exam questions

Exam CISA All Questions

View all questions & answers for the CISA exam

Exam CISA topic 1 question 601 discussion

Actual exam question from Isaca's CISA
Question #: 601
Topic #: 1
[All CISA Questions]

An IS auditor is informed that several spreadsheets are being used to generate key financial information. What should the auditor verify NEXT?

  • A. Whether adequate documentation and training is available for spreadsheet users
  • B. Whether the spreadsheets meet the minimum IT general controls requirements
  • C. Whether there is a complete inventory of end-user computing (EUC) spreadsheets
  • D. Whether the spreadsheets are being formally reviewed by the chief financial officer (CFO)
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
KAP2HURUF
10 months, 3 weeks ago
Selected Answer: C
The best answer to this question is C. Whether there is a complete inventory of end-user computing (EUC) spreadsheets. The IS auditor should verify next whether there is a complete inventory of EUC spreadsheets that are being used to generate key financial information. This is because an inventory is the first step to identify and assess the EUC applications that are critical, sensitive or material to the organization’s operations and reporting. An inventory can also help to determine the ownership, location, purpose, frequency of use and update, and dependencies of the EUC spreadsheets. Without an inventory, the IS auditor cannot effectively evaluate the adequacy of controls over the EUC spreadsheets.
upvoted 1 times
...
FAGFUR
1 year, 5 months ago
Selected Answer: C
When an IS auditor is informed that several spreadsheets are being used to generate key financial information, the next step would typically involve assessing the control environment related to these spreadsheets. In this context, the auditor should verify: Risk Assessment: It helps in assessing the overall risk associated with the use of spreadsheets for financial information. This includes understanding the complexity, criticality, and potential impact of these spreadsheets on financial reporting. Control Evaluation: Having a complete inventory allows the auditor to evaluate the controls in place for each spreadsheet. This includes considerations such as data accuracy, integrity, security, and compliance with relevant policies and regulations. Efficiency and Effectiveness: It ensures that the auditor has a comprehensive view of the spreadsheet landscape, enabling them to focus on areas that are more prone to errors or manipulation.
upvoted 2 times
...
3008
1 year, 11 months ago
Selected Answer: C
End-user computing (EUC) spreadsheets are those spreadsheets created and maintained by non-IT personnel to support business operations. The use of EUCs can pose significant risks to organizations due to the lack of controls and oversight, which may result in errors, fraud, or non-compliance with regulations
upvoted 1 times
ItsBananass
1 year, 10 months ago
308, I think you just defined answer B.
upvoted 3 times
...
3008
1 year, 5 months ago
Therefore, it is crucial to have a complete inventory of EUCs to understand the scope of the risk exposure and ensure proper control over these spreadsheets. The inventory should include information such as the purpose of the spreadsheet, its owner, the data sources used, and the controls in place.
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago