Cisa Questions
Cisa Questions
Correct Answer = B
Justification:- Mesh network topology offers maximum redundancy
and fault tolerance by establishing point-to-point links between all
network hosts.
Correct Answer = B
Justification:- Application-layer gateways, also known as proxy
firewalls, effectively control file downloads through FTP by
inspecting the application layer of the OSI model.
Correct Answer = C
Justification:- Public-key infrastructure (PKI) combines public-key
cryptography and digital certificates to ensure data
confidentiality, reliability, and integrity in internet transactions.
Correct Answer = C
Justification:- Digital signatures, created using hashing algorithms
and public/private key pairs, verify message integrity and enforce
confidentiality and integrity of data.
Correct Answer = C
Justification:- An IS auditor requires a graphical interface of the
network topology map to gain a clear understanding of network
management.
Correct Answer = B
Justification:- Long asymmetric encryption keys increase
encryption overhead and cost, whereas other solutions involve
single shared symmetric keys.
8.Which of the following could unintentionally result in a loss of
confidentiality? Choose the best answer.
A. Lack of employee awareness of a company's information
security policy
B. Failure to comply with a company's information security policy
C. A momentary lapse of reason
D. Lack of security policy enforcement procedures
Correct Answer = A
Justification:- Lack of employee awareness of a company's
information security policy can lead to unintentional breaches of
confidentiality.
Correct Answer = A
Justification:- Monitored double-doorway entry systems, such as
mantraps or deadman doors, deter piggybacking and enhance
security.
10. Ensuring that security and control policies align with business
and IT objectives is a primary goal of:
A. An IT security policies audit
B. A processing audit
C. A software audit
D. A vulnerability assessment
Correct Answer = A
Justification:- An IT security policies audit aims to ensure that
security and control policies align with business and IT objectives.
Correct Answer = D
Justification:- When auditing third-party service providers,
ownership of programs and files, due care and confidentiality, and
continuity planning in case of a disaster are important
considerations.
Correct Answer = C
Justification:- Website certificates authenticate websites and can
also authenticate keys used for data encryption.
Correct Answer = A
Justification:- Dry-pipe sprinkler systems release water through
pipes only when a fire is detected, minimizing damage from
accidental water discharge.
Correct Answer = B
Justification:- The primary goal of business continuity planning
and disaster recovery planning is to reduce the risk and impact of
business interruptions or disasters.
Correct Answer = B
Justification:- Processing controls ensure accurate and complete
data processing through authorized routines.
Correct Answer = B
Justification:- Transaction journals are useful for detecting
unauthorized input from terminals.
18. What serves as the framework for developing logical access
controls?
A. Information systems security policies
B. Organizational security policies
C. Access Control Lists (ACL)
D. Organizational charts for identifying roles and responsibilities
Correct Answer = A
Justification:- Information systems security policies serve as a
framework for developing logical access controls.
Correct Answer = C
Justification:- Access control lists (ACLs) help ISPs implement
inbound traffic filtering to identify unauthorized IP packets.
Correct Answer = A
Justification:- Redundancy checks detect transmission errors by
adding calculated bits to data segments.
Correct Answer = B
Justification:- System downtime logs assist IS auditors in
evaluating the effectiveness of systems maintenance programs.
Correct Answer = D
Justification:- Application controls should be incorporated early in
the system development process, including functional
specifications.
Correct Answer = B
Justification:- System testing should encompass the entire
program, including interfaces with other applications or systems,
to assess the impact of changes.
Correct Answer = A
Justification:- Diverse routing supports data transmission through
split or duplicate cable facilities.
Correct Answer = A
Justification:- Cold sites are suitable for recovering noncritical
systems and data in disaster scenarios.
26. Which type(s) of firewalls provide(s) the highest degree of
protection and control by inspecting all seven OSI layers of
network traffic?
