100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

Hemang Doshi CISA Study Guide Key Aspects Questions & Answers 100% Correct!!

Puntuación
-
Vendido
-
Páginas
20
Grado
A+
Subido en
19-11-2024
Escrito en
2024/2025

Who should approve the audit charter of an organization? - ANSWERSenior Management What should the content of an audit charter be? - ANSWERThe scope, authority, and responsibilities of the audit function What is the prime reason for review of an organization chart? - ANSWERTo understand the authority and responsibility of individuals The actions of an IS auditor are primiarily influenced by - ANSWERAudit Charter Which document provides the overall authority for an auditor to perform an audit? - ANSWERAudit charter What is the objective of encryption? - ANSWERTo ensure the integrity and confidentiality of transactions. How are inbound transactions controlled in an EDI environment? - ANSWERInbound transactions are controlled via logs of the receipt of inbound transactions, the use of segment count totals, and the use of check digits to detect transposition and transcription errors. What is the objective of key verification control? - ANSWERKey verification is a method where data is entered a second time and compared with the initial data entry to ensure that the data entered is correct. This is generally used in EFT transactions, where another employee re-enters the same data to perform this check before any money is transferred. What is the primary reason for the audit function directly reporting to the audit committee? - ANSWERThe audit function must be independent of the business function and should have direct access to the audit committee of the board What is the major risk of EDI transactions? - ANSWERThe absence of agreement (in the absence of a trading partner agreement, there could be uncertainty related to specific legal liability) What is the objective of non-repudiation? - ANSWERNon-repudiation ensures that a transaction is enforceable and that the claimed sender cannot later deny generating and sending the message. What is the most important component of the artificial intelligence/expert system area? - ANSWERKnowledge base (The knowledge base contains specific information or fact patterns associated with a particular subject matter and the rules for interpreting these facts; therefore, strict access control should be implemented and monitored to ensure the integrity of the de

Mostrar más Leer menos
Institución
Hemang Doshi CISA S
Grado
Hemang Doshi CISA S










Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
Hemang Doshi CISA S
Grado
Hemang Doshi CISA S

Información del documento

Subido en
19 de noviembre de 2024
Número de páginas
20
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

Hemang Doshi CISA Study Guide Key
Aspects Questions & Answers 100%
Correct!!
Who should approve the audit charter of an organization? - ANSWERSenior
Management

What should the content of an audit charter be? - ANSWERThe scope, authority,
and responsibilities of the audit function

What is the prime reason for review of an organization chart? - ANSWERTo
understand the authority and responsibility of individuals

The actions of an IS auditor are primiarily influenced by - ANSWERAudit Charter

Which document provides the overall authority for an auditor to perform an audit? -
ANSWERAudit charter
What is the objective of encryption? - ANSWERTo ensure the integrity and
confidentiality of transactions.

How are inbound transactions controlled in an EDI environment? - ANSWERInbound
transactions are controlled via logs of the receipt of inbound transactions, the use of
segment count totals, and the use of check digits to detect transposition and
transcription errors.

What is the objective of key verification control? - ANSWERKey verification is a
method where data is entered a second time and compared with the initial data entry
to ensure that the data entered is correct. This is generally used in EFT transactions,
where another employee re-enters the same data to perform this check before any
money is transferred.

What is the primary reason for the audit function directly reporting to the audit
committee? - ANSWERThe audit function must be independent of the business
function and should have direct access to the audit committee of the board

What is the major risk of EDI transactions? - ANSWERThe absence of agreement (in
the absence of a trading partner agreement, there could be uncertainty related to
specific legal liability)


What is the objective of non-repudiation? - ANSWERNon-repudiation ensures that a
transaction is enforceable and that the claimed sender cannot later deny generating
and sending the message.

What is the most important component of the artificial intelligence/expert system
area? - ANSWERKnowledge base (The knowledge base contains specific

,information or fact patterns associated with a particular subject matter and the rules
for interpreting these facts; therefore, strict access control should be implemented
and monitored to ensure the integrity of the decision rules)

Segregation of duties is an example of which type of control? - ANSWERPreventive
control

Controls that enable a risk or deficiency to be corrected before a loss occurs are
known as what? - ANSWERCorrective control

Controls that directly mitigate a risk or lack of controls directly acting upon a risk are
know as what? - ANSWERCompensating control

The most important step in a risk assessment is to identify - ANSWERThreats and
vulnerabilities

In risk-based audit planning, an IS auditor's first step is to identify what? -
ANSWERHigh risk areas

Once threats and vulnerabilities are identified, what should be the next step? -
ANSWERIdentify and evaluate existing controls

What is the advantage of risk based audit planning? - ANSWERResources can be
utilized for high risk areas

What does the level of protection of information assets depend on? -
ANSWERCriticality of assets

What is risk that is influenced by the actions of an auditor known as? -
ANSWERDetection risk

What is audit risk? - ANSWERAudit risk is the sum total of inherent risk, control risk,
and detection risk

What is risk the product of? - ANSWERProbability and impact

What are the results of risk management processes used for? - ANSWERDesigning
the control

Whose responsibility is the management of risk to an acceptable level? -
ANSWERSenior management

What is the absence of proper security measures known as? - ANSWERVulnerability

What is the advantage of the bottom-up approach for the development of
organizational policies? - ANSWERIt ensures consistency across the organization.

What is risk before controls are applied known as? - ANSWERInherent risk/gross
risk (after the implementation of controls, it is known as residual risk/net risk).

, What does the information systems audit provide? - ANSWERReasonable
assurance about coverage of material items.

What is the first step of an audit project? - ANSWERTo develop an audit plan.

What is the primary reason for a functional walkthrough? - ANSWERTo understand
the business process.

What is the major concern in the absence of established audit objectives? -
ANSWERNot able to determine key business risks.

What is the primary objective for performing risk assessment prior to the audit? -
ANSWERAllocate audit resources to areas of high risks.

What is the step of the audit planning phase? - ANSWERConducting risk
assessments to determine the area of high risk.

Which sampling technique should be used when the probability of error must be
objectively quantified? - ANSWERStatistical sampling.

How can sampling risk be mitigated? - ANSWERStatistical sampling.

Which sampling method is most useful when testing for compliance? -
ANSWERAttribute sampling.

In the case of a strong internal control, could the confidence coefficient/sample size
be increased or lowered? - ANSWERThe confidence coefficient/sampling size may
be lowered.

Which sampling method would best assist auditors when there is concerns of fraud?
- ANSWERDiscovery sampling.

How can you differentiate between compliance testing and substantive testing? -
ANSWERThe objective of compliance testing is to test the presence of controls,
whereas the objective of substantive testing is to test individual transactions. Let's
take the example of asset inventory:

To verify whether control exists for inward/outward of the assets is compliance
testing

To verify the count of physical assets and comparing it with records is substantive
testing

Give an example of compliance testing. - ANSWERTo verify the configuration of a
router for controls
.
To verify the change management process to ensure controls are effective.

Review of system access rights.
$13.49
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada


Documento también disponible en un lote

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
papersbyjol West Virginia
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
422
Miembro desde
3 año
Número de seguidores
253
Documentos
14048
Última venta
1 día hace

3.8

72 reseñas

5
27
4
18
3
17
2
2
1
8

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes