ExamGecko
Home Home / Isaca / CISA

Isaca CISA Practice Test - Questions Answers, Page 104

Question list
Search
Search

List of questions

Search

Related questions

Which of the following is the MOST important consideration when establishing vulnerability scanning on critical IT infrastructure?

A.
The scanning will be performed during non-peak hours.
A.
The scanning will be performed during non-peak hours.
Answers
B.
The scanning will be followed by penetration testing.
B.
The scanning will be followed by penetration testing.
Answers
C.
The scanning will be cost-effective.
C.
The scanning will be cost-effective.
Answers
D.
The scanning will not degrade system performance.
D.
The scanning will not degrade system performance.
Answers
Suggested answer: D

Explanation:

The scanning will not degrade system performance. This is the most important consideration when establishing vulnerability scanning on critical IT infrastructure, because any degradation of system performance could affect the availability, reliability, and functionality of the IT services that depend on the infrastructure. Scanning during non-peak hours (A) could reduce the impact of scanning on system performance, but it does not guarantee that the scanning will not cause any degradation. Scanning followed by penetration testing (B) could provide more in-depth information about the vulnerabilities and their exploitability, but it does not address the potential impact of scanning on system performance. Scanning cost-effectiveness is a relevant factor for choosing a scanning service or tool, but it is not as important as ensuring that the scanning will not compromise the system performance.

Which of the following is the BEST way to identify whether the IT help desk is meeting service level agreements (SLAS)?

A.
Review exception reports
A.
Review exception reports
Answers
B.
Review IT staffing schedules.
B.
Review IT staffing schedules.
Answers
C.
Analyze help desk ticket logs
C.
Analyze help desk ticket logs
Answers
D.
Conduct IT management interviews
D.
Conduct IT management interviews
Answers
Suggested answer: A

Explanation:

The best way to identify whether the IT help desk is meeting service level agreements (SLAs) is A. Review exception reports. Exception reports are documents that highlight any deviations from the agreed service levels, such as breaches, delays, or failures. They can help the IT help desk to monitor their performance, identify root causes, and implement corrective actions. Reviewing exception reports can also help the IT help desk to communicate with the end users and stakeholders about any service issues and their resolution.

When reviewing a business case for a proposed implementation of a third-party system, which of the following should be an IS auditor's GREATEST concern?

A.
Lack of ongoing maintenance costs
A.
Lack of ongoing maintenance costs
Answers
B.
Lack of training materials
B.
Lack of training materials
Answers
C.
Lack of plan for pilot implementation
C.
Lack of plan for pilot implementation
Answers
D.
Lack of detailed work breakdown structure
D.
Lack of detailed work breakdown structure
Answers
Suggested answer: A

Explanation:

The IS auditor's greatest concern when reviewing a business case for a proposed implementation of a third-party system should be A. Lack of ongoing maintenance costs. This is because ongoing maintenance costs are an essential part of the total cost of ownership (TCO) of a third-party system, and they can have a significant impact on the return on investment (ROI) and the feasibility of the project. If the business case does not include ongoing maintenance costs, it may underestimate the true cost of the project and overestimate the benefits. This could lead to poor decision making and unrealistic expectations.

Lack of training materials (B), lack of plan for pilot implementation , and lack of detailed work breakdown structure (D) are also potential issues that could affect the quality and success of the project, but they are not as critical as lack of ongoing maintenance costs. Training materials can be developed or acquired later, pilot implementation can be planned during the project initiation or planning phase, and work breakdown structure can be refined as the project progresses. However, ongoing maintenance costs are difficult to change or estimate once the project is approved and implemented, and they can have long-term implications for the organization. Therefore, they should be included and analyzed in the business case.

Which of the following would be MOST effective in detecting the presence of an unauthorized wireless access point on an internal network?

A.
Continuous network monitoring
A.
Continuous network monitoring
Answers
B.
Periodic network vulnerability assessments
B.
Periodic network vulnerability assessments
Answers
C.
Review of electronic access logs
C.
Review of electronic access logs
Answers
D.
Physical security reviews
D.
Physical security reviews
Answers
Suggested answer: A

Explanation:

The most effective method for detecting the presence of an unauthorized wireless access point on an internal network is A. Continuous network monitoring. This is because continuous network monitoring can capture and analyze all the wireless traffic in the network and identify any rogue or spoofed devices that may be connected to the network without authorization. Continuous network monitoring can also alert the system administrator of any suspicious or anomalous activities on the network and help to locate and remove the unauthorized wireless access point quickly.

