01-30 CISA Domain I Questions Answer and Explanation

Free Exam Simulator

Question 1 - ID: 4411694
When testing program change requests for a remote system, an IS auditor finds that the number of changes available for sampling does not provide a reasonable level of assurance. What is the MOST appropriate action for the IS auditor to take?
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
There is not enough evidence to report the finding as a deficiency.
B
A walkthrough should not be initiated until an analysis is performed to confirm that this could provide the required assurance.
C
If a sample-size objective cannot be met with the given data, the IS auditor cannot provide assurance regarding the testing objective. In this instance, the IS auditor should develop (with audit management approval) an alternate testing procedure.
D
It is not appropriate for an IS auditor to create sample data for the purpose of the audit.
Question 2 - ID: 2211700
The extent to which data will be collected during an IS audit should be determined based on the:
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
The extent to which data will be collected during an IS audit should be based on the scope, purpose and requirements of the audit and not be constrained by the ease of obtaining the information or by the IS auditor's familiarity with the area being audited.
B
Collecting all the required evidence is a required element of an IS audit, and the scope of the audit should not be limited by the auditee's ability to find relevant evidence. If evidence is not readily available, the auditor must ensure that other forms of audit are considered to ensure compliance in the area that is subject to audit.
C
The extent to which data will be collected during an IS audit should be related directly to the scope and purpose of the audit. An IS audit with a narrow purpose and scope, or just a high-level review, will most likely require less data collection than an audit with a wider purpose and scope.
D
An IS auditor must be objective and thorough and not subject to audit risk through preconceived expected results based on familiarity with the area being audited.
Question 3 - ID: 1911691
An audit charter should:
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
An audit charter states the authority and reporting requirements for the audit but not the details of maintenance of internal controls.
B
The audit charter should not be subject to changes in technology and should not significantly change over time. The charter should be approved at the highest level of management.
C
An audit charter is not at a detailed level and, therefore, does not include specific audit objectives or procedures.
D
An audit charter should state management's objectives for and delegation of authority to IS auditors.
Question 4 - ID: 6411697
Which of the following would impair the independence of a quality assurance team?
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
Checking the test assumptions is a valid quality assurance function.
B
Correction of code should not be a responsibility of the quality assurance team, because it would not ensure segregation of duties and would impair the team's independence.
C
Ensuring compliance with development methods is a valid quality assurance function.
D
Checking the code to ensure proper documentation is a valid quality assurance function
Question 5 - ID: 8011683
What is the PRIMARY requirement that a data mining and auditing software tool should meet? The software tool should:
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
The product must interface with the types of systems used by the organization and provide meaningful data for analysis.
B
The tool should probably work on more than just financial systems and does not necessarily require implementation of audit hooks.
C
Although all the requirements that are listed as answer choices are desirable in a software tool evaluated for auditing and data mining purposes, the most critical requirement is that the tool works effectively on the systems of the organization being audited.
D
The tool should be flexible but not necessarily customizable. It should have built-in analysis software tools.
Question 6 - ID: 6811685
For a retail business with a large volume of transactions, which of the following audit techniques is the MOST appropriate for addressing emerging risk?
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
Quarterly risk assessment may be a good technique but not as responsive as continuous auditing.
B
Using software tools such as computer-assisted audit techniques to analyze transaction data can provide detailed analysis of trends and potential risk, but it is not as effective as continuous auditing, because there may be a time differential between executing the software and analyzing the results.
C
The sampling of transaction logs is a valid audit technique; however, risk may exist that is not captured in the transaction log, and there may be a potential time lag in the analysis.
D
The implementation of continuous auditing enables a real-time feed of information to management through automated reporting processes so that management may implement corrective actions more quickly.
Question 7 - ID: 7011678
Which of the following is the BEST, factor for determining the required extent of data collection during the planning phase of an IS compliance audit?
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
An auditor's familiarity with the organization is a factor in the planning of an audit but does not directly affect the determination of how much data to collect. The audit must be based on sufficient evidence of the monitoring of controls and not unduly influenced by the auditor's familiarity with the organization.
B
Prior findings and issues are factors in the planning of an audit but do not directly affect the determination of how much data to collect. Data must be collected outside of areas of previous findings.
C
The extent to which data will be collected during an IS audit is related directly to the purpose, objective and scope of the audit. An audit with a narrow purpose and limited objective and scope is most likely to result in less data collection than an audit with a wider purpose and scope. Statistical analysis may also determine the extent of data collection, such as sample size or means of data collection.
