< Return to Video

CISA Exam Questions | CISA Domain 1-5 Exam Question | How to Think Like IS Auditor ?

  • 0:00 - 0:02
  • 0:02 - 0:05
    [AUDIO LOGO]
  • 0:05 - 0:07
  • 0:07 - 0:07
    Hi all.
  • 0:07 - 0:10
    Good morning to
    the session today.
  • 0:10 - 0:15
    So this session is basically for
    the CISA, certified information
  • 0:15 - 0:16
    systems auditor.
  • 0:16 - 0:19
    And we will be discussing
    on the question and answers,
  • 0:19 - 0:22
    and basically on how to
    approach the exam questions.
  • 0:22 - 0:25
    This is in line with the
    ISACA's thought process
  • 0:25 - 0:27
    or how you need to
    approach a question,
  • 0:27 - 0:29
    how you need to answer
    a question while you
  • 0:29 - 0:31
    are taking the real exam.
  • 0:31 - 0:34
    So we will be having the
    questions taken from the CRM,
  • 0:34 - 0:36
    as an extract, and
    we will be discussing
  • 0:36 - 0:40
    in detail what is the
    mode of a thought process
  • 0:40 - 0:43
    that you need to inculcate while
    you are preparing for the exam,
  • 0:43 - 0:45
    as well as when you are in exam.
  • 0:45 - 0:49
    So if I start off with,
    we will have this,
  • 0:49 - 0:52
    the agenda would be the small
    introduction about myself
  • 0:52 - 0:55
    and you, and I'll
    tell a brief note
  • 0:55 - 0:58
    on how you need to approach
    the CISA questions.
  • 0:58 - 1:01
    And we will be discussing
    domain 1 to 5 questions
  • 1:01 - 1:04
    and how we need to think
    like an IS auditor.
  • 1:04 - 1:08
    That will be going in line with
    the 1 to 5 domain questions
  • 1:08 - 1:09
    that we are discussing.
  • 1:09 - 1:11
    That will be in parallel.
  • 1:11 - 1:15
    And a final Q&A
    will be for you all
  • 1:15 - 1:18
    to openly ask some
    questions regarding CISA.
  • 1:18 - 1:20
    That is the end of the session.
  • 1:20 - 1:23
    So the introduction about
    myself is that my name
  • 1:23 - 1:24
    is Krishnan Ramani.
  • 1:24 - 1:26
    I think some of you would
    have seen me in LinkedIn.
  • 1:26 - 1:29
    So I'm an information security
    and an IT audit expert,
  • 1:29 - 1:31
    with a total of 13
    years experience
  • 1:31 - 1:34
    into IT auditing,
    information security domain,
  • 1:34 - 1:37
    out of which eight years
    is solely dedicated.
  • 1:37 - 1:39
    I have a wide
    variety of experience
  • 1:39 - 1:45
    in IT audits, IT security, GRC,
    ITGC, and IT security strategy.
  • 1:45 - 1:49
    So my certifications
    are CISSP, CISA,
  • 1:49 - 1:54
    for which I was a chapter
    rank holder, a first rank
  • 1:54 - 1:57
    holder, and CEH, which
    is the Certified Ethical
  • 1:57 - 2:00
    Hacking, version 10, and
    I'm a Lean Six Sigma Black
  • 2:00 - 2:03
    Belt certified, and I have
    done business analytics.
  • 2:03 - 2:07
    And I am also into a certified
    cybercrime intervening officer.
  • 2:07 - 2:11
    So let us start with
    this thought process, why
  • 2:11 - 2:13
    we are coming for CISA.
  • 2:13 - 2:15
    Let me pause here for a moment.
  • 2:15 - 2:18
    So what is the objective?
  • 2:18 - 2:21
    So there is a
    practical relevance.
  • 2:21 - 2:24
    So every detail given
    in the CRM book,
  • 2:24 - 2:26
    which is the CISA
    review manual, there
  • 2:26 - 2:29
    is a practical
    relevance for you to do.
  • 2:29 - 2:33
    And while you are working as
    an auditor or an IT auditor,
  • 2:33 - 2:36
    even when you are working
    as an ITGC person, which
  • 2:36 - 2:41
    is the general controls,
    and any line of defense,
  • 2:41 - 2:45
    from CRM or PRC technology,
    risk management and everything.
  • 2:45 - 2:47
    So probably what
    happens is there
  • 2:47 - 2:50
    is a pure practical relevance
    in terms of understanding
  • 2:50 - 2:53
    these controls, what
    IT audit is all about,
  • 2:53 - 2:55
    how do we preserve
    things, how do we
  • 2:55 - 2:57
    maintain staffs, what
    are all the things.
  • 2:57 - 3:00
    Because as an IS auditor, you
    will be reading this book.
  • 3:00 - 3:04
    But once when it comes to the
    implementation part as well,
  • 3:04 - 3:06
    there are a lot of clues that
    has been given in the book,
  • 3:06 - 3:08
    in terms of how do
    you preserve stuff
  • 3:08 - 3:11
    so that it will be good for
    an audit and everything.
  • 3:11 - 3:15
    So in that mode, it is very
    relevant to the present day
  • 3:15 - 3:16
    world.
  • 3:16 - 3:18
    And as we see, the
    technology is also
  • 3:18 - 3:20
    emerging at this point in time.
  • 3:20 - 3:22
    So today, there is
    something called cloud.
  • 3:22 - 3:24
    Tomorrow there
    will be something--
  • 3:24 - 3:25
    a new technology
    will be arriving,
  • 3:25 - 3:28
    and everything will
    be changing overnight.
  • 3:28 - 3:31
    But what we need to do is the
    fundamentals remain the same.
  • 3:31 - 3:33
    So what are all the things
    that we are going to see?
  • 3:33 - 3:35
    What are all the
    things that we are
  • 3:35 - 3:37
    going to look whenever
    we are auditing
  • 3:37 - 3:41
    or whenever we are performing
    the role of information security
  • 3:41 - 3:43
    analyst or any other thing?
  • 3:43 - 3:47
    But this book is purely based,
    purely focused on the IS auditor
  • 3:47 - 3:49
    side of things.
  • 3:49 - 3:53
    So the prism of optics is
    purely from the IS auditor
  • 3:53 - 3:53
    point of view.
  • 3:53 - 3:56
    Because the moment
    you start thinking
  • 3:56 - 4:00
    as IS security analyst
    for this exam, that
  • 4:00 - 4:03
    will not be the correct
    thing that we will be doing.
  • 4:03 - 4:07
    So what we need to approach,
    how we need to approach
  • 4:07 - 4:10
    and what we need to
    do is exactly what
  • 4:10 - 4:11
    I am going to tell here.
  • 4:11 - 4:14
    So the questions will
    be-- each question
  • 4:14 - 4:17
    has a stem question, which
    will be a basic question, which
  • 4:17 - 4:19
    will be having four options.
  • 4:19 - 4:22
    Choose the correct
    or the best option.
  • 4:22 - 4:25
    So as I was telling,
    so the scenarios
  • 4:25 - 4:29
    will be completely related
    to the IS audit scenarios.
  • 4:29 - 4:31
    You will be presented
    a situation.
  • 4:31 - 4:33
    You will need to think
    like an IS auditor
  • 4:33 - 4:35
    and answer like an IS auditor.
  • 4:35 - 4:37
    So there are some
    helpful instances
  • 4:37 - 4:41
    where you know how you
    will be approaching.
  • 4:41 - 4:43
    So every questions will be--
  • 4:43 - 4:45
    most of the questions,
    not every questions,
  • 4:45 - 4:49
    will be having something
    called the best, most,
  • 4:49 - 4:52
    and these kind of wordings
    will be definitely there.
  • 4:52 - 4:56
    So you need to understand what
    they are asking in the question.
  • 4:56 - 5:00
    Because the moment they say,
    choose for the best option,
  • 5:00 - 5:02
    choose for the most
    relevant option,
  • 5:02 - 5:05
    choose for the primary option,
    choose for the first option,
  • 5:05 - 5:09
    so it means that two or more
    options that is being given
  • 5:09 - 5:12
    are right in the
    context of the question,
  • 5:12 - 5:14
    but only one thing
    can be the best.
  • 5:14 - 5:16
    Only one thing can
    be the primary.
  • 5:16 - 5:18
    Only one thing can be the first.
  • 5:18 - 5:21
    So you need to choose
    the answers accordingly.
  • 5:21 - 5:25
    So say for an example, if there
    is a given scenario of a BCP
  • 5:25 - 5:27
    process, how it comes
    to the business impact
  • 5:27 - 5:31
    analysis and everything, so
    once you start the question,
  • 5:31 - 5:33
    you will need to know what
    are all the steps involved
  • 5:33 - 5:35
    in the BCP process.
  • 5:35 - 5:38
    How do you conduct the
    business impact analysis?
  • 5:38 - 5:39
    How do you identify
    the business?
  • 5:39 - 5:42
    These step-by-step
    process is definitely
  • 5:42 - 5:44
    essential in order
    for you to understand
  • 5:44 - 5:48
    what is the first most
    option that the IS auditor
  • 5:48 - 5:49
    will be choosing.
  • 5:49 - 5:51
    But it will not be as
    straightforward as,
  • 5:51 - 5:54
    what is the first
    option in the BCP?
  • 5:54 - 5:57
    There will be a presentation
    in terms of a scenario given.
  • 5:57 - 5:59
    So you need to
    understand the scenario,
  • 5:59 - 6:02
    and you need to
    answer accordingly.
  • 6:02 - 6:05
    So read all the options
    and read the stem again,
  • 6:05 - 6:07
    if you can eliminate
    two options.
  • 6:07 - 6:09
    So that is very important.
  • 6:09 - 6:11
    Read all the options.
  • 6:11 - 6:14
    And so if you can eliminate two
    options, that will be great.
  • 6:14 - 6:16
    So in the context
    of the question
  • 6:16 - 6:19
    and answers in multiple
    choice questions,
  • 6:19 - 6:22
    there is always a method
    called elimination method.
  • 6:22 - 6:25
    So in terms of how do
    you answer a question,
  • 6:25 - 6:30
    elimination method is really
    a good method to start with.
  • 6:30 - 6:32
    Because once you
    start eliminating
  • 6:32 - 6:35
    two incorrect
    answers, so you will
  • 6:35 - 6:37
    have a 50% chance
    of clearing the exam
  • 6:37 - 6:41
    or clearing the particular
    question correctly.
  • 6:41 - 6:46
    Because what you have is a 100
    percentage, and out of which,
  • 6:46 - 6:48
    you know you have already
    eliminated two irrelevant
  • 6:48 - 6:50
    relevant answers.
  • 6:50 - 6:52
    In most of the cases,
    two irrelevant answers
  • 6:52 - 6:54
    will be definitely visible.
  • 6:54 - 6:56
    Once you have read
    the CRM and you
  • 6:56 - 6:58
    have answered sufficient
    number of questions,
  • 6:58 - 7:00
    you will be able
    to identify what
  • 7:00 - 7:02
    are the two irrelevant
    answers, and you
  • 7:02 - 7:06
    will be able to straight away
    eliminate it and focus your time
  • 7:06 - 7:08
    and efforts only
    on the two, which
  • 7:08 - 7:11
    has been most relevant for
    that particular context.
  • 7:11 - 7:16
    So reread the remaining
    options and bring
  • 7:16 - 7:18
    in any personal experience
    that you may have to determine.
  • 7:18 - 7:21
    So the bringing the
    personal experience,
  • 7:21 - 7:23
    I would say it is with a caveat.
  • 7:23 - 7:27
    Because in terms of bringing
    your personal experience,
  • 7:27 - 7:31
    sometimes what happens is you
    need to think like an IS auditor
  • 7:31 - 7:32
    from ISACA's point of view.
  • 7:32 - 7:35
    So the moment you start thinking
    from your company's point
  • 7:35 - 7:36
    of view, probably
    some of you would
  • 7:36 - 7:39
    have had a seasoned
    experience in terms
  • 7:39 - 7:41
    of doing the IS audit
    and the IT auditing
  • 7:41 - 7:43
    or whatever the
    security or whatever.
  • 7:43 - 7:46
    But the moment you start
    thinking from your company's
  • 7:46 - 7:49
    perspective, things might go
    a little bit wrong because
  • 7:49 - 7:53
    of the fact that the companies
    or the organizations,
  • 7:53 - 7:56
    they actually
    tailor the controls
  • 7:56 - 7:58
    according to their
    requirement, and they customize
  • 7:58 - 8:02
    it, which in case is not
    in ISACA's point of view
  • 8:02 - 8:07
    because ISACA's point of view
    is, I would call it as more
  • 8:07 - 8:11
    raw because it is a theoretical
    and practical knowledge of how
  • 8:11 - 8:15
    you need to apply, but it is not
    in any specific contextual-based
  • 8:15 - 8:17
    or organization-based controls.
  • 8:17 - 8:20
    Because banking will be having
    a different set of approach
  • 8:20 - 8:24
    towards the same control,
    and another industry
  • 8:24 - 8:26
    will be having--
    healthcare for that matter,
  • 8:26 - 8:29
    will be having a different
    approach to the same control.
  • 8:29 - 8:31
    So think like an IS auditor.
  • 8:31 - 8:33
    Of course, a little bit of
    n percentage of your work
  • 8:33 - 8:34
    experience also.
  • 8:34 - 8:38
    That is a logical mind,
    that will also help,
  • 8:38 - 8:43
    but in my best opinion, I
    would suggest that let's not
  • 8:43 - 8:48
    think that over the board and
    think like 100% as an IT auditor
  • 8:48 - 8:50
    because we'll be having
    a specific industry
  • 8:50 - 8:52
    experience wherein the
    controls might be having
  • 8:52 - 8:55
    a different approach,
    and sometimes the answers
  • 8:55 - 8:57
    can go incorrect.
  • 8:57 - 9:00
    So the next thing is
    that domain 1 question.
  • 9:00 - 9:03
    So first question is, so
    which of the following
  • 9:03 - 9:05
    outlines the overall authority
    to perform an IS audit?
  • 9:05 - 9:08
    The audit scope or the goals
    and objectives, a request
  • 9:08 - 9:12
    form in the form of management
    to perform an audit, C, an audit
  • 9:12 - 9:14
    charter, D, an approved
    audit schedule.
  • 9:14 - 9:17
    I think this is very
    easy question, I think.
  • 9:17 - 9:19
    What defines the
    overall authority?
  • 9:19 - 9:22
    I think the chapter
    1, the domain 1
  • 9:22 - 9:23
    gives you a very
    decent information
  • 9:23 - 9:26
    on the overall authority.
  • 9:26 - 9:29
    Because once you see
    the question authority,
  • 9:29 - 9:33
    the answer is always
    the approved charter
  • 9:33 - 9:36
    because let's look
    at the reasoning.
  • 9:36 - 9:38
    The audit scope is
    specific to a single audit,
  • 9:38 - 9:41
    and it does not grant
    authority to perform an audit.
  • 9:41 - 9:44
    B, the request from
    management to perform an audit
  • 9:44 - 9:47
    is not sufficient because it
    relates to specific audit.
  • 9:47 - 9:49
    The approved audit
    charter outlines
  • 9:49 - 9:53
    the auditor's responsibility,
    authority and accountability.
  • 9:53 - 9:56
    So as I told, this
    is the only document
  • 9:56 - 9:59
    which gives you an end-to-end
    perspective on what
  • 9:59 - 10:02
    it is for an auditor, why
    the auditor is there, what
  • 10:02 - 10:04
    is the authority that
    the auditor is having,
  • 10:04 - 10:06
    what are all the things
    that the auditor can do.
  • 10:06 - 10:10
    So everything is given or
    entitled in one document.
  • 10:10 - 10:12
    That is the reason
    we need to have
  • 10:12 - 10:16
    selected option C. The approved
    audit schedule does not
  • 10:16 - 10:17
    grant the authority.
  • 10:17 - 10:21
    The whole point is why this
    was a very easy question.
  • 10:21 - 10:24
    But again, so the
    point of this question
  • 10:24 - 10:27
    is to give you a
    perspective on what you
  • 10:27 - 10:29
    need to look into a question.
  • 10:29 - 10:31
    So when you start
    looking into a question,
  • 10:31 - 10:34
    so let me tell you
    what is very important.
  • 10:34 - 10:40
    If you see over here, so the
    overall authority over here,
  • 10:40 - 10:43
    that is the key word
    because every question,
  • 10:43 - 10:48
    and even in the exam, will
    be having some key word that
  • 10:48 - 10:49
    defines the answer correctly.
  • 10:49 - 10:51
    Because as I told.
  • 10:51 - 10:52
    You need to
    eliminate two things.
  • 10:52 - 10:54
    So in this, I will
    be eliminating
  • 10:54 - 10:56
    a request form,
    which is definitely
  • 10:56 - 10:59
    not an overall authority, and
    an approved audit schedule.
  • 10:59 - 11:02
    Audit schedule is
    only in terms of what
  • 11:02 - 11:04
    is the timeline that they
    are going to work on,
  • 11:04 - 11:06
    then they are going to carry on
    the planning work, when they are
  • 11:06 - 11:09
    going to carry on the field
    work, when the reporting is
  • 11:09 - 11:12
    going to be done, what is the
    timeline for remediation and all
  • 11:12 - 11:13
    those stuff.
  • 11:13 - 11:15
    But in terms of a
    request form, that
  • 11:15 - 11:19
    is in terms of just defining
    what the management is going
  • 11:19 - 11:23
    to look out for and
    a permission letter
  • 11:23 - 11:24
    or something of that sort.
  • 11:24 - 11:27
    But the two options,
    again, as I told,
  • 11:27 - 11:30
    the closest that
    relates to this question
  • 11:30 - 11:32
    will be the option
    A and option C.
  • 11:32 - 11:37
    Because once I say that option
    A-- but again, as I told,
  • 11:37 - 11:41
    the overall authority is
    the word that defines,
  • 11:41 - 11:44
    in terms of what is going to
    be the primary thing that you
  • 11:44 - 11:47
    are going to look
    out for over here.
  • 11:47 - 11:51
    So the next question, so in
    performing a risk-based audit,
  • 11:51 - 11:54
    which risk assessment
    is completed first
  • 11:54 - 11:55
    by an IS auditor?
  • 11:55 - 11:58
    So detection risk assessment,
    control risk assessment,
  • 11:58 - 12:02
    inherent risk assessment,
    and fraud risk assessment.
  • 12:02 - 12:05
    So again, the question
    is very clear in terms
  • 12:05 - 12:08
    of what an IS auditor,
    which risk assessment
  • 12:08 - 12:10
    comes in the first?
  • 12:10 - 12:12
    Let's look at the
    correct answer now.
  • 12:12 - 12:15
    So the correct
    answer is actually
  • 12:15 - 12:16
    inherent risk assessment.
  • 12:16 - 12:20
    So why inherent risk
    assessment is important?
  • 12:20 - 12:22
    So let us look at the
    reasons over here.
  • 12:22 - 12:25
    So detection of risk
    assessment is performed only
  • 12:25 - 12:26
    after the inherent risk.
  • 12:26 - 12:31
    So as again I told, the stepwise
    answer is very important.
  • 12:31 - 12:32
    What is the first?
  • 12:32 - 12:33
    What is the first?
  • 12:33 - 12:35
    So you need to
    know which is going
  • 12:35 - 12:37
    to come in the first
    order, which is going
  • 12:37 - 12:40
    to come in the second order?
  • 12:40 - 12:42
    So the detection
    risk assessment is
  • 12:42 - 12:44
    performed only after
    the inherent risk
  • 12:44 - 12:46
    and the controlled risk
    assessment have been performed.
  • 12:46 - 12:48
    So definitely this
    answer can be eliminated.
  • 12:48 - 12:51
    And control risk
    assessment is performed
  • 12:51 - 12:54
    after the inherent risk
    assessment has been completed.
  • 12:54 - 12:56
    And it is to determine
    the level of risk
  • 12:56 - 12:59
    that remains after the
    controls have been applied.
  • 12:59 - 13:01
    So say for an example, this
    control risk assessment
  • 13:01 - 13:02
    is right.
  • 13:02 - 13:05
    So it is going to give
    you what is left over.
  • 13:05 - 13:08
    So even after applying
    all the controls,
  • 13:08 - 13:11
    what is the risk that
    is going to remain?
  • 13:11 - 13:13
    And that option D, the
    fraud risk assessment,
  • 13:13 - 13:16
    are a subset of control
    risk assessment.
  • 13:16 - 13:18
    It is important,
    but again, it is not
  • 13:18 - 13:22
    as important or the first
    task of the inherent risk.
  • 13:22 - 13:25
    Because whenever you take
    any process, for that matter,
  • 13:25 - 13:27
    there will be a form
    of inherent risk, which
  • 13:27 - 13:30
    has to be taken into
    consideration before doing
  • 13:30 - 13:30
    anything.
  • 13:30 - 13:34
    Because inherent risk exists
    independently of an audit
  • 13:34 - 13:36
    and can occur because of
    the nature of the business.
  • 13:36 - 13:38
    So to successfully
    conduct an audit,
  • 13:38 - 13:41
    it is important to be aware of
    the related business processes.
  • 13:41 - 13:44
    To perform the
    audit, an IS auditor
  • 13:44 - 13:46
    needs to understand
    the business processes.
  • 13:46 - 13:48
    By understanding the
    business process,
  • 13:48 - 13:51
    an IS auditor better
    understands the inherent risk.
  • 13:51 - 13:54
    So inherent risk gives
    you an overall idea.
  • 13:54 - 13:56
    for an example, if
    the IS auditor is
  • 13:56 - 13:59
    performing an inherent risk--
  • 13:59 - 14:02
    an audit in a
    banking sector, they
  • 14:02 - 14:04
    will be having certain sets
    of inherent risks according
  • 14:04 - 14:05
    to them.
  • 14:05 - 14:07
    And if they are doing some kind
    of audits in the health sector,
  • 14:07 - 14:11
    they will be again having
    some set of inherent risk
  • 14:11 - 14:12
    in that particular sector.
  • 14:12 - 14:14
    So that is the reason
    we need to know
  • 14:14 - 14:17
    the inherent risk of
    that particular industry
  • 14:17 - 14:18
    or the particular
    business process
  • 14:18 - 14:19
    that they are performing.
  • 14:19 - 14:22
    Then they come into the process
    of fraud risk or the control
  • 14:22 - 14:26
    risk, which is the second or
    third option that will be.
  • 14:26 - 14:29
    So again, as I told, the
    logic behind the question
  • 14:29 - 14:32
    is that to understand
    which comes first.
  • 14:32 - 14:35
    And so also one of
    the other key things
  • 14:35 - 14:39
    that is very important when
    you are preparing for the exam,
  • 14:39 - 14:42
    not only from the exam
    stand point of view,
  • 14:42 - 14:45
    I would suggest everybody to--
  • 14:45 - 14:49
    so what happens is, once you
    know the answer is correct,
  • 14:49 - 14:51
    check the reason why you
    have selected that answer
  • 14:51 - 14:53
    and why it is correct.
  • 14:53 - 14:55
    Because 90% of the
    time, you might
  • 14:55 - 14:58
    have selected an answer
    for some other reason,
  • 14:58 - 15:00
    but it happens to
    be coincidentally
  • 15:00 - 15:02
    correct with the ISACA.
  • 15:02 - 15:05
    But what I require
    everybody to do
  • 15:05 - 15:08
    is that you need to check the
    thinking process of ISACA.
  • 15:08 - 15:11
    That is very important in terms
    of understanding the concepts.
  • 15:11 - 15:14
    And also, even if you have
    made the answer correct,
  • 15:14 - 15:19
    I would require you to check
    every options available, A,
  • 15:19 - 15:21
    B, C, and D, why
    it is not correct
  • 15:21 - 15:23
    and why the answer that
    you have chosen is correct.
  • 15:23 - 15:27
    Even in case if you have not
    selected the correct answer,
  • 15:27 - 15:29
    please still go and
    check all these options,
  • 15:29 - 15:31
    why the answer that
    you have selected
  • 15:31 - 15:34
    is not the correct answer and
    why the other answer remains
  • 15:34 - 15:36
    the correct option.
  • 15:36 - 15:39
    So this question is, again,
    an interesting question.
  • 15:39 - 15:41
    So as an IS auditor
    is performing
  • 15:41 - 15:44
    a review of an application's
    control fields,
  • 15:44 - 15:46
    he finds a weakness
    in the software system
  • 15:46 - 15:49
    and could materially
    impact the application.
  • 15:49 - 15:51
    In this situation, an
    IS auditor should--
  • 15:51 - 15:52
    Again, this is not a question.
  • 15:52 - 15:54
    This is just a statement.
  • 15:54 - 15:56
    We need to complete
    the statement.
  • 15:56 - 15:58
    Disregard these
    controls weakness
  • 15:58 - 16:00
    because the system
    software review
  • 16:00 - 16:02
    is beyond the scope
    of this review.
  • 16:02 - 16:05
    Conduct a detailed
    system software review
  • 16:05 - 16:06
    and report the control weakness.
  • 16:06 - 16:09
    Include in the report
    statement that the audit
  • 16:09 - 16:12
    was limited to review the
    application's control weakness.
  • 16:12 - 16:15
    Review the system software
    controls as relevant,
  • 16:15 - 16:18
    and recommend a detailed
    system software review.
  • 16:18 - 16:23
    I think everyone is going
    with the option of B
  • 16:23 - 16:25
    But sorry to disappoint,
    the answer is actually
  • 16:25 - 16:30
    D. Before going into the
    complete detailed review,
  • 16:30 - 16:34
    as given here, the
    appropriate option would
  • 16:34 - 16:37
    be to review the system software
    as relevant to the review,
  • 16:37 - 16:41
    and recommend a
    detailed system software
  • 16:41 - 16:45
    review for which an additional
    resources may be recommended.
  • 16:45 - 16:49
    So the answer might be
    extremely similar to what B is,
  • 16:49 - 16:51
    but the difference
    is that you need
  • 16:51 - 16:53
    to know where your
    scope is going to go
  • 16:53 - 16:57
    and how you are going to
    plan the audit accordingly.
  • 16:57 - 17:01
    So that is what is the defining
    moment for answer B and answer
  • 17:01 - 17:01
    D.
  • 17:01 - 17:06
    So again, answer A and answer
    C is completely irrelevant.
  • 17:06 - 17:08
    You can take it off the radar.
  • 17:08 - 17:10
    Definitely nobody
    has given answer
  • 17:10 - 17:12
    A or C. That is a good sign.
  • 17:12 - 17:16
    Because as I told, we need to
    eliminate these two options
  • 17:16 - 17:19
    very clearly, in terms
    of how we are going
  • 17:19 - 17:21
    to understand this whole thing.
  • 17:21 - 17:25
    So which of the following
    is the most important reason
  • 17:25 - 17:28
    why an audit planning
    process should be reviewed
  • 17:28 - 17:30
    at a periodic interval?
  • 17:30 - 17:33
    To plan for a deployment of
    available audit resources,
  • 17:33 - 17:36
    to consider changes to
    the risk environment,
  • 17:36 - 17:39
    to provide inputs for
    documentation of audit charter,
  • 17:39 - 17:42
    to identify applicable
    IS standards.
  • 17:42 - 17:48
    So again, the answer is B. Let
    us look at the explanation that
  • 17:48 - 17:49
    is given over here.
  • 17:49 - 17:52
    So short-term and
    long-term issues
  • 17:52 - 17:55
    drive the audit planning
    can be heavily impacted
  • 17:55 - 17:59
    to the changes in the risk
    environment, technologies,
  • 17:59 - 18:01
    business processes
    of the enterprise.