A. A first-generation packet-filtering firewall
B. A circuit-level gateway
C. An application-layer gateway, or proxy firewall, and stateful-
inspection firewalls
D. An application-layer gateway, or proxy firewall, but not
stateful-inspection firewalls
Correct Answer = C
Justification:- Application-layer gateways and stateful-inspection
firewalls provide comprehensive protection by inspecting all
seven layers of network traffic.
Correct Answer = B
Justification:- IS auditors review access-control lists (ACLs) to
assess user permissions for specific resources.
Correct Answer = B
Justification:- A risk-based approach to audit planning allows the
allocation of auditing resources to areas of highest concern.
Correct Answer = D
Justification:- Authentication is employed to validate the identity
of a subject.
Correct Answer = A
Justification:- IS auditors carefully review functional requirements
in systems development projects to ensure alignment with
business objectives.
32. While BCP and DRP are often implemented and tested by
middle management and end-users, the ultimate responsibility
and accountability for the plans remain with executive
management, such as the _______________. (Fill in the blank.)
A. Security administrator
B. Systems auditor
C. Board of directors
D. Financial auditor
Correct Answer = C
Justification:- While middle management and end users often
implement and test BCP and DRP, executive management retains
ultimate responsibility and accountability.
Correct Answer = C
Justification:- Input/output controls should be implemented for
both sending and receiving applications in integrated systems
environments.
Correct Answer = B
Justification:- Changes in system assets, such as hardware
replacements, should be promptly recorded in the assets
inventory of a business continuity plan.
Correct Answer = B
Justification:- Geographically dispersing resources helps minimize
vulnerabilities and single points of failure in disaster scenarios.
Correct Answer = B
Justification:- A bottom-up approach to organizational policy
development is driven by risk assessment.
Correct Answer = A
Justification:- Concurrency controls prevent potential database
corruption when multiple processes attempt simultaneous edits or
updates.
Correct Answer = A
Justification:- Digital signatures primarily provide authentication
and data integrity.
Correct Answer = A
Justification:- Configuring the firewall as a screened host in a
screened subnet behind the bastion host enhances network
protection against external attacks.
Correct Answer = A
Justification:- Statistical sampling procedures are employed to
minimize detection risk.
Correct Answer = D
Justification:- Data edits implemented before processing serve as
preventive integrity controls.
Correct Answer = D
Justification:- Data classification requires establishing data
ownership as an initial step.
Correct Answer = A
Justification:- User accounts with automatic expiration dates are
effective for granting temporary access to vendors and external
support personnel.
45. Who is responsible for maintaining appropriate security
measures over information assets?
A. Data and systems owners
B. Data and systems users
C. Data and systems custodians
D. Data and systems auditors
Correct Answer = A
Justification:- Data and systems owners bear responsibility for
maintaining appropriate security measures over information
assets.
Correct Answer = A
Justification:- Data diddling involves modifying data before or
during data entry in systems.
Correct Answer = B
Justification:- Data mirroring and parallel processing ensure near-
immediate recoverability for time-sensitive systems and
transactions.
Correct Answer = C
Justification:- Data owners have the ultimate responsibility and
accountability for reviewing user access to systems.
Correct Answer = B
Justification:- Parity bits validate data completeness.
Correct Answer = A
Justification:- Table link verification and reference checks are the
primary methods used to ensure database integrity.
Correct Answer = C
Justification:- Data-mining techniques can assist in identifying and
investigating unauthorized transactions.
Correct Answer = B
Justification:- Decision trees utilize questionnaires to guide users
through a series of choices leading to a conclusion.
Correct Answer = C
Justification:- The first step in a business process re-engineering
project is to define the scope of areas to be reviewed.
Correct Answer = A
Justification:- Traffic analysis is a passive attack method employed
by intruders to identify potential network vulnerabilities, whereas
all others are active attacks.
Correct Answer = B
Justification:- Check digits are an effective means of detecting
data-transposition and transcription errors through edit checks.
Correct Answer = D
Justification:- Inherent risk is associated with factors such as
authorized program exits (trap doors).
