Which of the following is the FIRST step performed prior to creating a risk ranking for the annual internal IS audit plan?

CISA Quiz

Quiz
•
English
•
Professional Development
•
Hard
Ganesh Pathuri
Used 1+ times
FREE Resource
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Prioritise the identified risk.
Define the audit universe.
Identify the critical controls.
Determine the testing approach.
2.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Which of the following is the MOST critical step when planning an IS audit?
Review findings from prior audits.
Executive management's approval of the audit plan.
Review IS security policies and procedures.
Perform Risk Assessment
3.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
The PRIMARY advantage of a continuous audit approach is that it:
Does not require an IS auditor to collect evidence on system reliability while processing is taking place
Requires the IS auditor to review and follow up immediately on all information collected
Can improve system security when used in time-sharing environments that process a large number of transactions
Does not depend on the complexity of an organizations computer systems.
4.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
An IS Auditor is performing an audit of a remotely managed server backup. The IS Auditor reviews the log for one day and finds one case where logging on a server has failed with the result that backup restarts can not be confirmed. What should the auditor do?
Issue an Audit finding
Seek an explanation from IS management
Review the classification of data held on the server
Expand the sample of logs reviewed
5.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
During the planning stage of an IS Audit, the PRIMARY goal of an IS Auditor is to:
Address Audit objectives
Collect sufficient evidence
Specify appropriate tests
Minimize audit resources
6.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Overall business risk for particular threat can be expressed as:
A Product of probability and magnitude of impact if threat successfully exploits the vulnerability
The magnitude of impact should a threat source successfully exploit the vulnerability
The likelihood of given threat source exploiting a given vulnerability
The collective judgement of the risk assessment team
7.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
hich of the following is NOT a function of the audit working papers
Show compliance with standards
Show how results were deduced
Show management’s role
Show due care was exercised
Create a free account and access millions of resources
Similar Resources on Quizizz
20 questions
Leadership and Management in Schools

Quiz
•
Professional Development
20 questions
CAE prepositions

Quiz
•
12th Grade - Professi...
20 questions
C1 Topics

Quiz
•
Professional Development
20 questions
Managing the Internal Audit

Quiz
•
Professional Development
20 questions
Accountant Quiz

Quiz
•
Professional Development
20 questions
application letter

Quiz
•
12th Grade - Professi...
25 questions
Tax Accounting: Vocabulary

Quiz
•
University - Professi...
20 questions
English Grammar Quiz

Quiz
•
6th Grade - Professio...
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
20 questions
Math Review - Grade 6

Quiz
•
6th Grade
20 questions
math review

Quiz
•
4th Grade
5 questions
capitalization in sentences

Quiz
•
5th - 8th Grade
10 questions
Juneteenth History and Significance

Interactive video
•
5th - 8th Grade
15 questions
Adding and Subtracting Fractions

Quiz
•
5th Grade
10 questions
R2H Day One Internship Expectation Review Guidelines

Quiz
•
Professional Development
12 questions
Dividing Fractions

Quiz
•
6th Grade