  • 18:01 - 18:04
    This is well set, in terms
    of the risk environment
  • 18:04 - 18:07
    changes quite dynamically
    for some businesses.
  • 18:07 - 18:10
    So what might be considered
    as a risk today might not
  • 18:10 - 18:11
    be risk tomorrow.
  • 18:11 - 18:13
    What might be not
    considered as risk today
  • 18:13 - 18:15
    will be a risk tomorrow.
  • 18:15 - 18:19
    So in terms of planning for the
    document of available resources,
  • 18:19 - 18:21
    it's determined by the
    audit assignments plan.
  • 18:21 - 18:23
    The option is
    completely not relevant.
  • 18:23 - 18:26
    Again, the option
    C is something--
  • 18:26 - 18:29
    is a mandate from
    the top management.
  • 18:29 - 18:33
    It is not something-- the
    risk assessment, or any kind
  • 18:33 - 18:36
    of things is not
    going to-- planning
  • 18:36 - 18:38
    is not going to have any
    impact on the audit trail
  • 18:38 - 18:41
    because it's a top
    management mandate.
  • 18:41 - 18:44
    And D, applicability of
    IS standards, guidelines
  • 18:44 - 18:48
    and procedures is universal
    to any audit engagement.
  • 18:48 - 18:50
    It is not specific
    to any audit and not
  • 18:50 - 18:52
    influenced by the short-term
    and long-term issues.
  • 18:52 - 18:55
    Again, when I talk about
    short-term and long-term issues,
  • 18:55 - 19:00
    so probably we might be having
    some IT deployment happening,
  • 19:00 - 19:02
    so which might change
    the risk posture.
  • 19:02 - 19:05
    And classic example
    is the COVID.
  • 19:05 - 19:08
    So in COVID, people
    are working from home.
  • 19:08 - 19:12
    The risk environment changes
    from being in the office space
  • 19:12 - 19:13
    to home space.
  • 19:13 - 19:15
    What are all the
    risk environment
  • 19:15 - 19:16
    that is going to happen?
  • 19:16 - 19:19
    So if anybody has access to
    printers, say for an example,
  • 19:19 - 19:21
    a person might be connecting
    their home printer
  • 19:21 - 19:25
    to their laptop or PC, print
    some confidential documents,
  • 19:25 - 19:28
    so the risk posture is
    completely changing.
  • 19:28 - 19:29
    So that is the
    reason why we need
  • 19:29 - 19:32
    to have planning, that
    needs to be detailed,
  • 19:32 - 19:34
    done before the audit.
  • 19:34 - 19:37
    So which of the following
    is the most effective
  • 19:37 - 19:39
    for implementing
    control self-assessment
  • 19:39 - 19:41
    within small business unit?
  • 19:41 - 19:44
    Informal peer reviews,
    facilitated workshops,
  • 19:44 - 19:47
    process flow narratives,
    data flow diagrams?
  • 19:47 - 19:50
    So say for an example,
    so I will tell you
  • 19:50 - 19:53
    the correct answer,
    which is B. So when
  • 19:53 - 19:56
    we are going-- you know the
    answer reasoning over here,
  • 19:56 - 19:57
    let me not explain it.
  • 19:57 - 20:00
    But I'll give you a different
    perspective over here.
  • 20:00 - 20:02
    Out of the four
    options actually, I
  • 20:02 - 20:04
    feel that three are
    actually correct
  • 20:04 - 20:07
    for this particular
    question because not at two,
  • 20:07 - 20:09
    but three are correct.
  • 20:09 - 20:10
    But which is the most important?
  • 20:10 - 20:13
    When you say is that,
    the facilitated workshop
  • 20:13 - 20:16
    comes into the mind because
    of very simple fact,
  • 20:16 - 20:19
    because the control
    self assessments are not
  • 20:19 - 20:23
    performed by a seasoned auditor
    or by a seasoned or a control
  • 20:23 - 20:24
    of people.
  • 20:24 - 20:27
    They are being performed by the
    business themselves directly,
  • 20:27 - 20:29
    to assess how the control
    posture is there, how
  • 20:29 - 20:31
    the risk posture is everything.
  • 20:31 - 20:34
    So what happens here is
    you need to train them.
  • 20:34 - 20:38
    We have to train them
    correctly to identify
  • 20:38 - 20:40
    what they are
    supposed to do, how
  • 20:40 - 20:42
    they are supposed to
    check for control weakness
  • 20:42 - 20:44
    and how they are
    going to report it.
  • 20:44 - 20:46
    And that is by far the
    most effective way.
  • 20:46 - 20:50
    But again, the process
    flow diagrams is important.
  • 20:50 - 20:53
    While doing this
    facilitated workshops,
  • 20:53 - 20:57
    there will be process flow
    diagrams and data flow diagrams
  • 20:57 - 20:59
    and narratives.
  • 20:59 - 21:01
    These things are very
    important in terms of,
  • 21:01 - 21:03
    to give more added perspective.
  • 21:03 - 21:06
    But again, that is
    not the only thing
  • 21:06 - 21:08
    that is required over here.
  • 21:08 - 21:12
    What we require over here
    is in terms of identifying
  • 21:12 - 21:14
    the most best option.
  • 21:14 - 21:16
    So the next question.
  • 21:16 - 21:20
    So which of the following would
    an IS auditor perform the first
  • 21:20 - 21:22
    when planning an IS audit?
  • 21:22 - 21:26
    Define the audit deliverables,
    finalize the scope and the audit
  • 21:26 - 21:29
    objectives, gain an
    understanding of the business
  • 21:29 - 21:31
    objectives and purpose,
    develop the audit approach
  • 21:31 - 21:33
    of the strategy?
  • 21:33 - 21:35
    The C is correct answer,
    gain an understanding
  • 21:35 - 21:37
    of business objectives
    and purpose.
  • 21:37 - 21:39
    So the reason is very simple.
  • 21:39 - 21:42
    So what we need to understand,
    in terms of business mission
  • 21:42 - 21:45
    objectives, purpose,
    which in turn
  • 21:45 - 21:48
    identifies to the policy,
    standards, guidelines,
  • 21:48 - 21:52
    procedures, everything, because
    it is very important to gain
  • 21:52 - 21:54
    an understanding of business.
  • 21:54 - 21:58
    Say for an example, if we are
    in a pen drive manufacturing
  • 21:58 - 22:02
    company, their core mission
    is to manufacture a pen drive
  • 22:02 - 22:04
    and test pen drive
    and use pen drive.
  • 22:04 - 22:08
    And you cannot say that the use
    of pen drive or external drives
  • 22:08 - 22:10
    is prohibited inside
    the organization.
  • 22:10 - 22:12
    That will be the
    most absurd thing.
  • 22:12 - 22:15
    And in Facebook, if you
    are auditing Facebook,
  • 22:15 - 22:17
    you cannot go and say that
    viewing Facebook inside
  • 22:17 - 22:19
    the Facebook office
    is restricted.
  • 22:19 - 22:23
    Of course, it can be
    limited to view and to view
  • 22:23 - 22:24
    your personal account.
  • 22:24 - 22:25
    But it will be so
    absurd when we say
  • 22:25 - 22:27
    all these things
    inside the office
  • 22:27 - 22:28
    that they are trying to work on.
  • 22:28 - 22:30
    So that can be an
    explanation that
  • 22:30 - 22:31
    can be given to this answer.
  • 22:31 - 22:35
    But again, I would like everyone
    to go through the other options
  • 22:35 - 22:36
    as well.
  • 22:36 - 22:39
    Defining the audit
    deliverables is
  • 22:39 - 22:41
    dependent upon a thorough
    understanding of business
  • 22:41 - 22:45
    objects, A, B, and
    D. Because as I told,
  • 22:45 - 22:48
    every option is important,
    though it may not
  • 22:48 - 22:51
    be relevant to this
    particular question,
  • 22:51 - 22:52
    some other question
    that might be
  • 22:52 - 22:56
    relevant to this particular
    option will be arising tomorrow.
  • 22:56 - 22:59
    So the last question
    in the domain 1
  • 22:59 - 23:01
    is, again, the next question.
  • 23:01 - 23:06
    An organization performs a
    daily backup of critical data
  • 23:06 - 23:08
    and software files and
    stores in the backup tapes
  • 23:08 - 23:09
    at an offsite location.
  • 23:09 - 23:13
    The backup tapes are used
    to restore the software
  • 23:13 - 23:14
    in case of disruption.
  • 23:14 - 23:17
    This is an example of a
    preventive control, management
  • 23:17 - 23:22
    control, corrective control,
    and detective control?
  • 23:22 - 23:23
    The correct answer
    is actually C.
  • 23:23 - 23:27
    So you cannot avert a particular
    disaster being happening.
  • 23:27 - 23:30
    If you can avert that particular
    disaster being happening,
  • 23:30 - 23:31
    that is a preventive control.
  • 23:31 - 23:36
    But a corrective control is
    set up-- a BCP is a critical--
  • 23:36 - 23:39
    a DRP and a BCP are
    the best examples
  • 23:39 - 23:40
    that I can give over here.
  • 23:40 - 23:42
    It is actually a
    corrective control.
  • 23:42 - 23:43
    It is not a preventive control.
  • 23:43 - 23:46
    So say for an example, a
    couple of years, Chennai
  • 23:46 - 23:48
    floods happened in 2015.
  • 23:48 - 23:50
    That cannot be averted.
  • 23:50 - 23:52
    And the pandemic, right
    now we are in a pandemic,
  • 23:52 - 23:53
    that cannot be averted.
  • 23:53 - 23:58
    But what we can do is a
    corrective control and approach
  • 23:58 - 23:59
    towards it.
  • 23:59 - 24:02
    So as the answer
    outlines over here, A,
  • 24:02 - 24:04
    preventive controls are
    those that avert the problems
  • 24:04 - 24:06
    before they arise.
  • 24:06 - 24:09
    Backup tapes cannot be used to
    prevent damages for the files
  • 24:09 - 24:11
    and therefore cannot be
    classified as a preventive
  • 24:11 - 24:12
    control.
  • 24:12 - 24:15
    Management controls modify
    and processing systems,
  • 24:15 - 24:18
    which is completely
    irrelevant to this context.
  • 24:18 - 24:21
    C, a corrective control
    helps to correct or minimize
  • 24:21 - 24:23
    the impact of a problem.
  • 24:23 - 24:24
    Backup tapes are such.
  • 24:24 - 24:27
    So detective controls,
    again, it is not
  • 24:27 - 24:29
    completely relevant
    to this answer, which
  • 24:29 - 24:32
    is going to only help in
    terms of detecting a problem
  • 24:32 - 24:33
    after it has arised.
  • 24:33 - 24:35
    So detective controls
    can be in auditing.
  • 24:35 - 24:37
    Auditing is a detective control.
  • 24:37 - 24:38
    Best detective control
    is an auditing.
  • 24:38 - 24:41
    And a management
    control is something--
  • 24:41 - 24:44
    if I can give an
    example of, in terms
  • 24:44 - 24:47
    of recurrence of a problem,
    a processing system.
  • 24:47 - 24:49
    Say for an example, that's--
  • 24:49 - 24:51
    it is management controls again.
  • 24:51 - 24:54
    The management controls are put
    in place so that you cannot edit
  • 24:54 - 24:56
    few items or view-only options.
  • 24:56 - 24:58
    And those kind of
    controls are also
  • 24:58 - 25:00
    called as a management
    control, that is,
  • 25:00 - 25:02
    to repeat the
    occurrence of a problem.
  • 25:02 - 25:05
    So that nobody even
    touches something
  • 25:05 - 25:07
    so that it doesn't
    go wrong again.
  • 25:07 - 25:10
    So this is the end of domain 1.
  • 25:10 - 25:15
    So now we are going
    into the domain 2.
  • 25:15 - 25:17
    So now we are able to see
    the domain to first question.
  • 25:17 - 25:21
    So in order for the management
    to effectively monitor
  • 25:21 - 25:23
    and compliance of the
    processes, applications,
  • 25:23 - 25:25
    which of the following
    would be the most ideal?
  • 25:25 - 25:28
    A central document repository,
    a knowledge management system,
  • 25:28 - 25:30
    a dashboard, and a benchmarking?
  • 25:30 - 25:33
    So the correct answer
    is C, dashboard.
  • 25:33 - 25:35
    So dashboard provides
    a set of information
  • 25:35 - 25:37
    to illustrate compliance
    of the processes,
  • 25:37 - 25:41
    like how KRAs, KPIs
    are going to be
  • 25:41 - 25:43
    there, and the configurable
    elements to keep
  • 25:43 - 25:44
    the enterprise on course.
  • 25:44 - 25:48
    So if you are going to deviate
    if the matrix is not achieved,
  • 25:48 - 25:50
    so the management will
    be definitely informed.
  • 25:50 - 25:54
    So why not A, B and D?
  • 25:54 - 25:55
    Any perspective?
  • 25:55 - 25:58
    Again, that is given over here.
  • 25:58 - 26:00
    In terms of
    benchmarking, option D,
  • 26:00 - 26:02
    it provides an information
    to help the management
  • 26:02 - 26:04
    to adapt the organization
    in a timely manner,
  • 26:04 - 26:06
    according to the trends
    and the environment,
  • 26:06 - 26:08
    so what the other
    organization is doing.
  • 26:08 - 26:11
    So if I am in a big
    four organization,
  • 26:11 - 26:14
    so what my peers are, what
    my competitors are doing,
  • 26:14 - 26:18
    EY, Deloitte, KPMG, and PWC,
    what they are going to do.
  • 26:18 - 26:24
    And that will be the context in
    which I will be benchmarking.
  • 26:24 - 26:26
    And A and B, A is nothing
    but a document repository.
  • 26:26 - 26:29
    That doesn't provide
    any specific information
  • 26:29 - 26:32
    on how the controls are
    being performed, how
  • 26:32 - 26:34
    the compliance is being done.
