1. An IS auditor conducting audit follow-up activities learns that some previously agreed-upon corrective actions have not been taken and that the associated risk has been accepted by senior management. If the auditor disagrees with management's decision, what is the BEST way to address the situation?
A) Repeat the audit with audit scope only covering areas with accepted risks B) Report the issue to the chief audit executive for resolution C) Recommend new corrective actions to mitigate the accepted risk D) Take no action since management's decision has been made
2. During a security audit, an IS auditor is tasked with reviewing log entries obtained from an enterprise intrusion prevention system (IPS). Which type of risk would be associated with the potential for the auditor to miss a sequence of logged events that could indicate an error in the IPS configuration?
A) Inherent risk B) Sampling risk C) Control risk D) Detection risk
3. An organization is concerned about duplicate vendor payments on a complex system with a high volume of transactions. Which of the following would be MOST helpful to an IS auditor to determine whether duplicate vendor payments exist?
A) Computer-assisted technique B) Stop-and-go testing C) Statistical sampling D) Judgmental sampling
4. The MAIN benefit of using an integrated test facility (ITF) as an online auditing technique is that it enables:
A) a cost-effective approach to application controls audit B) auditors to investigate fraudulent transactions C) auditors to test without impacting production data D) the integration of financial and audit tests
5. When evaluating the ability of a disaster recovery plan to enable the recovery of IT processing capabilities, it is MOST important for the IS auditor to verify the plan is:
A) stored at an offsite location B) communicated to department heads C) regularly reviewed D) periodically tested
Leave a comment