UAE Practice Exam 1 Flashcards

1
Q

Which of the following controls would BEST detect intrusion?

A.User IDs and user privileges are granted through authorized procedures.
B.Automatic logoff is used when a workstation is inactive for a particular period of time.
C.Automatic logoff of the system occurs after a specified number of unsuccessful attempts.
D.Unsuccessful logon attempts are monitored by the security administrator.

A

D is the correct answer.

Justification
User IDs and the granting of user privileges define a policy. This is a type of administrative or managerial control that may prevent intrusion but would not detect it.
Automatic logoff is a method of preventing access through unattended or inactive terminals but is not a detective control.
Unsuccessful attempts to log on are a method for preventing intrusion, not detecting it.
Intrusion is detected by the active monitoring and review of unsuccessful logon attempts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IT governance is PRIMARILY the responsibility of the:

A.CEO.
B.board of directors.
C.IT steering committee.
D.audit committee.

A

B is the correct answer.

Justification
The CEO is instrumental in implementing IT governance according to the directions of the board of directors.
IT governance is primarily the responsibility of the executives and shareholders (as represented by the board of directors).
The IT steering committee monitors and facilitates deployment of IT resources for specific projects in support of business plans. The IT steering committee enforces governance on behalf of the board of directors.
The audit committee reports to the board of directors and executes governance-related audits. The audit committee should monitor the implementation of audit recommendations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

If inadequate, which of the following is the MOST likely contributor to a denial-of-service (DoS) attack?

A.Router configuration and rules
B.Design of the internal network
C.Updates to the router system software
D.Audit testing and review techniques

A

A is the correct answer.

Justification
Improper router configuration and rules can lead to denial-of-service (DoS) attacks.
An inefficient design of the internal network may also lead to a DoS attack, but this is not as high a risk as router misconfiguration errors.
Updates to router software have led to a DoS attack in the past, but this is a subset of router configuration and rules.
Audit testing and review techniques can cause a DoS attack if tests disable systems or applications, but this is not the most likely risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is the MOST effective method for disposing of magnetic media that contains confidential information?

A.Degaussing
B.Defragmenting
C.Erasing
D.Destroying

A

D is the correct answer.

Justification
Degaussing or demagnetizing is a good control, but not sufficient to fully erase highly confidential information from magnetic media.
The purpose of defragmentation is to improve efficiency by eliminating fragmentation in file systems; it does not remove information.
Erasing or deleting magnetic media does not remove the information; this method simply changes a file’s indexing information.
Destroying magnetic media is the only way to assure that confidential information cannot be recovered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An organization is replacing a payroll program that it developed in-house, with the relevant subsystem of a commercial enterprise resource planning (ERP) system. Which of the following represents the HIGHEST potential risk?

A.Undocumented approval of some project changes
B.Faulty migration of historical data from the old system to the new system
C.Incomplete testing of the standard functionality of the ERP subsystem
D.Duplication of existing payroll permissions on the new ERP subsystem

A

B is the correct answer.

Justification
Undocumented changes (leading to scope creep) are a risk, but the greatest risk is the loss of data integrity when migrating data from the old system to the new system.
The most significant risk after a payroll system conversion is loss of data integrity resulting in the organization being unable to pay employees in a timely and accurate manner. Loss of data integrity can also result in incorrect records of past payments. As a result, maintaining data integrity and accuracy during migration is paramount.
A lack of testing is always a risk; however, in this case, the new payroll system is a subsystem of an existing commercially available (and therefore probably well-tested) system.
Setting up the new system, including access permissions and payroll data, always presents some level of risk; however, the greatest risk is related to the migration of data from the old system to the new system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The MAIN advantage of an information systems (IS) auditor directly extracting data from a general ledger system is:

A.reduction of human resources needed to support the audit.
B.reduction in the time to have access to the information.
C.greater flexibility for the audit department.
D.greater assurance of data validity.

A

D is the correct answer.

Justification
Although the burden on human resources to support the audit may decrease if the information systems (IS) auditor directly extracts the data, this advantage is not as significant as the increased data validity.
This will not necessarily reduce the time to have access to the information, because time will need to be scheduled for training and granting access.
There may be more flexibility for the IS auditor to adjust the data extracts to meet various audit requirements; however, this is not the main advantage.
If the IS auditor executes the data extraction, there is greater assurance that the extraction criteria will not interfere with the required completeness, and, therefore, all required data will be collected. Asking IT to extract the data may expose the risk of filtering out exceptions that should be seen by the auditor. Also, if the IS auditor collects the data, all internal references correlating the various data tables/elements will be understood, and this knowledge may reveal vital elements to the completeness and correctness of the overall audit activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An offsite information processing facility (IPF) with electrical wiring, air conditioning and flooring, but no computer or communications equipment, is a:

A.cold site.
B.warm site.
C.dial-up site.
D.duplicate processing facility.

A

A is the correct answer.

Justification
A cold site is ready to receive equipment but does not offer any components at the site in advance of the need.
A warm site is an offsite backup facility that is partially configured with network connections and selected peripheral equipment—such as disk units, controllers and central processing units— to operate an information processing facility (IPF).
A dial-up site is used for remote access, but not for offsite information processing.
A duplicate IPF is a dedicated, fully developed recovery site that can back up critical applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The reason for establishing a stop or freezing point on the design of a new system is to:

A.prevent further changes to a project in process.
B.indicate the point at which the design is to be completed.
C.require that changes after that point be evaluated for cost-effectiveness.
D.provide the project management team with more control over the project design.

A

C is the correct answer.

Justification
The stop point is intended to provide greater control over changes but not to prevent them.
The stop point is used for project control but not to create an artificial fixed point that requires the design of the project to cease.
Projects often tend to expand, especially during the requirements definition phase. This expansion often grows to a point where the originally anticipated cost benefits are diminished because the cost of the project has increased. When this occurs, it is recommended that the project be stopped or frozen to allow a review of all the cost benefits and the payback period.
A stop point is used to control requirements, not project design.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The output of the risk management process is an input for making:

A.business plans.
B.audit charters.
C.security policy decisions.
D.software design decisions.

A

C is the correct answer.

Justification
Making a business plan is not the goal of the risk management process.
Risk management can help create the audit plan, but not the audit charter.
The risk management process is about making specific, security-related decisions, such as the level of acceptable risk.
Risk management drives the design of security controls in software but influencing security policy is more important.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An organization requests that an information systems (IS) auditor provide a recommendation to enhance the security and reliability of its Voice-over Internet Protocol (VoIP) system and data traffic. Which of the following meets this objective?

A.VoIP infrastructure needs to be segregated using virtual local area networks.
B.Buffers need to be introduced at the VoIP endpoints.
C.Ensure that end-to-end encryption is enabled in the VoIP system.
D.Ensure that emergency backup power is available for all parts of the VoIP infrastructure.

A

A is the correct answer.

Justification
Segregating the Voice-over Internet Protocol (VoIP) traffic using virtual local area networks (VLANs) best protects the VoIP infrastructure from network-based attacks, potential eavesdropping and network traffic issues (which helps to ensure uptime).
The use of packet buffers at VoIP endpoints is a method to maintain call quality, not a security method.
Encryption is used when VoIP calls use the Internet (not the local area network (LAN)) for transport because the assumption is that the physical security of the building and the Ethernet switch and VLAN security are adequate.
The design of the network and the proper implementation of VLANs are more critical than ensuring that all devices are protected by emergency power.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A database administrator (DBA) who needs to make emergency changes to a database after normal working hours should log in:

A.with their named account to make the changes.
B.with the shared DBA account to make the changes.
C.to the server administrative account to make the changes.
D.to the user’s account to make the changes.

A

A is the correct answer.

Justification
Logging in using the named user account before using the database administrator (DBA) account provides accountability by noting the person making the changes.
The DBA account is typically a shared user account. The shared account makes it difficult to establish the identity of the support user who is performing the database update.
The server administrative accounts are shared and may be used by multiple support users. In addition, the server privilege accounts may not have the ability to perform database changes.
The use of a normal user account does not have sufficient privileges to make changes on the database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An information systems (IS) auditor discovers that some users installed personal software on their PCs. This is not explicitly forbidden by the security policy. The BEST approach for an IS auditor is to recommend that the:

A.IT department implement control mechanisms to prevent unauthorized software installation.
B.security policy be updated to include the specific language regarding unauthorized software.
C.IT department prohibit the download of unauthorized software.
D.users obtain approval from an IS manager before installing nonstandard software.

A

B is the correct answer.

Justification
An information systems (IS) auditor’s obligation is to report on observations noted and make the best recommendation, which is to address the situation through policy. The IT department cannot implement controls in the absence of the authority provided through policy.
Lack of specific language addressing unauthorized software in the acceptable use policy is a weakness in administrative controls. The policy should be reviewed and updated to address the issue—and provide authority for the IT department to implement technical controls.
Preventing downloads of unauthorized software is not the complete solution. Unauthorized software can be also introduced through compact disks (CDs) and USB drives.
Requiring approval from the IS manager before installation of the nonstandard software is an exception handling control. It would not be effective unless a preventive control to prohibit user installation of unauthorized software is established first.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following should be the FIRST action of an information systems (IS) auditor during a dispute with a department manager over audit findings?

A.Retest the control to validate the finding.
B.Engage a third party to validate the finding.
C.Include the finding in the report with the department manager’s comments.
D.Revalidate the supporting evidence for the finding.

A

D is the correct answer.

Justification
Retesting the control normally occurs after the evidence has been revalidated.
Although there are cases where a third party may be needed to perform specialized audit procedures, an information systems (IS) auditor should first revalidate the supporting evidence to determine whether there is a need to engage a third party.
Before putting a disputed finding or management response in the audit report, the IS auditor should take care to review the evidence that is used in the finding to ensure audit accuracy.
Conclusions drawn by an IS auditor should be adequately supported by evidence, and any compensating controls or corrections that are pointed out by a department manager should be taken into consideration. Therefore, the first step is to revalidate the evidence for the finding. If, after revalidating and retesting, there are unsettled disagreements, those issues should be included in the report.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

During the planning stage of an information systems (IS) audit, the PRIMARY goal of an IS auditor is to:

A.address audit objectives.
B.collect sufficient evidence.
C.specify appropriate tests.
D.minimize audit resources.

A

A is the correct answer.

Justification
ISACA Information Systems (IS) Audit and Assurance Standards require that an IS auditor plan the audit work to address the audit objectives. The activities described in the other options are all undertaken to address audit objectives and, thus, are secondary.
The IS auditor does not collect evidence in the planning stage of an audit.
Specifying appropriate tests is not the primary goal of audit planning.
Effective use of audit resources is a goal of audit planning, not minimizing audit resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An information systems (IS) auditor is reviewing an organization’s information security policy, which requires encryption of all data placed on USB drives. The policy also requires that a specific encryption algorithm be used. Which of the following algorithms would provide the greatest assurance that data placed on USB drives is protected from unauthorized disclosure?

A.Data Encryption Standard (DES)
B.Message digest 5
C.Advanced Encryption Standard (AES)
D.Secure Shell (SSH)

A

C is the correct answer.

Justification
Data Encryption Standard (DES) is susceptible to brute force attacks and has been broken publicly; therefore, it does not provide assurance that data encrypted using DES will be protected from unauthorized disclosure.
Message digest 5 (MD5) is an algorithm used to generate a one-way hash of data (a fixed-length value) to test and verify data integrity. MD5 does not encrypt data but puts data through a mathematical process that cannot be reversed. As a result, MD5 cannot be used to encrypt data on a USB drive.
Advanced Encryption Standard (AES) provides the strongest encryption of all the choices listed and provides the greatest assurance that data are protected. Recovering data encrypted with AES is considered computationally infeasible; therefore, AES is the best choice for encrypting sensitive data.
secure shell (SSH) is a protocol that is used to establish a secure, encrypted, command-line shell session, typically for remote logon. Although SSH encrypts data transmitted during a session, SSH cannot encrypt data at rest, including data on USB drives. As a result, SSH is not appropriate for this scenario.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

While designing the business continuity plan (BCP) for an airline reservation system, the MOST appropriate method of data transfer/backup at an offsite location is:

A.shadow file processing.
B.electronic vaulting.
C.hard-disk mirroring.
D.hot-site provisioning.

A

A is the correct answer.

Justification
In shadow file processing, exact duplicates of the files are maintained at the same site or at a remote site. The two files are processed concurrently. This is used for critical data files, such as airline booking systems.
Electronic vaulting electronically transmits data either to direct access storage, an optical disc or another storage medium; this is a method used by banks. This method is not usually in real time, unlike a shadow file system.
Hard-disk mirroring provides redundancy in case the primary hard disk fails. All transactions and operations occur on two hard disks in the same server.
A hot site is an alternate site ready to take over business operations within a few hours of any business interruption and is not a method for backing up data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

From a control perspective, the PRIMARY objective of classifying information assets is to:

A.establish guidelines for the level of access controls that should be assigned.
B.ensure access controls are assigned to all information assets.
C.assist management and auditors in risk assessment.
D.identify which assets need to be insured against losses.

A

A is the correct answer.

Justification
Information has varying degrees of sensitivity and criticality in meeting business objectives. By assigning classes or levels of sensitivity and criticality to information resources, management can establish guidelines for the level of access controls that should be assigned. End user management and the security administrator will use these classifications in their risk assessment process to assign a given class to each asset.
Not all information needs to be protected through access controls. Overprotecting data would be expensive.
The classification of information is usually based on the risk assessment, not the other way around.
Insuring assets is valid; however, this is not the primary objective of information classification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An information systems (IS) auditor has been asked by management to review a potentially fraudulent transaction. The PRIMARY focus of the IS auditor while evaluating the transaction should be to:

A.maintain impartiality while evaluating the transaction.
B.ensure that the independence of the IS auditor is maintained.
C.ensure that the integrity of the evidence is maintained.
D.assess all relevant evidence for the transaction.

A

C is the correct answer.

Justification
Although it is important for an information systems (IS) auditor to be impartial, in this case it is more critical that the evidence be preserved.
Although it is important for an IS auditor to maintain independence, in this case, it is more critical that the evidence be preserved.
The IS auditor has been requested to perform an investigation to capture evidence that may be used for legal purposes, and, therefore, maintaining the integrity of the evidence should be the foremost goal. Improperly handled computer evidence is subject to being ruled inadmissible in a court of law.
Although it is also important to assess all relevant evidence, it is more important to maintain the chain of custody, which ensures the integrity of evidence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following provides the MOST relevant information for proactively strengthening security settings?

A.Bastion host
B.Intrusion detection system (IDS)
C.Honeypot
D.Intrusion prevention system (IPS)

A

C is the correct answer.

Justification
A bastion host is a hardened system used to host services. It does not provide information about an attack.
Intrusion detection systems (IDSs) are designed to detect and address an attack in progress and stop it as soon as possible.
The design of a honeypot is such that it lures the hacker and provides clues about the hacker’s methods and strategies, and the resources required to address such attacks. A honeypot allows the attack to continue, to obtain information about the hacker’s strategy and methods.
Intrusion prevention systems (IPS) are designed to detect and address an attack in progress and stop it as soon as possible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

An information systems (IS) auditor performing an application maintenance audit would review the log of program changes for the:

A.authorization of program changes.
B.creation date of a current object module.
C.number of program changes actually made.
D.creation date of a current source program.

A

A is the correct answer.

Justification
The auditor wants to ensure that only authorized changes have been made to the application. The auditor would therefore review the log of program changes to verify that all changes have been approved.
The creation date of the current object module does not indicate earlier changes to the application.
The auditor reviews the system to notice the number of changes actually made but then verifies that all the changes were authorized.
The creation date of the current source program does not identify earlier changes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

An information systems (IS) auditor who has discovered unauthorized transactions during a review of electronic data interchange (EDI) transactions is likely to recommend improving the:

A.EDI trading partner agreements.
B.physical controls for terminals.
C.authentication techniques for sending and receiving messages.
D.program change control procedures.

