100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

CISA Study Guide Questions & 100% Correct Answers

Rating
-
Sold
-
Pages
175
Grade
A+
Uploaded on
09-09-2024
Written in
2024/2025

Most important step in risk analysis is to identify a. Competitors b. controls c. vulnerabilities d. liabilities :~~ c. vulnerabilities In a risk based audit planning, an IS auditor's first step is to identify: a. responsibilities of stakeholders b. high-risk areas within the organization c. cost centre d. profit centre :~~ b. high-risk areas within the organization When developing a risk-based audit strategy, an IS auditor should conduct a risk assessment to ensure that: 2 | P a g e | © copyright 2024/2025 | Grade A+ Master01 | September, 2024/2025 | Latest update a. segregation of duties to mitigate risks is in place b. all the relevant vulnerabilities and threats are identified c. regularity compliance is adhered to d. business is profitable :~~ b. all the relevant vulnerabilities and threats are identified IS auditor identified certain threats and vulnerabilities in a business process. Next, an IS auditor should: a. identify stakeholder for that business process b. identifies information. assets and the underlying systems c. discloses the threats and impacts to management d. identifies and evaluates the existing controls :~~ d. identifies and evaluates the existing controls Major advantaged of risk based approach for audit planning is: a. Audit planning can be communicated to client in advance b. Audit activity can be completed within allotted budget c. use of latest technology for audit activities 3 | P a g e | © copyright 2024/2025 | Grade A+ Master01 | September, 2024/2025 | Latest update d. Appropriate utilisation of resources for high risk areas :~~ d. Appropriate utilisation of resources for high risk areas While determining the appropriate level of protection for an information asset an IS auditor should primarily focus on: a. Criticality of information assets b. cost of information assets c. Owner of information asset d. result of vulnerability assessment :~~ a. Criticality of information assets The decisions and actions of an IS auditor are MOST likely to affect which of the following risks? a. Inherent b. Detection c. Control d. Business :~~ b. Detection 4 | P a g e | © copyright 2024/2025 | Grade A+ Master01 | September, 2024/2025 | Latest update The risk of an IS auditor certifying existence of proper system and procedures without using an inadequate test procedure is an example of: a. internet risk b. control risk c. detection risk d. audit risk :~~ c. Detection risk Overall business risk for a particular threat can be expressed as: a. a product of the probability. and impact b. probability of occurrence c. magnitude of impact d. assumption of the risk assessment team :~~ a. a product of the

Show more Read less
Institution
CISA
Course
CISA

Content preview

1 | P a g e | © copyright 2024/2025 | Grade A+




CISA Study Guide Questions & 100%
Correct Answers
Most important step in risk analysis is to identify




a. Competitors

b. controls

c. vulnerabilities

d. liabilities

✓ :~~ c. vulnerabilities




In a risk based audit planning, an IS auditor's first step is to identify:




a. responsibilities of stakeholders

b. high-risk areas within the organization

c. cost centre

d. profit centre

✓ :~~ b. high-risk areas within the organization




When developing a risk-based audit strategy, an IS auditor should conduct a risk

assessment to ensure that:




Master01 | September, 2024/2025 | Latest update

, 2 | P a g e | © copyright 2024/2025 | Grade A+




a. segregation of duties to mitigate risks is in place

b. all the relevant vulnerabilities and threats are identified

c. regularity compliance is adhered to

d. business is profitable

✓ :~~ b. all the relevant vulnerabilities and threats are identified




IS auditor identified certain threats and vulnerabilities in a business process. Next,

an IS auditor should:




a. identify stakeholder for that business process

b. identifies information. assets and the underlying systems

c. discloses the threats and impacts to management

d. identifies and evaluates the existing controls

✓ :~~ d. identifies and evaluates the existing controls




Major advantaged of risk based approach for audit planning is:




a. Audit planning can be communicated to client in advance

b. Audit activity can be completed within allotted budget

c. use of latest technology for audit activities


Master01 | September, 2024/2025 | Latest update

, 3 | P a g e | © copyright 2024/2025 | Grade A+


d. Appropriate utilisation of resources for high risk areas

✓ :~~ d. Appropriate utilisation of resources for high risk areas




While determining the appropriate level of protection for an information asset an

IS auditor should primarily focus on:




a. Criticality of information assets

b. cost of information assets

c. Owner of information asset

d. result of vulnerability assessment

✓ :~~ a. Criticality of information assets




The decisions and actions of an IS auditor are MOST likely to affect which of the

following risks?




a. Inherent

b. Detection

c. Control

d. Business

✓ :~~ b. Detection




Master01 | September, 2024/2025 | Latest update

, 4 | P a g e | © copyright 2024/2025 | Grade A+


The risk of an IS auditor certifying existence of proper system and procedures

without using an inadequate test procedure is an example of:




a. internet risk

b. control risk

c. detection risk

d. audit risk


✓ :~~ c. Detection risk




Overall business risk for a particular threat can be expressed as:




a. a product of the probability. and impact

b. probability of occurrence

c. magnitude of impact

d. assumption of the risk assessment team

✓ :~~ a. a product of the probability. and impact




An IS auditor is evaluating management's risk assessment of information systems.

The IS auditor should FIRST review:




a. the controls already in place



Master01 | September, 2024/2025 | Latest update

Written for

Institution
CISA
Course
CISA

Document information

Uploaded on
September 9, 2024
Number of pages
175
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Graders University Of New Hampshire
View profile
Follow You need to be logged in order to follow users or courses
Sold
519
Member since
2 year
Number of followers
167
Documents
27866
Last sold
1 hour ago
Study Smart

Your one-stop resource for high-quality, exam-focused study materials. Here, you'll find expertly crafted summaries, past exam papers, notes, and assignments tailored to help you succeed in your courses. Every document is written with clarity, accuracy, and exam performance in mind—saving you hours of studying and helping you boost your grades. ✅ Clear and well-structured content ✅ Covers key exam topics and common questions ✅ Trusted by students for academic success ✅ Instant downloads and affordable prices Whether you're cramming for finals or just staying ahead in class, my materials are designed to make your studying smarter, not harder. Take a look around and get the edge you need!

Read more Read less
3.8

123 reviews

5
54
4
26
3
22
2
4
1
17

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions