ExamGecko
Home Home / Isaca / CISA

Isaca CISA Practice Test - Questions Answers, Page 67

Question list
Search
Search

List of questions

Search

Related questions











Which of the following should an IS auditor review when evaluating information systems governance for a large organization?

A.
Approval processes for new system implementations
A.
Approval processes for new system implementations
Answers
B.
Procedures for adding a new user to the invoice processing system
B.
Procedures for adding a new user to the invoice processing system
Answers
C.
Approval processes for updating the corporate website
C.
Approval processes for updating the corporate website
Answers
D.
Procedures for regression testing system changes
D.
Procedures for regression testing system changes
Answers
Suggested answer: A

Explanation:

Information systems governance is the set of policies, processes, structures, and practices that ensure the alignment of IT with business objectives, the delivery of value from IT investments, the management of IT risks, and the optimization of IT resources1. Information systems governance is a strategic and high-level function that covers the entire organization and its IT portfolio. Therefore, an IS auditor should review the aspects of information systems governance that are relevant to the organization's vision, mission, goals, and strategies.

One of the aspects that an IS auditor should review when evaluating information systems governance for a large organization is the approval processes for new system implementations.This is because new system implementations are significant IT investments that require careful planning, analysis, design, development, testing, deployment, and evaluation to ensure that they meet the business requirements, deliver the expected benefits, comply with the relevant standards and regulations, and minimize the potential risks2.The approval processes for new system implementations should involve the appropriate stakeholders, such as senior management, business owners, IT managers, project managers, users, and auditors, who have the authority and responsibility to approve or reject the proposed system implementations based on predefined criteria and metrics3.The approval processes for new system implementations should also be documented, transparent, consistent, and timely to ensure accountability and traceability4. Therefore, an IS auditor should review the approval processes for new system implementations to assess whether they are aligned with the information systems governance framework and objectives.

The other possible options are:

Procedures for adding a new user to the invoice processing system: This is an operational task that involves granting access rights and permissions to a specific user for a specific system based on the principle of least privilege. This is not a strategic or high-level function that falls under information systems governance. Therefore, an IS auditor should not review this aspect when evaluating information systems governance for a large organization.

Approval processes for updating the corporate website: This is a tactical task that involves making changes or enhancements to the content or design of the corporate website based on the business needs and feedback. This is not a strategic or high-level function that falls under information systems governance. Therefore, an IS auditor should not review this aspect when evaluating information systems governance for a large organization.

Procedures for regression testing system changes: This is a technical task that involves verifying that existing system functionalities are not adversely affected by new system changes or updates. This is not a strategic or high-level function that falls under information systems governance.Therefore, an IS auditor should not review this aspect when evaluating information systems governance for a large organization.Reference:1: What is IT Governance?- Definition from Techopedia2: System Implementation - an overview | ScienceDirect Topics3: Project Approval Process - Project Management Knowledge4: 5 Best Practices For A Successful Project Approval Process | Kissflow Project : Principle of Least Privilege (POLP) | Imperva : How to Update Your Website Content - 7 Step Guide | HostGator Blog : What Is Regression Testing? Definition & Best Practices | BrowserStack

Which of the following is an IS auditor's BEST recommendation to protect an organization from attacks when its file server needs to be accessible to external users?

A.
Enforce a secure tunnel connection.
A.
Enforce a secure tunnel connection.
Answers
B.
Enhance internal firewalls.
B.
Enhance internal firewalls.
Answers
C.
Set up a demilitarized zone (DMZ).
C.
Set up a demilitarized zone (DMZ).
Answers
D.
Implement a secure protocol.
D.
Implement a secure protocol.
Answers
Suggested answer: C

Explanation:

A demilitarized zone (DMZ) is a network segment that is separated from the internal network and the external network, such as the internet, by firewalls or other security devices. A DMZ provides an extra layer of security for the organization's internal network by isolating the servers and services that need to be accessible to external users, such as a file server, from the rest of the network. A DMZ also prevents external users from accessing the internal network directly, as they have to go through two firewalls to reach it.Therefore, setting up a DMZ is an IS auditor's best recommendation to protect an organization from attacks when its file server needs to be accessible to external users12.