58. What is often the most challenging aspect of the initial stages
of application development? Choose the most suitable answer.
A. Configuring software
B. Planning security
C. Determining time and resource requirements
D. Configuring hardware
Correct Answer = C
Justification:- Estimating time and resource requirements for an
application-development project is often the most challenging
aspect of initial development efforts.
Correct Answer = B
Justification:- In a control self-assessment (CSA), the traditional
role of an IS auditor is to facilitate the assessment process.
Correct Answer = D
Justification:- Disaster recovery for systems primarily focuses on
providing alternative processes and resources for transaction
processing.
Correct Answer = C
Justification:- Dry-pipe sprinklers are considered the most
environmentally friendly among the various methods of fire
suppression.
62. When should an application-level edit check be performed to
verify the completion of fund availability at the electronic funds
transfer (EFT) interface?
A. Before transaction completion
B. Immediately after an EFT is initiated
C. During run-to-run total testing
D. Before an EFT is initiated
Correct Answer = D
Justification:- An application-level edit check should be conducted
at the electronic funds transfer (EFT) interface to verify the
availability of funds before initiating an EFT.
Correct Answer = B
Justification:- Encryption algorithms are reversible, while hashing
algorithms are irreversible, distinguishing them from each other.
Correct Answer = B
Justification:- When evaluating biometric access controls, a low
equal error rate (EER), also known as the crossover error rate
(CER), is preferred.
Correct Answer = D
Justification:- When implementing continuous-monitoring systems,
the first step for an IS auditor is to identify high-risk areas within
the organization.
Correct Answer = A
Justification:- IS auditors place greater reliance on evidence
directly collected, such as through personal observation.
68. Among the following options, what is the greatest concern for
an IS auditor?
A. Failure to report a successful attack on the network
B. Failure to prevent a successful attack on the network
C. Failure to recover from a successful attack on the network
D. Failure to detect a successful attack on the network
Correct Answer = A
Justification:- The failure to report a successful attack on the
network is a significant concern for IS auditors.
Correct Answer = C
Justification:- File encryption is an effective control measure for
safeguarding confidential data residing on a personal computer
(PC) or other devices.
Correct Answer = B
Justification:- Run-to-run totals can verify data at various stages of
application processing.
Correct Answer = D
Justification:- Intrusion attempts on a network can be identified
using intrusion-detection systems (IDS).
Correct Answer = A
Justification:- Source code access can be restricted to read-only
by library control software.
Correct Answer = B
Justification:- If individual modules of a system perform correctly
in development project tests, the IS auditor should inform
management of the positive results and recommend further
comprehensive integration testing.
Correct Answer = B
Justification:- Rapid application development (RAD) utilizes a
continually updated prototype to meet changing user or business
requirements.
75. What is a reliable technique for estimating the extent and cost
of a software development project?
A. Function point analysis (FPA)
B. Feature point analysis (FPA)
C. GANTT
D. PERT
Correct Answer = A
Justification:- Estimating the scope and cost of a software
development project can be reliably done using function point
analysis (FPA).
76. What is utilized as a control mechanism to detect data loss,
corruption, or duplication?
A. Redundancy check
B. Reasonableness check
C. Hash totals
D. Accuracy check
Correct Answer = C
Justification:- Hash totals are employed as a control mechanism to
detect data loss, corruption, or duplication.
Correct Answer = B
Justification:- Threats exploit vulnerabilities to cause loss or
damage to the organization and its assets.
Correct Answer = A
Justification:- Among hot, warm, and cold off-site processing
facilities, a cold site is characterized by providing at least
electricity and HVAC.
Correct Answer = C
Justification:- Identifying areas of high risk is the most critical step
in planning an audit.
Correct Answer = C
Justification:- The initial step in creating a proper firewall policy is
to identify network applications such as mail, web, or FTP servers
that will be externally accessed.
Correct Answer = B
Justification:- Reviewing logical access controls ensures that
access is granted on a least-privilege basis, as per the
organization's data owners.
