IS项目管理与审计模拟题
上传者:梅丽|上传时间:2015-04-26|密次下载
IS项目管理与审计模拟题
信息系统审计考题
A卷答案
内容需要下载文档才能查看
信息系统审计考题
同济大学经济与管理学院试卷 (B卷) 2010 -2011 学年第1 学期
课号: 课程名:信息系统审计 考试形式:开卷( )闭卷(√)
此卷选为:期中考试( )、期终考试( )、补考(√ )试卷
专业和年级 学号 姓名
答案请填写于下表
内容需要下载文档才能查看 内容需要下载文档才能查看A. be dynamic and change often to coincide with the changing nature of technology and the audit profession.
B. clearly state audit objectives for, and the delegation of, authority to the maintenance and review of internal controls.
C. document the audit procedures designed to achieve the planned audit objectives.
D. outline the overall authority, scope and responsibilities of the audit function.
2. The IT balanced scorecard (BSC) is a business governance tool intended to monitor IT performance evaluation indicators other than: A. financial results.
B. customer satisfaction.
信息系统审计考题
C. internal process efficiency. D. innovation capacity.
3. The reason for establishing a stop or freezing point on the design of a new system is to:
A. prevent further changes to a project in process.
B. indicate the point at which the design is to be completed.
C. require that changes after that point be evaluated for cost-effectiveness. D. provide the project management team with more control over the project design.
4. An IS auditor evaluating the resilience of a high-availability network should be MOST concerned if:
A. the setup is geographically dispersed.
B. the network servers are clustered in a site. C. a hot site is ready for activation.
D. diverse routing is implemented for the network.
5. Which of the following is the PRIMARY safeguard for securing software and data within an information processing facility? A. Security awareness
B. Reading the security policy C. Security committee D. Logical access controls
6. Which of the following is the MOST important criterion when selecting a location for an offsite storage facility for IS backup files? The offsite facility must be: A. physically separated from the data center and not subject to the same risks.
B. given the same level of protection as that of the computer data center. C. outsourced to a reliable third party. D. equipped with surveillance capabilities.
7. Which of the following sampling methods is MOST useful when testing for compliance?
A. Attribute sampling B. Variable sampling
C. Stratified mean per unit D. Difference estimation
8. Which of the following is the MOST important function to be performed by IS management when a service has been outsourced? A. Ensuring that invoices are paid to the provider B. Participating in systems design with the provider C. Renegotiating the provider’s fees
D. Monitoring the outsourcing provider’s performance
9. Which of the following system and data conversion strategies provides the GREATEST redundancy? A. Direct cutover B. Pilot study
C. Phased approach D. Parallel run
10.An IS auditor reviewing database controls discovered that changes to the
信息系统审计考题
database during normal working hours were handled through a standard set of procedures. However, changes made after normal hours required only an abbreviated number of steps. In this situation, which of the following would be considered an adequate set of compensating controls?
A. Allow changes to be made only with the DBA user account
B. Make changes to the database after granting access to a normal user account
C. Use the DBA user account to make changes, log the changes and review the change log the following day
D. Use the normal user account to make changes, log the changes and review the change log the following day
11.Which of the following is a feature of an intrusion detection system (IDS)? A. Gathering evidence on attack attempts
B. Identifying weaknesses in the policy definition C. Blocking access to particular sites on the Internet
D. Preventing certain users from accessing specific servers
12.During a business continuity audit, an IS auditor found that the business continuity plan covered only critical processes. The IS auditor should: A. recommend that the business continuity plan cover all business processes.
B. assess the impact of the processes not covered. C. report the findings to the IT manager. D. redefine critical processes.
13.While planning an audit, an assessment of risk should be made to provide: A. reasonable assurance that the audit will cover material items.
B. definite assurance that material items will be covered during the audit work.
C. reasonable assurance that all items will be covered by the audit.
D. sufficient assurance that all items will be covered during the audit work. 14.The management of an organization has decided to establish a security awareness program. Which of the following would MOST likely be a part of the program?
A. Utilization of an intrusion detection system to report incidents B. Mandating the use of passwords to access all software
C. Installing an efficient user log system to track the actions of each user D. Training provided on a regular basis to all current and new employees
15.An IS auditor finds that a system under development has 12 linked modules and each item of data can carry up to 10 definable attribute fields. The system
handles several million transactions a year. Which of these techniques could an IS auditor use to estimate the size of the development effort? A. Program evaluation review technique (PERT) B. Counting source lines of code (SLOC) C. Function point analysis D. White box testing
16.An organization has recently installed a security patch, which crashed the production server. To minimize the probability of this occurring again, an IS auditor should:
信息系统审计考题
A. apply the patch according to the patch’s release notes.
B. ensure that a good change management process is in place. C. thoroughly test the patch before sending it to production. D. approve the patch after doing a risk assessment.
17.Which of the following is the BEST way to handle obsolete magnetic tapes before disposing of them?
