1. Which of the following is an analytical review procedure for a payroll system?
A) Performing penetration attempts on the payroll system B) Evaluating the performance of the payroll system, using benchmarking software C) Performing reasonableness tests by multiplying the number of employees by the average wage rate D) Testing hours reported on time sheets
2. An IS auditor observes that the CEO has full access to the enterprise resource planning (ERP) system. The IS auditor should FIRST:
A) accept the level of access provided as appropriate B) recommend that the privilege be removed C) ignore the observation as not being material to the review D) document the finding as a potential risk
3. Two servers are deployed in a cluster to run a mission-critical application. To determine whether the system has been designed for optimal efficiency, the IS auditor should verify that:
A) the security features in the operating system are all enabled B) the number of disks in the cluster meets minimum requirements C) the two servers are of exactly the same configuration D) load balancing between the servers has been implemented
4. The GREATEST risk when performing data normalization is:
A) the increased complexity of the data model B) duplication of audit logs C) reduced data redundancy D) decreased performance
5. An IS auditor has found that a vendor has gone out of business and the escrow has an older version of the source code. What is the auditor's BEST recommendation for the organization?
A) Continue using the existing application since it meets the current requirements B) Prepare a maintenance plan that will support the application using the existing code C) Bring the escrow version up to date D) Undertake an analysis to determine the business risk
Leave a comment