Inspirational journeys

Follow the stories of academics and their research expeditions

CISA—Certified Information Systems Auditor - Part 213

Mary Smith

Sat, 18 Apr 2026

CISA—Certified Information Systems Auditor - Part 213

1. An IS auditor reviewing the risk assessment process of an organization should FIRST:

A) identify the reasonable threats to the information assets.
B) analyze the technical and organizational vulnerabilities.
C) identify and rank the information assets.
D) evaluate the effect of a potential security breach.



2. An IS auditor is reviewing an IT security risk management program. Measures of security risk should:

A) address all of the network risks.
B) be tracked over time against the IT strategic plan.
C) take into account the entire IT environment.
D) result in the identification of vulnerability tolerances.



3. Which of the following should be considered FIRST when implementing a risk management program?

A) An understanding of the organization's threat, vulnerability and risk profile
B) An understanding of the risk exposures and the potential consequences of compromise
C) A determination of risk management priorities based on potential consequences
D) A risk mitigation strategy sufficient to keep risk consequences at an acceptable level



4. As a driver of IT governance, transparency of IT's cost, value and risks is primarily achieved through:

A) performance measurement.
B) strategic alignment.
C) value delivery.
D) resource management.



5. Which of the following should be the MOST important consideration when deciding areas of priority for IT governance implementation?

A) Process maturity
B) Performance indicators
C) Business risk
D) Assurance reports



1. Right Answer: C
Explanation: Identification and ranking of information assets-e.g., data criticality, locations of assets-will set the tone or scope of how to assess risk in relation to the organizational value of the asset. Second, the threats facing each of the organization's assets should be analyzed according to their value to the organization.Third, weaknesses should be identified so that controls can be evaluated to determine if they mitigate the weaknesses. Fourth, analyze how these weaknesses, in absence of given controls, would impact the organization information assets.

2. Right Answer: C
Explanation: When assessing IT security risk, it is important to take into account the entire IT environment. Measures of security risk should focus on those areas with the highest criticality so as to achieve maximum risk reduction at the lowest possible cost. IT strategic plans are not granular enough to provide appropriate measures.Objective metrics must be tracked over time against measurable goals, thus the management of risk is enhanced by comparing today's results against last week, last month, last quarter. Risk measures will profile assets on a network to objectively measure vulnerability risk. They do not identify tolerances.

3. Right Answer: A
Explanation: Implementing risk management, as one of the outcomes of effective information security governance, would require a collective understanding of the organization's threat, vulnerability and risk profile as a first step. Based on this, an understanding of risk exposure and potential consequences of compromise could be determined. Risk management priorities based on potential consequences could then be developed. This would provide a basis for the formulation of strategies for risk mitigation sufficient to keep the consequences from risk at an acceptable level.

4. Right Answer: A
Explanation: Performance measurement includes setting and monitoring measurable objectives of what the IT processes need to deliver {process outcome) and how they deliver it (process capability and performance). Strategic alignment primarily focuses on ensuring linkage of business and IT plans. Value delivery is about executing the value proposition throughout the delivery cycle. Resource management is about the optimal investment in and proper management of critical IT resources. Transparency is primarily achieved through performance measurement as it provides information to the stakeholders on how well the enterprise is performing when compared to objectives.

5. Right Answer: C
Explanation: Priority should be given to those areas which represent a known risk to the enterprise's operations. The level of process maturity, process performance and audit reports will feed into the decision making process. Those areas that represent real risk to the business should be given priority.

0 Comments

Leave a comment