ExamGecko
Home Home / Isaca / CISA

Isaca CISA Practice Test - Questions Answers, Page 10

Question list
Search
Search

Related questions

Which of the following is the PRIMARY advantage of parallel processing for a new system implementation?

A.
Assurance that the new system meets functional requirements
A.
Assurance that the new system meets functional requirements
Answers
B.
More time for users to complete training for the new system
B.
More time for users to complete training for the new system
Answers
C.
Significant cost savings over other system implemental or approaches
C.
Significant cost savings over other system implemental or approaches
Answers
D.
Assurance that the new system meets performance requirements
D.
Assurance that the new system meets performance requirements
Answers
Suggested answer: D

Explanation:

Parallel processing is a system implementation approach that involves running the new system and the old system simultaneously for a period of time until the new system is verified and accepted. The primary advantage of parallel processing is that it provides assurance that the new system meets performance requirements and produces the same or better results as the old system. Parallel processing also minimizes the risk of system failure and data loss, as the old system can be used as a backup or fallback option in case of any problems with the new system.

An IS auditor finds the log management system is overwhelmed with false positive alerts. The auditor's BEST recommendation would be to:

A.
establish criteria for reviewing alerts.
A.
establish criteria for reviewing alerts.
Answers
B.
recruit more monitoring personnel.
B.
recruit more monitoring personnel.
Answers
C.
reduce the firewall rules.
C.
reduce the firewall rules.
Answers
D.
fine tune the intrusion detection system (IDS).
D.
fine tune the intrusion detection system (IDS).
Answers
Suggested answer: D

Explanation:

Fine tuning the intrusion detection system (IDS) is the best recommendation to reduce the number of false positive alerts that overwhelm the log management system, because it can help adjust the sensitivity and accuracy of the IDS rules and signatures to match the network environment and traffic patterns.Establishing criteria for reviewing alerts, recruiting more monitoring personnel, and reducing the firewall rules are not effective solutions to address the root cause of the false positive alerts, but rather ways to cope with the consequences.Reference:CISA Review Manual (Digital Version), Chapter 5, Section 5.4.3

Which of the following should be the MOST important consideration when conducting a review of IT portfolio management?

A.
Assignment of responsibility for each project to an IT team member
A.
Assignment of responsibility for each project to an IT team member
Answers
B.
Adherence to best practice and industry approved methodologies
B.
Adherence to best practice and industry approved methodologies
Answers
C.
Controls to minimize risk and maximize value for the IT portfolio
C.
Controls to minimize risk and maximize value for the IT portfolio
Answers
D.
Frequency of meetings where the business discusses the IT portfolio
D.
Frequency of meetings where the business discusses the IT portfolio
Answers
Suggested answer: C

Explanation:

Controls to minimize risk and maximize value for the IT portfolio should be the most important consideration when conducting a review of IT portfolio management, because they ensure that the IT portfolio aligns with the business strategy, objectives, and priorities, and that the IT investments deliver optimal benefits and outcomes.Assignment of responsibility for each project to an IT team member, adherence to best practice and industry approved methodologies, and frequency of meetings where the business discusses the IT portfolio are also relevant aspects of IT portfolio management, but they are not as important as controls to minimize risk and maximize value.Reference:CISA Review Manual (Digital Version), Chapter 1, Section 1.2.3

Which of the following should be the PRIMARY basis for prioritizing follow-up audits?

A.
Audit cycle defined in the audit plan
A.
Audit cycle defined in the audit plan
Answers
B.
Complexity of management's action plans
B.
Complexity of management's action plans
Answers
C.
Recommendation from executive management
C.
Recommendation from executive management
Answers
D.
Residual risk from the findings of previous audits
D.
Residual risk from the findings of previous audits
Answers
Suggested answer: D

Explanation:

Residual risk from the findings of previous audits should be the primary basis for prioritizing follow-up audits, because it reflects the level of exposure and potential impact that remains after management has implemented corrective actions or accepted the risk. Follow-up audits should focus on verifying whether the residual risk is within acceptable levels and whether the corrective actions are effective and sustainable.Audit cycle defined in the audit plan, complexity of management's action plans, and recommendation from executive management are not valid criteria for prioritizing follow-up audits, because they do not consider the residual risk from previous audits.Reference:CISA Review Manual (Digital Version), Chapter 2, Section 2.4.3

Which of the following is the BEST control to prevent the transfer of files to external parties through instant messaging (IM) applications?

A.
File level encryption
A.
File level encryption
Answers
B.
File Transfer Protocol (FTP)
B.
File Transfer Protocol (FTP)
Answers
C.
Instant messaging policy
C.
Instant messaging policy
Answers
D.
Application-level firewalls
D.
Application-level firewalls
Answers
Suggested answer: D

Explanation:

Application level firewalls are the best control to prevent the transfer of files to external parties through instant messaging (IM) applications, because they can inspect and filter network traffic based on application-specific protocols and commands, such as IM file transfer commands. Application level firewalls can block or allow IM file transfers based on predefined rules or policies.File level encryption, file transfer protocol (FTP), and instant messaging policy are not effective controls to prevent IM file transfers, because they do not restrict or monitor IM network traffic.Reference:CISA Review Manual (Digital Version), Chapter 5, Section 5.4.1

Which of the following is the BEST control to mitigate the malware risk associated with an instant messaging (IM) system?

