresses the required operational controls.
C) articulates the IT mission and vision.
D) specifies project management practices.

A

C) Articulates the IT mission and vision is correct.

The IT strategic plan must include a clear articulation of the IT mission and vision.

Incorporates state of the art technology is incorrect. The plan does not need to address state of the art technology; the decision to implement new technology is dependent on the approach to risk and management strategy.

Addresses the required operational controls is incorrect. The plan does not need to address operational controls because those are too granular for strategic planning.

Specifies project management practices is incorrect. The plan should be implemented with proper project management, but the plan does not need to address project management practices.

23
Q

Data flow diagrams are used by IS auditors to:

A) identify key controls.
B) highlight high-level data definitions.
C) graphically summarize data paths and storage.
D) portray step-by-step details of data generation.

A

C) Graphically summarize data paths and storage is correct.

Data flow diagrams are used as aids to graph or chart data flow and storage. They trace data from their origination to destination, highlighting the paths and storage of data.

Identify key controls is incorrect. This is not the focus of data flow diagrams. The focus is as the name states—flow of data.

Highlight high-level data definitions is incorrect. A data dictionary may be used to document data definitions, but the data flow diagram is used to document how data move through a process.

Portray step-by-step details of data generation is incorrect. The purpose of a data flow diagram is to track the movement of data through a process and is not primarily to document or indicate how data are generated.

24
Q

Which of the following BEST ensures the effectiveness of controls related to interest calculation for an accounting system?

A) Re-performance
B) Process walk-through
C) Observation
D) Documentation review

A

A) Re-performance is correct.

To ensure the effectiveness of controls, it is most effective to conduct re-performance. When the same result is obtained after the performance by an independent person, this provides the strongest assurance.

Process walk-through is incorrect. This may help the auditor understand the controls better; however, it may not be as useful as conducting re-performance for a sample of transactions.

Observation is incorrect. This is a valid audit method to verify that operators are using the system appropriately; however, conducting re-performance is a better method.

Documentation review is incorrect. This may be of some value for understanding the control environment; however, conducting re-performance is a better method.

25
Q

The audit charter should be approved by the highest level of management and should:

A. be updated often to upgrade with the changing nature of technology and the audit profession.
B. include audit calendar along with resource allocation.
C. include plan of action in case of disruption of business services.
D. outlines the overall authority, scope and responsibilities of the audit function.

A

D. outlines the overall authority, scope and responsibilities of the audit function.

Explanation:

(1) An audit charter should state management’s objectives for and delegation of authority to IS audit.
(2) Charter should not be significantly change over time. An audit charter outlines the overall authority, scope and responsibilities of the audit function. An audit charter would not be at a detailed level and therefore frequent updation is not required.
(3) Audit charter would not include detailed audit calendar and resource allocation.
(4) Action plan in case of disruption of services is included in BCP policy and not in Audit Charter.

26
Q

In a risk-based audit approach, an IS auditor, in addition to risk, would be influenced PRIMARILY by:

A. the audit charter.
B. management’s representation.
C. organizational structure
D. no. of outsourcing contracts.

A

Answer: A. the audit charter.

Explanation:
Auditor’s role and responsibility is documented in Audit Charter. The audit charter outlines the overall authority of Audit function. Hence primarily his actions will be influenced by Audit Charter.

27
Q

The authority, scope and responsibility of the Information System Audit function is:

A. Defined by the audit charter approved by the senior management/Board
B. Defined by the I.T. Head of the organization, as the expert in the matter
C. Defined by the various functional divisions, depending upon criticality
D. Generated by the Audit division of the organization

A

A. Defined by the audit charter approved by the senior management/Board

Explanation:
The authority, scope and responsibility of the Information system audit is invariably defined by the audit charter which is approved by the senior management and, most often, by the Board of Directors. It is not left to the Audit division, the IT Head or the functional heads to decide on this. Hence, answer at Option A alone is correct.

28
Q

Which of the following is the MOST critical function of a firewall?

A. to act as a special router that connects different network.
B. device for preventing authorized users from accessing the LAN.
C. device used to connect authorized users to trusted network resources.
D. proxy server to increase the speed of access to authorized users.

A

Answer: C. device used to connect authorized users to trusted network resources.

Explanation:
Main and critical function of a firewall is to prevent unauthorised access to server. A firewall is a set of related programs that protects the resources of a private network from users of other networks.

29
Q

An IS auditor is reviewing firewall security of the organization. Which of the following is the BEST audit procedure to determine if a firewall is configured as per security policy?

A. Review incident logs.
B. Review Access Control List.
C. Review the actual procedures.
D. Review the parameter settings.

A

Answer: D. Review the parameter settings.

Explanation:
A review of the parameter settings will provide a good basis for comparison of the actual
configuration to the security policy and will provide audit evidence documentation. The other
choices do not provide as strong audit evidence as choice A.

30
Q

Which of the following concerns would be addressed by a firewall?

A. Unauthorized access from external network
B. Unauthorized access from internal network
C. A delay in Internet connectivity
D. A delay in system processing

A

Answer: A. Unauthorized access from outside the organization

Explanation:
Firewalls are meant to prevent outsiders from gaining access to an organization’s computer systems through the Internet gateway.

31
Q

An organization is introducing a single sign-on (SSO) system. Under the SSO system, users will be required to enter only one user ID and password for access to all application systems .A major risk of using single sign-on (SSO) is that it:

A. acts as a single authentication point for multiple applications.
B. acts as a single point of failure.
C. acts as a bottleneck for smooth administration.
D. leads to a lockout of valid users in case of authentication failure.

A

Answer A. acts as a single authentication point for multiple applications.

Explanation:
SSO acts as a single authentication point for multiple applications which constitute risk of single point of failure. The primary risk associated with single sign-on is the single authentication point. A Single point of failure provides a similar redundancy to the single authentication point. However, failure can be due to any other reasons also. So more specific answer to this question is option A.

32
Q

Which following is most important benefit of Single Sign On?

A. Easier administration of password management.
B. It can avoid a potential single point of failure issue
C. Maintaining SSO is easy as it is not prone to human errors
D. It protects network traffic

A

Answer: A. Easier administration of password management.

Explanation:
Easier administration of changing or deleting passwords is the major advantage of implementing SSO. The advantages of SSO include having the ability to use stronger passwords, easier administration of changing or deleting the passwords, and requiring less time to access resources.

33
Q

Which of the following is the MOST important objective of data protection?

A. Current technology trend
B. Ensuring the confidentiality & integrity of information
C. Denying or authorizing access to the IS system
D. Internal processing efficiency.

A

B. Ensuring the confidentiality of information

Explanation:
Maintaining data confidentiality and integrity is the most important objective of data security. This is a basic requirement if an organization is to continue as a viable and successful enterprise.

34
Q

An IS auditor reviewing system controls should be most concerned that:

A. security and performance requirements are considered.
B. changes are recorded in log.
C. process for change authorization is in place.
D. restricted access for system parameters is in place.

A

A. security and performance requirements are considered.

Explanation:
The primary concern is to ensure that security as well as performance aspects have been considered. This helps to ensure that control objectives are aligned with business objectives. Log maintenance and change authorization are also important but in absence of proper security and performance requirements same may not be effective.