Correct Answer = C
Justification:- Improperly configured routers and router access
lists are a common vulnerability for denial-of-service attacks.
84. When is regression testing used to determine if new
application changes have introduced errors in the remaining
unchanged code?
A. In program development and change management
B. In program feasibility studies
C. In program development
D. In change management
Correct Answer = A
Justification:- Regression testing is used in program development
and change management to determine if new changes have
introduced errors in the remaining unchanged code.
Correct Answer = A
Justification:- Plans for testing user acceptance are typically
prepared during the requirements definition phase of the
systems-development project.
Correct Answer = C
Justification:- Benchmarking partners are identified during the
research stage of the benchmarking process.
Correct Answer = A
Justification:- Inadequate software baselining often leads to
project scope creep due to ill-defined functional requirements.
Correct Answer = B
Justification:- Authentication techniques for sending and receiving
data between EDI systems play a crucial role in preventing
unauthorized transactions.
Correct Answer = B
Justification:- The quality of metadata produced from a data
warehouse is the most important consideration in the
warehouse's design.
Correct Answer = D
Justification:- Inefficient and unnecessary use of network devices
like hubs can degrade network performance.
92. What is one of the most effective controls for ensuring key
accuracy?
A. Data is entered correctly
B. Only authorized cryptographic keys are used
C. Input is authorized
D. Database indexing is performed properly
Correct Answer = A
Justification:- Key verification is one of the most effective controls
for ensuring accurate data entry.
Correct Answer = A
Justification:- Using a statistical sample to inventory the tape
library is an example of a substantive test.
Correct Answer = B
Justification:- Neural networks are effective in detecting fraud
because they can consider a large number of variables when
resolving a problem.
95. When preparing for the recovery of time-sensitive data, such
as that resulting from a specific event, what should be ensured
regarding off-site data storage?
A. Financial reporting
B. Sales reporting
C. Inventory reporting
D. Transaction processing
Correct Answer = D
Justification:- When preparing for the recovery of time-sensitive
data resulting from transaction processing, off-site data storage
should be kept synchronized.
Correct Answer = C
Justification:- IS assessment methods help IS management
determine whether the organization's activities deviate from
planned or expected levels.
Correct Answer = C
Justification:- A callback system is a remote-access control
method where the user initially connects to the network systems
via dial-up access, only to have the initial connection terminated
by the server, which then dials the user back at a predetermined
number stored in the server's configuration database.
Correct Answer = B
Justification:- The functionality, reliability, and security within IT
governance are ultimately the responsibility of the board of
directors and executive officers.
Correct Answer = D
Justification:- Biometrics can provide excellent physical access
control.
102. Among various concerns, what factor often has the most
significant negative impact on the successful implementation of
new application software?
A. Failing to perform user acceptance testing
B. Lack of user training for the new system
C. Lack of software documentation and run manuals
D. Insufficient unit, module, and systems testing
Correct Answer = A
Justification:- Failing to perform user acceptance testing has the
greatest negative impact on the implementation of new
application software, above almost all other concerns.
Correct Answer = C
Justification:- Senior management's commitment to strategic
planning is crucial for the success of a company's IT
implementation.
Correct Answer = C
Justification:- When an IS auditor tries to gain an understanding of
an organization's IT process, prior audit reports are considered
less valuable compared to evidence directly collected.
Correct Answer = D
Justification:- Regression testing should utilize data from previous
tests to draw accurate conclusions about the effects of changes or
corrections to a program and ensure that no new errors have
been introduced.
107. What are trojan horse programs? Please choose the most
appropriate answer.
A. A common form of internal attack
B. Malicious programs that require the aid of a carrier program
such as email
C. Malicious programs that can run independently and can
propagate without the aid of a carrier program such as email
D. A common form of Internet attack
Correct Answer = D
Justification:- Trojan horse programs are a commonly encountered
form of Internet attack.
Correct Answer = A
Justification:- Worms are malicious programs that can propagate
independently without the need for a carrier program like email.
