ISA 3.0 ICAI module 1

ISA 3.0 ICAI

ISA 3.0 ICAI module 1

ICAI DISA 3.0 QUESTION BANK : MODULE 1 :- STUDY MATERIAL BASED

1 / 65

1. disa3.0 QUESTIN BANK

Question: While planning an audit M/s InfoTech Solutions should have FIRST identified:

2 / 65

2.

disa3.0 QUESTIN BANK

Questions:: M/s InfoTech Solutions has decided to Skip Risk Assessment Process. What is the Primary Risk involved here?

 

3 / 65

3. Reviewing management's long-term strategic plans helps the IS auditor:

4 / 65

4. When developing a risk-based audit strategy, an IS auditor should conduct a risk assessment to ensure that:

5 / 65

5. After you enter a purchase order in an on-line system, you get the message, “The request could not be processed due to lack of funds in your budget”. This is an example of error?

6 / 65

6. Which of the following cannot be classified as Audit Risk?

7 / 65

7. What means the rate at which opinion of the IS Auditor would change if he selects a larger sample size?

8 / 65

8. The rate of change in technology increases the importance of:

9 / 65

9. Which of the following are most commonly used to mitigate risks discovered by organizations?

10 / 65

10. To conduct a system audit, the IS auditor should

11 / 65

11. Which of the following control classifications identify the cause of a problem and minimize the impact of threat?

12 / 65

12. The primary purpose and existence of an audit charter is to:

13 / 65

13.

disa3.0 QUESTIN BANK

Question: The decisions and actions of Senior Auditor of M/s InfoTech Solutions are MOST likely to affect which of the following risks?

14 / 65

14.

DISA ICAI Case-2

Question: What should an IS Auditor do FIRST, when he observed that two users are constantly trying to access some external sources?

15 / 65

15.

DISA ICAI Case-2

Question: An IS Auditor found one security loophole in the System. However, when the IT Management got to know about it, immediately corrected it. The IS Auditor should:

16 / 65

16.

DISA ICAI Case-2

Question: IS Auditor rightly found one weakness in the Firewall implementation and he recommended the name of sister concern to address the weakness. The IS Auditor has
failed to maintain:

17 / 65

17.

Which of the following forms of evidence would be considered to be the most reliable when assisting an IS Auditor develop audit conclusion?

18 / 65

18.

During a review of the controls over the process of defining IT service levels, an IS auditor would most likely interview the:

19 / 65

19.

Which of the following procedures would an IS Auditor not perform during pre-audit planning to gain an understanding of the overall environment under review?

20 / 65

20.

The purpose of compliance tests is to provide reasonable assurance that:

21 / 65

21. IS Auditors being most likely to perform tests of internal controls if, after their evaluation of such controls, they conclude that:

22 / 65

22. Which of the following is the least important factor in determining the need for an IS Auditor to be involved in a new system development project?

23 / 65

23. Each of the following is a general control concern EXCEPT:

24 / 65

24. Which of the following types of audits requires the highest degree of data processing expertise?

25 / 65

25. A manufacturing company has implemented a new client/server system enterprise resource planning (ERP) system. Local branches transmit customer orders to a
central manufacturing facility. Which of the following controls would BEST ensure that the orders are accurately entered and the corresponding products produced?

26 / 65

26.

An IS Auditor observed that users are occasionally granted the authority to change system data. The elevated system access is not consistent with company policy yet is required for smooth functioning of business operations. Which of the following controls would the IS Auditor most likely recommend for long term resolution?

27 / 65

27.

In a public sector bank while updating master data for advances given, the bank employee does not update “INSURANCE DATA”. This includes details of Insurance
Policy, Amount Insured, Expiry Date of Insurance and other related information. This defines which control lapse as per COBIT.

28 / 65

28.

As per Income Tax Act, 1961 and banking norms, all fixed deposit holders of banks need to submit their PAN or form 60/61(a form as per Income Tax Act/Rules). A bank in its account opening form, has not updated the need for form 60/61 in case PAN is not there. This defines which control lapse as per COBIT.

29 / 65

29.

Application controls shall include all except

30 / 65

30.

The most appropriate type of CAAT tool the auditor should use to test security configuration settings for the entire application systems of any organization is:

31 / 65

31.

Many automated tools are designed for testing and evaluating computer systems. Which one of the following such tools impact the systems performance with a greater load and
stress on the system? 

32 / 65

32.

