ExamGecko
Home / Isaca / CISA / List of questions
Ask Question

Isaca CISA Practice Test - Questions Answers, Page 101

List of questions

Question 1001

Report
Export
Collapse

Which of the following physical controls provides the GREATEST assurance that only authorized individuals can access a data center?

The data center is patrolled by a security guard.
The data center is patrolled by a security guard.
Access to the data center is monitored by video cameras.
Access to the data center is monitored by video cameras.
ID badges must be displayed before access is granted
ID badges must be displayed before access is granted
Access to the data center is controlled by a mantrap.
Access to the data center is controlled by a mantrap.
Suggested answer: D

Explanation:

Access to the data center is controlled by a mantrap provides the greatest assurance that only authorized individuals can access a data center.A mantrap is a physical security device that consists of a small space with two sets of interlocking doors, such that the first set of doors must close before the second set opens1. A mantrap prevents unauthorized entry by requiring authentication at both doors, such as biometric scanners, card readers, or PIN codes.A mantrap also prevents tailgating, which is the act of following an authorized person into a restricted area without proper authorization2. A mantrap can also detect and trap intruders who attempt to force their way through the doors.

The other options are less effective physical controls for data center access. The data center is patrolled by a security guard is a deterrent measure, but it does not prevent unauthorized access by itself. A security guard may not be able to monitor all entry points, or may be distracted, bribed, or overpowered by intruders. Access to the data center is monitored by video cameras is a detective measure, but it does not prevent unauthorized access either. Video cameras can record the activities of intruders, but they cannot stop them from entering or alert the security personnel in real time. ID badges must be displayed before access is granted is a preventive measure, but it relies on human verification, which can be prone to errors or manipulation. ID badges can also be lost, stolen, or forged by intruders.

Mantrap (access control) - Wikipedia1

Tailgating (security) - Wikipedia2

asked 18/09/2024
Patrick Herrington
37 questions

Question 1002

Report
Export
Collapse

Which of the following should an IS auditor use when verifying a three-way match has occurred in an enterprise resource planning (ERR) system?

Bank confirmation
Bank confirmation
Goods delivery notification
Goods delivery notification
Purchase requisition
Purchase requisition
Purchase order
Purchase order
Suggested answer: D

Explanation:

A three-way match is a process of verifying that a purchase order, a goods receipt and an invoice are consistent before making a payment1. A three-way match ensures that the organization only pays for the goods or services that it ordered and received, and that the prices and quantities are accurate. A three-way match can prevent errors, fraud and overpayments in the accounts payable process.

An IS auditor should use a purchase order when verifying a three-way match has occurred in an enterprise resource planning (ERP) system.A purchase order is a document that authorizes a purchase transaction and specifies the items, quantities, prices and terms of the order2. A purchase order is the first document in the three-way match process, and it serves as the basis for comparing the goods receipt and the invoice. An IS auditor can use a purchase order to check if the ERP system has correctly recorded, matched and approved the three documents before making a payment.

The other options are not as useful for verifying a three-way match.A bank confirmation is a document that verifies the balance and activity of a bank account3. A bank confirmation can be used to confirm that a payment has been made or received, but it does not provide information about the details of the purchase transaction or the three-way match process.A goods delivery notification is a document that informs the buyer that the goods have been shipped or delivered by the seller4. A goods delivery notification can be used to track the status of the delivery, but it does not provide information about the quantity or quality of the goods or the invoice amount.A purchase requisition is a document that requests authorization to purchase goods or services from a specific supplier2. A purchase requisition can be used to initiate the purchasing process, but it does not provide information about the actual purchase order, goods receipt or invoice.

Bank Confirmation - Overview, How It Works, Importance3

What is Goods Delivery Note?| Definition & Example4

What Is Three-Way Matching & Why Is It Important?| NetSuite1

Enterprise Resource Planning (ERP) - Definition, Types, Uses2

asked 18/09/2024
himanshu deshpande
41 questions

Question 1003

Report
Export
Collapse

Which of the following is the MOST reliable way for an IS auditor to evaluate the operational effectiveness of an organization's data loss prevention (DLP) controls?

