Inspirational journeys

Follow the stories of academics and their research expeditions

CISA—Certified Information Systems Auditor - Part 155

Mary Smith

Mon, 17 Mar 2025

CISA—Certified Information Systems Auditor - Part 155

1. What can be used to help identify and investigate unauthorized transactions?

A) Postmortem review
B) Reasonableness checks
C) Data-mining techniques
D) Expert systems



2. Network environments often add to the complexity of program-to-program communication, making the implementation and maintenance of application systems more difficult. True or false?

A) True
B) False
C)
D)



3. isk analysis is not always possible because the IS auditor is attempting to calculate risk using nonquantifiable threats and potential losses. In this event, a_________________ risk assessment is more appropriate. Fill in the blanks.

A) Quantitative; qualitative
B) Qualitative; quantitative
C) Residual; subjective
D) Quantitative; subjective



4. What must an IS auditor understand before performing an application audit?

A) The potential business impact of application risks.
B) Application risks must first be identified.
C) Relative business processes.
D) Relevant application risks.



5. What is the first step in a business process re-engineering project?

A) Identifying current business processes
B) Forming a BPR steering committee
C) Defining the scope of areas to be reviewed
D) Reviewing the organizational strategic plan



1. Right Answer: C
Explanation: Data-mining techniques can be used to help identify and investigate unauthorized transactions.

2. Right Answer: A
Explanation: Network environments often add to the complexity of program-to-program communication, making application systems implementation and maintenance more difficult.

3. Right Answer: A
Explanation: Quantitative risk analysis is not always possible because the IS auditor is attempting to calculate risk using nonquantifiable threats and potential losses. In this event, a qualitative risk assessment is more appropriate.

4. Right Answer: C
Explanation: An IS auditor must first understand relative business processes before performing an application audit.

5. Right Answer: C
Explanation: Defining the scope of areas to be reviewed is the first step in a business process re-engineering project.

0 Comments

Leave a comment