  • 26:34 - 26:37
    A knowledge management system
    provides a valuable information,
  • 26:37 - 26:40
    but it is generally not used by
    the management for compliance
  • 26:40 - 26:41
    purposes.
  • 26:41 - 26:44
    Again, a KMS is nothing,
    but in terms of--
  • 26:44 - 26:46
    it will not provide
    any specifics
  • 26:46 - 26:48
    on how the control
    is being performing,
  • 26:48 - 26:50
    how the compliance
    has been performing.
  • 26:50 - 26:53
    So that again, the important
    thing in this question
  • 26:53 - 26:56
    is that, effectively
    monitor and the most ideal.
  • 26:56 - 26:59
    So when I say most ideal, most
    ideal, I think benchmarking
  • 26:59 - 27:02
    and dashboard is the
    two options, which
  • 27:02 - 27:03
    I will be choosing in the last.
  • 27:03 - 27:06
    But again, among
    these C and D, what
  • 27:06 - 27:08
    is an important thing
    will be the D because it
  • 27:08 - 27:12
    gives the accurate information
    on how my organization is doing.
  • 27:12 - 27:16
    But the next question will be,
    my organization is doing good,
  • 27:16 - 27:18
    but what about
    rest of the others?
  • 27:18 - 27:21
    That is where the benchmarking
    comes into the picture.
  • 27:21 - 27:24
    The next question is,
    which of the following
  • 27:24 - 27:27
    best describes the IT department
    strategic planning process?
  • 27:27 - 27:31
    An IT department will have
    either short and long-range
  • 27:31 - 27:34
    plans, depending upon
    organization's broader
  • 27:34 - 27:35
    plans and objectives.
  • 27:35 - 27:37
    IT department
    strategic plan must
  • 27:37 - 27:39
    be time- and project-oriented.
  • 27:39 - 27:43
    So not detailed plans to address
    and help determine priorities
  • 27:43 - 27:45
    to meet the business needs.
  • 27:45 - 27:48
    Long-range planning
    for IT department
  • 27:48 - 27:50
    should recognize the
    organizational goals,
  • 27:50 - 27:53
    technological advances and
    regulatory requirements.
  • 27:53 - 27:56
    And D will be
    short-range planning
  • 27:56 - 27:58
    for the IT department
    does not need
  • 27:58 - 28:01
    to be integrated to
    the short-range plans
  • 28:01 - 28:04
    of the organization since
    technological advances will
  • 28:04 - 28:07
    drive the IT organization's
    plans much quicker
  • 28:07 - 28:09
    than the organization plans.
  • 28:09 - 28:12
    I think this is a little
    bit complicated questions.
  • 28:12 - 28:15
    But the answer is
    very, very simple.
  • 28:15 - 28:17
    So in order for
    this to understand--
  • 28:17 - 28:20
    the correct answer is,
    of course, C. So in order
  • 28:20 - 28:23
    for you to understand
    this particular question,
  • 28:23 - 28:25
    you need to understand
    two things over here.
  • 28:25 - 28:28
    You need to understand what does
    the strategic planning refers
  • 28:28 - 28:28
    to.
  • 28:28 - 28:30
    A strategic planning is
    always a long-term plan,
  • 28:30 - 28:32
    which is more than--
  • 28:32 - 28:37
    it has been more than one year
    and derived for five years.
  • 28:37 - 28:39
    So that is strategic planning.
  • 28:39 - 28:41
    There is always a
    tactical planning.
  • 28:41 - 28:42
    Tactical planning
    refers to what you are
  • 28:42 - 28:43
    going to achieve in one year.
  • 28:43 - 28:47
    And operational planning, it
    is anything below one year.
  • 28:47 - 28:50
    so for a few months,
    for few quarters,
  • 28:50 - 28:52
    that is going to be your
    operational planning.
  • 28:52 - 28:55
    So what happens here is the
    question specifically asked
  • 28:55 - 28:56
    about strategic planning.
  • 28:56 - 29:00
    In that context,
    option A or B is
  • 29:00 - 29:02
    going to be
    definitely eliminated
  • 29:02 - 29:05
    because option A talks
    about short and long range.
  • 29:05 - 29:07
    Short-term plans
    are either going
  • 29:07 - 29:10
    to be operational or
    tactical plans, which
  • 29:10 - 29:12
    is not in this context
    of this question.
  • 29:12 - 29:14
    And again, these again
    are eliminated because
  • 29:14 - 29:15
    of the short-range planning.
  • 29:15 - 29:17
    Because short-range
    planning is, again,
  • 29:17 - 29:20
    going to be only there for
    the operational and tactical,
  • 29:20 - 29:22
    and not for the strategic.
  • 29:22 - 29:24
    So the only answer that
    remains in this question
  • 29:24 - 29:27
    will be a long-range
    planning, which should always
  • 29:27 - 29:28
    emphasize on
    organizational goals,
  • 29:28 - 29:31
    technological advancements,
    and regulatory requirements.
  • 29:31 - 29:34
    So that is in terms with
    this correct answer.
  • 29:34 - 29:38
    Again, you need to
    understand one thing
  • 29:38 - 29:39
    before answering a question.
  • 29:39 - 29:42
    Whenever you have
    a question, try
  • 29:42 - 29:46
    to understand which domain
    they are coming in primarily.
  • 29:46 - 29:47
    There might be a
    situation of two
  • 29:47 - 29:50
    or three domains culminating
    in one question itself,
  • 29:50 - 29:53
    but there will be a primary
    essence of one domain, which
  • 29:53 - 29:54
    will be focused.
  • 29:54 - 29:58
    In this particular question,
    the domain focus is only,
  • 29:58 - 30:00
    of course, it is domain 2,
    and the focus is domain 2.
  • 30:00 - 30:05
    The domain 2 focuses only
    on one bang-on agenda.
  • 30:05 - 30:10
    That is in terms of organization
    goals, organization's missions,
  • 30:10 - 30:12
    organization's thing.
  • 30:12 - 30:14
    So everything that
    the IT revolves--
  • 30:14 - 30:16
    IT cannot work as a silo.
  • 30:16 - 30:18
    It cannot work as a silo.
  • 30:18 - 30:20
    Say for example, if your
    organization is selling
  • 30:20 - 30:24
    vegetables and fruits, your IT
    organization cannot talk about
  • 30:24 - 30:27
    implementing a
    cloud for clients.
  • 30:27 - 30:29
    So that is not going to happen.
  • 30:29 - 30:32
    So that is not the
    way the business runs.
  • 30:32 - 30:35
    Your optimization
    should run in terms
  • 30:35 - 30:38
    of how your organization is
    going to sell your fruits
  • 30:38 - 30:39
    and vegetables.
  • 30:39 - 30:42
    They will be an
    organic business, so
  • 30:42 - 30:45
    how an IT acts as an enabler.
  • 30:45 - 30:47
    So IT is only an enabler
    of the organization.
  • 30:47 - 30:50
    It is not something,
    which is completely
  • 30:50 - 30:51
    driving the organization.
  • 30:51 - 30:54
    The business priorities are
    completely different from what
  • 30:54 - 30:55
    IT priorities are.
  • 30:55 - 30:58
    So we need to align
    our IT priorities
  • 30:58 - 31:00
    so that the organizational
    goals, technological advancement
  • 31:00 - 31:04
    and even the regulatory
    requirements are complied with.
  • 31:04 - 31:06
    So the most important
    responsibility
  • 31:06 - 31:08
    of data security officer
    in an organization
  • 31:08 - 31:11
    is, A, recommending
    and monitoring
  • 31:11 - 31:14
    data security policies, B,
    promoting security awareness
  • 31:14 - 31:17
    within the organization,
    establishing procedures
  • 31:17 - 31:20
    for IT security
    policies, administering
  • 31:20 - 31:23
    physical and logical
    access controls.
  • 31:23 - 31:25
    The answer is A.
  • 31:25 - 31:26
    But when I come
    to this question,
  • 31:26 - 31:31
    this is, again, a tricky
    question because the question
  • 31:31 - 31:33
    outlines the most important.
  • 31:33 - 31:35
    So when we say most
    important, there
  • 31:35 - 31:37
    is always considered
    that there are
  • 31:37 - 31:39
    two options which is correct,
    two or more options which
  • 31:39 - 31:41
    is correct for this question.
  • 31:41 - 31:45
    But in terms of B, C, and D,
    why it is not correct instead?
  • 31:45 - 31:49
    B, anybody in the organization
    can do the security awareness.
  • 31:49 - 31:52
    And it is not the only
    responsibility of a data
  • 31:52 - 31:54
    security officer, though it
    might be a responsibility,
  • 31:54 - 31:56
    but it is not the
    only responsibility.
  • 31:56 - 32:01
    And C and D, they are all more
    of establishing procedures.
  • 32:01 - 32:02
    Establishing a
    procedures anybody
  • 32:02 - 32:04
    can do in an IT organization.
  • 32:04 - 32:07
    And administering physical
    and logical access control,
  • 32:07 - 32:09
    again, specific to
    the application.
  • 32:09 - 32:12
    Say for an example, if they are
    administering the SAP, if they
  • 32:12 - 32:14
    are administering the
    Oracle, the specific team
  • 32:14 - 32:16
    related to the SAP
    or the Oracle will
  • 32:16 - 32:19
    administer these controls, and
    not the data security officer.
  • 32:19 - 32:23
    But data security officer in a
    top level, at a very high level,
  • 32:23 - 32:27
    they will define in terms of
    what is recommended in terms
  • 32:27 - 32:28
    of protecting their data.
  • 32:28 - 32:30
    Say for an example,
    if the data is
  • 32:30 - 32:33
    coming for the GDPR regulation.
  • 32:33 - 32:36
    So what is required
    in terms of them
  • 32:36 - 32:37
    to protect the particular data?
  • 32:37 - 32:40
    Mere implementation part
    is done by the IT team.
  • 32:40 - 32:44
    And in terms of promoting
    the security awareness,
  • 32:44 - 32:48
    it can be done by anybody
    in the organization.
  • 32:48 - 32:52
    Now, we go to the next question.
  • 32:52 - 32:54
    What is considered
    most critical element
  • 32:54 - 32:56
    for the successful
    implementation of information
  • 32:56 - 32:57
    security program?
  • 32:57 - 33:00
    An effective enterprise
    risk management framework,
  • 33:00 - 33:04
    senior management commitment,
    an adequate budgeting process,
  • 33:04 - 33:07
    meticulous program planning?
  • 33:07 - 33:12
    So the correct answer is B. And
    you can go through this option,
  • 33:12 - 33:14
    while the other options
    are not correct.
  • 33:14 - 33:17
    Let me just give you one
    important perspective over here.
  • 33:17 - 33:19
    Couple of years
    back, when IT was not
  • 33:19 - 33:22
    seen as a big enabler
    for the organizations,
  • 33:22 - 33:25
    in the board meetings,
    only five minutes
  • 33:25 - 33:28
    will be spared for any kind
    of security or IT security
  • 33:28 - 33:30
    related issues to be discussed.
  • 33:30 - 33:34
    Nowadays, organizations have
    started prioritizing this,
  • 33:34 - 33:38
    and there is a very detailed
    discussion on the whole thing
  • 33:38 - 33:40
    because most of
    the organizations,
  • 33:40 - 33:43
    including a small scale
    enterprises or the medium scale
  • 33:43 - 33:48
    enterprises, have shifted their
    focus only towards an IT because
  • 33:48 - 33:49
    of the pandemic.
  • 33:49 - 33:53
    And they have started even
    seeing the benefits out of it.
  • 33:53 - 33:55
    And it is important
    for an organization
  • 33:55 - 33:59
    to protect their
    information security assets.
  • 33:59 - 34:01
    And management has
    started putting
  • 34:01 - 34:05
    lot of efforts in terms of
    how this is going to happen.
  • 34:05 - 34:08
    The next question is, which
    of the following tasks
  • 34:08 - 34:10
    may be performed
    by the same person
  • 34:10 - 34:13
    in a well-controlled information
    processing computer center?
  • 34:13 - 34:16
    Security administrator
    and change management,
  • 34:16 - 34:18
    computer operations
    and system development,
  • 34:18 - 34:21
    system development
    and change management,
  • 34:21 - 34:24
    system development and
    system maintenance?
  • 34:24 - 34:26
    The correct answer
    is actually D.
  • 34:26 - 34:29
    The whole point of
    this question is
  • 34:29 - 34:34
    that when you look at the option
    A and option C and option B,
  • 34:34 - 34:36
    why it is not correct is that--
  • 34:36 - 34:39
    the first option, security
    administration and change
  • 34:39 - 34:40
    management.
  • 34:40 - 34:41
    So what is change management?
  • 34:41 - 34:45
    So change management
    is in terms of there
  • 34:45 - 34:49
    is a established change
    management process saying
  • 34:49 - 34:50
    that whenever you
    apply any changes
  • 34:50 - 34:54
    to a particular system or
    a functionality hardening
  • 34:54 - 34:56
    or anything, anything
    of that sort,
  • 34:56 - 34:58
    any functionality
    for that matter,
  • 34:58 - 35:02
    it needs to be promoted
    in a certain set manner,
  • 35:02 - 35:04
    by having an approval
    and everything.
  • 35:04 - 35:07
    But when the person is having
    security administration
  • 35:07 - 35:10
    as a task and having
    a change management,
  • 35:10 - 35:12
    they will be completely
    bypassing this
  • 35:12 - 35:15
    into the whole thing,
    and people will not
  • 35:15 - 35:18
    be able to know who has
    done that particular change,
  • 35:18 - 35:20
    and there are chances
    of malpractices.
  • 35:20 - 35:22
    And C, again, the same thing.
  • 35:22 - 35:26
    You develop a system and you are
    responsible also for the change
  • 35:26 - 35:27
    management, is again a conflict.
  • 35:27 - 35:31
    So change management, somebody
    has to promote the change.
  • 35:31 - 35:33
    Somebody has to
    develop the changes.
  • 35:33 - 35:34
    Somebody has to
    approve the changes.