D
The complexity of the organization's operation is a factor in the planning of an audit but does not directly affect the 'determination of how much data to collect. The extent of data collection is subject to the intensity, scope and purpose of the audit.
Question 8 - ID: 3311706
During a risk analysis, an IS auditor identifies threats and potential impacts. Next, the IS auditor should:
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
Upon completion of a risk assessment, an IS auditor should describe and discuss with management the threats and potential impacts on the assets, and recommendations for addressing the risk. However, this action cannot be done until the controls are identified and the likelihood of the threat is calculated.
B
It is impossible to determine impact without first identifying the assets affected; therefore, this must already have been completed.
C
An audit risk assessment is conducted for purposes that are different from management's risk assessment process purposes.
D
It is important for an IS auditor to identify and evaluate the existence and effectiveness of existing and planned controls so that the risk level can be calculated after the potential threats and possible impacts are identified.
Question 9 - ID: 2811702
The MOST appropriate action for an IS auditor to take when shared user accounts are discovered is to:
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
An IS auditor's role is to detect and document findings and control deficiencies. Part of the audit report is to explain the reasoning behind the findings. The use of shared IDs is not recommended because it does not allow for accountability of transactions. An IS auditor defers to management to decide how to respond to the findings presented.
B
It is not appropriate for an IS auditor to report findings to the audit committee before conducting a more detailed review and presenting them to management for a response.
C
It is not the role of an IS auditor to request the removal of IDs from the system.
D
Review of audit logs would not be useful because shared IDs do not provide for individual accountability.
Question 10 - ID: 5911698
In planning an IS audit, the MOST critical step is the identification of the:
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
The time allotted for an audit is determined during the planning process based on the areas to be audited and is primarily based on the requirement for conducting an appropriate audit.
B
Test steps for the audit are not as critical during the audit planning process as identifying the areas of risk that should be audited.
C
The skill sets of the audit staff should have been considered before deciding and selecting the audit. Where the skills are inadequate, the organization should consider using external resources.
D
When designing a risk-based audit plan, it is important to identify the areas of highest risk to determine the areas to be audited.
Question 11 - ID: 5511696
The PRIMARY advantage of a continuous audit approach is that it:
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
Responsibility for enforcement and monitoring of controls is primarily the responsibility of management.
B
The use of continuous audit is not based on the complexity or number of systems being monitored.
C
Continuous audit allows audit and response to audit issues in a timely manner because audit findings are gathered in near real time.
D
The continuous audit approach often requires an IS auditor to collect evidence on system reliability while processing is taking place.
Question 12 - ID: 1911687
The decisions and actions of an IS auditor are MOST likely to affect which of the following types of risk?
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
Inherent risk is the risk that a material error could occur, if there are no related internal controls to prevent or detect the error. Inherent risk is not usually affected by an IS auditor.
B
Detection risk is directly affected by the IS auditor's selection of audit procedures and techniques. Detection risk is the risk that a review will not detect or notice a material issue.
C
Business risk is a probable situation with uncertain frequency and magnitude of loss (or gain). Business Risk is usually not directly affected by an IS auditor.
D
Control risk is the risk that a material error exists that would not be prevented or detected on a timely basis by the system of internal controls. Control risk can be mitigated by the actions of the organization's management.
Question 13 - ID: 3111703
An IS auditor is conducting a compliance test to determine whether controls support management policies and procedures. The test will assist the IS auditor to determine:
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
Substantive tests, not compliance tests, are associated with data integrity.
B
Determining the reasonableness of financial reporting controls is a very narrow answer in that it is limited to financial reporting. It meets the objective of determining whether the controls are reasonable but does not ensure that the control is working correctly and thereby supporting management expectations and objectives.
C
Compliance tests can be used to test the existence and effectiveness of a defined process. Understanding the objective of a compliance test is important. IS auditors want reasonable assurance that the controls they are relying on are effective. An effective control is one that meets management expectations and objectives.
D
It is important that controls operate efficiently, but in this case the intent is to ensure that the controls support management policies and procedures. Therefore, the important issue is whether the controls are operating correctly and thereby meeting the control objective'.
