已閱讀5頁,還剩39頁未讀, 繼續(xù)免費(fèi)閱讀
版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡介
1 2010 CISA 考試重點(diǎn)摘要考試重點(diǎn)摘要 C1 1. CSA (control self-assessment) ? The success of control self-assessment (CSA) highly depends on: A. having line managers assume a portion of the responsibility for control monitoring. B. assigning staff managers the responsibility for building, but not monitoring, controls. C. the implementation of a stringent control policy and rule-driven controls. D. the implementation of supervision and the monitoring of controls of assigned duties. Explanation: The primary objective of a CSA program is to leverage the internal audit function by shifting some of the control monitoring responsibilities to the functional area line managers. The success of a control self-assessment (CSA) program depends on the degree to which line managers assume responsibility for controls. Choices B, C and D are characteristics of a traditional audit approach, not a CSA approach ? When CSA programs are established, IS auditors become internal control professionals and assessment facilitators. IS auditors are the facilitators and the client (management and staff) is the participant in the CSA process. During a CSA workshop, instead of the IS auditor performing detailed audit procedures, they should lead and guide the clients in assessing their environment. Manager, partner and stakeholder should not be roles of the IS auditor. These roles are more appropriate for the client. ? The objectives of CSA programs include education for line management in control responsibility and monitoring and concentration by all on areas of high risk. The objectives of CSA programs include the enhancement of audit responsibilities, not replacement of audit responsibilities. 2. Data flow diagram: no hierarchy, no generation. ? Data flow diagrams are used by IS auditors to: A. order data hierarchically. B. highlight high-level data definitions. C. graphically summarize data paths and storage. D. portray step-by-step details of data generation. Explanation: Data flow diagrams are used as aids to graph or chart data flow and storage. They trace the data from its origination to destination, highlighting the paths and storage of data. They do not order data in any hierarchy. The flow of the data will not necessarily match any hierarchy or data generation order. 3. Audit Charter ? be approved by highest management (audit committee also would be better) 2 ? Typically sets out the role and responsibility of the internal audit department. It should state managements objectives for and delegation of authority to the audit department. It is rarely changed and does not contain the audit plan or audit process, which is usually part of annual audit planning, nor does it describe a code of professional conduct, since such conduct is set by the profession and not by management. 4. Auditor is responsible to senior management and audit committee. 5. Substantive test ? Determine the Integrity of the actual processing, which provides evidences of the validity of the final outcome. ? Ex: recalculation, confirmation, verification of outcomes form other information sources or observation, Variable sampling ? Which of the following is a substantive test? A. Checking a list of exception reports B. Ensuring approval for parameter changes C. Using a statistical sample to inventory the tape library D. Reviewing password history reports Explanation: A substantive test confirms the integrity of actual processing. A substantive test would determine if the tape library records are stated correctly. A compliance test determines if controls are being applied in a manner that is consistent with management policies and procedures. Checking the authorization of exception reports, reviewing authorization for changing parameters and reviewing password history reports are all compliance tests. 6. Compliance test: determines if controls are being applied in a manner that is consistent with management policies and procedures ? Attribute sampling: ? The primary sampling method used for compliance testing to confirm whether the quality exists. ? To estimate the rate of occurrence of a specific quality (attribute) in a population. 7. Attribute sampling refers to 3 different types: ? Attribute sampling(fixed sample-size attribute sampling/ frequency-estimating sampling): ? Estimate the rate of occurrence of a specific quality in a population ? Ex: approval signature on computer access request form ? stop-or-go sampling: ? 