ExamGecko
Home Home / Isaca / CISA

Isaca CISA Practice Test - Questions Answers, Page 11

Question list
Search
Search

List of questions

Search

Related questions

When implementing Internet Protocol security (IPsec) architecture, the servers involved in application delivery:

A.
communicate via Transport Layer Security (TLS),
A.
communicate via Transport Layer Security (TLS),
Answers
B.
block authorized users from unauthorized activities.
B.
block authorized users from unauthorized activities.
Answers
C.
channel access only through the public-facing firewall.
C.
channel access only through the public-facing firewall.
Answers
D.
channel access through authentication.
D.
channel access through authentication.
Answers
Suggested answer: A

Explanation:

When implementing Internet Protocol security (IPsec) architecture, the servers involved in application delivery communicate via Transport Layer Security (TLS), which is a protocol that provides encryption and authentication for data transmitted over a network. IPsec operates at the network layer and provides security for IP packets, while TLS operates at the transport layer and provides security for TCP connections.Blocking authorized users from unauthorized activities, channeling access only through the public-facing firewall, and channeling access through authentication are not functions of IPsec architecture.Reference:CISA Review Manual (Digital Version), Chapter 5, Section 5.4.2

Coding standards provide which of the following?

A.
Program documentation
A.
Program documentation
Answers
B.
Access control tables
B.
Access control tables
Answers
C.
Data flow diagrams
C.
Data flow diagrams
Answers
D.
Field naming conventions
D.
Field naming conventions
Answers
Suggested answer: D

Explanation:

Coding standards provide field naming conventions, which are rules for naming variables, constants, functions, classes, and other elements in a program. Coding standards help to ensure consistency, readability, maintainability, and portability of code.Program documentation, access control tables, and data flow diagrams are not part of coding standards.Reference:CISA Review Manual (Digital Version), Chapter 4, Section 4.3.1

Prior to a follow-up engagement, an IS auditor learns that management has decided to accept a level of residual risk related to an audit finding without remediation. The IS auditor is concerned about management's decision. Which of the following should be the IS auditor's NEXT course of action?

A.
Accept management's decision and continue the follow-up.
A.
Accept management's decision and continue the follow-up.
Answers
B.
Report the issue to IS audit management.
B.
Report the issue to IS audit management.
Answers
C.
Report the disagreement to the board.
C.
Report the disagreement to the board.
Answers
D.
Present the issue to executive management.
D.
Present the issue to executive management.
Answers
Suggested answer: B

Explanation:

Prior to a follow-up engagement, if an IS auditor learns that management has decided to accept a level of residual risk related to an audit finding without remediation, the IS auditor should report the issue to IS audit management. This is because IS audit management is responsible for ensuring that audit findings are properly communicated and resolved. Accepting management's decision and continuing the follow-up would not address the IS auditor's concern.Reporting the disagreement to the board or executive management would be premature and inappropriate without consulting IS audit management first.Reference:CISA Review Manual (Digital Version), Chapter 1, Section 1.6

The PRIMARY benefit lo using a dry-pipe fire-suppression system rather than a wet-pipe system is that a dry-pipe system:

A.
is more effective at suppressing flames.
A.
is more effective at suppressing flames.
Answers
B.
allows more time to abort release of the suppressant.
B.
allows more time to abort release of the suppressant.
Answers
C.
has a decreased risk of leakage.
C.
has a decreased risk of leakage.
Answers
D.
disperses dry chemical suppressants exclusively.
D.
disperses dry chemical suppressants exclusively.
Answers
Suggested answer: C

Explanation:

The primary benefit of using a dry-pipe fire-suppression system rather than a wet-pipe system is that a dry-pipe system has a decreased risk of leakage, as the pipes are filled with pressurized air or nitrogen instead of water until the system is activated. A wet-pipe system has a higher risk of leakage, corrosion, and freezing. A dry-pipe system is not more effective at suppressing flames, as it uses the same water-based suppressant as a wet-pipe system. A dry-pipe system does not allow more time to abort release of the suppressant, as it has a delay of only a few seconds before the water is released. A dry-pipe system does not disperse dry chemical suppressants exclusively, as it uses water as the primary suppressant.Reference:CISA Review Manual (Digital Version), Chapter 5, Section 5.2.3

Which of the following is MOST important with regard to an application development acceptance test?

A.
The programming team is involved in the testing process.
A.
The programming team is involved in the testing process.
Answers
B.
All data files are tested for valid information before conversion.
B.
All data files are tested for valid information before conversion.
Answers
C.
User management approves the test design before the test is started.
C.
User management approves the test design before the test is started.
Answers
D.
The quality assurance (QA) team is in charge of the testing process.
D.
The quality assurance (QA) team is in charge of the testing process.
Answers
Suggested answer: C

Explanation:

The most important aspect of an application development acceptance test is that user management approves the test design before the test is started, as this ensures that the test objectives, criteria, and procedures are aligned with the user requirements and expectations. The programming team's involvement in the testing process, the testing of data files for valid information before conversion, and the quality assurance (QA) team's charge of the testing process are also important, but they are not as critical as user management's approval of the test design.Reference:CISA Review Manual (Digital Version), Chapter 4, Section 4.4.2

An organization's enterprise architecture (EA) department decides to change a legacy system's components while maintaining its original functionality. Which of the following is MOST important for an IS auditor to understand when reviewing this decision?

