Master File
Master File
Master File
Q. Self Service assistance to users provided by help desk such as resetting passwords etc. is considered which
1 level of assistence? Ans. Level 0
2 Q.A MN org. has decided to implement an ERP soln across all geolocations. The org shall initiate a- Ans. Program
3 Q. Which of the following model user need to know URL to access the app? Ans. Web based application deveopment.
4 Q. Who is responsible for classification of data in a Dept? Ans. Data owner
5 Q. Expert system is an example of- Ans. Knowledge Software.
Q. Which of the following interface testing approach, a tester may start at top or bottom level and depending
6 on Situation move downward or upward? Ans. Sandwich Approach
Q.Which of the following tool is considered useful for comparing processing output with
7 independentlycalculated data? Ans. Integrated Test facility
Q. The practice of limiting permissions to the minimal level that will allow users to perform their jobs. It is
8 known as Ans. Least privileges
9 Q. Which of the following is an example of external schema in a database mgt system? Ans. User views.
10 Q. A user Account is terminated by the IT dept, only when the request is approved and sent by the- Ans. HR dept
Q. Which of the following categories of maintanance, changes are made to the program(s), when a defect or
11 error arises in working of softwae? Ans. Correcrive maintance
12 Q. Batch total is an example of_ Ans. Processing total
13 Q. Which of the following is one of the imp operations performance metrics? Ans. Incident.
14 Q.Which of the following test is done by the programmer? Ans. Unit test.
15 Q. Which of the following test checks whether programs do what they are supposed to do? Ans. Functional test
16 Q. Which of the following test is concerned with examining the internal processing logic of a software system? Ans. Structural test
Q. Users have more privileges than they need and may use them to perform actions outside of their job
17 description. It is known as_ Ans. Privilege creep
Q. Which of the following relates to the accuracy and completeness of info as well as to its validity in
18 accordance with business values and expectations? Ans. Integrity
19 Q.Completeness and accuracy of accumulated data is ensured by_ Ans. Processing control Procedures
Q.Which of the following relates to the provision of appropriate info for mgt to operate the entity and exercise
20 its fiduciary and governance responsibilities? Ans. Reliability.
Default settings are used by vendors to help users get the system up and running. What is the auditor's primary
21 area of interest regarding default settings? Save time and money for the user
22 Which of the following software developing methodology primarily focuses on risk avoidance? Sprial
23 Which of the following is the list of OSI Model levels from the top down ? Application , Presentaion, Session
24 Performance, Security, user Interface are examples of which of the following testing ? Non Functional
25 Which of the following is the best definition of stack space on a hard disk ? Unused space leftover after disk formating
System needs to be configured and then someone needs
26 What is likely to be the biggest issue regarding log management ? to read the logs and respond
Which of the following parameters should not be considered for computing function points under function
27 point analysis? Date elements to be processsed
28 Who amongst the following has the highest stake in benefit realization from the project ? Project Sponsor
29 Which type of network device directs packets through the internet ? Routers
Which of the following testing is used to identify any errors and improvements in the software by observing
30 the users through their usage and operation ? Usability Testing
31 Which type of Control is representative of Exception Reporting ? Processing
32 Which of the following is the role of IS Auditor in SDLC ? All of the above
33 Which of the following methods is designed to permanently destroy data on hard disk ? Risk Wiping
34 Criticial function is to be frewall is to act a Sevice used to connect
35 QIA Personnel Responsible to handle the I ntegrity
36 what is the purpose of address resolution protocol find the MAC Addresss
37 performance of third party should be compated to the agrred upon service level matrics reviewd by management
38 what is primary objective in primary escalation Improved Customer Satisfaction
39 which of the following protocol is used for monitoring the health of service SNMP
40 which of the following is major issue in facing incident response scheduling of internal personnel
41 Arrange the following in order of activities plan risk, identify risk,analyze risk,plan risk response
42 Which of the following methods is used to make a backup copy of all the data files for a forensic invertigation bitstream image backup
43 in bank which one is best one for S/w Implmntn strategy Pilot
44 data validation edits is effective in detecting data transposition and transcription error check digit
45 which of following DRP conponent provide the greatst assurance of recovery after a disaster alt facility wil be available
46 backed up on preodic basis mitigation
47 it dept perform more than one role develpoer have access and can migrate data to PE
48 done 1st while preparing drp BIA
49 most siig level of effort for bcp early stages of planning
50 vialbility of duplicate inf procesiing facitlity the work olf of primary site is monitored to ensure
51 benefit of Call back devices Provide n audit trail
52 a drp for an organization should Reduce rovery time and cost of recovery
53 most imp element for succ implementation of it governance Indifying organizational stratigies
54 true regarding streeing commite Focus on agenda of it isues
55 A data administrator is responsible for efining data elements, data names and their relationship.
56 Which of the following types of data validation editing checks is used to determine if a field contains data Completeness check
The workload of the primary site is monitored to ensure
57 Which of the following must exist to ensure the viability of a duplicate information processing facility? adequate backup is available
dentify the correct sequence of Business Process Reengineering (BPR) benchmarking process from the given PLAN, RESEARCH, OBSERVE, ANALYZE, ADOPT and
58 choices below? IMPROVE
59 Itaf Genral
60 select tran or process need to be examined CIS
61 audit risk inherent risk
62 responsible to ensure IT enabled investment provide business value snr mgt
Independent testing of client accounting procedures and controls that was originally done as part of entity;s
63 accounting and internal control systems performane
64 s/w file are backed on on priodic basis mitigation
65 which risk treat option enable implementation of control to reduce risk mitigate
66 cert in it act 2000 70B
67 which phase start with damage assessment restoration
68 which of the following is an u primary internal control control policy
69 what would IS auditor perform if he concludes that control envt is poor substantive test
70 which SIA defines fraud and lays responsibilty on MGT n TCWG to detect frauds SIA11
71 conditions that effect the risk profile of orgnzn risk factors
72 first initiative in systematic approach of implementing EGIT Establish Desire to change
73 Aft enterin USER ID and PW you get error that user id password is wrong preventive
74 sustain critical business process during an unplanned interuption bcp
75 what would IS auditor perform if he concludes that control envt is poor substantive test
76 prioritization of IT resources is primarily based on expected benefit realization
77 primary rsn for perodic review of risk risk factors
78 PRIMARILY RESPONSIBLE to support value creation by reducing risk of IT to acceptable level IT risk management
79 1. Which of following may help to establish accuracy and completeness of data? Hash value
80 2. Which of following types of attacks may be prevented by input validation? SQL injection
3. Which of following is central storage for all kinds of structured, semi structured or unstructured raw data
81 collected from multiple sources? Data lake
4. After major earthquake a business decides to shift to location of data center from earthquake zone 5 to
82 earthquake zone 2 which type of risk respond option it has exercise? Avoid
83 5. Which of following is not example of ai platform? Microsoft power bi