A. Overwriting the tapes B. Initializing the tape labels C. Degaussing the tapes D. Erasing the tapes
18.Which of the following findings should an IS auditor be MOST concerned about when performing an audit of backup and recovery and the offsite storage vault? A. There are three individuals with a key to enter the area B. Paper documents are also stored in the offsite vault C. Data files that are stored in the vault are synchronized D. The offsite vault is located in a separate facility
19.When evaluating the collective effect of preventive, detective or corrective controls within a process, an IS auditor should be aware of which of the following?
A. The point at which controls are exercised as data flow through the system B. Only preventive and detective controls are relevant
C. Corrective controls can only be regarded as compensating
D. Classification allows an IS auditor to determine which controls are missing
20.Which of the following audit techniques would BEST aid an auditor in determining whether there have been unauthorized program changes since the last authorized program update? A. Test data run B. Code review
C. Automated code comparison
D. Review of code migration procedures
21.IT control objectives are useful to IS auditors since they provide the basis for understanding the:
A. desired result or purpose of implementing specific control procedures. B. best IT security control practices relevant to a specific entity. C. techniques for securing information. D. security policy.
22.Which of the following is the PRIMARY purpose for conducting parallel testing? A. To determine if the system is cost-effective
B. To enable comprehensive unit and system testing C. To highlight errors in the program interfaces with files D. To ensure the new system meets user requirements
23.A review of wide area network (WAN) usage discovers that traffic on one
communication line between sites, synchronously linking the master and standby database, peaks at 96 percent of the line capacity. An IS auditor should conclude that:
A. analysis is required to determine if a pattern emerges that results in a service loss for a short period of time.
下载文档
热门试卷
- 2016年四川省内江市中考化学试卷
- 广西钦州市高新区2017届高三11月月考政治试卷
- 浙江省湖州市2016-2017学年高一上学期期中考试政治试卷
- 浙江省湖州市2016-2017学年高二上学期期中考试政治试卷
- 辽宁省铁岭市协作体2017届高三上学期第三次联考政治试卷
- 广西钦州市钦州港区2016-2017学年高二11月月考政治试卷
- 广西钦州市钦州港区2017届高三11月月考政治试卷
- 广西钦州市钦州港区2016-2017学年高一11月月考政治试卷
- 广西钦州市高新区2016-2017学年高二11月月考政治试卷
- 广西钦州市高新区2016-2017学年高一11月月考政治试卷
- 山东省滨州市三校2017届第一学期阶段测试初三英语试题
- 四川省成都七中2017届高三一诊模拟考试文科综合试卷
- 2017届普通高等学校招生全国统一考试模拟试题(附答案)
- 重庆市永川中学高2017级上期12月月考语文试题
- 江西宜春三中2017届高三第一学期第二次月考文科综合试题
- 内蒙古赤峰二中2017届高三上学期第三次月考英语试题
- 2017年六年级(上)数学期末考试卷
- 2017人教版小学英语三年级上期末笔试题
- 江苏省常州西藏民族中学2016-2017学年九年级思想品德第一学期第二次阶段测试试卷
- 重庆市九龙坡区七校2016-2017学年上期八年级素质测查(二)语文学科试题卷
- 江苏省无锡市钱桥中学2016年12月八年级语文阶段性测试卷
- 江苏省无锡市钱桥中学2016-2017学年七年级英语12月阶段检测试卷
- 山东省邹城市第八中学2016-2017学年八年级12月物理第4章试题(无答案)
- 【人教版】河北省2015-2016学年度九年级上期末语文试题卷(附答案)
- 四川省简阳市阳安中学2016年12月高二月考英语试卷
- 四川省成都龙泉中学高三上学期2016年12月月考试题文科综合能力测试
- 安徽省滁州中学2016—2017学年度第一学期12月月考高三英语试卷
- 山东省武城县第二中学2016.12高一年级上学期第二次月考历史试题(必修一第四、五单元)
- 福建省四地六校联考2016-2017学年上学期第三次月考高三化学试卷
- 甘肃省武威第二十三中学2016—2017学年度八年级第一学期12月月考生物试卷
网友关注
- 幼儿园数学教案 9的加减法
- 档案皮(朱秀云)
- 2016年10月留守儿童家访活动方案
- China MapWord
- 幼儿园数学教案《复习7以内数的形成、认数、比多少》答案
- 美术鉴赏
- 陪伴是最好的教育
- 传承中华文化 共筑精神家园
- 班主任德育工作计划谷金良
- GIS垂距法Word
- 如何做好专题策划Word
- 幼儿园数学教案《区分上下、前后、里外》
- 新南威尔士大学申请条件是什么
- 春季常见传染病预防知识讲座Word
- 大班健康《齐心协力》活动反思
- 玩具安全测试标准解析Word
- 区域拓展模式运作实践Word
- 部编版语文一年级上册编写意图解读及教学建议
- 2017年山西会计从业资格证《电算化》判断题练习1答案
- 2015年上半年品质部管理评审资料Word
- 幼儿园数学教案《复习10以内的数概念》答案
- 班卫生值日表
- 浅谈对富阳市湖源乡创建最美乡镇的看法
- 班主任学期德育工作总结谷金良
- 幼儿园数学教案《学习8的形成、数数、认识数字8》
- 幼儿园数学教案《复习按物体二维特征分类》答案
- 基于认知者角度的城市品牌实证分析——以武汉市为研究样本
- Business managementWord
- 毕业答辩Word-云南师范大学(封面)-开题报告-毕业设计Word精美模板-(其他学校Word-见本人文库-强烈推荐)
- 英语语音入门教程教学大纲
网友关注视频
- 每天日常投篮练习第一天森哥打卡上脚 Nike PG 2 如何调整运球跳投手感?
