CISA Certified Information Systems Auditor – Question2708

A long-term IS employee with a strong technical background and broad managerial experience has applied for a vacant position in the IS audit department. Determining whether to hire this individual for this position should be based on the individual’s experience and:

A.
length of service, since this will help ensure technical competence.
B. age, as training in audit techniques may be impractical.
C. IS knowledge, since this will bring enhanced credibility to the audit function.
D. ability, as an IS auditor, to be independent of existing IS relationships.

Correct Answer: D

Explanation:

Explanation:
Independence should be continually assessed by the auditor and management. This assessment should consider such factors as changes in personal relationships, financial interests, and prior job assignments and responsibilities. The fact that the employee has worked in IS for many years may not in itself ensure credibility. The audit department’s needs should be defined and any candidate should be evaluated against those requirements. The length of service will not ensure technical competency. Evaluating an individual’s qualifications based on the age of the individual is not a good criterion and is illegal in many parts of the world.

CISA Certified Information Systems Auditor – Question2707

A local area network (LAN) administrator normally would be restricted from:

A.
having end-user responsibilities.
B. reporting to the end-user manager
C. having programming responsibilities.
D. being responsible for LAN security administration.

Correct Answer: C

Explanation:

Explanation:
A LAN administrator should not have programming responsibilities but may have end-user responsibilities. The LAN administrator may report to the director of the IPF or, in a decentralized operation, to the end-user manager. In small organizations, the LAN administrator may also be responsible for security administration over the LAN.

CISA Certified Information Systems Auditor – Question2706

Many organizations require an employee to take a mandatory vacation (holiday) of a week or more to:

A.
ensure the employee maintains a good quality of life, which will lead to greater productivity.
B. reduce the opportunity for an employee to commit an improper or illegal act.
C. provide proper cross-training for another employee.
D. eliminate the potential disruption caused when an employee takes vacation one day at a time.

Correct Answer: B

Explanation:

Explanation:
Required vacations/holidays of a week or more in duration in which someone other than the regular employee performs the job function is often mandatory for sensitive positions, as this reduces the opportunity to commit improper or illegal acts. During this time, it may be possible to discover any fraudulent activity that was taking place. Choices A, C and D could all be organizational benefits from a mandatory vacation policy, but they are not the reason why the policy is established.

CISA Certified Information Systems Auditor – Question2705

When an employee is terminated from service, the MOST important action is to:

A.
hand over all of the employee's files to another designated employee.
B. complete a backup of the employee's work.
C. notify other employees of the termination.
D. disable the employee's logical access.

Correct Answer: D

Explanation:

Explanation:
There is a probability that a terminated employee may misuse access rights; therefore, disabling the terminated employee’s logical access is the most important action to take. All the work of the terminated employee needs to be handed over to a designated employee; however, this should be performed after implementing choice D. All the work of the terminated employee needs to be backed up and the employees need to be notified of the termination of the employee, but this should not precede the action in choice D.

CISA Certified Information Systems Auditor – Question2704

Which of the following would BEST provide assurance of the integrity of new staff?

A.
background screening
B. References
C. Bonding
D. Qualifications listed on a resume

Correct Answer: A

Explanation:

Explanation:
A background screening is the primary method for assuring the integrity of a prospective staff member. References are important and would need to be verified, but they are not as reliable as background screening. Bonding is directed at due-diligence compliance, not at integrity, and qualifications listed on a resume may not be accurate.

CISA Certified Information Systems Auditor – Question2703

From a control perspective, the key element in job descriptions is that they:

A.
provide instructions on how to do the job and define authority.
B. are current, documented and readily available to the employee.
C. communicate management's specific job performance expectations.
D. establish responsibility and accountability for the employee's actions.

Correct Answer: D

Explanation:

Explanation:
From a control perspective, a job description should establish responsibility and accountability. This will aid in ensuring that users are given system access in accordance with their defined job responsibilities. The other choices are not directly related to controls.
Providing instructions on how to do the job and defining authority addresses the managerial and procedural aspects of the job. It is important that job descriptions are current, documented and readily available to the employee, but this in itself is not a control.
Communication of management’s specific expectations for job performance outlines the standard of performance and would not necessarily include controls.

CISA Certified Information Systems Auditor – Question2702

An IS auditor identifies that reports on product profitability produced by an organization's finance and marketing departments give different results. Further investigation reveals that the product definition being used by the two departments is different. What should the IS auditor recommend?

A.
User acceptance testing (UAT) occur for all reports before release into production
B. Organizational data governance practices be put in place
C. Standard software tools be used for report development
D. Management sign-off on requirements for new reports

Correct Answer: B

Explanation:

Explanation:
This choice directly addresses the problem. An organization wide approach is needed to achieve effective management of data assets. This includes enforcing standard definitions of data elements, which is part of a data governance initiative. The other choices, while sound development practices, do not address the root cause of the problem described.

CISA Certified Information Systems Auditor – Question2701

Responsibility for the governance of IT should rest with the:

A.
IT strategy committee.
B. chief information officer (CIO).
C. audit committee.
D. board of directors.

Correct Answer: D

Explanation:

Explanation:
Governance is the set of responsibilities and practices exercised by the board and executive management with the goal of providing strategic direction, ensuring that objectives are achieved, ascertaining that risks are managed appropriately and verifying that the enterprise’s resources are used responsibly. The audit committee, the chief information officer (CIO) and the IT strategy committee all play a significant role in the successful implementation of IT governance within an organization, but the ultimate accountability resides with the board of directors.

CISA Certified Information Systems Auditor – Question2700

What is the lowest level of the IT governance maturity model where an IT balanced scorecard exists?

A.
Repeatable but Intuitive
B. Defined
C. Managed and Measurable
D. Optimized

Correct Answer: B

Explanation:

Explanation:
Defined (level 3) is the lowest level at which an IT balanced scorecard is defined.

CISA Certified Information Systems Auditor – Question2699

The ultimate purpose of IT governance is to:

A.
encourage optimal use of IT.
B. reduce IT costs.
C. decentralize IT resources across the organization.
D. centralize control of IT.

Correct Answer: A

Explanation:

Explanation:
IT governance is intended to specify the combination of decision rights and accountability that is best for the enterprise. It is different for every enterprise. Reducing IT costs may not be the best IT governance outcome for an enterprise. Decentralizing IT resources across the organization is not always desired, although it may be desired in a decentralized environment. Centralizing control of IT is not always desired. An example of where it might be desired is an enterprise desiring a single point of customer contact.