84 6. Which of following is a cloud deployment model is highly scalable? Public
7. Use of license software, patch updates, disabling default users and using anti-malware software are the
85 control against? Back door
8. Which of the following types of attacks may be prevented by using anti-malware and application from
86 trusted source? Logic bomb
87 9. At that strives for natural, human like interaction with machine is known as? Cognitive computing
88 10. Which of the following provides secure connection between two end points? Transport mode
11. Which of the block chain principals state that each node stores and forwards information to all other
89 nodes? Peer to Peer
12. Which of the following types of smart card enables card reader to send the card in possession of user in the
90 general area and allow access? Wireless proximity reader
13. Which of the following is a type of malware that takes control of administrative rights for execution of
91 malicious codes? Trojan
92 14. Which of the following is example of robotic process automation? Cross application macros
93 15. Which of the following is a sense of minor attacks those together results in larger attack? salami theft
94 16. Which of the following enable hackers to exploit system vulnerabilities including human element? Attack vector
95 17. Which of the following cloud deployment model, customer hold the control of operating system? Iaas
18. Which of the following analytics assist in identifying the best option to choose to achieve the desire out
96 come through optimization techniques and machine learning? prescriptive analytics
97 19. which of the following is primary requirement of granting users access to information asset? Identification
98 20. Primary purpose of access control dead man door, turnstile, mantrap is to? prevent unauthorized entry
MODULE TEST 1
business impact
1 sustain critical business process during an unplanned interuption bcp disaster recovery plan incident response analysis
2 which phase start with damage assessment crisis recovery incident response restoration
3 which risk treat option enable implementation of control to reduce risk accept trfr mitigate avoid
4 what would IS auditor perform if he concludes that control envt is poor internal control compliance test substantive test cost/benefit analysis
5 which of the following is an u primary internal control fail safe fail close control policy admin control
result of risk recommendation
6 prioritization of IT resources is primarily based on assessment expected benefit realization of CIO rate of obsolescence of IT
demands for appropriate documented procedures to comply with
7 requests of CERT-IN regarding cyber security incidents 43A 69D 70B 72A
MOST useful for business decision making and framing of future
8 policy based on actual transactional data data warehouse datamining EIS Expert System
Establish Desire Form Effective Communicate Empower role players
9 first initiative in systematic approach of implementing EGIT to change implementation team Desired Vision and identify quick wins
which SIA defines fraud and lays responsibilty on MGT n TCWG
10 to detect frauds SIA2 SIA7 SAI9 SIA11
PRIMARILY RESPONSIBLE to support value creation by reducing Busness process
11 risk of IT to acceptable level IT Governance IT risk management owner IT steering committee
12 as per ITAF, which is a standard under IS Audit and Assurance Standard General STd Assurance std Control Std Audit Std
13 most useful tool when only select trans/process needs to be analysed ITF CIS Audithook snapshots
14 responsible to ensure IT enabled investment provide business value snr mgt operational mgt CIO IT steering committee
15 primary purpose is devt of evidence for enforcement of judicial authorities forensic specialized IS Integrated
Independent testing of client accounting procedures and controls that was analytical
16 originally done as part of entity;s accounting and internal control systems recalculation performane procedures confirmation
17 Aft enterin USER ID and PW you get error that user id password is wrong corrective detective preventive deterreny
18 primary reason for review of risk is change in risk factors risk appetite budget risk strategy
19 conditions that effect the risk profile of orgnzn risk factors residual risk risk tolerance current risk
20 which is audit risk inherent risk current risk scoping risk residual risk
Q. Self Service assistance to users provided by help desk such as resetting passwords etc. is considered which level of assistence?
Ans. Level 0
Q.A MN org. has decided to implement an ERP soln across all geolocations. The org shall initiate a- Module 2
Ans. Program
Q. Which of the following model user need to know URL to access the app?
Ans. Web based application deveopment.
Q. Who is responsible for classification of data in a Dept?
Ans. Data owner
Q. Expert system is an example of-
Ans. Knowledge Software.
Q. Which of the following interface testing approach, a tester may start at top or bottom level and depending on Situation move downward or upward?
Ans. Sandwich Approach
Q.Which of the following tool is considered useful for comparing processing output with independentlycalculated data?
Ans. Integrated Test facility
Q. The practice of limiting permissions to the minimal level that will allow users to perform their jobs. It is known as
Ans. Least privileges
Q. Which of the following is an example of external schema in a database mgt system?
Ans. User views.
Q. A user Account is terminated by the IT dept, only when the request is approved and sent by the-
Ans. HR dept
Q. Which of the following categories of maintanance, changes are made to the program(s), when a defect or error arises in working of softwae?
Ans. Correcrive maintance
Q. Batch total is an example of_
Ans. Processing total
Q. Which of the following is one of the imp operations performance metrics?
Ans. Incident.
Q.Which of the following test is done by the programmer?
Ans. Unit test.
Q. Which of the following test checks whether programs do what they are supposed to do?
Ans. Functional test
Q. Which of the following test is concerned with examining the internal processing logic of a software system?
Ans. Structural test
Q. Users have more privileges than they need and may use them to perform actions outside of their job description. It is known as_
Ans. Privilege creep
Q. Which of the following relates to the accuracy and completeness of info as well as to its validity in accordance with business values and expectations?
Ans. Integrity
Q.Completeness and accuracy of accumulated data is ensured by_
Ans. Processing control Procedures
Q.Which of the following relates to the provision of appropriate info for mgt to operate the entity and exercise its fiduciary and governance responsibilities?
Ans. Reliability.
1. Which of following may help to establish accuracy and completeness of data?
- Hash value
2. Which of following types of attacks may be prevented by input validation?
- SQL injection
3. Which of following is central storage for all kinds of structured, semi structured or unstructured raw data collected from multiple sources?
- Data lake
4. After major earthquake a business decides to shift to location of data center from earthquake zone 5 to earthquake zone 2 which type of risk respond option it has exercise?
- Avoid
5. Which of following is not example of ai platform?
- Microsoft power bi Module 3
6. Which of following is a cloud deployment model is highly scalable?
- Public
7. Use of license software, patch updates, disabling default users and using anti-malware software are the control against?
- Back door
8. Which of the following types of attacks may be prevented by using anti-malware and application from trusted source?
- Logic bomb
9. At that strives for natural, human like interaction with machine is known as?
- Cognitive computing
10. Which of the following provides secure connection between two end points?
- Transport mode
11. Which of the block chain principals state that each node stores and forwards information to all other nodes?
- Peer to peer
12. Which of the following types of smart card enables card reader to send the card in possession of user in the general area and allow access?
- Wireless proximity reader
13. Which of the following is a type of malware that takes control of administrative rights for execution of malicious codes?
