Review Flashcards
The success of control self-assessment depends highly on:
line managers assuming a portion of the responsibility for control monitoring.
The primary objective of a control self-assessment (CSA) program is to leverage the internal audit function by
shifting some of the control monitoring responsibilities to the functional area line managers. The success of a CSA program depends on the degree to which line managers assume responsibility for controls. This enables line managers to detect and respond to control errors promptly.
Which of the following is MOST important for the auditor to ensure continued alignment with the enterprise’s security requirements?
The vendor agrees to provide annual external audit reports in the contract is correct. The only way to ensure that any potential risk is mitigated today and in the future is to include a clause within the contract that the vendor will provide future external audit reports. Without the audit clause the vendor can choose to forego future audits.
Without a(n) ____________ clause in the contract, an agreement to implement controls does not provide assurance that controls will continue to be implemented in alignment with the enterprise
audit
the purpose of using data flow diagrams
graphically summarize data paths and storage.
Data flow diagrams are used as aids to graph or chart data flow and storage.
They trace data from their origination to destination, highlighting the paths and storage of data.
The MOST serious challenge in the operation of an intrusion detection system is
filtering false positive alerts.
Because of the configuration and the way intrusion detection system (IDS) technology operates, the main problem in operating IDSs is the recognition (detection) of events
that are not really security incidents—false positives, the equivalent of a false alarm. An IS auditor needs to be aware of this and should check for implementation of related controls (such as IDS tuning) and incident handling procedures (such as the screening process) to know if an event is a security incident or a false positive.
Blocking suspicious connections is a characteristic of intrusion prevention systems, which are different type of network security systems than
IDS (Intrusion detection system)
A company’s development team does not follow generally accepted system development life cycle practices. Which of the following is MOST likely to cause problems for software development projects?
Project responsibilities are not formally defined at the beginning of a project.
Errors or lack of attention in the initial phases of a project may cause
costly errors and inefficiencies in later phases. Proper planning is required at the beginning of a project.
Prototypes are verified
by users.
User acceptance testing is seldom completely successful. If errors are not critical,
they may be corrected after implementation without seriously affecting usage.
Lack of adequate program documentation, while a concern, is
not as big a risk as the lack of assigned responsibilities during the initial stages of the project.
the MOST important skill that an IS auditor should develop to understand the constraints of conducting an audit?
Project management
Audits often involve resource management, deliverables, scheduling and deadlines that are similar to
project management good practices.
Which of the following BEST helps prioritize the recovery of IT assets when planning for a disaster?
Business impact analysis
Incorporating the business impact analysis (BIA) into the IT disaster recovery planning process is critical to ensure
that IT assets are prioritized to align with the business.
An incident response plan is an organized approach to addressing and managing
a security breach or attack.
An incident response plan
defines what constitutes an incident and the process to follow when an incident occurs.
An incident response plan
does NOT prioritize recovery during a disaster.
Identifying threats and analyzing risk to the business is an important part of disaster planning, but it does NOT determine the priority of recovery.
determine the priority of recovery.
The recovery time objective (RTO) is
the amount of time allowed for the recovery of a business function or resource after a disaster occurs.
The recovery time objective (RTO) is
is included as part of the BIA and used to represent the prioritization of recovery.
An IS auditor reviewing an outsourcing contract of IT facilities expects it to define the:
ownership of intellectual property.
An outsourcing contract must specify
who owns the intellectual property (i.e., information being processed and application programs). Ownership of intellectual property is a significant cost and is a key aspect to be defined in an outsourcing contract.