The other possible options are:

Enforce a secure tunnel connection: This means that the organization requires external users to establish a secure and encrypted connection, such as a virtual private network (VPN), to access its file server. This can provide some level of security and privacy for the data transmission, but it does not protect the file server or the internal network from attacks if the connection is compromised or if the external users are malicious.Therefore, enforcing a secure tunnel connection is not an IS auditor's best recommendation to protect an organization from attacks when its file server needs to be accessible to external users3.

Enhance internal firewalls: This means that the organization improves the security and performance of its internal firewalls, which are devices that filter and control the network traffic between different segments of the network. This can provide some level of protection for the internal network from unauthorized or malicious access, but it does not protect the file server or the external network from attacks if the file server is exposed to the internet or if the external network is compromised.Therefore, enhancing internal firewalls is not an IS auditor's best recommendation to protect an organization from attacks when its file server needs to be accessible to external users4.

Implement a secure protocol: This means that the organization uses a secure and standardized protocol, such as Secure File Transfer Protocol (SFTP) or Secure Shell (SSH), to transfer files between its file server and external users. This can provide some level of security and integrity for the data transmission, but it does not protect the file server or the internal network from attacks if the protocol is exploited or if the external users are malicious.Therefore, implementing a secure protocol is not an IS auditor's best recommendation to protect an organization from attacks when its file server needs to be accessible to external users5.Reference:1: What Is a DMZ Network and Why Would You Use It?| Fortinet2: Demilitarised zone (DMZ) | Cyber.gov.au3: What Is VPN Tunneling?| Fortinet4: Firewall - Wikipedia5: Secure Shell - Wikipedia

Which of the following concerns is MOST effectively addressed by implementing an IT framework for alignment between IT and business objectives?

A.
Inaccurate business impact analysis (BIA)
A.
Inaccurate business impact analysis (BIA)
Answers
B.
Inadequate IT change management practices
B.
Inadequate IT change management practices
Answers
C.
Lack of a benchmark analysis
C.
Lack of a benchmark analysis
Answers
D.
Inadequate IT portfolio management
D.
Inadequate IT portfolio management
Answers
Suggested answer: D

Explanation:

An IT framework for alignment between IT and business objectives is a set of principles, guidelines, and practices that help an organization to ensure that its IT investments support its strategic goals, deliver value, manage risks, and optimize resources. One of the benefits of implementing such a framework is that it enables an effective IT portfolio management, which is the process of selecting, prioritizing, monitoring, and evaluating the IT projects and services that comprise the IT portfolio. An IT portfolio is a collection of IT assets, such as applications, infrastructure, data, and capabilities, that are aligned with the business needs and objectives. An IT portfolio management helps an organization to achieve the following outcomes:

Align the IT portfolio with the business strategy and vision

Balance the IT portfolio among different types of investments, such as innovation, growth, maintenance, and compliance

Optimize the IT portfolio performance, value, and risk

Enhance the IT portfolio decision-making and governance

Improve the IT portfolio communication and transparency

Therefore, an inadequate IT portfolio management is a major concern that can be addressed by implementing an IT framework for alignment between IT and business objectives. An inadequate IT portfolio management can result in the following issues:

Misalignment of the IT portfolio with the business needs and expectations

Imbalance of the IT portfolio among competing demands and priorities

Suboptimal use of the IT resources and capabilities

Lack of visibility and accountability of the IT portfolio outcomes and impacts

Poor communication and collaboration among the IT portfolio stakeholders

The other possible options are:

Inaccurate business impact analysis (BIA): A BIA is a process of identifying and assessing the potential effects of a disruption or disaster on the critical business functions and processes. A BIA helps an organization to determine the recovery priorities, objectives, and strategies for its business continuity plan. A BIA is not directly related to an IT framework for alignment between IT and business objectives, although it may use some inputs from the IT portfolio management. Therefore, an inaccurate BIA is not a concern that can be effectively addressed by implementing an IT framework for alignment between IT and business objectives.

Inadequate IT change management practices: IT change management is a process of controlling and managing the changes to the IT environment, such as hardware, software, configuration, or documentation. IT change management helps an organization to minimize the risks and disruptions caused by the changes, ensure the quality and consistency of the changes, and align the changes with the business requirements. IT change management is not directly related to an IT framework for alignment between IT and business objectives, although it may support some aspects of the IT portfolio management. Therefore, inadequate IT change management practices are not a concern that can be effectively addressed by implementing an IT framework for alignment between IT and business objectives.