  • 35:34 - 35:37
    Somebody has to promote the
    changes into the production.
  • 35:37 - 35:41
    So again, so you cannot develop
    and also you cannot change
  • 35:41 - 35:42
    at the same time.
  • 35:42 - 35:43
    That is, again, a
    very important thing.
  • 35:43 - 35:46
    So option B, the
    computer operations
  • 35:46 - 35:48
    and system development.
  • 35:48 - 35:52
    So the option B and D are
    little bit closely related.
  • 35:52 - 35:54
    That is where the
    confusion starts over here.
  • 35:54 - 35:56
    Because as many
    of you have told,
  • 35:56 - 35:59
    the options computer
    operations refers
  • 35:59 - 36:02
    to just the operations
    and the system development
  • 36:02 - 36:04
    because it would be--
  • 36:04 - 36:06
    computer operations
    and system development
  • 36:06 - 36:08
    is incorrect choice
    because this would
  • 36:08 - 36:13
    make it possible for an operator
    to run a program that she
  • 36:13 - 36:14
    or he has amended.
  • 36:14 - 36:16
    So say for an example, if the
    particular person is having
  • 36:16 - 36:20
    both these access, they
    can run the program
  • 36:20 - 36:22
    without having any kind
    of additional controls
  • 36:22 - 36:23
    being required.
  • 36:23 - 36:26
    So that is the problem that
    the operations and the system
  • 36:26 - 36:27
    development cannot
    be at the same time.
  • 36:27 - 36:30
    But option D, the
    maintenance, maintenance
  • 36:30 - 36:32
    can be done by the same person.
  • 36:32 - 36:33
    Why it can be done
    by the same person
  • 36:33 - 36:36
    is that during the
    maintenance, the performance,
  • 36:36 - 36:38
    the person requires
    access to the source code,
  • 36:38 - 36:41
    and the person who
    has developed it
  • 36:41 - 36:43
    will be having an access
    to the source code.
  • 36:43 - 36:47
    That is why in a
    production, they can--
  • 36:47 - 36:51
    and that is the reason they
    can promote these things
  • 36:51 - 36:53
    into maintenance, as well
    as system development
  • 36:53 - 36:54
    at the same place.
  • 36:54 - 36:56
    But again, this is a
    very tricky question.
  • 36:56 - 37:00
    Exam question can be
    similar to this one.
  • 37:00 - 37:02
    And the domain 2,
    the next question is,
  • 37:02 - 37:06
    which of the following is most
    critical control over database
  • 37:06 - 37:09
    administration, which is the
    DBA, approval of DBA activities,
  • 37:09 - 37:12
    segregation of duties in
    regard to the rights and access
  • 37:12 - 37:15
    are granting and revoking,
    evoking of access logs
  • 37:15 - 37:17
    and activities-- sorry,
    review of access logs
  • 37:17 - 37:21
    and activities, review
    of use of database tools?
  • 37:21 - 37:25
    So the correct answer is
    option B. So why important?
  • 37:25 - 37:30
    It is important for a DBA to
    do this-- sorry, conflicting,
  • 37:30 - 37:35
    rather than any of these three
    is that other three option does
  • 37:35 - 37:37
    not reduce the risk.
  • 37:37 - 37:40
    This is the only preventative
    control that they can apply.
  • 37:40 - 37:45
    So as an auditor, when I'm
    coming and seeing the process
  • 37:45 - 37:49
    and saying that the DBA
    is reviewing the logs,
  • 37:49 - 37:50
    the DBA is using
    the database files,
  • 37:50 - 37:53
    the DBA is using approval
    activities, everything is fine.
  • 37:53 - 37:58
    But does he or she deliver
    on the fundamental issue
  • 37:58 - 38:00
    in the segregation of duties?
  • 38:00 - 38:03
    That is what will be
    my auditor's question.
  • 38:03 - 38:05
    This is where it
    is very important.
  • 38:05 - 38:08
    Because as an IS auditor,
    you need to think and deliver
  • 38:08 - 38:09
    the answer.
  • 38:09 - 38:11
    Because if you are thinking
    as a security analyst,
  • 38:11 - 38:16
    this was a typical security
    mind question and answer.
  • 38:16 - 38:18
    I understand from guru's
    perspective, he is right.
  • 38:18 - 38:20
    But as an auditor,
    you need to think
  • 38:20 - 38:24
    from the other side of the
    table, how an auditor will
  • 38:24 - 38:25
    approach this thing.
  • 38:25 - 38:28
    That is where this question
    is going to be answered.
  • 38:28 - 38:32
    You can just read the A, C, and
    D, why they are not correct.
  • 38:32 - 38:35
    So approval of a database
    administration activities
  • 38:35 - 38:38
    does not prevent the combination
    of conflicting things.
  • 38:38 - 38:43
    And the C option is, if DBA
    activities are improperly
  • 38:43 - 38:45
    approved, review of
    access would be--
  • 38:45 - 38:47
    again, that may not
    be reducing the risk.
  • 38:47 - 38:50
    Say for an example, if you
    have fundamentally approved
  • 38:50 - 38:52
    the access of some
    person incorrectly,
  • 38:52 - 38:54
    though you may be monitoring
    his or her activities,
  • 38:54 - 38:57
    but the problem is that it will
    not be addressed because you
  • 38:57 - 38:59
    have already done something
    wrong in the first place,
  • 38:59 - 39:03
    and you cannot correct it just
    by monitoring or taking actions
  • 39:03 - 39:04
    of it.
  • 39:04 - 39:06
    And reviewing of the
    use of database tools
  • 39:06 - 39:07
    does not reduce the risk.
  • 39:07 - 39:08
    Because it is only
    a detective tool.
  • 39:08 - 39:10
    It is only a detective
    tool, it is not
  • 39:10 - 39:13
    a preventive or any other
    conflicting combination.
  • 39:13 - 39:16
    It will not prevent any
    conflict combination.
  • 39:16 - 39:19
    In a small organization
    where a segregation of duties
  • 39:19 - 39:23
    is not practical,
    an employee performs
  • 39:23 - 39:26
    a function of computer operator
    and application programmer.
  • 39:26 - 39:30
    Which of the following controls
    should the IS auditor recommend?
  • 39:30 - 39:33
    Automated logging of
    changes and development
  • 39:33 - 39:35
    of libraries, additional
    staff to provide
  • 39:35 - 39:39
    SoD, procedures that verify only
    approved program changes are
  • 39:39 - 39:41
    implemented, access
    controls to prevent operator
  • 39:41 - 39:43
    from making program
    modifications?
  • 39:43 - 39:46
    Again, this is one of
    the trickiest question.
  • 39:46 - 39:50
    The whole point is that whenever
    you see some questions relating
  • 39:50 - 39:54
    to the organization size, even
    in the exam, make it very clear
  • 39:54 - 39:57
    that the answer might be
    dependent upon the size
  • 39:57 - 39:58
    of the organization.
  • 39:58 - 40:01
    If you are a large
    organization, like Google
  • 40:01 - 40:04
    or Apple or Facebook, you
    can do any of these things.
  • 40:04 - 40:07
    B can be done, A can be done.
  • 40:07 - 40:10
    Of course, D is something
    that also can be considered.
  • 40:10 - 40:12
    But it is a small organization.
  • 40:12 - 40:16
    Only a programmer is
    dependent upon an operator.
  • 40:16 - 40:18
    performing the multiple tasks.
  • 40:18 - 40:20
    What an IS auditor
    would recommend
  • 40:20 - 40:26
    will be very, very simple in
    terms of procedures that exist,
  • 40:26 - 40:30
    at least in paper, are to say
    that only the approved program
  • 40:30 - 40:31
    changes are implemented.
  • 40:31 - 40:37
    Because whenever we see
    any question relating
  • 40:37 - 40:39
    to the organization
    size, the answers
  • 40:39 - 40:42
    will be highly dependent on
    the size of the organization.
  • 40:42 - 40:44
    What might be the best
    treatmeant for a large size
  • 40:44 - 40:47
    organization may not be the
    best treatment for a mid-size
  • 40:47 - 40:49
    and a small-size organization.
  • 40:49 - 40:52
    So we need to be very careful
    in choosing the answer
  • 40:52 - 40:56
    because two or more options
    will look extremely correct
  • 40:56 - 40:58
    because the size
    of the organization
  • 40:58 - 41:01
    is going to be very dependent
    particular question.
  • 41:01 - 41:03
    We are end of domain 2, and
    we will be having three more
  • 41:03 - 41:05
    domains to cover.
  • 41:05 - 41:07
    So the next question
    is from domain 3.
  • 41:07 - 41:12
    To assist in testing an
    essential banking system being
  • 41:12 - 41:13
    acquired, an
    organization has been
  • 41:13 - 41:16
    provided the vendor
    with sensitive data
  • 41:16 - 41:18
    from its existing
    production system.
  • 41:18 - 41:21
    As an IS auditor, the
    primary concern that the data
  • 41:21 - 41:23
    should be what?
  • 41:23 - 41:30
    A, sanitized, B, complete, C,
    representative, and D, current?
  • 41:30 - 41:35
    Whenever an asset goes out,
    even if an asset is sunsetting,
  • 41:35 - 41:38
    if a technology asset
    decommissioning is happening,
  • 41:38 - 41:40
    the sanitization part
    is an important thing.
  • 41:40 - 41:43
    You don't want the data
    or the production data
  • 41:43 - 41:45
    to be visible to
    others whenever they
  • 41:45 - 41:47
    are doing the testing,
    which might give
  • 41:47 - 41:50
    some opinions about how
    the organization is working
  • 41:50 - 41:52
    and what are all the data that
    the organization is having.
  • 41:52 - 41:55
    So it is important that we
    need definitely or should
  • 41:55 - 41:58
    be opting for A because
    it is very important.
  • 41:58 - 42:01
    And test data
    should be sanitized
  • 42:01 - 42:05
    to prevent sensitive data from
    leaking to unauthorized persons.
  • 42:05 - 42:07
    All the other three options,
    although it may seem little bit
  • 42:07 - 42:10
    relevant, but it is
    completely not relevant,
  • 42:10 - 42:12
    it is completely incorrect.
  • 42:12 - 42:14
    Which of the following
    is a primary purpose
  • 42:14 - 42:16
    for conducting parallel testing?
  • 42:16 - 42:20
    To determine whether the system
    is cost effective, to enable
  • 42:20 - 42:22
    comprehensive unit
    and system testing,
  • 42:22 - 42:24
    to highlight the errors
    in the program interfaces
  • 42:24 - 42:26
    with the files, to
    ensure the new system
  • 42:26 - 42:29
    meets the user requirements?
  • 42:29 - 42:32
    It is very simple,
    the answer is D. Let
  • 42:32 - 42:35
    me put a perspective over here.
  • 42:35 - 42:37
    So when we have two
    systems, say for an example,
  • 42:37 - 42:41
    we have a tally system that's
    running currently my accounting
  • 42:41 - 42:43
    things, and we are
    going to implement SAP.
  • 42:43 - 42:46
    So tally is perfect
    for my organization,
  • 42:46 - 42:48
    but my organization is
    going into a billion
  • 42:48 - 42:49
    and a trillion organization.
  • 42:49 - 42:50
    I wish it could.
  • 42:50 - 42:53
    And the whole thing
    is that, so in terms
  • 42:53 - 42:56
    with, if the new system
    is being implemented,
  • 42:56 - 42:58
    is everything is
    being aligned and is
  • 42:58 - 43:00
    everything is as
    per the requirement,
  • 43:00 - 43:03
    is everything working as
    it was working entirely?
  • 43:03 - 43:06
    That is the primary thing
    that I will be looking at it.
  • 43:06 - 43:10
    So that is the reason that
    we are going with the option
  • 43:10 - 43:11
    D. The purpose of
    the parallel testing
  • 43:11 - 43:14
    is to ensure that the
    implementation of new system
  • 43:14 - 43:16
    will meet the user requirements.
  • 43:16 - 43:20
    It can be identified in
    the UAT testing itself,
  • 43:20 - 43:21
    but the parallel
    testing gives you
  • 43:21 - 43:24
    an idea both the systems
    are running in parallel
  • 43:24 - 43:27
    with each other, will give a
    fair enough understanding on how
  • 43:27 - 43:29
    the new system is working.
  • 43:29 - 43:31
    In case if there are any
    deficiencies in the new system
  • 43:31 - 43:34
    compared to the old
    system, how it can be fixed
  • 43:34 - 43:35
    and stuff like that.
  • 43:35 - 43:37
    See all the other testings,
    unit and system testings
  • 43:37 - 43:40
    are completed before the
    parallel testing, program
  • 43:40 - 43:41
    interfaces with the
    files are tested
  • 43:41 - 43:44
    for errors during the system
    testing itself and not--
  • 43:44 - 43:47
    and then the parallel testing
    because parallel testing happens
  • 43:47 - 43:50
    at the last stage during
    the implementation stage,
  • 43:50 - 43:52
    and it's not at the first stage.
  • 43:52 - 43:56
    When conducting a review of the
    business re-engineering process,
  • 43:56 - 43:58
    an IS auditor found that
    an important preventive
  • 43:58 - 44:00
    control had been removed.
  • 44:00 - 44:02
    In this case, an IS
    auditor should, A,
  • 44:02 - 44:04
    inform the management
    of the findings
  • 44:04 - 44:05
    and determine whether
    the management is
  • 44:05 - 44:08
    willing to accept the risk
    potential, B, determine
  • 44:08 - 44:11
    if a detective control has
    replaced the preventive control
  • 44:11 - 44:16
    during the process, and C,
    recommended that all the control
  • 44:16 - 44:19
    procedures have existed before
    the process was re-engineered
  • 44:19 - 44:23
    and included in the new process,
    develop continuous audit
  • 44:23 - 44:25
    approach to monitor
    the effects of removal
  • 44:25 - 44:29
    of the preventive control?
  • 44:29 - 44:32
    Whatever happens, when you
    stumble upon something that
  • 44:32 - 44:36
    is not of what is
    as expected, you
  • 44:36 - 44:39
    are supposed to inform the
    management then and now.
