Isaca CISA Practice Test - Questions Answers, Page 11

List of questions
Question 101

When implementing Internet Protocol security (IPsec) architecture, the servers involved in application delivery:
When implementing Internet Protocol security (IPsec) architecture, the servers involved in application delivery communicate via Transport Layer Security (TLS), which is a protocol that provides encryption and authentication for data transmitted over a network. IPsec operates at the network layer and provides security for IP packets, while TLS operates at the transport layer and provides security for TCP connections.Blocking authorized users from unauthorized activities, channeling access only through the public-facing firewall, and channeling access through authentication are not functions of IPsec architecture.Reference:CISA Review Manual (Digital Version), Chapter 5, Section 5.4.2
Question 102

Coding standards provide which of the following?
Coding standards provide field naming conventions, which are rules for naming variables, constants, functions, classes, and other elements in a program. Coding standards help to ensure consistency, readability, maintainability, and portability of code.Program documentation, access control tables, and data flow diagrams are not part of coding standards.Reference:CISA Review Manual (Digital Version), Chapter 4, Section 4.3.1
Question 103

Prior to a follow-up engagement, an IS auditor learns that management has decided to accept a level of residual risk related to an audit finding without remediation. The IS auditor is concerned about management's decision. Which of the following should be the IS auditor's NEXT course of action?
Prior to a follow-up engagement, if an IS auditor learns that management has decided to accept a level of residual risk related to an audit finding without remediation, the IS auditor should report the issue to IS audit management. This is because IS audit management is responsible for ensuring that audit findings are properly communicated and resolved. Accepting management's decision and continuing the follow-up would not address the IS auditor's concern.Reporting the disagreement to the board or executive management would be premature and inappropriate without consulting IS audit management first.Reference:CISA Review Manual (Digital Version), Chapter 1, Section 1.6
Question 104

The PRIMARY benefit lo using a dry-pipe fire-suppression system rather than a wet-pipe system is that a dry-pipe system:
The primary benefit of using a dry-pipe fire-suppression system rather than a wet-pipe system is that a dry-pipe system has a decreased risk of leakage, as the pipes are filled with pressurized air or nitrogen instead of water until the system is activated. A wet-pipe system has a higher risk of leakage, corrosion, and freezing. A dry-pipe system is not more effective at suppressing flames, as it uses the same water-based suppressant as a wet-pipe system. A dry-pipe system does not allow more time to abort release of the suppressant, as it has a delay of only a few seconds before the water is released. A dry-pipe system does not disperse dry chemical suppressants exclusively, as it uses water as the primary suppressant.Reference:CISA Review Manual (Digital Version), Chapter 5, Section 5.2.3
Question 105

Which of the following is MOST important with regard to an application development acceptance test?
The most important aspect of an application development acceptance test is that user management approves the test design before the test is started, as this ensures that the test objectives, criteria, and procedures are aligned with the user requirements and expectations. The programming team's involvement in the testing process, the testing of data files for valid information before conversion, and the quality assurance (QA) team's charge of the testing process are also important, but they are not as critical as user management's approval of the test design.Reference:CISA Review Manual (Digital Version), Chapter 4, Section 4.4.2
Question 106

An organization's enterprise architecture (EA) department decides to change a legacy system's components while maintaining its original functionality. Which of the following is MOST important for an IS auditor to understand when reviewing this decision?
When reviewing an enterprise architecture (EA) department's decision to change a legacy system's components while maintaining its original functionality, an IS auditor should understand the current business capabilities delivered by the legacy system, as this would help to evaluate whether the change is justified, feasible, and aligned with the business goals and needs. The proposed network topology to be used by the redesigned system, the data flows between the components to be used by the redesigned system, and the database entity relationships within the legacy system are technical details that are less relevant for an IS auditor to understand when reviewing this decision.Reference:CISA Review Manual (Digital Version), Chapter 3, Section 3.2
Question 107

An IS auditor is evaluating an organization's IT strategy and plans. Which of the following would be of GREATEST concern?
The greatest concern for an IS auditor when evaluating an organization's IT strategy and plans is that IT is not engaged in business strategic planning, as this indicates a lack of alignment between IT and business objectives, which could result in inefficient and ineffective use of IT resources and capabilities. The absence of a defined IT security policy, the nondistribution of business strategy meeting minutes, and the inadequate documentation of IT strategic planning are also issues that should be addressed by an IS auditor, but they are not as significant as IT's noninvolvement in business strategic planning.Reference:CISA Review Manual (Digital Version), Chapter 3, Section 3.1
Question 108

When an IS audit reveals that a firewall was unable to recognize a number of attack attempts, the auditor's BEST recommendation is to place an intrusion detection system (IDS) between the firewall and:
When an IS audit reveals that a firewall was unable to recognize a number of attack attempts, the auditor's best recommendation is to place an intrusion detection system (IDS) between the firewall and the Internet, as this would provide an additional layer of security and alert the organization of any malicious traffic that bypasses or penetrates the firewall.Placing an IDS between the firewall and the demilitarized zone (DMZ), the organization's web server, or the organization's network would not be as effective, as it would only monitor the traffic that has already passed through the firewall.Reference:CISA Review Manual (Digital Version), Chapter 5, Section 5.4.3
Question 109

An IS auditor is reviewing an organization's information asset management process. Which of the following would be of GREATEST concern to the auditor?
An IS auditor would be most concerned if process ownership has not been established for the information asset management process, as this would indicate a lack of accountability, responsibility, and authority for managing the assets throughout their lifecycle. The process owner should also ensure that the process is aligned with the organization's objectives, policies, and standards.The process should require specifying the physical locations of assets, include asset review, and identify asset value, but these are less critical than establishing process ownership.Reference:CISA Review Manual (Digital Version), Chapter 3, Section 3.3
Question 110

An IS audit reveals that an organization is not proactively addressing known vulnerabilities. Which of the following should the IS auditor recommend the organization do FIRST?
If an IS audit reveals that an organization is not proactively addressing known vulnerabilities, the IS auditor should recommend that the organization assess the security risks to the business first, as this would help to prioritize the vulnerabilities based on their impact and likelihood, and determine the appropriate mitigation strategies.Verifying the disaster recovery plan (DRP) has been tested, ensuring the intrusion prevention system (IPS) is effective, and confirming the incident response team understands the issue are important steps, but they are not as urgent as assessing the security risks to the business.Reference:CISA Review Manual (Digital Version), Chapter 5, Section 5.6
Question