A

C is the correct answer.

Justification
Electronic data interchange trading partner agreements minimize exposure to legal issues but do not resolve the problem of unauthorized transactions.
Physical control is important and may provide protection from unauthorized people accessing the system but does not provide protection from unauthorized transactions by authorized users.
Authentication techniques for sending and receiving messages play a key role in minimizing exposure to unauthorized transactions.
Change control procedures do not resolve the issue of unauthorized transactions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The MOST likely effect of the lack of senior management commitment to IT strategic planning is:

A.lack of investment in technology.
B.lack of a methodology for systems development.
C.Technology not aligning with organization objectives.
D.absence of control over technology contracts.

A

C is the correct answer.

Justification
Lack of management commitment almost certainly affects investment, but the primary loss is the lack of alignment of IT strategy with the strategy of the business.
Systems development methodology is a process-related function and not a key concern of management.
A steering committee should exist to ensure that the IT strategies support the organization’s goals. The absence of an information technology committee or a committee not composed of senior managers is an indication of a lack of top-level management commitment. This condition increases the risk that IT is not aligned with organization strategy.
Approval for contracts is a business process and is controlled through financial process controls. This is not applicable here.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Organizations requiring employees to take a mandatory vacation each year PRIMARILY want to ensure that:

A.adequate cross-training exists between functions.
B.an effective internal control environment is in place by increasing morale.
C.potential irregularities in processing are identified by a temporary replacement.
D.the risk of processing errors is reduced.

A

C is the correct answer.

Justification
Cross-training is a good practice to follow but can be achieved without the requirement for mandatory vacation.
Good employee morale and high levels of employee satisfaction are worthwhile objectives, but they should not be considered a means to achieve an effective internal control system.
Employees who perform critical and sensitive functions within an organization should be required to take some time off to help ensure that irregularities and fraud are detected.
Although rotating employees can contribute to fewer processing errors, this is not typically a reason to require a mandatory vacation policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

During an assessment of software development practices, an information systems (IS) auditor finds that open-source software components were used in an application designed for a client. What is the GREATEST concern that the auditor has about the use of open-source software?

A.The client did not pay for the open-source software components.
B.The organization and client must comply with open-source software license terms.
C.Open-source software has security vulnerabilities.
D.Open-source software is unreliable for commercial use.

A

B is the correct answer.

Justification
A major benefit of using open-source software is that it is free. The client is not required to pay for the open-source software components; however, both the developing organization and the client should be concerned about the licensing terms and conditions of the open source software components that are being used.
There are many types of open-source software licenses and each has different terms and conditions. Some open-source software licensing allows use of the open-source software component freely but requires that the completed software product must also allow the same rights. This is known as viral licensing, and if the development organization is not careful, its products can violate licensing terms by selling the product for profit. The information systems (IS) auditor should be most concerned with open-source software licensing compliance to avoid unintended intellectual property risk or legal consequences.
Open-source software, just like any software code, should be tested for security flaws and should be part of the normal system development life cycle (SDLC) process. This is not more of a concern than licensing compliance.
Open-source software does not inherently lack quality. Like any software code, it should be tested for reliability and should be part of the normal SDLC process. This is not more of a concern than licensing compliance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The information systems (IS) auditor is reviewing a recently completed conversion to a new enterprise resource planning system. In the final stage of the conversion process, the organization ran the old and new systems in parallel for 30 days before allowing the new system to run on its own. What is the MOST significant advantage to the organization by using this strategy?

A.Significant cost savings over other testing approaches
B.Assurance that new, faster hardware is compatible with the new system
C.Assurance that the new system meets functional requirements
D.Increased resiliency during the parallel processing time

A

C is the correct answer.

Justification
Parallel operation is generally expensive and does not provide a cost savings over most other testing approaches. In many cases, parallel operation is the most expensive form of system testing due to the need for dual data entry, dual sets of hardware, dual maintenance and dual backups. Parallel operation is twice the amount of work as running a production system and, therefore, costs more time and money.
Hardware compatibility should be determined and tested much earlier in the conversion project and is not an advantage of parallel operation. Compatibility is generally determined based on the application’s published specifications and on system testing in a lab environment. Parallel operation is designed to test the application’s effectiveness and integrity of application data, not hardware compatibility. In general, hardware compatibility relates more to the operating system level than to a particular application. Although new hardware in a system conversion must be tested under a real production load, this can be done without parallel systems.
Parallel operation provides a high level of assurance that the new system functions properly compared to the old system, and therefore, the new system meets its functional requirements. This is the safest form of system conversion testing because, if the new system fails, the old system is still available for production use. In addition, this form of testing allows the application developers and administrators to simultaneously run operational tasks (e.g., batch jobs and backups) on both systems, to ensure that the new system is reliable before unplugging the old system.
Increased resiliency during parallel processing is a legitimate outcome from this scenario, but the advantage it provides is temporary and minor, so this is not the correct answer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Information systems (IS) control objectives are useful to IS auditors because they provide the basis for understanding the:

A.desired result or purpose of implementing specific control procedures.
B.best information systems (IS) security control practices relevant to a specific entity.
C.techniques for securing information.
D.security policy.

A

A is the correct answer.

Justification
An information systems (IS) control objective is defined as the statement of the desired result or purpose to be achieved by implementing control procedures in a particular IS activity.
Control objectives provide the actual objectives for implementing controls and may or may not be based on good practices.
Techniques are the means of achieving an objective, but it is more important to know the reason and objective for the control than to understand the technique itself.
A security policy mandates the use of IS controls, but the controls are not used to understand policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

*An information systems (IS) auditor of a large organization is reviewing the roles and responsibilities of the IT function and finds some individuals serving multiple roles. Which one of the following combinations of roles should be of GREATEST concern for the IS auditor?

A.Network administrators are responsible for quality assurance.
B.System administrators are application programmers.
C.End users are security administrators for critical applications.
D.Systems analysts are database administrators (DBAs).

A

B is the correct answer.

Justification
Ideally, network administrators should not be responsible for quality assurance because they can approve their own work. However, that is not as serious as the combination of system administrator and application programmer, which allows nearly unlimited abuse of privilege.
When individuals serve multiple roles, this represents a separation-of-duties problem with associated risk. System administrators should not be application programmers, due to the associated rights of both functions. A person with both system and programming rights can do almost anything on a system, including creating a back door. The other combinations of roles are valid from a separation-of-duties perspective.
In some distributed environments, especially with small staffing levels, users may also manage security.
Although a database administrator (DBA) is a very privileged position it is not in conflict with the role of a systems analyst.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

An information systems (IS) auditor examining the security configuration of an operating system (OS) should review the:

A.transaction logs.
B.authorization tables.
C.parameter settings.
D.routing tables.

A

C is the correct answer.

Justification
Transaction logs are used to track and analyze transactions related to an application or system interface, but that is not the primary source of audit evidence in an operating system (OS) audit.
Authorization tables are used to verify implementation of logical access controls and will not be of much help when reviewing control features of an OS.
Configuration parameters allow a standard piece of software to be customized for diverse environments and are important in determining how a system runs. The parameter settings should be appropriate to an organization’s workload and control environment. Improper implementation and/or monitoring of OSs can result in undetected errors and corruption of the data being processed, and lead to unauthorized access and inaccurate logging of system usage.
Routing tables do not contain information about the OS and, therefore, provide no information to aid in the evaluation of controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which of the following represents the GREATEST risk created by a reciprocal agreement for disaster recovery between two organizations?

A.Developments may result in hardware and software incompatibility.
B.Resources may not be available when needed.
C.The recovery plan cannot be live tested.
D.The security infrastructures in each organization may be different.

A

A is the correct answer.

Justification
If one organization updates its hardware and software configuration, it may mean it is no longer compatible with the other party’s systems in the agreement. This may mean that each organization is unable to use the facilities at the other organization to recover their processing following a disaster.
Resources unavailable when needed are an intrinsic risk in any reciprocal agreement, but this is a contractual matter and not the greatest risk.
The plan can be tested by paper-based walk-throughs and possibly by agreement between the organizations.
The difference in security infrastructures, although a risk, is not insurmountable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Due to a reorganization, a business application system will be extended to other departments. Which of the following should be of the GREATEST concern for an information systems (IS) auditor?

A.Process owners have not been identified.
B.The billing cost allocation method has not been determined.
C.Multiple application owners exist.
D.A training program does not exist.

A

A is the correct answer.

Justification
When one application is expanded to multiple departments, it is important to ensure the mapping between the process owner and system functions. The absence of a defined process owner may cause issues with monitoring or authorization controls.
Cost allocation is the method business owners use to calculate profitability for the purpose of financial reporting. The billing cost allocation method of application usage is of less importance than identifying process owners.
The fact that multiple application owners exist is not a concern for an information systems (IS) auditor if process owners have been identified, because the process owners are responsible for the specific process.
The lack of a training program is only a minor concern for the IS auditor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

An information systems (IS) auditor reviewing access controls for a client-server environment should FIRST:

A.evaluate the encryption technique.
B.identify the network access points.
C.review the identity management system.
D.review the application-level access controls.

A

B is the correct answer.

Justification
Evaluating encryption techniques would be performed at a later stage of the review.
A client-server environment typically contains several access points and uses distributed techniques, increasing the risk of unauthorized access to data and processing. To evaluate the security of the client server environment, all network access points should be identified.
Reviewing the identity management system would be performed at a later stage of the review.
Reviewing the application-level access controls would be performed at a later stage of the review.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

When evaluating the collective effect of preventive, detective and corrective controls within a process, an information systems (IS) auditor should be aware of which of the following?

A.The point at which controls are exercised as data flow through the system.
B.Only preventive and detective controls are relevant.
C.Corrective controls are regarded as compensating.
D.Classification allows an IS auditor to determine the controls that are missing.

A

A is the correct answer.

Justification
An information systems (IS) auditor should focus on when controls are exercised as data flow through a computer system.
Corrective controls may also be relevant because they allow an error or problem to be corrected.
Corrective controls remove or reduce the effects of errors or irregularities and are not exclusively regarded as compensating controls.
The existence and function of controls are important but not the classification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Which of the following would an information systems (IS) auditor consider to be MOST helpful when evaluating the effectiveness and adequacy of a preventive computer maintenance program?

A.System downtime log
B.Vendor reliability figures
C.Regularly scheduled maintenance log
D.Written preventive maintenance schedule

A

A is the correct answer.

Justification
A system downtime log provides evidence regarding the effectiveness and adequacy of computer preventive maintenance programs. The log is a detective control, but because it is validating the effectiveness of the maintenance program, it is validating a preventive control.
Vendor reliability figures are not an effective measure of a preventive maintenance program.
Reviewing the log is a good detective control to ensure that maintenance is being done; however, only the system downtime will indicate whether the preventive maintenance is actually working well.
A schedule is a good control to ensure that maintenance is scheduled and that no items are missed in the maintenance schedule; however, it is not a guarantee that the work is actually being done.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

An information systems (IS) auditor is carrying out a system configuration review. Which of the following is the BEST evidence in support of the current system configuration settings?

A.System configuration values that are imported to a spreadsheet by the system administrator
B.Standard report with configuration values that are retrieved from the system by the information systems (IS) auditor
C.Dated screenshot of the system configuration settings that are made available by the system administrator
D.Annual review of approved system configuration values by the business owner

A

B is the correct answer.

Justification
Evidence that is not system-generated information can be modified before it is presented to an information systems (IS) auditor. Therefore, it may not be as reliable as evidence that is obtained by the IS auditor. For example, a system administrator can change the settings or modify the graphic image before taking a screenshot.
Evidence that is obtained directly from the source by an IS auditor is more reliable than information that is provided by a system administrator or a business owner because the IS auditor does not have a vested interest in the outcome of the audit.
The rules may be modified by the administrator prior to taking the screenshot; therefore, this is not the best evidence.
The annual review provided by a business owner may not reflect current information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Which of the following BEST provides assurance of the integrity of new staff?

A.Background screening
B.References
C.Bonding
D.Qualifications listed on a resume

A

A is the correct answer.

Justification
A background screening is the primary method for assuring the integrity of a prospective staff member. This may include criminal history checks, driver’s license abstracts, financial status checks, verification of education, etc.
References are important and need to be verified, but they are not as reliable as background screening, because the references themselves may not be validated as trustworthy.
Bonding is directed at due-diligence compliance and does not ensure integrity.
Qualifications listed on a resume may be used to demonstrate proficiency but will not indicate the integrity of the candidate employee.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

During an information systems (IS) audit, which is the BEST method for an IS auditor to evaluate the implementation of separation of duties within an IT department?

A.Discuss with the IT managers.
B.Review the IT job descriptions.
C.Research past IT audit reports.
D.Evaluate the organizational structure.

A

A is the correct answer.

Justification
Discussing the implementation of separation of duties with the IT managers is the best way to determine how responsibilities are assigned within the department.
Job descriptions may not be the best source of information because they can be outdated, or what is documented in the job descriptions may be different from what is performed.
Past information systems (IS) audit reports are not the best source of information because they may not accurately describe how IT responsibilities are assigned.
Evaluating the organizational structure may give a limited view on the allocation of IT responsibilities. The responsibilities also may have changed over time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

An information systems (IS) auditor is performing a review of the software quality management process in an organization. The FIRST step should be to:

A.Verify how the organization complies with the standards.
B.Identify and report the existing controls.
C.Review the metrics for quality evaluation.
D.Request all standards adopted by the organization.

A

D is the correct answer.

Justification
The auditor needs to know what standards the organization has adopted and then measure compliance with those standards. Determining how the organization follows the standards is secondary to knowing what the standards are.
The first step is to know the standards and what policies and procedures are mandated for the organization, then to document the controls and measure compliance.
The metrics cannot be reviewed until the auditor has a copy of the standards that describe or require the metrics.
Because an audit measures compliance with the standards of the organization, the first step of the review of the software quality management process should be to determine the evaluation criteria in the form of standards adopted by the organization. The evaluation of how well the organization follows its own standards cannot be performed until the information systems (IS) auditor has determined what standards exist.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

An organization’s information systems (IS) audit charter should specify the:

A.plans for IS audit engagements.
B.objectives and scope of IS audit engagements.
C.detailed training plan for the IS audit staff.
D.role of the IS audit function.

A

D is the correct answer.

Justification
Planning is the responsibility of audit management.
The objectives and scope of each information systems (IS) audit should be agreed on in an engagement letter. The charter specifies the objectives and scope of the audit function but not of individual engagements.
A training plan that is based on the audit plan should be developed by audit management.
An IS audit charter establishes the role of the information systems audit function. The charter should describe the overall authority, scope and responsibilities of the audit function. The charter should be approved by the highest level of management and, if available, by the audit committee.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

*When reviewing the development of information security policies, the PRIMARY focus of an information systems (IS) auditor should be on assuring that these policies:

A.are aligned with globally accepted industry good practices.
B.are approved by the board of directors and senior management.
C.strike a balance between business and security requirements.
D.provide direction for implementing security procedures.

A

C is the correct answer.

Justification
An organization is not required to base its IT policies on industry good practices. Policies must be based on the culture and business requirements of the organization.
It is essential that policies be approved; however, that is not the primary focus during the development of the policies.
Because information security policies must be aligned with an organization’s business and security objectives, this is the primary focus of the information systems (IS) auditor when reviewing the development of information security policies.
Policies cannot provide direction if they are not aligned with business requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What kind of software application testing is considered the final stage of testing and typically includes users outside of the development team?

A.Alpha testing
B.White box testing
C.Regression testing
D.Beta testing

A

D is the correct answer.

