教育资源为主的文档平台

当前位置: 查字典文档网> 所有文档分类> 资格考试> 财会/金融考试> IS项目管理与审计模拟题

IS项目管理与审计模拟题

上传者:梅丽
|
上传时间:2015-04-26
|
次下载

IS项目管理与审计模拟题

信息系统审计考题

A卷答案

内容需要下载文档才能查看

信息系统审计考题

同济大学经济与管理学院试卷 (B卷) 2010 -2011 学年第1 学期

课号: 课程名:信息系统审计 考试形式:开卷( )闭卷(√)

此卷选为:期中考试( )、期终考试( )、补考(√ )试卷

专业和年级 学号 姓名

答案请填写于下表

内容需要下载文档才能查看 内容需要下载文档才能查看

A. be dynamic and change often to coincide with the changing nature of technology and the audit profession.

B. clearly state audit objectives for, and the delegation of, authority to the maintenance and review of internal controls.

C. document the audit procedures designed to achieve the planned audit objectives.

D. outline the overall authority, scope and responsibilities of the audit function.

2. The IT balanced scorecard (BSC) is a business governance tool intended to monitor IT performance evaluation indicators other than: A. financial results.

B. customer satisfaction.

信息系统审计考题

C. internal process efficiency. D. innovation capacity.

3. The reason for establishing a stop or freezing point on the design of a new system is to:

A. prevent further changes to a project in process.

B. indicate the point at which the design is to be completed.

C. require that changes after that point be evaluated for cost-effectiveness. D. provide the project management team with more control over the project design.

4. An IS auditor evaluating the resilience of a high-availability network should be MOST concerned if:

A. the setup is geographically dispersed.

B. the network servers are clustered in a site. C. a hot site is ready for activation.

D. diverse routing is implemented for the network.

5. Which of the following is the PRIMARY safeguard for securing software and data within an information processing facility? A. Security awareness

B. Reading the security policy C. Security committee D. Logical access controls

6. Which of the following is the MOST important criterion when selecting a location for an offsite storage facility for IS backup files? The offsite facility must be: A. physically separated from the data center and not subject to the same risks.

B. given the same level of protection as that of the computer data center. C. outsourced to a reliable third party. D. equipped with surveillance capabilities.

7. Which of the following sampling methods is MOST useful when testing for compliance?

A. Attribute sampling B. Variable sampling

C. Stratified mean per unit D. Difference estimation

8. Which of the following is the MOST important function to be performed by IS management when a service has been outsourced? A. Ensuring that invoices are paid to the provider B. Participating in systems design with the provider C. Renegotiating the provider’s fees

D. Monitoring the outsourcing provider’s performance

9. Which of the following system and data conversion strategies provides the GREATEST redundancy? A. Direct cutover B. Pilot study

C. Phased approach D. Parallel run

10.An IS auditor reviewing database controls discovered that changes to the

信息系统审计考题

database during normal working hours were handled through a standard set of procedures. However, changes made after normal hours required only an abbreviated number of steps. In this situation, which of the following would be considered an adequate set of compensating controls?

A. Allow changes to be made only with the DBA user account

B. Make changes to the database after granting access to a normal user account

C. Use the DBA user account to make changes, log the changes and review the change log the following day

D. Use the normal user account to make changes, log the changes and review the change log the following day

11.Which of the following is a feature of an intrusion detection system (IDS)? A. Gathering evidence on attack attempts

B. Identifying weaknesses in the policy definition C. Blocking access to particular sites on the Internet

D. Preventing certain users from accessing specific servers

12.During a business continuity audit, an IS auditor found that the business continuity plan covered only critical processes. The IS auditor should: A. recommend that the business continuity plan cover all business processes.

B. assess the impact of the processes not covered. C. report the findings to the IT manager. D. redefine critical processes.

13.While planning an audit, an assessment of risk should be made to provide: A. reasonable assurance that the audit will cover material items.

B. definite assurance that material items will be covered during the audit work.

C. reasonable assurance that all items will be covered by the audit.

D. sufficient assurance that all items will be covered during the audit work. 14.The management of an organization has decided to establish a security awareness program. Which of the following would MOST likely be a part of the program?

A. Utilization of an intrusion detection system to report incidents B. Mandating the use of passwords to access all software

C. Installing an efficient user log system to track the actions of each user D. Training provided on a regular basis to all current and new employees

15.An IS auditor finds that a system under development has 12 linked modules and each item of data can carry up to 10 definable attribute fields. The system

handles several million transactions a year. Which of these techniques could an IS auditor use to estimate the size of the development effort? A. Program evaluation review technique (PERT) B. Counting source lines of code (SLOC) C. Function point analysis D. White box testing

16.An organization has recently installed a security patch, which crashed the production server. To minimize the probability of this occurring again, an IS auditor should:

信息系统审计考题

A. apply the patch according to the patch’s release notes.

B. ensure that a good change management process is in place. C. thoroughly test the patch before sending it to production. D. approve the patch after doing a risk assessment.

17.Which of the following is the BEST way to handle obsolete magnetic tapes before disposing of them?

A. Overwriting the tapes B. Initializing the tape labels C. Degaussing the tapes D. Erasing the tapes

18.Which of the following findings should an IS auditor be MOST concerned about when performing an audit of backup and recovery and the offsite storage vault? A. There are three individuals with a key to enter the area B. Paper documents are also stored in the offsite vault C. Data files that are stored in the vault are synchronized D. The offsite vault is located in a separate facility

19.When evaluating the collective effect of preventive, detective or corrective controls within a process, an IS auditor should be aware of which of the following?