Lack of a benchmark analysis: A benchmark analysis is a process of comparing an organization's performance, processes, or practices with those of other organizations or industry standards. A benchmark analysis helps an organization to identify its strengths and weaknesses, set realistic goals and targets, and implement best practices for improvement. A benchmark analysis is not directly related to an IT framework for alignment between IT and business objectives, although it may provide some insights for the IT portfolio management.Therefore, lack of a benchmark analysis is not a concern that can be effectively addressed by implementing an IT framework for alignment between IT and business objectives.Reference:1: What is Portfolio Management?| Smartsheet2: What Is Portfolio Management?- Definition from Techopedia3: What Is Project Portfolio Management (PPM)?| ProjectManager.com4: What Is Business Impact Analysis?| Smartsheet5: What Is Change Management?- Definition from Techopedia6: Benchmarking - Wikipedia

When assessing a proposed project for the two-way replication of a customer database with a remote call center, the IS auditor should ensure that:

A.
database conflicts are managed during replication.
A.
database conflicts are managed during replication.
Answers
B.
end users are trained in the replication process.
B.
end users are trained in the replication process.
Answers
C.
the source database is backed up on both sites.
C.
the source database is backed up on both sites.
Answers
D.
user rights are identical on both databases.
D.
user rights are identical on both databases.
Answers
Suggested answer: A

Explanation:

A database conflict occurs when the same data is modified at two separate servers, such as a customer database and a remote call center database, and the changes are not consistent with each other. For example, if a customer updates their phone number at the customer database, and a call center agent updates the same customer's address at the remote call center database, there is a conflict between the two updates. Database conflicts can cause data inconsistency, corruption, or loss if they are not detected and resolved properly.

Two-way replication is a process of synchronizing data between two databases, so that any changes made in one database are reflected in the other database, and vice versa. Two-way replication can improve data availability, performance, and scalability, but it also increases the risk of database conflicts. Therefore, when assessing a proposed project for the two-way replication of a customer database with a remote call center, the IS auditor should ensure that database conflicts are managed during replication. This means that the project should have a clear and effective strategy for:

Preventing or minimizing database conflicts by using techniques such as locking, timestamping, or partitioning.

Detecting or identifying database conflicts by using tools such as triggers, logs, or alerts.

Resolving or handling database conflicts by using methods such as priority-based, rule-based, or user-based resolution.

The other possible options are:

B . end users are trained in the replication process: This is not a relevant or important factor for the IS auditor to ensure when assessing a proposed project for the two-way replication of a customer database with a remote call center. End users are not directly involved in the replication process, and they do not need to have detailed knowledge or skills about how replication works. The replication process should be transparent and seamless to the end users, and they should only interact with the data through their applications or interfaces.

C . the source database is backed up on both sites: This is not a sufficient or necessary factor for the IS auditor to ensure when assessing a proposed project for the two-way replication of a customer database with a remote call center. Backing up the source database on both sites can provide some level of data protection and recovery, but it does not address the issue of database conflicts that can occur during replication. Moreover, backing up the source database on both sites may not be feasible or efficient, as it may consume more storage space and network bandwidth, and introduce more complexity and overhead to the replication process.

D . user rights are identical on both databases: This is not a critical or relevant factor for the IS auditor to ensure when assessing a proposed project for the two-way replication of a customer database with a remote call center. User rights are the permissions or privileges that users have to access or modify data in a database. User rights do not directly affect the occurrence or resolution of database conflicts during replication. User rights may vary depending on the role or function of the users in different databases, and they should be defined and enforced according to the security policies and requirements of each database.

Which of the following is MOST important to consider when reviewing an organization's defined data backup and restoration procedures?

