Which of the following is the MOST important issue to the IS
auditor in a business process re-engineering (BPR) project
would be?
A. The loss of middle management, which often is a result of
a BPR project
B. That controls are usually given low priority in a BPR project
C. The considerable negative impact that information
protection could have on BPR
D. The risk of failure due to the large size of the task
usually undertaken in a BPR project
Answers were Sorted based on User's Feedback
Answer / guest
Answer: B
Controls should be given high priority during a BPR project,
therefore this would be a concern for the IS auditor if they
are not adequately considered by management. The fact that
middle management is lost, as stated in choice A, is not
necessarily a concern as long as controls are in place.
Choices C and D do not have any relevance to a BPR project.
| Is This Answer Correct ? | 8 Yes | 0 No |
Answer / antoine
B. That controls are usually given low priority in a BPR
project
| Is This Answer Correct ? | 0 Yes | 0 No |
An IS auditor should be involved in: A. observing tests of the disaster recovery plan. B. developing the disaster recovery plan. C. maintaining the disaster recovery plan. D. reviewing the disaster recovery requirements of supplier contracts.
Which of the following is the MOST critical and contributes the MOST to the quality of data in a data warehouse? A. Accuracy of the source data B. Credibility of the data source C. Accuracy of the extraction process D. Accuracy of the data transformation
The extent to which data will be collected during an IS audit should be determined, based on the: A. availability of critical and required information. B. auditor's familiarity with the circumstances. C. auditee's ability to find relevant evidence. D. purpose and scope of the audit being done.
The use of residual biometric information to gain unauthorized access is an example of which of the following attacks? A. Replay B. Brute force C. Cryptographic D. Mimic
Confidential data stored on a laptop is BEST protected by: A. storage on optical disks. B. logon ID and password. C. data encryption. D. physical locks.
E-mail message authenticity and confidentiality is BEST achieved by signing the message using the:
The knowledge base of an expert system that uses questionnaires to lead the user through a series of choices before a conclusion is reached is known as: A. rules. B. decision trees. C. semantic nets. D. data flow diagrams.
Which of the following techniques would provide the BEST assurance that the estimate of program development effort is reliable? A. Function point analysis B. Estimates by business area C. A computer-based project schedule D. An estimate by experienced programmer
After implementation of a disaster recovery plan (DRP), pre-disaster and post-disaster operational cost for an organization will: A. decrease. B. not change (remain the same). C. increase. D. increase or decrease depending upon nature of the business.
Testing the connection of two or more system components that pass information from one area to another is: A. pilot testing. B. parallel testing C. interface testing. D. regression testing.
An IS auditor doing penetration testing during an audit of Internet connections would: A. evaluate configurations. B. examine security settings. C. ensure virus-scanning software is in use. D. use tools and techniques that are available to a hacker.
With the help of the security officer, granting access to data is the responsibility of: A. data owners. B. programmers. C. system analysts. D. librarians.