Isaca CISA Practice Test - Questions Answers, Page 10

List of questions
Question 91

Which of the following is the PRIMARY advantage of parallel processing for a new system implementation?
Parallel processing is a system implementation approach that involves running the new system and the old system simultaneously for a period of time until the new system is verified and accepted. The primary advantage of parallel processing is that it provides assurance that the new system meets performance requirements and produces the same or better results as the old system. Parallel processing also minimizes the risk of system failure and data loss, as the old system can be used as a backup or fallback option in case of any problems with the new system.
Question 92

An IS auditor finds the log management system is overwhelmed with false positive alerts. The auditor's BEST recommendation would be to:
Fine tuning the intrusion detection system (IDS) is the best recommendation to reduce the number of false positive alerts that overwhelm the log management system, because it can help adjust the sensitivity and accuracy of the IDS rules and signatures to match the network environment and traffic patterns.Establishing criteria for reviewing alerts, recruiting more monitoring personnel, and reducing the firewall rules are not effective solutions to address the root cause of the false positive alerts, but rather ways to cope with the consequences.Reference:CISA Review Manual (Digital Version), Chapter 5, Section 5.4.3
Question 93

Which of the following should be the MOST important consideration when conducting a review of IT portfolio management?
Controls to minimize risk and maximize value for the IT portfolio should be the most important consideration when conducting a review of IT portfolio management, because they ensure that the IT portfolio aligns with the business strategy, objectives, and priorities, and that the IT investments deliver optimal benefits and outcomes.Assignment of responsibility for each project to an IT team member, adherence to best practice and industry approved methodologies, and frequency of meetings where the business discusses the IT portfolio are also relevant aspects of IT portfolio management, but they are not as important as controls to minimize risk and maximize value.Reference:CISA Review Manual (Digital Version), Chapter 1, Section 1.2.3
Question 94

Which of the following should be the PRIMARY basis for prioritizing follow-up audits?
Residual risk from the findings of previous audits should be the primary basis for prioritizing follow-up audits, because it reflects the level of exposure and potential impact that remains after management has implemented corrective actions or accepted the risk. Follow-up audits should focus on verifying whether the residual risk is within acceptable levels and whether the corrective actions are effective and sustainable.Audit cycle defined in the audit plan, complexity of management's action plans, and recommendation from executive management are not valid criteria for prioritizing follow-up audits, because they do not consider the residual risk from previous audits.Reference:CISA Review Manual (Digital Version), Chapter 2, Section 2.4.3
Question 95

Which of the following is the BEST control to prevent the transfer of files to external parties through instant messaging (IM) applications?
Application level firewalls are the best control to prevent the transfer of files to external parties through instant messaging (IM) applications, because they can inspect and filter network traffic based on application-specific protocols and commands, such as IM file transfer commands. Application level firewalls can block or allow IM file transfers based on predefined rules or policies.File level encryption, file transfer protocol (FTP), and instant messaging policy are not effective controls to prevent IM file transfers, because they do not restrict or monitor IM network traffic.Reference:CISA Review Manual (Digital Version), Chapter 5, Section 5.4.1
Question 96

Which of the following is the BEST control to mitigate the malware risk associated with an instant messaging (IM) system?
Allowing only corporate IM solutions is the best control to mitigate the malware risk associated with an IM system, because it can prevent unauthorized or malicious IM applications from accessing the network and infecting the system with malware. Corporate IM solutions can also enforce security policies and standards, such as encryption, authentication, and logging, to protect the IM system from malware attacks.Blocking attachments in IM, blocking external IM traffic, and encrypting IM traffic are also possible controls to mitigate the malware risk, but they are not as effective as allowing only corporate IM solutions.Reference:CISA Review Manual (Digital Version), Chapter 5, Section 5.4.4
Question 97

Which of the following should be an IS auditor's PRIMARY focus when developing a risk-based IS audit program?
Business processes should be the primary focus of an IS auditor when developing a risk-based IS audit program, because they represent the core activities and functions of the organization that support its objectives and goals. Business processes also involve the use of IT resources and systems that may pose risks to the organization's performance and compliance. A risk-based IS audit program should identify and assess the risks associated with the business processes and determine the appropriate audit scope and procedures to provide assurance on their effectiveness and efficiency.Portfolio management, business plans, and IT strategic plans are also relevant factors for developing a risk-based IS audit program, but they are not as important as business processes.Reference:CISA Review Manual (Digital Version), Chapter 2, Section 2.2.1
Question 98

Cross-site scripting (XSS) attacks are BEST prevented through:
Secure coding practices are the best way to prevent cross-site scripting (XSS) attacks, because they can ensure that the web application validates and sanitizes user input and output data to prevent malicious scripts from being executed on the web browser. XSS attacks are a type of web application vulnerability that exploit the lack of input validation or output encoding in web pages that accept user input or display dynamic content.Application firewall policy settings, a three-tier web architecture, and use of common industry frameworks are not effective controls to prevent XSS attacks, because they do not address the root cause of the vulnerability in the web application code.Reference:CISA Review Manual (Digital Version), Chapter 5, Section 5.4.2
Question 99

When determining whether a project in the design phase will meet organizational objectives, what is BEST to compare against the business case?
Requirements analysis should be the best thing to compare against the business case when determining whether a project in the design phase will meet organizational objectives, because it defines the functional and non-functional specifications of the project deliverables that should satisfy the business needs and expectations. Requirements analysis can help evaluate whether the project design is aligned with the business case and whether it can achieve the desired outcomes and benefits.Implementation plan, project budget provisions, and project plan are also important aspects of a project in the design phase, but they are not as relevant as requirements analysis for comparing against the business case.Reference:CISA Review Manual (Digital Version), Chapter 4, Section 4.2.1
Question 100

An organization has outsourced its data processing function to a service provider. Which of the following would BEST determine whether the service provider continues to meet the organization s objectives?
Reviewing the performance against service level agreements (SLAs) would best determine whether the service provider continues to meet the organization's objectives, as SLAs define the expected level of service, quality, availability, and responsibilities of both parties.Assessment of the personnel training processes of the provider, adequacy of the service provider's insurance, and periodic audits of controls by an independent auditor are important aspects of outsourcing, but they do not directly measure the performance of the service provider against the organization's objectives.Reference:CISA Review Manual (Digital Version), Chapter 3, Section 3.5.2
Question