CISA Certified Information Systems Auditor – Question2598

Following a recent internal data breach, an IS auditor was asked to evaluate information security practices within the organization. Which of the following findings would be MOST important to report to senior management?

A.
Employees are not required to sign a non-compete agreement.
B. Security education and awareness workshops have not been completed.
C. Users lack technical knowledge related to security and data protection.
D. Desktop passwords do not require special characters.

Correct Answer: C

CISA Certified Information Systems Auditor – Question2596

An organization has software that is not compliant with data protection requirements. To help ensure that appropriate and relevant data protection controls are implemented in the future, the auditor’s BEST course of action would be to:

A.
conduct a privacy impact assessment to identity gaps in the organization’s privacy.
B. recommend that privacy checks are included within the solution development life cycle.
C. recommend an executive be appointed to oversee privacy program improvements.
D. map the organization’s business processes to identify personally identifiable information (PII).

Correct Answer: A

CISA Certified Information Systems Auditor – Question2594

Which of the following IT governance best practices improves strategic alignment?

A.
Supplier and partner risks are managed.
B. A knowledge base on customers, products, markets and processes is in place.
C. A structure is provided that facilitates the creation and sharing of business information.
D. Top management mediate between the imperatives of business and technology.

Correct Answer: D

Explanation:

Explanation:
Top management mediating between the imperatives of business and technology is an IT strategic alignment best practice. Supplier and partner risks being managed is a risk management best practice. A knowledge base on customers, products, markets and processes being in place is an IT value delivery best practice. An infrastructure being provided to facilitate the creation and sharing of business information is an IT value delivery and risk management.

CISA Certified Information Systems Auditor – Question2593

As an outcome of information security governance, strategic alignment provides:

A.
security requirements driven by enterprise requirements.
B. baseline security following best practices.
C. institutionalized and commoditized solutions.
D. an understanding of risk exposure.

Correct Answer: A

Explanation:

Explanation:
Information security governance, when properly implemented, should provide four basic outcomes: strategic alignment, value delivery, risk management and performance measurement. Strategic alignment provides input for security requirements driven by enterprise requirements. Value delivery provides a standard set of security practices, i.e., baseline security following best practices or institutionalized and commoditized solutions. Risk management provides an understanding of risk exposure.

CISA Certified Information Systems Auditor – Question2592

IT governance is PRIMARILY the responsibility of the:

A.
chief executive officer.
B. board of directors.
C. IT steering committee.
D. audit committee.

Correct Answer: B

Explanation:

Explanation:
IT governance is primarily the responsibility of the executives and shareholders {as represented by the board of directors). The chief executive officer is instrumental in implementing IT governance per the directions of the board of directors. The IT steering committee monitors and facilitates deployment of IT resources for specific projects in support of business plans. The audit committee reports to the board of directors and should monitor the implementation of audit recommendations.

CISA Certified Information Systems Auditor – Question2591

Establishing the level of acceptable risk is the responsibility of:

A.
quality assurance management.
B. senior business management.
C. the chief information officer.
D. the chief security officer.

Correct Answer: B

Explanation:

Explanation:
Senior management should establish the acceptable risk level, since they have the ultimate or final responsibility for the effective and efficient operation of the organization. Choices A, C and D should act as advisors to senior management in determining an acceptable risk level.

CISA Certified Information Systems Auditor – Question2590

Effective IT governance will ensure that the IT plan is consistent with the organization's:

A.
business plan.
B. audit plan.
C. security plan.
D. investment plan.

Correct Answer: A

Explanation:

Explanation:
To govern IT effectively, IT and business should be moving in the same direction, requiring that the IT plans are aligned with an organization’s business plans. The audit and investment plans are not part of the IT plan, while the security plan should be at a corporate level.

CISA Certified Information Systems Auditor – Question2589

Involvement of senior management is MOST important in the development of:

A.
strategic plans.
B. IS policies.
C. IS procedures.
D. standards and guidelines.

Correct Answer: A

Explanation:

Explanation:
Strategic plans provide the basis for ensuring that the enterprise meets its goals and objectives. Involvement of senior management is critical to ensuring that the plan adequately addresses the established goals and objectives. IS policies, procedures, standards and guidelines are all structured to support the overall strategic plan.