Correct Answer = B
Justification:- Network security operations are typically the
responsibility of security administrators.
111. Among the options provided, which one offers the highest
level of server access control?
A. A mantrap-monitored entryway to the server room
B. Host-based intrusion detection combined with CCTV
C. Network-based intrusion detection
D. A fingerprint scanner facilitating biometric access control
Correct Answer = D
Justification:- Biometric access control facilitated by a fingerprint
scanner can offer a significant level of control over server access.
Correct Answer = C
Justification:- Implementing outbound traffic filtering can help
prevent an organization's systems from being involved in a
distributed denial-of-service (DDoS) attack.
Correct Answer = A
Justification:- Control totals should be established during the early
stages of data preparation to ensure data integrity at the earliest
possible point.
Correct Answer = A
Justification:- Rapid application development (RAD) is employed to
expedite the development of strategically important systems,
reduce development costs, and maintain high quality.
Correct Answer = B
Justification:- Systems software and data are often primarily
safeguarded by logical access controls.
Correct Answer = D
Justification:- Batch control reconciliations serve as compensatory
controls to mitigate the risk of inadequate segregation of duties.
118. Which option is best suited for identifying duplications in
address fields?
A. Text search forensic utility software
B. Generalized audit software
C. Productivity audit software
D. Manual review
Correct Answer = B
Justification:- Generalized audit software can be utilized to search
for duplications in address fields.
Correct Answer = B
Justification:- Without proper identification and authentication
during access control, there can be no accountability for any
actions performed.
Correct Answer = D
Justification:- The foremost requirement of an IS strategy is to
support the business objectives of the organization.
Correct Answer = D
Justification:- PERT (Program Evaluation Review Technique) is a
planning and control technique that considers various scenarios
for projects.
122. What type of data validation edit control matches input data
to an occurrence rate? Please choose the most appropriate
answer.
A. Accuracy check
B. Completeness check
C. Reasonableness check
D. Redundancy check
Correct Answer = C
Justification:- A reasonableness check is an edit control used for
data validation that matches input data with an expected
occurrence rate.
Correct Answer = C
Justification:- Redundancy, which ensures both integrity and
availability, provides the greatest advantage. Organizations
should utilize off-site storage facilities to maintain redundancy of
critical and current information in backup files.
Correct Answer = A
Justification:- A completeness check is an edit check performed to
determine the validity of data in a field.
Correct Answer = C
Justification:- Before conducting an application audit, an IS auditor
must first understand the related business processes.
Correct Answer = A
Justification:- One of the objectives of a control self-assessment
(CSA) program is to enhance audit responsibility.
Correct Answer = A
Justification:- After identifying threats and potential impacts, the
IS auditor should proceed to identify and evaluate the existing
controls.
129. What type of risk occurs when an IS auditor utilizes an
inadequate test procedure and concludes that no material errors
exist, despite the presence of errors?
A. Business risk
B. Detection risk
C. Residual risk
D. Inherent risk
Correct Answer = B
Justification:- Detection risk arises when an IS auditor employs an
inadequate test procedure and erroneously concludes that no
material errors exist when they actually do.
Correct Answer = A
Justification:- Quantitative risk analysis is not always feasible
when the IS auditor attempts to calculate risk using
nonquantifiable threats and potential losses. In such cases, a
qualitative risk assessment is more suitable.
Correct Answer = A
Justification:- Reviewing an audit client's business plan should be
conducted before reviewing an organization's IT strategic plan.
132. How does the risk of improper file access change after the
implementation of a database system?
A. Risk varies.
B. Risk is reduced.
C. Risk is not affected.
D. Risk is increase
Correct Answer = D
Justification:- Implementing a database system increases the risk
of improper file access.
133. How does the risk level change when users have direct
access to a database at the system level?
A. Risk of unauthorized access increases, but risk of untraceable
changes to the database decreases.
B. Risk of unauthorized and untraceable changes to the database
increases.