- Trojan
14. Which of the following is example of robotic process automation?
- Cross application macros
15. Which of the following is a sense of minor attacks those together results in larger attack?
- salami theft
16. Which of the following enable hackers to exploit system vulnerabilities including human element?
- Attack vector
17. Which of the following cloud deployment model, customer hold the control of operating system?
- Iaas
18. Which of the following analytics assist in identifying the best option to choose to achieve the desire out come through optimization techniques and machine learning?
- prescriptive analytics
19. which of the following is primary requirement of granting users access to information asset?
- Identification
20. Primary purpose of access control dead man door, turnstile, mantrap is to?
-prevent unauthorized entry
3. The accuracy of the response to each question and time spent are correlated and interpreted in terms of expert advice on preparedness level.
= Not Evaluated = Evaluated = Correct = Incorrect = Not Attempted = Marked for Review
= Answered = Correct Option = Your Option
Question Details
Status : Incorrect
Options :
1. Certifying Authority
2. Controller of Certifying Authority
3. Registering Authority
4. Chief Certifying Authority
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
/
Q2. Which of the following is the function of processor management?
Status : Incorrect
Options :
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Q3. Which of the following services is included in the core of the CBS?
Status : Incorrect
Options :
1. Internet Banking
2. RTGS
3. Data warehouse
4. Cheque Truncation System
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
/
Q4. In which of the following WAN message transmission technology, once the route is established, all packets follow the route but
it is logical connection for fix duration?
Status : Incorrect
Options :
1. Circuit switching
2. Packet switching
3. Message Switching
4. Virtual Circuits
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Status : Incorrect
Options :
1. All the entries in any column are of the same type or same domain
2. Ordering of rows and columns is significant.
3. Duplicate rows are allowed.
4. All data items stored in the columns are atomic in nature, that is, they can be split further without loss of information.
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
/
Q6. Which of the following is the Configuration Control aspect of Configuration Management System?
Status : Incorrect
Options :
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Status : Incorrect
Options :
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
/
Q8. Which of the following is most commonly used network topology in the local area network?
Status : Correct
Options :
1. Bus
2. Ring
3. Star
4. Mesh
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You are on the right preparation track on this topic.
Q9. Which of the following database language retrieves, inserts and deletes data of a relational database model?
Status : Incorrect
Options :
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
/
Q10. SAP belongs to which of the following category?
Status : Correct
Options :
1. Application Suite
2. Enterprise Software
3. Enterprise Infrastructure Software
4. Information Worker Software
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You are on the right preparation track on this topic.
Q11. Which of the following statement refers to internal schema of relational database model?
Status : Incorrect
Options :
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 1 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
/
Q12. Which of the following statement is correct for public key cryptography (PKI)?
Status : Incorrect
Options :
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Q13. Which of the following IDS detection methodology assumes that an intrusion can be detected by observing a deviation from
the normal?
Status : Incorrect
Options :
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
/
Q14. Which of the following firewall implementation contains two NICs: one connected to the external network, and other
connected to the internal network?
Status : Correct
Options :
1. Packet filtering routers
2. Single-homed firewalls
3. Dual-homed firewalls
4. Screened subnet firewalls (DMZ)
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You are on the right preparation track on this topic.
Status : Incorrect
Options :
1. Firewalls can enforce password policy and prevent misuse of passwords.
2. Firewalls are effective against non-technical security risks
3. Firewalls cannot stop internal users from accessing websites with malicious code
4. A firewall can prevent users or attackers with modems from dialling-in or dialling-out of the internal network
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
/
Q16. The applications which are not a part of the Core Banking Solution have an interface built (through middleware) with CBS.
Which of the following application is having seamless integration with CBS?
Status : Correct
Options :
1. Internet Banking
2. Automated Teller Machine (ATM)
3. MPLS
4. NPCI
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You are on the right preparation track on this topic.
Status : Incorrect
Options :
1. Application Suite
2. Enterprise Software
3. Enterprise Infrastructure Software
4. Information Worker Software
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
/
Q18. Which of the following operating system is used to run multiple tasks simultaneously by sharing the CPU time?
Status : Correct
Options :
1. Multi-tasking OS
2. Real time OS
3. Multi-processing OS
4. Multi-threading OS
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You are on the right preparation track on this topic.
Q19. Which of the following is the Configuration identification aspect of Configuration Management System?
Status : Incorrect
Options :
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
/
Q20. Cryptography is a branch of which of the following?
Status : Correct
Options :
1. Cryptanalysis
2. Cryptology
3. Hash Function
4. Coding
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You are on the right preparation track on this topic.
Q21. Which of the following secondary storage media creates microscopic pits on the surface of a disc?
Status : Correct
Options :
1. HDD
2. Flash drive
3. VRAM
4. DVD
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You are on the right preparation track on this topic.
/
Q22. Which of the following decides about the route based on the latest routing information gathered from connected routers?
Status : Incorrect
Options :
1. Static router
2. Dynamic router
3. Packet filtering router
4. Gateway
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Status : Correct
Options :
1. Provides mechanism for deadlock handling
2. Decides the processes that are to be loaded into memory when memory space becomes available
3. Keeps track of information, location, uses, status etc
4. Decides which process gets the device when and for how much time
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You are on the right preparation track on this topic.
/
Q24. Which of the following set of techniques that permit the simultaneous transmission of multiple signals on a single carrier?
Status : Incorrect
Options :
1. Multiplexing
2. Switching
3. Routing
4. Tunnelling
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Q25. Which of the following WAN switching technology known as store-and-forward switching?
Status : Incorrect
Options :
1. Circuit switching
2. Packet switching
3. Message Switching
4. Virtual Circuits
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
/
Q26. Which of the following network topology is having highest fault tolerance?
Status : Correct
Options :
1. Bus
2. Ring
3. Star
4. Mesh
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You are on the right preparation track on this topic.
Q27. Which of the following manages the Asymmetric Keys, and a means of certifying the authenticity of holder of the key?
Status : Correct
Options :
1. PKI
2. SSL
3. HTTPS
4. S/MIME
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You are on the right preparation track on this topic.
/
Q28. Which of the following performs stateful packet inspection, enables secure remote access to networks and prevents malicious
payloads and centralised reporting as the basic features?
Status : Incorrect
Options :
1. Stateful Inspection Firewall
2. Unified Theatre Monitoring (UTM)
3. Intrusion Prevention System (IPS)
4. Intrusion Detection System (IDS)
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You have most probably committed a numerical or conceptual mistake or you would have guessed the answer.
Status : Correct
Options :
1. Secret-key cryptography
2. Hash Function
3. Coding
4. Asymmetric key cryptography
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You are on the right preparation track on this topic.
/
Q30. Which of the following is a one-way encryption?
Status : Correct
Options :
1. Secret-key cryptography
2. Public key cryptography
3. Asymmetric key cryptography
4. Hash Function
Timespent (in sec): 0 Correct to Incorrect: 0 Incorrect to Correct: 0 Incorrect to Incorrect: 0 Correct to unanswered: 0 Incorrect to unanswered: 0
Comments: You are on the right preparation track on this topic.
