ExamGecko
Home Home / Isaca / CISA

Isaca CISA Practice Test - Questions Answers, Page 113

Question list
Search
Search

List of questions

Search

Related questions

Which of the following would be the GREATEST concern to an IS auditor when reviewing the outsourcing contract for an organization's cloud service provider?

A.
There is no change management process defined in the contract.
A.
There is no change management process defined in the contract.
Answers
B.
There are no procedures for incident escalation.
B.
There are no procedures for incident escalation.
Answers
C.
There is no dispute resolution process defined in the contract.
C.
There is no dispute resolution process defined in the contract.
Answers
D.
There is no right-to-audit clause defined in the contract.
D.
There is no right-to-audit clause defined in the contract.
Answers
Suggested answer: D

Explanation:

The absence of a right-to-audit clause in the outsourcing contract for a cloud service provider would be of greatest concern to an IS auditor1.This clause gives the client the right to audit the service provider's activities that are relevant to the services being provided1.It is crucial for ensuring that the service provider is complying with the terms of the contract and meeting the client's standards for performance, security, and other aspects1.Without this clause, the client may not be able to effectively monitor and manage risks associated with the outsourcing arrangement1.

Audit rights in outsourcing: certifications and third party reports

Which of the following is the BEST sampling method to use when relatively few errors are expected to be found in a population?

A.
Variable sampling
A.
Variable sampling
Answers
B.
Judgmental sampling
B.
Judgmental sampling
Answers
C.
Stop-or-go sampling
C.
Stop-or-go sampling
Answers
D.
Discovery sampling
D.
Discovery sampling
Answers
Suggested answer: D

Explanation:

Discovery sampling is a type of statistical sampling that's used when the expected error rate in the population is very low1.This method is designed to discover at least one instance of an attribute or condition in a population1.It's often used in auditing to uncover fraud or noncompliance with rules and regulations1.

What are sampling methods and how do you choose the best one?

During an operational audit on the procurement department, the audit team encounters a key system that uses an artificial intelligence (Al) algorithm. The audit team does not have the necessary knowledge to proceed with the audit. Which of the following is the BEST way to handle this situation?

A.
Perform a skills assessment to identify members from other business units with knowledge of Al.
A.
Perform a skills assessment to identify members from other business units with knowledge of Al.
Answers
B.
Remove the Al portion from the audit scope and proceed with the audit.
B.
Remove the Al portion from the audit scope and proceed with the audit.
Answers
C.
Delay the audit until the team receives training on Al.
C.
Delay the audit until the team receives training on Al.
Answers
D.
Engage external consultants who have audit experience and knowledge of Al.
D.
Engage external consultants who have audit experience and knowledge of Al.
Answers
Suggested answer: D

Explanation:

If the audit team lacks the necessary knowledge to audit a system that uses an AI algorithm, engaging external consultants who have audit experience and knowledge of AI would be the best approach12.These consultants can provide the expertise needed to effectively audit the AI system12.This approach ensures that the audit is conducted thoroughly and accurately, without requiring the audit team to acquire new skills or knowledge12.

Auditing Guidelines for Artificial Intelligence - ISACA

An In-Depth Guide To Audit AI Models - Censius

An IS auditor discovers a box of hard drives in a secured location that are overdue for physical destruction. The vendor responsible for this task was never made aware of these hard drives.

Which of the following is the BEST course of action to address this issue?

A.
Examine the workflow to identify gaps in asset-handling responsibilities.
A.
Examine the workflow to identify gaps in asset-handling responsibilities.
Answers
B.
Escalate the finding to the asset owner for remediation.
B.
Escalate the finding to the asset owner for remediation.
Answers
C.
Recommend the drives be sent to the vendor for destruction.
C.
Recommend the drives be sent to the vendor for destruction.
Answers
D.
Evaluate the corporate asset-handling policy for potential gaps.
D.
Evaluate the corporate asset-handling policy for potential gaps.
Answers
Suggested answer: A

Explanation:

The issue seems to stem from a breakdown in the workflow or process for handling assets that are due for destruction12.By examining the workflow, the IS auditor can identify where the process failed, such as why the vendor was not notified about the hard drives12.This could involve reviewing procedures for inventory management, communication with vendors, and tracking of assets due for destruction12.The findings can then be used to improve the workflow and prevent similar issues in the future12.

How To Properly Destroy A Hard Drive - Tech News Today

How to safely and securely destroy hard disk data - iFixit

Which of the following provides the GREATEST assurance that a middleware application compiling data from multiple sales transaction databases for forecasting is operating effectively?

A.
Continuous auditing
A.
Continuous auditing
Answers
B.
Manual checks
B.
Manual checks
Answers
C.
Exception reporting
C.
Exception reporting
Answers
D.
Automated reconciliations
D.
Automated reconciliations
Answers
Suggested answer: A

Explanation:

Continuous auditing provides the greatest assurance that a middleware application compiling data from multiple sales transaction databases for forecasting is operating effectively12.Continuous auditing involves the use of automated tools to continuously monitor and audit a system's operations12.This allows for real-time identification and resolution of issues, ensuring that the system is always functioning as expected12.It also provides ongoing assurance about the integrity and reliability of the data being compiled by the middleware application12.

5 Data Integration Methods and Strategies | Talend

What Is Middleware? Definition, Architecture, and Best Practices

During planning for a cloud service audit, audit management becomes aware that the assigned IS auditor is unfamiliar with the technologies in use and their associated risks to the business. To ensure audit quality, which of the following actions should audit management consider FIRST?

