Inspirational journeys

Follow the stories of academics and their research expeditions

CISA—Certified Information Systems Auditor - Part 207

Mary Smith

Thu, 16 Apr 2026

CISA—Certified Information Systems Auditor - Part 207

1. An example of a direct benefit to be derived from a proposed IT-related business investment is:

A) enhanced reputation.
B) enhanced staff morale.
C) the use of new technology.
D) increased market penetration.



2. To assist an organization in planning for IT investments, an IS auditor should recommend the use of:

A) project management tools.
B) an object-oriented architecture.
C) tactical planning.
D) enterprise architecture (EA).



3. A benefit of open system architecture is that it:

A) facilitates interoperability.
B) facilitates the integration of proprietary components.
C) will be a basis for volume discounts from equipment vendors.
D) allows for the achievement of more economies of scale for equipment.



4. In the context of effective information security governance, the primary objective of value delivery is to:

A) optimize security investments in support of business objectives.
B) implement a standard set of security practices.
C) institute a standards-based solution.
D) implement a continuous improvement culture.



5. Which of the following BEST supports the prioritization of new IT projects?

A) Internal control self-assessment (CSA)
B) Information systems audit
C) Investment portfolio analysis
D) Business risk assessment



1. Right Answer: D
Explanation: A comprehensive business case for any proposed IT-related business investment should have clearly defined business benefits to enable the expected return to be calculated. These benefits usually fall into two categories: direct and indirect, or soft. Direct benefits usually comprise the quantifiable financial benefits that the new system is expected to generate. The potential benefits of enhanced reputation and enhanced staff morale are difficult to quantify, but should be quantified to the extent possible. IT investments should not be made just for the sake of new technology but should be based on a quantifiable business need.

2. Right Answer: D
Explanation: Enterprise architecture (EA) involves documenting the organization's IT assets and processes in a structured manner to facilitate understanding, management and planning for IT investments. It involves both a current state and a representation of an optimized future state. In attempting to complete an EA, organizations can address the problem either from a technology perspective or a business process perspective. Project management does not consider IT investment aspects; it is a tool to aid in delivering projects. Object-oriented architecture is a software development methodology and does not assist in planning for IT investment, while tactical planning is relevant only after high-level IT investment decisions have been made.

3. Right Answer: A
Explanation: Open systems are those for which suppliers provide components whose interfaces are defined by public standards, thus facilitating interoperability between systems made by different vendors. In contrast, closed system components are built to proprietary standards so that other suppliers' systems cannot or will not interface with existing systems.

4. Right Answer: A
Explanation: In the context of effective information security governance, value delivery is implemented to ensure optimization of security investments in support of business objectives. The tools and techniques for implementing value delivery include implementation of a standard set of security practices, institutionalization and commoditization of standards-based solutions, and implementation of a continuous improvement culture considering security as a process, not an event.

5. Right Answer: C
Explanation: It is most desirable to conduct an investment portfolio analysis, which will present not only a clear focus on investment strategy, but will provide the rationale for terminating nonperforming IT projects. Internal control self-assessment (CSA) may highlight noncompliance to the current policy, but may not necessarily be the best source for driving the prioritization of IT projects. Like internal CSA, IS audits may provide only part of the picture for the prioritization of IT projects.Business risk analysis is part of the investment portfolio analysis but, by itself, is not the best method for prioritizing new IT projects.

0 Comments

Leave a comment