An IS Auditor, concerned that application controls are not adequate to prevent duplicate payment of invoices, decided to review the data processing files for possible duplicate
payments. Which of the following techniques/tools would be useful to the IS Auditor? 

33 / 65

33.

Which is one of the most effective tools and techniques to combat fraud?

34 / 65

34.

What is one of the key tests which can be ideally carried out using Computer Assisted Audit Tools (CAATs)?

35 / 65

35.

What is one of the key tests which can be ideally carried out using Computer Assisted Audit Tools (CAATs)?

36 / 65

36.

What is one of the key tests which can be ideally carried out using Computer Assisted
Audit Tools (CAATs)?

37 / 65

37.

What can be ideally carried out using Computer Assisted Audit Tools (CAATs)?

38 / 65

38. Find out the best process carried out using Computer Assisted Audit Tools (CAATs)?

39 / 65

39.

What is one of the key tests which can be ideally carried out using Computer Assisted Audit Tools (CAATs)?

40 / 65

40.

After initial investigation, IS auditor has reasons to believe that there is possibility of fraud, the IS auditor has to:

41 / 65

41.

A holistic approach to deterrence & prevention of fraud would be:

42 / 65

42.

As a measure of IT General controls, an organization decides to separate those who can input data from those that can reconcile or approve data. Is this a good move? Why?

43 / 65

43.

Which of the following refers to imaging of original media in presence of an independent third party?

44 / 65

44. The FIRST step in managing the risk of a cyber-attack is to:

45 / 65

45.

Neural networks are effective in detecting fraud, because they can:

46 / 65

46.

Which of the following situations would increase the likelihood of fraud?

47 / 65

47.

An IS auditor discovers evidence of fraud perpetrated with a manager's user id. The manager had written the password, inside his/her desk drawer. The IS auditor should conclude that the:

48 / 65

48.

Which of the following is LEAST likely to be included in a review to assess the risk of fraud in application systems?

49 / 65

49.

Which of the following factors should not be considered in establishing the priority of audits included in an annual audit plan?

50 / 65

50. Which are the business activities which are strong contenders for conversion to ecommerce?

51 / 65

51.

In an inter school competition on Artificial Intelligence, four children develop software which performs the following different functions respectively. Which of them is a correct example of the use of basic Artificial Intelligence?

52 / 65

52. Neural Networks and Fuzzy Logics are classified under which category of Artificial intelligence?

53 / 65

53. As part of auditing Information Security of a multinational bank, an auditor wants to assess the security of information in ATM facilities. Under which privacy policy should he look for details pertaining to security guards and CCTV surveillance of ATM’s?

54 / 65

54. An employee has left the company. The first thing to do is to:

55 / 65

55. The cashier of a company has rights to create bank master in TALLY. This error is a reflection of poor definition for which type of control:

56 / 65

56. A retail company recently installed data warehousing client software in multiple, geographically diverse sites. Due to time zone differences between the sites, updates to the warehouse are not synchronized. This will affect which of the following most?

57 / 65

57. Which of the following audit tools is MOST useful to an IS auditor when an audit trail is required?

58 / 65

58. Which of the following is a characteristic of a decision support system (DSS)?

59 / 65

59. Which of the following business purposes can be met by implementing Data warehouse in an organisation?

60 / 65

60. While posting message on FACEBOOK, if user posts the same message again, FACEBOOK gives a warning. The warning indicates which control.

61 / 65

61. Company’s billing system does not allow billing to those dealers who have not paid advance amount against proforma invoice. This check is best called as:

62 / 65

62. A central antivirus system determines whether each personal computer has the latest signature files and installs the latest signature file before allowing a PC to connect to the network. This is an example of a:

63 / 65

63.

RBI instructed banks to stop cash retraction in all ATMs across India from April 1, 2013. This was result of few ATM frauds detected. This action by RBI can be best classified as:

64 / 65

64.

An IS Auditor is performing a post implementation review of an organisation’s system and identified output errors within an accounting application. The IS Auditor determined that this was caused by input errors. Which of the following controls should the IS Auditor recommend to management?

65 / 65

65.

An IS Auditor, processes a dummy transaction to check whether the system is allowing cash payments in excess of Rs.20,000/-. This check by auditor represents which of the following evidence collection technique?

Your score is

The average score is 57%

0%

Latest updates

YouTaxClub
Logo
Compare items
  • Total (0)
Compare
0
Shopping cart