ExamGecko
Home / Isaca / CISA / List of questions
Ask Question

Isaca CISA Practice Test - Questions Answers, Page 10

Add to Whishlist

List of questions

Question 91

Report Export Collapse

Which of the following is the PRIMARY advantage of parallel processing for a new system implementation?

Assurance that the new system meets functional requirements
Assurance that the new system meets functional requirements
More time for users to complete training for the new system
More time for users to complete training for the new system
Significant cost savings over other system implemental or approaches
Significant cost savings over other system implemental or approaches
Assurance that the new system meets performance requirements
Assurance that the new system meets performance requirements
Suggested answer: D
Explanation:

Parallel processing is a system implementation approach that involves running the new system and the old system simultaneously for a period of time until the new system is verified and accepted. The primary advantage of parallel processing is that it provides assurance that the new system meets performance requirements and produces the same or better results as the old system. Parallel processing also minimizes the risk of system failure and data loss, as the old system can be used as a backup or fallback option in case of any problems with the new system.

asked 18/09/2024
Luis Antonio Sanchez Estrada
38 questions

Question 92

Report Export Collapse

An IS auditor finds the log management system is overwhelmed with false positive alerts. The auditor's BEST recommendation would be to:

establish criteria for reviewing alerts.
establish criteria for reviewing alerts.
recruit more monitoring personnel.
recruit more monitoring personnel.
reduce the firewall rules.
reduce the firewall rules.
fine tune the intrusion detection system (IDS).
fine tune the intrusion detection system (IDS).
Suggested answer: D
Explanation:

Fine tuning the intrusion detection system (IDS) is the best recommendation to reduce the number of false positive alerts that overwhelm the log management system, because it can help adjust the sensitivity and accuracy of the IDS rules and signatures to match the network environment and traffic patterns.Establishing criteria for reviewing alerts, recruiting more monitoring personnel, and reducing the firewall rules are not effective solutions to address the root cause of the false positive alerts, but rather ways to cope with the consequences.Reference:CISA Review Manual (Digital Version), Chapter 5, Section 5.4.3

asked 18/09/2024
Reinhard KOhl
42 questions

Question 93

Report Export Collapse

Which of the following should be the MOST important consideration when conducting a review of IT portfolio management?

Assignment of responsibility for each project to an IT team member
Assignment of responsibility for each project to an IT team member
Adherence to best practice and industry approved methodologies
Adherence to best practice and industry approved methodologies
Controls to minimize risk and maximize value for the IT portfolio
Controls to minimize risk and maximize value for the IT portfolio
Frequency of meetings where the business discusses the IT portfolio
Frequency of meetings where the business discusses the IT portfolio
Suggested answer: C
Explanation:

Controls to minimize risk and maximize value for the IT portfolio should be the most important consideration when conducting a review of IT portfolio management, because they ensure that the IT portfolio aligns with the business strategy, objectives, and priorities, and that the IT investments deliver optimal benefits and outcomes.Assignment of responsibility for each project to an IT team member, adherence to best practice and industry approved methodologies, and frequency of meetings where the business discusses the IT portfolio are also relevant aspects of IT portfolio management, but they are not as important as controls to minimize risk and maximize value.Reference:CISA Review Manual (Digital Version), Chapter 1, Section 1.2.3

asked 18/09/2024
Victor Armando Sánchez
44 questions

Question 94

Report Export Collapse

Which of the following should be the PRIMARY basis for prioritizing follow-up audits?

Audit cycle defined in the audit plan
Audit cycle defined in the audit plan
Complexity of management's action plans
Complexity of management's action plans
Recommendation from executive management
Recommendation from executive management
Residual risk from the findings of previous audits
Residual risk from the findings of previous audits
Suggested answer: D
Explanation:

Residual risk from the findings of previous audits should be the primary basis for prioritizing follow-up audits, because it reflects the level of exposure and potential impact that remains after management has implemented corrective actions or accepted the risk. Follow-up audits should focus on verifying whether the residual risk is within acceptable levels and whether the corrective actions are effective and sustainable.Audit cycle defined in the audit plan, complexity of management's action plans, and recommendation from executive management are not valid criteria for prioritizing follow-up audits, because they do not consider the residual risk from previous audits.Reference:CISA Review Manual (Digital Version), Chapter 2, Section 2.4.3

asked 18/09/2024
Marcelo Oliveira
44 questions

Question 95

Report Export Collapse

Which of the following is the BEST control to prevent the transfer of files to external parties through instant messaging (IM) applications?

File level encryption
File level encryption
File Transfer Protocol (FTP)
File Transfer Protocol (FTP)
Instant messaging policy
Instant messaging policy
Application-level firewalls
Application-level firewalls
Suggested answer: D
Explanation:

Application level firewalls are the best control to prevent the transfer of files to external parties through instant messaging (IM) applications, because they can inspect and filter network traffic based on application-specific protocols and commands, such as IM file transfer commands. Application level firewalls can block or allow IM file transfers based on predefined rules or policies.File level encryption, file transfer protocol (FTP), and instant messaging policy are not effective controls to prevent IM file transfers, because they do not restrict or monitor IM network traffic.Reference:CISA Review Manual (Digital Version), Chapter 5, Section 5.4.1

asked 18/09/2024
Nishan Perera
45 questions

Question 96

Report Export Collapse

Which of the following is the BEST control to mitigate the malware risk associated with an instant messaging (IM) system?

