31-60 CISA Domain III Questions Answer and Explanation

Free Exam Simulator

Question 1 - ID: 7512019
A failure discovered in which of the following testing stages would have the GREATEST impact on the implementation of new application software?
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
Acceptance testing is the final stage before the software is installed and is available for use. The greatest impact would occur if the software fails at the acceptance testing level because this could result in delays and cost overruns.
B
System testing is undertaken by the development team to determine if the combined units of software work together and that the software meets user requirements per specifications. A failure here would be expensive but easier to fix than a failure found later in the testing process.
C
Integration testing examines the units/modules as one integrated system and unit testing examines the individual units or components of the software. A failure here would be expensive and require re-work of the modules but would not be as expensive as a problem found just prior to implementation.
D
System,integration and unit testing are all performed by the developers at various stages of development;the impact of failure is comparatively less for each than failure at the acceptance testing stage.
Question 2 - ID: 2812036
The use of object-oriented design and development techniques would MOST likely:
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
One of the major benefits of object-oriented design and development is the ability to reuse modules.
B
Object-oriented design is not intended as a method of improving system performance.
C
The use of object-oriented design may speed up the system development life cycle (SDLC) for future projects through the reuse of modules, but it will not speed up development of the initial project.
D
Control effectiveness is not an objective of object-oriented design and control effectiveness may, in fact, be reduced through this approach.
Question 3 - ID: 4312008
The editing/validation of data entered at a remote site is performed MOST effectively at the:
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
Validating data prior to transmission is the most efficient method and saves the effort of transmitting or processing invalid data. However, due to the risk of errors being introduced during transmission it is also good practice to re-validate the data at the central processing site.
B
It is important that the data entered from a remote site is edited and validated prior to transmission to the central processing site.
C
To validate the data after it has been transmitted is not a valid control.
D
Validating data prior to transmission is the most efficient method and saves the effort of transmitting or processing invalid data. However, due to the risk of errors being introduced during transmission it is also good practice to re-validate the data at the central processing site.
Question 4 - ID: 6412025
The phases and deliverables of a system development life cycle project should be determined:
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
The requirements may change over the life of a project, but the initial deliverables should be documented from the beginning of the project.
B
It is extremely important that the project be planned properly, and that the specific phases and deliverables are identified during the early stages of the project. This enables project tracking and resource management.
C
Risk management is a never-ending process,.so project planning cannot wait until all risk has been identified.
D
Determining the deliverables and timelines of a project are a part of the early project planning work.
Question 5 - ID: 2812017
An organization implemented a distributed accounting system, and the IS auditor is conducting a post implementation review to provide assurance of the data integrity controls. Which of the following choices should the auditor perform FIRST?
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
The lack of an adequate change control process could impact the integrity of the data; however, the system should be documented first to determine whether the transactions flow to other(systems.
B
The review of user access would be important; however, in terms of data integrity it would be better to review the data flow diagram.
C
Evaluating the reconciliation controls would help to ensure data integrity; however, it is more important to understand the data flows of the application to ensure that the reconciliation controls are located in the correct place.
D
The IS auditor should review the application data flow diagram to understand the flow of data within the application and to other systems. This will enable the IS auditor to evaluate the design and effectiveness of the data integrity controls.
Question 6 - ID: 5912010
Regression testing is undertaken PRIMARILY to ensure that:
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
Validation testing is used to test the functionality of the system against detailed requirements to ensure that software construction is traceable to customer requirements.
B
Sociability testing is used to see whether the system can operate in the target environment without adverse impacts on the existing systems.
C
Regression testing is used to test for the introduction of new errors in the system after changes have been applied.
D
Software quality assurance and code reviews are used to determine whether development standards are maintained.
Question 7 - ID: 3812035
During which of the following phases in system development would user acceptance test plans normally be prepared?
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
User acceptance testing should be completed prior to implementation.
B
The implementation planning phase is when the tests are conducted. It is too late in the process to develop the test plan.
C
The feasibility study is too early for such detailed user involvement.
D
During requirements definition, the project team will be working with the users to define their precise objectives and functional needs. At this time, the users should be working with the team to consider and document how the system functionality can be tested to ensure that it meets their stated needs. An IS auditor should know at what point user testing should be planned to ensure that it is most effective and efficient.
Question 8 - ID: 4612029
The PRIMARY objective of performing a post incident review is that it presents an opportunity to:
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
A post incident review may result in improvements to controls, but its primary purpose is not to harden a network.
B
The purpose of post incident review is to ensure that the opportunity is presented to learn lessons from the incident. It is not intended as a forum to educate management.
C
An incident may be used to emphasize the importance of incident response,but that is not the intention of the post incident review.