Justification
Alpha testing is the testing stage just before beta testing. Alpha testing is typically performed by programmers and business analysts, instead of users. Alpha testing is used to identify bugs or glitches that can be fixed before beta testing begins with external users.
White box testing is performed much earlier in the software development life cycle than alpha or beta testing. White box testing is used to assess the effectiveness of software program logic, where test data are used to determine procedural accuracy of the programs being tested. This testing stage determines if the program operates the way it is supposed to at a functional level. White box testing does not typically involve external users.
Regression testing is the process of re-running a portion of a test scenario to ensure that changes or corrections have not introduced more errors (i.e., the same tests are run after multiple successive program changes to ensure that the fix for one problem did not break another part of the program). Regression testing is not the last stage of testing and does not typically involve external users.
Beta testing is the final stage of testing and typically includes users outside of the development area. Beta testing is a form of user acceptance testing and generally involves a limited number of users who are external to the development effort.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

An organization has contracted with a vendor for a turnkey solution for its electronic toll collection system (ETCS). The vendor has provided its proprietary application software as part of the solution. The contract should require that:

A.a backup server is available to run ETCS operations with up-to-date data.
B.a backup server is loaded with all relevant software and data.
C.the systems staff of the organization is trained to handle any event.
D.source code of the ETCS application is placed in escrow.

A

D is the correct answer.

Justification
Having a backup server with current data is critical but not as critical as ensuring the availability of the source code.
Having a backup server with relevant software is critical but not as critical as ensuring the availability of the source code.
Having staff training is critical but not as critical as ensuring the availability of the source code.
Whenever proprietary application software is purchased, the contract should provide for a source code escrow agreement. This agreement ensures that the purchasing organization can modify the software if the vendor ceases to be in business.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

A project development team is considering using production data for its test deck. The team removed sensitive data elements before loading it into the test environment. Which of the following additional concerns should an information systems (IS) auditor have with this practice?

A.Not all functionality will be tested.
B.Production data are introduced into the test environment.
C.Specialized training is required.
D.The project may run over budget.

A

A is the correct answer.

Justification
A primary risk of using production data in a test deck is that not all transactions or functionality may be tested if there are no data that meet the requirement.
The presence of production data in a test environment is not a concern if the sensitive elements have been scrubbed.
Creation of a test deck from production data does not require specialized knowledge, so this is not a concern.
The risk of a project running over budget is always a concern, but it is not related to the practice of using production data in a test environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Which of the following should be of PRIMARY concern to an information systems (IS) auditor reviewing the management of external IT service providers?

A.Minimizing costs for the services provided
B.Prohibiting the provider from subcontracting services
C.Evaluating the process for transferring knowledge to the IT department
D.Determining if the services were provided as contracted

A

D is the correct answer.

Justification
Minimizing costs, if applicable and achievable (depending on the customer’s need), is traditionally not part of an information systems (IS) auditor’s job. This work is normally done by a line management function within the IT department. Furthermore, during an audit, it is too late to minimize the costs for existing provider arrangements.
Subcontracting providers can be a concern but is not the primary concern. This issue should be addressed in the contract.
Transferring knowledge to the internal IT department might be desirable under certain circumstances but should not be the primary concern of an IS auditor when auditing IT service providers and the management thereof.
From an IS auditor’s perspective, the primary objective of auditing the management of service providers should be to determine if the services that were requested were provided in a way that is acceptable, seamless and in line with contractual agreements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Which of the following is the MOST reasonable option for recovering a noncritical system?

A.Warm site
B.Mobile site
C.Hot site
D.Cold site

A

D is the correct answer.

Justification
A warm site is generally available at a medium cost, requires less time to become operational and is suitable for sensitive operations that should be recovered in a moderate amount of time.
A mobile site is a vehicle ready with all necessary computer equipment that can be moved to any location, depending upon the need. The need for a mobile site relies on the scale of operations.
A hot site is contracted for a shorter time period at a higher cost, and it is better suited for recovery of vital and critical applications.
Generally, a cold site is contracted for a longer period at a lower cost. It is generally used for noncritical applications because it requires more time to make a cold site operational.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

The extent to which data will be collected during an information systems (IS) audit should be determined based on the:

A.availability of critical and required information.
B.auditor’s familiarity with the circumstances.
C.auditee’s ability to find relevant evidence.
D.purpose and scope of the audit being done.

A

D is the correct answer.

Justification
The extent to which data will be collected during an information systems (IS) audit should be based on the scope, purpose and requirements of the audit and not be constrained by the ease of obtaining the information or by the IS auditor’s familiarity with the area being audited.
An IS auditor must be objective and thorough and not subject to audit risk through preconceived expected results based on familiarity with the area being audited.
Collecting all the required evidence is a required element of an IS audit, and the scope of the audit should not be limited by the auditee’s ability to find relevant evidence. If evidence is not readily available, the auditor must ensure that other forms of audit are considered to ensure compliance in the area that is subject to audit.
The extent to which data will be collected during an IS audit should be related directly to the scope and purpose of the audit. An IS audit with a narrow purpose and scope, or just a high-level review, will most likely require less data collection than an audit with a wider purpose and scope.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

A programmer maliciously modified a production program to change data and then restored the program back to the original code. Which of the following would MOST effectively detect the malicious activity?

A.Comparing source code
B.Reviewing system log files
C.Comparing object code
D.Reviewing executable and source code integrity

A

B is the correct answer.

Justification
Source code comparisons are ineffective because the original programs were restored, and the changed program does not exist.
Reviewing system log files is the only trail that may provide information about unauthorized activities in the production library.
Object code comparisons are ineffective because the original programs were restored, and the changed program does not exist.
Reviewing executable and source code integrity is an ineffective control, because the source code was changed back to the original and will agree with the current executable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

*The PRIMARY benefit of an enterprise architecture initiative is to:

A.enable the enterprise to invest in the most appropriate technology.
B.ensure security controls are implemented on critical platforms.
C.allow development teams to be more responsive to business requirements.
D.provide business units with greater autonomy to select IT solutions that fit their needs.

A

A is the correct answer.

Justification
The primary focus of the enterprise architecture (EA) is to ensure that technology investments are consistent with the platform, data and development standards of the IT organization; therefore, the goal of the EA is to help the organization to implement the technology that is most effective.
Ensuring that security controls are implemented on critical platforms is important, but this is not the function of the EA. The EA may be concerned with the design of security controls; however, the EA does not help to ensure that they were implemented. The primary focus of the EA is to ensure that technology investments are consistent with the platform, data and development standards of the IT organization.
Although the EA process may enable development teams to be more efficient, because they are creating solutions based on standard platforms using standard programming languages and methods, the more critical benefit of the EA is to provide guidance for IT investments of all types, which encompasses much more than software development.
A primary focus of the EA is to define standard platforms, databases and interfaces. Business units that invest in technology need to select IT solutions that meet their business needs and are compatible with the EA of the enterprise. There may be instances when a proposed solution works better for a business unit but is not at all consistent with the EA of the enterprise, so there would be a need to compromise to ensure that the application can be supported by IT. Overall, the EA would restrict the ability of business units in terms of the potential IT systems that they may wish to implement. The support requirements would not be affected in this case.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

From an IT governance perspective, what is the PRIMARY responsibility of the board of directors? To ensure that the IT strategy:

A.is cost-effective.
B.is forward thinking and innovative.
C.is aligned with the business strategy.
D.has the appropriate priority level assigned.

A

C is the correct answer.

Justification
The IT strategy should be cost-effective, but it must align with the business strategy for the strategy to be effective.
The IT strategy should be forward-thinking and innovative, but it must align with the business strategy to be effective.
The board of directors is responsible for ensuring that the IT strategy is aligned with the business strategy.
The IT strategy should be appropriately prioritized; however, it must align with the business strategy first and then it will be prioritized.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

The database administrator (DBA) suggests that database efficiency can be improved by denormalizing some tables. This will result in:

A.loss of confidentiality.
B.increased redundancy.
C.unauthorized accesses.
D.application malfunctions.

A

B is the correct answer.

Justification
Denormalization should not cause loss of confidentiality even though confidential data may be involved. The database administrator (DBA) should ensure that access controls to the databases remain effective.
Normalization is a design or optimization process for a relational database that increases redundancy. Redundancy, which is usually considered positive for resource availability, is negative in a database environment because it demands additional and otherwise unnecessary data handling efforts. Denormalization is sometimes advisable for functional reasons.
Denormalization pertains to the structure of the database, not the access controls. It should not result in unauthorized access.
Denormalization may require some changes to the calls between databases and applications but should not cause application malfunctions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

When reviewing the desktop software compliance of an organization, the information systems (IS) auditor should be MOST concerned if the installed software:

A.is installed, but not documented in the IT department records.
B.is being used by users not properly trained in its use.
C.is not listed in the approved software standards document.
D.has a license that will expire in the next 15 days.

A

C is the correct answer.

Justification
All software, including licenses, should be documented in IT department records, but this is not as serious as the violation of policy in installing unapproved software.
Discovering that users have not been formally trained in the use of a software product is common, and, although not ideal, most software includes help files and other tips that can assist in learning how to use the software effectively.
Installing software not allowed by policy is a serious violation and can put the organization at security, legal and financial risk. Any software that is allowed should be part of a standard software list. This is the first thing to review because this would also indicate compliance with policies.
A software license that is about to expire is not a risk if there is a process in place to renew it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

*Enterprise governance of IT frameworks MAINLY helps organizations address business issues by:

A.aligning high-level strategic objectives with operational-level objectives, followed by direct work outcomes.
B.establishing a risk management capability to address business issues and preserve the value delivered to stakeholders.
C.developing a roadmap to help fill in the gap between the current state (as-is) and the desired state (to-be).
D.conducting multiple meetings with different stakeholder groups to learn about their expectations.

A

A is the correct answer.

Justification
The strategic alignment between business objectives and enterprise IT objectives is one of the most important advantages of applying enterprise governance of information and technology (EGIT) frameworks because it helps in achieving enterprise objectives and delivering value at a reasonable cost.
Establishing risk management practices and processes as part of EGIT frameworks is much more effective after aligning the objectives of enterprise IT with the strategic direction of the organization, better preserving the value delivered to stakeholders.
Conducting assessments and developing roadmaps comes after establishing strategic alignment between enterprise IT and business strategies.
Such meetings are a good tool to develop successful enterprise IT strategies but should be done after understanding the business strategies and aligning enterprise IT with them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

*Which of the following intrusion detection systems (IDSs) will MOST likely generate false alarms resulting from normal network activity?

A.Statistical-based
B.Signature-based
C.Neural network
D.Host-based

A

A is the correct answer.

Justification
A statistical-based intrusion detection system (IDS) relies on a definition of known and expected behavior of systems. Because normal network activity may, at times, include unexpected behavior (e.g., a sudden massive download by multiple users), these activities will be flagged as suspicious.
A signature-based IDS is limited to its predefined set of detection rules, just like a virus scanner. Signature-based systems traditionally have low levels of false positives but may be weak at detecting new attacks.
A neural network combines statistical- and signature-based IDSs to create a hybrid and better system.
Host-based is another type of IDS, but it would not be used to monitor network activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

During a postimplementation review, which of the following activities should be performed?

A.User acceptance testing (UAT)
B.Return on investment (ROI) analysis
C.Activation of audit trails
D.Updates of the state of enterprise architecture (EA) diagrams

A

B is the correct answer.

Justification
User acceptance testing (UAT) supports the process of ensuring that the system is production ready and satisfies all documented requirements. User acceptance testing should be performed prior to the implementation (perhaps during the development phase), not after the implementation.
Following implementation, a cost-benefit analysis or return on investment (ROI) should be reperformed to verify that the original business case benefits are delivered and business value is created.
An audit trail is a detailed record of the activities on a database or system. The audit trail should be activated during the implementation of the application, not during the postimplementation review.
Although updating the enterprise architecture (EA) diagrams is a good practice, it is not normally part of a postimplementation review.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Which of the following is the BEST way for an information systems (IS) auditor to determine the effectiveness of a security awareness and training program?

A.Review the security training program.
B.Ask the security administrator.
C.Interview a sample of employees.
D.Review the security reminders to employees.

A

C is the correct answer.

Justification
A security training program may be well designed, but the results of the program are determined by employee awareness.
Asking the security administrator does not show the effectiveness of a security awareness and training program, because such a program should target more than just the administrator.
Interviewing a sample of employees is the best way to determine the effectiveness of a security awareness and training program because overall awareness must be determined, and effective security is dependent on people. Reviewing the security training program would not be the ultimate indicator of the effectiveness of the awareness training.
Reviewing the security reminders to the employees is not the best way to find out the effectiveness of the training awareness, because sending reminders may result in little actual awareness.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Which of the following situations is addressed by a software escrow agreement?

A.The system administrator requires access to software to recover from a disaster.
B.A user requests to have software reloaded onto a replacement hard drive.
C.The vendor of custom-written software goes out of business.
D.An information systems (IS) auditor requires access to software code written by the organization.

A

C is the correct answer.

Justification
Access to software should be managed by an internally managed software library. Escrow refers to the storage of software with a third party—not the internal libraries.
Providing the user with a backup copy of software is not escrow. Escrow requires that a copy be kept with a trusted third party.
A software escrow is a legal agreement between a software vendor and a customer to guarantee access to source code. The application source code is held by a trusted third party, according to the contract. This agreement is necessary in the event that the software vendor goes out of business, there is a contractual dispute with the customer or the software vendor fails to maintain an update of the software as promised in the software license agreement.
Software escrow is used to protect the intellectual property of software developed by one organization and sold to another organization. This is not used for software being reviewed by an auditor of the organization that wrote the software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

An information systems (IS) auditor is reviewing database security for an organization. Which of the following is the MOST important consideration for database hardening?

A.The default configurations are changed.
B.All tables in the database are denormalized.
C.Stored procedures and triggers are encrypted.
D.The service port used by the database server is changed.

A

A is the correct answer.

Justification
Default database configurations, such as default passwords and services, need to be changed; otherwise, the database can be easily compromised by malicious code and by intruders.
The denormalization of a database is related more to performance than to security.
Limiting access to stored procedures is a valid security consideration but not as critical as changing default configurations.
Changing the service port used by the database is a component of the configuration changes that can be made to the database, but other more critical configuration changes should be made first.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

*An organization implemented an online customer help desk application using a software as a service (SaaS) operating model. An information systems (IS) auditor is asked to recommend the best control to monitor the service level agreement (SLA) with the SaaS vendor regarding availability. What is the BEST recommendation that the IS auditor can provide?

A.Ask the SaaS vendor to provide a weekly report on application uptime.
B.Implement an online polling tool to monitor the application and record outages.
C.Log all application outages reported by users and aggregate the outage time weekly.
D.Contract an independent third party to provide weekly reports on application uptime.

A

B is the correct answer.

Justification
Weekly application availability reports are useful, but these reports represent only the vendor’s perspective. While monitoring these reports, the organization can raise concerns of inaccuracy; however, without internal monitoring, such concerns cannot be substantiated.
Implementing an online polling tool to monitor and record application outages is the best option for an organization to monitor the software as a service application availability. Comparing internal reports with the vendor’s service level agreement (SLA) reports ensures that the vendor’s monitoring of the SLA is accurate and that all conflicts are appropriately resolved.
Logging the outage times reported by users is helpful but does not give a true picture of all outages of the online application. Some outages may go unreported, especially if the outages are intermittent.
Contracting a third party to implement availability monitoring is not a cost-effective option. Additionally, this results in a shift from monitoring the software as a service (SaaS) vendor to monitoring the third party.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

*An information systems (IS) auditor is verifying IT policies and finds that some of the policies have not been approved by management (as required by policy), but the employees strictly follow the policies. What should the IS auditor do FIRST?

