CISA Certified Information Systems Auditor – Question2868

The use of object-oriented design and development techniques would MOST likely:

A.
facilitate the ability to reuse modules.
B. improve system performance.
C. enhance control effectiveness.
D. speed up the system development life cycle.

Correct Answer: A

Explanation:

Explanation:
One of the major benefits of object-oriented design and development is the ability to reuse modules. The other options do not normally benefit from the object-oriented technique.

CISA Certified Information Systems Auditor – Question2867

During which of the following phases in system development would user acceptance test plans normally be prepared?

A.
Feasibility study
B. Requirements definition
C. implementation planning
D. Postimplementation review

Correct Answer: B

Explanation:

Explanation:
During requirements definition, the project team will be working with the users to define their precise objectives and functional needs. At this time, the users should be working with the team to consider and document hot the system functionality can be tested ensure it meets their stated needs. The feasibility study is too early for such detailed user involvement, and the implementation planning and postimplementation review phases are too late. An IS auditor should know at what point user testing should be planned to ensure it is most effective and efficient.

CISA Certified Information Systems Auditor – Question2866

An advantage in using a bottom-up vs. a top-down approach to software testing is that:

A.
interface errors are detected earlier.
B. confidence in the system is achieved earlier.
C. errors in critical modules are detected earlier.
D. major functions and processing are tested earlier.

Correct Answer: C

Explanation:

Explanation:
The bottom-up approach to software testing begins with the testing of atomic units, such as programs and modules, and works upward until a complete system testing has taken place. The advantages of using a bottom-up approach to software testing are the fact that there is no need for stubs or drivers and errors in critical modules are found earlier. The other choices in this question all refer to advantages of a top-down approach, which follows the opposite path, either in depth-first or breadth-first search order.

CISA Certified Information Systems Auditor – Question2865

The knowledge base of an expert system that uses questionnaires to lead the user through a series of choices before a conclusion is reached is known as:

A.
rules.
B. decision trees.
C. semantic nets.
D. dataflow diagrams.

Correct Answer: B

Explanation:

Explanation:
Decision trees use questionnaires to lead a user through a series of choices until a conclusion is reached. Rules refer to the expression of declarative knowledge through the use of if-then relationships. Semantic nets consist of a graph in which nodes represent physical or conceptual objects and the arcs describe the relationship between the nodes. Semantic nets resemble a dataflow diagram and make use of an inheritance mechanism to prevent duplication of data.

CISA Certified Information Systems Auditor – Question2864

Which of the following is the PRIMARY purpose for conducting parallel testing?

A.
To determine if the system is cost-effective
B. To enable comprehensive unit and system testing
C. To highlight errors in the program interfaces with files
D. To ensure the new system meets user requirements

Correct Answer: D

Explanation:

Explanation:
The purpose of parallel testing is to ensure that the implementation of a new system will meet user requirements. Parallel testing may show that the old system is, in fact, better than the new system, but this is not the primary reason. Unit and system are completed before parallel testing. Program interfaces with files are tested for errors during system testing.

CISA Certified Information Systems Auditor – Question2863

An IS auditor's PRIMARY concern when application developers wish to use a copy of yesterday's production transaction file for volume tests is that:

A.
users may prefer to use contrived data for testing.
B. unauthorized access to sensitive data may result.
C. error handling and credibility checks may not be fully proven.
D. the full functionality of the new process may not necessarily be tested.

Correct Answer: B

Explanation:

Explanation:
Unless the data are sanitized, there is a risk of disclosing sensitive data.

CISA Certified Information Systems Auditor – Question2862

An advantage of using sanitized live transactions in test data is that:

A.
all transaction types will be included.
B. every error condition is likely to be tested.
C. no special routines are required to assess the results.
D. test transactions are representative of live processing.

Correct Answer: D

Explanation:

Explanation:
Test data will be representative of live processing; however, it is unlikely that all transaction types or error conditions will be tested in this way.

CISA Certified Information Systems Auditor – Question2861

A decision support system (DSS):

A.
is aimed at solving highly structured problems.
B. combines the use of models with nontraditional data access and retrieval functions.
C. emphasizes flexibility in the decision making approach of users.
D. supports only structured decision making tasks.

Correct Answer: C

Explanation:

Explanation:
DSS emphasizes flexibility in the decision making approach of users. It is aimed at solving less structured problems, combines the use of models and analytic techniques with traditional data access and retrieval functions, and supports semi structured decision making tasks.

CISA Certified Information Systems Auditor – Question2860

Which of the following is an advantage of prototyping?

A.
The finished system normally has strong internal controls.
B. Prototype systems can provide significant time and cost savings.
C. Change control is often less complicated with prototype systems.
D. it ensures that functions or extras are not added to the intended system.

Correct Answer: B

CISA Certified Information Systems Auditor – Question2859

When implementing an application software package, which of the following presents the GREATEST risk?

A.
Uncontrolled multiple software versions
B. Source programs that are not synchronized with object code
C. incorrectly set parameters
D. Programming errors.

Correct Answer: C

Explanation:

Explanation:
Parameters that are not set correctly would be the greatest concern when implementing an application software package. The other choices, though important, are a concern of the provider, not the organization that is implementing the software itself.