CORRECT TO INCORRECT INCORRECT TO CORRECT INCORRECT TO INCORRECT CORRECT TO UNANSWERED INCORRECT TO UNANSWERED
0 0 1 0 0
/
1. An offsite information processing facility having electrical wiring, air conditioning and
flooring but no computer or communication equipment is a
Cold Site
2. Which of the following implementation is the most useful for business decisions making and
framing of future policies based on actual transaction data?
Data Warehouse
3. Which of the following is the primary requirement in reporting results of an IS audit. The
report should be
Backed by sufficient and appropriate audit evidence
4. Which of the following aims to sustain critical business process during an unplanned
interruption period?
Business Continuity Plan
5. Which of the following helps to gain a clear understanding of the business process while
developing a business continuity plan?
Risk Assessment
6. Which of the following phase starts with a damage assessment?
Restoration Phase
7. As per IATF, which of the following is a standard under IS Audit and Assurance Standard.
General Standard
8. When an Individual in an IT department, perform more than one role, which one of the
following poses the greatest risk.
Developers have access and can migrate data
9. Which of the following function is primarily responsible to support value creation by
reducing the risk of IT to an acceptable level?
IT Governanve
10. Which is the name of the decentralized control method enabling someone to make a
decision based on her own options.
Discretionary
11. Which of the following is known as condition that affect the risk profile of the organization?
Residual Risk
12. Which of the following statement is true concerning the steering committee?
Absence of formal charter indicates lack of controls
13. What is the best way to ensure that organizations policies comply with legal requirements?
Periodic review of the policies
14. Who are responsible for ensuring IT enabled investments provide business value?
Senior Management
15. Which of the following business process reengineering (BPR) risk are likely to occur during
the design phase.
Scope Risk, Skill risk, Political Risk
16. Which of the following should be done first when preparing a disaster recovery plan?
Perform a business impact analysis
17. Prioritization of IT initiatives within organization is primarily based on
Expected benefit realization
18. Which of the following is a benefit of using callback devices?
Provide an audit trail
19. Which of the following should be first initiative while using systematic approach for
implementing EGIT?
Establish desire to change
20. What is the correct sequence for benchmark process in BPR projects?
Plan, Research, Observe, analyze, adapt, improve
CONCEPTS OF IS AUDIT
1.14 Questions
1 The primary purpose and existence of an audit charter is to:
A. Document the audit process used by the enterprise
B. Formally document the audit department’s plan of action
C. Document a code of professional conduct for the auditor
D. Describe the authority and responsibilities of the audit department
2 Which of the following control classifications identify the cause of a problem and
minimize the impact of threat?
A. Administrative Controls
B. Detective Controls
C. Preventive Controls
D. Corrective Controls
4 Which of the following are most commonly used to mitigate risks discovered by
organizations?
A. Controls
B. Personnel
C. Resources
D. Threats
6 What means the rate at which opinion of the IS Auditor would change if he selects
a larger sample size?
A. Audit Risk
B. Materiality
C. Risk Based Audit
D. Controls
8 After you enter a purchase order in an on-line system, you get the message, “The
request could not be processed due to lack of funds in your budget”. This is an
example of error?
A. Detection
B. Correction
C. Prevention
D. Recovery
9 When developing a risk-based audit strategy, an IS auditor should conduct a risk
assessment to ensure that:
A. Controls needed to mitigate risks are in place.
B. Vulnerabilities and threats are identified.
C. Audit risks are considered.
D. Gap analysis is appropriate
2 Corrective Controls classification identify the cause of a problem and minimize the
impact of threat. The goal of these controls is to identify the root cause of an issue
whenever possible and eliminate the potential for that occurring again. The other
controls are useful but perform other functions instead. Correct answer is D.
4 Controls are most commonly used to mitigate risks discovered by organizations. This
is what organizations implement as a result of the risks an organization discovers.
Resources and personnel are often expended to implement controls. Correct answer
is A.
6 Audit risk means the rate at which opinion of the IS Auditor would change if he selects
a larger sample size. Audit risk can be high, moderate or low depending on the sample
size selected by the IS Auditor. A risk-based audit approach is usually adapted to
develop and improve the continuous audit process. Materiality means importance of
information to the users. It is totally the matter of the professional judgment of the IS
Auditor to decide whether the information is material or immaterial. Correct answer is
A.
8 To stop or prevent a wrong entry is a function of error prevention. All other options
work after an error. Prevention works before occurrence of error. Correct answer is C.
10 Strategic planning sets corporate or departmental objectives into motion. It is time and
project-oriented, but must also address and help determine priorities to meet business
needs. Reviewing long-term strategic plans will not achieve objectives by other
choice. Correct answer is A.
Explanation
A) IS Audit and Assurance Standards suggest that an IS Auditor should gather
sufficient and appropriate audit evidence on which his opinion is based. Here the
IS Auditor needs to determine whether this is an isolated incident or a systematic
failure. It would be a good practice to make management informed about the
incident.
B) Directly issuing an Audit Finding, without gathering sufficient and appropriate audit
evidence is not the proper practice as per the Standards.
C) Directly seeking explanations from management, without gathering sufficient and
appropriate audit evidence is not the proper practice as per the Standards.
D) Directly asking clarifications from Firewall Vendor without investigating the matter
further is not the proper practice on the part of IS Auditor. (Note: As per information
detailed in question, Vendor is not managing the firewall configuration files.
Rushing to Vendor means the auditor is overstepping the premise and is not in line
with auditor’s responsibilities).
2. An IS Auditor found one security loophole in the System. However, when the IT
Management got to know about it, immediately corrected it. The IS Auditor should:
A) Report the same in his Audit Report if the finding is material.
B) Don’t include in the Audit Report as the same is corrected.
C) Don’t include in the Audit Report but discuss the same in Exit Interview for
recommendation.
D) Don’t include in the Audit Report and send a letter of appreciation to IT
Management.
Correct Answer is A.
Explanation
A) As per the IS Audit and Assurance Standards, any finding, whether subsequently
corrected or not should be included in the IS Audit Report if it is material.
B) Not including the finding as it is corrected is not the proper treatment as per IS
Audit and Assurance Standards.
C) Not including the finding and discussing the same only at Exit Interview is not the
proper treatment as per IS Audit and Assurance Standards.
D) Not including the material audit finding is not the proper treatment as per IS Audit
and Assurance Standards. A Letter of appreciation has nothing to do with Auditor’s
Responsibilities of including material finding in IS Audit Report.
2.27 Questions
1. Which of the following forms of evidence would be considered to be the most
reliable when assisting an IS Auditor develop audit conclusion?
A. A confirmation letter received from a third party for the verification of an account
balance.
B. Assurance via a control self-assessment received from the management that an
application is working as designed.
