ExamGecko
Home Home / Isaca / CISA

Isaca CISA Practice Test - Questions Answers

Question list
Search
Search

Related questions

What would be an IS auditor's BEST recommendation upon finding that a third-party IT service provider hosts the organization's human resources (HR) system in a foreign country?

A.
Perform background verification checks.
A.
Perform background verification checks.
Answers
B.
Review third-party audit reports.
B.
Review third-party audit reports.
Answers
C.
Implement change management review.
C.
Implement change management review.
Answers
D.
Conduct a privacy impact analysis.
D.
Conduct a privacy impact analysis.
Answers
Suggested answer: D

Explanation:

The best recommendation for an IS auditor when finding that a third-party IT service provider hosts the organization's HR system in a foreign country is to conduct a privacy impact analysis. A privacy impact analysis is a systematic process that identifies and evaluates the potential risks and impacts of collecting, using, disclosing, and storing personal information. A privacy impact analysis will help the IS auditor to assess the legal, regulatory, contractual, and ethical obligations of the organization and the service provider regarding the protection of personal information. A privacy impact analysis will also help to identify and mitigate any privacy risks and gaps in the service level agreement.Reference:

CISA Certification | Certified Information Systems Auditor | ISACA

CISA Questions, Answers & Explanations Database

Which of the following is the BEST way to enforce the principle of least privilege on a server containing data with different security classifications?

A.
Limiting access to the data files based on frequency of use
A.
Limiting access to the data files based on frequency of use
Answers
B.
Obtaining formal agreement by users to comply with the data classification policy
B.
Obtaining formal agreement by users to comply with the data classification policy
Answers
C.
Applying access controls determined by the data owner
C.
Applying access controls determined by the data owner
Answers
D.
Using scripted access control lists to prevent unauthorized access to the server
D.
Using scripted access control lists to prevent unauthorized access to the server
Answers
Suggested answer: C

Explanation:

The best way to enforce the principle of least privilege on a server containing data with different security classifications is to apply access controls determined by the data owner. The principle of least privilege states that users should only have the minimum level of access required to perform their tasks. The data owner is the person who has the authority and responsibility to classify, label, and protect the data according to its sensitivity and value. The data owner can define the access rights and permissions for each user or role based on the data classification policy and the business needs. This will ensure that only authorized and appropriate users can access the data and prevent unauthorized or excessive access that could compromise the confidentiality, integrity, or availability of the data.Reference:

CISA Review Manual (Digital Version)

CISA Questions, Answers & Explanations Database

The PRIMARY benefit of automating application testing is to:

A.
provide test consistency.
A.
provide test consistency.
Answers
B.
provide more flexibility.
B.
provide more flexibility.
Answers
C.
replace all manual test processes.
C.
replace all manual test processes.
Answers
D.
reduce the time to review code.
D.
reduce the time to review code.
Answers
Suggested answer: A

Explanation:

The primary benefit of automating application testing is to provide test consistency. Automated testing can ensure that the same test cases are executed in the same manner and order every time, which can improve the reliability and accuracy of the test results. Providing more flexibility, replacing all manual test processes, and reducing the time to review code are possible benefits of automating application testing, but they are not the primary benefit.Reference:

ISACA, CISA Review Manual, 27th Edition, 2020, p.3091

ISACA, CISA Review Questions, Answers & Explanations Database - 12 Month Subscription

Which of the following BEST addresses the availability of an online store?

A.
RAID level 5 storage devices
A.
RAID level 5 storage devices
Answers
B.
Online backups
B.
Online backups
Answers
C.
A mirrored site at another location
C.
A mirrored site at another location
Answers
D.
Clustered architecture
D.
Clustered architecture
Answers
Suggested answer: C

Explanation:

The primary benefit of automating application testing is to provide test consistency. Automated testing can ensure that the same test cases are executed in the same manner and order every time, which can improve the reliability and accuracy of the test results. Providing more flexibility, replacing all manual test processes, and reducing the time to review code are possible benefits of automating application testing, but they are not the primary benefit.Reference:

ISACA, CISA Review Manual, 27th Edition, 2020, p.3091

ISACA, CISA Review Questions, Answers & Explanations Database - 12 Month Subscription

Which of the following is the BEST way to prevent social engineering incidents?

A.
Maintain an onboarding and annual security awareness program.
A.
Maintain an onboarding and annual security awareness program.
Answers
B.
Ensure user workstations are running the most recent version of antivirus software.
B.
Ensure user workstations are running the most recent version of antivirus software.
Answers
C.
Include security responsibilities in job descriptions and require signed acknowledgment.
C.
Include security responsibilities in job descriptions and require signed acknowledgment.
Answers
D.
Enforce strict email security gateway controls
D.
Enforce strict email security gateway controls
Answers
Suggested answer: A

Explanation:

Maintaining an onboarding and annual security awareness program is the best way to prevent social engineering incidents because it can educate the users about the common techniques and tactics used by social engineers and how to avoid falling victim to them. Ensuring user workstations are running the most recent version of antivirus software, including security responsibilities in job descriptions and requiring signed acknowledgment, and enforcing strict email security gateway controls are all good security practices, but they do not directly address the human factor that is exploited by social engineering.Reference:

