Inspirational journeys

Follow the stories of academics and their research expeditions

CISA—Certified Information Systems Auditor - Part 354

Mary Smith

Sat, 24 May 2025

CISA—Certified Information Systems Auditor - Part 354

1. For application acquisitions with significant impacts, participation of your IS audit team should be encouraged:

A) early in the due diligence stage.
B) at the testing stage.
C) at the final approval stage.
D) at the budget preparation stage.
E) None of the choices.


2. Which of the following should be seen as one of the most significant factors considered when determining the frequency of IS audits within your organization?

A) The cost of risk analysis
B) The income generated by the business function
C) Resource allocation strategy
D) The nature and level of risk
E) None of the choices.


3. Properly planned risk-based audit programs are often capable of offering which of the following benefits?

A) audit efficiency and effectiveness.
B) audit efficiency only.
C) audit effectiveness only.
D) audit transparency only.
E) audit transparency and effectiveness.
F) None of the choices.

4. The sophistication and formality of IS audit programs may vary significantly depending on which of the following factors?

A) the target's management hands-on involvement.
B) the target's location.
C) the target's size and complexity.
D) the target's budget.
E) the target's head count.
F) None of the choices.

5. Which of the following is one most common way that spyware is distributed?

A) as a trojan horse.
B) as a virus.
C) as an Adware.
D) as a device driver.
E) as a macro.
F) None of the choices.

1. Right Answer: A
Explanation: For acquisitions with significant IT impacts, participation of IS audit is often necessary early in the due diligence stage as defined in the audit policy.

2. Right Answer: D
Explanation: You use a risk assessment process to describe and analyze the potential audit risks inherent in a given line of business. You should update such risk assessment at least annually to reflect changes. The level and nature of risk should be the most significant factors to be considered when determining the frequency of audits.

3. Right Answer: A
Explanation: Properly planned risk-based audit programs shall increase audit efficiency and effectiveness. The sophistication and formality of this kind of audit do vary a lot depending on the target's size and complexity.

4. Right Answer: C
Explanation: Properly planned risk-based audit programs shall increase audit efficiency and effectiveness. The sophistication and formality of this kind of audit do vary a lot depending on the target's size and complexity.

5. Right Answer: A
Explanation: One of the most common ways that spyware is distributed is as a Trojan horse, bundled with a piece of desirable software that the user downloads off the Web or a peer-to-peer file-trading network. When the user installs the software, the spyware is installed alongside.

0 Comments

Leave a comment