31-60 CISA Domain II Questions Answer and Explanation

Free Exam Simulator

Question 1 - ID: 9811882
Which of the following is an implementation risk within the process of decision support systems?
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
Changes in decision processes are not a type of risk, but a characteristic of a DSS.
B
Semistructured dimensions is not a type of risk, but a characteristic of a DSS.
C
The inability to specify purpose and usage patterns is a risk that developers need to anticipate while implementing a DSS.
D
Management control is not a type of risk, but a characteristic of a decision support system (DSS).
Question 2 - ID: 7911871
An organization has contracted with a vendor for a turnkey solution for their electronic toll collection system (ETCS). The vendor has provided its proprietary application software as part of the solution. The contract should require that:
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
Having a backup server with current data is critical but not as critical as ensuring the availability of the source code.
B
Having staff training is critical but not as critical as ensuring the availability of the source code.
C
Whenever proprietary application software is purchased, the contract should provide for a source code escrow agreement. This agreement ensures that the purchasing organization has the opportunity to modify the software should the vendor cease to be in business.
D
Having a backup server with relevant software is critical but not as critical as ensuring the availability of the source code.
Question 3 - ID: 8311876
The rate of change in technology increases the importance of:
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
Change control requires that good change management processes be implemented and enforced.
B
Outsourcing the IT function is a business decision and not directly related to the rate of technological change, nor does the rate of change increase the importance of outsourcing.
C
Personnel in a typical IT department can often be trained in new technologies to meet organizational requirements.
D
Although meeting user requirements is important, it is not directly related to the rate of technological change in the IT environment.
Question 4 - ID: 3411867
In reviewing the IT short-range (tactical) plan, an IS auditor should determine whether:
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
A strategic information technology planning scorecard would be covered by a strategic plan.
B
The integration of IT and business personnel in projects is an operational issue and should be considered while reviewing the short-range plan. A strategic plan provides a framework for the IT short-range plan.
C
A clear definition of the IT mission and vision would be covered by a strategic plan.
D
Business objectives relating to IT goals and objectives would be covered by a strategic plan.
Question 5 - ID: 5511861
Many organizations require an employee to take a mandatory vacation (holiday) of a week or more to:
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
Required vacations/holidays of a week or more in duration in which someone other than the regular employee performs the job function of the employee on vacation is often mandatory for sensitive positions because this reduces the opportunity to commit improper or illegal acts. During this time off, it may be possible to discover any fraudulent activity that was taking place.
B
Maintaining a good quality of life is important, but the primary reason for a mandatory vacation is to catch fraud or errors.
C
Enforcing a rule that all vacations must be taken a week at a time is a management decision but not related to a mandatory vacation policy. The primary reason for mandatory vacations is to detect fraud or errors.
D
Providing cross-training is an important management function, but the primary reason for mandatory vacations is to detect fraud or errors.
Question 6 - ID: 6011884
A comprehensive and effective email policy should address the issues of email structure, policy enforcement, monitoring and:
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
Email policy should address the business and legal requirements of email retention. Addressing the retention issue in the email policy would facilitate rebuilding.
B
Besides being a good practice, laws and regulations may require an organization to keep information that has an impact on the financial statements. The prevalence of lawsuits in which email communication is held in the same regard as the official form of classic paper makes the retention policy of corporate email a necessity. Ail email generated on an organization's hardware is the property of the organization, and an email policy should address the retention of messages, considering both known and unforeseen litigation. The policy should also address the destruction of emails after a specified time to protect the nature and confidentiality of the messages themselves.
C
Email policy should address the business and legal requirements of email retention. Addressing the retention issue in the email policy would facilitate recovery.
D
Email policy should address the business and legal requirements of email retention. Reuse of email is not a policy matter.
Question 7 - ID: 4711869
Which of the following goals do you expect to find in an organization's strategic plan?
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
Results of a new accounting package is a tactical or short-term goal and would not be included in a strategic plan.
B
Approved suppliers of choice for the product is a strategic business objective that is intended to focus the overall direction of the business and, thus, is a part of the organization's strategic plan.
C
Short-term project plans is project-oriented and is a method of implementing a goal but not the goal in itself The goal would be to have better project management-the new system is how to achieve that goal.
D
An evaluation of information technology needs is a way to measure performance, but not a goal to be found in a strategic plan.
Question 8 - ID: 4611866
To support an organization's goals, an IT department should have:
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
Leading-edge technology is an objective, but IT plans would be needed to ensure that those plans are aligned with organizational goals.
B
To ensure its contribution to the realization of an organization's overall goals, the IT department should have long- and short-range plans that are consistent with the organization's broader and strategic plans for attaining its goals.
C
A low-cost philosophy is one objective, but more important is the cost-benefit and the relation of IT investment cost to business strategy.
D
Plans to acquire new hardware and software could be a part of the overall plan but would be required only if hardware or software is needed to achieve the organizational goals.
Question 9 - ID: 1611870
Which of the following does an IS auditor consider to be MOST important when evaluating an organization's IT strategy? That it:
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
Procurement procedures are organizational controls, but not a part of strategic planning.
B
The budget should not vary from the plan.
C
A strategic plan is a senior management responsibility and would receive input from line managers but would not be approved by them.
D
Strategic planning sets corporate or department objectives into motion. Both long-term and short-term strategic plans should be consistent with the organization's broader plans and business objectives for attaining these goals.
Question 10 - ID: 1511883
Which of the following is MOST critical for the successful implementation and maintenance of a security policy?
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
Assimilation of the framework and intent of a written security policy by all levels of management and users of the system is critical to the successful implementation and maintenance of the security policy. If a policy is not assimilated into daily actions, it will not be effective.
B
The stringent implementation, monitoring and enforcing of rules by the security officer through access control software, and provision for punitive actions for violation of security rules is important, but it is dependent on the support and education of management and users on the importance of security.
C
Management support and commitment is, no doubt, important, but for successful implementation and maintenance of a security policy, educating the users on the importance of security is paramount.
D
Punitive actions are needed to enforce the policy but are not the key to successful implementation.
Question 11 - ID: 8911872
When reviewing the IT strategy, an IS auditor can BEST assess whether the strategy supports the organizations' business objectives by determining whether IT:
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
Having sufficient excess capacity to respond to changing directions is important to show flexibility to meet organizational changes but is not in itself a way to ensure that IT is aligned with business goals.
B
Using equipment and personnel efficiently and effectively is an effective method for determining the proper management of the IT function but does not ensure that the IT strategy is aligned with business objectives.
C
The only way to know if IT strategy will meet business objectives is to determine if the IT plan is consistent with management strategy and that it relates IT planning to business plans.
D
Having personnel and equipment is an important requirement to meet the IT strategy but will not ensure that the IT strategy supports business objectives.
Question 12 - ID: 9111878
Which of the following is responsible for the approval of an information security policy?
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
The IT department is responsible for the execution of the policy, having no authority in framing the policy.
B
Normally, the approval of an information systems security policy is the responsibility of top management or the board of directors.
C
The security committee also functions within the broad security policy framed by the board of directors.
D
The security administrator is responsible for implementing, monitoring and enforcing the security rules that management has established and authorized.
Question 13 - ID: 2911881
Which of the following is the initial step in creating a firewall policy?
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
The fourth step is to analyze the application traffic and create a matrix showing how each type of traffic will be protected.
B
Having identified the externally accessed applications, the second step is to identify vulnerabilities (weaknesses) associated with the network applications.
C
Identifying methods to protect against identified vulnerabilities and their comparative cost-benefit analysis is the third step.
D
Identification of the applications required across the network should be the initial step. After identification, depending on the physical location of these applications in the network and the network model, the person in charge will be able to understand the need for, and possible methods of, controlling access to these applications.
Question 14 - ID: 8211885
An organization is considering making a major investment to upgrade technology. Which of the following choices is the MOST important to consider?
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
The information system solution should be cost-effective, but this is not the most important aspect.
B
Prior to implementing new technology, an organization should perform a risk assessment, which is then presented to business unit management for review and acceptance.
C
Compatibility with existing systems is one consideration; however, the new system may be a major upgrade that is not compatible with existing systems, so this is not the most important consideration.
D
The security risk of the current technology is one of the components of the risk analysis, and alone is not the most important factor.
Question 15 - ID: 2911880
Which of the following should be included in an organization's information security policy?
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
The security policy provides the broad framework of security as laid down and approved by senior management. It includes a definition of those authorized to grant access and the basis for granting the access.
B
A list of key IT resources to be secured is more detailed than that which should be included in a policy.
C
The identity of sensitive security assets is more detailed than that which should be included in a policy.
D
A list of the relevant software security features is more detailed than that which should be included in a policy.
Question 16 - ID: 4511860
A business unit has selected a new accounting application and did not consult with IT early in the selection process. The PRIMARY risk is that:
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
Although any new software implementation may create support issues, the primary benefit of the EA is ensuring that the IT solutions deliver value to the business. Decreased support costs may be a benefit of the EA, but the lack of IT involvement in this case would not affect the support requirements.
B
Although security controls should be a requirement for any application, the primary focus of the enterprise architecture (EA) is to ensure that new applications are consistent with enterprise standards. Although the use of standard supported technology may be more secure, this is not the primary benefit of the EA.
C
The primary focus of the EA is to ensure that technology investments are consistent with the platform, data and development standards of the IT organization. The EA defines both a current and future state in areas such as the use of standard platforms, databases or programming languages. If a business unit selected an application using a database or operating system that is not part of the EA for the business, this increases the cost and complexity of the solution and ultimately delivers less value to the business.
D
When selecting an application, the business requirements and the suitability of the application for the IT environment must be considered. If the business units selected their application without IT involvement, they are more likely to choose a solution that fits their business process the best with less emphasis on how compatible and supportable the solution will be in the enterprise, and this is not a concern.
Question 17 - ID: 9711873
An IS auditor of a large organization is reviewing the roles and responsibilities of the IT function and finds some individuals serving multiple roles. Which one of the following combinations of roles should be of GREATEST concern for the IS auditor?
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
When individuals serve multiple roles, this represents a separation-of-duties problem with associated risk. System administrators should not be application programmers, due to the associated rights of both functions. A person with both system and programming rights can do almost anything on a system, including creating a back door. The other combinations of roles are valid from a separation of duties perspective.
B
Ideally, network administrators should not be responsible for quality assurance because they could approve their own work. However,that is not as serious as the combination of system administrator and application programmer, which would allow nearly unlimited abuse of privilege.
C
While a database administrator is a very privileged position it would not be in conflict with the role of a systems analyst.
D
In some distributed environments,especially with small staffing levels,users may also manage security.
Question 18 - ID: 8211863
A decision support system is used to help high-level management:
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
A DSS emphasizes flexibility in the decision-making approach of management through data analysis and the use of interactive models, not fixed criteria.
B
A DSS combines the use of models and analytic techniques with traditional data access and retrieval functions but is not limited by predetermined criteria.
C
A DSS supports semistructured decision-making tasks.
D
A decision support system (DSS) is aimed at solving less structured problems.
Question 19 - ID: 9411875
An IS audit department is planning to minimize the risk of short-term employees. Activities contributing to this objective are documented procedures, knowledge sharing, cross-training and:
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
Employee award programs provide motivation; however, they do not minimize dependency on key individuals.
B
Job evaluation is the process of determining the worth of one job in relation to that of the other jobs in a company so that a fair and equitable wage and salary system can be established.
C
Succession planning ensures that internal personnel with the potential to fill key positions in the organization are identified and developed.
D
Staff responsibilities definitions provide for well-defined roles and responsibilities; however, they do not minimize dependency on key individuals.
Question 20 - ID: 4211879
While reviewing the IT governance processes of an organization, an IS auditor discovers the firm has recently implemented an IT balanced scorecard (BSC). The implementation is complete; however, the IS auditor notices that performance indicators are not objectively measurable. What is the PRIMARY risk presented by this situation?
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
Although project management issues could arise from performance indicators that were not correctly defined, the presentation of misleading performance to management is a much more significant risk.
B
The IT balanced scorecard is designed to measure IT performance. To measure performance, a sufficient number of performance drivers (key performance indicators [KPIs]) must be defined and measured over time. Failure to have objective KPIs may result in arbitrary, subjective measures that may be misleading and lead to unsound decisions.
C
Although performance management issues related to service level agreements could arise from performance indicators that were not correctly defined, the presentation of misleading performance to management is a much more significant risk.
D
If the performance indicators are not objectively measurable, the most significant risk would be the presentation of misleading performance results to management. This could result in a false seltle of assurance and, as a result, IT resources may be misallocated, or strategic decisions may be based on incorrect information. Whether or not the performance indicators are correctly defined, the results would be reported to management.
Question 21 - ID: 8711877
An IS auditor finds that not all employees are aware of the enterprise's information security policy. The IS auditor should conclude that:
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
Management may agree to or reject an audit finding. The IS auditor cannot be assured that management will act upon an audit finding unless they are aware of its impact; therefore, the auditor must report the risk associated with lack of security awareness.
B
Information security is everybody's business, and all staff should be trained in how to handle information correctly.
C
Providing security awareness training is not an IS audit function.
D
AIl employees should be aware of the enterprise's information security policy to prevent unintentional disclosure of sensitive information. Training is a preventive control. Security awareness programs for employees can prevent unintentional disclosure of sensitive information to outsiders.
Question 22 - ID: 8711858
Which of the following BEST provides assurance of the integrity of new staff?
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
Bonding is directed at due-diligence compliance and does not ensure integrity.
B
A background screening is the primary method for assuring the integrity of a prospective staff member. This may include criminal history checks, driver's license abstracts, financial status checks, verification of education, etc.
C
References are important and would need to be verified, but they are not as reliable as background screening because the references themselves may not be validated as trustworthy.
D
Qualifications listed on a resume may be used to demonstrate proficiency but will not indicate the integrity of the candidate employee.