ISACA, CISA Review Manual, 27th Edition, 2020, p.3671

ISACA, CISA Review Questions, Answers & Explanations Database - 12 Month Subscription2

The PRIMARY purpose of a configuration management system is to:

A.
track software updates.
A.
track software updates.
Answers
B.
define baselines for software.
B.
define baselines for software.
Answers
C.
support the release procedure.
C.
support the release procedure.
Answers
D.
standardize change approval.
D.
standardize change approval.
Answers
Suggested answer: B

Explanation:

A configuration management system is a process that establishes and maintains the consistency of a product's attributes throughout its life cycle. It helps to identify and control the functional and physical characteristics of a product, and to record and report any changes to those characteristics. A configuration management system also supports the audit of the product to verify its conformance to requirements.

One of the key activities of a configuration management system is to define baselines for software. A baseline is a fixed reference point that serves as a basis for comparison and measurement. A baseline can be established for any configuration item, such as a requirement, a design document, a test plan, or a software component. A baseline helps to ensure that the software product meets its intended purpose and quality standards, and that any changes to the software are controlled and documented.

A configuration management system also supports other activities, such as tracking software updates, supporting the release procedure, and standardizing change approval, but these are not its primary purpose. Therefore, the other options are incorrect.

Which of the following is the MOST important consideration when evaluating the data retention policy for a global organization with regional offices in multiple countries?

A.
The policy aligns with corporate policies and practices.
A.
The policy aligns with corporate policies and practices.
Answers
B.
The policy aligns with global best practices.
B.
The policy aligns with global best practices.
Answers
C.
The policy aligns with business goals and objectives.
C.
The policy aligns with business goals and objectives.
Answers
D.
The policy aligns with local laws and regulations.
D.
The policy aligns with local laws and regulations.
Answers
Suggested answer: D

Explanation:

The data retention policy for a global organization with regional offices in multiple countries should align with local laws and regulations, as they may vary significantly from one country to another and may impose different requirements and penalties for non-compliance.The policy should also consider the corporate policies and practices, the global best practices, and the business goals and objectives, but these are secondary to the legal compliance.Reference:CISA Review Manual (Digital Version), Chapter 5: Protection of Information Assets, Section 5.3: Data Classification and Protection

Which of the following BEST enables alignment of IT with business objectives?

A.
Benchmarking against peer organizations
A.
Benchmarking against peer organizations
Answers
B.
Developing key performance indicators (KPIs)
B.
Developing key performance indicators (KPIs)
Answers
C.
Completing an IT risk assessment
C.
Completing an IT risk assessment
Answers
D.
Leveraging an IT governance framework
D.
Leveraging an IT governance framework
Answers
Suggested answer: D

Explanation:

Leveraging an IT governance framework is the best way to enable alignment of IT with business objectives, as it provides a set of principles, standards, processes, and practices that guide the effective delivery of IT services that support the organization's strategy and goals.Benchmarking against peer organizations, developing key performance indicators (KPIs), and completing an IT risk assessment are useful activities that can help measure and improve the performance and value of IT, but they are not sufficient to ensure alignment without a governance framework.Reference:CISA Review Manual (Digital Version), Chapter 1: Information Systems Auditing Process, Section 1.2: IT Governance

Which of the following are used in a firewall to protect the entity's internal resources?

A.
Remote access servers
A.
Remote access servers
Answers
B.
Secure Sockets Layers (SSLs)
B.
Secure Sockets Layers (SSLs)
Answers
C.
Internet Protocol (IP) address restrictions
C.
Internet Protocol (IP) address restrictions
Answers
D.
Failover services
D.
Failover services
Answers
Suggested answer: C

Explanation:

Internet Protocol (IP) address restrictions are used in a firewall to protect the entity's internal resources by allowing or denying access to specific IP addresses or ranges of IP addresses based on predefined rules. Remote access servers, Secure Sockets Layers (SSLs), and failover services are not directly related to firewall protection, but rather to other aspects of network security, such as authentication, encryption, and availability.Reference:CISA Review Manual (Digital Version), Chapter 5: Protection of Information Assets, Section 5.2: Network Security Devices and Technologies

Which of the following would be MOST impacted if an IS auditor were to assist with the implementation of recommended control enhancements?

A.
Independence
A.
Independence
Answers
B.
Integrity
B.
Integrity
Answers
C.
Materiality
C.
Materiality
Answers
D.
Accountability
D.
Accountability
Answers
Suggested answer: A

Explanation:

Independence would be most impacted if an IS auditor were to assist with the implementation of recommended control enhancements, as this would create a conflict of interest and impair the objectivity and credibility of the IS auditor. Integrity, materiality, and accountability are important attributes of an IS auditor, but they are not directly affected by the involvement in the implementation of control enhancements.Reference:CISA Review Manual (Digital Version), Chapter 1: Information Systems Auditing Process, Section 1.1: IS Audit Standards, Guidelines and Codes of Ethics

Total 1.198 questions
Go to page: of 120