ExamGecko
Home / Isaca / CISA / List of questions
Ask Question

Isaca CISA Practice Test - Questions Answers, Page 11

Add to Whishlist

List of questions

Question 101

Report Export Collapse

When implementing Internet Protocol security (IPsec) architecture, the servers involved in application delivery:

communicate via Transport Layer Security (TLS),
communicate via Transport Layer Security (TLS),
block authorized users from unauthorized activities.
block authorized users from unauthorized activities.
channel access only through the public-facing firewall.
channel access only through the public-facing firewall.
channel access through authentication.
channel access through authentication.
Suggested answer: A
Explanation:

When implementing Internet Protocol security (IPsec) architecture, the servers involved in application delivery communicate via Transport Layer Security (TLS), which is a protocol that provides encryption and authentication for data transmitted over a network. IPsec operates at the network layer and provides security for IP packets, while TLS operates at the transport layer and provides security for TCP connections.Blocking authorized users from unauthorized activities, channeling access only through the public-facing firewall, and channeling access through authentication are not functions of IPsec architecture.Reference:CISA Review Manual (Digital Version), Chapter 5, Section 5.4.2

asked 18/09/2024
Musaddiq Shorunke
48 questions

Question 102

Report Export Collapse

Coding standards provide which of the following?

Program documentation
Program documentation
Access control tables
Access control tables
Data flow diagrams
Data flow diagrams
Field naming conventions
Field naming conventions
Suggested answer: D
Explanation:

Coding standards provide field naming conventions, which are rules for naming variables, constants, functions, classes, and other elements in a program. Coding standards help to ensure consistency, readability, maintainability, and portability of code.Program documentation, access control tables, and data flow diagrams are not part of coding standards.Reference:CISA Review Manual (Digital Version), Chapter 4, Section 4.3.1

asked 18/09/2024
Niall Dempsey
40 questions

Question 103

Report Export Collapse

Prior to a follow-up engagement, an IS auditor learns that management has decided to accept a level of residual risk related to an audit finding without remediation. The IS auditor is concerned about management's decision. Which of the following should be the IS auditor's NEXT course of action?

Accept management's decision and continue the follow-up.
Accept management's decision and continue the follow-up.
Report the issue to IS audit management.
Report the issue to IS audit management.
Report the disagreement to the board.
Report the disagreement to the board.
Present the issue to executive management.
Present the issue to executive management.
Suggested answer: B
Explanation:

Prior to a follow-up engagement, if an IS auditor learns that management has decided to accept a level of residual risk related to an audit finding without remediation, the IS auditor should report the issue to IS audit management. This is because IS audit management is responsible for ensuring that audit findings are properly communicated and resolved. Accepting management's decision and continuing the follow-up would not address the IS auditor's concern.Reporting the disagreement to the board or executive management would be premature and inappropriate without consulting IS audit management first.Reference:CISA Review Manual (Digital Version), Chapter 1, Section 1.6

asked 18/09/2024
Terence Coates
42 questions

Question 104

Report Export Collapse

The PRIMARY benefit lo using a dry-pipe fire-suppression system rather than a wet-pipe system is that a dry-pipe system:

is more effective at suppressing flames.
is more effective at suppressing flames.
allows more time to abort release of the suppressant.
allows more time to abort release of the suppressant.
has a decreased risk of leakage.
has a decreased risk of leakage.
disperses dry chemical suppressants exclusively.
disperses dry chemical suppressants exclusively.
Suggested answer: C
Explanation:

The primary benefit of using a dry-pipe fire-suppression system rather than a wet-pipe system is that a dry-pipe system has a decreased risk of leakage, as the pipes are filled with pressurized air or nitrogen instead of water until the system is activated. A wet-pipe system has a higher risk of leakage, corrosion, and freezing. A dry-pipe system is not more effective at suppressing flames, as it uses the same water-based suppressant as a wet-pipe system. A dry-pipe system does not allow more time to abort release of the suppressant, as it has a delay of only a few seconds before the water is released. A dry-pipe system does not disperse dry chemical suppressants exclusively, as it uses water as the primary suppressant.Reference:CISA Review Manual (Digital Version), Chapter 5, Section 5.2.3

asked 18/09/2024
Anthony Agbale
51 questions

Question 105

Report Export Collapse

Which of the following is MOST important with regard to an application development acceptance test?

The programming team is involved in the testing process.
The programming team is involved in the testing process.
All data files are tested for valid information before conversion.
All data files are tested for valid information before conversion.
User management approves the test design before the test is started.
User management approves the test design before the test is started.
The quality assurance (QA) team is in charge of the testing process.
The quality assurance (QA) team is in charge of the testing process.
Suggested answer: C
Explanation:

The most important aspect of an application development acceptance test is that user management approves the test design before the test is started, as this ensures that the test objectives, criteria, and procedures are aligned with the user requirements and expectations. The programming team's involvement in the testing process, the testing of data files for valid information before conversion, and the quality assurance (QA) team's charge of the testing process are also important, but they are not as critical as user management's approval of the test design.Reference:CISA Review Manual (Digital Version), Chapter 4, Section 4.4.2

asked 18/09/2024
shubha sunil
40 questions

Question 106

Report Export Collapse

An organization's enterprise architecture (EA) department decides to change a legacy system's components while maintaining its original functionality. Which of the following is MOST important for an IS auditor to understand when reviewing this decision?

