CA(PL) IT Governance Sample Question Answer
CA(PL) IT Governance Sample Question Answer
Explanation: IS audit has evolved in focus, relationship with financial audits, and the
technologies employed.
2. C. Inherent risk
Explanation: Inherent risk is typically high in projects affecting multiple users and
business areas.
Explanation: These are key characteristics of evidence that enable auditors to achieve
their objectives effectively.
Explanation: ISO uses a high-level structure, identical core text, and common terms.
5. D. Audit Objectives
9. D. IT service management
12. D. Technology
Explanation: COBIT stands for Control Objectives for Information and Related
Technology.
13. D. Val IT
14. A. Plan
Explanation: Legal and regulatory compliance is critical for sensitive health data.
17. C. Document the finding and explain the risk of using shared IDs
18. C. Public
Explanation: Laws and regulations affect both audit requirements and systems.
21. B. False
Explanation: Regulation increases the necessity for sampling techniques in auditing,
but it doesn’t hinder it significantly.
23. B. V Model
Explanation: Regression testing is a significant part of the V Model to verify and validate
each development stage.
Explanation: The three main SDLC goals are quality, budget, and time.
25. D. Stress testing completed for the overall system and related interfaces
Explanation: Stress testing focuses on system performance and reliability under high
load.
26. B. RTO
27. A. RPO
Explanation: RPO (Recovery Point Objective) specifies acceptable data loss in disaster
scenarios.
Explanation: For a low RPO, techniques like database shadowing ensure minimal data
loss.
29. D. QA Team
31. B. The ability to continue delivering agreed products and services during disruption
34. B. Risk Assessment, Business Impact Analysis, Strategy & Plan Development, Test
Train & Maintain
36. C. Major
37. A. Understanding and evaluating business continuity strategy and its connection to
business objectives
40. D. Consider all the applications that run only client computers not servers
Explanation: Failure to meet user requirements is the most significant risk during SDLC.
49. B. Authorization
Explanation: A formal charter ensures proper governance and focus for the steering
committee.
57. C. The employee must be allowed to copy any personal files from their computer
Explanation: Job descriptions and change control boards clarify responsibilities and
reduce conflicts.
Explanation: Employee contracts clarify the relationship and protect the organization’s
intellectual property.
65. A. True
Explanation: NIST identifies programming errors, not missing security features, as the
primary source of vulnerabilities.
66. A. Wrong
Explanation: Every device is a potential target for hackers, regardless of its popularity.
68. A. True
Explanation: Lack of top management support can lead to balanced scorecard (BSC)
failures.
72. D. Defines what business we are in for the next three years
Explanation: Strategy defines the long-term direction of a business.
73. A. It forces separation of duties to ensure that at least two people agree with the
decision
74. C. A dashboard
Explanation: This policy governs acceptable behavior and use of IT and information
resources.
79. D. Cyber-ethics
81. C. Consider the overall control structure of the security solution desired by the
management
84. C. Restricted
86. B. Vendor to have certified compliance with recognized security standards, e.g., ISO
27001
Explanation: Ensuring compliance with standards like ISO 27001 minimizes risks in
vendor engagements.
95. C. SLA
Explanation: Service Level Agreements (SLAs) are critical for managing relationships
with outsourced service providers.
96. A. Screening
97. A. Obtain copies of all software contracts to determine the nature of license
agreements
Explanation: Shareware is initially free but requires payment after a trial period for full
functionality.
101. B. Spyware
Explanation: Spyware collects personal data without consent and sends it to third
parties.
102. D. Three users with the ability to capture and verify the messages of other users
and to send their own messages
Explanation: Logical access controls encompass these critical functions for secure
system management.
Explanation: BYOD policies must align with strategy, assess risks, and govern device
usage.
108. A. All users are connected through secure remote secure VPN service, e.g., PPTP
VPN, SSL VPN, etc.
Explanation: Secure VPN services are essential for protecting remote access to
systems.
Explanation: Access control lists specify permissions for using specific system
resources.
Explanation: Backup media require protection from both physical and logical threats.
112. C. All of the above
Explanation: Validating inputs, using stored procedures, and avoiding error messages
with critical information prevent cross-site scripting vulnerabilities.
Explanation: Identifying risks is the first step when Internal Audit meets client
management.
Explanation: Containing incidents and assessing damage is the first phase of incident
response.
116. D. Review the system software controls as relevant and recommend a detailed
system software review
117. A. True
Explanation: Forensic analysis includes examining logical structures and unused file
space to uncover evidence.
118. C. Understanding the business process and environment applicable to the review
Explanation: Understanding the business process ensures the audit aligns with
organizational operations.
122. C. 100%
Explanation: Generalized Audit Software (GAS) enables complete data analysis, not
sampling.
Explanation: Auditors should create alternative procedures when the sample size is too
small.
124. B. Detection
126. A. Nature of the business and the value of the application to the business
Explanation: This method ensures changes documented align with system audit trails.
132. A. SCARF/EAM
Explanation: SCARF (Systems Control Audit Review File) and EAM (Embedded Audit
Module) are essential tools for audit trails.
Explanation: Hardware reviews typically do not cover system software security, which
is a separate domain.
Explanation: Exception reports highlight deviations that may indicate control issues.
138. A. Firewalls
139. B. Default passwords are not changed when installing network devices
141. B. Standard report with configuration values retrieved from the system by the IS
auditor
143. B. Creating test data that covers all possible valid and invalid conditions
146. A. Matching control totals of the imported data to control totals of the original data
Explanation: Removing the malicious code is the first step in addressing the Trojan
horse issue.
Explanation: Control risk is the likelihood that errors won't be detected or corrected by
controls.