CISA Certified Information Systems Auditor – Question2848

An appropriate control for ensuring the authenticity of orders received in an EDI application is to:

A.
acknowledge receipt of electronic orders with a confirmation message.
B. perform reasonableness checks on quantities ordered before filling orders.
C. verify the identity of senders and determine if orders correspond to contract terms.
D. encrypt electronic orders.

Correct Answer: C

Explanation:

Explanation:
An electronic data interchange (EDI) system is subject not only to the usual risk exposures of computer systems but also to those arising from the potential ineffectiveness of controls on the part of the trading partner and the third-party service provider, making authentication of users and messages a major security concern. Acknowledging the receipt of electronic orders with a confirming message is good practice but will not authenticate orders from customers. Performing reasonableness checks on quantities ordered before placing orders is a control for ensuring the correctness of the company’s orders, not the authenticity of its customers’ orders. Encrypting sensitive messages is an appropriate step but does not apply to messages received.

CISA Certified Information Systems Auditor – Question2847

The MAIN purpose of a transaction audit trail is to:

A.
reduce the use of storage media.
B. determine accountability and responsibility for processed transactions.
C. help an IS auditor trace transactions.
D. provide useful information for capacity planning.

Correct Answer: B

Explanation:

Explanation:
Enabling audit trails aids in establishing the accountability and responsibility for processed transactions by tracing them through the information system. Enabling audit trails increases the use of disk space. A transaction log file would be used to trace transactions, but would not aid in determining accountability and responsibility. The objective of capacity planning is the efficient and effective use of IT resources and requires information such as CPU utilization, bandwidth, number of users, etc.

CISA Certified Information Systems Auditor – Question2846

Which of the following is the GREATEST risk to the effectiveness of application system controls?

A.
Removal of manual processing steps
B. inadequate procedure manuals
C. Collusion between employees
D. Unresolved regulatory compliance issues

Correct Answer: C

Explanation:

Explanation:
Collusion is an active attack that can be sustained and is difficult to identify since even well-thought-out application controls may be circumvented. The other choices do not impact well-designed application controls.

CISA Certified Information Systems Auditor – Question2845

Which of the following will BEST ensure the successful offshore development of business applications?

A.
Stringent contract management practices
B. Detailed and correctly applied specifications
C. Awareness of cultural and political differences
D. Post implementation reviews

Correct Answer: B

Explanation:

Explanation:
When dealing with offshore operations, it is essential that detailed specifications be created. Language differences and a lack of interaction between developers and physically remote end users could create gaps in communication in which assumptions and modifications may not be adequately communicated. Contract management practices, cultural and political differences, and post implementation reviews, although important, are not as pivotal to the success of the project.

CISA Certified Information Systems Auditor – Question2844

Which of the following is the GREATEST risk when implementing a data warehouse?

A.
increased response time on the production systems
B. Access controls that are not adequate to prevent data modification
C. Data duplication
D. Data that is not updated or current

Correct Answer: B

Explanation:

Explanation:
Once the data is in a warehouse, no modifications should be made to it and access controls should be in place to prevent data modification. Increased response time on the production systems is not a risk, because a data warehouse does not impact production data. Based on data replication, data duplication is inherent in a data warehouse. Transformation of data from operational systems to a data warehouse is done at predefined intervals, and as such, data may not be current.

CISA Certified Information Systems Auditor – Question2843

What control detects transmission errors by appending calculated bits onto the end of each segment of data?

A.
Reasonableness check
B. Parity check
C. Redundancy check
D. Check digits

Correct Answer: C

Explanation:

Explanation:
A redundancy check detects transmission errors by appending calculated bits onto the end of each segment of data. A reasonableness check compares data to predefined reasonability limits or occurrence rates established for the data. A parity check is a hardware control that detects data errors when data are read from one computer to another, from memory or during transmission.
Check digits detect transposition and transcription errors.

CISA Certified Information Systems Auditor – Question2842

What process uses test data as part of a comprehensive test of program controls in a continuous online manner?

A.
Test data/deck
B. Base-case system evaluation
C. Integrated test facility (ITF)
D. Parallel simulation

Correct Answer: B

Explanation:

Explanation:
A base-case system evaluation uses test data sets developed as part of comprehensive testing programs, it is used to verify correct systems operations before acceptance, as well as periodic validation. Test data/deck simulates transactions through real programs. An ITF creates fictitious files in the database with test transactions processed simultaneously with live input. Parallel simulation is the production of data processed using computer programs that simulate application program logic.

CISA Certified Information Systems Auditor – Question2841

A proposed transaction processing application will have many data capture sources and outputs in paper and electronic form. To ensure that transactions are not lost during processing, an IS auditor should recommend the inclusion of:

A.
validation controls.
B. internal credibility checks.
C. clerical control procedures.
D. automated systems balancing.

Correct Answer: D

Explanation:

Explanation:
Automated systems balancing would be the best way to ensure that no transactions are lost as any imbalance between total inputs and total outputs would be reported for investigation and correction. Validation controls and internal credibility checks are certainly valid controls, but will not detect and report lost transactions. In addition, although a clerical procedure could be used to summarize and compare inputs and outputs, an automated process is less susceptible to error.

CISA Certified Information Systems Auditor – Question2840

Functional acknowledgements are used:

A.
as an audit trail for EDI transactions.
B. to functionally describe the IS department.
C. to document user roles and responsibilities.
D. as a functional description of application software.

Correct Answer: A

Explanation:

Explanation:
Functional acknowledgements are standard EDI transactions that tell trading partners that their electronic documents were received. Different types of functional acknowledgments provide various levels of detail and, therefore, can act as an audit trail for EDI transactions. The other choices are not relevant to the description of functional acknowledgements.

CISA Certified Information Systems Auditor – Question2839

To reduce the possibility of losing data during processing, the FIRST point at which control totals should be implemented is:

A.
during data preparation.
B. in transit to the computer.
C. between related computer runs.
D. during the return of the data to the user department.

Correct Answer: A

Explanation:

Explanation:
During data preparation is the best answer, because it establishes control at the earliest point.