Inspirational journeys

Follow the stories of academics and their research expeditions

CISA—Certified Information Systems Auditor - Part 169

Mary Smith

Thu, 16 Apr 2026

CISA—Certified Information Systems Auditor - Part 169

1. Rather than simply reviewing the adequacy of access control, appropriateness of access policies, and effectiveness of safeguards and procedures, the IS auditor is more concerned with effectiveness and utilization of assets. True or false?

A) True
B) False
C)
D)



2. If a programmer has update access to a live system, IS auditors are more concerned with the programmer's ability to initiate or modify transactions and the ability to access production than with the programmer's ability to authorize transactions. True or false?

A) True
B) False
C)
D)



3. Organizations should use off-site storage facilities to maintain ______________ (fill in the blank) of current and critical information within backup files.

A) Confidentiality
B) Integrity
C) Redundancy
D) Concurrency



4. The purpose of business continuity planning and disaster-recovery planning is to:

A) Transfer the risk and impact of a business interruption or disaster
B) Mitigate, or reduce, the risk and impact of a business interruption or disaster
C) Accept the risk and impact of a business
D) Eliminate the risk and impact of a business interruption or disaster



5. If a database is restored from information backed up before the last system image, which of the following is recommended?

A) The system should be restarted after the last transaction.
B) The system should be restarted before the last transaction.
C) The system should be restarted at the first transaction.
D) The system should be restarted on the last transaction.



1. Right Answer: B
Explanation: Instead of simply reviewing the effectiveness and utilization of assets, an IS auditor is more concerned with adequate access control, appropriate access policies, and effectiveness of safeguards and procedures.

2. Right Answer: A
Explanation: If a programmer has update access to a live system, IS auditors are more concerned with the programmer's ability to initiate or modify transactions and the ability to access production than with the programmer's ability to authorize transactions.

3. Right Answer: C
Explanation: Redundancy is the best answer because it provides both integrity and availability. Organizations should use off-site storage facilities to maintain redundancy of current and critical information within backup files.

4. Right Answer: B
Explanation: The primary purpose of business continuity planning and disaster-recovery planning is to mitigate, or reduce, the risk and impact of a business interruption or disaster.Total elimination of risk is impossible.

5. Right Answer: B
Explanation: If a database is restored from information backed up before the last system image, the system should be restarted before the last transaction because the final transaction must be reprocessed.

0 Comments

Leave a comment