A.
Business continuity plan (BCP)
A.
Business continuity plan (BCP)
Answers
B.
Recovery point objective (RPO)
B.
Recovery point objective (RPO)
Answers
C.
Mean time to restore (MTTR)
C.
Mean time to restore (MTTR)
Answers
D.
Mean time between failures (MTBF)
D.
Mean time between failures (MTBF)
Answers
Suggested answer: B

Explanation:

A recovery point objective (RPO) is the maximum acceptable amount of data loss after an unplanned data-loss incident, expressed as an amount of time.This is generally thought of as the point in time before the event at which data can be successfully recovered -- that is, the time elapsed since the most recent reliable backup1. RPOs are important to consider when reviewing an organization's defined data backup and restoration procedures, because they determine how frequently the organization needs to perform backups, and how much data it can afford to lose in case of a disaster. RPOs are usually defined based on the business impact and criticality of the data, as well as the compliance and regulatory requirements. For example, a financial institution may have a very low RPO (such as a few minutes or seconds) for its transactional data, while a research institute may have a higher RPO (such as a few hours or days) for its experimental data.

The other possible options are:

A . Business continuity plan (BCP): A BCP is a document that outlines how an organization will continue to operate or resume its critical functions and processes in the event of a disruption or disaster. A BCP includes various elements, such as risk assessment, business impact analysis, recovery strategies, roles and responsibilities, communication plan, and testing and maintenance. A BCP is related to an organization's defined data backup and restoration procedures, but it is not the most important factor to consider when reviewing them. A BCP defines the recovery objectives and strategies for the entire organization, while the data backup and restoration procedures are more specific and technical in nature.

C . Mean time to restore (MTTR): MTTR is a metric that measures the average time it takes to restore a system or service after a failure or outage. MTTR is an indicator of the efficiency and effectiveness of an organization's recovery process, as well as the availability and reliability of its systems or services. MTTR is related to an organization's defined data backup and restoration procedures, but it is not the most important factor to consider when reviewing them. MTTR reflects the actual performance of the recovery process, while the data backup and restoration procedures define the expected steps and actions for the recovery process.

D . Mean time between failures (MTBF): MTBF is a metric that measures the average time between failures or outages of a system or service. MTBF is an indicator of the quality and durability of an organization's systems or services, as well as their susceptibility to failures or outages. MTBF is related to an organization's defined data backup and restoration procedures, but it is not the most important factor to consider when reviewing them. MTBF reflects the potential frequency of failures or outages, while the data backup and restoration procedures define the contingency plans for failures or outages.

Which of the following should be an IS auditor's PRIMARY focus when evaluating the response process for cybercrimes?

A.
Communication with law enforcement
A.
Communication with law enforcement
Answers
B.
Notification to regulators
B.
Notification to regulators
Answers
C.
Root cause analysis
C.
Root cause analysis
Answers
D.
Evidence collection
D.
Evidence collection
Answers
Suggested answer: D

Explanation:

Evidence collection is the process of identifying, acquiring, preserving, and documenting digital evidence from various sources, such as computers, networks, mobile devices, or cloud services, that can be used to support the investigation and prosecution of cybercrimes. Evidence collection is an IS auditor's primary focus when evaluating the response process for cybercrimes, because it determines the quality and validity of the evidence that can be used to prove or disprove the facts of the case, identify the perpetrators, and recover the losses.Evidence collection should follow the standards and best practices for digital forensics, such as ISO/IEC 270371, which provide guidelines for ensuring the integrity, authenticity, reliability, and admissibility of the evidence2.

The other possible options are:

A . Communication with law enforcement: This is the process of reporting, cooperating, and coordinating with law enforcement agencies that have the jurisdiction and authority to investigate and prosecute cybercrimes. Communication with law enforcement is an important aspect of the response process for cybercrimes, but it is not an IS auditor's primary focus when evaluating it. Communication with law enforcement depends on the legal and regulatory requirements, the nature and severity of the incident, and the organizational policies and procedures.Communication with law enforcement should be done after evidence collection, to avoid compromising or contaminating the evidence3.

B . Notification to regulators: This is the process of informing and updating the relevant regulatory bodies or authorities that oversee or supervise the organization's activities or industry sector about the cybercrime incident. Notification to regulators is an important aspect of the response process for cybercrimes, but it is not an IS auditor's primary focus when evaluating it. Notification to regulators depends on the legal and regulatory requirements, the nature and impact of the incident, and the organizational policies and procedures.Notification to regulators should be done after evidence collection, to avoid disclosing sensitive or confidential information4.