A.Ignore the absence of management approval because employees follow the policies.
B.Recommend immediate management approval of the policies.
C.Emphasize the importance of approval to management.
D.Report the absence of documented approval.

A

D is the correct answer.

Justification
Absence of management approval is an important (material) finding and, although it is not currently an issue with relation to compliance because the employees are following the policy without approval, it may be a problem at a later time and should be resolved.
Although the information systems (IS) auditor would likely recommend that the policies should be approved as soon as possible and may also remind management of the critical nature of this issue, the first step is to report this issue to the relevant stakeholders.
The first step is to report the finding and provide recommendations later.
The IS auditor must report the finding. Unapproved policies may present a potential risk to the organization, even if they are being followed, because this technicality may prevent management from enforcing the policies in some cases and may present legal issues. For example, if an employee was terminated as a result of violating an organizational policy, and it was discovered that the policies had not been approved, the organization may face a lawsuit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

For which of the following controls would an information systems (IS) auditor look in an environment where duties cannot be appropriately segregated?

A.Overlapping controls
B.Boundary controls
C.Access controls
D.Compensating controls

A

D is the correct answer.

Justification
Overlapping controls are two controls addressing the same control objective or exposure. Because primary controls cannot be achieved when duties cannot or are not appropriately segregated, it is difficult to install overlapping controls.
Boundary controls establish the interface between the would-be user of a computer system and the computer system itself and are individual-based, not role-based, controls.
Access controls for resources are based on individuals and not on roles. For a lack of separation of duties, the information systems (IS) auditor expects to find that a person has higher levels of access than are ideal. The IS auditor wants to find compensating controls to address this risk.
Compensating controls are internal controls that are intended to reduce the risk of an existing or potential control weakness that may arise when duties cannot be appropriately segregated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

When reviewing a hardware maintenance program, an information systems (IS) auditor should assess whether:

A.the schedule of all unplanned maintenance is maintained.
B.it is in line with historical trends.
C.it has been approved by the IS steering committee.
D.the program is validated against vendor specifications.

A

D is the correct answer.

Justification
Unplanned maintenance cannot be scheduled.
Hardware maintenance programs do not necessarily need to be in line with historic trends.
Maintenance schedules normally are not approved by the steering committee.
Although maintenance requirements vary based on complexity and performance workloads, a hardware maintenance schedule should be validated against the vendor-provided specifications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

An information systems (IS) auditor reviewing a new outsourcing contract with a service provider would be MOST concerned if which of the following was missing?

A.A clause providing a right to audit the service provider
B.A clause defining penalty payments for poor performance
C.Predefined service level report templates
D.A clause regarding supplier limitation of liability

A

A is the correct answer.

Justification
The absence of a right to audit clause or other forms of attestation that the supplier is compliant with a certain standard would potentially prevent the information systems (IS) auditor from investigating any aspect of supplier performance moving forward, including control deficiencies, poor performance, and adherence to legal requirements. The absence of this clause would be a major concern for the IS auditor because it would be difficult for the organization to assess whether the appropriate controls were implemented.
Although a clear definition of penalty payment terms is desirable, not all contracts require the payment of penalties for poor performance. When performance penalties are required, these penalties are often subject to negotiation on a case-by-case basis. Therefore, the absence of this information is not as significant as a lack of right to audit.
Although the inclusion of service level report templates is desirable, if the requirement for service level reporting is included in the contract, the absence of predefined templates for reporting is not a significant concern.
The absence of a limitation of liability clause for the service provider exposes the provider to unlimited liability. This is to the advantage of the outsourcing organization so, although the IS auditor might highlight the absence of such a clause, it does not constitute a major concern.

58
Q

An information systems (IS) auditor is reviewing the software development process for an organization. Which of the following functions are appropriate for the end users to perform?

A.Program output testing
B.System configuration
C.Program logic specification
D.Performance tuning

A

A is the correct answer.

Justification
A user can test program output by checking the program input and comparing it with the system output. This task, although usually done by the programmer, can also be done effectively by the user.
System configuration is usually too technical to be accomplished by a user and this situation can create security issues and introduce a separation of duties issue.
Program logic specification is a very technical task that is normally performed by a programmer. A user performing this task can introduce a separation of duties issue.
Performance tuning also requires high levels of technical skill and cannot be effectively accomplished by a user. A user performing this task can introduce a separation of duties issue.

59
Q

Which of the following would normally be the MOST reliable evidence for an information systems (IS) auditor?

A.A confirmation letter received from a third party verifying an account balance
B.Assurance from line management that an application is working as designed
C.Trend data obtained from Internet sources
D.Ratio analysis developed by the IS auditor from reports supplied by line management

A

A is the correct answer.

Justification
Evidence obtained from independent third parties is almost always considered to be more reliable than assurance provided by local management.
Because management is not objective and may not understand the risk and control environment, and it is only providing evidence that the application is working correctly (not the controls), management assurance is not an acceptable level of trust for audit evidence.
Data collected from the Internet is not always trustworthy or independently validated.
Ratio analysis can identify trends and deviations from a baseline but is not reliable evidence.

60
Q

A long-term IT employee with a strong technical background and broad managerial experience has applied for a vacant position in the information systems (IS) audit department. Determining whether to hire this individual for this position should be PRIMARILY based on the individual’s experience and:

A.length of service because this will help ensure technical competence.
B.age because training in audit techniques may be impractical.
C.IT knowledge because this will bring enhanced credibility to the audit function.
D.ability, as an IS auditor, to be independent of existing IT relationships.

A

D is the correct answer.

Justification
Length of service does not ensure technical competency.
Evaluating an individual’s qualifications based on the age of the individual is not a good criterion and is illegal in many parts of the world.
The fact that the employee has worked in IT for many years may not ensure credibility. The information systems (IS) audit department’s needs should be defined, and any candidate should be evaluated against those requirements.
Independence should be continually assessed by the auditor and management. This assessment should consider such factors as changes in personal relationships, financial interests, and prior job assignments and responsibilities.

61
Q

*The information systems (IS) auditor is reviewing findings from a prior IS audit of a hospital. One finding indicates that the organization was using email to communicate sensitive patient issues. The IT manager indicates that to address this finding, the organization has implemented digital signatures for all email users. What should the IS auditor’s response be?

A.Digital signatures are not adequate to protect confidentiality.
B.Digital signatures are adequate to protect confidentiality.
C.The IS auditor should gather more information about the specific implementation.
D.The IS auditor should recommend implementation of digital watermarking for secure email.

A

A is the correct answer.

Justification
Digital signatures are designed to provide authentication and nonrepudiation for email and other transmissions but are not adequate for confidentiality. This implementation is not adequate to address the prior year’s finding.
Digital signatures do not encrypt message contents; therefore, an attacker who intercepts a message can read the message.
Although gathering additional information is always a good step before drawing a conclusion on a finding, in this case, the implemented solution does not provide confidentiality.
Digital watermarking is used to protect intellectual property rights for documents rather than to protect the confidentiality of email.

62
Q

An organization uses a bank to process its weekly payroll. Time sheets and payroll adjustment forms (e.g., hourly rate changes and terminations) are completed and delivered to the bank, which prepares the checks and reports for distribution. To BEST ensure payroll data accuracy:

A.payroll reports should be compared to input forms.
B.gross payroll should be recalculated manually.
C.checks should be compared to input forms.
D.checks should be reconciled with output reports.

A

A is the correct answer.

Justification
The best way to confirm data accuracy, when input is provided by the organization and output is generated by the bank, is to verify the data input (input forms) with the results of the payroll reports.
Recalculating gross payroll manually only verifies whether the processing is correct and not the data accuracy of inputs.
Comparing checks to input forms is not feasible because checks contain the processed information and input forms contain the input data.
Reconciling checks with output reports only confirms that checks were issued as stated on output reports.

63
Q

*An information systems (IS) auditor is validating a control that involves a review of system-generated exception reports. Which of the following is the BEST evidence of the effectiveness of the control?

A.Walk-through with the reviewer of the operation of the control
B.System-generated exception reports for the review period with the reviewer’s sign-off
C.A sample system-generated exception report for the review period, with follow-up action items noted by the reviewer
D.Management’s confirmation of the effectiveness of the control for the review period

A

C is the correct answer.

Justification
A walk-through highlights how a control is designed to work, but it seldom highlights the effectiveness of the control, or exceptions or constraints in the process.
Reviewer sign-off does not demonstrate the effectiveness of the control if the reviewer does not note follow-up actions for the exceptions identified.
A sample of a system-generated report with evidence that the reviewer followed up on the exceptions represents the best possible evidence of the effective operation of the control, because there is documented evidence that the reviewer reviewed the exception report and took actions based on the exception report.
Management’s confirmation of effectiveness of the control suffers from lack of independence—management might be biased toward the effectiveness of the controls put in place.

64
Q

Which of the following is the GREATEST risk of an inadequate policy definition for ownership of data and systems?

A.User management coordination does not exist.
B.Specific user accountability cannot be established.
C.Unauthorized users may have access to modify data.
D.Audit recommendations may not be implemented.

A

C is the correct answer.

Justification
The greatest risk is from unauthorized users being able to modify data. User management is important but not the greatest risk.
User accountability is important but not as great a risk as the actions of unauthorized users.
Without a policy defining who has the responsibility for granting access to specific systems, there is an increased risk that individuals can gain (be given) system access when they should not have authorization. The ability of unauthorized users to modify data is greater than the risk of authorized user accounts not being controlled properly.
The failure to implement audit recommendations is a management problem but not as serious as the ability of unauthorized users to make modifications.

65
Q

*Digital signatures require the:

A.signer to have a public key and the receiver to have a private key.
B.signer to have a private key and the receiver to have a public key.
C.signer and receiver to have a public key.
D.signer and receiver to have a private key.

A

B is the correct answer.

Justification
If a sender encrypts a message with a public key, it will provide confidential transmission to the receiver with the private key.
Digital signatures are intended to verify to a recipient the integrity of the data and the identity of the sender. The digital signature standard is based on the sender encrypting a digest of the message with their private key and the receiver validating the message with the public key.
Asymmetric key cryptography always works with key pairs. Therefore, a message encrypted with a public key can only be opened with a private key.
If both the sender and receiver have a private key there would be no way to validate the digital signature.

66
Q

Authorizing access to application data is the responsibility of the:

A.data custodian.
B.application administrator.
C.data owner.
D.security administrator.

A

C is the correct answer.

Justification
Data custodians are responsible only for storing and safeguarding the data according to the direction provided by the data owner.
An application administrator is responsible for managing the application itself, not determining who is authorized to access the data that it contains.
Data owners have authority to grant or withhold access to the data and applications for which they are responsible.
The security administrator may lead investigations and is responsible for implementing and maintaining information security policy, but not for authorizing data access.

67
Q

An information systems (IS) auditor finds that not all employees are aware of the enterprise’s information security policy. The IS auditor should conclude that:

A.this lack of knowledge may lead to unintentional disclosure of sensitive information.
B.information security is not critical to all functions.
C.IS audit should provide security training to the employees.
D.the audit finding will cause management to provide continuous training to staff.

A

A is the correct answer.

Justification
All employees should be aware of the enterprise’s information security policy to prevent unintentional disclosure of sensitive information. Training is a preventive control. Security awareness programs for employees can prevent unintentional disclosure of sensitive information to outsiders.
Information security is everybody’s business, and all staff should be trained in how to handle information correctly.
Providing security awareness training is not an information systems (IS) audit function.
Management may agree to or reject an audit finding. The IS auditor cannot be assured that management will act upon an audit finding unless they are aware of its impact; therefore, the auditor must report the risk associated with lack of security awareness.

68
Q

Which of the following is a KEY benefit of a control self-assessment (CSA)?

A.Management ownership of the internal controls supporting business objectives is reinforced.
B.Audit expenses are reduced when the assessment results are an input to external audit work.
C.Fraud detection is improved because internal business staff are engaged in testing controls.
D.Internal auditors can shift to a consultative approach by using the results of the assessment.

A

A is the correct answer.

Justification
The objective of control self-assessment (CSA) is to have business management become more aware of the importance of internal control and their responsibility in terms of corporate governance.
Reducing audit expenses is not a key benefit of CSA.
Improved fraud detection is important but not as important as control ownership. It is not a principal objective of CSA.
CSA may give more insights to internal auditors, allowing them to take a more consultative role; however, this is an additional benefit, not the key benefit.

69
Q

Data flow diagrams are used by information systems (IS) auditors to:

A.identify key controls.
B.highlight high-level data definitions.
C.graphically summarize data paths and storage.
D.portray step-by-step details of data generation.

A

C is the correct answer.

Justification
Identifying key controls is not the focus of data flow diagrams. The focus is the flow of data.
A data dictionary may be used to document data definitions, but the data flow diagram is used to document how data move through a process.
Data flow diagrams are used as aids to graph or chart data flow and storage. They trace data from their origination to their destination, highlighting the paths and storage of data.
The purpose of a data flow diagram is to track the movement of data through a process and is not primarily to document or indicate how data are generated.

70
Q

*An organization completed a business impact analysis (BIA) as part of business continuity planning. The NEXT step in the process is to develop:

A.a business continuity strategy.
B.a test and exercise plan.
C.a user training program.
D.the business continuity plan (BCP).

A

A is the correct answer.

Justification
A business continuity strategy is the next phase because it identifies the best way to recover. The criticality of the business process, the cost, the time required to recover, and security must be considered during this phase.
The recovery strategy and plan development precede the test plan.
Training can only be developed once the business continuity plan (BCP) is in place.
A strategy must be determined before the BCP is developed.

71
Q

An information systems (IS) auditor needs to review the procedures used to restore a software application to its state prior to an upgrade. Therefore, the auditor needs to assess the following:

A.Problem management procedures
B.Software development procedures
C.Back-out procedures
D.Incident management procedures

A

C is the correct answer.

Justification
Problem management procedures are used to track user feedback and issues related to the operation of an application for trend analysis and problem resolution.
Software development procedures, such as the software development life cycle (SDLC), are used to manage the creation or acquisition of new or modified software.
Back-out procedures are used to restore a system to a previous state and are an important element of the change control process. The other choices are not related to the change control process, which specifies what procedures should be followed when software is being upgraded but does not work and requires a fallback to its former state.
Incident management procedures are used to manage errors or problems with system operation. A help desk usually uses them. One of the incident management procedures may be how to follow a fallback plan.

72
Q

*An information systems (IS) auditor conducting a review of software usage and licensing discovers that numerous PCs contain unauthorized software. Which of the following actions should the IS auditor take?

A.Delete all copies of the unauthorized software.
B.Recommend an automated process to monitor for compliance with software licensing.
C.Report the use of the unauthorized software and the need to prevent recurrence.
D.Warn the end users about the risk of using illegal software.

A

C is the correct answer.

Justification
An information systems (IS) auditor should not assume the role of the enforcing officer and take on any personal involvement in removing the unauthorized software.
This would detect compliance with software licensing; however, an automated solution might not be the best option in all cases.
The use of unauthorized or illegal software should be prohibited by an organization. An IS auditor must convince the user and management of the risk and the need to eliminate the risk. For example, software piracy can result in exposure and severe fines.
Auditors must report material findings to management for action. Informing the users of risk is not the primary responsibility of the IS auditor.

73
Q

Which of the following is the BEST method for determining the criticality of each application system in the production environment?

A.Interview the application programmers.
B.Perform a gap analysis.
C.Review the most recent application audits.
D.Perform a business impact analysis (BIA).

A

D is the correct answer.

Justification
Interviews with the application programmers provide limited information related to the criticality of the systems.
A gap analysis is relevant to system development and project management but does not determine application criticality.
The audits may not contain the required information about application criticality or may not have been done recently.
A business impact analysis (BIA) gives the impact of the loss of each application. A BIA is conducted with representatives of the business that can accurately describe the criticality of a system and its importance to the business.

