Career development plan

Assignment Help Accounting Basics
Reference no: EM13759780

1. Some of the following elements should be included in a career development plan:

a. Career path planning with management support
b. Definition of knowledge, skills, and abilities
c. Performance assessment and counseling
d. All of the above

2. Which professional certification can be helpful to an IT auditor's career?

a. CISA
b. CISSP
c. CPA
d. All of the above

3. Which IT audit area involves audit selection, definition of audit scope, initial contacts and communication with auditees and audit team selection?

a. Fact gathering
b. Audit tests
c. Audit preparation
d. Audit objectives

4. Which IT audit area involves a formal plan for reviewing and testing each significant audit subject area disclosed during the fact gathering?

a. Audit objectives
b. Audit program
c. Audit tests
d. Use of audit tools

5. Which IT audit area involves formal statements that describe a course of action that should be implemented to restore or provide accuracy, efficiency, or adequate control of an audit subject?

a. Audit tests
b. Finding of an audit report
c. Recommendations of an audit report
d. Conclusion of an audit report

6. IT audit assessment is very important and, at a minimum, consists of reviewing

a. The completeness of the audit
b. The pertinence of the information presented
c. The accuracy of the audit work and supporting working papers
d. All of the above

7. Some of the areas that one can assess for the IT auditor's individual performance are

a. Communication skills
b. Judgment
c. Auditing knowledge
d. All of the above

8. Why is it important to learn about best practices?

a. Efficiency
b. Add value to client/auditee or organization
c. Advancement in technology
d. All of the above

9. This best practice consists of a document that sets the tone or course of action you plan to take with your client/auditee:

a. Benchmarking
b. Planning memo
c. Risk analysis
d. None of the above

10. The reasons for risk analysis are

a. Loss or corruption of information and IS assets
b. Impaired and ineffective management decision making
c. Disruption to customer service or other critical operations
d. All of the above

11. IT auditing involves

a. People
b. Technology
c. Operations and systems
d. All of the above

12. COBIT was developed and issued by

a. AICPA
b. IIA
c. ISACA
d. ACFE

13. The SAC reports were issued by

a. IIA
b. ISSA
c. ISACA
d. AICPA

14. Information assurance is defined as

a. Information integrity
b. The level of confidence and trust that can be placed on the information
c. The level of trust and confidence that can be placed on service availability
d. All of the above

15. The following U.S. federal act has pledged almost a billion dollars toward curriculum, research, and skill development in IT audit, control, security, and information assurances issues:

a. Computer Fraud and Abuse Act of 1984
b. Computer Security Act of 1987
c. Cyber Security Research and Development Act
d. HIPAA Act of 1996

16. Which organization operating under U.S. national authority and its initiatives provides the foundation for a dramatic increase in the population of trained and professionalized security experts?

a. AICPA
b. ISACA
c. NIETP
d. None of the above

17. Standards for information security officers have been issued by

a. CIA
b. FBI
c. GAO
d. NSTISSC

18. A new field of opportunity and career growth is

a. Business systems analyst
b. Computer forensic analyst
c. Network administrator
d. None of the above

19. The number of universities within the United States identified as centers of excellence in information assurances is

a. 10
b. 25
c. 40
d. Greater than 49

20. The IT auditor's role in IT governance can be as

a. A counselor
b. A partner of senior management
c. An educator
d. All of the above

21. IT governance is

a. The process by which an enterprise's IT is directed and controlled
b. The evaluation of computers and information processing not as key resources
c. Management that is only involved in making decisions
d. User dominance in IT decision making

22. IT governance is controlled through a series of processes and procedures that:

a. Determine how investments are managed
b. Identify who can make decisions
c. Determine how results are measured
d. None of the above

23. For IT to be an effective partner in organizational decision making, the CIO must

a. Offer proactive solutions to organizational needs
b. Get agreement on the measures of IT performance
c. Regularly attend board meetings
d. None of the above

24. Which of the following is not a main reason for ERM functions being established within organizations?

a. Increasing software patches
b. Magnitude of problem
c. Increasing business risks
d. Organizational oversight

25. Compliance with laws and regulations is a key business risk because of

a. The controls outlined in COBIT
b. The impact on security of an organization
c. The sheer number of laws and regulations
d. The automation of financial processes