  • 44:39 - 44:41
    Then look for the
    other alternatives
  • 44:41 - 44:43
    or other remedial measures
    because the management
  • 44:43 - 44:45
    needs to be informed
    that there is a risk,
  • 44:45 - 44:48
    and whether they are willing to
    accept this risk of not having
  • 44:48 - 44:50
    a preventive control in place.
  • 44:50 - 44:52
    So in this case, that's
    a classic example.
  • 44:52 - 44:55
    And if you see
    here, the existence
  • 44:55 - 44:58
    of a detective control instead
    of a preventive control
  • 44:58 - 45:01
    usually increases the
    risk that the management--
  • 45:01 - 45:04
    increases the risk that the
    material problem may occur.
  • 45:04 - 45:09
    So say for an example, if there
    is also a detective control,
  • 45:09 - 45:12
    that should be in place.
  • 45:12 - 45:14
    There is a high probability
    that the particular process
  • 45:14 - 45:16
    is prone to having
    some kind of a control
  • 45:16 - 45:19
    issues and the preventive
    control that has been removed.
  • 45:19 - 45:22
    So that is the reason
    you need to just inform
  • 45:22 - 45:25
    the management at the first,
    and then look for other options.
  • 45:25 - 45:27
    Is it clear?
  • 45:27 - 45:29
    Let me go to the next question.
  • 45:29 - 45:32
    Which of the following
    will be considered
  • 45:32 - 45:35
    as the most serious in
    an enterprise resource
  • 45:35 - 45:37
    planning software used by
    financial organizations?
  • 45:37 - 45:40
    Access controls have
    not been reviewed,
  • 45:40 - 45:42
    limited documentation
    is available,
  • 45:42 - 45:44
    two-year backup tapes
    have not been replaced,
  • 45:44 - 45:47
    database backups are
    performed once a day?
  • 45:47 - 45:50
  • 45:50 - 45:52
    Give you the correct
    answer, which is A,
  • 45:52 - 45:56
    and you can see the explanation.
  • 45:56 - 45:59
    When auditing the requirements
    phase of a software acquisition,
  • 45:59 - 46:01
    an IS auditor should--
  • 46:01 - 46:03
    assess the responsibility
    of the project timetable,
  • 46:03 - 46:06
    assess the vendor's
    proposed quality processes,
  • 46:06 - 46:08
    ensure that the best
    software package is acquired,
  • 46:08 - 46:12
    review the completeness
    of the specification?
  • 46:12 - 46:15
    The review of the completeness
    of the specifications.
  • 46:15 - 46:16
    Whenever you talk
    about requirements,
  • 46:16 - 46:17
    there is a specification.
  • 46:17 - 46:20
    So that is what is our
    answer talks about.
  • 46:20 - 46:22
    The purpose of the
    requirements phase
  • 46:22 - 46:28
    is to specify the functionality
    of the proposed system.
  • 46:28 - 46:30
    Therefore, an IS auditor
    would concentrate more
  • 46:30 - 46:33
    on the completeness
    of the specification.
  • 46:33 - 46:34
    Assessing vendor
    quality process would
  • 46:34 - 46:36
    come after the requirements.
  • 46:36 - 46:38
    So you have analyzed
    the requirements,
  • 46:38 - 46:40
    then you are going
    for the vendor,
  • 46:40 - 46:42
    this A vendor or B vendor.
  • 46:42 - 46:45
    That is where your things
    will come into the picture.
  • 46:45 - 46:48
    Analyzing the
    organization's ability,
  • 46:48 - 46:50
    whether they are able to
    support, whether they are
  • 46:50 - 46:53
    a big organization, like
    a Microsoft or Oracle
  • 46:53 - 46:56
    or they are a small
    organization, of something
  • 46:56 - 46:59
    happening out of
    somewhere in the world,
  • 46:59 - 47:02
    or whether they are able
    to fulfill the obligations,
  • 47:02 - 47:05
    whether the quality process
    is good and everything.
  • 47:05 - 47:08
    So this is how you critically
    think because this is a stepped
  • 47:08 - 47:08
    approach.
  • 47:08 - 47:12
    As I told, if there is a stepped
    approach in some process,
  • 47:12 - 47:14
    say for an example,
    change management,
  • 47:14 - 47:15
    how do you promote the changes?
  • 47:15 - 47:19
    I think the CRM gives you
    a very detailed explanation
  • 47:19 - 47:22
    on how the changes are being
    promoted, change management,
  • 47:22 - 47:25
    and how RFP is raised.
  • 47:25 - 47:27
    In the domain 3, it
    talks about the RFPs,
  • 47:27 - 47:29
    how a software is
    being acquired,
  • 47:29 - 47:33
    how off-the-shelf software
    is being acquired,
  • 47:33 - 47:36
    how the requirements are built,
    how the requisition for proposal
  • 47:36 - 47:39
    is built. So these kind of
    things are phased approaches,
  • 47:39 - 47:44
    and you have to bound the answer
    only to the phased approaches.
  • 47:44 - 47:47
    So the next question
    is, an organization
  • 47:47 - 47:50
    decides to purchase a
    software package instead
  • 47:50 - 47:51
    of developing it.
  • 47:51 - 47:53
    In such case, the design
    and development phases
  • 47:53 - 47:54
    of a traditional software
    development cycle
  • 47:54 - 47:56
    would be replaced with--
  • 47:56 - 47:58
    selection and
    configuration phases,
  • 47:58 - 48:00
    feasibility and
    requirements phases,
  • 48:00 - 48:03
    implementation and testing
    phases, nothing, as replacement
  • 48:03 - 48:06
    is not required?
  • 48:06 - 48:07
    It is very simple question.
  • 48:07 - 48:12
    Just now I told about
    the steps involved.
  • 48:12 - 48:15
    This question, the option
    A is the correct answer
  • 48:15 - 48:19
    because of the fact that the
    design element is taken out.
  • 48:19 - 48:22
    Instead of developing it,
    you're going to buy outside.
  • 48:22 - 48:26
    So what happens is the selection
    and the configuration phases
  • 48:26 - 48:28
    come into the picture.
  • 48:28 - 48:30
    Feasibility and the
    requirements comes only
  • 48:30 - 48:32
    in terms of design requirements.
  • 48:32 - 48:35
    So if you see the answer
    reasoning over here,
  • 48:35 - 48:38
    with the purchase purchased
    package software, design
  • 48:38 - 48:41
    and development phases
    of a traditional.
  • 48:41 - 48:44
    life cycle have
    become replaceable
  • 48:44 - 48:46
    with selection and
    configuration phases.
  • 48:46 - 48:48
    A request for
    proposal form, which
  • 48:48 - 48:51
    is the RFP I was talking about,
    from the supplier package
  • 48:51 - 48:55
    is called for and evaluated
    against the predefined criteria
  • 48:55 - 48:57
    for selection
    before a decision is
  • 48:57 - 48:59
    made to purchase the software.
  • 48:59 - 49:03
    Thereafter, the configuration is
    to meet with the organization's
  • 49:03 - 49:04
    requirements.
  • 49:04 - 49:07
    If you take the option B, the
    other phases of the system
  • 49:07 - 49:10
    development, SDLC, such as
    feasibility study, requirements,
  • 49:10 - 49:12
    definition, implementation
    and post-implementation,
  • 49:12 - 49:16
    remain unaltered because
    it is very simple.
  • 49:16 - 49:18
    You are not going to
    define any requirements.
  • 49:18 - 49:21
    Say for an example, if
    I am going to Subway,
  • 49:21 - 49:25
    I am going to say very clearly
    that you need to put me
  • 49:25 - 49:27
    these toppings, like jalapenos.
  • 49:27 - 49:30
    I don't want to trigger any
    kind of hunger mode over here.
  • 49:30 - 49:34
    But I am just telling for an
    example over here because this
  • 49:34 - 49:39
    is as simple as going to a
    Subway versus McDonald's.
  • 49:39 - 49:42
    So if I go to Subway, I
    customize my bread, along
  • 49:42 - 49:44
    with the toppings
    that I require.
  • 49:44 - 49:46
    These are the sausages.
  • 49:46 - 49:48
    These are the toppings
    that I require.
  • 49:48 - 49:51
    But if I go to make
    [INAUDIBLE], that
  • 49:51 - 49:55
    is very clear that they
    have a predefined elements.
  • 49:55 - 49:58
    And among the predefined
    things, what is closely
  • 49:58 - 49:59
    matching with my requirements?
  • 49:59 - 50:00
    I need to choose.
  • 50:00 - 50:02
    Probably I can customize it.
  • 50:02 - 50:04
    I can say, please
    don't add mushrooms.
  • 50:04 - 50:05
    I don't like mushrooms.
  • 50:05 - 50:06
    I can say that.
  • 50:06 - 50:08
    That is to do with the
    configuration part.
  • 50:08 - 50:11
    But again, I cannot completely
    design some new product
  • 50:11 - 50:13
    and the requirements
    and the feasibility.
  • 50:13 - 50:16
    Everything has been
    taken off the shelf.
  • 50:16 - 50:18
    Which of the following
    procedure should
  • 50:18 - 50:20
    be implemented to help
    to ensure completeness
  • 50:20 - 50:23
    of inbound transactions via
    electronic data interchange?
  • 50:23 - 50:27
    I think the EDI topic, you will
    be seeing quite a lot in the CRM
  • 50:27 - 50:29
    as well, as sometimes
    in the exams as well.
  • 50:29 - 50:30
    So this is a hint.
  • 50:30 - 50:33
    So segment counts to built-in
    transactions set earlier.
  • 50:33 - 50:36
    A log of number of messages
    received periodically
  • 50:36 - 50:38
    verify that the
    transaction originator.
  • 50:38 - 50:40
    An electronic audit trail of
    accountability in tracking.
  • 50:40 - 50:42
    Matching the
    acknowledgment transactions
  • 50:42 - 50:46
    received to the log
    of EDI messages sent.
  • 50:46 - 50:49
    The EDI is one of my
    favorite topics, I would say.
  • 50:49 - 50:52
    Because while I was
    studying for the exams,
  • 50:52 - 50:55
    I did a very hard work to
    understand this EDI concept.
  • 50:55 - 50:57
  • 50:57 - 51:01
    So all the other options, if
    you see one way or the other,
  • 51:01 - 51:04
    talks about some form of
    auditing methodologies
  • 51:04 - 51:06
    and acknowledgment of
    transactions received.
  • 51:06 - 51:08
    Acknowledgment of
    transactions is just
  • 51:08 - 51:11
    to verify whether it has been--
  • 51:11 - 51:13
    to check the originator
    or origination
  • 51:13 - 51:15
    of that particular transaction.
  • 51:15 - 51:17
    An electronic audit trail is
    an accountability in tracking.
  • 51:17 - 51:19
    Yes, of course, it
    tracks the audit trail
  • 51:19 - 51:22
    of the account for auditability.
  • 51:22 - 51:24
    Sorry, for accountability
    and tracking.
  • 51:24 - 51:27
    But none of the options
    are actually close to A
  • 51:27 - 51:30
    because A is the correct answer.
  • 51:30 - 51:32
    Controls total built
    into the trailer record
  • 51:32 - 51:34
    of each transaction
    or each segment
  • 51:34 - 51:36
    is the only option
    that will ensure
  • 51:36 - 51:40
    that individual transactions
    are sent or received completely.
  • 51:40 - 51:43
    So electronic data
    interchange is one concept
  • 51:43 - 51:47
    that you need to be very,
    very familiar with because EDI
  • 51:47 - 51:50
    is being used at
    every ERP, everything
  • 51:50 - 51:51
    that you see in
    the current system.
  • 51:51 - 51:54
    Because if one system is
    talking, say for an example,
  • 51:54 - 51:58
    if [INAUDIBLE] is talking
    to Oracle or JD Edwards
  • 51:58 - 52:00
    or any other things
    for that matter,
  • 52:00 - 52:03
    they are talking in the language
    of EDI with an XML file.
  • 52:03 - 52:05
    So each transaction
    that is being
  • 52:05 - 52:07
    sent as an inbound
    transaction and sent
  • 52:07 - 52:10
    as an outbound transaction from
    one system to another system,
  • 52:10 - 52:12
    they need to have
    an individual count,
  • 52:12 - 52:14
    and they need to have
    an individual receipt
  • 52:14 - 52:15
    of transaction.
  • 52:15 - 52:19
    That is the reason why we
    need to match it accordingly.
  • 52:19 - 52:21
    Let me move on to
    the next question.
  • 52:21 - 52:25
    So that ends the domain 3,
    and we are now into domain 4.
  • 52:25 - 52:27
    So the domain 4 starts--
  • 52:27 - 52:31
    I think domain 4 is all about
    the information security assets,
  • 52:31 - 52:33
    different types of
    information security assets,
  • 52:33 - 52:35
    and BCP and BRP.
  • 52:35 - 52:37
    So which one of the following
    provides the best method
  • 52:37 - 52:40
    for determining the
    level of performance
  • 52:40 - 52:42
    by similar information
    processing facility
  • 52:42 - 52:43
    environments?
  • 52:43 - 52:48
    User satisfaction, B, goal
    accomplishment, C, benchmarking,
  • 52:48 - 52:52
    and D, capacity and
    growth planning?
  • 52:52 - 52:54
    So it is actually
    the C, benchmarking,
  • 52:54 - 52:57
    because whenever we
    wanted to ascertain
  • 52:57 - 53:00
    any level of performance--
    we talked about dashboards.
  • 53:00 - 53:04
    Dashboards gives us what our
    organization is performing.
  • 53:04 - 53:08
    And in terms of what the
    other organizations are doing,
  • 53:08 - 53:10
    the best way to identify
    is to benchmark.
  • 53:10 - 53:13
    Say for an example, I
    am working in a big 4,
  • 53:13 - 53:15
    and I want to
    ascertain the value
  • 53:15 - 53:20
    of what others are doing, what
    I am doing compared to others.