Review data classification levels based on industry best practice
Review data classification levels based on industry best practice
Verify that current DLP software is installed on all computer systems.
Verify that current DLP software is installed on all computer systems.
Conduct interviews to identify possible data protection vulnerabilities.
Conduct interviews to identify possible data protection vulnerabilities.
Verify that confidential files cannot be transmitted to a personal USB device.
Verify that confidential files cannot be transmitted to a personal USB device.
Suggested answer: D

Explanation:

The most reliable way for an IS auditor to evaluate the operational effectiveness of an organization's data loss prevention (DLP) controls is to verify that confidential files cannot be transmitted to a personal USB device.This is because DLP controls are designed to prevent the loss, leakage or misuse of sensitive data through breaches, ex-filtration transmissions and unauthorized use1. A personal USB device is a common way for data to be stolen or compromised, as it can bypass network security measures and allow unauthorized access to confidential files. Therefore, testing the DLP controls by attempting to copy or transfer confidential files to a personal USB device can provide a direct and objective evidence of whether the DLP controls are working as intended or not.

The other options are less reliable ways for an IS auditor to evaluate the operational effectiveness of an organization's DLP controls. Reviewing data classification levels based on industry best practice is a way to assess the adequacy of the organization's data protection policies, but it does not measure how well the DLP controls are implemented or enforced in practice. Verifying that current DLP software is installed on all computer systems is a way to check the technical configuration of the DLP solution, but it does not test how well the DLP software detects and prevents data loss incidents in real scenarios. Conducting interviews to identify possible data protection vulnerabilities is a way to gather qualitative information from stakeholders, but it does not provide quantitative or empirical data on the actual performance of the DLP controls.

What is Data Loss Prevention (DLP)?[Guide] - CrowdStrike

asked 18/09/2024
Gerson Rodrigo Menendez
36 questions

Question 1004

Report
Export
Collapse

Which of the following is the PRIMARY reason an IS auditor should discuss observations with management before delivering a final report?

Validate the audit observations_
Validate the audit observations_
Identify business risks associated with the observations.
Identify business risks associated with the observations.
Assist the management with control enhancements.
Assist the management with control enhancements.
Record the proposed course of corrective action.
Record the proposed course of corrective action.
Suggested answer: A

Explanation:

The primary reason an IS auditor should discuss observations with management before delivering a final report is A. Validate the audit observations.This is because discussing the observations with management can help the auditor to ensure that the findings are accurate, complete, and supported by sufficient evidence1.It can also help the auditor to obtain management's perspective and feedback on the issues and risks identified, and to avoid any misunderstandings or surprises when the final report is issued2.

asked 18/09/2024
Krishnan S Sridhar
32 questions

Question 1005

Report
Export
Collapse

An organization plans to replace its nightly batch processing backup to magnetic tape with real-time replication to a second data center. Which of the following is the GREATEST risk associated with this change?

Become a Premium Member for full access
  Unlock Premium Member

Question 1006

Report
Export
Collapse

When developing customer-facing IT applications, in which stage of the system development life cycle (SDLC) is it MOST beneficial to consider data privacy principles?

Become a Premium Member for full access
  Unlock Premium Member

Question 1007

Report
Export
Collapse

An IS auditor is verifying the adequacy of an organization's internal controls and is concerned about potential circumvention of regulations. Which of the following is the BEST sampling method to use?

Become a Premium Member for full access
  Unlock Premium Member

Question 1008

Report
Export
Collapse

An IS auditor reviewing incident response management processes notices that resolution times for reoccurring incidents have not shown improvement. Which of the following is the auditor's BEST recommendation?

Become a Premium Member for full access
  Unlock Premium Member

Question 1009

Report
Export
Collapse

An organization's security team created a simulated production environment with multiple vulnerable applications. What would be the PRIMARY purpose of creating such an environment?

Become a Premium Member for full access
  Unlock Premium Member

Question 1010

Report
Export
Collapse

The use of which of the following would BEST enhance a process improvement program?

Become a Premium Member for full access
  Unlock Premium Member
Total 1.341 questions
Go to page: of 135
Search

Related questions