A. The point at which controls are exercised as data flow through the system B. Only preventive and detective controls are relevant

C. Corrective controls can only be regarded as compensating

D. Classification allows an IS auditor to determine which controls are missing

20.Which of the following audit techniques would BEST aid an auditor in determining whether there have been unauthorized program changes since the last authorized program update? A. Test data run B. Code review

C. Automated code comparison

D. Review of code migration procedures

21.IT control objectives are useful to IS auditors since they provide the basis for understanding the:

A. desired result or purpose of implementing specific control procedures. B. best IT security control practices relevant to a specific entity. C. techniques for securing information. D. security policy.

22.Which of the following is the PRIMARY purpose for conducting parallel testing? A. To determine if the system is cost-effective

B. To enable comprehensive unit and system testing C. To highlight errors in the program interfaces with files D. To ensure the new system meets user requirements

23.A review of wide area network (WAN) usage discovers that traffic on one

communication line between sites, synchronously linking the master and standby database, peaks at 96 percent of the line capacity. An IS auditor should conclude that:

A. analysis is required to determine if a pattern emerges that results in a service loss for a short period of time.

版权声明:此文档由查字典文档网用户提供,如用于商业用途请与作者联系,查字典文档网保持最终解释权!

下载文档

热门试卷

2016年四川省内江市中考化学试卷
广西钦州市高新区2017届高三11月月考政治试卷
浙江省湖州市2016-2017学年高一上学期期中考试政治试卷
浙江省湖州市2016-2017学年高二上学期期中考试政治试卷
辽宁省铁岭市协作体2017届高三上学期第三次联考政治试卷
广西钦州市钦州港区2016-2017学年高二11月月考政治试卷
广西钦州市钦州港区2017届高三11月月考政治试卷
广西钦州市钦州港区2016-2017学年高一11月月考政治试卷
广西钦州市高新区2016-2017学年高二11月月考政治试卷
广西钦州市高新区2016-2017学年高一11月月考政治试卷
山东省滨州市三校2017届第一学期阶段测试初三英语试题
四川省成都七中2017届高三一诊模拟考试文科综合试卷
2017届普通高等学校招生全国统一考试模拟试题(附答案)
重庆市永川中学高2017级上期12月月考语文试题
江西宜春三中2017届高三第一学期第二次月考文科综合试题
内蒙古赤峰二中2017届高三上学期第三次月考英语试题
2017年六年级(上)数学期末考试卷
2017人教版小学英语三年级上期末笔试题
江苏省常州西藏民族中学2016-2017学年九年级思想品德第一学期第二次阶段测试试卷
重庆市九龙坡区七校2016-2017学年上期八年级素质测查(二)语文学科试题卷
江苏省无锡市钱桥中学2016年12月八年级语文阶段性测试卷
江苏省无锡市钱桥中学2016-2017学年七年级英语12月阶段检测试卷
山东省邹城市第八中学2016-2017学年八年级12月物理第4章试题(无答案)
【人教版】河北省2015-2016学年度九年级上期末语文试题卷(附答案)
四川省简阳市阳安中学2016年12月高二月考英语试卷
四川省成都龙泉中学高三上学期2016年12月月考试题文科综合能力测试
安徽省滁州中学2016—2017学年度第一学期12月月考​高三英语试卷
山东省武城县第二中学2016.12高一年级上学期第二次月考历史试题(必修一第四、五单元)
福建省四地六校联考2016-2017学年上学期第三次月考高三化学试卷
甘肃省武威第二十三中学2016—2017学年度八年级第一学期12月月考生物试卷

网友关注视频

3月2日小学二年级数学下册(数一数)
8.对剪花样_第一课时(二等奖)(冀美版二年级上册)_T515402
冀教版英语五年级下册第二课课程解读
第19课 我喜欢的鸟_第一课时(二等奖)(人美杨永善版二年级下册)_T644386
冀教版小学数学二年级下册第二单元《有余数除法的竖式计算》
【部编】人教版语文七年级下册《过松源晨炊漆公店(其五)》优质课教学视频+PPT课件+教案,辽宁省
外研版英语七年级下册module3 unit2第二课时
《小学数学二年级下册》第二单元测试题讲解
人教版二年级下册数学
冀教版小学数学二年级下册第二单元《有余数除法的简单应用》
沪教版牛津小学英语(深圳用)五年级下册 Unit 1
第12章 圆锥曲线_12.7 抛物线的标准方程_第一课时(特等奖)(沪教版高二下册)_T274713
【部编】人教版语文七年级下册《老山界》优质课教学视频+PPT课件+教案,安徽省
第五单元 民族艺术的瑰宝_16. 形形色色的民族乐器_第一课时(岭南版六年级上册)_T3751175
冀教版英语三年级下册第二课
外研版英语七年级下册module3 unit2第一课时
苏科版数学 八年级下册 第八章第二节 可能性的大小
沪教版牛津小学英语(深圳用) 四年级下册 Unit 12
人教版历史八年级下册第一课《中华人民共和国成立》
沪教版八年级下册数学练习册21.3(2)分式方程P15
19 爱护鸟类_第一课时(二等奖)(桂美版二年级下册)_T502436
沪教版八年级下册数学练习册21.3(3)分式方程P17
冀教版小学英语五年级下册lesson2教学视频(2)
青岛版教材五年级下册第四单元(走进军营——方向与位置)用数对确定位置(一等奖)
沪教版牛津小学英语(深圳用) 五年级下册 Unit 7
沪教版八年级下册数学练习册21.4(1)无理方程P18
外研版八年级英语下学期 Module3
冀教版英语四年级下册第二课
北师大版数学 四年级下册 第三单元 第二节 小数点搬家
河南省名校课堂七年级下册英语第一课(2020年2月10日)