C . Root cause analysis: This is the process of identifying and analyzing the underlying factors or causes that led to or contributed to the cybercrime incident. Root cause analysis is an important aspect of the response process for cybercrimes, but it is not an IS auditor's primary focus when evaluating it. Root cause analysis helps to prevent or mitigate future incidents, improve security controls and processes, and learn from mistakes.Root cause analysis should be done after evidence collection, to avoid interfering with or affecting the investigation5.

Which of the following provides the MOST useful information to an IS auditor when selecting projects for inclusion in an IT audit plan?

A.
Project charter
A.
Project charter
Answers
B.
Project plan
B.
Project plan
Answers
C.
Project issue log
C.
Project issue log
Answers
D.
Project business case
D.
Project business case
Answers
Suggested answer: D

Explanation:

A project business case is a document that describes the rationale and justification for initiating a project, based on its expected costs, benefits, risks, and feasibility. A project business case provides the most useful information to an IS auditor when selecting projects for inclusion in an IT audit plan, because it helps the IS auditor to:

Understand the purpose, scope, objectives, and deliverables of the project

Assess the alignment of the project with the organization's strategy, vision, and goals

Evaluate the value proposition and return on investment of the project

Identify the key stakeholders, sponsors, and owners of the project

Analyze the potential risks and issues associated with the project

Compare and prioritize the project with other competing projects

The other possible options are:

A . Project charter: A project charter is a document that formally authorizes and defines the high-level scope, roles, responsibilities, and authority of a project. A project charter provides some useful information to an IS auditor when selecting projects for inclusion in an IT audit plan, but it is not the most useful information. A project charter does not provide enough details about the costs, benefits, risks, and feasibility of the project, which are essential for evaluating its suitability for an IT audit plan.

B . Project plan: A project plan is a document that outlines the detailed scope, schedule, budget, resources, quality, and communication plans of a project. A project plan provides some useful information to an IS auditor when selecting projects for inclusion in an IT audit plan, but it is not the most useful information. A project plan does not provide enough information about the rationale, justification, value proposition, and alignment of the project with the organization's strategy and goals, which are important for assessing its relevance for an IT audit plan.

C . Project issue log: A project issue log is a document that records and tracks the issues that arise during a project's execution and how they are resolved. A project issue log provides some useful information to an IS auditor when selecting projects for inclusion in an IT audit plan, but it is not the most useful information. A project issue log does not provide enough information about the purpose, objectives, benefits, and feasibility of the project, which are critical for determining its priority for an IT audit plan.

Which of the following is the MOST important control for virtualized environments?

A.
Regular updates of policies for the operation of the virtualized environment
A.
Regular updates of policies for the operation of the virtualized environment
Answers
B.
Hardening for the hypervisor and guest machines
B.
Hardening for the hypervisor and guest machines
Answers
C.
Redundancy of hardware resources and network components
C.
Redundancy of hardware resources and network components
Answers
D.
Monitoring utilization of resources at the guest operating system level
D.
Monitoring utilization of resources at the guest operating system level
Answers
Suggested answer: B

Explanation:

The most important control for virtualized environments is hardening for the hypervisor and guest machines. Hardening is the process of applying security measures and configurations to reduce the vulnerabilities and risks of a system or device. Hardening for the hypervisor and guest machines is essential for protecting the virtualized environments from attacks, as they are exposed to various threats from both the physical and virtual layers. Hardening for the hypervisor and guest machines involves the following steps:

Applying the latest patches and updates for the hypervisor and guest operating systems, as well as the applications and drivers running on them.

Configuring the firewall and network settings for the hypervisor and guest machines, to restrict and monitor the network traffic and prevent unauthorized access or communication.

Disabling or removing any unnecessary or unused features, services, accounts, or ports on the hypervisor and guest machines, to minimize the attack surface and reduce the potential entry points for attackers.

Enforcing strong authentication and authorization policies for the hypervisor and guest machines, to ensure that only authorized users or administrators can access or manage them.

Encrypting the data and communication for the hypervisor and guest machines, to protect the confidentiality and integrity of the information stored or transmitted on them.

Implementing logging and auditing mechanisms for the hypervisor and guest machines, to record and track any activities or events that occur on them, and enable detection and investigation of any incidents or anomalies.

