ExamGecko
Question list
Search
Search

Related questions

Question 981 - CISA discussion

Report
Export

An IS auditor finds that periodic reviews of read-only users for a reporting system are not being performed. Which of the following should be the IS auditor's NEXT course of action?

A.
Review the list of end users and evaluate for authorization.
Answers
A.
Review the list of end users and evaluate for authorization.
B.
Report this control process weakness to senior management.
Answers
B.
Report this control process weakness to senior management.
C.
Verify managements approval for this exemption
Answers
C.
Verify managements approval for this exemption
D.
Obtain a verbal confirmation from IT for this exemption.
Answers
D.
Obtain a verbal confirmation from IT for this exemption.
Suggested answer: B

Explanation:

The IS auditor's next course of action should be to report this control process weakness to senior management, as it may indicate a lack of oversight and accountability for the reporting system. Read-only users may have access to sensitive or confidential information that should be restricted or monitored. Periodic reviews of read-only users are a good practice to ensure that the access rights are still valid and appropriate for the users' roles and responsibilities. Reporting this weakness to senior management will also allow them to take corrective actions or implement compensating controls if needed.

Option A is incorrect because reviewing the list of end users and evaluating for authorization is not the IS auditor's responsibility, but rather the system owner's or administrator's. The IS auditor should only verify that such reviews are performed and documented by the responsible parties.

Option C is incorrect because verifying management's approval for this exemption is not sufficient to address the control process weakness. Even if there is a valid reason for not performing periodic reviews of read-only users, the IS auditor should still report this as a potential risk and recommend mitigating controls.

Option D is incorrect because obtaining a verbal confirmation from IT for this exemption is not adequate evidence or documentation. The IS auditor should obtain written approval from management and verify that it is aligned with the organization's policies and standards.

CISA Review Manual (Digital Version)1, Chapter 1: The Process of Auditing Information Systems, Section 1.4: Audit Evidence, p. 31-32.

CISA Review Manual (Print Version), Chapter 1: The Process of Auditing Information Systems, Section 1.4: Audit Evidence, p. 31-32.

CISA Online Review Course2, Module 1: The Process of Auditing Information Systems, Lesson 4: Audit Evidence, slide 9-10.

CISA Questions, Answers & Explanations Database3, Question ID: QAE_CISA_710.

asked 18/09/2024
SCOTTIE EASTER
40 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first