Inspirational journeys

Follow the stories of academics and their research expeditions

CISA—Certified Information Systems Auditor - Part 351

Mary Smith

Mon, 17 Mar 2025

CISA—Certified Information Systems Auditor - Part 351

1. The technique of rummaging through commercial trash to collect useful business information is known as:

A) Information diving
B) Intelligence diving
C) Identity diving
D) System diving
E) Program diving
F) None of the choices.

2. Which of the following refers to a primary component of corporate risk management with the goal of minimizing the risk of prosecution for software piracy due to use of unlicensed software?

A) Software audit
B) System audit
C) Application System audit
D) Test audit
E) Mainframe audit
F) None of the choices.

3. In a security server audit, focus should be placed on (Choose two.):(Select 2answers)

A) proper segregation of duties
B) adequate user training
C) continuous and accurate audit trail
D) proper application licensing
E) system stability
F) performance and controls of the system

4. The purpose of a mainframe audit is to provide assurance that processes are being implemented as required, the mainframe is operating as it should, security is strong, and that procedures in place are working and are updated as needed. The auditor may accordingly make recommendations for improvement. Which of the following types of audit always takes high priority over the others? (Choose five.)(Select 5answers)

A) System audit
B) Application audit
C) Software audit
D) License audit
E) Security server audit
F) None of the choices.

5. Talking about application system audit, focus should always be placed on (Choose five.)(Select 5answers)

A) performance and controls of the system
B) the ability to limit unauthorized access and manipulation
C) input of data are processed correctly
D) output of data are processed correctly
E) changes to the system are properly authorized
F) None of the choices.

1. Right Answer: A
Explanation: Dumpster diving in the form of information diving describes the practice of rummaging through commercial trash to find useful information such as files, letters, memos, passwords ...etc.

2. Right Answer: A
Explanation: Software audits are a component of corporate risk management, with the goal of minimizing the risk of prosecution for software piracy due to use of unlicensed software. From time to time internal or external audits may take a forensic approach to establish what is installed on the computers in an organization with the purpose of ensuring that it is all legal and authorized and to ensure that its process of processing transactions or events is correct.

3. Right Answer: A,C
Explanation:

4. Right Answer: A,B,C,D,E
Explanation:

5. Right Answer: A,B,C,D,E
Explanation: Talking about application system audit, focus should be placed on the performance and controls of the system, its ability to limit unauthorized access and manipulation, that input and output of data are processed correctly on the system, that any changes to the system are authorized, and that users have access to the system.

0 Comments

Leave a comment