D
A post incident review examines both the cause and response to an incident. The lessons learned from the review can be used to improve internal controls. Understanding the purpose and structure of post incident reviews and follow-up procedures enables the information security manager to continuously improve the security program. Improving the incident response plan based on the incident review is an internal (corrective) control.
Question 9 - ID: 2412011
A proposed transaction processing application will have many data capture sources and outputs in paper and electronic form. To ensure that transactions are not lost during processing, an IS auditor should recommend the inclusion of:
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
Internal credibility checks are valid controls to detect errors in processing but will not detect and report lost transactions.
B
A clerical procedure could be used to summarize and compare inputs and outputs; however, an automated process is less susceptible to error.
C
Input and output validation controls are certainly valid controls but will not detect and report lost transactions.
D
Automated systems balancing would be the best way to ensure that no transactions are lost as any imbalance between total inputs and total outputs would be reported for investigation and correction.
Question 10 - ID: 3412022
Ideally, stress testing should be carried out in a:
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
Stress testing is carried out to ensure that a system can cope with production workloads. Testing with production level workloads is important to ensure that the system will operate effectively when moved into production.
B
Testing should never take place in a production environment.
C
It is not advisable to do stress testing in a production environment. Additionally, if only test data are used, there is no certainty that the system was stress tested adequately.
D
test environment should always be used to avoid damaging the production environment, but only testing with test data may not test all aspects of the system adequately.
Question 11 - ID: 7112037
Which of the following should be included in a feasibility study for a project to implement an electronic data interchange process?
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
Internal control procedures are too detailed for this phase. They would only be outlined, and any cost or performance implications shown.
B
Third-party agreements are too detailed for this phase. They would only be outlined, and any cost or performance implications shown.
C
The communications protocols must be included because there may be significant cost implications if new hardware and software are involved, and risk implications if the technology is new to the organization.
D
Encryption algorithms are too detailed for this phase. They would only be outlined, and any cost or performance implications shown.
Question 12 - ID: 3412032
Which of the following is the PRIMARY purpose for conducting parallel testing?
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
Program interfaces with files are tested for errors during system testing.
B
The purpose of parallel testing is to ensure that the implementation of a new system will meet user requirements by comparing the results of the old system with the new system to ensure correct processing.
C
Unit and system testing are completed before parallel testing.
D
Parallel testing may show that the old system is, in fact, more cost-effective than the new system, but this is not the primary reason for parallel testing.
Question 13 - ID: 5012020
Which of the following is the MOST likely benefit of implementing a standardized infrastructure?
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
While standardization can reduce support costs, the transition to a standardized kit can be expensive; therefore, the overall level of IT infrastructure investment is not likely to be reduced
B
A standardized infrastructure results in a more homogeneous environment, which is more prone to attacks.
C
A standardized IT infrastructure provides a consistent set of platforms and operating systems across the organization. This standardization reduces the time and effort required to manage a set of disparate platforms and operating systems. In addition, the implementation of enhanced operational support tools (e.g., password management tools, patch management tools and auto provisioning of user access) is simplified. These tools can help the organization reduce the cost of IT service delivery and operational support.
D
A standardized infrastructure may simplify testing of changes, but it does not reduce the need for such testing.
Question 14 - ID: 4412014
Which of the following data validation edits is effective in detecting transposition and transcription errors?
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
A validity check is programmed checking of the data validity in accordance with predetermined criteria.
B
In a duplicate check, new or fresh transactions are matched to those previously entered to ensure that they are not already in the system.
C
A range check is checking data that matches a predetermined range of allowable values.
D
A check digit is a numeric value that is calculated mathematically and is appended to data to ensure that the original data have not been altered (e.g., an incorrect, but valid, value substituted for the original). This control is effective in detecting transposition and transcription errors.
Question 15 - ID: 4512018
During the audit of an acquired software package, an IS auditor finds that the software purchase was based on information obtained through the Internet, rather than from responses to a request for proposal. The IS auditor should FIRST:
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
The licensing policy should be reviewed to ensure proper licensing but only after the purchasing procedures are checked.
B
In the case of a deviation from the predefined procedures, an IS auditor should first ensure that the procedure followed for acquiring the software is consistent with the business objectives and has been approved by the appropriate authorities.
C
Because the software package has already been acquired, it is most likely that it is in use and therefore compatible with existing hardware. Further, the first responsibility of the IS auditor is to ensure that the purchasing procedures have been approved.
D
Because there was no request for proposal, there may be no documentation of the expectations of the product and nothing to measure a gap against. The first task for the IS auditor is to ensure that the purchasing procedures were approved.
Question 16 - ID: 4512012
Which of the following should be an IS auditor's PRIMARY concern after discovering that the scope of an IS project has changed, and an impact study has not been performed?
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
An impact study will not determine whether users will agree with a change in scope.
