In a follow-up audit, an IS auditor notes that management has addressed the original findings in a different way than originally agreed upon. The auditor should FIRST:

In a follow-up audit, an IS auditor notes that management has addressed the original findings in a different way than originally agreed upon. The auditor should FIRST:A . mark the recommendation as satisfied and close the findingB . verify if management’s action mitigates the identified riskC . re-perform the audit...

July 2, 2020 2 Comments READ MORE +

Which of the following is the most important benefit of control self-assessment (CSA)?

Which of the following is the most important benefit of control self-assessment (CSA)? A. CSA is a policy/rule driven B. In CSA approach, risk is identified sooner C. CSA requires limited employee participations D. In CSA, resources are being used in an effective manner.View AnswerAnswer: B Explanation: Control self-assessment is...

July 2, 2020 No Comments READ MORE +

Which of the following should an IS auditor be MOST concerned with during a post-implementation review?

Which of the following should an IS auditor be MOST concerned with during a post-implementation review?A . The system does not have a maintenance planB . The system contains several minor defectsC . The system was over budget by 15%D . The system deployment was delayed by three weeksView AnswerAnswer:...

July 1, 2020 No Comments READ MORE +

Which of the following audit mainly focuses on discovering and disclosing on frauds and crimes?

Which of the following audit mainly focuses on discovering and disclosing on frauds and crimes?A . Compliance AuditB . Financial AuditC . Integrated AuditD . Forensic auditView AnswerAnswer: D Explanation: Forensic audit is the activity that consists of gathering, verifying, processing, analyzing of and reporting on data in order to...

July 1, 2020 No Comments READ MORE +

What is the auditor’s BEST recommendation for the organization?

An IS auditor has found that a vendor has gone out of business and the escrow has an older version of the source code. What is the auditor’s BEST recommendation for the organization?A . Continue using the existing application since it meets the current requirementsB . Prepare a maintenance plan...

July 1, 2020 No Comments READ MORE +

The MAIN benefit of using an integrated test facility (ITF) as an online auditing technique is that it enables:

The MAIN benefit of using an integrated test facility (ITF) as an online auditing technique is that it enables:A . a cost-effective approach to application controls auditB . auditors to investigate fraudulent transactionsC . auditors to test without impacting production dataD . the integration of financial and audit testsView AnswerAnswer:...

July 1, 2020 No Comments READ MORE +

Which of the following audit assess accuracy of financial reporting?

Which of the following audit assess accuracy of financial reporting?A . Compliance AuditB . Financial AuditC . Operational AuditD . Forensic auditView AnswerAnswer: B Explanation: A financial audit, or more accurately, an audit of financial statements, is the verification of the financial statements of a legal entity, with a view...

July 1, 2020 No Comments READ MORE +

An IS auditor reviewing a new application for compliance with information privacy principles should be the MOST concerned with:

An IS auditor reviewing a new application for compliance with information privacy principles should be the MOST concerned with:A . nonrepudiationB . collection limitationC . availabilityD . awarenessView AnswerAnswer: B

July 1, 2020 No Comments READ MORE +

What kind of a strategy should Sam recommend to the senior management to treat these risks?

Sam is the security Manager of a financial institute. Senior management has requested he performs a risk analysis on all critical vulnerabilities reported by an IS auditor. After completing the risk analysis, Sam has observed that for a few of the risks, the cost benefit analysis shows that risk mitigation...

July 1, 2020 No Comments READ MORE +

Which of the following control is intended to discourage a potential attacker?

Which of the following control is intended to discourage a potential attacker?A . DeterrentB . PreventiveC . CorrectiveD . RecoveryView AnswerAnswer: A Explanation: Deterrent Control are intended to discourage a potential attacker For your exam you should know below information about different security controls Deterrent Controls Deterrent Controls are intended...

July 1, 2020 No Comments READ MORE +