74
Q

*In evaluating programmed controls over password management, which of the following is the information systems (IS) auditor MOST likely to rely on?

A.Size check
B.Hash total
C.Validity check
D.Field check

A

C is the correct answer.

Justification
A size check is useful because passwords should have a minimum length, but it is not as strong of a control as validity.
Passwords are not typically entered in a batch mode, so a hash total would not be effective. More important, a system should not accept incorrect values of a password, so a hash total as a control will not indicate any weak passwords, errors or omissions.
A validity check is the most useful check for the verification of passwords because it verifies that the required format has been used—for example, not using a dictionary word and including nonalphabetical characters. An effective password must have several different types of characters: alphabetical, numeric and special.
The implementation of a field check is not as effective as a validity check that verifies that all password criteria have been met.

75
Q

Which of the following MOST effectively reduces social engineering incidents?

A.Security awareness training
B.Increased physical security measures
C.Email monitoring policy
D.Intrusion detection systems (IDSs)

A

A is the correct answer.

Justification
Social engineering exploits human nature and weaknesses to obtain information and access privileges. By increasing employee awareness of security issues, it is possible to reduce the number of successful social engineering incidents.
In most cases, social engineering incidents do not require the physical presence of the intruder. Therefore, increased physical security measures would not prevent the incident.
An email monitoring policy informs users that all email in the organization is subject to monitoring; it does not protect the users from potential security incidents and intruders.
Intrusion detection systems (IDSs) are used to detect irregular or abnormal traffic patterns.

76
Q

The use of residual biometric information to gain unauthorized access is an example of which of the following attacks?

A.Replay
B.Brute force
C.Cryptographic
D.Mimic

A

A is the correct answer.

Justification
Residual biometric characteristics, such as fingerprints left on a biometric capture device, may be reused by an attacker to gain unauthorized access.
A brute force attack involves feeding the biometric capture device numerous different biometric samples.
A cryptographic attack targets the algorithm or the encrypted data.
In a mimic attack, the attacker reproduces characteristics similar to those of the enrolled user such as forging a signature or imitating a voice.

76
Q

Which of the following types of penetration tests simulates a real attack and is used to test incident handling and response capability of the target?

A.Blind testing
B.Targeted testing
C.Double-blind testing
D.External testing

A

C is the correct answer.

Justification
Blind testing is also known as black-box testing. This refers to a test where the penetration tester is not given any information and is forced to rely on publicly available information. This test simulates a real attack, except that the target organization is aware of the test being conducted.
Targeted testing is also known as white-box testing. This refers to a test where the penetration tester is provided with information and the target organization is also aware of the testing activities. In some cases, the tester is also provided with a limited-privilege account to be used as a starting point.
Double-blind testing is also known as zero-knowledge testing. This refers to a test where the penetration tester is not given any information and the target organization is not given any warning—both parties are blind to the test. This is the best scenario for testing response capability because the target will react as if the attack were real.
External testing refers to a test where an external penetration tester launches attacks on the target’s network perimeter from outside the target network (typically from the Internet).

77
Q

The PRIMARY objective of the audit initiation meeting with an information systems (IS) audit client is to:

A.discuss the scope of the audit.
B.identify resource requirements of the audit.
C.select the methodology of the audit.
D.collect audit evidence.

A

A is the correct answer.

Justification
The primary objective of the initiation meeting with an audit client is to help define the scope of the audit.
Determining the resource requirements of the information systems (IS) audit is typically done by IS audit management during the early planning phase of the project rather than at the initiation meeting.
Selecting the methodology of the audit is not normally an objective of the initiation meeting.
For most audits, collecting audit evidence is performed during the course of the engagement and is not normally collected during the initiation meeting.

78
Q

Which of the following is the MOST effective way to prevent accidental data loss caused by employees?

A.Blocking access to all external websites and email domains
B.Encrypting all sensitive data on all storage devices within the enterprise
C.Conducting regular user awareness training programs
D.Implementing strict access controls to restrict employee access to sensitive data

A

C is the correct answer.

Justification
Blocking access to all external websites and email domains does not prevent all accidental data loss, such as data backup taken following incorrect procedures. The most effective way to prevent such incidents is to educate and train employees on the importance of data protection policies and procedures. Moreover, blocking access to external websites and email domains may hinder business operations and productivity.
Encrypting all sensitive data on all storage devices may not be practical or necessary for all types of data.
Accidental data loss caused by employees is a common occurrence in many enterprises. Regular training and awareness programs can help employees understand their roles and responsibilities in protecting sensitive data, identify potential risk and vulnerabilities, and take appropriate measures to prevent data loss incidents. Employee training and awareness are critical to any data protection strategy. Employees need to understand the value of the information that they handle, the consequences of data loss and their role in data protection. Regular training and awareness sessions should be conducted to keep employees updated about best practices for handling and protecting data.
Strict access controls can help prevent unauthorized access to sensitive data but may not address the risk of accidental data loss caused by authorized users.

79
Q

Which of the following is the BEST factor for determining the required extent of data collection during the planning phase of an information systems (IS) compliance audit?

A.Complexity of the organization’s operation
B.Findings and issues noted from the prior year
C.Purpose, objective and scope of the audit
D.Auditor’s familiarity with the organization

A

C is the correct answer.

Justification
The complexity of the organization’s operation is a factor in the planning of an audit but does not directly affect the determination of how much data to collect. The extent of data collection is subject to the intensity, scope and purpose of the audit.
Prior findings and issues are factors in the planning of an audit but do not directly affect the determination of how much data to collect. Data must be collected outside of areas of previous findings.
The extent to which data will be collected during an information systems (IS) audit is related directly to the purpose, objective and scope of the audit. An audit with a narrow purpose and limited objective and scope is most likely to result in less data collection than an audit with a wider purpose and scope. Statistical analysis may also determine the extent of data collection, such as sample size or means of data collection.
An auditor’s familiarity with the organization is a factor in the planning of an audit but does not directly affect the determination of how much data to collect. The audit must be based on sufficient evidence of the monitoring of controls and not unduly influenced by the auditor’s familiarity with the organization.

80
Q

When determining the acceptable time period for the resumption of critical business processes:

A.only downtime costs need to be considered.
B.recovery operations should be analyzed.
C.both downtime costs and recovery costs need to be evaluated.
D.indirect downtime costs should be ignored.

A

C is the correct answer.

Justification
Downtime costs cannot be looked at in isolation. The quicker information assets can be restored and business processing resumed, the smaller the downtime costs. However, the expenditure needed to have the redundant capability that is required to rapidly recover information resources might be prohibitive for nonessential business processes.
Recovery operations alone do not determine the acceptable time period for the resumption of critical business processes, and indirect downtime costs should be considered in addition to the direct cash outflows incurred due to business disruption.
Downtime costs and recovery costs need to be evaluated in determining the acceptable time period before the resumption of critical business processes. The outcome of the business impact analysis should be a recovery strategy that represents the optimal balance.
The indirect costs of a serious disruption to normal business activity (e.g., loss of customer and supplier goodwill and loss of market share) may actually be more significant than direct costs over time, thus reaching the point where business viability is threatened.

81
Q

An information systems (IS) auditor is evaluating a virtual-machine-based architecture used for all programming and testing environments. The production architecture is a three-tier physical architecture. What is the MOST important IT control to test to ensure availability and confidentiality of the web application in production?

A.Server configuration has been hardened appropriately.
B.Allocated physical resources are available.
C.System administrators are trained to use the virtual machine (VM) architecture.
D.The VM server is included in the disaster recovery plan.

A

A is the correct answer.

Justification
The most important control to test in this configuration is the server configuration hardening. It is important to patch known vulnerabilities and to disable all nonrequired functions before production, especially when production architecture is different from development and testing architecture.
The greatest risk is associated with the difference between the testing and production environments. Ensuring that physical resources are available is a relatively low risk and easily addressed.
Virtual machines (VMs) are often used for optimizing programming and testing infrastructure. In this scenario, the development environment (VM architecture) is different from the production infrastructure (physical three-tier). Because the VMs are not related to the web application in production, there is no real requirement for the system administrators to be familiar with a virtual environment.
Because the VMs are only used in a development environment and not in production, it may not be necessary to include VMs in the disaster recovery plan.

82
Q

*Which of the following choices is the PRIMARY benefit of requiring a steering committee to oversee IT investment?

A.To conduct a feasibility study to demonstrate IT value
B.To ensure that investments are made according to business requirements
C.To ensure that proper security controls are enforced
D.To ensure that a standard development methodology is implemented

A

B is the correct answer.

Justification
A steering committee may use a feasibility study in its reviews; however, it is not responsible for performing/conducting the study.
A steering committee consists of representatives from the business and IT and ensures that IT investment is based on business objectives rather than on IT priorities.
The steering committee is not responsible for enforcing security controls.
The steering committee is not responsible for implementing development methodologies.

83
Q

The BEST method of confirming the accuracy of a system tax calculation is by:

A.review and analysis of the source code of the calculation programs.
B.recreating program logic using generalized audit software to calculate monthly totals.
C.preparing simulated transactions for processing and comparing the results to predetermined results.
D.automatic flowcharting and analysis of the source code of the calculation programs.

A

C is the correct answer.

Justification
A review of source code is not an effective method of ensuring that the calculation is being computed correctly.
Recreating program logic may lead to errors, and monthly totals are not accurate enough to ensure correct computations.
Preparing simulated transactions for processing and comparing the results to predetermined results is the best method for confirming the accuracy of a tax calculation.
Flowcharting and analysis of source code are not effective methods to address the accuracy of individual tax calculations.

84
Q

The internal audit department wrote some scripts that are used for continuous auditing. The IT department asked for copies of the scripts so that they can be used for setting up a continuous monitoring process on key systems. Considering the ability of the information systems (IS) auditors to independently and objectively audit the IT function, should sharing these scripts be permitted?

A.Sharing the scripts is not permitted because it gives IT the ability to pre-audit systems and avoid an accurate, comprehensive audit.
B.Sharing the scripts is required because IT must have the ability to review all programs and software that run on information systems regardless of audit independence.
C.Sharing the scripts is permissible if IT recognizes that audits may be conducted in areas not covered in the scripts.
D.Sharing the scripts is not permitted because the IS auditors who wrote the scripts would not be permitted to audit any information systems where the scripts are being used for monitoring.

A

C is the correct answer.

Justification
The ability of IT to continuously monitor and address any issues on IT systems does not affect the ability of information systems (IS) audit to perform a comprehensive audit.
Sharing the scripts may be required by policy for quality assurance and configuration management, but that does not impair the ability to audit.
IS audit may not be able to review the effectiveness of the scripts, but it can still audit all aspects of the systems.
An audit of an IS system encompasses more than just the controls covered in the scripts.

85
Q

*An information systems (IS) auditor discovers that the chief information officer (CIO) of an enterprise is using a wireless broadband modem using global system for mobile communications (GSM) technology. This modem is being used to connect the CIO’s laptop to the enterprise virtual private network when the CIO travels outside of the office. The IS auditor should:

A.do nothing because the inherent security features of GSM technology are appropriate.
B.recommend that the CIO stop using the laptop computer until encryption is enabled.
C.ensure that media access control (MAC) address filtering is enabled on the network so that unauthorized wireless users cannot connect.
D.suggest that multifactor authentication be used over the wireless link to prevent unauthorized communications.

A

A is the correct answer.

Justification
The inherent security features of global system for mobile communications (GSM) technology combined with the use of a virtual private network (VPN) are appropriate. The confidentiality of the communication on the GSM radio link is ensured by the use of encryption, and the use of a VPN signifies that an encrypted session is established between the laptop and the enterprise network. GSM is a global standard for cellular telecommunications that can be used for voice and data. Currently deployed commercial GSM technology has multiple overlapping security features that prevent eavesdropping, session hijacking and unauthorized use of the GSM carrier network. While other wireless technologies such as 802.11 wireless local area network (LAN) technologies have been designed to allow the user to adjust or even disable security settings, GSM does not allow any devices to connect to the system unless all relevant security features are active and enabled.
Because the chief information officer (CIO) is using a VPN, it can be assumed that encryption is enabled in addition to the security features in GSM. VPNs do not allow the transfer of data for storage on the remote device (such as the CIO’s laptop).
Media access control (MAC) filtering can be used on a wireless LAN but does not apply to a GSM network device.
Because the GSM network is being used rather than a wireless LAN, it is not possible to configure settings for multifactor authentication over the wireless link. However, in other technology configurations, multifactor authentication is recommended because it will better protect against unauthorized access than single-factor authentication.

86
Q

*Which of the following is the MOST significant function of an enterprise public key infrastructure and certificate authority employing X.509 digital certificates?

A.It provides the public/private key set for the encryption and signature services used by email and file space.
B.It binds a digital certificate and its public key to an individual subscriber’s identity.
C.It provides the authoritative source for employee identity and personal details.
D.It provides the authoritative authentication source for object access.

A

B is the correct answer.

Justification
Although some email applications depend on public key infrastructure (PKI)-issued certificates for nonrepudiation, the purpose of PKI is to provide authentication of the individual and link an individual with their private key. The certificate (certification) authority (CA) does not ordinarily create the user’s private key.
PKI is primarily used to gain assurance that protected data or services originated from a legitimate source. The process to ensure the validity of the subscriber identity by linking to the digital certificate/public key is strict and rigorous.
Personal details are not stored in or provided by components in the PKI.
Authentication services within operating systems and applications may be built on PKI-issued certificates, but PKI does not provide authentication services for object access.

87
Q

*In transport mode, the use of the encapsulation security payload (ESP), protocol is advantageous over the authentication header protocol because it provides:

A.connectionless integrity.
B.data origin authentication.
C.antireplay service.
D.confidentiality.

A

D is the correct answer.

Justification
Both forms of Internet Protocol security (IPSec), authentication header (AH) and encapsulation security payload (ESP), provide connectionless integrity.
Both AH and ESP authenticate data origin.
The time stamps used in IPSec prevent replay attacks.
Only the ESP protocol provides confidentiality via encryption.

88
Q

Before implementing an IT balanced scorecard, an organization must:

A.deliver effective and efficient services.
B.define key performance indicators.
C.provide business value to IT projects.
D.control IT expenses.

A

B is the correct answer.

Justification
A balanced scorecard (BSC) is a method of specifying and measuring the attainment of strategic results. It measures the delivery of effective and efficient services, but an organization may not have those in place prior to using a BSC.
Because a BSC is a way to measure performance, a definition of key performance indicators is required before implementing an IT BSC.
A BSC measures the value of IT to business, not the other way around.
A BSC measures the performance of IT, but the control over IT expenses is not a key requirement for implementing a BSC.

89
Q

*When reviewing system parameters, an information systems (IS) auditor’s PRIMARY concern should be that:

A.they are set to meet both security and performance requirements.
B.changes are recorded in an audit trail and periodically reviewed.
C.changes are authorized and supported by appropriate documents.
D.access to parameters in the system is restricted.

A

A is the correct answer.

Justification
The primary concern is to find the balance between security and performance. Recording changes in an audit trail and periodically reviewing them is a detective control; however, if parameters are not set according to business rules, monitoring of changes may not be an effective control.
Reviewing changes to ensure that they are supported by appropriate documents is also a detective control.
If parameters are set incorrectly, the related documentation and the fact that these are authorized does not reduce the impact.
Restriction of access to parameters ensures that only authorized staff can access the parameters; however, if the parameters are set incorrectly, restricting access will still have an adverse impact.

90
Q

*While reviewing the process for continuous monitoring of the capacity and performance of IT resources, an information systems (IS) auditor should PRIMARILY ensure that the process is focused on which of the following?

A.Adequately monitoring service levels of IT resources and services
B.Providing data to enable timely planning for capacity and performance requirements
C.Providing accurate feedback on IT resource capacity
D.Properly forecasting performance, capacity and throughput of IT resources

A

C is the correct answer.

Justification
Continuous monitoring helps to ensure that service level agreements (SLAs) are met, but this is not the primary focus of monitoring. It is possible that even if a system were offline, it would meet the requirements of an SLA. Therefore, accurate availability monitoring is more important.
data gained from capacity and performance monitoring is an input to the planning process, the primary focus is to monitor availability.
Accurate capacity monitoring of IT resources is a critical element of a continuous monitoring process.
Although continuous monitoring helps management to predict likely IT resource capabilities, the more critical issue is that availability monitoring is accurate.

91
Q

Which of the following groups is the BEST source of information for determining the criticality of application systems as part of a business impact analysis (BIA)?

A.Business processes owners
B.IT management
C.Senior business management
D.Industry experts

A

A is the correct answer.

Justification
Business process owners have the most relevant information to contribute because the business impact analysis (BIA) is designed to evaluate criticality and recovery timelines, based on business needs.
Although IT management must be involved, it may not be fully aware of the business processes that need to be protected.
Although senior management must be involved, it may not be fully aware of the criticality of applications that need to be protected.
The BIA depends on the organization’s unique business needs, and the advice of industry experts is of limited value.

92
Q

*Which audit technique provides the BEST evidence of the separation of duties in an IT department?

A.Discussion with management
B.Review of the organization chart
C.Observation and interviews
D.Testing of user access rights

A

C is the correct answer.

Justification
Management may not be aware of the detailed functions of each employee in the IT department and whether the controls are being followed. Therefore, discussion with management provides only limited information regarding separation of duties.
An organization chart does not provide details of the functions of the employees or whether the controls are working correctly.
Based on the observations and interviews, the information systems (IS) auditor can evaluate the separation of duties. By observing the IT staff performing their tasks, an IS auditor can identify whether they are performing any incompatible operations. By interviewing the IT staff, the auditor can get an overview of the tasks performed.
Testing of user rights provides information about the rights users have within the information systems but does not provide complete information about the functions they perform. Observation is a better option because user rights can be changed between audits.

93
Q

To support an organization’s goals, an IT department should have:

A.a low-cost philosophy.
B.long- and short-term plans.
C.leading-edge technology.
D.plans to acquire new hardware and software.

A

B is the correct answer.

Justification
A low-cost philosophy is one objective, but more important is the cost-benefit and the relation of IT investment cost to business strategy.
To ensure its contribution to the realization of an organization’s overall goals, the IT department should have long- and short-range plans that are consistent with the organization’s broader and strategic plans for attaining its goals.
Leading-edge technology is an objective, but IT plans are needed to ensure that those plans are aligned with organizational goals.
Plans to acquire new hardware and software can be a part of the overall plan but are required only if hardware or software is needed to achieve the organizational goals.

94
Q

*Web application developers occasionally use hidden fields on web pages to save information about a client session. This technique is used to store session variables that enable persistence across web pages, such as maintaining the contents of a shopping cart on a retail website application. The MOST likely web-based attack due to this practice is:

A.parameter tampering.
B.cross-site scripting.
C.cookie poisoning.
D.stealth commanding.

A

A is the correct answer.

Justification
Web application developers sometimes use hidden fields to save information about a client session or to submit hidden parameters, such as the language of the end user, to the underlying application. Because hidden form fields do not display in the browser, developers may feel safe passing unvalidated data in the hidden fields (to be validated later). This practice is not safe because an attacker can intercept, modify and submit requests, which can discover information or perform functions that the web developer never intended. The malicious modification of web application parameters is known as parameter tampering.
Cross-site scripting involves the compromise of the web page to redirect users to content on the attacker website. The use of hidden fields has no impact on the likelihood of a cross-site scripting attack because these fields are static content that cannot ordinarily be modified to create this type of attack.
Web applications use cookies to save session state information on the client machine so that the user does not need to log on every time a page is visited. Cookie poisoning refers to the interception and modification of session cookies to impersonate the user or steal logon credentials. The use of hidden fields has no relation to cookie poisoning.
Stealth commanding is the hijacking of a web server by the installation of unauthorized code. Although the use of hidden forms may increase the risk of server compromise, the most common server exploits involve vulnerabilities of the server operating system or web server.

95
Q

Which of the following is widely accepted as one of the critical components in networking management?

A.Configuration and change management
B.Topological mappings
C.Application of monitoring tools
D.Proxy server troubleshooting

A

A is the correct answer.

Justification
Configuration management is widely accepted as one of the key components of any network because it establishes how the network will function internally and externally. It also deals with the management of configuration and monitoring performance. Change management ensures that the setup and management of the network are done properly, including managing changes to the configuration, removing default passwords and possibly hardening the network by disabling unneeded services.
Topological mappings provide outlines of the components of the network and its connectivity. This is important to address issues such as single points of failure and proper network isolation, but it is not the most critical component of network management.
Application monitoring is not a critical part of network management.
Proxy server troubleshooting is used for troubleshooting purposes, and managing a proxy is only a small part of network management.

96
Q

Regression testing is undertaken PRIMARILY to ensure that:

A.system functionality meets customer requirements.
B.a new system can operate in the target environment.
C.applicable development standards have been maintained.
D.applied changes have not introduced new errors.

A

D is the correct answer.

Justification
Validation testing is used to test the functionality of the system against detailed requirements to ensure that software construction is traceable to customer requirements.
Sociability testing is used to see whether the system can operate in the target environment without adverse impacts on the existing systems.
Software quality assurance and code reviews are used to determine whether development standards are maintained.
Regression testing is used to test for the introduction of new errors in the system after changes have been applied.

97
Q

What is the MAJOR benefit of conducting a control self-assessment (CSA) over a traditional audit?

A.It detects risk sooner.
B.It replaces the internal audit function.
C.It reduces the audit workload.
D.It reduces audit resource requirements.

A

A is the correct answer.

Justification
Control self-assessments (CSAs) require employees to assess the control stature of their own function. CSAs help to increase the understanding of business risk and internal controls. Because they are conducted more frequently than audits, CSAs help to identify risk in a timelier manner.
CSAs do not replace the internal audit function; an audit must still be performed to ensure that controls are present.
CSAs may not reduce the audit function’s workload and are not a major difference between the two approaches.
CSAs do not affect the need for audit resources. Although the results of the CSA may serve as a reference point for the audit process, they do not affect the scope or depth of audit work that needs to be performed.

98
Q

In planning an information systems (IS) audit, the MOST critical step is the identification of the:

A.areas of significant risk.
B.skill sets of the audit staff.
C.test steps in the audit.
D.time allotted for the audit.

A

A is the correct answer.

Justification
When designing a risk-based audit plan, it is important to identify the areas of highest risk to determine the areas to be audited.
The skill sets of the audit staff should have been considered before deciding and selecting the audit. Where the skills are inadequate, the organization should consider using external resources.
Test steps for the audit are not as critical during the audit planning process as identifying the areas of risk that should be audited.
The time allotted for an audit is determined during the planning process based on the areas to be audited and is primarily based on the requirement for conducting an appropriate audit.

99
Q

An information systems (IS) auditor has been assigned to conduct a test that compares job run logs to computer job schedules. Which of the following observations would be the GREATEST concern to the IS auditor?

A.There are a growing number of emergency changes.
B.There were instances when some jobs were not completed on time.
C.There were instances when some jobs were overridden by computer operators.
D.Evidence shows that only scheduled jobs were run.

A

C is the correct answer.

Justification
Emergency changes are acceptable if they are properly documented as part of the process.
Instances of jobs not being completed on time are a potential issue and should be investigated, but it is not the greatest concern.
The overriding of computer processing jobs by computer operators can lead to unauthorized changes to data or programs. This is a control concern; thus, it is always critical.
The audit should find that all scheduled jobs were run and that any exceptions were documented. This is not a violation.

100
Q

Effective IT governance ensures that the IT plan is consistent with the organization’s:

A.business plan.
B.audit plan.
C.security plan.
D.investment plan.

A

A is the correct answer.

Justification
To govern IT effectively, IT and business should be moving in the same direction, requiring that the IT plans are aligned with an organization’s business plans.
The audit plan is not part of the IT plan.
The security plan is not a responsibility of IT and does not need to be consistent with the IT plan.
The investment plan is not part of the IT plan.

101
Q

An information systems (IS) auditor is reviewing IT projects for a large enterprise and wants to determine whether the IT projects undertaken in a given year are those which have been assigned the highest priority by the business and which will generate the greatest business value. Which of the following is MOST relevant?

A.Capability maturity model (CMM)
B.Portfolio management
C.Configuration management
D.Project management body of knowledge

A

B is the correct answer.

Justification
A capability maturity model (CMM) is a means of assessing the relative maturity of the IT processes within an organization, running from Level 0 (Incomplete—processes are not implemented or fail to achieve their purpose) to Level 5 (Optimizing—metrics are defined and measured, and continuous improvement techniques are in place). It does not help determine the optimal portfolio of capital projects, because it assesses the maturity of the processes.
Portfolio management is designed to assist in the definition, prioritization, approval and running of a set of projects within a given organization. These tools offer data capture, workflow and scenario planning functionality, which can help identify the optimum set of projects (from the full set of ideas) to take forward within a given budget.
A configuration management database, which stores the configuration details for an organization’s IT systems, is an important tool for IT service delivery and, in particular, change management. A configuration management database may provide information that would influence the prioritization of projects but is not designed for that purpose.
The project management body of knowledge is a methodology for the management and delivery of projects. It offers no specific guidance or assistance for optimizing a project portfolio.

102
Q

Which of the following forms of evidence does an information systems (IS) auditor consider the MOST reliable?

A.An oral statement from the auditee
B.The results of a test that is performed by an external information systems (IS) auditor
C.An internally generated computer accounting report
D.A confirmation letter that is received from an outside source

A

B is the correct answer.

Justification
An oral statement from the auditee is audit evidence but not as reliable as the results of a test that is performed by an external information systems (IS) auditor.
An independent test that is performed by an IS auditor should always be considered a more reliable source of evidence than a confirmation letter from a third party, because the letter is the result of an analysis of the process and may not be based on authoritative audit techniques. An audit should consist of a combination of inspection, observation and inquiry by an IS auditor as determined by risk. This provides a standard methodology and reasonable assurance that the controls and test results are accurate.
An internally generated computer accounting report is audit evidence but is not as reliable as the results of a test performed by an external IS auditor.
An independent test performed by an IS auditor should always be considered a more reliable source of evidence than a confirmation letter from a third party, because a letter is subjective and may not have been generated as a part of an authoritative audit or conform to audit standards.

103
Q

*Who should review and approve system deliverables as they are defined and accomplished, to ensure the successful completion and implementation of a new business system application?

A.User management
B.Project steering committee
C.Senior management
D.Quality assurance (QA) staff

A

A is the correct answer.

Justification
User management assumes ownership of the project and resulting system, allocates qualified representatives to the team, and actively participates in system requirements definition, acceptance testing and user training. User management should review and approve system deliverables as they are defined and accomplished or implemented.
A project steering committee provides overall direction, ensures appropriate representation of the major stakeholders in the project’s outcome, reviews project progress regularly and holds emergency meetings when required. A project steering committee is ultimately responsible for all deliverables, project costs and schedules.
Senior management demonstrates commitment to the project and approves the necessary resources to complete the project. This commitment from senior management helps to ensure involvement by those who are needed to complete the project.
Quality assurance (QA) staff review results and deliverables within each phase, and, at the end of each phase, confirm compliance with standards and requirements. The timing of reviews depends on the system development life cycle (SDLC), the impact of potential deviation methodology used, the structure and magnitude of the system, and the impact of potential deviation.

104
Q

The PRIMARY purpose for meeting with auditees prior to formally closing a review is to:

A.confirm that the auditors did not overlook any important issues.
B.gain agreement on the findings.
C.receive feedback on the adequacy of the audit procedures.
D.test the structure of the final presentation.

A

B is the correct answer.

Justification
The closing meeting identifies any misunderstandings or errors in the audit but does not identify any important issues overlooked in the audit.
The primary purpose for meeting with auditees prior to formally closing a review is to gain agreement on the findings and responses from management.
The closing meeting may obtain comments from management on the conduct of the audit but is not intended to be a formal review of the adequacy of the audit procedures.
The structure of an audit report and the presentation follows accepted standards and practices. The closing meeting may indicate errors in the audit or presentation but is not intended to test the structure of the presentation.

105
Q

*Which of the following would an information systems (IS) auditor use to determine if unauthorized modifications were made to production programs?

A.System log analysis
B.Compliance testing
C.Forensic analysis
D.Analytical review

A

B is the correct answer.

Justification
System log analysis identifies changes and activity on a system but does not identify whether the change was authorized unless conducted as a part of a compliance test.
To determine that only authorized modifications are made to production programs requires the change management process to be reviewed to evaluate the existence of a trail of documentary evidence. Compliance testing helps to verify that the change management process has been applied consistently.
Forensic analysis is a specialized technique for criminal investigation.
An analytical review assesses the general control environment of an organization.

106
Q

*Which of the following is the BEST control over a guest wireless ID that is given to vendor staff?

A.Assignment of a renewable user ID that expires daily.
B.A write-once log to monitor the vendor’s activities on the system.
C.Use of a user ID format similar to that used by employees.
D.Ensuring that wireless network encryption is configured properly.

A

A is the correct answer.

Justification
A renewable user ID that expires daily is a good control because it ensures that wireless access will automatically terminate daily and cannot be used without authorization.
Although it is recommended to monitor vendor activities while vendor staff are on the system, this is a detective control and, thus, is not as strong as a preventive control.
The user ID format does not change the overall security of the wireless connection.
Controls related to the encryption of the wireless network are important; however, access to that network is a more critical issue.

107
Q

*A business unit has selected a new accounting application and did not consult with IT early in the selection process. The PRIMARY risk is that the:

A.security controls of the application may not meet requirements.
B.application may not meet the requirements of the business users.
C.application technology may be inconsistent with the enterprise architecture.
D.application may create unanticipated support issues for IT.

A

C is the correct answer.

Justification
Although security controls should be a requirement for any application, the primary focus of the enterprise architecture (EA) is to ensure that new applications are consistent with enterprise standards. Although the use of standard supported technology may be more secure, this is not the primary benefit of the EA.
When selecting an application, the business requirements and the suitability of the application for the IT environment must be considered. If the business unit selects its application without IT involvement, it is more likely to choose a solution that fits its business process the best with less emphasis on how compatible and supportable the solution will be in the enterprise, and this is not a concern.
The primary focus of the EA is to ensure that technology investments are consistent with the platform, data and development standards of the IT organization. The EA defines both a current and future state in areas such as the use of standard platforms, databases or programming languages. If a business unit selected an application using a database or operating system that is not part of the EA for the business, this increases the cost and complexity of the solution and ultimately delivers less value to the business.
Although any new software implementation may create support issues, the primary benefit of the EA is ensuring that the IT solutions deliver value to the business. Decreased support costs may be a benefit of the EA, but the lack of IT involvement in this case does not affect the support requirements.

108
Q

Which of the following types of risk is MOST likely encountered in a software as a service (SaaS) environment?

A.Noncompliance with software license agreements
B.Performance issues due to Internet delivery method
C.Higher cost due to software licensing requirements
D.Higher cost due to the need to update to compatible hardware

A

B is the correct answer.

Justification
Software as a service (SaaS) is provisioned on a usage basis and the number of users is monitored by the SaaS provider; therefore, there should be no risk of noncompliance with software license agreements.
The risk that can be most likely encountered in a SaaS environment is speed and availability issues because SaaS relies on the Internet for connectivity.
The costs for a SaaS solution should be fixed as a part of the services contract and considered in the business case presented to management for approval of the solution.
The open design and Internet connectivity allow most SaaS to run on any type of hardware.