Question 14 - ID: 8811705
During a security audit of IT processes, an IS auditor finds that documented security procedures do not exist. The IS auditor should:
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
Ending the audit and issuing an opinion will not address identification of potential risk. The auditor should evaluate the practices in place. The recommendation may still be for the organization to develop written procedures. Terminating the audit may prevent achieving one of the basic audit objectives-identification of potential risk.
B
One of the main objectives of an audit is to identify potential risk; therefore, the most proactive approach is to identify and evaluate the existing security practices being followed by the organization and submit the findings and risk to management, with recommendations to document the current controls or enforce the documented procedures.
C
Because there are no documented procedures, there is no basis against which to test compliance.
D
IS auditors should not prepare documentation because the process may not be compliant with management objectives and doing so could jeopardize their independence.
Question 15 - ID: 3911679
An IS auditor is developing an audit plan for an environment that includes new systems. The organization's management wants the IS auditor to focus on recently implemented systems. How should the IS auditor respond?
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
Auditing systems not included in the previous year's scope does not reflect a risk-based approach. In addition, management may know about problems with the new system and may be intentionally trying to steer the audit away from that vulnerable area. Although, at first, the new system may seem to be the riskiest area, an assessment must be conducted rather than relying on the judgment of the IS auditor or IT manager.
B
The best action is to conduct a risk assessment and design the audit plan to cover the areas of highest risk. ISACA IS Audit and Assurance Standard 1202 (Risk Assessment in Planning), statement 1202.1: "The IS audit and assurance function shall use an appropriate risk assessment approach and supporting methodology to develop the overall IS audit plan and determine priorities for the effective allocation of IS audit resources."
C
Auditing the new system does not reflect a risk-based approach. Although the system can contain sensitive data and may present risk of data loss or disclosure to the organization, without a risk assessment, the decision to solely audit the newly implemented system is not a risk-based decision.
D
The creation of the audit plan should be performed in cooperation with management and based on risk. The IS auditor should not arbitrarily decide on what needs to be audited.
Question 16 - ID: 1311692
An IS auditor finds a small number of user access requests that were not authorized by managers through the normal predefined workflow steps and escalation rules. The IS auditor should:
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
Changing the scope of the IS audit or conducting a security risk assessment requires more detailed information about the processes and violations being reviewed.
B
The IS auditor needs to perform substantive testing and additional analysis to determine why the approval and workflow processes are not working as intended. Before making any recommendation, the IS auditor should gain a good understanding of the scope of the problem and the factors that caused this incident. The IS auditor should identify whether the issue was caused by managers not following procedures, a problem with the workflow of the automated system or a combination of the two.
C
The IS auditor must first determine the root cause and impact of the findings and does not have enough information to recommend fixing the workflow issues.
D
The IS auditor does not yet have enough information to report the problem.
Question 17 - ID: 6911704
The vice president of human resources has requested an IS audit to identify payroll overpayments for the previous year. Which would be the BEST audit technique to use in this situation?
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
An embedded audit module can enable the IS auditor to evaluate a process and gather audit evidence, but it does not detect errors for a previous period.
B
An integrated test facility helps to identify a problem as it occurs but does not detect errors for a previous period.
C
Generalized audit software features include mathematical computations, stratification, statistical analysis, sequence checking, duplicate checking and re-computations. An IS auditor, using generalized audit software, can design appropriate tests to recompute the payroll, thereby determining whether, there were overpayments and to whom they were made.
D
Test data tests for the existence of controls that might prevent overpayments, but it does not detect specific, previous miscalculations.
Question 18 - ID: 5911695
Which of the following situations could impair the independence of an IS auditor? The IS auditor:
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
Independence may be impaired if an IS auditor is, or has been, actively involved in the development, acquisition and implementation of the application system.
B
IS auditors should not audit work that they have done, but just participating as a member of the application system project team does not impair an IS auditor's independence.
C
Designing an embedded audit module does not impair an IS auditor's independence.
D
An IS auditor's independence is not impaired by providing advice on known good practices.
Question 19 - ID: 7711693
Which of the following sampling methods is MOST useful when testing for compliance?
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
Attribute sampling is the primary sampling method used for compliance testing. Attribute sampling is a sampling model that is used to estimate the rate of occurrence of a specific quality (attribute) in a population and is used in compliance testing to confirm whether the quality exists. For example, an attribute sample may check all transactions over a certain predefined dollar amount for proper approvals.
B
Difference estimation sampling examines measure deviations and extraordinary items and is not a good way to measure compliance.