Blocking attachments in IM
Blocking attachments in IM
Blocking external IM traffic
Blocking external IM traffic
Allowing only corporate IM solutions
Allowing only corporate IM solutions
Encrypting IM traffic
Encrypting IM traffic
Suggested answer: C
Explanation:

Allowing only corporate IM solutions is the best control to mitigate the malware risk associated with an IM system, because it can prevent unauthorized or malicious IM applications from accessing the network and infecting the system with malware. Corporate IM solutions can also enforce security policies and standards, such as encryption, authentication, and logging, to protect the IM system from malware attacks.Blocking attachments in IM, blocking external IM traffic, and encrypting IM traffic are also possible controls to mitigate the malware risk, but they are not as effective as allowing only corporate IM solutions.Reference:CISA Review Manual (Digital Version), Chapter 5, Section 5.4.4

asked 18/09/2024
Dave Breath
55 questions

Question 97

Report Export Collapse

Which of the following should be an IS auditor's PRIMARY focus when developing a risk-based IS audit program?

Portfolio management
Portfolio management
Business plans
Business plans
Business processes
Business processes
IT strategic plans
IT strategic plans
Suggested answer: C
Explanation:

Business processes should be the primary focus of an IS auditor when developing a risk-based IS audit program, because they represent the core activities and functions of the organization that support its objectives and goals. Business processes also involve the use of IT resources and systems that may pose risks to the organization's performance and compliance. A risk-based IS audit program should identify and assess the risks associated with the business processes and determine the appropriate audit scope and procedures to provide assurance on their effectiveness and efficiency.Portfolio management, business plans, and IT strategic plans are also relevant factors for developing a risk-based IS audit program, but they are not as important as business processes.Reference:CISA Review Manual (Digital Version), Chapter 2, Section 2.2.1

asked 18/09/2024
Mustafa Hussien
51 questions

Question 98

Report Export Collapse

Cross-site scripting (XSS) attacks are BEST prevented through:

application firewall policy settings.
application firewall policy settings.
a three-tier web architecture.
a three-tier web architecture.
secure coding practices.
secure coding practices.
use of common industry frameworks.
use of common industry frameworks.
Suggested answer: C
Explanation:

Secure coding practices are the best way to prevent cross-site scripting (XSS) attacks, because they can ensure that the web application validates and sanitizes user input and output data to prevent malicious scripts from being executed on the web browser. XSS attacks are a type of web application vulnerability that exploit the lack of input validation or output encoding in web pages that accept user input or display dynamic content.Application firewall policy settings, a three-tier web architecture, and use of common industry frameworks are not effective controls to prevent XSS attacks, because they do not address the root cause of the vulnerability in the web application code.Reference:CISA Review Manual (Digital Version), Chapter 5, Section 5.4.2

asked 18/09/2024
Vijayakumar Dhandapani
45 questions

Question 99

Report Export Collapse

When determining whether a project in the design phase will meet organizational objectives, what is BEST to compare against the business case?

Implementation plan
Implementation plan
Project budget provisions
Project budget provisions
Requirements analysis
Requirements analysis
Project plan
Project plan
Suggested answer: C
Explanation:

Requirements analysis should be the best thing to compare against the business case when determining whether a project in the design phase will meet organizational objectives, because it defines the functional and non-functional specifications of the project deliverables that should satisfy the business needs and expectations. Requirements analysis can help evaluate whether the project design is aligned with the business case and whether it can achieve the desired outcomes and benefits.Implementation plan, project budget provisions, and project plan are also important aspects of a project in the design phase, but they are not as relevant as requirements analysis for comparing against the business case.Reference:CISA Review Manual (Digital Version), Chapter 4, Section 4.2.1

asked 18/09/2024
Solange Castro
38 questions

Question 100

Report Export Collapse

An organization has outsourced its data processing function to a service provider. Which of the following would BEST determine whether the service provider continues to meet the organization s objectives?

Assessment of the personnel training processes of the provider
Assessment of the personnel training processes of the provider
Adequacy of the service provider's insurance
Adequacy of the service provider's insurance
Review of performance against service level agreements (SLAs)
Review of performance against service level agreements (SLAs)
Periodic audits of controls by an independent auditor
Periodic audits of controls by an independent auditor
Suggested answer: C
Explanation:

Reviewing the performance against service level agreements (SLAs) would best determine whether the service provider continues to meet the organization's objectives, as SLAs define the expected level of service, quality, availability, and responsibilities of both parties.Assessment of the personnel training processes of the provider, adequacy of the service provider's insurance, and periodic audits of controls by an independent auditor are important aspects of outsourcing, but they do not directly measure the performance of the service provider against the organization's objectives.Reference:CISA Review Manual (Digital Version), Chapter 3, Section 3.5.2

asked 18/09/2024
HWANG SEON TAE
52 questions
Total 1.402 questions
Go to page: of 141

Related questions