Hardening for the hypervisor and guest machines can help prevent or mitigate common attacks on virtualized environments, such as:

Hypervisor escape: An attack where a malicious guest machine breaks out of its isolated environment and gains access to the hypervisor or other guest machines.

Hypervisor compromise: An attack where an attacker exploits a vulnerability or misconfiguration in the hypervisor to gain control over it or its resources.

Guest compromise: An attack where an attacker exploits a vulnerability or misconfiguration in a guest machine to gain access to its data or applications.

Guest impersonation: An attack where an attacker creates a fake or cloned guest machine to trick other guests or users into interacting with it.

Guest denial-of-service: An attack where an attacker consumes or exhausts the resources of a guest machine to disrupt its availability or performance.

Therefore, hardening for the hypervisor and guest machines is the most important control for virtualized environments, as it can enhance their security, reliability, and performance. For more information about hardening for virtualized environments, you can refer to some of these web sources:

Hypervisor security on the Azure fleet

Chapter 2: Hardening the Hyper-V host

Plan for Hyper-V security in Windows Server

A bank wants to outsource a system to a cloud provider residing in another country. Which of the following would be the MOST appropriate IS audit recommendation?

A.
Find an alternative provider in the bank's home country.
A.
Find an alternative provider in the bank's home country.
Answers
B.
Ensure the provider's internal control system meets bank requirements.
B.
Ensure the provider's internal control system meets bank requirements.
Answers
C.
Proceed as intended, as the provider has to observe all laws of the clients' countries.
C.
Proceed as intended, as the provider has to observe all laws of the clients' countries.
Answers
D.
Ensure the provider has disaster recovery capability.
D.
Ensure the provider has disaster recovery capability.
Answers
Suggested answer: C

Explanation:

A post-implementation review (PIR) is a process to evaluate whether the objectives of the project were met, determine how effectively this was achieved, learn lessons for the future, and ensure that the organisation gets the most benefit from the implementation of projects1. A PIR is an important tool for assessing the success and value of a project, as well as identifying the areas for improvement and best practices for future projects.

One of the key elements of a PIR is to measure the benefits of the project against the expected outcomes and benefits that were defined at the beginning of the project.Measurable benefits are the quantifiable and verifiable results or outcomes that the project delivers to the organisation or its stakeholders, such as increased revenue, reduced costs, improved quality, enhanced customer satisfaction, or compliance with regulations2. Measurable benefits should be aligned with the organisation's strategy, vision, and goals, and should be SMART (specific, measurable, achievable, relevant, and time-bound).

The finding that measurable benefits were not defined is of greatest significance among the four findings, because it implies that:

The project did not have a clear and agreed-upon purpose, scope, objectives, and deliverables

The project did not have a valid and realistic business case or justification for its initiation and implementation

The project did not have a robust and effective monitoring and evaluation mechanism to track its progress, performance, and impact

The project did not have a reliable and transparent way to demonstrate its value proposition and return on investment to the organisation or its stakeholders

The project did not have a meaningful and actionable way to learn from its achievements and challenges, and to improve its processes and practices

Therefore, an IS auditor should recommend that measurable benefits are defined for any project before its implementation, and that they are reviewed and reported regularly during and after the project's completion.

The other possible findings are:

A lessons-learned session was never conducted: This is a significant finding, but not as significant as the lack of measurable benefits. A lessons-learned session is a process of capturing and documenting the knowledge, experience, and feedback gained from a project, both positive and negative. A lessons-learned session helps to identify the strengths and weaknesses of the project management process, as well as the best practices and lessons for future projects. A lessons-learned session should be conducted at the end of each project phase or milestone, as well as at the end of the project. However, even without a formal lessons-learned session, some learning may still occur informally or implicitly among the project team members or stakeholders.

The projects 10% budget overrun was not reported to senior management: This is a significant finding, but not as significant as the lack of measurable benefits. A budget overrun is a situation where the actual cost of a project exceeds its planned or estimated cost. A budget overrun may indicate poor planning, estimation, or control of the project resources, or unexpected changes or risks that occurred during the project implementation. A budget overrun should be reported to senior management as soon as possible, along with the reasons for it and the corrective actions taken or proposed. However, a budget overrun may not necessarily affect the quality or value of the project deliverables or outcomes if they are still within acceptable standards or expectations.

