1. What can be used to help identify and investigate unauthorized transactions?
A) Postmortem review B) Reasonableness checks C) Data-mining techniques D) Expert systems
2. Network environments often add to the complexity of program-to-program communication, making the implementation and maintenance of application systems more difficult. True or false?
A) True B) False C) D)
3. isk analysis is not always possible because the IS auditor is attempting to calculate risk using nonquantifiable threats and potential losses. In this event, a_________________ risk assessment is more appropriate. Fill in the blanks.
A) Quantitative; qualitative B) Qualitative; quantitative C) Residual; subjective D) Quantitative; subjective
4. What must an IS auditor understand before performing an application audit?
A) The potential business impact of application risks. B) Application risks must first be identified. C) Relative business processes. D) Relevant application risks.
5. What is the first step in a business process re-engineering project?
A) Identifying current business processes B) Forming a BPR steering committee C) Defining the scope of areas to be reviewed D) Reviewing the organizational strategic plan
1. Right Answer: C Explanation: Data-mining techniques can be used to help identify and investigate unauthorized transactions.
2. Right Answer: A Explanation: Network environments often add to the complexity of program-to-program communication, making application systems implementation and maintenance more difficult.
3. Right Answer: A Explanation: Quantitative risk analysis is not always possible because the IS auditor is attempting to calculate risk using nonquantifiable threats and potential losses. In this event, a qualitative risk assessment is more appropriate.
4. Right Answer: C Explanation: An IS auditor must first understand relative business processes before performing an application audit.
5. Right Answer: C Explanation: Defining the scope of areas to be reviewed is the first step in a business process re-engineering project.
Leave a comment