A.
Blocking attachments in IM
A.
Blocking attachments in IM
Answers
B.
Blocking external IM traffic
B.
Blocking external IM traffic
Answers
C.
Allowing only corporate IM solutions
C.
Allowing only corporate IM solutions
Answers
D.
Encrypting IM traffic
D.
Encrypting IM traffic
Answers
Suggested answer: C

Explanation:

Allowing only corporate IM solutions is the best control to mitigate the malware risk associated with an IM system, because it can prevent unauthorized or malicious IM applications from accessing the network and infecting the system with malware. Corporate IM solutions can also enforce security policies and standards, such as encryption, authentication, and logging, to protect the IM system from malware attacks.Blocking attachments in IM, blocking external IM traffic, and encrypting IM traffic are also possible controls to mitigate the malware risk, but they are not as effective as allowing only corporate IM solutions.Reference:CISA Review Manual (Digital Version), Chapter 5, Section 5.4.4

Which of the following should be an IS auditor's PRIMARY focus when developing a risk-based IS audit program?

A.
Portfolio management
A.
Portfolio management
Answers
B.
Business plans
B.
Business plans
Answers
C.
Business processes
C.
Business processes
Answers
D.
IT strategic plans
D.
IT strategic plans
Answers
Suggested answer: C

Explanation:

Business processes should be the primary focus of an IS auditor when developing a risk-based IS audit program, because they represent the core activities and functions of the organization that support its objectives and goals. Business processes also involve the use of IT resources and systems that may pose risks to the organization's performance and compliance. A risk-based IS audit program should identify and assess the risks associated with the business processes and determine the appropriate audit scope and procedures to provide assurance on their effectiveness and efficiency.Portfolio management, business plans, and IT strategic plans are also relevant factors for developing a risk-based IS audit program, but they are not as important as business processes.Reference:CISA Review Manual (Digital Version), Chapter 2, Section 2.2.1

Cross-site scripting (XSS) attacks are BEST prevented through:

A.
application firewall policy settings.
A.
application firewall policy settings.
Answers
B.
a three-tier web architecture.
B.
a three-tier web architecture.
Answers
C.
secure coding practices.
C.
secure coding practices.
Answers
D.
use of common industry frameworks.
D.
use of common industry frameworks.
Answers
Suggested answer: C

Explanation:

Secure coding practices are the best way to prevent cross-site scripting (XSS) attacks, because they can ensure that the web application validates and sanitizes user input and output data to prevent malicious scripts from being executed on the web browser. XSS attacks are a type of web application vulnerability that exploit the lack of input validation or output encoding in web pages that accept user input or display dynamic content.Application firewall policy settings, a three-tier web architecture, and use of common industry frameworks are not effective controls to prevent XSS attacks, because they do not address the root cause of the vulnerability in the web application code.Reference:CISA Review Manual (Digital Version), Chapter 5, Section 5.4.2

When determining whether a project in the design phase will meet organizational objectives, what is BEST to compare against the business case?

A.
Implementation plan
A.
Implementation plan
Answers
B.
Project budget provisions
B.
Project budget provisions
Answers
C.
Requirements analysis
C.
Requirements analysis
Answers
D.
Project plan
D.
Project plan
Answers
Suggested answer: C

Explanation:

Requirements analysis should be the best thing to compare against the business case when determining whether a project in the design phase will meet organizational objectives, because it defines the functional and non-functional specifications of the project deliverables that should satisfy the business needs and expectations. Requirements analysis can help evaluate whether the project design is aligned with the business case and whether it can achieve the desired outcomes and benefits.Implementation plan, project budget provisions, and project plan are also important aspects of a project in the design phase, but they are not as relevant as requirements analysis for comparing against the business case.Reference:CISA Review Manual (Digital Version), Chapter 4, Section 4.2.1

An organization has outsourced its data processing function to a service provider. Which of the following would BEST determine whether the service provider continues to meet the organization s objectives?

A.
Assessment of the personnel training processes of the provider
A.
Assessment of the personnel training processes of the provider
Answers
B.
Adequacy of the service provider's insurance
B.
Adequacy of the service provider's insurance
Answers
C.
Review of performance against service level agreements (SLAs)
C.
Review of performance against service level agreements (SLAs)
Answers
D.
Periodic audits of controls by an independent auditor
D.
Periodic audits of controls by an independent auditor
Answers
Suggested answer: C

Explanation:

Reviewing the performance against service level agreements (SLAs) would best determine whether the service provider continues to meet the organization's objectives, as SLAs define the expected level of service, quality, availability, and responsibilities of both parties.Assessment of the personnel training processes of the provider, adequacy of the service provider's insurance, and periodic audits of controls by an independent auditor are important aspects of outsourcing, but they do not directly measure the performance of the service provider against the organization's objectives.Reference:CISA Review Manual (Digital Version), Chapter 3, Section 3.5.2

Total 1.198 questions
Go to page: of 120