Topic 1: Exam Pool A
Which of the following is a passive attack on a network?
A.
Sequence analysis
B.
Traffic analysis
C.
Message service interruption
D.
Message modification
Traffic analysis
When conducting a follow-up audit on an organization s firewall configuration, the IS auditor discovered that the firewall had been integrated into a new system that provides both firewall and intrusion detection capabilities. The IS auditor should:
A.
review the compatibility of the new system with existing network controls
B.
consider the follow-up audit unnecessary since the firewall is no longer being used
C.
assess whether the integrated system addresses the identified risk
D.
evaluate whether current staff is able to support the new system
assess whether the integrated system addresses the identified risk
Spreadsheets are used to calculate project cost estimates Totals for each cost category are then keyed into the job-costing system. What is the BIST control to ensure that data are accurately entered into the system?
A.
Validity checks preventing entry of character data
B.
Reconciliation total amounts by project
C.
Display back of project detail after entry
D.
Reasonableness checks for each cost type
Reconciliation total amounts by project
The objective of using coding standards for systems development is to:
A.
ensure that business needs are met
B.
facilitate user testing
C.
facilitate program maintenance
D.
ensure the completeness of requirements.
facilitate program maintenance
An audit committee is reviewing an annual IT risk assessment Which of the following is the BEST justification for the audits selected?
A.
Underlying business risks
B.
Applications impacted
C.
Likelihood of an IT process failure
D.
Key IT general process controls
Underlying business risks
Page 5 out of 204 Pages |
Previous |