C. Trend data obtained from World Wide Web (Internet) sources.
D. Ratio analysis developed by an IS Auditor from reports supplied by line
Management
2. During a review of the controls over the process of defining IT service levels, an IS
auditor would most likely interview the:
A. Systems programmer
B. Legal staff
C. Business Unit Manager
D. Programmer
3. Which of the following procedures would an IS Auditor not perform during pre-audit
planning to gain an understanding of the overall environment under review?
A. Tour key organisation activities
B. Interview key members of management to understand business risks
C. Perform compliance tests to determine if regulatory requirements are met.
D. Review prior audit reports.
4. The first step IS Auditor should take when preparing the annual IS audit plan is to:
A. Meet with the audit committee members to discuss the IS audit plan for the
upcoming year.
B. Ensure that the IS audit staff is competent in areas that are likely to appear on the
plan and provide training as necessary.
C. Perform a risk ranking of the current and proposed application systems to prioritize
the IS audits to be conducted.
D. Begin with the prior year's IS audit plan and carry over any IS audits that had not
been accomplished.
6. IS Auditors being most likely to perform tests of internal controls if, after their
evaluation of such controls, they conclude that:
A. A substantive approach to the audit is cost-effective
B. The control environment is poor.
C. Inherent risk is low.
D. Control risks are within the acceptable limits.
7. Which of the following is the least important factor in determining the need for an
IS Auditor to be involved in a new system development project?
A. The cost of the system
B. The value of the system to the organization.
C. The potential benefits of the system.
D. The number of lines of code to be written.
9. Which of the following types of audits requires the highest degree of data
processing expertise?
A. Systems software audits
B. General controls reviews
C. Microcomputer application audits
D. Mainframe application audits
Purpose of CAATs
CAATs give auditors ability to maximize their efficiency and effectiveness in performing
audit.
These are considered to be essential part of Auditors’ Toolkit.
3.5 Questions
1. What is one of the key tests which can be ideally carried out using Computer Assisted
Audit Tools (CAATs)?
A. Identification of exceptional transactions based upon set criteria
B. Projections on future trends for specific parameters
C. Carrying out employees’ reference checks
D. Carry out employee appraisals Key
2. Find out the best process carried out using Computer Assisted Audit Tools (CAATs)?
A. Identify potential areas of fraud
B. Carry out employee appraisals of Information Systems Assurances Services
C. Projections on future trends for specific parameters
D. Carrying out employees’ reference checks Key
3. What can be ideally carried out using Computer Assisted Audit Tools (CAATs)?
A. Identify data which is inconsistent or erroneous
B. Carry out employee appraisals
C. Projections on future trends for specific parameters
D. Carrying out employees’ reference checks Key.
4. What is one of the key tests which can be ideally carried out using Computer Assisted
Audit Tools (CAATs)?
A. Perform various types of statistical analysis
B. Carry out employee appraisals
C. Projections on future trends for specific parameters
D. Carrying out employees’ reference checks Key
5. What is one of the key tests which can be ideally carried out using Computer Assisted
Audit Tools (CAATs)?
A. Establishing whether the set controls are working as prescribed
B. Carry out employee appraisals
C. Projections on future trends for specific parameters
D. Estimation of competitor activity Key.
6. What is one of the key tests which can be ideally carried out using Computer Assisted
Audit Tools (CAATs)?
A. Establishing relationship between two or more areas & identify duplicate
transactions
B. Carry out market surveys for a new product launch
C. Projections on future trends for specific parameters
D. Estimation of competitor activity Key
7. Which is one of the most effective tools and techniques to combat fraud?
A. Computer Assisted Audit Techniques (CAAT)
B. Threats of severe punishment
C. Validation by the I.T. dept. of the police
D. Use of authenticated hard copies Key
8. An IS Auditor, concerned that application controls are not adequate to prevent duplicate
payment of invoices, decided to review the data processing files for possible duplicate
payments. Which of the following techniques/tools would be useful to the IS Auditor?
A. An integrated test facility.
B. Statistical sampling.
C. Generalized audit software.
D. The Audit Review File.
9. Many automated tools are designed for testing and evaluating computer systems. Which
one of the following such tools impact the systems performance with a greater load and
stress on the system?
A. Test data generators
B. Statistical software packages
C. Test drivers
D. Network traffic analyzers
10. The most appropriate type of CAAT tool the auditor should use to test security
configuration settings for the entire application systems of any organization is:
A. Generalised Audit Software
B. Test Data
C. Utility Software
D. Expert System
2 One of the many key tests that can be carried out by CAATs is identification of potential
areas of fraud. The IS auditor can set the criteria based upon the sort of transactions
which are not expected to occur on the basis of presumably have been incorporated
in the organization’s systems. CAATs are more in the nature of audit tools & would not
be ideal for the other purposes listed in Options B to D above. Correct answer is A.
3 One of the many key tests that can be carried out by CAATs is identification of data
which is inconsistent or erroneous. The IS auditor can set the criteria based upon the
sort of data which are not expected to occur on the basis of the controls which
presumably have been incorporated in the organization’s systems. CAATs are more
in the nature of audit tools & would not be ideal for the other purposes listed in Options
B to D above. Hence, answer at Option A alone is correct.
4 One of the many key tests that can be carried out by CAATs is the carrying out of
various types of statistical analysis which could throw up areas of inconsistencies,
defaults, etc. CAATs are more in the nature of audit tools & would not be ideal for the
other purposes listed in Options B to D above. Hence, answer at Option A alone is
correct.
5 One of the many key tests that can be carried out by CAATs is establishing whether
the set controls are working as intended. CAATs are more in the nature of audit tools
& would not be ideal for the other purposes listed in Options B to D above. Hence,
answer at Option A alone is correct.
6 One of the many key tests that can be carried out by CAATs is establishing relationship
between two or more areas & identify duplicate transactions. CAATs are more in the
nature of audit tools & would not be ideal for the other purposes listed in Options B to
D above. Hence, answer at Option A alone is correct.
7 CAAT is one of the tools useful for carrying out the detection of suspicious transactions
as a pre-emptive or post fraud activity. Hence, answer at Option A is correct.
8 Generalised Audit software is mainly used to find duplicate data. Options A and D are
on line application audit tools and statistical sampling may not be able to find
duplicates. Correct answer is C.
9 Statistical software packages use all data resources impacting the processing time
and response time. Network traffic analyzers also use the system resources but not
putting stress on production data. Test data generator is not resource intensive and
test drivers are for specific use without impacting much resources. Correct answer is
B.
10 When testing the security of the entire application system including operating system,
database and application security, the auditor will most likely use a utility software that
assists in reviewing the configuration settings. In contrast, the Auditor may use GAS
to perform a substantive testing of data and configuration files of the application. Test
data are normally used to check the integrity of the data and expert systems are used
to inquire on specific topics. Hence correct answer is C.