109
Q

*Which of the following is the initial step in creating a firewall policy?

A.A cost-benefit analysis of methods for securing the applications
B.Identification of network applications to be externally accessed
C.Identification of vulnerabilities associated with network applications to be externally accessed
D.Creation of an application traffic matrix showing protection methods

A

B is the correct answer.

Justification
Identifying methods to protect against identified vulnerabilities and their comparative cost-benefit analysis is the third step.
Identification of the applications required across the network should be the initial step. After identification, depending on the physical location of these applications in the network and the network model, the person in charge is able to understand the need for, and possible methods of, controlling access to these applications.
Having identified the externally accessed applications, the second step is to identify vulnerabilities (weaknesses) associated with the network applications.
The fourth step is to analyze the application traffic and create a matrix showing how each type of traffic will be protected.

110
Q

*A batch transaction job failed in production; however, the same job returned no issues during user acceptance testing (UAT). Analysis of the production batch job indicates that it was altered after UAT. What control provides a mitigation for this risk?

A.Improve regression test cases.
B.Activate audit trails for a limited period after release.
C.Conduct an application user access review.
D.Implement a segregation/separation of duties (SoD) policy.

A

D is the correct answer.

Justification
Improving the quality of the testing is not applicable in this case, because the more important issue is that developers have access to the production environment.
Activating audit trails or performing additional logging may be useful; however, the more important issue is that developers have access to the production environment.
Conducting an application user access review does not identify developers’ access to code because they are not included in this review.
To ensure proper segregation/separation of duties (SoD), developers should be restricted to the development environment only. If code needs to be modified after user acceptance testing, the process must be restarted in development.

111
Q

Which of the following line media would provide the BEST security for a telecommunication network?

A.Broadband network digital transmission
B.Baseband network
C.Dialup
D.Dedicated lines

A

D is the correct answer.

Justification
The secure use of broadband communications is subject to whether the network is shared with other users, the data are encrypted and the risk of network interruption.
A baseband network is one that is usually shared with many other users and requires encryption of traffic but still may allow some traffic analysis by an attacker.
A dial-up line is fairly secure because it is a private connection, but it is too slow to be considered for most commercial applications today.
Dedicated lines are set apart for a particular user or organization. Because there is no sharing of lines or intermediate entry points, the risk of interception or disruption of telecommunications messages is lower.

112
Q

*An information systems (IS) auditor found that the enterprise architecture (EA) recently adopted by an organization has an adequate current-state representation. However, the organization has started a separate project to develop a future-state representation. The IS auditor should:

A.Recommend that this separate project be completed as soon as possible.
B.Report this issue as a finding in the audit report.
C.Recommend the adoption of the Zachmann framework.
D.Rescope the audit to include the separate project as part of the current audit.

A

B is the correct answer.

Justification
The information systems (IS) auditor does not ordinarily provide input on the timing of projects, but rather provides an assessment of the current environment. The most critical issue in this scenario is that the enterprise architecture (EA) is undergoing change, so the IS auditor should be most concerned with reporting this issue.
It is critical for the EA to include the future state because the gap between the current state and the future state will determine IT strategic and tactical plans. If the EA does not include a future-state representation, it is not complete, and this issue should be reported as a finding.
The organization is free to choose any EA framework, and the IS auditor should not recommend a specific framework.
Changing the scope of an audit to include the secondary project is not required, although a follow-up audit may be desired.

113
Q

*The BEST filter rule for protecting a network from being used as an amplifier in a denial-of-service attack is to deny all:

A.outgoing traffic with source addresses external to the network.
B.incoming traffic with discernible spoofed internet protocol (IP) source addresses.
C.incoming traffic that includes options set in the Internet Protocol.
D.incoming traffic whose destination address belongs to critical hosts.

A

A is the correct answer.

Justification
Outgoing traffic with an internet protocol (IP) source address different than the internal IP range in the network is invalid. In most cases, it signals a denial-of-service attack originated by an internal user or by a previously compromised internal machine; in both cases, applying this filter will stop the infected machine from participating in the attack.
Denying incoming traffic does not prevent an internal machine from participating in an attack on an outside target.
Incoming traffic has the IP options set according to the type of traffic. This is a normal condition.
Denying incoming traffic to internal hosts prevents legitimate traffic.

114
Q

The editing/validation of data entered at a remote site is performed MOST effectively at the:

A.central processing site after running the application system.
B.central processing site during the running of the application system.
C.remote processing site after transmission of the data to the central processing site.
D.remote processing site prior to transmission of the data to the central processing site.

A

D is the correct answer.

Justification
Due to the risk of errors being introduced during transmission to the central processing site, it is a good practice to re-validate the data after receiving them at the central processing site. However, this is not the most efficient method, because invalid data could have been transmitted and processed.
Due to the risk of errors being introduced during transmission to the central processing site, it is a good practice to re-validate the data after receiving them at the central processing site. However, this is not the most efficient method, because invalid data could have been transmitted and processed at the central site.
To validate the data after they have been transmitted is not a valid control.
It is important that the data entered from a remote site are edited and validated prior to transmission to the central processing site.

115
Q

*Which of the following antispam filtering methods has the LOWEST possibility of false-positive alerts?

A.Rule-based
B.Checksum based
C.Heuristic filtering
D.Statistic-based

A

B is the correct answer.

Justification
Rule-based filtering will trigger false-positive alert each time a key word is met in the message.
The advantage of this type of checksum-based filtering is that it lets ordinary users help identify spam, and not just administrators, thus, vastly increasing the pool of spam fighters. The disadvantage is that spammers can insert unique invisible gibberish—known as hashbusters—into the middle of each of their messages, thus making each message unique and having a different checksum. This leads to a race between the developers of the checksum software and the developers of the spam-generating software.
A heuristic is a technique designed for solving a problem more quickly when classic methods are too slow, or for finding an approximate solution when classic methods fail to find any exact solution. This is achieved by trading optimality, completeness, accuracy or precision for speed. In a way, it can be considered a shortcut.
Statistical filtering analyzes the frequency of each word within the message and then evaluates the message as a whole. Therefore, it can ignore a suspicious keyword if the entire message is within normal bounds. However, statistical filtering is prone to false-positive alerts.

116
Q

*An organization with extremely high security requirements is evaluating the effectiveness of biometric systems. Which of the following performance indicators is MOST important?

A.False-acceptance rate (FAR)
B.Equal-error rate (EER)
C.False-rejection rate (FRR)
D.False-identification rate (FIR)

A

A is the correct answer.

Justification
False-acceptance rate (FAR) is the frequency of accepting an unauthorized person as authorized, thereby granting access when it should be denied. In an enterprise with high security requirements, limiting the number of false acceptances is more important than the impact on the false reject rate.
Equal-error rate EER (also called the crossover error rate) is the point where the FAR equals the false-rejection rate (FRR). This is the criteria used to measure the optimal accuracy of the biometric system, but, in a highly secure environment, the FAR is more important than the EER.
FRR denies an authorized person access, but this is less important than the FAR because it is better to deny access to an authorized individual than to grant access to an unauthorized individual.
False-identification rate (FIR) is the probability that an authorized person is identified but is assigned a false ID.

117
Q

*An information systems (IS) auditor has been tasked by an automated manufacturing facility for the risk-based audit of its distributed control supervisory control and data acquisition (SCADA) systems. Which of the following should be the PRIMARY task for the auditor?

A.Evaluation of communication architecture and connectivity interfaces
B.Evaluation of functioning of monitoring terminals, sensors and actuators
C.Assessment of total cost of ownership (TCO) for the SCADA systems
D.Evaluation of usability of automated controls for enterprise engineers

A

A is the correct answer.

Justification
Communication channels over the Internet and even USB interfaces in air-gapped systems increase the risk of malware exposure (e.g., Stuxnet).
Monitors, sensors and actuator evaluation is not of the same gravity in risk-based audit as communication.
Evaluation of total cost of ownership (TCO)/cost-effectiveness is not the primary concern to an information systems (IS) auditor compared to malware exposure.
Usability evaluation is of lesser evaluation in the risk-based audit.

118
Q

Assessing IT risk is BEST achieved by:

A.evaluating threats and vulnerabilities that are associated with existing IT assets and IT projects.
B.using the organization’s past actual loss experience to determine current exposure.
C.reviewing published loss statistics from comparable organizations.
D.reviewing IT control weaknesses identified in audit reports.

A

A is the correct answer.

Justification
To assess IT risk, threats and vulnerabilities need to be evaluated using qualitative or quantitative risk assessment approaches.
Basing an assessment on past losses does not adequately reflect new threats or inevitable changes to the organization’s IT assets, projects, controls and strategic environment. There are also likely to be problems with the scope and quality of the loss data available to be assessed.
Comparable organizations have differences in their IT assets, control environment and strategic circumstances. Therefore, their loss experience cannot be used to directly assess organizational IT risk.
Control weaknesses identified during audits are relevant in assessing threat exposure, and further analysis may be needed to assess threat probability. Depending on the scope of the audit coverage, it is possible that not all of the critical IT assets and projects will have recently been audited, and there may not be a sufficient assessment of strategic IT risk.

119
Q

*Which of the following should the information systems (IS) auditor review to ensure the correct version of a data file is used for a production run?

A.Incident or error reports related to the production run
B.Schedules detailing the tasks performed by operators
C.Logs containing relevant system activity and events
D.Reports documenting the distribution of the produced output

A

C is the correct answer.

Justification
Operator problem reports may provide information about errors or issues encountered during the production run, which can be useful for identifying potential data file version problems.
Operator work schedules are not directly relevant to verifying the correct version of a data file for a production run.
System logs and analysis programs can be used by an information systems (IS) auditor to ensure that the correct file version was used for a production run.
Output distribution reports primarily focus on identifying and distributing application reports and may not directly contribute to verifying the correct version of a data file used for a production run.

120
Q

An enterprise discovers that the computer of the chief financial officer has been infected with malware that includes a keystroke logger and a rootkit. The FIRST action to take is to:

A.contact the appropriate law enforcement authorities to begin an investigation.
B.immediately ensure that no additional data are compromised.
C.disconnect the PC from the network.
D.update the antivirus signature on the PC to ensure that the malware or virus is detected and removed.

A

C is the correct answer.

Justification
Although contacting law enforcement may be needed, the first step is to halt data flow by disconnecting the computer from the network.
The first step is to disconnect the computer from the network, thus ensuring that no additional data are compromised. Then, using proper forensic techniques, capture the information stored in temporary files, network connection information, programs loaded into memory and other information on the machine.
The most important task is to prevent further data compromise and preserve evidence by disconnecting the computer from the network.
Preserve the machine in a forensically sound condition and do not make any changes to it except to disconnect it from the network. Otherwise, evidence would be destroyed by powering off the PC or updating the software on the PC. Information stored in temporary files, network connection information, programs loaded into memory and other information may be lost.

121
Q

Before implementing controls in a newly developed system, management should PRIMARILY ensure that the controls:

A.satisfy a requirement in addressing a risk.
B.do not reduce productivity.
C.are based on a minimized cost analysis.
D.are detective or corrective.

A

A is the correct answer.

Justification
The purpose of a control is to mitigate a risk; therefore, the primary consideration when selecting a control is that it effectively mitigates an identified risk. When designing controls, it is necessary to consider all the aspects in the presented options. In an ideal situation, controls that address all these aspects are the best controls. Realistically, it may not be possible to design them all and the cost may be prohibitive; therefore, it is necessary to consider the controls that are related primarily to the treatment of existing risk in the organization.
Controls often affect productivity and performance; however, this must be balanced against the benefit obtained from the implementation of the control.
The most important reason for a control is to mitigate a risk—and the selection of a control is usually based on a cost-benefit analysis, not on selecting just the least expensive control.
A good control environment includes preventive, detective and corrective controls.

122
Q

The MAJOR consideration for an information systems (IS) auditor reviewing an organization’s IT project portfolio is the:

A.IT budget.
B.existing IT environment.
C.business plan.
D.investment plan.

A

C is the correct answer.

Justification
The IT budget is important to ensure that the resources are being used in the best manner, but this is secondary to the importance of reviewing the business plan.
The existing IT environment is important and used to determine gap analysis but is secondary to the importance of reviewing the business plan.
One of the most important determining factors for which projects get funded is how well a project meets an organization’s strategic objectives. Portfolio management takes a holistic view of a company’s overall IT strategy. IT strategy should be aligned with the business strategy and, hence, reviewing the business plan should be the major consideration.
The investment plan is important to set out project priorities, but secondary to the importance of reviewing the business plan.

123
Q

What is the PRIMARY consideration for an information systems (IS) auditor reviewing the prioritization and coordination of IT projects and program management?

A.Projects are aligned with the organization’s strategy.
B.Identified project risk is monitored and mitigated.
C.Controls related to project planning and budgeting are appropriate.
D.IT project metrics are reported accurately.

A

A is the correct answer.

Justification
The primary goal of IT projects is to add value to the business, so they must be aligned with the business strategy to achieve the intended results. Therefore, the information systems (IS) auditor should first focus on ensuring this alignment.
An adequate process for monitoring and mitigating identified project risk is important; however, strategic alignment helps in assessing identified risk in business terms.
Completion of projects within a predefined time and budget is important; however, the focus of project management should be on achieving the desired outcome of the project, which is aligned with the business strategy.
Adequate reporting of project status is important but may or may not help in providing the strategic perspective of project deliverables.

123
Q

*An information systems (IS) auditor reviewing wireless network security determines that the Dynamic Host Configuration Protocol is disabled at all wireless access points. This practice:

A.reduces the risk of unauthorized access to the network.
B.is not suitable for small networks.
C.automatically provides an internet protocol (IP) address to anyone.
D.increases the risk associated with Wireless Encryption Protocol.

A

A is the correct answer.

Justification
Dynamic Host Configuration Protocol (DHCP) automatically assigns internet protocol (IP) addresses to anyone connecting to the network. With DHCP disabled, static IP addresses must be used, and this requires either administrator support or a higher level of technical skill to attach to the network and gain Internet access.
DHCP is suitable for networks of all sizes from home networks to large complex organizations.
DHCP does not provide IP addresses when disabled.
Disabling the DHCP makes it more difficult to exploit the well-known weaknesses in Wireless Encryption Protocol.

124
Q

Email traffic from the Internet is routed via firewall-1 to the mail gateway. Mail is routed from the mail gateway, via firewall-2, to the mail recipients in the internal network. Other traffic is not allowed. For example, the firewalls do not allow direct traffic from the Internet to the internal network. The intrusion detection system (IDS) detects traffic for the internal network that did not originate from the mail gateway.

The FIRST action triggered by the IDS should be to:

A.alert the appropriate staff.
B.create an entry in the log.
C.close firewall-2.
D.close firewall-1.

A

B is the correct answer.

Justification
The first action taken by an intrusion detection system (IDS) is to create a log entry and then alert the appropriate staff.
Creating an entry in the log is the first step taken by a network IDS. The IDS may also be configured to send an alert to the administrator, send a note to the firewall and may even be configured to record the suspicious packet.
Traffic for the internal network that did not originate from the mail gateway is a sign that firewall-1 is not functioning properly. This may have been caused by an attack from a hacker. After the IDS has logged the suspicious traffic, it may signal firewall-2 to close, thus preventing damage to the internal network. After closing firewall-2, the malfunctioning of firewall-1 can be investigated. The IDS should trigger the closing of firewall-2 either automatically or by manual intervention. Between the detection by the IDS and a response from the system administrator, valuable time can be lost, in which a hacker can also compromise firewall-2.
The IDS will usually only protect the internal network by closing firewall-2 and will not close the externally facing firewall-1.