C. Risk of unauthorized access decreases, but risk of untraceable
changes to the database increases.
D. Risk of unauthorized and untraceable changes to the database
decreases.
Correct Answer = B
Justification:- When users have direct access to a database at the
system level, the risk of unauthorized and untraceable changes to
the database is heightened.
134. What is an effective countermeasure for addressing the
vulnerability of data entry operators potentially leaving their
computers without logging off? Please choose the most
appropriate answer.
A. Employee security awareness training
B. Administrator alerts
C. Screensaver passwords
D. Close supervision
Correct Answer = C
Justification:- Using screensaver passwords is an effective control
to counter the vulnerability of data entry operators potentially
leaving their computers without logging off.
Correct Answer = A
Justification:- End-user involvement is crucial during the business
impact assessment phase of business continuity planning.
Correct Answer = B
Justification:- Business unit management is responsible for
implementing cost-effective controls in an automated system.
Correct Answer = B
Justification:- The project steering committee is responsible for
the overall direction, costs, and timetables of systems
development projects.
139. Which layer(s) of the OSI reference model are utilized for
encrypting data?
A. Transport layer
B. Session layer
C. Session and transport layers
D. Data link layer
Correct Answer = C
Justification:- User applications often utilize protocols within the
OSI session layer or lower in the transport layer to encrypt and
encapsulate data.
140. What protocols does the OSI Transport Layer of the TCP/IP
protocol suite provide to ensure reliable communication?
A. Nonconnection-oriented protocols
B. Connection-oriented protocols
C. Session-oriented protocols
D. Nonsession-oriented protocols
Correct Answer = B
Justification:- The transport layer of the TCP/IP protocol suite
ensures reliable communication by utilizing connection-oriented
protocols.
Correct Answer = C
Justification:- Shadow file processing can be implemented as a
recovery mechanism for time-sensitive transaction processing.
Correct Answer = A
Justification:- Network performance-monitoring tools are
employed to measure and ensure proper network capacity
management and service availability.
Correct Answer = B
Justification:- Intrusion-detection systems (IDS) are utilized to
gather evidence of network attacks.
Correct Answer = B
Justification:- IS auditors should always verify that password files
are encrypted.
Correct Answer = C
Justification:- If an IS auditor observes that an IS department does
not employ formal documented methodologies, policies, and
standards, the auditor should at least document the informal
policies and standards and evaluate compliance. Furthermore, the
auditor should recommend to management the development and
implementation of formal documented policies.
Correct Answer = C
Justification:- The criticality of assets is often influenced by the
business criticality of the data to be protected and the extent of
the impact on the organization as a whole. For instance, the loss
of a network backbone has a far greater impact on the
organization as a whole compared to the loss of data on a typical
user's workstation.
Correct Answer = D
Justification:- When storing data archives off-site, synchronization
is necessary to ensure data completeness.
Correct Answer = B
Justification:- To effectively safeguard against unauthorized
disclosure of sensitive data, hard disks should be demagnetized
before disposal or release.
150. Describe what the directory system of a database-
management system encompasses.
A. The access method to the data
B. The location of data AND the access method
C. The location of data
D. Neither the location of data NOR the access method
Correct Answer = B
Justification:- The directory system of a database-management
system defines the data's location and the access method.
Correct Answer = C
Justification:- When assessing the collective impact of preventive,
detective, or corrective controls within a process, an IS auditor
should consider the point at which controls are applied asdata
flows through the system.
Correct Answer = C
Justification:- When reviewing print systems spooling, an IS
auditor is primarily concerned with the potential unauthorized
printing of report copies.
Correct Answer = A
Justification:- The project sponsor is ultimately responsible for
providing requirement specifications to the software development
team.
Correct Answer = B
Justification:- If a database is restored from a backup taken before
the last system image, the system should be restarted before
processing the final transaction, as it needs to be reprocessed.
Correct Answer = D
Justification:- The SSL protocol ensures confidentiality through
symmetric encryption methods like Data Encryption Standard
(DES).
