CIS 558 Week 1 Assessment 2 Quiz, Discussion Question – Complete


Category: CIS 558 Tag: cis 558


CIS 558 Week 1 Assessment 2, Quiz Chapter 1, Secrets of a Successful Auditor

  1. What does the principle of auditor independence mean?
  2. How does the auditor derive a final opinion?
  3. Which of the following statements is true concerning the role of management and the role of the auditor?
  4. Which of the following statements is not true regarding the audit committee?
  5. What are common types of audits?
  6. What is the purpose of ISACA’s professional ethics statement?
  7. Which of the following is the best description of an ongoing audit program for regulatory compliance?
  8. What does fiduciary responsibility mean?
  9. Complete the following statement: A Certified Information Systems Auditor will lose their certification if they?
  10. What function does the auditor provide?
  11. What is the difference between a threat and a vulnerability?
  12. Select the best answer to finish this statement: A ____________ is strategic in nature, while the ____________ is tactical.
  13. Which of the following is true concerning the roles of data owner, data user, and data custodian?
  14. Assessments and audits have several points in common. Which of the following statements provides the best description of an assessment compared to an audit?
  15. What is the primary objective of the ISACA audit standards and professional ethics publication?
  16. Which of the following assurance methods is acceptable for external use, including licensing?
  17. What does the term auditor independence relate to?
  18. How should the auditor assist in the remediation of problems found during the audit?
  19. The ___________ type of audit checks attributes against the design specifications cis 558 week 1
  20. Which of the following in a business organization will be held liable by the government for failures of internal controls?
  21. A member of the auditee staff offers to loan you an unauthorized copy of software that you need for a short time. What-should you, as the auditor, always remember?
  22. What is the difference between a policy and a procedure?
  23. What term simply means the right people of authority looked at the issue, made an intelligent decision, and took appropriate action?
  24. IS auditors are expected to apply the discipline of financial audit standards to a variety of abstract situations. Each of these requires a different approach.
  25. What is the definition of a standard as compared to a guideline?
  26. What is the difference between the word should and shallwhen used in regulations?
  27. All of the following are the responsibilities of a Database Administrator except for which one?
  28. Which of the following processes are involved under the COBIT framework?
  29. What is the purpose of standard terms of reference?
  30. Why is it necessary to protect audit documentation and work papers cis 558 week 1
  31. Which of the following internal control components provides the foundation for the other components and encompasses such factors as management’s philosophy and operating style?
  32. Which of the following is not ….as a nonaudit role?
  33. The auditor’s final opinion is to be based on which of the following?
  34. Which of the following information security laws is also known as Kassebaum-Kennedy?
  35. Which of the following statements is true cis 558 week 1
  36. The audit may uncover irregularities and illegal acts that require disclosure. The auditor is obligated to promptly disclose this information to the authorities.
  37. Which of the following diagrams is used to display sensitivity analysis data?
  38. Which of the following roles of information security has the responsibilities for backup, retention, and recovery of data?

CIS 558 Week 1 Discussion, COBIT Planning

  • Describe how organizations establish the five (5) COBIT IT governance focus areas: strategic alignment, value delivery, risk management, resource management, and performance management
  • Suppose senior management has tasked you with the planning of the COBIT compliance project. In terms of the COBIT framework, predict which key areas are likely to be problematic to implement. Suggest at least two (2) possible solutions to these problematic areas.cis 558 week 1