0% found this document useful (0 votes)
50 views1 page

ISA Spot Test 2 Domain 1 and 2 v2

Download as docx, pdf, or txt
Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1/ 1

Subj IC: ___

EXAMINATION SECRET

Score: SCHOOL OF SIGNALS Index:


ATT CRYPTO-7
Date: 27 Mar 2023 SUBJECT: ISA Full Marks: 10
Time: 10 Minutes
SPOT TEST-02 Pass Marks: 04
_____________________________________________________________________________
Multiple Question: Mark the Correct Answer. 1x10=10
1. An IS Auditor has been asked by the management to support its CSA program. The role of an IS
auditor in a control self-assessment (CSA) should be that of:
a. program incharge b. program manager
c. program partner d. program facilitator
2. When an IS auditor performs a test to ensure that only active users have access to a, the IS
auditor is performing a:
a. compliance test. b. substantive test.
c. statistical sample. d. Judgment Sampling.
3. IS auditor is reviewing the internal control of an application software. The sampling method
that will be MOST useful when testing for compliance is:
a. Attribute sampling b. Variable sampling
c. Discovery sampling d. Stop or go sampling
4. Which of the following sampling methods would be the MOST effective to determine whether
access rights to staffs have been authorized as per the authorization matrix?
a. stratified mean per unit b. attribute sampling
c. discovery sampling d. stop or go sampling
5. Which one of the following could an IS auditor use to validate the effectiveness of edit and
validation routines?
a. Domain integrity test b. Relational integrity test
c. Referential integrity test d. Parity checks
6. The IT balanced scorecard is a business governance tool intended to monitor IT performance
evaluation indicators other than:
a. financial results. b. customer satisfaction.
c. internal process efficiency. d. innovation capacity.
7. Which of the following controls would an IS auditor look for in an environment where duties
cannot be appropriately segregated?
a. Overlapping controls b. Boundary controls
c. Access controls d. Compensating controls
8. A comprehensive and effective e-mail policy should address the issues of e-mail structure,
policy enforcement, monitoring and:
a. recovery. b. retention.
c. rebuilding. d. reuse.
9. In an organization, the responsibilities for IT security are clearly assigned and enforced and an IT
security risk and impact analysis is consistently performed. This represents which level of
ranking in the information security governance maturity model?
a. Optimized b. Managed
c. Defined d. Repeatable
10. In an organization where an IT security baseline has been defined, the IS auditor should FIRST
ensure:
a. implementation. b. compliance.
c. documentation. d. sufficiency.

EXAMINATION SECRET

You might also like