Preliminary Test
Preliminary Test
1. Which of these choices is the best answer regarding who is primarily responsible for
providing internal controls to detect, correct, and prevent irregularities or illegal acts?
a. Board of directors
b. Information technology
c. Legal, aka general council
d. Human resources
5. An IS auditor needs to perform an audit of a financial system and needs to trace individual
transactions through the system. What type of testing should the auditor perform?
a. Discovery testing
b. Statistical testing
c. Compliance testing
d. Substantive testing
8. Which of the following functions should be separated from the others if segregation of duties
cannot be achieved in an automated system?
a. Origination
b. Authorization
c. Reprocessing
d. Transaction logging
9. An organization currently stores its backup media in a cabinet next to the computers being
backed up. IS Auditor told the organization to store backup media at an off-site storage
facility. What risk did the auditor most likely have in mind when he made this
recommendation?
a. A disaster that damages computer systems can also damage backup media.
b. Backup media rotation may result in loss of data backed up several weeks in the past.
c. Corruption of online data will require rapid data recovery from off-site storage.
d. Physical controls at the data processing site are insufficient.
10. An auditor has discovered several errors in user account management: many terminated
employees’ computer accounts are still active. What is the best course of action?
a. Improve the employee termination process.
b. Shift responsibility for employee terminations to another group.
c. Audit the process more frequently.
d. Improve the employee termination process and audit the process more frequently.
12. When planning an IS audit, which of the following factors is least likely to be relevant to the
scope of the engagement?
a. The concerns of management for ensuring that controls are sufficient and working
properly
b. The amount of controls currently in place
c. The type of business, management, culture, and risk tolerance
d. The complexity of the technology used by the business in performing the business
functions
13. As a part of an audit of a business process, the auditor has had a discussion with the control
owner, as well as the control operators, and has collected procedure documents and
records. The auditor is asking internal customers of the business process to describe in their
own words how the business process is operated. What kind of evidence collection are
these discussions with internal customers?
a. Reconciliation
b. Reperformance
c. Walkthrough
d. Corroborative inquiry
14. A mail order organization wants to develop procedures to be followed in the event that the
main office building cannot be occupied, so that customer orders can still be fulfilled. What
kind of a plan does the organization need to develop?
a. Business impact analysis
b. Business continuity plan
c. Disaster recovery plan
d. Emergency evacuation plan
15. An organization is starting its first-ever effort to develop a business continuity and disaster
recovery plan. What is the best first step to perform in this effort?
a. Criticality analysis
b. Business impact analysis (BIA)
c. Setting recovery targets
d. Selecting a Disaster Recovery (DR) site
17. In an online banking application, which of the following would BEST protect against identity
theft?
a. Encryption of personal password
b. Restricting the user to a specific terminal
c. Two-factor authentication
d. Periodic review of access logs
18. Audit evidence can take many forms. When determining the types required for an audit, the
auditor must consider
a. CAATs, flowcharts, and narratives
b. Interviews, observations, and reperformance testing
c. The best evidence available that is consistent with the importance of the audit objectives
d. Inspection, confirmation, and substantive testing
19. What type of risk results when an IS auditor uses an inadequate test procedure and
concludes that material errors do not exist when errors actually exist?
a. Business risk
b. Detection risk
c. Residual risk
d. Inherent risk
21. When reviewing a systems development project, what would the most important objective be
for an IS auditor?
a. Ensuring that the data security controls are adequate to protect the data.
b. Ensuring that the standards and regulatory commitments are met.
c. Ensuring that the business requirements are satisfied by the project.
d. Ensuring that the quality controls and development methodologies are adhered to.
22. IT control objectives are useful to IS auditors, as they provide the basis for understanding
the:
a. desired result or purpose of implementing specific control procedures.
b. best IT security control practices relevant to a specific entity.
c. techniques for securing information.
d. security policy.
23. When an employee is terminated from service, the MOST important action is to:
a. hand over all of the employee's files to another designated employee.
b. complete a backup of the employee's work.
c. notify other employees of the termination.
d. disable the employee's logical access
27. Which audit technique provides the BEST evidence of the segregation of duties in an IS
department?
a. Discussion with management
b. Review of the organization chart
c. Observation and interviews
d. Testing of user access rights
28. How does the process of systems auditing benefit from using a risk based approach to audit
planning?
a. Controls testing starts earlier
b. Auditing resources are allocated to the areas of highest concern
c. Auditing risk is reduced
d. Controls testing is more thorough
29. Which kind of testing ensures that data is being formatted properly and inserted into the new
application from the old application?
a. Unit testing
b. Migration testing
c. Regression testing
d. Functional testing
30. Which of the following is the MOST important criterion when selecting a location for an
offsite storage facility for IS backup files? The offsite facility must be:
a. physically separated from the data center and not subject to the same risks.
b. given the same level of protection as that of the computer data center.
c. outsourced to a reliable third party.
d. equipped with surveillance capabilities