Correct Answer = C
Justification:- Time stamps are an effective control for identifying
duplicate transactions, such as payments made or received.
Correct Answer = C
Justification:- Reviewing an organization chart is primarily done by
an IS auditor to gain a better understanding of individuals'
responsibilities and authority.
Correct Answer = C
Justification:- When attempting to determine unauthorized access
to data by a user or program, the IS auditor often reviews the
system logs.
Correct Answer = A
Justification:- While the primary objective of Business Continuity
Planning (BCP) and Disaster Recovery Planning (DRP) is to
mitigate the risk and impact of business interruptions, the
protection of human life remains the dominant objective.
Correct Answer = C
Justification:- One of the main high-level goals for an auditor
reviewing a systems development project is to ensure the
achievement of business objectives. This objective guides all
other systems development objectives.
Correct Answer = C
Justification:- The main objective of audit trails is to establish
accountability and responsibility for processed transactions.
Correct Answer = A
Justification:- The primary responsibility of an IS auditor is to
advise senior management about the risks associated with not
implementing proper segregation of duties. For example, this
includes situations where the security administrator performs
operational functions.
Correct Answer = C
Justification:- Once potential security vulnerabilities are identified,
the next step for the IS auditor is to conduct a business impact
analysis of the threats that could exploit those vulnerabilities.
Correct Answer = A
Justification:- Despite providing only single-factor authentication,
biometrics is widely regarded as an excellent method for user
authentication.
Correct Answer = D
Justification:- Transaction authorization is the primary security
concern in EDI environments.
Correct Answer = D
Justification:- To mitigate the risk of a widespread physical
disaster like a hurricane or an earthquake, it is important to
geographically separate off-site data backup and storage.
Correct Answer = A
Justification:- Following any changes made to an application or
system, programmers should perform unit, module, and full
regression testing.
Correct Answer = A
Justification:- One of the major concerns in IS auditing is the
ability of users to directly modify the database.
Correct Answer = A
Justification:- Honeypots are frequently utilized as detection and
deterrent controls against internet attacks.
Correct Answer = C
Justification:- Among the three primary types of BCP tests (paper,
walk-through, and preparedness), a walk-through test only
requires representatives from each operational area to meet and
review the plan.
172. What type of BCP test simulates a system crash using actual
resources to validate the plan's effectiveness?
A. Paper
B. Preparedness
C. Walk-through
D. Parallel
Correct Answer = B
Justification:- Of the three major types of BCP tests (paper, walk-
through, and preparedness), only the preparedness test utilizes
actual resources to simulate a system crash and validate the
effectiveness of the plan.
173. Why is the WAP gateway a critical concern for the IS auditor
when auditing and testing controls for message confidentiality?
A. WAP is often configured by default settings and is thus
insecure.
B. WAP provides weak encryption for wireless traffic.
C. WAP functions as a protocol-conversion gateway for wireless
TLS to Internet SSL.
D. WAP often interfaces critical IT systems.
Correct Answer = C
Justification:- When auditing and testing controls that enforce
message confidentiality, the IS auditor needs to critically review
the WAP gateway, which functions as a protocol-conversion
gateway for wireless TLS to Internet SSL.
Correct Answer = B
Justification:- With public key encryption or asymmetric
encryption, the sender encrypts data using the recipient's public
key and the recipient decrypts it using their private key.
Correct Answer = A
Justification:- IS auditors are most likely to perform compliance
tests of internal controls if, after their initial evaluation, they
determine that control risks are within acceptable limits.
Compliance testing is necessary to validate reliance on internal
controls. When control risks are high, additional substantive
testing is required.
Correct Answer = A
Justification:- Proper segregation of duties prevents a system
analyst from performing quality-assurance functions.
Correct Answer = B
Justification:- In general, proper segregation of duties prohibits a
LAN administrator from having programming responsibilities.
