Inspirational journeys

Follow the stories of academics and their research expeditions

CISA—Certified Information Systems Auditor - Part 157

Mary Smith

Mon, 17 Mar 2025

CISA—Certified Information Systems Auditor - Part 157

1. When are benchmarking partners identified within the benchmarking process?

A) In the design stage
B) In the testing stage
C) In the research stage
D) In the development stage



2. A check digit is an effective edit check to:

A) Detect data-transcription errors
B) Detect data-transposition and transcription errors
C) Detect data-transposition, transcription, and substitution errors
D) Detect data-transposition errors



3. Parity bits are a control used to validate:

A) Data authentication
B) Data completeness
C) Data source
D) Data accuracy



4. The traditional role of an IS auditor in a control self-assessment (CSA) should be that of a(n):

A) Implementor
B) Facilitator
C) Developer
D) Sponsor



5. Which of the following would prevent accountability for an action performed, thus allowing nonrepudiation?

A) Proper authentication
B) Proper identification AND authentication
C) Proper identification
D) Proper identification, authentication, AND authorization



1. Right Answer: C
Explanation: Benchmarking partners are identified in the research stage of the benchmarking process.

2. Right Answer: B
Explanation: A check digit is an effective edit check to detect data-transposition and transcription errors.

3. Right Answer: B
Explanation: Parity bits are a control used to validate data completeness.

4. Right Answer: B
Explanation: The traditional role of an IS auditor in a control self-assessment (CSA) should be that of a facilitator.

5. Right Answer: B
Explanation: If proper identification and authentication are not performed during access control, no accountability can exist for any action performed.

0 Comments

Leave a comment