已經(jīng)預(yù)知會有相同大的出現(xiàn)比時(shí)可以停止 ? allows a test to be stopped as early as possible and is not appropriate for checking whether procedures have been followed ? Discovery sampling: ? The expected occurrence rates is extremely low ? Often Used to detect fraud 8. Variable sampling: ? Dollar or mean estimation sampling(estimate the monetary value or other unit of measures, such as weight) ? Stratified/unstratified mean per unit ? Difference estimation ? estimate the average or the total value of a population based on a sample ? statistic model used to project a quantitative characteristic ? monetary amount 9. ITF (Integrated testing facility): ? uses the same programs to compare processing using independently calculated data ? An integrated test facility creates a fictitious entity in the database to process test transactions simultaneously with live input. Its advantage is that periodic testing does not require separate test processes. However, careful planning is necessary, and test data must be isolated from production data 10. statistical sampling: ? An IS auditor should use statistical sampling and not judgment (nonstatistical) sampling, when: A. the probability of error must be objectively quantified. B. the auditor wishes to avoid sampling risk. C. generalized audit software is unavailable. D. the tolerable error rate cannot be determined. Explanation: Given an expected error rate and confidence level, statistical sampling is an objective method of sampling, which helps an IS auditor determine the sample size and quantify the probability of error (confidence coefficient). Choice B is incorrect because sampling risk is the risk of a sample not being representative of the population. This risk exists for both judgment and statistical samples. Choice C is incorrect because statistical sampling does not require the use of generalized audit software. Choice D is incorrect because the tolerable error rate must be predetermined for both judgment and statistical sampling. 11. Generalized audit software: features include mathematical computations, stratification, statistical analysis, sequence checking, duplicate checking 3 4 and recomputations. The IS auditor, using generalized audit software, could design appropriate tests to recompute the payroll and, thereby, determine if there were overpayments and to whom they were made. Test data would test for the existence of controls that might prevent overpayments, but it would not detect specific, previous miscalculations. Neither an integrated test facility nor an embedded audit module would detect errors for a previous period 12. Risk-based audit approach ? process ? Gather information about the business and industry to evaluate the inherent risks. ? Complete an assessment of the internal control structure. ? Test the internal control ? Based on the test results, substantive tests are carried out and assessed. ? An assessment of risk should be made to provide reasonable assurance that material items will be adequately covered during the audit work ? the IS auditor is not only relying on risk, but on internal and operational controls as well as knowledge of the company and the business ? It is critical that the risks and vulnerabilities be understood. This will determine the areas to be audited and the extent of coverage ? It is important for an IS auditor to identify and evaluate the existing controls and security once the potential threats and possible impacts are identified. Upon completion of an audit an IS auditor should describe and discuss with management the threats and potential impacts on the assets. 13. Detection risks: ? directly affected by the auditors selection of audit procedures and techniques. ? the IS auditor uses an inadequate test procedure and concludes that material errors do not exist, when in fact they do 14. Control risks: a material error exists, which will not be prevented or detected on a timely basis by the system of internal controls 15. Forensic software: The primary objective is to preserve electronic evidence to meet the rules of evidence. Time and cost savings and efficiency and effectiveness are legitimate concerns and differentiate good from poor forensic software packages. The ability to search for intellectual property rights violations is an example of a use of forensic software. 16. Audit hook(審計(jì)勾) : The audit hook technique involves embedding code in application systems for the examination of selected transactions. This helps the IS auditor to act before an error or an irregularity gets out of hand. 17. Embedded audit module: involves embedding specially written software in the organizations host application system so that application systems are monitored on a selective basis. 18. An integrated test facility is used when it is not practical to use test data, and snapshots are used when an audit trail is required. 