Periodic network vulnerability assessments (B) can also help to detect unauthorized wireless access points, but they are not as effective as continuous network monitoring, because they are performed at fixed intervals and may miss some devices that are added or removed between the assessments. Review of electronic access logs can provide some information about the devices that access the network, but they may not be able to detect devices that use fake or stolen credentials or devices that do not generate any logs. Physical security reviews (D) can help to prevent unauthorized physical access to the network ports or devices, but they may not be able to detect wireless access points that are hidden or disguised as legitimate devices.

An organization has partnered with a third party to transport backup drives to an offsite storage facility. Which of the following is MOST important before sending the drives?

A.
Creating a chain of custody to accompany the drive in transit
A.
Creating a chain of custody to accompany the drive in transit
Answers
B.
Ensuring data protection is aligned with the data classification policy
B.
Ensuring data protection is aligned with the data classification policy
Answers
C.
Encrypting the drive with strong protection standards
C.
Encrypting the drive with strong protection standards
Answers
D.
Ensuring the drive is placed in a tamper-evident mechanism
D.
Ensuring the drive is placed in a tamper-evident mechanism
Answers
Suggested answer: C

Explanation:

Before sending backup drives to an offsite storage facility, the most important thing to do is to encrypt the drive with strong protection standards. This is because encryption ensures effective security where information cannot be intercepted and used to harm the organization or its customers. Encryption also protects the data from unauthorized access, modification, or deletion in case the drive is lost, stolen, or damaged during transit or storage.Encryption of backup drives is especially important for public safety organizations that handle sensitive or personally identifiable information, such as medical records, criminal records, or emergency communications12.

Aligning IT strategy with business strategy PRIMARILY helps an organization to:

A.
optimize investments in IT.
A.
optimize investments in IT.
Answers
B.
create risk awareness across business units.
B.
create risk awareness across business units.
Answers
C.
increase involvement of senior management in IT.
C.
increase involvement of senior management in IT.
Answers
D.
monitor the effectiveness of IT.
D.
monitor the effectiveness of IT.
Answers
Suggested answer: A

Explanation:

Aligning IT strategy with business strategy primarily helps an organization to optimize investments in IT.This is because alignment ensures that IT resources and capabilities are aligned with the business goals and priorities, and that IT delivers value to the business in terms of efficiency, effectiveness, innovation, and competitive advantage12.By aligning IT strategy with business strategy, an organization can avoid wasting money and time on IT projects or services that do not support or contribute to the business outcomes3.Alignment also helps to identify and prioritize the most critical and valuable IT initiatives that can create or optimize business value4.

Therefore, the correct answer to your question is A. optimize investments in IT.

Which of the following is the MOST important advantage of participating in beta testing of software products?

A.
It increases an organization's ability to retain staff who prefer to work with new technology.
A.
It increases an organization's ability to retain staff who prefer to work with new technology.
Answers
B.
It improves vendor support and training.
B.
It improves vendor support and training.
Answers
C.
It enhances security and confidentiality.
C.
It enhances security and confidentiality.
Answers
D.
It enables an organization to gain familiarity with new products and their functionality.
D.
It enables an organization to gain familiarity with new products and their functionality.
Answers
Suggested answer: D

Explanation:

Beta testing is the process of releasing a near-final version of a software product to a group of external users, known as beta testers, who provide feedback and report bugs based on their real-world experiences. Beta testing offers various benefits for both the developers and the users of the software product. Some of these benefits are:

It reduces product failure risk via customer validation12.

It helps to test post-launch infrastructure1.

It helps to improve product quality via customer feedback12.

It allows for thorough bug detection and issue resolution3.

It enhances usability and user experience3.

It increases customer satisfaction and loyalty3.

Based on these benefits, the most important advantage of participating in beta testing of software products is D. It enables an organization to gain familiarity with new products and their functionality. By being involved in beta testing, an organization can learn how to use the new product effectively, discover its features and benefits, and provide suggestions for improvement. This can help the organization to adopt the new product faster, easier, and more efficiently when it is officially released. It can also give the organization a competitive edge over other users who are not familiar with the new product.

Which of the following is the MOST important prerequisite for implementing a data loss prevention (DLP) tool?