A.
The current business capabilities delivered by the legacy system
A.
The current business capabilities delivered by the legacy system
Answers
B.
The proposed network topology to be used by the redesigned system
B.
The proposed network topology to be used by the redesigned system
Answers
C.
The data flows between the components to be used by the redesigned system
C.
The data flows between the components to be used by the redesigned system
Answers
D.
The database entity relationships within the legacy system
D.
The database entity relationships within the legacy system
Answers
Suggested answer: A

Explanation:

When reviewing an enterprise architecture (EA) department's decision to change a legacy system's components while maintaining its original functionality, an IS auditor should understand the current business capabilities delivered by the legacy system, as this would help to evaluate whether the change is justified, feasible, and aligned with the business goals and needs. The proposed network topology to be used by the redesigned system, the data flows between the components to be used by the redesigned system, and the database entity relationships within the legacy system are technical details that are less relevant for an IS auditor to understand when reviewing this decision.Reference:CISA Review Manual (Digital Version), Chapter 3, Section 3.2

An IS auditor is evaluating an organization's IT strategy and plans. Which of the following would be of GREATEST concern?

A.
There is not a defined IT security policy.
A.
There is not a defined IT security policy.
Answers
B.
The business strategy meeting minutes are not distributed.
B.
The business strategy meeting minutes are not distributed.
Answers
C.
IT is not engaged in business strategic planning.
C.
IT is not engaged in business strategic planning.
Answers
D.
There is inadequate documentation of IT strategic planning.
D.
There is inadequate documentation of IT strategic planning.
Answers
Suggested answer: C

Explanation:

The greatest concern for an IS auditor when evaluating an organization's IT strategy and plans is that IT is not engaged in business strategic planning, as this indicates a lack of alignment between IT and business objectives, which could result in inefficient and ineffective use of IT resources and capabilities. The absence of a defined IT security policy, the nondistribution of business strategy meeting minutes, and the inadequate documentation of IT strategic planning are also issues that should be addressed by an IS auditor, but they are not as significant as IT's noninvolvement in business strategic planning.Reference:CISA Review Manual (Digital Version), Chapter 3, Section 3.1

When an IS audit reveals that a firewall was unable to recognize a number of attack attempts, the auditor's BEST recommendation is to place an intrusion detection system (IDS) between the firewall and:

A.
the Internet.
A.
the Internet.
Answers
B.
the demilitarized zone (DMZ).
B.
the demilitarized zone (DMZ).
Answers
C.
the organization's web server.
C.
the organization's web server.
Answers
D.
the organization's network.
D.
the organization's network.
Answers
Suggested answer: A

Explanation:

When an IS audit reveals that a firewall was unable to recognize a number of attack attempts, the auditor's best recommendation is to place an intrusion detection system (IDS) between the firewall and the Internet, as this would provide an additional layer of security and alert the organization of any malicious traffic that bypasses or penetrates the firewall.Placing an IDS between the firewall and the demilitarized zone (DMZ), the organization's web server, or the organization's network would not be as effective, as it would only monitor the traffic that has already passed through the firewall.Reference:CISA Review Manual (Digital Version), Chapter 5, Section 5.4.3

An IS auditor is reviewing an organization's information asset management process. Which of the following would be of GREATEST concern to the auditor?

A.
The process does not require specifying the physical locations of assets.
A.
The process does not require specifying the physical locations of assets.
Answers
B.
Process ownership has not been established.
B.
Process ownership has not been established.
Answers
C.
The process does not include asset review.
C.
The process does not include asset review.
Answers
D.
Identification of asset value is not included in the process.
D.
Identification of asset value is not included in the process.
Answers
Suggested answer: B

Explanation:

An IS auditor would be most concerned if process ownership has not been established for the information asset management process, as this would indicate a lack of accountability, responsibility, and authority for managing the assets throughout their lifecycle. The process owner should also ensure that the process is aligned with the organization's objectives, policies, and standards.The process should require specifying the physical locations of assets, include asset review, and identify asset value, but these are less critical than establishing process ownership.Reference:CISA Review Manual (Digital Version), Chapter 3, Section 3.3

An IS audit reveals that an organization is not proactively addressing known vulnerabilities. Which of the following should the IS auditor recommend the organization do FIRST?

A.
Verify the disaster recovery plan (DRP) has been tested.
A.
Verify the disaster recovery plan (DRP) has been tested.
Answers
B.
Ensure the intrusion prevention system (IPS) is effective.
B.
Ensure the intrusion prevention system (IPS) is effective.
Answers
C.
Assess the security risks to the business.
C.
Assess the security risks to the business.
Answers
D.
Confirm the incident response team understands the issue.
D.
Confirm the incident response team understands the issue.
Answers
Suggested answer: C

Explanation:

If an IS audit reveals that an organization is not proactively addressing known vulnerabilities, the IS auditor should recommend that the organization assess the security risks to the business first, as this would help to prioritize the vulnerabilities based on their impact and likelihood, and determine the appropriate mitigation strategies.Verifying the disaster recovery plan (DRP) has been tested, ensuring the intrusion prevention system (IPS) is effective, and confirming the incident response team understands the issue are important steps, but they are not as urgent as assessing the security risks to the business.Reference:CISA Review Manual (Digital Version), Chapter 5, Section 5.6

Total 1.198 questions
Go to page: of 120