The document is a 10 question multiple choice exam on information systems auditing topics. The questions cover the role of an IS auditor in a control self-assessment program, sampling methods for testing controls compliance, validating application controls, components of an IT balanced scorecard, compensating controls, elements of an email policy, levels of information security governance maturity, and baseline security requirements.
The document is a 10 question multiple choice exam on information systems auditing topics. The questions cover the role of an IS auditor in a control self-assessment program, sampling methods for testing controls compliance, validating application controls, components of an IT balanced scorecard, compensating controls, elements of an email policy, levels of information security governance maturity, and baseline security requirements.
The document is a 10 question multiple choice exam on information systems auditing topics. The questions cover the role of an IS auditor in a control self-assessment program, sampling methods for testing controls compliance, validating application controls, components of an IT balanced scorecard, compensating controls, elements of an email policy, levels of information security governance maturity, and baseline security requirements.
The document is a 10 question multiple choice exam on information systems auditing topics. The questions cover the role of an IS auditor in a control self-assessment program, sampling methods for testing controls compliance, validating application controls, components of an IT balanced scorecard, compensating controls, elements of an email policy, levels of information security governance maturity, and baseline security requirements.
Download as DOCX, PDF, TXT or read online from Scribd
Download as docx, pdf, or txt
You are on page 1/ 1
Subj IC: ___
EXAMINATION SECRET
Score: SCHOOL OF SIGNALS Index:
ATT CRYPTO-7 Date: 27 Mar 2023 SUBJECT: ISA Full Marks: 10 Time: 10 Minutes SPOT TEST-02 Pass Marks: 04 _____________________________________________________________________________ Multiple Question: Mark the Correct Answer. 1x10=10 1. An IS Auditor has been asked by the management to support its CSA program. The role of an IS auditor in a control self-assessment (CSA) should be that of: a. program incharge b. program manager c. program partner d. program facilitator 2. When an IS auditor performs a test to ensure that only active users have access to a, the IS auditor is performing a: a. compliance test. b. substantive test. c. statistical sample. d. Judgment Sampling. 3. IS auditor is reviewing the internal control of an application software. The sampling method that will be MOST useful when testing for compliance is: a. Attribute sampling b. Variable sampling c. Discovery sampling d. Stop or go sampling 4. Which of the following sampling methods would be the MOST effective to determine whether access rights to staffs have been authorized as per the authorization matrix? a. stratified mean per unit b. attribute sampling c. discovery sampling d. stop or go sampling 5. Which one of the following could an IS auditor use to validate the effectiveness of edit and validation routines? a. Domain integrity test b. Relational integrity test c. Referential integrity test d. Parity checks 6. The IT balanced scorecard is a business governance tool intended to monitor IT performance evaluation indicators other than: a. financial results. b. customer satisfaction. c. internal process efficiency. d. innovation capacity. 7. Which of the following controls would an IS auditor look for in an environment where duties cannot be appropriately segregated? a. Overlapping controls b. Boundary controls c. Access controls d. Compensating controls 8. A comprehensive and effective e-mail policy should address the issues of e-mail structure, policy enforcement, monitoring and: a. recovery. b. retention. c. rebuilding. d. reuse. 9. In an organization, the responsibilities for IT security are clearly assigned and enforced and an IT security risk and impact analysis is consistently performed. This represents which level of ranking in the information security governance maturity model? a. Optimized b. Managed c. Defined d. Repeatable 10. In an organization where an IT security baseline has been defined, the IS auditor should FIRST ensure: a. implementation. b. compliance. c. documentation. d. sufficiency.