19. Network operating system user features: ? Online availability of network documentation. ? user access to various resources of network hosts, ? user authorization to access particular resources, ? the network and host computers used without special user actions or commands 20. Network operation system function: ? Support of terminal access to remote hosts ? Handling file transfer between hosts and interuser communications ? Performance management, audit and control 21. Which of the following would be the BEST population to take a sample from when testing program changes? A. Test library listings B. Source program listings C. Program change requests D. Production library listings 5 6 Explanation: The best source from which to draw any sample or test of system information is the automated system. The production libraries represent executables that are approved and authorized to process organizational data. Source program listings would be time intensive. Program change requests are the documents used to initiate change; there is no guarantee that the request has been completed for all changes. Test library listings do not represent the approved and authorized executables. 22. continuous audit approach ? require an IS auditor to collect evidence on system reliability while processing is taking place ? an improve system security when used in time-sharing environments that process a large number of transactions. ? depend on the complexity of an organizations computer systems 23. Snapshots ? Audit trail ? A method of using special programming options to permit the printout of the path through a computer program taken to process a specific transaction ? A procedure for tagging and extending transactions and master records that are used by an IS auditor for tests 24. Audit trail: ? 主要: establishing the accountability and responsibility of processed transactions by tracing transactions through the system ? 次要: provide useful information to auditors who may wish to track 25. system control audit review file: The utilization of hardware and/or software to review and test the functioning of a computer systems 26. The primary reason for conducting IS audits is to determine whether a system safeguards assets and maintains data integrity 27. why e-mail systems have become a useful source of evidence for litigation? Multiple cycles of backup files remain available. Backup files containing documents that supposedly have been deleted could be recovered from these files. Access controls may help establish accountability for the issuance of a particular document, but this does not provide evidence of the e-mail. 28. An IS auditor performing a review of an applications controls would evaluate the: A. efficiency of the application in meeting the business processes. B. impact of any exposures discovered. C. business processes served by the application. D. applications optimization. 7 Explanation: An application control review involves the evaluation of the applications automated controls and an assessment of any exposures resulting from the control weaknesses. The other choices may be objectives of an application audit but are not part of an audit restricted to a review of controls. 29. Domain integrity testing is aimed at verifying that the data conform to definitions, i.e., the data items are all in the correct domains. The major objective of this exercise is to verify that the edit and validation routines are working satisfactorily. 30. Relational integrity tests are performed at the record level and usually involve calculating and verifying various calculated fields, such as control totals. 31. Referential integrity tests involve ensuring that all references to a primary key from another file actually exist in their original file. (PK/FK) 32. Parity check is a bit added to each character prior to transmission. The parity bit is a function of the bits making up the character. The recipient performs the same function on the received character and compares the result to the transmitted parity bit. If it is different, an error is assumed. C2 1. IS auditor ? Primary responsibility is to assure that the company assets are being safeguarded. ? Be best positioned to provide leading practice recommendation to senior management to help to improve the quality and effectiveness of IT governance ? Independence should be continually assessed by the auditor and management. This assessment should consider such factors as changes in personal relationships, financial interests, and prior job assignments and responsibilities 2. IT security policy ? Align with Business strategy ? Extends/sustains the organizations strategy and objectives. (or be derived form) ? Assimilation(同化) of the framework and intent of a written security policy by all appropriate parties is critical to the successful implementation and maintenance of the