DOMAIN 4 Exam
DOMAIN 4 Exam
An IS auditor should expect which of the following items to be included in the request for proposal (RFP)
when IS is procuring services from an independent service provider (ISP)?
To aid management in achieving IT and business alignment, an IS auditor should recommend the use of:
A. control self-assessments.
B. a business impact analysis.
C. an IT balanced scorecard.
D. business process reengineering.
C. an IT balanced scorecard.
A poor choice of passwords and transmission over unprotected communications lines are examples of:
A. vulnerabilities.
B. threats.
C. probabilities.
D. impacts.
A. vulnerabilities.
Q
To support an organization’s goals, an IS department should have:
A. a low-cost philosophy.
B. long- and short-range plans.
C .leading-edge technology.
D. plans to acquire new hardware and software.
To minimize costs and improve service levels an outsourcer should seek which of the following contract
clauses?
Which of the following is the BEST information source for management to use as an aid in the
identification of assets that are subject to laws and regulations?
D. Significant contracts
The management of an organization has decided to establish a security awareness program. Which of
the following would MOST likely be a part of the program?
10
A comprehensive and effective e-mail policy should address the issues of e-mail structure, policy
enforcement, monitoring and:
A. recovery.
B. retention.
C. rebuilding.
D. reuse.
B. retention.
11
When performing a review of the structure of an electronic funds transfer (EFT) system, an IS auditor
observes that the technological infrastructure is based on a centralized processing scheme that
has been outsourced to a provider in another country. Based on this information, which of the following
conclusions should be the main concern of the IS auditor?
12
The risks associated with electronic evidence gathering would MOST likely be reduced by an e-mail:
A. destruction policy.
B. security policy.
C. archive policy.
D. audit policy.
C. archive policy.
13
14
Which of the following would an IS auditor consider to be the MOST important when evaluating an
organization’s IS strategy? That it:
15
Which of the following would MOST likely indicate that a customer data warehouse should remain in-
house rather than be outsourced to an offshore operation?
16
When reviewing IS strategies, an IS auditor can BEST assess whether IS strategy supports the
organizations; business objectives by determining if IS:
A. has all the personnel and equipment it needs.
B. plans are consistent with management strategy.
C. uses its equipment and personnel efficiently and effectively.
D. has sufficient excess capacity to respond to changing directions.
17
A. monitors systems performance and tracks problems resulting from program changes.
B. reviews network load requirements in terms of current and future transaction volumes.
C. assesses the impact of the network load on terminal response times and network data transfer rates.
D. recommends network balancing procedures and improvements.
A. monitors systems performance and tracks problems resulting from program changes.
18
19
Which of the following provides the best evidence of the adequacy of a security awareness program?
20
The advantage of a bottom-up approach to the development of organizational policies is that the
policies:
21
Is it appropriate for an IS auditor from a company that is considering outsourcing its IS processing to
request and review a copy of each vendor’s business continuity plan?
A. Yes, because an IS auditor will evaluate the adequacy of the service bureaus’ plan and assist their
company in implementing a complementary plan.
B. Yes, because based on the plan, an IS auditor will evaluate the financial stability of the
service bureau and its ability to fulfill the contract.
C. No, because the backup to be provided should be specified adequately in the contract.
D. No, because the service bureaus business continuity plan is proprietary information.
A. Yes, because an IS auditor will evaluate the adequacy of the service bureaus’ plan and assist their
company in implementing a complementary plan.
22
Q
A. facilitates interoperability.
B. facilitates the integration of proprietary components.
C. will be a basis for volume discounts from equipment vendors.
D. allows for the achievement of more economies of scale for equipment.
A. facilitates interoperability.
23
24
In the context of effective information security governance, the primary objective of value delivery
is to:
26
A retail outlet has introduced radio frequency identification (RFID) tags to create unique serial numbers
for all products. Which of the following is the PRIMARY concern associated with this initiative?
A. Issues of privacy
B. Wavelength can be absorbed by the human body C. RFID tags may not be removable
D. RFID eliminates line-of- sight reading
A. Issues of privacy
27
Which of the following would an IS auditor consider the MOST relevant to short-term planning for an IS
department?
A. Allocating resources
B. Keeping current with technology advances
C. Conducting control self-assessment
D. Evaluating hardware needs
A. Allocating resources
28
When developing a risk management program, what is the FIRST activity to be performed?
A. Threat assessment
B. Classification of data
C. Inventory of assets
D. Criticality analysis
C. Inventory of assets
29
A long-term IS employee with a strong technical background and broad managerial experience has
applied for a vacant position in the IS audit department. Determining whether to hire this individual for
this position should be based on the individual’s experience and:
30
B. board of directors.
31
Which of the following is the BEST performance criterion for evaluating the adequacy of an
organization’s security awareness training?
32
33
Q
34
A. IS department.
B. security committee.
C. security administrator.
D. board of directors.
D. board of directors.
35
An example of a direct benefit to be derived from a proposed IT-related business investment is:
A. enhanced reputation.
B. enhanced staff morale.
C. the use of new technology.
D. increased market penetration.
A
D. increased market penetration.
36
Which of the following should be considered FIRST when implementing a risk management program?
37
C. Approving and monitoring major projects, the status of IS plans and budgets
38
39
40
When an employee is terminated from service, the MOST important action is to:
41
42
43
Which of the following goals would you expect to find in an organization’s strategic plan?
44
The MOST likely effect of the lack of senior management commitment to IT strategic planning is:
45