1. While performing a risk-based audit, which of the following would BEST enable an IS auditor to identify and categorize risk?
A) Understanding the control framework B) Developing a comprehensive risk model C) Understanding the business environment D) Adopting qualitative risk analysis
2. Which of the following is a MAJOR benefit of using a wireless network?
A) Faster network speed B) Stronger authentication C) Protection against eavesdropping D) Lower installation cost
3. Which of the following is appropriate when an IS auditor is conducting an exit meeting with senior management?
A) Eliminate significant findings where audit and management agree on risk acceptance. B) Agree with senior management on the risk grading of the audit report. C) Document written responses from management along with an implementation plan. D) Escalate disputed recommendations to the audit committee.
4. When conducting a follow-up of previous audit findings, an IS auditor is told by management that a recommendation to make security changes to an application has not been implemented. The IS auditor should FIRST determine whether:
A) additional time to implement changes is needed. B) the associated risk is still relevant. C) the recommendation should be re-issued. D) the issue should be escalated.
5. A new system development project is running late against a critical implementation deadline. Which of the following is the MOST important activity?
A) Document last-minute enhancements. B) Perform user acceptance testing. C) Perform a pre-implementation audit. D) Ensure that code has been reviewed.
Leave a comment