A.
Conduct a follow-up audit after a suitable period has elapsed.
A.
Conduct a follow-up audit after a suitable period has elapsed.
Answers
B.
Reschedule the audit assignment for the next financial year.
B.
Reschedule the audit assignment for the next financial year.
Answers
C.
Reassign the audit to an internal audit subject matter expert.
C.
Reassign the audit to an internal audit subject matter expert.
Answers
D.
Extend the duration of the audit to give the auditor more time.
D.
Extend the duration of the audit to give the auditor more time.
Answers
Suggested answer: C

Explanation:

The best action that audit management should consider first is to reassign the audit to an internal audit subject matter expert. This is because cloud service audits require specialized knowledge and skills to assess the risks and controls associated with the cloud service provider and the cloud service customer. An IS auditor who is unfamiliar with the technologies in use and their associated risks to the business may not be able to perform an effective and efficient audit, and may miss important issues or provide inaccurate recommendations. Therefore, it is important to ensure that the IS auditor assigned to the cloud service audit has the appropriate competence and experience.

The other options are not as good as reassigning the audit to an internal audit subject matter expert. Conducting a follow-up audit after a suitable period has elapsed may not address the quality issues of the initial audit, and may also delay the identification and remediation of any problems. Rescheduling the audit assignment for the next financial year may expose the organization to unnecessary risks and may not meet the audit objectives or expectations. Extending the duration of the audit to give the auditor more time may not be feasible or cost-effective, and may not guarantee that the auditor will acquire the necessary knowledge and skills in time.

ISACA, CISA Review Manual, 27th Edition, 2019, p.1391

ISACA, Cloud Computing: Business Benefits With Security, Governance and Assurance Perspectives, 2009, p.14

In the case of a disaster where the data center is no longer available, which of the following tasks should be done FIRST?

A.
Perform data recovery.
A.
Perform data recovery.
Answers
B.
Arrange for a secondary site.
B.
Arrange for a secondary site.
Answers
C.
Analyze risk.
C.
Analyze risk.
Answers
D.
Activate the call tree.
D.
Activate the call tree.
Answers
Suggested answer: D

Explanation:

In the event of a disaster where the data center is no longer available, the first step should be to activate the call tree1.A call tree is a layered hierarchical communication model used to notify specific individuals of an event and coordinate recovery efforts1.This ensures that all relevant parties are informed about the situation and can begin executing their parts of the disaster recovery plan1.

IT Disaster Recovery Plan | Ready.gov

Stress testing should ideally be carried out under a:

A.
test environment with production workloads.
A.
test environment with production workloads.
Answers
B.
test environment with test data.
B.
test environment with test data.
Answers
C.
production environment with production workloads.
C.
production environment with production workloads.
Answers
D.
production environment with test data.
D.
production environment with test data.
Answers
Suggested answer: A

Explanation:

Stress testing is designed to evaluate a system's performance under extreme conditions1.It is typically carried out in a test environment that closely mirrors the production environment, using production workloads1.This approach ensures that the test results accurately reflect how the system would perform under similar conditions in the production environment1.Using a test environment also prevents any disruptions or damage to the production environment during testing1.

Stress Testing Best Practices: A Seven Steps Model

Which of the following is the BEST way for management to ensure the effectiveness of the cybersecurity incident response process?

A.
Periodic reporting of cybersecurity incidents to key stakeholders
A.
Periodic reporting of cybersecurity incidents to key stakeholders
Answers
B.
Periodic update of incident response process documentation
B.
Periodic update of incident response process documentation
Answers
C.
Periodic cybersecurity training for staff involved in incident response
C.
Periodic cybersecurity training for staff involved in incident response
Answers
D.
Periodic tabletop exercises involving key stakeholders
D.
Periodic tabletop exercises involving key stakeholders
Answers
Suggested answer: D

Explanation:

Tabletop exercises are a type of simulation used to test an organization's incident response plan12.They involve key stakeholders in a hypothetical scenario to see how they would respond12.This allows management to assess the effectiveness of the incident response process and identify areas for improvement12.Regularly conducting these exercises ensures that the organization is prepared for a real incident and that the incident response process remains effective over time12.

Cybersecurity incident response: The 6 steps to success

Six steps for building a robust incident response strategy - IBM

An organization's IT department and internal IS audit function all report to the chief information officer (CIO). Which of the following is the GREATEST concern associated with this reporting structure?

A.
Potential for inaccurate audit findings
A.
Potential for inaccurate audit findings
Answers
B.
Compromise of IS audit independence
B.
Compromise of IS audit independence
Answers
C.
IS audit resources being shared with other IT functions
C.
IS audit resources being shared with other IT functions
Answers
D.
IS audit being isolated from other audit functions
D.
IS audit being isolated from other audit functions
Answers
Suggested answer: B

Explanation:

The greatest concern with the IT department and internal IS audit function both reporting to the CIO is the potential compromise of IS audit independence.Auditor independence refers to the impartiality and objectivity of an auditor in conducting an audit, free from conflicts of interest and bias1.It is crucial for ensuring the quality and reliability of financial reporting1. If the IS audit function reports to the CIO, who also oversees the IT department, it could create a conflict of interest that might compromise the impartiality and objectivity of the IS audit function.

Auditor Independence - What is it, Rules, Importance, Examples

Total 1.198 questions
Go to page: of 120