security policy. Management support and commitment is no doubt important, but for successful 8 implementation and maintenance of security policy, educating the users on the importance of security is paramount ? Top-down approach: begins by defining operational-level requirements and policies, which are derived and implemented as the result of risk assessments. Enterprise-level policies are subsequently developed based on a synthesis(綜合) of existing operational policies ? Bottom-up approach: ensures that the policies will not be in conflict with overall corporate policy and ensure consistency across the organization. ? Accountability for the corporate security policy cannot be transferred to external parties ? Responsibility ? Top management or the board of directors: the designing of an information systems security policy ? The IS department: the execution of the policy, having no authority in framing the policy. ? The security committee: also functions within the broad security policy framed by the board of directors. ? The security administrator: implementing, monitoring and enforcing the security rules that management has established and authorized 3. Best practice for information security governance provides 4 basic outcomes : ? Strategic alignment ? security requirements driven by enterprise requirements ? Value delivery ? Provides standard set of security practice, such as baseline security following best practices or institutionalized and commoditized solutions ? Risk management ? provides an understanding of risk exposure ? Performance measurement. ? Objective: optimize performance, measure and manage products/services, assure accountability, and make budget decisions 4. IT governance is primarily the responsibility of board of directors/ the 9 executives and shareholders. The chief executive officer is instrumental in implementing IT governance per the directions of the board of directors ? 5. IS steering committee ? keep detailed steering committee minutes to document the decisions and activities of the IS steering committee, and the board of directors should be informed about those decisions on a timely basis ? Monitors and facilitates deployment of IT resources for specific projects in support of business plans. ? Serves as a general review board for major IS projects and should not become involved in routine operations; therefore, one of its functions is to approve and monitor major projects, the status of IS plans and budgets. 6. IS management ? Monitoring vendor-controlled change control and testing ? Ensuring a separation of duties within the informations processing environment?resposibiliy 7. Security Administrator ? Responsibility: ensure that IS security policies and procedures have been executed properly 8. IT balance scorecard ? Financial evaluation(traditional) ? Customer satisfaction ? Internal(operation) process/processing ? Ability to innovate/innovation capability ? A definition of key performance indicators is required before implementing an IT balanced scorecard 9. Involvement of senior management is MOST important in the development of: A. strategic plans. B. IS policies. C. IS procedures. D. standards and guidelines. Explanation: 10 Strategic plans provide the basis for ensuring that the enterprise meets its goals and objectives. Involvement of senior management is critical to ensuring that the plan adequately addresses the established goals and objectives. IS policies, procedures, standards and guidelines are all structured to support the overall strategic plan. 10. Required vacations/holidays of a week or more duration in which someone other than the regular employee performs the job function is often mandatory for sensitive positions This reduces the opportunity to com
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 2025幼兒園教研工作計(jì)劃表格
- 2025年小學(xué)一年級下學(xué)期班主任工作計(jì)劃范文
- 2025年度秋季學(xué)期少先隊(duì)工作計(jì)劃
- Unit 3 Sports and Fitness 單元說課稿-2024-2025學(xué)年高中英語人教版(2019)必修第一冊
- 海上風(fēng)電相關(guān)行業(yè)投資方案
- Unit5 Height and Weight(說課稿)-2024-2025學(xué)年北師大版(三起)英語六年級上冊
- 報(bào)價(jià)員專業(yè)知識培訓(xùn)課件
- 2025年科室醫(yī)院感染管理年度工作計(jì)劃文檔
- 2025年班主任計(jì)劃
- Unit 4 What can you do Part B Read and write大單元整體說課稿表格式-2024-2025學(xué)年人教PEP版英語五年級上冊
- 暖通工程合同
- 生產(chǎn)型企業(yè)規(guī)章管理制度(3篇)
- 鋼結(jié)構(gòu)之樓承板施工方案流程
- 2024年?duì)I銷部工作人員安全生產(chǎn)責(zé)任制(2篇)
- ISO 56001-2024《創(chuàng)新管理體系-要求》專業(yè)解讀與應(yīng)用實(shí)踐指導(dǎo)材料之3:4組織環(huán)境-4.1理解組織及其環(huán)境(雷澤佳編制-2025B0)
- 2024-2030年中國管道檢測工程行業(yè)前景分析發(fā)展規(guī)劃研究報(bào)告
- 新的護(hù)理交班模式
- 2024年安徽省高校分類對口招生考試數(shù)學(xué)試卷真題
- 2024電影數(shù)字節(jié)目管理中心招聘歷年高頻難、易錯點(diǎn)練習(xí)500題附帶答案詳解
- 棋牌室消防應(yīng)急預(yù)案
- 《ISO56001-2024創(chuàng)新管理體系 - 要求》之22:“8運(yùn)行-8.2 創(chuàng)新行動”解讀和應(yīng)用指導(dǎo)材料(雷澤佳編制-2024)
評論
0/150
提交評論