C
Stratified mean sampling attempts to ensure that the entire population is represented in the sample. This is not an effective way to measure compliance.
D
Variable sampling is based on the calculation of a mean from a sample extracted from the entire population and using that to estimate the characteristics of the entire population. For example, a sample of 10 items shows an average price of US $10 per item. For the entire population of 1,000 items, the total value is estimated to be US $10,000. This is not a good way to measure compliance with a process.
Question 20 - ID: 7711689
An IS auditor is reviewing a software application that is built on the principles of service-oriented architecture. What is the INITIAL step?
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
Auditing the core service and its dependencies with others would most likely be a part of the audit, but the IS auditor must first gain an understanding of the business processes and how the systems support those processes.
B
A service-oriented architecture relies on the principles of a distributed environment in which services encapsulate business logic as a black box and might be deliberately combined to depict real-world business processes. Before reviewing services in detail, it is essential for the IS auditor to comprehend the mapping of business processes to services.
C
Sampling the use of service security standards as represented by the Security Assertions Markup Language is an essential follow-up step to understanding services and their allocation to business but is not the initial step.
D
Reviewing the service level agreements is an essential follow-up step to understanding services and their allocation to business but is not the initial step.
Question 21 - ID: 8211684
A long-term IT employee with a strong technical background and broad managerial experience has applied for a vacant position in the IS audit department. Determining whether to hire this individual for this position should be PRIMARILY based on the individual's experience and:
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
The fact that the employee has worked in IT for many years may not ensure credibility. The IS audit department's needs should be defined, and any candidate should be evaluated against those requirements.
B
Evaluating an individual's qualifications based on the age of the individual is not a good criterion and is illegal in many parts of the world.
C
Independence should be continually assessed by the auditor and management. This assessment should consider such factors as changes in personal relationships, financial interests, and prior job assignments and responsibilities.
D
Length of service does not ensure technical competency.
Question 22 - ID: 3911690
An IS auditor conducting a review of software usage and licensing discovers that numerous PCs contain unauthorized software. Which of the following actions should the IS auditor take?
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
Auditors must report material findings to management for action. Informing the users of risk is not the primary responsibility of the IS auditor.
B
An IS auditor should not assume the role of the enforcing officer and take on any personal involvement in removing the unauthorized software.
C
This would detect compliance with software licensing. However, an automated solution might not be the best option in all cases.
D
The use of unauthorized or illegal software should be prohibited by an organization. An IS auditor must convince the user and management of the risk and the need to eliminate the risk. For example, software piracy can result in exposure and severe fines.
Question 23 - ID: 7511686
An IS auditor is reviewing access to an application to determine whether recently added accounts were appropriately authorized. This is an example of:
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
Variable sampling is used to estimate numerical values such as dollar values.
B
Compliance testing determines whether controls are being applied in compliance with policy. This includes tests to determine whether new accounts were appropriately authorized.
C
Stop-or-go sampling allows a test to be stopped as early as possible and is not appropriate for checking whether procedures have been followed.
D
Substantive testing substantiates the integrity of actual processing such as balances on financial statements. The development of substantive tests is often dependent on the outcome of compliance tests. If compliance tests indicate that there are adequate internal controls, then substantive tests can be minimized.
Question 24 - ID: 5011688
Which of the following is the MOST critical step when planning an IS audit?
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
Reviewing information security policies and procedures is normally be conducted during fieldwork, not planning.
B
The findings of a previous audit are of interest to the auditor, but they are not the most critical step. The most critical step involves finding the current issues or high-risk areas, not reviewing the resolution of older issues. A review of historical audit findings could indicate that management is not resolving the items or the recommendation was ineffective.
C
Executive management is not required to approve the audit plan. It is typically approved by the audit committee or board of directors. Management could recommend areas to audit.
D
Of all the steps listed, performing a risk assessment is the most critical. Risk assessment is required by ISACA IS Audit and Assurance Standard 1202 (Risk Assessment in Planning), statement 1202.2: "IS audit and assurance professionals shall identify and assess risk relevant to the area under review, when planning individual engagements." In addition to the standards requirement, if a risk assessment is not performed, then high-risk areas of the auditee systems or operations may not be identified for evaluation.