Question 23 - ID: 6811868
Which of the following does an IS auditor consider the MOST relevant to short-term planning for an IT department?
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
Investments in IT need to be aligned with top management strategies rather than be relevant to short term planning and focus on technology for technology'S sake.
B
Conducting control self-assessments is not as critical as allocating resources during short-term planning for the IT department.
C
Evaluating hardware needs is not as critical as allocating resources during short-term planning for the IT department.
D
The IT department should specifically consider the manner in which resources are allocated in the short term. The IS auditor ensures that the resources are being managed adequately.
Question 24 - ID: 2211864
During an audit, the IS auditor discovers that the human resources (RR) department uses a cloud-based application to manage employee records. The RR department engaged in a contract outside of the normal vendor management process and manages the application on its own. Which of the following is of GREATEST concern?
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
An organization-defined security policy ensures that help desk personnel do not have access to personnel data, and this is covered under the security policy. The more critical issue is that the application complied with the security policy.
B
Maximum acceptable downtime is a good metric to have in the contract to ensure application availability; however, human resources (RR) applications are usually not mission-critical, and therefore, maximum acceptable downtime is not the most significant concern in this scenario.
C
The responsibility for managing the relationship with a third party should be assigned to a designated individual or service management team; however, it is not essential that the individual or team belong to the IT department.
D
Cloud applications should adhere to the organization-defined security policies to ensure that the data in the cloud are protected in a manner consistent with internal applications. These include, but are not limited to, the password policy, user access management policy and data classification policy.
Question 25 - ID: 6311874
Which of the following is the GREATEST risk of an inadequate policy definition for ownership of data and systems?
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
User accountability is important but not as great a risk as the actions of unauthorized users.
B
Without a policy defining who has the responsibility for granting access to specific systems, there is an increased risk that individuals can gain (be given) system access when they should not have authorization. The ability of unauthorized users to modify data is greater than the risk of authorized user accounts not being controlled properly.
C
The greatest risk is from unauthorized users being able to modify data. User management is important but not the greatest risk.
D
The failure to implement audit recommendations is a management problem but not as serious as the ability of unauthorized users making modifications.
Question 26 - ID: 5711859
When an employee is terminated from service, the MOST important action is to:
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
There is a probability that a terminated employee may-misuse access rights; therefore, disabling the terminated employee's logical access is the most important and immediate action to take.
B
All the work of the terminated employee needs to be backed up, but this is not as critical as removing terminated employee access.
C
The employees need to be notified of the termination, but this is not as critical as removing terminated employee access.
D
All the work of the terminated employee needs to be handed over to a designated employee; however, this is not as critical as removing terminated employee access.
Question 27 - ID: 5711862
A local area network (LAN) administrator normally is restricted from:
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
Although not ideal, a local area network (LAN) administrator may have end-user responsibilities.
B
In small organizations, the LAN administrator may also be responsible for security administration over the LAN.
C
The LAN administrator may report to the director of the information processing facility (IPF) or, in a decentralized operation, to the end-user manager.
D
A LAN administrator should not have programming responsibilities because that could allow modification of production programs without proper separation of duties, but the LAN administrator may have end-user responsibilities.
Question 28 - ID: 4311886
Which of the following choices is the PRIMARY benefit of requiring a steering committee to oversee IT investment?
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
A steering committee may use a feasibility study in its reviews; however, it is not responsible for performing/conducting the study.
B
The steering committee is not responsible for enforcing security controls.
C
The steering committee is not responsible for implementing development methodologies.
D
A steering committee consists of representatives from the business and IT and ensures that IT investment is based on business objectives rather than on IT priorities.
Question 29 - ID: 7211865
Before implementing an IT balanced scorecard, an organization must:
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
Because a BSC is a way to measure performance, a definition of key performance indicators is required before implementing an IT BSC.
B
A balanced scorecard (BSC) is a method of specifying and measuring the attainment of strategic results. It will measure the delivery of effective and efficient services, but an organization may not have those in place prior to using a BSC.
C
A BSC will measure the performance of IT, but the control over IT expenses is not a key requirement for implementing a BSC.
D
A BSC will measure the value of IT to business, not the other way around.
Question 30 - ID: 6511887
IS control objectives are useful to IS auditors because they provide the basis for understanding the:
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
Techniques are the means of achieving an objective, but it is more important to know the reason and objective for the control than to understand the technique itself.
B
A security policy mandates the use of IS controls, but the controls are not used to understand policy.
C
Control objectives provide the actual objectives for implementing controls and mayor may not be based on good practices.
D
An IS control objective is defined as the statement of the desired result or purpose to be achieved by implementing control procedures in a particular IS activity.

Free Exam Simulator