Monthly dashboards did not always contain deliverables: This is a significant finding, but not as significant as the lack of measurable benefits. A dashboard is a visual tool that displays key performance indicators (KPIs) or metrics related to a project's progress, status, or results. A dashboard helps to monitor and communicate the performance of a project to various stakeholders in a concise and clear manner. A dashboard should include deliverables as one of its components, along with other elements such as schedule, budget, quality, risks, issues, or benefits. However, even without deliverables in monthly dashboards, some information about them may still be available from other sources such as reports or documents.

The following findings are the result of an IS auditor's post-implementation review of a newly implemented system. Which of the following findings is of GREATEST significance?

A.
A lessons-learned session was never conducted.
A.
A lessons-learned session was never conducted.
Answers
B.
The projects 10% budget overrun was not reported to senior management.
B.
The projects 10% budget overrun was not reported to senior management.
Answers
C.
Measurable benefits were not defined.
C.
Measurable benefits were not defined.
Answers
D.
Monthly dashboards did not always contain deliverables.
D.
Monthly dashboards did not always contain deliverables.
Answers
Suggested answer: C

Explanation:

A post-implementation review (PIR) is a process to evaluate whether the objectives of the project were met, determine how effectively this was achieved, learn lessons for the future, and ensure that the organisation gets the most benefit from the implementation of projects1. A PIR is an important tool for assessing the success and value of a project, as well as identifying the areas for improvement and best practices for future projects.

One of the key elements of a PIR is to measure the benefits of the project against the expected outcomes and benefits that were defined at the beginning of the project.Measurable benefits are the quantifiable and verifiable results or outcomes that the project delivers to the organisation or its stakeholders, such as increased revenue, reduced costs, improved quality, enhanced customer satisfaction, or compliance with regulations2. Measurable benefits should be aligned with the organisation's strategy, vision, and goals, and should be SMART (specific, measurable, achievable, relevant, and time-bound).

The finding that measurable benefits were not defined is of greatest significance among the four findings, because it implies that:

The project did not have a clear and agreed-upon purpose, scope, objectives, and deliverables

The project did not have a valid and realistic business case or justification for its initiation and implementation

The project did not have a robust and effective monitoring and evaluation mechanism to track its progress, performance, and impact

The project did not have a reliable and transparent way to demonstrate its value proposition and return on investment to the organisation or its stakeholders

The project did not have a meaningful and actionable way to learn from its achievements and challenges, and to improve its processes and practices

Therefore, an IS auditor should recommend that measurable benefits are defined for any project before its implementation, and that they are reviewed and reported regularly during and after the project's completion.

The other possible findings are:

A lessons-learned session was never conducted: This is a significant finding, but not as significant as the lack of measurable benefits. A lessons-learned session is a process of capturing and documenting the knowledge, experience, and feedback gained from a project, both positive and negative. A lessons-learned session helps to identify the strengths and weaknesses of the project management process, as well as the best practices and lessons for future projects. A lessons-learned session should be conducted at the end of each project phase or milestone, as well as at the end of the project. However, even without a formal lessons-learned session, some learning may still occur informally or implicitly among the project team members or stakeholders.

The projects 10% budget overrun was not reported to senior management: This is a significant finding, but not as significant as the lack of measurable benefits. A budget overrun is a situation where the actual cost of a project exceeds its planned or estimated cost. A budget overrun may indicate poor planning, estimation, or control of the project resources, or unexpected changes or risks that occurred during the project implementation. A budget overrun should be reported to senior management as soon as possible, along with the reasons for it and the corrective actions taken or proposed. However, a budget overrun may not necessarily affect the quality or value of the project deliverables or outcomes if they are still within acceptable standards or expectations.

Monthly dashboards did not always contain deliverables: This is a significant finding, but not as significant as the lack of measurable benefits. A dashboard is a visual tool that displays key performance indicators (KPIs) or metrics related to a project's progress, status, or results. A dashboard helps to monitor and communicate the performance of a project to various stakeholders in a concise and clear manner. A dashboard should include deliverables as one of its components, along with other elements such as schedule, budget, quality, risks, issues, or benefits. However, even without deliverables in monthly dashboards, some information about them may still be available from other sources such as reports or documents.

Total 1.198 questions
Go to page: of 120