1. An IS auditor performing an audit of backup procedures observes that backup tapes are picked up weekly and stored offsite at a third-party hosting facility. Which of the following recommendations would be the BEST way to protect the data on the backup tapes?
A) Ensure that data is encrypted before leaving the facility. B) Ensure that the transport company obtains signatures for all shipments. C) Confirm that data is transported in locked tamper-evident containers. D) Confirm that data transfers are logged and recorded.
2. During an audit of a financial application, it was determined that many terminated users' accounts were not disabled. Which of the following should be the IS auditor's NEXT step?
A) Perform a review of terminated users' account activity. B) Conclude that IT general controls are ineffective. C) Communicate risks to the application owner. D) Perform substantive testing of terminated users' access rights.
3. An IS auditor finds the log management system is overwhelmed with false positive alerts. The auditor's BEST recommendation would be to:
A) recruit more monitoring personnel. B) fine tune the intrusion detection system (IDS). C) reduce the firewall rules. D) establish criteria for reviewing alerts.
4. Which of the following is the BEST reason for an organization to develop a business continuity plan?
A) To develop a detailed description of information systems and processes B) To identify the users of information systems and processes C) To avoid the costs resulting from the failure of key systems and processes D) To establish business unit prioritization of systems, projects, and strategies
5. One advantage of managing an entire collection of projects as a portfolio is that it highlights the need to:
A) identify dependencies between projects. B) inform users about all ongoing projects. C) manage the risk of each individual project. D) manage the quality of each project.
1. Right Answer: A Explanation:
2. Right Answer: A Explanation:
3. Right Answer: D Explanation:
4. Right Answer: C Explanation: Reference:http://www.isaca.org/Knowledge-Center/Research/ResearchDeliverables/Pages/Business-Continuity-Management-Audit-Assurance-Program.aspx
Leave a comment