A.
Requiring users to save files in secured folders instead of a company-wide shared drive
A.
Requiring users to save files in secured folders instead of a company-wide shared drive
Answers
B.
Reviewing data transfer logs to determine historical patterns of data flow
B.
Reviewing data transfer logs to determine historical patterns of data flow
Answers
C.
Developing a DLP policy and requiring signed acknowledgment by users
C.
Developing a DLP policy and requiring signed acknowledgment by users
Answers
D.
Identifying where existing data resides and establishing a data classification matrix
D.
Identifying where existing data resides and establishing a data classification matrix
Answers
Suggested answer: D

Explanation:

A data loss prevention (DLP) tool is a software application that detects and prevents data breaches by monitoring and protecting sensitive data from unauthorized access, transfer, or use1. A DLP tool can help your organization comply with regulations, prevent insider threats, and protect your intellectual property.

Before implementing a DLP tool, the most important prerequisite is to identify where existing data resides and establish a data classification matrix. This is because you need to know what data you have, where it is stored, how sensitive it is, and who can access it.A data classification matrix is a framework that defines the categories and levels of data sensitivity, such as public, internal, confidential, or restricted2. By identifying and classifying your data, you can determine the appropriate DLP policies and controls to apply to each type of data and prevent data loss or leakage.

Which of the following is the BEST way to ensure an organization's data classification policies are preserved during the process of data transformation?

A.
Map data classification controls to data sets.
A.
Map data classification controls to data sets.
Answers
B.
Control access to extract, transform, and load (ETL) tools.
B.
Control access to extract, transform, and load (ETL) tools.
Answers
C.
Conduct a data discovery exercise across all business applications.
C.
Conduct a data discovery exercise across all business applications.
Answers
D.
Implement classification labels in metadata during data creation.
D.
Implement classification labels in metadata during data creation.
Answers
Suggested answer: D

Explanation:

Data classification is the process of tagging data according to its type, sensitivity, and value to the organization. Data transformation is the process of changing the structure and format of data to make it usable for analysis and visualization. Both processes are important for data security and compliance, but they also pose some challenges.

One of the challenges is to ensure that the organization's data classification policies are preserved during the process of data transformation. This means that the data should retain its original classification level and labels after it is transformed, and that the appropriate controls and protections are applied to the transformed data.

The best way to ensure this is to implement classification labels in metadata during data creation (D). Metadata is data that describes other data, such as its source, format, content, and context. By adding classification labels to metadata, the data can be easily identified and tracked throughout its lifecycle, including during data transformation. The labels can also help enforce the proper access rights and encryption standards for the data, regardless of its state or location.

Which of the following responses to risk associated with segregation of duties would incur the LOWEST initial cost?

A.
Risk acceptance
A.
Risk acceptance
Answers
B.
Risk mitigation
B.
Risk mitigation
Answers
C.
Risk transference
C.
Risk transference
Answers
D.
Risk reduction
D.
Risk reduction
Answers
Suggested answer: A

Explanation:

Segregation of duties is a fundamental concept in cybersecurity and information security.It refers to the practice of dividing critical tasks and responsibilities among different individuals or roles within an organization to reduce the risk of fraud, error, or unauthorized activities1.Segregation of duties is designed to prevent unilateral actions within an organization's workflow, which can result in damaging events that would exceed the organization's risk tolerance2.

There are different types of responses to risk associated with segregation of duties, depending on the level of risk and the cost-benefit analysis. Some of the common responses are:

Risk acceptance: This means acknowledging a risk and deciding to tolerate it without taking any corrective actions.This response is usually chosen when the risk is low or the cost of mitigation is too high3.

Risk mitigation: This means taking steps ahead of time to lessen the effects of a risk and make it less likely to happen.Some examples of mitigation strategies are making backup plans, setting up early warning systems, and staying away from high-risk areas or activities4.

Risk transference: This means shifting the negative impact of a risk and/or the responsibility for managing the risk response to a third party.Some examples of transference strategies are outsourcing, insurance, or contracts5.

Risk reduction: This means reducing the probability and/or severity of the risk below a threshold of acceptability.Some examples of reduction strategies are implementing controls, policies, or procedures to prevent or detect risks6.

Based on these definitions, the response to risk associated with segregation of duties that would incur the lowest initial cost is A. Risk acceptance. This is because risk acceptance does not require any additional resources or actions to address the risk. However, risk acceptance also implies that the organization is willing to bear the consequences of the risk if it occurs, which could be costly in the long run.

Therefore, the correct answer to your question is A. Risk acceptance.

Total 1.198 questions
Go to page: of 120