125
Q

*Management considered two projections for its disaster recovery plan (DRP): plan A with two months to fully recover and plan B with eight months to fully recover. The recovery point objectives (RPOs) are the same in both plans. It is reasonable to expect that plan B projected higher:

A.downtime costs.
B.resumption costs.
C.recovery costs.
D.walk-through costs.

A

A is the correct answer.

Justification
Because management considered a longer time window for recovery in plan B, downtime costs included in the plan are likely to be higher.
Because the recovery time for plan B is longer, resumption costs can be expected to be lower.
Because the recovery time for plan B is longer, recovery costs can be expected to be lower.
Walk-through costs are not a part of disaster recovery.

126
Q

The development of an application has been outsourced to an offshore vendor. Which of the following should be of GREATEST concern to an information systems (IS) auditor?

A.The right to audit clause was not included in the contract.
B.The business case was not established.
C.There was no source code escrow agreement.
D.The contract does not cover change management procedures.

A

B is the correct answer.

Justification
The lack of the right to audit clause presents a risk to the organization; however, the risk is not as consequential as the lack of a business case.
Because the business case was not established, it is likely that the business rationale, risk and risk mitigation strategies for outsourcing the application development were not fully evaluated and the appropriate information was not provided to senior management for formal approval. This situation presents the biggest risk to the organization.
If the source code is held by the provider and not provided to the organization, the lack of source code escrow presents a risk to the organization; however, the risk is not as consequential as the lack of a business case.
The lack of change management procedures presents a risk to the organization, especially with the possibility of extraordinary charges for any required changes; however, the risk is not as consequential as the lack of a business case.

127
Q

An information systems (IS) auditor reviewing an organization’s disaster recovery plan (DRP) should PRIMARILY verify that it is:

A.tested every six months.
B.regularly reviewed and updated.
C.approved by the chief executive officer.
D.communicated to every department head in the organization.

A

B is the correct answer.

Justification
The plan must be subjected to regular testing, but the period between tests depends on the nature of the organization, the amount of change in the organization and the relative importance of information systems (IS). Three months, or even annually, may be appropriate in different circumstances.
The plan should be reviewed at appropriate intervals, depending on the nature of the business and the rate of change of systems and personnel. Otherwise, it may become out-of-date and may no longer be effective.
Although the disaster recovery plan (DRP) should receive the approval of senior management, it need not be the chief executive officer if another executive officer is equally or more appropriate. For a purely IS-related plan, the executive responsible for technology may approve the plan.
Although a business continuity plan (BCP) is likely to be circulated throughout an organization, the IS DRP will usually be a technical document and only relevant to IS and communication staff.

128
Q

Which of the following is the MOST secure and economical method for connecting a private network over the Internet in a small- to medium-sized enterprise?

A.Virtual private network (VPN)
B.Dedicated line
C.Leased line
D.Integrated services digital network

A

A is the correct answer.

Justification
The most secure method is a virtual private network (VPN), using encryption, authentication and tunneling to allow data to travel securely from a private network to the Internet.
A dedicated line is quite expensive and only needed when there are specific confidentiality and availability needs.
A leased line is an expensive but private option, but rarely a good option today.
Integrated services digital network is not encrypted and needs additional security to be a valid option.

129
Q

Which recovery strategy is MOST appropriate for a business with multiple offices within a region and a limited recovery budget?

A.Hot site maintained by the business
B.Commercial cold site
C.Reciprocal arrangement between its offices
D.Third-party hot site

A

C is the correct answer.

Justification
A hot site maintained by the business would be costly but would provide a high degree of confidence.
Multiple cold sites leased for the multiple offices would lead to an ineffective solution with poor availability.
A reciprocal arrangement among its offices would be most appropriate for a business with many offices within a region. Each office can be designated as a recovery site for some other office. This would be the least expensive approach and would provide an acceptable level of confidence.
A traditional hot site provides a third-party facility for recovery. This would be a costly approach providing a high degree of confidence.

130
Q

*In a risk-based information systems (IS) audit, where both inherent and control risk have been assessed as high, an IS auditor would MOST likely compensate for this scenario by performing additional:

A.stop-or-go sampling.
B.substantive testing.
C.compliance testing.
D.discovery sampling.

A

B is the correct answer.

Justification
Stop-or-go sampling is used when an information systems (IS) auditor believes few errors will be found in the population and, thus, is not the best type of testing to perform in this case.
Because both the inherent and control risk are high in this case, additional testing is required. Substantive testing obtains audit evidence on the completeness, accuracy, or existence of activities or transactions during the audit period.
Compliance testing is evidence gathering for the purpose of testing an enterprise’s compliance with control procedures. Although performing compliance testing is important, performing additional substantive testing is more appropriate in this case.
Discovery sampling is a form of attribute sampling that is used to determine a specified probability of finding at least one example of an occurrence (attribute) in a population, typically used to test for fraud or other irregularities. In this case, additional substantive testing is the better option.

131
Q

The implementation of access controls FIRST requires:

A.a classification of information systems (IS) resources.
B.the labeling of IS resources.
C.the creation of an access control list.
D.an inventory of IS resources.

A

D is the correct answer.

Justification
The first step in implementing access controls is an inventory of information systems (IS) resources, which is the basis for classification.
Labeling resources cannot be done without first determining the resources’ classifications.
The access control list is not done without a meaningful classification of resources.
The first step in implementing access controls is an inventory of IS resources, which is the basis for establishing ownership and classification.

132
Q

Which of the following is the BEST way to minimize unauthorized access to unattended end-user PC systems?

A.Enforce the use of a password-protected screen saver.
B.Implement a proximity-based authentication system.
C.Terminate the user session at predefined intervals.
D.Adjust power management settings so the monitor screen is blank.

A

A is the correct answer.

Justification
A password-protected screen saver with a proper time interval is the best measure to prevent unauthorized access to unattended end-user systems. It is important to ensure that users lock the workstation when they step away from the machine, which is something that can be reinforced via awareness training.
There are solutions that will lock machines when users step away from their desks, and those are suitable here; however, those tools are a more expensive solution that normally include the use of smart cards and extra hardware. Therefore, the use of a password-protected screen saver is a better solution.
Terminating user sessions is often done for remote login (periodic re-authentication) or after a certain amount of inactivity on a web or server session. There is more risk related to leaving the workstation unlocked.
Switching off the monitor is not a solution, because the monitor can simply be switched on.

133
Q

Which of the following is MOST important for an information systems (IS) auditor to verify while conducting a business continuity audit?

A.Data backups are performed on a timely basis.
B.A recovery site is contracted for and available as needed.
C.Human safety procedures are in place.
D.Insurance coverage is adequate and premiums are current.

A

C is the correct answer.

Justification
Performing data backups is necessary for a business continuity plan, but the information systems (IS) auditor will always be most concerned with human safety.
A recovery site is important for business continuity, but life safety is always the first priority.
The most important element in any business continuity process is the protection of human life. This takes precedence over all other aspects of the plan.
Insurance coverage is not as important as life safety.

134
Q

Which of the following types of penetration tests effectively evaluates the incident handling and response capability of the system administrator?

A.Targeted testing
B.Internal testing
C.Double-blind testing
D.External testing

A

C is the correct answer.

Justification
In targeted testing, penetration testers are provided with information related to target and network design and the target’s IT team is aware of the testing activities.
Internal testing refers to attacks and control circumvention attempts on the target from within the perimeter. The system administrator is typically aware of the testing activities.
In double-blind testing, the penetration tester has little or limited knowledge about the target system, and personnel at the target site are not informed that a test is being performed. Because the administrator and security staff at the target are not aware of the test, it can effectively evaluate the incident handling and response capability of the system administrator.
External testing is a generic term that refers to attacks and control circumvention attempts on the target from outside the target system. The system administrator may or may not be aware of the testing activities, so this is not the correct answer. (Note: Rather than concentrating on specific terms, certified information systems auditor (CISA) candidates should understand the differences between various types of penetration testing.)

135
Q

In what capacity would an information systems (IS) auditor MOST likely see a hash function applied?

A.Authentication
B.Identification
C.Authorization
D.Encryption

A

A is the correct answer.

Justification
The purpose of a hash function is to produce a fingerprint of data that can be used to ensure integrity and authentication. A hash of a password also provides for authentication of a user or process attempting to access resources.
Hash functions are not used for identification. They are used to validate the authenticity of the identity.
Hash functions are not typically used to provide authorization. Authorization is provided after the authentication has been established.
Hash functions do not encrypt data.

136
Q

An information systems (IS) auditor uses computer-assisted audit techniques (CAATs) to collect and analyze data. Which of the following attributes of evidence is MOST affected by using CAATs?

A.Usefulness
B.Reliability
C.Relevance
D.Adequacy

A

B is the correct answer.

Justification
Usefulness of audit evidence pulled by computer-assisted audit techniques (CAATs) is determined by the audit objective, and the use of CAATs does not have as direct of an impact on usefulness as reliability.
Because the data are directly collected by the information systems (IS) auditor, the audit findings can be reported with an emphasis on the reliability of the records that are produced and maintained in the system. The reliability of the source of information used provides reassurance on the generated findings.
Relevance of audit evidence pulled by CAATs is determined by the audit objective, and the use of CAATs does not have as direct of an impact on relevance as reliability.
Adequacy of audit evidence pulled by CAATs is determined by the processes and personnel who author the data, and the use of CAATs does not have any impact on competence.

137
Q

The PRIMARY reason an information systems (IS) auditor performs a functional walk-through during the preliminary phase of an audit assignment is to:

A.understand the business process.
B.comply with auditing standards.
C.identify control weakness.
D.develop the risk assessment.

A

A is the correct answer.

Justification
Understanding the business process is the first step that an information systems (IS) auditor needs to perform.
ISACA IS Audit and Assurance Standards encourage adoption of the audit procedures/processes required to assist the IS auditor in performing IS audits more effectively. However, standards do not require an IS auditor to perform a process walk-through at the commencement of an audit engagement.
Identifying control weaknesses is not the primary reason for the walk-through and typically occurs at a later stage in the audit.
The main reason is to understand the business process. The risk assessment is developed after the business process is understood.

137
Q

*Which of the following impairs the independence of a quality assurance (QA) team?

A.Ensuring compliance with development methods
B.Checking the test assumptions
C.Correcting coding errors during the testing process
D.Checking the code to ensure proper documentation

A

C is the correct answer.

Justification
Ensuring compliance with development methods is a valid quality assurance (QA) function.
Checking the test assumptions is a valid QA function.
Correction of code should not be a responsibility of the QA team, because it does not ensure separation of duties and impairs the team’s independence.
Checking the code to ensure proper documentation is a valid QA function.

138
Q

*Which of the following distinguishes a business impact analysis (BIA) from a risk assessment?

A.Inventory of critical assets
B.Identification of vulnerabilities
C.Listing of threats
D.Determination of acceptable downtime

A

D is the correct answer.

Justification
An inventory of critical assets is completed in a risk assessment and a business impact analysis (BIA).
The identification of vulnerabilities is relevant in a risk assessment and a BIA.
A listing of threats is relevant in a risk assessment and a BIA.
A determination of acceptable downtime is made only in a BIA.

139
Q

*Which of the following is the MOST important security consideration to an enterprise that wants to move a business application to external cloud service (PaaS) provided by a vendor?

A.Classification and categories of data processed by the application
B.Cost of hosting the application internally versus externally
C.Reputation of a vendor based on the market and feedback from clients
D.Drop in application performance due to use of shared services

A

A is the correct answer.

Justification
Types of data and their sensitivity is a primary consideration because there might be legal obligations related to data hosting and its level of protection (e.g., personal information, banking information and health information).
Cost is an important factor for an enterprise to consider during the move to cloud, however the highest risk is to violate data privacy laws.
The reputation of a vendor on the market is an important factor for an enterprise to consider during the move to cloud, however the highest risk is to violate data privacy laws.
The drop in application performance due to use of shared services is an important factor for an enterprise to consider during the move to cloud, however the highest risk is to violate data privacy laws.

140
Q

The MOST important point of consideration for an information systems (IS) auditor while reviewing an enterprise’s project portfolio is that it:

A.does not exceed the existing IT budget.
B.is aligned with the investment strategy.
C.has been approved by the IT steering committee.
D.is aligned with the business plan.

A

D is the correct answer.

Justification
Managing the project portfolio within the agreed budget is important, and it should be identified if the project portfolio exceeds the IT budget. However, it is not as critical as ensuring that it is aligned with the business plan.
Project portfolio alignment has an explicit directive and strategic goal in aligning existing projects to business strategies and ensuring continuous alignment to continue investing in the properly aligned projects and portfolios. Thus, the project portfolio should be aligned with the investment strategy, but it is more important that it is aligned with the business plan.
Appropriate approval of the project portfolio should be granted. However, not every enterprise has an IT steering committee, and this is not as critical as ensuring that the projects are aligned with the business plan.
Portfolio management takes a holistic view of an enterprise’s overall IT strategy, which, in turn, should be aligned with the business strategy. A business plan provides the justification for each of the projects in the project portfolio, and that is the major consideration for an information systems (IS) auditor.

141
Q

An organization purchased a third-party application and made significant modifications. While auditing the development process for this critical customer-facing application, the information systems (IS) auditor noted that the vendor has been in business for only one year. Which of the following helps to mitigate the risk relating to continued application support?

A.Viability study on the vendor
B.Software escrow agreement
C.Financial evaluation of the vendor
D.Contractual agreement for future enhancements

A

B is the correct answer.

Justification
Although a viability study on the vendor may provide some assurance on the long-term availability of the vendor’s services to the entity, in this case, it is more important that the organization has the rights to the source code.
Considering that the vendor has been in the business for only one year, the biggest concern is financial stability or viability of the vendor and the risk of the vendor going out of business. The best way that this risk can be addressed is to have a software escrow agreement for the source code of the application, which provides the entity access to the source code if the vendor goes out of business.
Considering that the vendor has been in business for only one year, financial evaluation of the vendor is not of much value and cannot provide assurance on the long-term availability of the vendor services to the entity. In this case, it is more important that the organization has rights to the source code.
A contractual agreement, while binding, is not enforceable or only has limited value in the event of bankruptcy.

142
Q

What is the PRIMARY requirement that a data mining and auditing software tool should meet? The software tool should:

A.interface with various types of enterprise resource planning software and databases.
B.accurately capture data from the enterprise systems without causing excessive performance problems.
C.introduce audit hooks into the financial systems of the enterprise to support continuous auditing.
D.be customizable and support inclusion of custom programming to aid in investigative analysis.

A

B is the correct answer.

Justification
The product must interface with the types of systems used by the enterprise and provide meaningful data for analysis.
Although all the requirements that are listed as answer choices are desirable in a software tool evaluated for auditing and data mining purposes, the most critical requirement is that the tool works effectively on the systems of the enterprise being audited.
The tool should probably work on more than just financial systems and does not necessarily require implementation of audit hooks.
The tool should be flexible but not necessarily customizable. It should have built-in analysis software tools.

143
Q

Vendors have released patches fixing security flaws in their software. Which of the following should an information systems (IS) auditor recommend in this situation?

A.Assess the impact of patches prior to installation.
B.Ask the vendors for a new software version with all fixes included.
C.Install the security patch immediately.
D.Decline to deal with these vendors in the future.

A

A is the correct answer.

Justification
The effect of installing the patch should be immediately evaluated, and installation should occur based on the results of the evaluation. There are numerous cases where a patch from one vendor has affected other systems; therefore, testing the patches as much as possible before rolling them out to the entire organization is necessary.
New software versions with all fixes included are not always available, and a full installation can be time consuming.
To install the patch without knowing what it might affect can easily cause problems. The installation of a patch may also affect system availability; therefore, the patch should be rolled out at a time that is acceptable to the business.
Declining to deal with vendors does not take care of the flaw and may severely limit service options.