Correct Answer = A
Justification:- Atomicity ensures data integrity by guaranteeing
that a transaction is either completed entirely or not at all.
Atomicity is one of the ACID test criteria for transaction
processing.
Correct Answer = A
Justification:- A disaster recovery plan (DRP) aims to reduce the
recovery time and associated costs in the event of a major
business interruption. Despite increasing pre- and post-incident
operational costs, DRP results in reduced recovery and business
impact costs.
180. True or false: Obtaining user approval for program changes
is effective in controlling application changes and maintenance.
A. True
B. False
Correct Answer = A
Justification:- Obtaining user approval for program changes is
highly effective in controlling application changes and
maintenance.
Correct Answer = B
Justification:- Function point analysis (FPA) estimates the size of
an information system based on the number and complexity of
inputs, outputs, and files.
Correct Answer = B
Justification:- When participating in a systems-development
project, an IS auditor should ensure that adequate and complete
documentation exists for all projects.
183. True or false: Fourth-Generation Languages (4GLs) are
suitable for designing the application's GUI but not intensive data-
calculation procedures.
A. True
B. False
Correct Answer = A
Justification:- Fourth-generation languages (4GLs) are suitable for
designing the application's graphical user interface (GUI) but not
for designing intensive data-calculation procedures.
Correct Answer = A
Justification:- Network environments often increase the
complexity of program-to-program communication, making
implementation and maintenance of application systems more
challenging.
Correct Answer = B
Justification:- Control logs are unlikely to reveal whether a
password disclosure was intentional or unintentional.
Correct Answer = B
Justification:- An integrated test facility is a valuable audit tool as
it compares processing output with independently calculated
data.
Correct Answer = A
Justification:- One advantage of a continuous audit approach is
that it can enhance system security in time-sharing environments
that process a large number of transactions.
Correct Answer = B
Justification:- When conducting an IS strategy audit, an IS auditor
should review both short-term (one-year) and long-term (three- to
five-year) IS strategies, interview relevant corporate management
personnel, and ensure consideration of the external environment.
Correct Answer = A
Justification:- Allowing application programmers to directly patch
or change code in production programs increases the risk of
fraud.
Correct Answer = A
Justification:- Proper segregation of duties does not prevent a
quality-control administrator from being responsible for change
control and problem management at the same time.
Correct Answer = A
Justification:- Proper segregation of duties ensures that a
computer operator (user) cannot perform security administration
duties.
Correct Answer = B
Justification:- Digital signatures require the sender to encrypt the
data with their private key, which is then decrypted by the
recipient using the sender's public key.
Correct Answer = B
Justification:- Rather than solely assessing the effectiveness and
utilization of assets, an IS auditor is more concerned with
adequate access control, appropriate access policies, and the
effectiveness of safeguards and procedures.
Correct Answer = A
Justification:- When a programmer has update access to a live
system, IS auditors are primarily concerned with their ability to
initiate or modify transactions and access production rather than
their authority to authorize transactions.
195. True or false: An off-site processing facility should be easily
identifiable externally to ensure smoother recovery.
A. True
B. False
Correct Answer = B
Justification:- An off-site processing facility should not be easily
identifiable externally, as easy identification would create an
additionalvulnerability for sabotage.
Correct Answer = A
Justification:- Prioritizing the mitigation of the risk and impact of a
disaster or business interruption usually takes precedence over
transferring the risk to a third party, such as an insurer.
Correct Answer = A
Justification:- Test and development environments should be
separated to maintain the stability of the test environment.
Correct Answer = A
Justification:- When business processes undergo re-engineering,
the IS auditor should strive to identify and quantify the impact of
any controls that may have been removed or might be less
effective after the changes.
Correct Answer = A
Justification:- In small office environments, maintaining proper
segregation of duties for programmers is not always feasible.
Compensatory controls, such as reviewing transaction results
against approved input, may be necessary if a programmer has
access to production data or applications.
Correct Answer = A
Justification:- Database snapshots can serve as an excellent audit
trail for an IS auditor.