CISA Certified Information Systems Auditor – Question2858

Which of the following is a management technique that enables organizations to develop strategically important systems faster, while reducing development costs and maintaining quality?

A.
Function point analysis
B. Critical path methodology
C. Rapid application development
D. Program evaluation review technique

Correct Answer: C

Explanation:

Explanation:
Rapid application development is a management technique that enables organizations to develop strategically important systems faster, while reducing development costs and maintaining quality. The program evaluation review technique (PERT) and critical path methodology (CPM) are both planning and control techniques, while function point analysis is used for estimating the complexity of developing business applications.

CISA Certified Information Systems Auditor – Question2857

The phases and deliverables of a system development life cycle (SDLC) project should be determined:

A.
during the initial planning stages of the project.
B. after early planning has been completed, but before work has begun.
C. throughout the work stages, based on risks and exposures.
D. only after all risks and exposures have been identified and the IS auditor has recommended appropriate controls.

Correct Answer: A

Explanation:

Explanation:
It is extremely important that the project be planned properly and that the specific phases and deliverables be identified during the early stages of the project.

CISA Certified Information Systems Auditor – Question2856

Which of the following is an object-oriented technology characteristic that permits an enhanced degree of security over data?

A.
inheritance
B. Dynamic warehousing
C. Encapsulation
D. Polymorphism

Correct Answer: C

Explanation:

Explanation:
Encapsulation is a property of objects, and it prevents accessing either properties or methods that have not been previously defined as public. This means that any implementation of the behavior of an object is not accessible. An object defines a communication interface with the exterior and only that which belongs to that interface can be accessed.

CISA Certified Information Systems Auditor – Question2855

Ideally, stress testing should be carried out in a:

A.
test environment using test data.
B. production environment using live workloads.
C. test environment using live workloads.
D. production environment using test data.

Correct Answer: C

Explanation:

Explanation:
Stress testing is carried out to ensure a system can cope with production workloads. A test environment should always be used to avoid damaging the production environment. Hence, testing should never take place in a production environment (choices Band
D), and if only test data is used, there is no certainty that the system was stress tested adequately.

CISA Certified Information Systems Auditor – Question2854

Which of the following is the most important element in the design of a data warehouse?

A.
Quality of the metadata
B. Speed of the transactions
C. Volatility of the data
D. Vulnerability of the system

Correct Answer: A

Explanation:

Explanation:
Quality of the metadata is the most important element in the design of a data warehouse. A data warehouse is a copy of transaction data specifically structured for query and analysis. Metadata aim to provide a table of contents to the information stored in the data warehouse. Companies that have built warehouses believe that metadata are the most important component of the warehouse.

CISA Certified Information Systems Auditor – Question2853

An organization has an integrated development environment (IDE) on which the program libraries reside on the server, but modification/development and testing are done from PC workstations.
Which of the following would be a strength of an IDE?

A.
Controls the proliferation of multiple versions of programs
B. Expands the programming resources and aids available
C. Increases program and processing integrity
D. Prevents valid changes from being overwritten by other changes

Correct Answer: B

Explanation:

Explanation:
A strength of an IDE is that it expands the programming resources and aids available. The other choices are IDE weaknesses.

CISA Certified Information Systems Auditor – Question2852

Failure in which of the following testing stages would have the GREATEST impact on the implementation of new application software?

A.
System testing
B. Acceptance testing
C. Integration testing
D. Unit testing

Correct Answer: B

Explanation:

Explanation:
Acceptance testing is the final stage before the software is installed and is available for use. The greatest impact would occur if the software fails at the acceptance testing level, as this could result in delays and cost overruns. System testing is undertaken by the developer team to determine if the software meets user requirements per specifications. Integration testing examines the units/modules as one integrated system and unit testing examines the individual units or components of the software. System, integration and unit testing are all performed by the developers at various stages of development; the impact of failure is comparatively less for each than failure at the acceptance testing stage.

CISA Certified Information Systems Auditor – Question2851

During the audit of an acquired software package, an IS auditor learned that the software purchase was based on information obtained through the Internet, rather than from responses to a request for proposal (RFP). The IS auditor should FIRST:

A.
test the software for compatibility with existing hardware.
B. perform a gap analysis.
C. review the licensing policy.
D. ensure that the procedure had been approved.

Correct Answer: D

Explanation:

Explanation:
In the case of a deviation from the predefined procedures, an IS auditor should first ensure that the procedure followed for acquiring the software is consistent with the business objectives and has been approved by the appropriate authorities. The other choices are not the first actions an IS auditor should take. They are steps that may or may not be taken after determining that the procedure used to acquire the software had been approved.

CISA Certified Information Systems Auditor – Question2850

An IS auditor is told by IS management that the organization has recently reached the highest level of the software capability maturity model (CMM). The software quality process MOST recently added by the organization is:

A.
continuous improvement.
B. quantitative quality goals.
C. a documented process.
D. a process tailored to specific projects.

Correct Answer: A

Explanation:

Explanation:
An organization would have reached the highest level of the software CMM at level 5, optimizing. Quantitative quality goals can be reached at level 4 and below, a documented process is executed at level 3 and below, and a process tailored to specific projects can be achieved at level 3 or below.

CISA Certified Information Systems Auditor – Question2849

A manufacturing firm wants to automate its invoice payment system. Objectives state that the system should require considerably less time for review and authorization and the system should be capable of identifying errors that require follow up. Which of the following would BEST meet these objectives?

A.
Establishing an inter-networked system of client servers with suppliers for increased efficiencies
B. Outsourcing the function to a firm specializing in automated payments and accounts receivable/invoice processing
C. Establishing an EDI system of electronic business documents and transactions with key suppliers, computer to computer, in a standard format
D. Reengineering the existing processing and redesigning the existing system

Correct Answer: C

Explanation:

Explanation:
EDI is the best answer. Properly implemented (e.g., agreements with trading partner’s transaction standards, controls over network security mechanisms in conjunction with application controls), EDI is best suited to identify and follow up on errors more quickly, given reduced opportunities for review and authorization.