2 As per Income Tax Act, 1961 and banking norms, all fixed deposit holders of banks
need to submit their PAN or form 60/61(a form as per Income Tax Act/Rules). A bank
in its account opening form, has not updated the need for form 60/61 in case PAN is
not there. This defines which control lapse as per COBIT.
A. Source Data Preparation and Authorisation
B. Source Data Collection and Entry
C. Accuracy, Completeness and Authenticity Checks
D. Processing Integrity and Validity
3 In a public sector bank while updating master data for advances given, the bank
employee does not update “INSURANCE DATA”. This includes details of Insurance
Policy, Amount Insured, Expiry Date of Insurance and other related information. This
defines which control lapse as per COBIT.
A. Source Data Preparation and Authorisation
B. Source Data Collection and Entry
C. Accuracy, Completeness and Authenticity Checks
D. Processing Integrity and Validity
4 An IS Auditor observed that users are occasionally granted the authority to change
system data. The elevated system access is not consistent with company policy yet is
required for smooth functioning of business operations. Which of the following controls
would the IS Auditor most likely recommend for long term resolution?
A. Redesign the controls related to data authentication
B. Implement additional segregation of duties controls
C. Review policy to see if a formal exception process is required
D. Implement additional logging controls.
7 RBI instructed banks to stop cash retraction in all ATMs across India from April 1,
2013. This was result of few ATM frauds detected. This action by RBI can be best
classified as:
A. Creation
B. Rectification
C. Repair
D. None of above
8 A central antivirus system determines whether each personal computer has the latest
signature files and installs the latest signature file before allowing a PC to connect to
the network. This is an example of a:
A. Directive control
B. Corrective Control
C. Compensating Control
D. Detective Control
9 Company’s billing system does not allow billing to those dealers who have not paid
advance amount against proforma invoice. This check is best called as:
A. Limit Check
B. Dependency Check
C. Range Check
D. Duplicate Check
10 While posting message on FACEBOOK, if user posts the same message again,
FACEBOOK gives a warning. The warning indicates which control.
A. Limit Check
B. Dependency Check
C. Range Check
D. Duplicate Check
2 A. is the correct answer as the source data capture is not proper. Ensure that source
documents are prepared by authorised and qualified personnel following established
procedures, taking into account adequate segregation of duties regarding the
origination and approval of these documents. Errors and omissions can be minimised
through good input form design.
3 C. This ensures that transactions are accurate, complete and valid. Validate data that
were input, and edit or send back for correction as close to the point of origination as
possible.
5 D. is the correct answer. The IS Auditor may process test data on application controls
to see how it responds.
6 D is correct. For finding the anomaly between input and output, reconciliation is the
best option. Re-calculation and run-to-run total will provide the same result as earlier
and limit check is a data validation control.
7 B. is the right answer. A, is not an answer as action by RBI is based on fraud detection.
Repair is done to rectify an error which has occurred in a working system.
8 B. is the correct answer. After detecting the deficiency, it is correcting the situation
hence it is a corrective control.
9 B. Dependency check is one where value of one field is related to that of another.
2. Robotics: This technology refers to robot machines with artificial intelligence and humanlike
physical capabilities. This includes applications that give robots visual perception,
capabilities to feel by touch, dexterity and locomotion.
3. Natural Languages: Being able to 'converse' with computers in human languages is the
goal of research in this area. Interactive voice response and natural programming
languages, closer to human conversation, are some of the applications. Virtual reality is
another important application that can be classified under natural interfaces.
5.6 Questions
1 Which of the following business purposes can be met by implementing Data
warehouse in an organisation?
A. Business continuity can be ensured in case of disaster.
B. Data in the data ware house can work as a backup
C. The data in the warehouse can be used for meeting regulatory requirements.
D. Business decisions can be taken and future policies can be framed based on
actual transactional data.
2 Which of the following is a characteristic of a decision support system (DSS)?
A. DSS is aimed at solving highly structured problem.
B. DSS combines the use of models with non-traditional data access and retrieval
functions.
C. DSS emphasizes flexibility in decision making approach of users.
D. DSS supports only structured decision-making tasks.
3 Which of the following audit tools is MOST useful to an IS auditor when an audit trail
is required?
A. Integrated test facility (ITF)
B. Continuous and intermittent simulation (CIS)
C. Audit hooks
D. Snapshots
5 The cashier of a company has rights to create bank master in TALLY. This error is a
reflection of poor definition for which type of control:
A. User Controls
B. Application Control
C. Input Control
D. Output Control
8 Neural Networks and Fuzzy Logics are classified under which category of Artificial
intelligence?
A. Cognitive Science
B. Robotics
C. Natural Sciences
D. Virtual Reality
10 Which are the business activities which are strong contenders for conversion to
ecommerce?
A. Those that are paper-based, time consuming & inconvenient for customers
B. Those relating to software development
C. Those relating to the ‘electronic’ aspects of commerce
D. Those that are not paper-based, speedy & convenient for customers.
5.7 Answers and Explanations
1 Correct answer is D. Purpose of Data warehouse is to take business decisions and
frame future policies based on the analysis of transactional data. It cannot act as an
alternative to backup. Purpose of the data ware house is not for business continuity
nor is it for regulatory requirements.
2 Correct answer is B. It goes with the purpose and definition of decision support system.
3 Correct answer is D. Snapshot is the right answer as in this technique, IS auditor can
create evidence through IMAGE capturing. A snapshot tool is most useful when an
audit trail is required. ITF can be used to incorporate test transactions into a normal
production run of a system. CIS is useful when transactions meeting certain criteria
need to be examined. Audit hooks are useful when only select transactions or
processes need to be examined.
4 Correct answer is B. One of the major bottlenecks in data ware house is time
synchronisation as the data of different time zones is merged in data ware house. It
ultimately results in in-complete data for decision making purposes.
5 Correct answer is A. User controls are not properly defined. User controls need to be
defined based on NEED TO DO and NEED TO DO basis. The above is reflection of a
greater problem of improper assessment of user profiles created in the system.
6 Correct answer is B. the first thing to do as soon as an employee leaves the company
is to disable his/her access rights in system. This needs to be done to prevent frauds
being committed. Other answers may be valid but are not the first thing to do.
7 Correct answer is A. Physical security describes security measures that are designed
to restrict unauthorized access to facilities, equipment and resources, and to protect
personnel and property from damage or harm (such as espionage, theft, or terrorist
attacks). Physical security involves the use of multiple layers of interdependent
systems which include CCTV surveillance, security guards, Biometric access, RFID
cards, access cards protective barriers, locks, access control protocols, and many
other techniques. B is incorrect - An acceptable use policy (AUP), also known as an
Acceptable Usage policy or Fair Use policy, is a set of rules applied by the owner or
manager of a network, website or large computer system that restrict the ways in which
the network, website or system may be used. C is incorrect – This policy defines the
requirements for Information Asset’s protection. It includes assets like servers,
desktops, handhelds, software, network devices etc. Besides, it covers all assets used
by an organization- owned or leased. D is incorrect – This policy defines the
requirements to ensure continuity of business-critical operations. It is designed to
minimize the impact of an unforeseen event (or disaster) and to facilitate return of
business to normal levels.