- 冀教版小学数学二年级下册第二周第2课时《我们的测量》宝丰街小学庞志荣.mp4
- 河南省名校课堂七年级下册英语第一课(2020年2月10日)
- 冀教版小学数学二年级下册第二周第2课时《我们的测量》宝丰街小学庞志荣
- 北师大版八年级物理下册 第六章 常见的光学仪器(二)探究凸透镜成像的规律
- 【部编】人教版语文七年级下册《逢入京使》优质课教学视频+PPT课件+教案,安徽省
- 沪教版八年级下次数学练习册21.4(2)无理方程P19
- 【部编】人教版语文七年级下册《泊秦淮》优质课教学视频+PPT课件+教案,辽宁省
- 冀教版小学数学二年级下册1
- 【部编】人教版语文七年级下册《老山界》优质课教学视频+PPT课件+教案,安徽省
- 化学九年级下册全册同步 人教版 第22集 酸和碱的中和反应(一)
- 8.对剪花样_第一课时(二等奖)(冀美版二年级上册)_T515402
- 苏科版数学八年级下册9.2《中心对称和中心对称图形》
- 【部编】人教版语文七年级下册《过松源晨炊漆公店(其五)》优质课教学视频+PPT课件+教案,江苏省
- 苏教版二年级下册数学《认识东、南、西、北》
- 【部编】人教版语文七年级下册《泊秦淮》优质课教学视频+PPT课件+教案,湖北省
- 化学九年级下册全册同步 人教版 第25集 生活中常见的盐(二)
- 沪教版牛津小学英语(深圳用) 四年级下册 Unit 4
- 六年级英语下册上海牛津版教材讲解 U1单词
- 外研版英语三起6年级下册(14版)Module3 Unit1
- 外研版英语三起5年级下册(14版)Module3 Unit1
- 人教版二年级下册数学
- 冀教版小学数学二年级下册第二单元《余数和除数的关系》
- 冀教版小学数学二年级下册第二单元《有余数除法的整理与复习》
- 【获奖】科粤版初三九年级化学下册第七章7.3浓稀的表示
- 3月2日小学二年级数学下册(数一数)
- 苏科版八年级数学下册7.2《统计图的选用》
- 沪教版八年级下册数学练习册一次函数复习题B组(P11)
- 【部编】人教版语文七年级下册《老山界》优质课教学视频+PPT课件+教案,安徽省
- 《空中课堂》二年级下册 数学第一单元第1课时
精品推荐
- 2016-2017学年高一语文人教版必修一+模块学业水平检测试题(含答案)
- 广西钦州市高新区2017届高三11月月考政治试卷
- 浙江省湖州市2016-2017学年高一上学期期中考试政治试卷
- 浙江省湖州市2016-2017学年高二上学期期中考试政治试卷
- 辽宁省铁岭市协作体2017届高三上学期第三次联考政治试卷
- 广西钦州市钦州港区2016-2017学年高二11月月考政治试卷
- 广西钦州市钦州港区2017届高三11月月考政治试卷
- 广西钦州市钦州港区2016-2017学年高一11月月考政治试卷
- 广西钦州市高新区2016-2017学年高二11月月考政治试卷
- 广西钦州市高新区2016-2017学年高一11月月考政治试卷
分类导航
- 互联网
- 电脑基础知识
- 计算机软件及应用
- 计算机硬件及网络
- 计算机应用/办公自动化
- .NET
- 数据结构与算法
- Java
- SEO
- C/C++资料
- linux/Unix相关
- 手机开发
- UML理论/建模
- 并行计算/云计算
- 嵌入式开发
- windows相关
- 软件工程
- 管理信息系统
- 开发文档
- 图形图像
- 网络与通信
- 网络信息安全
- 电子支付
- Labview
- matlab
- 网络资源
- Python
- Delphi/Perl
- 评测
- Flash/Flex
- CSS/Script
- 计算机原理
- PHP资料
- 数据挖掘与模式识别
- Web服务
- 数据库
- Visual Basic
- 电子商务
- 服务器
- 搜索引擎优化
- 存储
- 架构
- 行业软件
- 人工智能
- 计算机辅助设计
- 多媒体
- 软件测试
- 计算机硬件与维护
- 网站策划/UE
- 网页设计/UI
- 网吧管理