  • 53:20 - 53:23
    The only thing that we need
    to do is the benchmarking.
  • 53:23 - 53:26
    So that is very important,
    that we do the benchmarking
  • 53:26 - 53:31
    among our competitors and
    similar facility environments.
  • 53:31 - 53:33
    Let me move on to
    the next slide.
  • 53:33 - 53:36
    So which one of the following
    is the most effective method
  • 53:36 - 53:40
    for IS auditor to use in testing
    the program change management
  • 53:40 - 53:42
    process?
  • 53:42 - 53:44
    Trace from system-generated
    information
  • 53:44 - 53:46
    to the change management
    documentation.
  • 53:46 - 53:48
    Examine change
    management documentation
  • 53:48 - 53:50
    for the evidence of accuracy.
  • 53:50 - 53:52
    Trace from change
    management documentation
  • 53:52 - 53:54
    to a system-generated
    audit trail.
  • 53:54 - 53:56
    Or examine change
    management documentation
  • 53:56 - 53:58
    for evidence of completeness.
  • 53:58 - 54:00
    So this is a very
    tricky question again.
  • 54:00 - 54:02
  • 54:02 - 54:05
    The correct answer
    is A, trace from
  • 54:05 - 54:07
    system-generated information
    to the change management
  • 54:07 - 54:09
    documentation.
  • 54:09 - 54:13
    They are talking about
    most effective method.
  • 54:13 - 54:15
    By virtue of saying that
    most effective method,
  • 54:15 - 54:16
    two options are correct.
  • 54:16 - 54:19
    A and C are extremely correct.
  • 54:19 - 54:22
    B and D are extremely incorrect
    because of the fact that when
  • 54:22 - 54:23
    you check the
    documentation only,
  • 54:23 - 54:26
    you cannot derive any
    accuracy out of it,
  • 54:26 - 54:27
    derive any
    completeness out of it.
  • 54:27 - 54:30
    So B and D, or C or D is
    a straight elimination.
  • 54:30 - 54:33
    But what happens
    with the A and C
  • 54:33 - 54:36
    is that when you do it from
    the documentation perspective
  • 54:36 - 54:38
    and then go to the system audit
    trail, it is still correct.
  • 54:38 - 54:40
    It is still correct,
    and some of the auditors
  • 54:40 - 54:41
    do still practice it.
  • 54:41 - 54:43
    But what happens
    is, you sometimes
  • 54:43 - 54:45
    miss the perspective
    out of it, and your mind
  • 54:45 - 54:50
    starts to think why a specific
    thing that we will start
  • 54:50 - 54:51
    thinking, it needs to be there.
  • 54:51 - 54:56
    But when you extract the
    system-generated information
  • 54:56 - 54:57
    and then check with
    the documentation,
  • 54:57 - 55:01
    whether this is the correct
    way of doing things or not,
  • 55:01 - 55:04
    then that is the
    most probable factor
  • 55:04 - 55:06
    you will stumble upon any gaps.
  • 55:06 - 55:08
    So when testing the
    change management,
  • 55:08 - 55:10
    IS auditor should
    always start with
  • 55:10 - 55:14
    the system-generated evidences,
    information containing the date
  • 55:14 - 55:16
    and time module
    last it was updated,
  • 55:16 - 55:19
    and trace it back to the
    documentation authorizing it.
  • 55:19 - 55:22
    Because, see, it is like
    finding a needle in a haystack.
  • 55:22 - 55:25
    So what happens is,
    for every transaction,
  • 55:25 - 55:26
    you need to have an approval.
  • 55:26 - 55:28
    It is not like for every
    transaction approval,
  • 55:28 - 55:31
    whether there is a corresponding
    system entry or not.
  • 55:31 - 55:34
    Some might have even
    not been deployed.
  • 55:34 - 55:36
    So what happens
    is the risk of not
  • 55:36 - 55:38
    detecting undocumented changes.
  • 55:38 - 55:41
    That is what is the problem
    here because whatever is there
  • 55:41 - 55:44
    in the documentation is
    documented, and it is fine.
  • 55:44 - 55:48
    That is the difference
    between C and D.
  • 55:48 - 55:51
    The classification based on
    the criticality of a software
  • 55:51 - 55:53
    application is a part of IS
    business activity continuity
  • 55:53 - 55:55
    plan determined by the--
  • 55:55 - 55:57
    nature of the
    business and the value
  • 55:57 - 55:59
    of the application
    to the business,
  • 55:59 - 56:01
    replacement cost
    of the application,
  • 56:01 - 56:03
    vendor support available
    for the application,
  • 56:03 - 56:04
    associated threats
    and vulnerabilities
  • 56:04 - 56:07
    of the application.
  • 56:07 - 56:10
    So the correct answer is A,
    so the nature of the business
  • 56:10 - 56:12
    and the value of the application
    towards the business.
  • 56:12 - 56:15
    So rest of the
    other options seems
  • 56:15 - 56:18
    a little bit irrelevant to
    this question, the replacement
  • 56:18 - 56:19
    cost of the application.
  • 56:19 - 56:22
    So why it is even
    important to understand?
  • 56:22 - 56:25
    And the vendor support
    is not a relevant factor
  • 56:25 - 56:28
    because determining the
    criticality classification.
  • 56:28 - 56:29
    The associated threats
    and vulnerabilities
  • 56:29 - 56:33
    will be evaluated only if
    the application is deemed
  • 56:33 - 56:34
    to be critical to the business.
  • 56:34 - 56:38
    So rest of the other
    options are not correct.
  • 56:38 - 56:40
    The next question is, when
    conducting an audit of a client
  • 56:40 - 56:42
    server database
    security, the IS auditor
  • 56:42 - 56:45
    should be most concerned
    about the availability of--
  • 56:45 - 56:48
    system utilities, application
    program generators,
  • 56:48 - 56:53
    system security documentation,
    access to stored procedures.
  • 56:53 - 56:57
    So the whole point is
    availability of what?
  • 56:57 - 57:01
    So the point is system security
    documentation, of course,
  • 57:01 - 57:02
    it is required.
  • 57:02 - 57:05
    The problem here is that
    it should be required only
  • 57:05 - 57:08
    for a few specific set of people
    whom the organization wants
  • 57:08 - 57:10
    to give the access
    to the documentation.
  • 57:10 - 57:13
    Not every junior level employee
    cannot have the security
  • 57:13 - 57:15
    documentation in place.
  • 57:15 - 57:18
    And B is completely irrelevant
    because application program
  • 57:18 - 57:20
    generators, it's not.
  • 57:20 - 57:23
    In the correct shop,
    actually the correct option
  • 57:23 - 57:27
    is option A, system utilities.
  • 57:27 - 57:29
    System utilities may
    enable unauthorized changes
  • 57:29 - 57:32
    to be made to the data
    on a client server model.
  • 57:32 - 57:35
    Because if you read the
    database model very clearly,
  • 57:35 - 57:36
    there are certain
    system utilities
  • 57:36 - 57:40
    you should not give access to,
    because the system utilities
  • 57:40 - 57:41
    will bypass the
    security controls
  • 57:41 - 57:45
    and the access
    controls, and the person
  • 57:45 - 57:48
    will be still having ability to
    make some unauthorized changes.
  • 57:48 - 57:51
    People who have read the
    database of security model,
  • 57:51 - 57:53
    I think they will be
    clear with this answer
  • 57:53 - 57:56
    because the fundamental thing
    is that it's a system utility.
  • 57:56 - 57:59
    Say for an example, that
    is the reason why we
  • 57:59 - 58:00
    do the hardening of the system.
  • 58:00 - 58:04
    We will delete access
    to the unwanted things
  • 58:04 - 58:08
    that is not required as
    a part of the system.
  • 58:08 - 58:10
    Let me move on to
    the next question.
  • 58:10 - 58:14
    When reviewing a network used
    for internet connections,
  • 58:14 - 58:16
    an IS auditor will
    first examine the what?
  • 58:16 - 58:18
    Validity of the password
    changes occurrence,
  • 58:18 - 58:20
    architecture of the
    client server application,
  • 58:20 - 58:22
    network architecture
    design, firewall protection
  • 58:22 - 58:25
    and proxy servers?
  • 58:25 - 58:28
    So I think unanimously
    people are answering
  • 58:28 - 58:32
    for C. That is the correct
    answer as well because you need
  • 58:32 - 58:34
    to understand what a network
    architecture and design is all
  • 58:34 - 58:36
    about, about that
    particular communication.
  • 58:36 - 58:39
    So B may seem a
    little bit irrelevant
  • 58:39 - 58:41
    to this particular
    thing because firewall
  • 58:41 - 58:44
    comes after the whole thing
    of understanding network
  • 58:44 - 58:44
    architecture.
  • 58:44 - 58:48
    And B is also the
    second, but it's not
  • 58:48 - 58:50
    as the first important thing, C.
  • 58:50 - 58:53
    I will tell you the difference
    between C and B. Understanding
  • 58:53 - 58:56
    the network architecture design
    is starting point of identifying
  • 58:56 - 58:58
    various layers of the
    security architecture
  • 58:58 - 59:01
    across the various layers, such
    as client server applications.
  • 59:01 - 59:03
    But in first or
    in principle, what
  • 59:03 - 59:04
    you need to do is
    the first step,
  • 59:04 - 59:07
    we need to understand the
    network architecture as a whole.
  • 59:07 - 59:10
    Then you go to the client server
    model, how it is designed.
  • 59:10 - 59:12
    That is how you
    need to take things.
  • 59:12 - 59:14
    Again, this is a
    step-based approach,
  • 59:14 - 59:18
    like how you approach BCP,
    DRP, and change management.
  • 59:18 - 59:22
    This is, again a
    step-based approach.
  • 59:22 - 59:23
    Data measuring
    should be implemented
  • 59:23 - 59:26
    as a recovery strategy when?
  • 59:26 - 59:28
    Data mirroring
    should be implemented
  • 59:28 - 59:30
    as a recovery strategy when?
  • 59:30 - 59:33
    RPO is low, RPO is
    high, RTO is high,
  • 59:33 - 59:35
    disaster tolerance is high?
  • 59:35 - 59:38
  • 59:38 - 59:39
    It is a very easy question.
  • 59:39 - 59:42
    If you have understood
    The concept of RPO or RTO,
  • 59:42 - 59:45
    this is a very easy question.
  • 59:45 - 59:49
    So the correct answer
    is RPO, B, which is low.
  • 59:49 - 59:53
    So recovery point
    objective is the earliest
  • 59:53 - 59:56
    in the point in which it
    is acceptable to recover.
  • 59:56 - 59:59
    So recover the data,
    in other words,
  • 59:59 - 60:02
    RPO indicates the age
    of recovered data.
  • 60:02 - 60:05
    And so what happens is the
    organization cannot afford
  • 60:05 - 60:07
    to lose even a few
    minutes of data.
  • 60:07 - 60:11
    In such case, data mirroring
    should be used, usually used
  • 60:11 - 60:13
    as a recovery strategy.
  • 60:13 - 60:17
    So I think one of the last
    questions with domain 4 will be,
  • 60:17 - 60:19
    which of the
    following components
  • 60:19 - 60:21
    of business continuity
    plan primarily
  • 60:21 - 60:23
    responsible for
    organizational IS department?
  • 60:23 - 60:25
    Developing the business
    continuity plan,
  • 60:25 - 60:27
    selecting and approving
    the recovery strategies
  • 60:27 - 60:30
    used for business continuity
    plan, declaring a disaster,
  • 60:30 - 60:35
    or restoring the IT systems
    and data after disaster?
  • 60:35 - 60:38
    Following components of
    primarily the responsibility
  • 60:38 - 60:43
    of the organization's
    IS department primarily?
  • 60:43 - 60:46
    So when you see
    the primarily, what
  • 60:46 - 60:51
    is the primarily objective of
    the IS department in relation
  • 60:51 - 60:53
    with the business
    continuity plan?
  • 60:53 - 60:56
    So restore the data is
    very, very important.
  • 60:56 - 60:59
    At the end of the day, what
    is the end game of that?
  • 60:59 - 61:02
    Whenever a disaster struck--
  • 61:02 - 61:05
    disasters has
    already struck, fine,
  • 61:05 - 61:07
    what we are going to do now?
  • 61:07 - 61:08
    Now we are going to
    temporarily run the business
  • 61:08 - 61:11
    on the other show, with the
    backups and stuff like that,
  • 61:11 - 61:13
    with the skeleton
    staff, whatever.
  • 61:13 - 61:15
    But maybe the
    primary objective is
  • 61:15 - 61:17
    that it is always to
    restore the IT systems
  • 61:17 - 61:18
    and data after a disaster.
  • 61:18 - 61:21
    That is what is correct
    and also [INAUDIBLE].
  • 61:21 - 61:24
    You can see the
    explanation over here.
  • 61:24 - 61:27
    Members of the organization's
    most senior management
  • 61:27 - 61:29
    are primarily responsible
    for overseeing
  • 61:29 - 61:32
    the development of the
    business continuity plan
  • 61:32 - 61:33
    and are accountable
    for the results.
  • 61:33 - 61:36
    So IS team is not
    responsible for that.
  • 61:36 - 61:38
    It is the business and
    the senior management
  • 61:38 - 61:41
    who is responsible for
    because that's their business.
  • 61:41 - 61:44
    Management is also accountable
    for selecting and approving
  • 61:44 - 61:45
    all strategies.
  • 61:45 - 61:49
    That is, again, to do with
    the individual business.
  • 61:49 - 61:50
    Cool.
  • 61:50 - 61:54
    So that brings me to the domain
    5, the most technical domain,
  • 61:54 - 61:55
    if I'm not wrong.
  • 61:55 - 61:59
    The longest domain
    in the book as well.
  • 61:59 - 62:03
    The first question
    is, an IS auditor
  • 62:03 - 62:06
    is reviewing the configuration
    of a signature-based intrusion
  • 62:06 - 62:08
    detection system,
    which is the IDS,
  • 62:08 - 62:10
    would be the most concerned
    if which of the following
  • 62:10 - 62:12
    is discovered?