6.9 Questions
1 Which of the following factors should not be considered in establishing the
priority of audits included in an annual audit plan?
A. Prior audit findings
B. The time period since the last audit
C. Auditee procedural changes
D. Use of audit software
2 B. An error is the least likely element to contribute to the potential for fraud. Answer
A and C are incorrect since volume and value of transactions give an indication
of the maximum potential loss through fraud. Answer D is incorrect since gross
risk less existing controls give net risk.
3 B. The password control weaknesses mean that any of the other three options
could be true. Password security would normally identify the perpetrator. In this
case, it does not establish guilt beyond doubt.
10. Which of the following is the primary objective for implementing ERM?
A. Implement right level of controls.
B. Better availability of information.
C. Tighter security at lower cost.
D. Implement IT best practices.
4. The level to which an enterprise can accept financial loss from a new initiative is:
A. Risk tolerance
B. Risk management
C. Risk appetite
D. Risk acceptance
5. Designing and implementing a control to reduce the likelihood and/or impact of risk
materializing is a:
A. Risk acceptance
B. Risk transfer
C. Risk treatment
D. Risk transfer
7. Which of the following is primary reason for periodic review of risk? The changes in:
A. risk factors
B. risk appetite
C. budget
D. risk strategy
8. Which of the following is a strategic IT risk?
A. IS audit may not identify critical non-compliance.
B. Non-availability of networks impacting services to customers.
C. New application may not achieve expected benefits.
D. Defer replacement of obsolete hardware.
9. Which of the following is the most essential action after evaluation of inherent risks?
A. Evaluate implemented controls.
B. Update risk register.
C. Prepare heat map.
D. Prioritized evaluated risk.
3. D. Risk factors are conditions that affect the risk profile of organization. Change in
government is one of major risk factor as compared with other options.
4. C. Risk appetite denotes the level of risk acceptable by management. Risk tolerance is the
time up to which an organization can afford to accept the risk. Risk management is a
process of risk mitigation and risk acceptance is decision of the management and is
considered as risk response.
7. A. Changes in risk factors is the primary reason for reviewing changes in risk levels for an
organization. The other options are secondary reasons.
9. A. Once risks are evaluated it is necessary to find out the current state of risk mitigation
(gaps in controls) by evaluating the existing controls. This help in identifying gaps and
implementing controls so as to reduce the total exposure within acceptable limits. Other
activities are required but not as essential as identifying gaps in controls.
CHAPTER 3
7. Which of the following is best control for building requisite skills and competencies
within organization?
A. Hiring only highly qualified people
B. Outsourcing the critical operations
C. Conducting skill enhancement training
D. Defining skill requirements in job description
3.10 Answers and Explanations
1. C. Entire EGIT implementation focuses on Information and data. Policies are defined
based on nature of information and data, culture and behaviour. IT infrastructure and
applications stores, process and communicates information.
2. D. Policies are vehicle to communicate intent of management and hence must be clear and
easy to implement that will make them effective. B and C are requirements to maintain
policies and A is characteristic of principles.
5. B. Although the IT steering committee considers all inputs, the primary consideration is
expected benefits to the organization.
7. C. The best control for building requisite skills and competencies within organization is to
ensure skill enhancement training is provided.
CHAPTER 4
Performance Management Systems
1. Which of the following is best approach for monitoring the performance of IT resources?
A. Compare lag indicators against expected thresholds
B. Monitor lead indicators with industry best practices
C. Define thresholds for lag indicators based on long term plan
D. Lead indicators have corresponding lag indicator.
2. Performance monitoring using balance score card is most useful since it primarily
focuses on:
A. Management perspective
B. Product and services
C. Customer perspectives
D. Service delivery processes
4. The PRIMARY objective of base lining IT resource performance with business process
owners is to:
A. define and implement lead and lag indicators.
B. ensure resource planning is aligned with industry.
C. assess cost effectiveness of outsourcing contracts.
D. benchmark expected performance measurement.
8. Which of the following is the PRIMARY purpose of optimizing the use of IT resources
within an enterprise?
A. To increase likelihood of benefit realization.
B. To ensure readiness for future change.
C. To reduce cost of IT investments.
D. To address dependency on IT capabilities.
10. Organization considering deploying application using cloud computing services provided
by third party service provider. The MAIN advantage of this arrangement is that it will:
A. minimize risks associated with IT
B. help in optimizing resource utilization.
C. ensure availability of skilled resources.
D. reduce investment in IT infrastructure.
2. C. The Balance score card (BSC) focuses on Financial, Customer, internal and learning
perspective.
9. D. Management must monitor the performance of IT resources to ensure that the expected
benefits from IT are being realized as per planned performance. This is done by
allocating IT resources in accordance to the planned performance of business process
cascaded down to IT resources supporting business processes.
2. Which of the following BEST describes difference between a DRP and a BCP? The
DRP:
A. works for natural disasters whereas BCP works for unplanned operating incidents
such as technical failures.
B. works for business process recovery and information systems whereas BCP
works only for information systems.
C. defines all needed actions to restore to normal operation after an un-planned
incident whereas BCP only deals with critical operations needed to continue
working after an un-planned incident.
D. is the awareness process for employees whereas BCP contains procedures to
recover the operation?
3. The MOST significant level of BCP program development effort is generally required
during the:
A. Early stages of planning.
B. Evaluation stage.
C. Maintenance stage.
D. Testing Stage.
5. All of the following are security and control concerns associated with disaster recovery
procedures EXCEPT:
A. Loss of audit trail.
B. Insufficient documentation of procedures.
C. Inability to restart under control.
D. Inability to resolve system deadlock.
6. As updates to an online order entry system are processed, the updates are recorded on
a transaction tape and a hard copy transaction log. At the end of the day, the order
entry files are backed up onto tape. During the backup procedure, the disk drive
malfunctions and the order entry files are lost. Which of the following are necessary to
restore these files?
A. The previous day's backup file and the current transaction tape
B. The previous day's transaction file and the current transaction tape
C. The current transaction tape and the current hardcopy transaction log
D. The current hardcopy transaction log and the previous day's transaction file
8. Which of the following offsite information processing facility conditions would cause an
IS auditor the GREATEST concern?
A. Company name is clearly visible on the facility.
B. The facility is located outside city limits from the originating city.
C. The facility does not have any windows.
D. The facility entrance is located in the back of the building rather than the front.
9. Which of the following methods of results analysis, during the testing of the business
continuity plan (BCP), provides the BEST assurance that the plan is workable?
A. Quantitatively measuring the results of the test
B. Measurement of accuracy
C. Elapsed time for completion of prescribed tasks
D. Evaluation of the observed test results
2. C. The difference pertains to the scope of each plan. A disaster recovery plan recovers all
operations, whereas a business continuity plan retrieves business continuity (minimum
requirements to provide services to the customers or clients). Choices A, B and D are
incorrect because the type of plan (recovery or continuity) is independent from the sort
of disaster or process and it includes both awareness campaigns and procedures.
3. A. A company in the early stages of business continuity planning (BCP) will incur the most
significant level of program development effort, which will level out as the BCP program
moves into maintenance, testing and evaluation stages. It is during the planning stage
that an IS Auditor will play an important role in obtaining senior management's
commitment to resources and assignment of BCP responsibilities.
4. D. Hot sites can be made ready for operation normally within hours. However, the use of
hot sites is expensive, should not be considered as a long-term solution and does
require that equipment and systems software be compatible with the primary installation
being backed up.
5. D. The inability to resolve system deadlock is a control concern in the design of database
management systems, not disaster recovery procedures. All of the other choices are
control concerns associated with disaster recovery procedures.
6. A. The previous day's backup will be the most current historical backup of activity in the
system. The current day's transaction file will contain all of the day's activity. Therefore,
the combination of these two files will enable full recovery up to the point of interruption.
7. B. The plan must be reviewed at appropriate intervals, depending upon the nature of the
business and the rate of change of systems and personnel, otherwise it may quickly
become out of date and may no longer be effective (for example, hardware or software
changes in the live processing environment are not reflected in the plan). The plan must
be subjected to regular testing, but the period between tests will depend on nature of
the organisation and relative importance of IS. Three months or even annually may be
appropriate in different circumstances. Although the disaster recovery plan should
receive the approval of senior management, it need not be the CEO if another executive
officer is equally, or more appropriate. For a purely IS-related plan, the executive
responsible for technology may have approved the plan. the IS disaster recovery plan
will usually be a technical document and relevant to IS and communications staff only.
8. A. The offsite facility should not be easily identified from the outside. Signs identifying the
company and the contents of the facility should not be present. This is to prevent
intentional sabotage of the offsite facility should the destruction of the originating site be
from malicious attack. The offsite facility should not be subject to the same natural
disaster that affected the originating site. The offsite facility must also be secured and
controlled just as the originating site. This includes adequate physical access controls
such as locked doors, no windows and human surveillance.
9. A. Quantitatively measuring the results of the test involves a generic statement measuring
all the activities performed during BCP, which gives the best assurance of an effective
plan. Although choices B and C are also quantitative, they relate to specific areas or an
analysis of results from one viewpoint, namely the accuracy of the results and the elapsed time.
1 which of the following should be done first when preparing a disaster recovery plan
perform a business impact analysis
an offiste information processing facility having electrical wiring air conditioning and flooring
2 but no computer or communications equipment is a
cold site
which of the following must exist to ensure the viability of a duplicate information processing
3 facility
the workload of primary site is monitored to ensure adequate backup is available
during the course of an application software review, an IS auditor identifie dminor
weaknesses in a relevant database environment that is out of scope for the audit. The best
4 option is to
formally report the weaknesses as observed
5 which of the following phase starts with damage assessment
incident response phase
which of the following business process reengineering risks are likely to occur during the
6 design phase
scope risk, skill risk, political risk
which of the following section of IT act 2000 demands the appropriate documented
7 procedure to comply with the request of CERT-IN regarding cyber security incidents
Sec. 70B
8 which of the following is not considered a control failure
which of the following helps to gain clear understanding of the business process while
9 developing a business continuty plan
which of the following audit's primary purpose is the development of evidence for review by
10 law enforcement and judicial authorities
forensic audit
what is the best way to ensure that organizational polocies comply with the legal
11 requirements
which of the following disaster recovery/ continuity plan components provides the greatest
12 assurance of recovery after a disaster
the alternate facility will be available until the original information processing facility is
restored
13 who sets the priorities and objectives of the IT balanced scorecard
chief information officer (CIO)
which of the following is the primary requirement in reporting results of and IS audit? The
14 report should be
which of the following function is primarily responsible to support value creation by reducing
16 the risk of IT to acceptable level
IT risk management
17 which of the following is the primary reason for periodic review of risk? The change in
risk factors
which of the following aims to sustain critical business process during an unplanned
18 interruption period
business continuity plan
which of the following risk treatment options enables implementation of control to reduce
19 level of risk
mitigate
20 which of the following is a benefit of using callback devices
provide an audit trail
which of the following data validation edits is effective in detecting transposition and
21 transcrption errors
check digit
while reviewing the IT security policies, IS auditor observed that some of the sub-plicies were
not approved by the management but employees striclty follows the policies. What should IS
22 auditor to do first
which of the following is the most useful for business decisions making and framing policies
23 based on actual transactional data
executive inforation system
24 which of the following statements is true concerning the steering committee
the steering committee foucses on the agenda on IT issues
which of the following audit tools is most useful to an IS auditor when only select
25 transactions or processes need to be examined
audit hooks
Column1 QUESTION ANSWER
Q. Self Service assistance to users provided by help desk such as
1 resetting passwords etc. is considered which level of assistence? Ans. Level 0
Q. Which of the following model user need to know URL to access the
2 app? Ans. Web based application deveopment.
3 Q. Who is responsible for classification of data in a Dept? Ans. Data owner
Q. Users have more privileges than they need and may use them to
14 perform actions outside of their job description. It is known as_ Ans. Privilege creep
Q. Which of the following relates to the accuracy and completeness
of info as well as to its validity in accordance with business values and
15 expectations? Ans. Integrity
Q.Which of the following relates to the provision of appropriate info
for mgt to operate the entity and exercise its fiduciary and
16 governance responsibilities? Ans. Reliability.
Default settings are used by vendors to help users get the system up
and running. What is the auditor's primary area of interest regarding
17 default settings? indicate well known settings published by vendor
Which of the following software developing methodology primarily
18 focuses on risk avoidance? Sprial
19 Completeness and Accuracy of Data is assured by ? Processing Control Procedures
Which of the following is the list of OSI Model levels from the top
20 down ? Application , Presentaion, Session
29 Which of the following is the role of IS Auditor in SDLC ? All of the above
Which of the following methods is designed to permanently destroy
30 data on hard disk ? Disk Wiping / Risk Wiping
Multinational organisation has decided to implement ERP solution
31 across all geographical locations. The Organisation shall initiate a Program
32 Tools not used by Project managers to control the projects Software Size Estimation
38 Which of the following is not a function of the Operating System? Detection of system penetration
Which among the following is the function of quality assurance Responsible to handle the integrity and security of
39 personnel information stored in data base
43 What is the purpose of address resolution protocol? find the MAC address
44 what is the primary objective in problem escalation ensure the correct response