B
A change in scope does not necessarily impact the risk that regression tests will faiL
C
Conducting an impact study could identify a lack of resources such as the project team lacking the skills necessary to make the change; however,this is only part of the impact on the overall timelines and cost to the project due to the change.
D
Any scope change might have an impact on duration and cost of the project; that is the reason why an impact study is conducted, and the client is informed of the potential impact on the schedule and cost.
Question 17 - ID: 9712026
Management observed that the initial phase of a multiphase implementation was behind schedule and over budget. Prior to commencing with the next phase, an IS auditor's PRIMARY suggestion for a post implementation focus should be to:
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
While all choices are valid, the post implementation focus and primary objective should be understanding the impact of the problems in the first phase on the remainder of the project.
B
Ensuring That the system works is a primary objective of the IS auditor,but in this case because the project planning was a failure,the IS auditor should focus on the reasons for, and impact of, the failure.
C
Because management is aware that the project had problems, reviewing the subsequeut impact will provide insight into the types and potential causes of the project issues. This will help to identify whether IT has adequately planned for those issues in subsequent projects.
D
The review should assess whether the control is working correctly but should focus on the problems that led to project overruns in budget and time.
Question 18 - ID: 4212034
An advantage in using a bottom-up versus a top-down approach to software testing is that:
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
Bottom-up testing tests individual components and major functions and processing will not be adequately tested until systems and integration testing is completed.
B
Interface errors will not be found until later in the testing process--as a result of integration or system testing.
C
The bottom-up approach to software testing begins with the testing of atomic units, such as programs and modules, and works upward until a complete system testing has taken place. The advantages of using a bottom-up approach to software testing are the fact that errors in critical modules are found earlier.
D
Confidence in the system cannot be obtained until the testing is completed.
Question 19 - ID: 5512031
An IS auditor's PRIMARY concern when application developers wish to use a copy of yesterday's production transaction file for volume tests is that:
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
Production data are easier for users to use for comparison purposes.
B
Using a copy of production data may not test all functionality, but this is not as serious as the risk of disclosure of sensitive data.
C
There is a risk that former production data may not test all error routines; however, this is not as serious as the risk of release of sensitive data.
D
Unless the data are sanitized, there is a risk of disclosing sensitive data.
Question 20 - ID: 6212015
Two months after a major application implementation, management, who assume that the project went well, requests that an IS auditor perform a review of the completed project. The IS auditor's PRIMARY focus should be to:
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
Reviewing change requests may be a good idea, but this is more important if the application is perceived to have a problem.
B
It is important to assess the effectiveness of the project; however, assuring that the production environment is adequately controlled after the implementation is of primary concern.
C
Because management is assuming that the implementation went well, the primary focus of the IS auditor is to test the controls built into the application to assure that they are functioning as designed.
D
The IS auditor should check whether user feedback has been provided, but this is not the most important area for audit.
Question 21 - ID: 1112027
When implementing an application software package, which of the following present the GREATEST risk?
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
Lack of synchronization between source and object code will be a serious risk for later maintenance of compiled programs, but this will not affect other types of programs and is not the most serious risk at the time of implementation.
B
Programming errors should be found during testing, not at the time of implementation.
C
Having multiple versions is a problem, but as long as the correct version is implemented, the most serious risk during implementation is to have the parameters for the program set incorrectly.
D
Parameters that are not set correctly would be the greatest concern when implementing an application software package. Incorrectly set parameters are an immediate problem that could lead to system breach, failure or noncompliance.
Question 22 - ID: 8012013
An IS auditor is reviewing the software development capabilities of an organization that has adopted the agile methodology. The IS auditor would be the MOST concerned if:
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
The agile software development methodology is an iterative process where each iteration or "sprint" produces functional code. If a development team was producing code for demonstration purposes, this would be an issue because the following iterations of the project build on the code developed in the prior sprint.
B
After each interation or "Sprint", agile development teams re-plan the project so that unfinished tasks are performed, and resources can be reallocated as needed. The continual re-planning is a key component of agile development methodology.
C
One focus of agile methodology is to rely more on team knowledge and produce functional code quickly. These characteristics would result in less extensive documentation or documentation embbed in the code itself.
D
The management of agile software development is different from conventional development approaches in that leaders act as facilitators and allow team members to determine now to manage their own resources to get each sprint completed. Because the team members are performing the work, they are in a good position to understand how much time/effort is required to complete a sprint.
Question 23 - ID: 6712024
The BEST time for an IS auditor to assess the control specifications of a new application software package which is being considered for acquisition is during:
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
During testing, the IS auditor will ensure that the security requirements are met. This is not the time to assess the control specifications.
B
The best time for the involvement of an IS auditor is at the beginning of the requirements definition of the development or acquisition of applications software. This provides maximum opportunity for review of the vendors and their products. Early engagement of an IS auditor also minimizes the potential of a business commitment to a given solution that might be inadequate and more difficult to overcome as the process continues.