  • 62:12 - 62:14
    Auto update is turned off,
    scanning for application
  • 62:14 - 62:17
    vulnerability is disabled,
    analysis of encrypted data
  • 62:17 - 62:19
    packets are disabled,
    IDS is placed
  • 62:19 - 62:23
    between a demilitarized
    zone and the firewall?
  • 62:23 - 62:25
    A, auto update is turned off.
  • 62:25 - 62:28
    So even in our home,
    when we are running
  • 62:28 - 62:33
    Kaspersky, Norton or whatever
    security thing, the intrusion--
  • 62:33 - 62:35
    not intrusion, but
    antivirus software,
  • 62:35 - 62:38
    the signature is very important.
  • 62:38 - 62:41
    It will get updated twice
    or thrice or even five
  • 62:41 - 62:44
    times in a day, depending
    upon what is the situation.
  • 62:44 - 62:46
    So what happens is, when
    you have turned this off--
  • 62:46 - 62:48
    God knows when you
    have turned it off
  • 62:48 - 62:50
    and how many days the
    system is not updated.
  • 62:50 - 62:55
    That is the most important risk
    in anything, whenever the IDS--
  • 62:55 - 62:59
    because when a signature-based
    IDS is looking for patterns
  • 62:59 - 63:02
    and the pattern is not
    recently updated for a recent
  • 63:02 - 63:04
    vulnerability, what happens?
  • 63:04 - 63:07
    Your system is as good
    as it is not protected.
  • 63:07 - 63:10
    Whenever you are reading
    this answer reasoning, even
  • 63:10 - 63:14
    in the CRM, even in the
    question and answers bank,
  • 63:14 - 63:17
    I request you all to read
    all the four options,
  • 63:17 - 63:19
    why it is correct,
    why it is not correct,
  • 63:19 - 63:21
    and to get familiarized.
  • 63:21 - 63:24
    Say for an example, in this, the
    complete irrelevant option is B.
  • 63:24 - 63:26
    But they have given
    a good information
  • 63:26 - 63:29
    on a demilitarized zone or DMZ.
  • 63:29 - 63:31
    So this can be used in
    some other question, which
  • 63:31 - 63:34
    might be all dealing with DMZ.
  • 63:34 - 63:36
    Let me move on to
    the next question.
  • 63:36 - 63:39
    An IS auditor has just completed
    a review of organization
  • 63:39 - 63:42
    that has mainframe computer
    and two database servers where
  • 63:42 - 63:44
    all the production data reside.
  • 63:44 - 63:46
    Which one of the
    following weakness
  • 63:46 - 63:50
    should the IS auditor be
    considered the most serious?
  • 63:50 - 63:53
    The security officer also serves
    as a database administrator.
  • 63:53 - 63:55
    Password controls
    are not administered
  • 63:55 - 63:57
    over 2 database servers.
  • 63:57 - 63:59
    There is no business continuity
    plan for the mainframe system's
  • 63:59 - 64:01
    non-critical applications.
  • 64:01 - 64:05
    Most local data networks do
    not have backup file server
  • 64:05 - 64:07
    fixed disk regularly.
  • 64:07 - 64:09
  • 64:09 - 64:12
    So the correct answer
    is B, password controls
  • 64:12 - 64:16
    are not administered over
    two database servers.
  • 64:16 - 64:19
    So the absence of password
    controls on the two database
  • 64:19 - 64:21
    servers, where the
    production data resides,
  • 64:21 - 64:22
    is the most critical.
  • 64:22 - 64:25
    Because again, this question
    talks about the most.
  • 64:25 - 64:27
    There are two options,
    which is correct, of course.
  • 64:27 - 64:30
    And what you need to
    look for is the one
  • 64:30 - 64:35
    which is most apt given the
    situation and the scenario.
  • 64:35 - 64:38
    So let me go on to
    the next question.
  • 64:38 - 64:41
    The insurance company is using
    the public cloud computing
  • 64:41 - 64:44
    for one of its critical
    applications to reduce the cost.
  • 64:44 - 64:46
    Which of the following
    would be the most
  • 64:46 - 64:48
    concern to the IS auditor?
  • 64:48 - 64:50
    The inability to
    recover the service
  • 64:50 - 64:52
    in a major technical
    failure scenario.
  • 64:52 - 64:54
    The data in shared
    environment being
  • 64:54 - 64:56
    accessed by other companies.
  • 64:56 - 64:59
    The service provider not
    including investigative support
  • 64:59 - 65:00
    for incidents.
  • 65:00 - 65:02
    The long-term viability of the
    service if the provider goes out
  • 65:02 - 65:03
    of business.
  • 65:03 - 65:06
  • 65:06 - 65:10
    So that is actually
    the correct answer.
  • 65:10 - 65:12
    Considering that an
    insurance company
  • 65:12 - 65:15
    must preserve the privacy and
    confidentiality of the customer
  • 65:15 - 65:18
    information, unauthorized access
    to the information and the data
  • 65:18 - 65:22
    leakage are the
    two major concerns.
  • 65:22 - 65:23
    The next question.
  • 65:23 - 65:26
    Which one of the
    following best determines
  • 65:26 - 65:28
    whether the complete encryption
    or the authentication
  • 65:28 - 65:30
    protocol for
    protecting information
  • 65:30 - 65:33
    while being transmitted exist?
  • 65:33 - 65:36
    A digital signature with the
    RSA that has been implemented.
  • 65:36 - 65:39
    Work has been done in
    the tunnel mode nested
  • 65:39 - 65:41
    with the services of AH,
    which is the authentication
  • 65:41 - 65:44
    header, and encapsulating
    security payload, which
  • 65:44 - 65:45
    is the ESP.
  • 65:45 - 65:48
    Digital certificates
    with the RSA being used.
  • 65:48 - 65:51
    Work is being done in transport
    mode of the nested services
  • 65:51 - 65:53
    of AH and ESP.
  • 65:53 - 65:57
    Quite a tricky technical
    question, I would say.
  • 65:57 - 66:01
    And to remind you, I
    have studied these things
  • 66:01 - 66:04
    quite cumbersomely
    because I didn't even
  • 66:04 - 66:06
    understand a single word when
    I was doing it the first time.
  • 66:06 - 66:09
    Transport mode, tunnel
    mode, everything
  • 66:09 - 66:11
    was Greek and Latin for me.
  • 66:11 - 66:14
  • 66:14 - 66:16
    B is the correct answer.
  • 66:16 - 66:18
    Tunnel mode provides
    encryption and authentication
  • 66:18 - 66:22
    of complete IP package,
    including the authentication
  • 66:22 - 66:26
    header and the encapsulating
    security payload, which is ESP.
  • 66:26 - 66:31
    For transport mode provides
    only at higher layers, like data
  • 66:31 - 66:33
    fields and the payload
    of an IP package.
  • 66:33 - 66:36
    So those are the
    two differences.
  • 66:36 - 66:39
    Actually, as I told,
    a digital certificate
  • 66:39 - 66:41
    provides only the
    authentication and integrity,
  • 66:41 - 66:43
    does not provide
    anything beyond that.
  • 66:43 - 66:46
    And whenever you see any digital
    signature versus encryption,
  • 66:46 - 66:50
    I think digital certificate
    is only to provide
  • 66:50 - 66:51
    an authentication.
  • 66:51 - 66:52
    It doesn't provide
    any other thing.
  • 66:52 - 66:54
    It doesn't provide
    even confidentiality.
  • 66:54 - 66:57
    It doesn't provide
    any availability
  • 66:57 - 67:00
    or any of the things.
  • 67:00 - 67:04
    Which one of the following
    characterizes distributed denial
  • 67:04 - 67:06
    of service attack, DDoS?
  • 67:06 - 67:09
    Central initiation of
    intermediary computers
  • 67:09 - 67:12
    to detect simultaneous attacks,
    surplus message traffic
  • 67:12 - 67:14
    and specified target site.
  • 67:14 - 67:17
    Local initiation of
    intermediary computers
  • 67:17 - 67:20
    to detect simultaneous and
    spurious of message traffic
  • 67:20 - 67:21
    at specific target site.
  • 67:21 - 67:24
    Central initiation
    of primary computer
  • 67:24 - 67:28
    to detect spurious message
    traffic at multiple sites.
  • 67:28 - 67:33
    And local initiation of
    intermediary computers to direct
  • 67:33 - 67:37
    staggered spurious
    message traffic
  • 67:37 - 67:38
    at a specific target site.
  • 67:38 - 67:41
  • 67:41 - 67:43
    Again, this is a
    confusing question,
  • 67:43 - 67:44
    but the answer is very simple.
  • 67:44 - 67:49
  • 67:49 - 67:51
    That is the correct
    answer as well.
  • 67:51 - 67:54
    So what happens with
    the DDoS attack is
  • 67:54 - 67:59
    that one controller system
    or one primary system
  • 67:59 - 68:02
    will be controlling so
    many zombie computers,
  • 68:02 - 68:05
    and the administrator will
    launch an attack on these zombie
  • 68:05 - 68:08
    computers, will start sending
    packets to the primary target.
  • 68:08 - 68:11
    And by flooding their
    traffic, and they will
  • 68:11 - 68:12
    be having some kind of issue.
  • 68:12 - 68:16
    Say for an example, if Amazon is
    putting a Independence Day sale,
  • 68:16 - 68:20
    I want to affect this sales
    by targeting their servers.
  • 68:20 - 68:23
    I can launch this attack
    using the zombie computers,
  • 68:23 - 68:25
    and they will attack on
    behalf of [INAUDIBLE],
  • 68:25 - 68:28
    and I will be controlling
    the zombie computers.
  • 68:28 - 68:31
    And what happens
    next is God knows.
  • 68:31 - 68:34
    So again, our DDoS attacks
    are not locally initiated.
  • 68:34 - 68:35
    They are not staggered.
  • 68:35 - 68:39
    They are not initiated
    using a primary computer.
  • 68:39 - 68:43
    So last question for this
    day, which of the following
  • 68:43 - 68:46
    is the most effective
    preventive antivirus control?
  • 68:46 - 68:47
    Scanning the emails.
  • 68:47 - 68:48
    Attachment on the mail server.
  • 68:48 - 68:51
    Restoring the systems
    from clean copies.
  • 68:51 - 68:54
    Disabling universal serial
    bus ports, which is the USB.
  • 68:54 - 68:57
    An online antivirus scan
    with up-to-date antivirus
  • 68:57 - 69:00
    definitions.
  • 69:00 - 69:05
    Correct answer is actually
    D. But why not C. B and D?
  • 69:05 - 69:07
    It is completely irrelevant.
  • 69:07 - 69:10
    It doesn't talk anything
    about antivirus or anything
  • 69:10 - 69:12
    because it's just
    restoring systems
  • 69:12 - 69:17
    from clean copies, which is
    most baseline thing that we do.
  • 69:17 - 69:19
    And disabling USB.
  • 69:19 - 69:23
    I think disabling USB should
    be an incorrect option again.
  • 69:23 - 69:27
    You can disable the
    USB, but still system
  • 69:27 - 69:33
    can read the USB file when
    it is having [INAUDIBLE].
  • 69:33 - 69:35
    So D would be the most
    appropriate answer
  • 69:35 - 69:39
    for this one because of the
    fact that antivirus can be
  • 69:39 - 69:41
    used to prevent virus attacks.
  • 69:41 - 69:43
    By running regular
    scans, it can also
  • 69:43 - 69:45
    be used to detect virus
    infections that have already
  • 69:45 - 69:46
    been occurred.
  • 69:46 - 69:47
    Regular updates
    of the software is
  • 69:47 - 69:51
    required to ensure it is able
    to update, detect and correct
  • 69:51 - 69:52
    viruses as they emerge.
  • 69:52 - 69:55
    So again, the important
    thing that you need to know
  • 69:55 - 69:58
    is that the signature-based
    system, as always,
  • 69:58 - 69:59
    it should be kept up to date.
  • 69:59 - 70:02
    But not a heuristic--
  • 70:02 - 70:05
    not a knowledge-based system.
  • 70:05 - 70:06
    Sometimes you'll be
    having a conflict
  • 70:06 - 70:10
    between heuristic and
    signature-based and all
  • 70:10 - 70:11
    those stuffs.
  • 70:11 - 70:14
    You need to be very clear
    which system talks about what.
  • 70:14 - 70:17
    Because some systems, like IDPs,
    which talks about the anomalies,
  • 70:17 - 70:20
    it will not talk about
    system signature.
  • 70:20 - 70:22
    It will talk about
    only the anomalies.
  • 70:22 - 70:24
    Say for an example,
    these anomalies
  • 70:24 - 70:27
    will be studied
    for certain dates
  • 70:27 - 70:29
    so that the regular
    traffic will be like this.
  • 70:29 - 70:31
    And anything beyond
    this regular traffic
  • 70:31 - 70:34
    will be flagged as
    incorrect traffic
  • 70:34 - 70:35
    or the non-relevant traffic.
  • 70:35 - 70:39
    And it will be quarantined,
    and it will not
  • 70:39 - 70:40
    be allowed, intrusion
    detection system.
  • 70:40 - 70:43
    And sometimes it can be
    prevented from entering
  • 70:43 - 70:44
    our servers as well.
  • 70:44 - 70:48
    So that brings me to
    the end of this session.
  • 70:48 - 70:49
    Thanks a lot everybody.
  • 70:49 - 70:51
    I'll wind up the session.
  • 70:51 - 70:54
    Thank you for your patience
    and listening to me.
  • 70:54 - 70:56
    And it was a very
    fruitful session.
  • 70:56 - 70:58
    I appreciate.
Title:
CISA Exam Questions | CISA Domain 1-5 Exam Question | How to Think Like IS Auditor ?
Description:

more » « less
Video Language:
English
Duration:
01:10:58

English subtitles

Revisions