Which of the following is the FIRST step performed prior to creating a risk ranking for the annual internal IS audit plan?

CISA Quiz

Quiz
•
English
•
Professional Development
•
Hard
Ganesh Pathuri
Used 1+ times
FREE Resource
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Prioritise the identified risk.
Define the audit universe.
Identify the critical controls.
Determine the testing approach.
2.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Which of the following is the MOST critical step when planning an IS audit?
Review findings from prior audits.
Executive management's approval of the audit plan.
Review IS security policies and procedures.
Perform Risk Assessment
3.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
The PRIMARY advantage of a continuous audit approach is that it:
Does not require an IS auditor to collect evidence on system reliability while processing is taking place
Requires the IS auditor to review and follow up immediately on all information collected
Can improve system security when used in time-sharing environments that process a large number of transactions
Does not depend on the complexity of an organizations computer systems.
4.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
An IS Auditor is performing an audit of a remotely managed server backup. The IS Auditor reviews the log for one day and finds one case where logging on a server has failed with the result that backup restarts can not be confirmed. What should the auditor do?
Issue an Audit finding
Seek an explanation from IS management
Review the classification of data held on the server
Expand the sample of logs reviewed
5.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
During the planning stage of an IS Audit, the PRIMARY goal of an IS Auditor is to:
Address Audit objectives
Collect sufficient evidence
Specify appropriate tests
Minimize audit resources
6.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Overall business risk for particular threat can be expressed as:
A Product of probability and magnitude of impact if threat successfully exploits the vulnerability
The magnitude of impact should a threat source successfully exploit the vulnerability
The likelihood of given threat source exploiting a given vulnerability
The collective judgement of the risk assessment team
7.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
hich of the following is NOT a function of the audit working papers
Show compliance with standards
Show how results were deduced
Show management’s role
Show due care was exercised
Create a free account and access millions of resources
Similar Resources on Quizizz
20 questions
Present perfect active and passive voice

Quiz
•
Professional Development
20 questions
Managing the Internal Audit

Quiz
•
Professional Development
20 questions
Accountant Quiz

Quiz
•
Professional Development
20 questions
application letter

Quiz
•
12th Grade - Professi...
20 questions
English Grammar Quiz

Quiz
•
6th Grade - Professio...
20 questions
The Founder Movie

Quiz
•
12th Grade - Professi...
29 questions
Kế toán

Quiz
•
Professional Development
20 questions
English for Accounting

Quiz
•
University - Professi...
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade