CISA Practice Questions IT Governance
CISA Practice Questions IT Governance
An IS auditor who is reviewing application run manuals would expect them to contain:
A. Details of source documents.
B. Error codes and their recovery actions.
C. Program logic flowcharts and file definitions.
D. Change records for the application source code.
6. An IS auditor performing a review of the MIS department discovers that formal project
approval procedures do not exist. In the absence of these procedures the MIS manager has
been arbitrarily approving projects that can be completed in a short duration and referring
other more complicated projects to higher levels of management for approval. The IS
auditor should recommend FIRST that:
A. Users participate in the review and approval process.
B. Formal approval procedures be adopted and documented.
C. All projects are referred to appropriate levels of management for approval.
D. The MIS manager job description be changed to include approval authority.
7. An IS auditor performing an audit of the companys information system (IS) strategy would
be LEAST likely to:
A. Assess IS security procedures.
B. Review both short and long-term IS strategies.
C. Interview appropriate corporate management personnel.
D. Ensure that the external environment has been considered.
16. Which of the following is LEAST likely to be associated with an incident response
capability?
A. Developing a database repository of past incidents and actions to facilitate future
corrective actions
B. Declaring the incident, which not only helps to carry out corrective measures, but also to
improve the awareness level
C. Developing a detailed operations plan that outlines specific actions to be taken to recover
from an incident
D. Establishing multi-disciplinary teams consisting of executive management, security
staff, information systems staff, legal counsel, public relations, etc to carry out the
response
17. An IS auditor has recently discovered that because of a shortage of skill operations
personnel, the security administrator has agreed to work one late night shift a month as the
senior computer operator. The MOST appropriate course of action that the IS auditor
should take is to:
A. Advise senior management of the risk involved.
B. Agree to work with the security officer on these shifts as a form of preventative control
C. Develop a computer-assisted audit technique to detect instances of abuses of this
arrangement
D. Review the system log for each of the late-night shifts to determine whether any
irregular actions occurred.
18. Employee termination practices should address all of the following EXCEPT:
A. Arrangement for the final pay and removal of the employee from the active payroll files.
B. Notification to other staff and facilities security to increase awareness of the terminated
employees status
C. Employee bonding to protect against losses due to theft
D. Deletion of assigned logon-ID and passwords to prohibit system access
19. Is it appropriate for an IS auditor from a company which is considering outsourcing its IS
processing to request and review a copy of each vendors business continuity plan?
A. Yes, because the IS auditor will evaluate the adequacy of the service bureaus plan and
assist his/her company in implementing a complementary plan
B. Yes, because, based on the plan, the IS auditor will evaluate the financial stability of the
service bureau and its ability to fulfill the contract
C. No, because backup to be provided should be adequately specified in the contract
D. No, because the service bureaus business continuity plan is proprietary information to
which users IS auditors are not usually allowed access.
20. A long-term IS employee with a strong technical background and broad managerial
experience has applied for a vacant position in the IS audit department. Determining
whether to hire this individual for this position should be based on the individuals vast
experience and:
A. The length of service since this will help ensure technical competence
B. The individuals age as training in audit techniques may be impractical
C. IS knowledge since this will bring enhanced credibility to the audit function
D. Existing IS relationships where the ability to retain audit independence may be difficult
21. Which of the following key performance indicators would an IS manager be LEAST likely
to systematically report to the board of directors?
A. Average response time to users requirements
B. Cost per transaction
C. IS costs per area
D. Disk storage space free
22. Which of the following is NOT an advantage of cross training employees?
A. It provides for succession planning
B. It decreases dependence on one employee
C. It provides back-up personnel in the event of absence
D. It allows individuals to understand all parts of a system
23. While conducting an audit of managements planning of IS, what would an IS auditor
consider the MOST relevant to short-term planning for the IS department?
A. Allocating resources
B. Keeping current with technology advance
C. Conducting control self-assessment
D. Evaluating hardware needs
24. Which of the following IS functions may be performed by the same individual, without
compromising on control or violating segregation of duties?
A. Job control analyst and applications programmer
B. Mainframe operator and system programmer
C. Change / problem and quality control administrator
D. Application and system programmer