C
During the implementation phase, the IS auditor may check whether the controls have been enabled; however, this is not the time to assess the control requirements.
D
The control specifications will drive the security requirements that are built into the contract and should be assessed before the product is acquired and tested.
Question 24 - ID: 5512016
Which of the following types of risk could result from inadequate software project baselining?
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
Inadequate controls are most likely present in situations in which information security is not duly considered from the beginning of system development; they are not a risk that can be adequately addressed by software baselining.
B
Sign-off delays may occur due to inadequate software baselining; however, these are most likely caused by scope creep.
C
Software integrity violations can be caused by hardware or software failures, malicious intrusions or user errors. Software baselining does not help prevent software integrity violations.
D
A software baseline is the cutoff point in the design and development of a system. Beyond this point, additional requirements or modifications to the scope must go through formal, strict procedures for approval based on a business cost-benefit analysis. Failure to adequately manage a system through baselining can result in uncontrolled changes in a project's scope and may incur time and budget overruns.
Question 25 - ID: 4412028
Which of the following is an advantage of prototyping?
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
Prototyping often has poor internal controls because the focus is primarily on functionality, not on security.
B
Change control becomes much more complicated with prototyping.
C
Prototyping often leads to functions or extras being added to the system that were not originally intended.
D
Prototype systems can provide significant time and cost savings through better user interaction and the ability to rapidly adapt to changing requirements; however, they also have several disadvantages, including loss of overall security focus, project oversight and implementation of a prototype that is not yet ready for production.
Question 26 - ID: 5512021
Which of the following is the MOST important element in the design of a data warehouse?
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
A data warehouse is used for analysis and research, not for production operations, so the speed of transactions is not relevant.
B
Data in a data warehouse is frequently received from many sources and vast amounts of information may be received on an hourly or daily basis, Except to ensure adequate storage capability, this is not a primary concern of the designer.
C
Data warehouses may contain sensitive information, or can be used to research sensitive information, so the security of the data warehouse is important. However, this is not the primary concern of the designer.
D
Quality of the metadata is the most important element in the design of a data warehouse. A data warehouse is a copy of transaction data specifically structured for query and analysis. Metadata describes the data in the warehouse and aims to provide a table of contents to the stored information. Companies that have built warehouses believe that metadata are the most important component of the warehouse.
Question 27 - ID: 4912030
An advantage of using sanitized live transactions in test data is that:
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
Test data will be representative of live processing; however, it is important that all sensitive information in the live transaction file is sanitized to prevent improper data disclosure.
B
Not all error types are sure to be tested because most production data will only contain certain types of errors.
C
Sanitized production data may not contain all transaction types. The test data may need to be modified to ensure that all data types are represented.
D
The results can be tested using normal routines, but that is not a significant advantage of using sanitized live data.
Question 28 - ID: 5212009
The MAJOR consideration for an IS auditor reviewing an organization's IT project portfolio is the:
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
The IT budget is important to ensure that the resources are being used in the best manner, but this is secondary to the importance of reviewing the business plan.
B
The existing IT environment is important and used to determine gap analysis but is secondary to the importance of reviewing the business plan.
C
One of the most important reasons for which projects get funded is how well a project meets an organization's strategic objectives. Portfolio management takes a holistic view of a company's overall strategy. IT strategy should be aligned with the business strategy and, hence, reviewing the business plan should be the major consideration.
D
The investment plan is important to set out project priorities, but secondary to the importance of reviewing the business plan.
Question 29 - ID: 8912033
The knowledge base of an expert system that uses questionnaires to lead the user through a series of choices before a conclusion is reached is known as:
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
Decision trees use questionnaires to lead a user through a series of choices until a conclusion is reached.
B
Rules refer to the expression of declarative knowledge through the use of if-then relationships.
C
A data flow diagram is used to map the progress of data through a system and examine logic, error handling and data management.
D
Semantic nets consist of a graph in which nodes represent physical or conceptual objects and the arcs describe the relationship between the nodes.
Question 30 - ID: 4812023
Assignment of process ownership is essential in system development projects because it:
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
The involvement of process owners will ensure that the system will be designed according to the needs of the business processes that depend on system functionality. A sign-off on the design by the process owners is crucial before development begins.
B
Process ownership assignment does not have a feature to track the completion percentage of deliverables.
C
Whether the design cost of test cases will be optimized is not determined from the assignment of process ownership. It may help to some extent; however, there are many other factors involved in the design of test cases.
D
For gap minimization, a specific requirements analysis framework should be in place and then applied; however, a gap may be found between the design and the as-built system that could lead to system functionality not meeting requirements. This will be identified during user acceptance testing. Process ownership alone does not have the capability to minimize requirement gaps.

Free Exam Simulator