Inspirational journeys

Follow the stories of academics and their research expeditions

CISA—Certified Information Systems Auditor - Part 132

Mary Smith

Thu, 19 Jun 2025

CISA—Certified Information Systems Auditor - Part 132

1. In an EDI process, the device which transmits and receives electronic documents is the:

A) communications handler.
B) EDI translator.
C) application interface.
D) EDI interface.



2. The MOST significant level of effort for business continuity planning (BCP) generally is required during the:

A) testing stage.
B) evaluation stage.
C) maintenance stage.
D) early stages of planning.



3. Which of the following network configuration options contains a direct link between any two host machines?

A) Bus
B) Ring
C) Star
D) Completely connected (mesh)



4. Which of the following types of data validation editing checks is used to determine if a field contains data, and not zeros or blanks?

A) Check digit
B) Existence check
C) Completeness check
D) Reasonableness check



5. Which of the following tests is an IS auditor performing when a sample of programs is selected to determine if the source and object versions are the same?

A) A substantive test of program library controls
B) A compliance test of program library controls
C) A compliance test of the program compiler controls
D) A substantive test of the program compiler controls



1. Right Answer: A
Explanation: A communications handler transmits and receives electronic documents between trading partners and/or wide area networks (WANs).

2. Right Answer: D
Explanation: Company.com in the early stages of a BCP will incur the most significant level of program development effort, which will level out as the BCP moves into maintenance, testing and evaluation stages. It is during the planning stage that an IS auditor will play an important role in obtaining senior management's commitment to resources and assignment of BCP responsibilities.

3. Right Answer: D
Explanation: A completely connected mesh configuration creates a direct link between any two host machines.

4. Right Answer: C
Explanation: A completeness check is used to determine if a field contains data and not zeros or blanks.

5. Right Answer: B
Explanation: A compliance test determines if controls are operating as designed and are being applied in a manner that complies with management policies and procedures.For example, if the IS auditor is concerned whether program library controls are working properly, the IS auditor might select a sample of programs to determine if the source and object versions are the same. In other words, the broad objective of any compliance test is to provide auditors with reasonable assurance that a particular control on which the auditor plans to rely is operating as the auditor perceived it in the preliminary evaluation.

0 Comments

Leave a comment