Question 25 - ID: 8211699
The MOST effective audit practice to determine whether the operational effectiveness of controls is properly applied to transaction processing is:
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
Among other methods, such as document review or walkthrough, tests of controls are the most effective procedures to assess whether controls accurately support operational effectiveness.
B
Control documents may not always describe the actual process in an accurate manner. Therefore, auditors relying on document review have limited assurance that the control is operating as intended.
C
Testing of control design assesses whether the control is structured to meet a specific control objective. It does not help determine whether the control is operating effectively.
D
Performing tests on risk prevention is considered compliance testing. This type of testing is used to determine whether policies are adhered to.
Question 26 - ID: 7911682
Which of the following is the key benefit of a control self-assessment?
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
Improved fraud detection is important but not as important as control ownership. It is not a principal objective of CSA.
B
The objective of control self-assessment (CSA) is to have business management become more aware of the importance of internal control and their responsibility in terms of corporate governance.
C
CSA may give more insights to internal auditors, allowing them to take a more consultative role; however, this is an additional benefit, not the key benefit.
D
Reducing audit expenses is not a key benefit of CSA.
Question 27 - ID: 1211677
The internal audit department wrote some scripts that are used for continuous auditing of some information systems. The IT department asked for copies of the scripts so that they can use them for setting up a continuous monitoring process on key systems. Does sharing these scripts with IT affect the ability of the IS auditors to independently and objectively audit the IT function?
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
The ability of IT to continuously monitor and address any issues on IT systems does not affect the ability of IS audit to perform a comprehensive audit.
B
An audit of an 'IS system encompasses more than just the controls covered in the scripts.
C
Sharing the scripts may be required by policy for quality assurance and configuration management, but that does not impair the ability to audit.
D
IS audit can still review all aspects of the systems. They may not be able to review the effectiveness of the scripts, but they can still audit the systems.
Question 28 - ID: 2111680
An IS auditor is reviewing security controls for a critical web-based system prior to implementation. The results of the penetration test are inconclusive, and the results will not be finalized prior to implementation. Which of the following is the BEST option for the IS auditor?
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
If the IS auditor cannot gain sufficient assurance for a critical system within the agreed-on time frame, this fact should be highlighted in the audit report and follow-up testing should be scheduled for a later date. Management can then determine whether any of the potential weaknesses identified were significant enough to delay the go-live date for the system.
B
It is not acceptable for the IS auditor to ignore areas of potential weakness because conclusive evidence could not be obtained within the agreed-on audit timeframe. ISACA IS Audit and Assurance Standards are violated if these areas are omitted from the audit report.
C
Extending the time frame for the audit and delaying the go-live date is unlikely to be acceptable in this scenario where the system involved is business-critical. In any case, a delay to the go-live date must be the decision of business management, not the IS auditor. In this scenario, the IS auditor should present business management with all available information by the agreed-on date.
D
Failure to obtain sufficient evidence in one part of an audit engagement does not justify cancelling or postponing the audit; this violates the audit guideline concerning due professional care.
Question 29 - ID: 3011701
While planning an IS audit, an assessment of risk should be made to provide:
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
Definite assurance that material items will be covered during the audit work is an impractical proposition.
B
Sufficient assurance that all items will be covered is not as important as ensuring that the audit will cover all material items.
C
ISACA IS Audit and Assurance Guideline 2202 (Risk Assessment and Audit Planning) states that the applied risk assessment approach should help with the prioritization and scheduling process of the IS audit and assurance work. The risk assessment should support the selection process of areas and items of audit interest and the decision process to design and conduct particular IS audit engagements.
D
Reasonable assurance that all items will be covered during the audit work is not the correct answer, because primarily material items need to be covered, not all items.
Question 30 - ID: 6311681
Which of the following controls would an IS auditor look for in an environment where duties cannot be appropriately segregated?
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
Access controls for resources are based on individuals and not on roles. For a lack of segregation of duties, the IS auditor expects to find that a person has higher levels of access than are ideal. The IS auditor wants to find compensating controls to address this risk.
B
Boundary controls establish the interface between the would-be user of a computer system and the computer system itself and are individual-based, not role-based, controls.
C
Compensating controls are internal controls that are intended to reduce the risk of an existing or potential control weakness that may arise when duties can not be appropriately segregated.
D
Overlapping controls are two controls addressing the same control objective or exposure. Because primary controls cannot be achieved when duties cannot or are not appropriately segregated, it is difficult to install overlapping controls.

Free Exam Simulator