ExamGecko
Question list
Search
Search

Related questions

Question 1155 - CISA discussion

Report
Export

Which of the following BEST enables an IS auditor to combine and compare access control lists from various applications and devices?

A.
Integrated test facility (ITF)
Answers
A.
Integrated test facility (ITF)
B.
Snapshots
Answers
B.
Snapshots
C.
Data analytics
Answers
C.
Data analytics
D.
Audit hooks
Answers
D.
Audit hooks
Suggested answer: C

Explanation:

Data analytics is the process of analyzing large and complex data sets to discover patterns, trends, and insights that can support decision making and problem solving. Data analytics can enable an IS auditor to combine and compare access control lists from various applications and devices by using techniques such as data extraction, transformation, loading, cleansing, integration, aggregation, visualization, and reporting. Data analytics can help an IS auditor to identify and assess the risks and controls related to access management, such as unauthorized or excessive access, segregation of duties violations, access policy compliance, access activity monitoring, and access review and remediation.

The other options are not as effective or relevant as data analytics for combining and comparing access control lists from various applications and devices. Integrated test facility (ITF) is a technique for testing the validity and accuracy of application processing by inserting fictitious transactions into the system and verifying the results. ITF does not directly involve the analysis of access control lists. Snapshots are records of selected information at a specific point in time that can be used to monitor system activity or performance. Snapshots can provide some information about access control lists, but they are not sufficient to combine and compare them across different sources. Audit hooks are software routines embedded in an application that can trigger an alert or a report when certain conditions are met. Audit hooks can help to detect anomalies or exceptions in access control lists, but they do not provide a comprehensive or integrated view of them.

ISACA, CISA Review Manual, 27th Edition, 2019, p.2361

ISACA, ITAF: A Professional Practices Framework for IS Audit/Assurance, 3rd Edition, 2014, p.882

Data Analytics for Auditing Access Control3

asked 18/09/2024
Renata Maria DA SILVA
46 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first