The current business capabilities delivered by the legacy system
The current business capabilities delivered by the legacy system
The proposed network topology to be used by the redesigned system
The proposed network topology to be used by the redesigned system
The data flows between the components to be used by the redesigned system
The data flows between the components to be used by the redesigned system
The database entity relationships within the legacy system
The database entity relationships within the legacy system
Suggested answer: A
Explanation:

When reviewing an enterprise architecture (EA) department's decision to change a legacy system's components while maintaining its original functionality, an IS auditor should understand the current business capabilities delivered by the legacy system, as this would help to evaluate whether the change is justified, feasible, and aligned with the business goals and needs. The proposed network topology to be used by the redesigned system, the data flows between the components to be used by the redesigned system, and the database entity relationships within the legacy system are technical details that are less relevant for an IS auditor to understand when reviewing this decision.Reference:CISA Review Manual (Digital Version), Chapter 3, Section 3.2

asked 18/09/2024
Martijn Lammerts
53 questions

Question 107

Report Export Collapse

An IS auditor is evaluating an organization's IT strategy and plans. Which of the following would be of GREATEST concern?

There is not a defined IT security policy.
There is not a defined IT security policy.
The business strategy meeting minutes are not distributed.
The business strategy meeting minutes are not distributed.
IT is not engaged in business strategic planning.
IT is not engaged in business strategic planning.
There is inadequate documentation of IT strategic planning.
There is inadequate documentation of IT strategic planning.
Suggested answer: C
Explanation:

The greatest concern for an IS auditor when evaluating an organization's IT strategy and plans is that IT is not engaged in business strategic planning, as this indicates a lack of alignment between IT and business objectives, which could result in inefficient and ineffective use of IT resources and capabilities. The absence of a defined IT security policy, the nondistribution of business strategy meeting minutes, and the inadequate documentation of IT strategic planning are also issues that should be addressed by an IS auditor, but they are not as significant as IT's noninvolvement in business strategic planning.Reference:CISA Review Manual (Digital Version), Chapter 3, Section 3.1

asked 18/09/2024
Bogdan Karolic
51 questions

Question 108

Report Export Collapse

When an IS audit reveals that a firewall was unable to recognize a number of attack attempts, the auditor's BEST recommendation is to place an intrusion detection system (IDS) between the firewall and:

the Internet.
the Internet.
the demilitarized zone (DMZ).
the demilitarized zone (DMZ).
the organization's web server.
the organization's web server.
the organization's network.
the organization's network.
Suggested answer: A
Explanation:

When an IS audit reveals that a firewall was unable to recognize a number of attack attempts, the auditor's best recommendation is to place an intrusion detection system (IDS) between the firewall and the Internet, as this would provide an additional layer of security and alert the organization of any malicious traffic that bypasses or penetrates the firewall.Placing an IDS between the firewall and the demilitarized zone (DMZ), the organization's web server, or the organization's network would not be as effective, as it would only monitor the traffic that has already passed through the firewall.Reference:CISA Review Manual (Digital Version), Chapter 5, Section 5.4.3

asked 18/09/2024
Rehan Malik
54 questions

Question 109

Report Export Collapse

An IS auditor is reviewing an organization's information asset management process. Which of the following would be of GREATEST concern to the auditor?

The process does not require specifying the physical locations of assets.
The process does not require specifying the physical locations of assets.
Process ownership has not been established.
Process ownership has not been established.
The process does not include asset review.
The process does not include asset review.
Identification of asset value is not included in the process.
Identification of asset value is not included in the process.
Suggested answer: B
Explanation:

An IS auditor would be most concerned if process ownership has not been established for the information asset management process, as this would indicate a lack of accountability, responsibility, and authority for managing the assets throughout their lifecycle. The process owner should also ensure that the process is aligned with the organization's objectives, policies, and standards.The process should require specifying the physical locations of assets, include asset review, and identify asset value, but these are less critical than establishing process ownership.Reference:CISA Review Manual (Digital Version), Chapter 3, Section 3.3

asked 18/09/2024
ROBERTO INFANTAS
40 questions

Question 110

Report Export Collapse

An IS audit reveals that an organization is not proactively addressing known vulnerabilities. Which of the following should the IS auditor recommend the organization do FIRST?

Verify the disaster recovery plan (DRP) has been tested.
Verify the disaster recovery plan (DRP) has been tested.
Ensure the intrusion prevention system (IPS) is effective.
Ensure the intrusion prevention system (IPS) is effective.
Assess the security risks to the business.
Assess the security risks to the business.
Confirm the incident response team understands the issue.
Confirm the incident response team understands the issue.
Suggested answer: C
Explanation:

If an IS audit reveals that an organization is not proactively addressing known vulnerabilities, the IS auditor should recommend that the organization assess the security risks to the business first, as this would help to prioritize the vulnerabilities based on their impact and likelihood, and determine the appropriate mitigation strategies.Verifying the disaster recovery plan (DRP) has been tested, ensuring the intrusion prevention system (IPS) is effective, and confirming the incident response team understands the issue are important steps, but they are not as urgent as assessing the security risks to the business.Reference:CISA Review Manual (Digital Version), Chapter 5, Section 5.6

asked 18/09/2024
Filippo Panarella
25 questions
Total 1.402 questions
Go to page: of 141
Search

Related questions