CMT 446 Jan-Apr 2021 Exam
CMT 446 Jan-Apr 2021 Exam
CMT 446 Jan-Apr 2021 Exam
FACULTY OF SCIENCE
REGULAR PROGRAMME
b) The framework for the ISACA IS Auditing Standards provides for multiple levels, as follows:
(i) Standards
(ii) Guidelines
(iii) Procedures
f) One of the Codes of professional ethics states that “Perform their duties with objectivity, due
diligence and professional care, in accordance with professional standards and best practices”.
i) Objectivity (1 Mark)
g) The Audit methodology consists of eight steps. List them in their correct order. (5 Marks)
Audit report preparation, Data gathering, Audit scope, Pre-audit planning, Audit objective,
i) At what step in the audit process should specific functions to be examined be identified? (1
Mark)
ii) At what step in the audit process do you identify follow-up review procedures? (1 Mark)
iii) At what step in the audit process do you identify the individuals to be interviewed? (1 Mark)
h) The internal audit department wrote some scripts that are used for continuous auditing of
some information systems. The IT department asked for copies of the scripts so that they can
use them for setting up a continuous monitoring process on key systems. Does sharing this
scripts with IT department affect the ability of the IS auditors to independently and objectively
QUESTION TWO
(a) (i) Controls are generally categorized into three major classifications. List these three and
iii) An IS auditor is reviewing security controls for a critical web-based system prior to
implementation. The results of the penetration test are inconclusive, and the results will not be
finalized prior to implementation. What action should the IS auditor take? Justify your answer.
(3 Marks)
(ii) An IS auditor is developing an audit plan for an environment that includes new systems. The
(d) An Information system auditor encounters several computer forensic scenarios in the course
QUESTION THREE
(b) With a well labeled diagram, show the relationship of the four elements given above. (4
Marks)
(c) i) The decisions and actions of an IS auditor are MOST likely to affect which type of risk?
(2 Marks)
ii) An IS auditor is conducting a review of software usage and licensing discovers that numerous
PCs contain unauthorized software. What action should the auditor take? (2 Marks)
d) An IS auditor finds a small number of user access requests that had not been authorized by
managers through the normal predefined workflow steps and escalation rules. What action
e) Which sampling method is MOST useful when testing for compliance? (2 Marks)
QUESTION FOUR
a) Which control is the BEST way to ensure that data in a file have not been changed during
transmission? (2 Marks)
b) Which information asset protection technique would MOST effectively prevent unauthorized
c) An organization IT director has approved the installation of Wireless Local Area Network in a
conference room for a team of consultants to access the internet with their laptop computers.
What is the BEST control to protect the corporate servers from unauthorized access? (2
Marks)
The auditor discovers that the database servers are clustered for high availability, all default
database accounts have been removed and database audit logs are kept and reviewed on a
weekly basis.
What other area should the auditor check to ensure that the databases are appropriately
secured? (2 Marks)
systems? (2 Marks)
f) What would be the BEST defense against the introduction of Trojan horse software into an
organization? (2 Marks)
g) What would be the BEST control to implement in order to mitigate the risk of an insider
attack? (2 Marks)
h) A rigid methodology is used to preserve the chain of custody in evidence handling. Arrange
Preserve and authenticate, Identify and acquire, Analyze, record, and present
j) The vice president of HR has requested an IS audit to identify payroll overpayments for the
previous year. Which would be the BEST audit technique to use in this situation? (2 Marks)
QUESTION FIVE
a) Which software should an IS auditor use to detect duplicate invoice records within an invoice
b) Which is the MOST important reason for an IS auditor to obtain sufficient and appropriate
c) What is the PRIMARY purpose for meeting with auditees prior to formally closing a review?
(2 Marks)
d) Which audit technique would BEST aid an auditor in determining whether there have been
unauthorized program changes since the last authorized program update? (2 Marks)
h) Who makes the final decision to include a material finding in an audit report (2 Marks)
i) Which audit technique would be MOST effective for identifying segregation of duties violations
j) What is the PRIMARY reason an IS auditor performs a functional walkthrough during the