Isaca- CISA
Question ID 22440 |
When performing a review of the structure of an electronic funds transfer (EFT) system, an IS auditor observes that the technological infrastructure is based on a |
Option A |
There could be a question regarding the legal jurisdiction. |
Option B |
Having a provider abroad will cause excessive costs in future audits. |
Option C |
The auditing process will be difficult because of the distance. |
Option D |
There could be different auditing norms. |
Correct Answer | A |
Question ID 22441 |
An IS auditor should expect which of the following items to be included in the request for proposal (RFP) when IS is procuring services from an independent service |
Option A |
References from other customers |
Option B |
Service level agreement (SLA) template |
Option C |
Maintenance agreement |
Option D |
Conversion plan |
Correct Answer | A |
Question ID 22442 |
To minimize costs and improve service levels an outsourcer should seek which of the following contract clauses? |
Option A |
O/S and hardware refresh frequencies |
Option B |
Gain-sharing performance bonuses |
Option C |
Penalties for noncompliance |
Option D |
Charges tied to variable cost metrics |
Correct Answer | B |
Question ID 22443 |
When an organization is outsourcing their information security function, which of the following should be kept in the organization? |
Option A |
Accountability for the corporate security policy |
Option B |
Defining the corporate security policy |
Option C |
Implementing the corporate security policy |
Option D |
Defining security procedures and guidelines |
Correct Answer | A |
Question ID 22444 |
An IS auditor has been assigned to review IT structures and activities recently outsourced to various providers. Which of the following should the IS auditor determine FIRST? |
Option A |
That an audit clause is present in all contracts |
Option B |
That theSLA of each contract is substantiated by appropriate KPIs |
Option C |
That the contractual warranties of the providers support the business needs of the organization |
Option D |
That at contract termination, support is guaranteed by each outsourcer for new outsourcers |
Correct Answer | C |
Question ID 22448 |
While conducting an audit of a service provider, an IS auditor observes that the service provider has outsourced a part of the work to another provider. Since the |
Option A |
requirement for protecting confidentiality of information could be compromised |
Option B |
contract may be terminated because prior permission from the outsourcer was not obtained. |
Option C |
other service provider to whom work has been outsourced is not subject to audit. |
Option D |
outsourcer will approach the other service provider directly for further work. |
Correct Answer | A |
Question ID 22449 |
Which of the following is the BEST information source for management to use as an aid in the identification of assets that are subject to laws and regulations? |
Option A |
Security incident summaries |
Option B |
Vendor best practices |
Option C |
CERT coordination center |
Option D |
Significant contracts |
Correct Answer | D |
Question ID 22450 |
An organization has outsourced its help desk activities. An IS auditor's GREATEST concern when reviewing the contract and associated service level agreement |
Option A |
documentation of staff background checks. |
Option B |
independent audit reports or full audit access. |
Option C |
reporting the year-to-year incremental cost reductions. |
Option D |
reporting staff turnover, development or training. |
Correct Answer | B |
Question ID 22451 |
Which of the following is the MOST important IS audit consideration when an organization outsources a customer credit review system to a third-party service |
Option A |
meets or exceeds industry security standards. |
Option B |
agrees to be subject to external security reviews. |
Option C |
has a good market reputation for service and experience. |
Option D |
complies with security policies of the organization. |
Correct Answer | B |
Question ID 22452 |
The risks associated with electronic evidence gathering would MOST likely be reduced by an e- mail: |
Option A |
destruction policy. |
Option B |
security policy. |
Option C |
archive policy. |
Option D |
audit policy. |
Correct Answer | C |
Question ID 22453 |
The output of the risk management process is an input for making: |
Option A |
business plans. |
Option B |
audit charters. |
Option C |
security policy decisions. |
Option D |
software design decisions. |
Correct Answer | C |
Question ID 22454 |
An IS auditor was hired to review e-business security. The IS auditor's first task was to examine each existing e-business application looking for vulnerabilities. What would be the next task? |
Option A |
Report the risks to the CIO and CEO immediately |
Option B |
Examine e-business application in development |
Option C |
Identify threats and likelihood of occurrence |
Option D |
Check the budget available for risk management |
Correct Answer | C |
Question ID 22455 |
Which of the following is a mechanism for mitigating risks? |
Option A |
Security and control practices |
Option B |
Property and liability insurance |
Option C |
Audit and certification |
Option D |
Contracts and service level agreements (SLAs) |
Correct Answer | A |
Question ID 22456 |
When developing a risk management program, what is the FIRST activity to be performed? |
Option A |
Threat assessment |
Option B |
Classification of data |
Option C |
Inventory of assets |
Option D |
Criticality analysis |
Correct Answer | C |
Question ID 22457 |
A team conducting a risk analysis is having difficulty projecting the financial losses that could result from a risk. To evaluate the potential losses, the team should: |
Option A |
compute the amortization of the related assets. |
Option B |
calculate a return on investment (ROI). |
Option C |
apply a qualitative approach. |
Option D |
spend the time needed to define exactly the loss amount. |
Correct Answer | C |
Question ID 22490 |
Before implementing an IT balanced scorecard, an organization must: |
Option A |
deliver effective and efficient services. |
Option B |
define key performance indicators. |
Option C |
provide business value to IT projects. |
Option D |
control IT expenses. |
Correct Answer | B |
Question ID 22491 |
Which of the following is the PRIMARY objective of an IT performance measurement process? |
Option A |
Minimize errors |
Option B |
Gather performance data |
Option C |
Establish performance baselines |
Option D |
Optimize performance |
Correct Answer | D |
Question ID 22492 |
The IT balanced scorecard is a business governance tool intended to monitor IT performance evaluation indicators other than: |
Option A |
financial results. |
Option B |
customer satisfaction. |
Option C |
internal process efficiency. |
Option D |
innovation capacity. |
Correct Answer | A |
Question ID 22493 |
During an audit, an IS auditor notices that the IT department of a medium-sized organization has no separate risk management function, and the organization's |
Option A |
Create an IT risk management department and establish an IT risk framework with the aid of external risk management experts. |
Option B |
Use common industry standard aids to divide the existing risk documentation into several individual risks which will be easier to handle. |
Option C |
No recommendation is necessary since the current approach is appropriate for a medium-sized organization. |
Option D |
Establish regular IT risk management meetings to identify and assess risks, and create a mitigation plan as input to the organization's risk management. |
Correct Answer | D |
Question ID 22525 |
During an audit, an IS auditor notices that the IT department of a medium-sized organization has no separate risk management function, and the organization's |
Option A |
Create an IT risk management department and establish an IT risk framework with the aid of external risk management experts. |
Option B |
Use common industry standard aids to divide the existing risk documentation into several individual risks which will be easier to handle. |
Option C |
No recommendation is necessary since the current approach is appropriate for a medium-sized organization. |
Option D |
Establish regular IT risk management meetings to identify and assess risks, and create a mitigation plan as input to the organization's risk management. |
Correct Answer | D |
Question ID 22526 |
The IT balanced scorecard is a business governance tool intended to monitor IT performance evaluation indicators other than: |
Option A |
financial results. |
Option B |
customer satisfaction. |
Option C |
internal process efficiency. |
Option D |
innovation capacity. |
Correct Answer | A |
Question ID 22527 |
Before implementing an IT balanced scorecard, an organization must: |
Option A |
deliver effective and efficient services. |
Option B |
define key performance indicators. |
Option C |
provide business value to IT projects. |
Option D |
control IT expenses. |
Correct Answer | B |
Question ID 22528 |
Which of the following is the PRIMARY objective of an IT performance measurement process? |
Option A |
Minimize errors |
Option B |
Gather performance data |
Option C |
Establish performance baselines |
Option D |
Optimize performance |
Correct Answer | D |
Question ID 22529 |
Which of the following risks could result from inadequate software baselining? |
Option A |
Scope creep |
Option B |
Sign-off delays |
Option C |
Software integrity violations |
Option D |
inadequate controls |
Correct Answer | A |
Question ID 22530 |
Many IT projects experience problems because the development time and/or resource requirements are underestimated. Which of the following techniques would |
Option A |
Function point analysis |
Option B |
PERT chart |
Option C |
Rapid application development |
Option D |
Object-oriented system development |
Correct Answer | B |
Question ID 22531 |
The reason for establishing a stop or freezing point on the design of a new system is to: |
Option A |
prevent further changes to a project in process. |
Option B |
indicate the point at which the design is to be completed. |
Option C |
require that changes after that point be evaluated for cost-effectiveness. |
Option D |
provide the project management team with more control over the project design. |
Correct Answer | C |
Question ID 22532 |
Change control for business application systems being developed using prototyping could be complicated by the: |
Option A |
iterative nature of prototyping. |
Option B |
rapid pace of modifications in requirements and design. |
Option C |
emphasis on reports and screens. |
Option D |
lack of integrated tools. |
Correct Answer | B |
Question ID 22533 |
An IS auditor finds that a system under development has 12 linked modules and each item of data can carry up to 10 definable attribute fields. The system handles |
Option A |
Program evaluation review technique (PERT) |
Option B |
Counting source lines of code (SLOC) |
Option C |
Function point analysis |
Option D |
White box testing |
Correct Answer | C |
Question ID 22534 |
When planning to add personnel to tasks imposing time constraints on the duration of a project, which of the following should be revalidated FIRST? |
Option A |
The project budget |
Option B |
The critical path for the project |
Option C |
The length of the remaining tasks |
Option D |
The personnel assigned to other tasks |
Correct Answer | B |
Description Since adding resources may change the route of the critical path, the critical path must be reevaluated to ensure that additional resources will in fact shorten the project duration. Given that there may be slack time available on some of the other tasks not on the critical path, factors such as the project budget, the length of other tasks and the personnel assigned to them may or may not be affected.
Update Date and Time 2018-04-04 06:00:50