26. Continuous auditing is a technique used to

a. Create a sample of production data to test controls
b. Detect and report on control breakdowns as they occur
c. Provide a tool for business users to manage IT
d. All of the above

27. Measuring IT performance is dependent on

a. Delivering successful projects
b. Keeping operations running
c. Reducing operating costs
d. The strategy and objectives of the organization

28. Developing a successful measurement process requires

a. Alignment between IT and organization objectives
b. Mature measurement processes
c. Support from IT and organization management
d. Automated measurement tools to report accurate metrics

29. A successful measurement process includes all of the following, except

a. Ownership of the measurement process from the area to be measured.
b. Measure the effective use of resources and alignment with business objectives.
c. Measurement of events and processes rather than individuals.
d. Measurement must be meaningful, reliable, and accurately represent the area measured.

30. IT governance requires management action taken at all levels to

a. Decrease the probability of carelessness
b. Reduce outside threat and the probability of hostile penetration
c. Decrease fraud and corruption within the organization
d. All of the above

31. What is the purpose of developing an IS strategic plan?

a. Define the IT goals and objectives.
b. Guide the acquisition, allocation, and management of IT resources.
c. Define the technology to be used by the organization for the current year.
d. Provide a process for governing investments in IT.

32. The COBIT model is based on the following:

a. COSO model of internal controls
b. Capability Maturity Model
c. Project Management Body of Management
d. ISO 9000-Quality Management and Quality Assurance Standards

33. The Planning and Organization domain includes all the following except

a. Project management standards
b. Architecture planning process
c. Strategic planning process
d. Operational readiness process

34. The FFIEC is made up of representatives from

a. FRB and FDIC
b. Office of Comptroller of the Currency
c. OTS and NCUA
d. All the above plus representatives from each bank regulatory council

35. The Basel Committee believes

a. The board of directors must be involved with approval of the operational risk management plan, which includes technology risk.
b. Senior management has responsibility for implementing the plan and spreading information about the plan throughout the organization.
c. Processes must be in place to identify risks, measure them, monitor their occurrence, and control or mitigate their occurrence.
d. All of the above.

36. One of the obstacles to the success of CRM has been

a. Project management standards
b. Lack of strategic plan
c. Strategic planning process
d. Architecture planning process
e. None of the above

37. Portfolio management processes are needed to

a. Ensure new technology is approved by the appropriate groups
b. Ensure projects are completed on time, on budget, and with full functionality
c. Ensure effective and efficient IT operations
d. Ensure the effective use of resources and alignment with business objectives

38. A technical review process helps ensure that

a. The project has included all the costs of the technology solution
b. The right solution is selected that integrates with other technology components
c. The current infrastructure is sufficient to support the new technology
d. The appropriate level of senior management approvals has been received

39. Architectural standards are needed to

a. Determine which vendor products to use
b. Simplify and standardize infrastructure costs
c. Communicate programming standards to software developers
d. Speed the implementation process for new technology

40. A technical steering committee provides

a. A control mechanism for evaluating and approving new technology solutions
b. A framework for organizing and assessing software development and maintenance
c. Leadership in advancing the practice of software engineering
d. Guidance in the acquisition, allocation, and management of IT resources

41. NIST stands for which of the following?

a. National Information Security Test
b. National Institute of Standards and Testing
c. National Institute of Standards and Technology
d. National Institute of Security and Technology

42. The GAO conducts audits, surveys, investigations, and evaluations of

a. Federal agencies
b. Businesses
c. State agencies
d. All of the above

43. Which of the following organizations consists of representatives from industry, public accounting, investment firms, and the New York Stock Exchange?

a. IIA
b. COSO
c. ISACA
d. AICPA

44. Risk retention (self-insurance) methods should meet all of the following criteria, except

a. Risk should be spread physically to distribute exposure across several locations
b. Determine whether a self-insurance reserve should be established to cover a possible loss
c. Develop an internal risk management group to monitor exposures
d. Determine the maximum exposure to loss

45. Threats to integrity and privacy from inside the organization include

a. Loss or destruction of assets by malicious acts
b. Errors from incompetence or carelessness
c. Deliberate exposure of private or privileged information
d. All of the above

46. The cost of risks includes all of the following, except

a. Cost of loss-prevention measures
b. Cost of security controls
c. Cost of losses sustained
d. Insurance premiums

47. Tools used to identify risks include all of the following, except

a. Risk analysis questionnaire
b. Flowchart of operations
c. Audit workflow software
d. Insurance policy checklist

48. IT risk evaluation involves

a. Ranking of the size and probability of potential loss
b. Evaluation of the level of risk of a given process or function
c. Ensuring that risk losses do not prevent organization management from meeting its objectives
d. Retaining a portion of the risk to reduce the insurance or premium costs

49. The reasons for risk analysis are

a. Loss or corruption of information and IS assets
b. Impaired and ineffective management decision making
c. Disruption to customer service or other critical operations
d. All of the above

50. Which of the following statements regarding the effect of insurance on risk is true?

a. Prevents loss or damage to the organization
b. Transfers risk of loss or damage to the insurance company
c. Risks are not managed when insured
d. None of the above

Reference no: EM13759780

Questions Cloud

Night sky observations : One or any other software as well as the sky observation tools you may have to assist your observations.
Waterfall model : Describe the waterfall model for software development and list three of its advantages for software development.
Consumer protection and protecting consumers : Determine the two most essential means of protection for citizens AND whether the U.S. government should do more to protect consumers or if consumers should become more aware and informed in today’s business environment?
Significant positive impacts of health care reform : What major trends affecting health care delivery will be important in the next 5 years? What are the most significant positive impacts of health care reform? What are likely to be the most serious problems?
Career development plan : Some of the following elements should be included in a career development plan:
Non-tax benefits of qualified plans : There are many non-tax benefits of qualified plans. One of the biggest non-tax benefits of qualified plans is that contributions today can help meet future goals of financial security. Social security cannot be solely relied upon to meet retirement g..
Clinical evaluation of a patient in the ehr : Patient Problem List for the Clinical Evaluation of a Patient in the EHR, Write a two page paper (excluding title and reference pages), and formatted according to APA style, that includes the rationale of a problem list and give at least two reaso..
Important activities in supply chain design : One of the most important activities in supply chain design is selection of suppliers. Discuss what criteria (other than price) might be used to select the suppliers.
Write essay on political economy of lesbian and gayidentity : Write essay on "Advertising and the political economy of lesbian/gayidentity" and write a 300 word response answering the questions: What is Fejes argument and is it still valid today?

Reviews

Write a Review

Accounting Basics Questions & Answers

  1 beech soda inc uses a perpetual inventory system the

1 beech soda inc. uses a perpetual inventory system. the companys beginning inventory of a particular product and its

  Riggins inc manufactures one product called tybos the

riggins inc. manufactures one product called tybos. the company uses a standard cost system and sells each tybo for 8.

  Amount of principal reduction

Assuming that this lease is properly classified as a capital lease, what is the amount of principal reduction recorded when the second lease payment is made in Year 2?

  If you invest 750 every six months at 8 percent compounded

if you invest 750 every six months at 8 percent compounded semi-annually how much would you accumulate at the end of 10

  Why are worksheet entry required in different fiscal period

James, Inc., sells inventory to Matthews Company, a related party, at James's standard markup. At the current fiscal year-end, Matthews still holds some portion of this inventory -why are worksheet entries required in two different fiscal periods?

  Financial statements are useless

Financial statements are useless

  Details regarding journal entries

On November 19, 2007, Albatross Corporation purchased 30,000 shares of ABC Corporation stock for $480,000, and 10,000 shares of Milken Corporation stock for $250,000. In Microsoft Excel format, please prepare a journal with Albatross's entries for ..

  Arnies landscaping company is preparing its budget for the

arnies landscaping company is preparing its budget for the first quarter of 2012. the next step in the budgeting

  Werth company produces tie racks the estimated fixed costs

werth company produces tie racks. the estimated fixed costs for the year are 288000 and the estimated variable costs

  Total machine hours incurred during the year 118000

the following information relates to araceli manufacturing companytotal estimated maunufacturing overhead cost at

  Even though you could treat every single item above

chateau sneuti is a family owned winery in the bordeau region of france. harvesting season in early fall is the busy

  Re-figuring the depletion rate for year

Change in estimated amount of ore to be mined from year one to year 2. year 1 is 400000 and year 2 is 487500 tons. mined 50000tons in first year and mined 80,000 tons second year of which 60000 tons sold residual or salvage value of the land is $1..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd