ExamGecko
Home Home / Isaca / CISA

Isaca CISA Practice Test - Questions Answers, Page 114

Question list
Search
Search

List of questions

Search

Related questions

Which of the following BEST contributes to the quality of an audit of a business-critical application?

A.
Assigning the audit to independent external auditors
A.
Assigning the audit to independent external auditors
Answers
B.
Reviewing previous findings reported by the application owner
B.
Reviewing previous findings reported by the application owner
Answers
C.
Identifying common coding errors made by the development team
C.
Identifying common coding errors made by the development team
Answers
D.
Involving the application owner early in the audit planning process
D.
Involving the application owner early in the audit planning process
Answers
Suggested answer: D

Explanation:

Involving the application owner early in the audit planning process is the best way to contribute to the quality of an audit of a business-critical application. The application owner has a deep understanding of the application and its business context, which can provide valuable insights for the audit.Early involvement can also help ensure that the audit is aligned with the business objectives and risks, and that any potential issues are identified and addressed promptly12.

Business Critical Applications: An In-Depth Look

Framework for Audit Quality - IFAC

Which of the following methods would BEST help detect unauthorized disclosure of confidential documents sent over corporate email?

A.
Requiring all users to encrypt documents before sending
A.
Requiring all users to encrypt documents before sending
Answers
B.
Installing firewalls on the corporate network
B.
Installing firewalls on the corporate network
Answers
C.
Reporting all outgoing emails that are marked as confidential
C.
Reporting all outgoing emails that are marked as confidential
Answers
D.
Monitoring all emails based on pre-defined criteria
D.
Monitoring all emails based on pre-defined criteria
Answers
Suggested answer: D

Explanation:

To detect unauthorized disclosure of confidential documents sent over corporate email, monitoring all emails based on pre-defined criteria is the best approach. This involves setting up automated monitoring systems that analyze email content, attachments, and metadata to identify any potential unauthorized disclosures. By defining specific criteria (such as keywords related to confidential information), organizations can proactively detect and prevent leaks. Requiring encryption before sending documents (option A) is important but does not address monitoring for unauthorized disclosures. Firewalls (option B) protect the network but do not specifically focus on email content.Reporting outgoing emails marked as confidential (option C) relies on user self-reporting and may not catch all incidents12.Reference:1(https://www.isaca.org/resources/isaca-journal/past-issues/2010/data-governance-for-privacy-confidentiality-and-compliance-a-holistic-approach)2(https://www.isaca.org/resources/news-and-trends/newsletters/atisaca/2020/volume-6/best-practices-for-privacy-audits)

An IS auditor reviewing the database controls for a new e-commerce system discovers a security weakness in the database configuration. Which of the following should be the IS auditor's NEXT course of action?

A.
Identify existing mitigating controls.
A.
Identify existing mitigating controls.
Answers
B.
Disclose the findings to senior management.
B.
Disclose the findings to senior management.
Answers
C.
Assist in drafting corrective actions.
C.
Assist in drafting corrective actions.
Answers
D.
Attempt to exploit the weakness.
D.
Attempt to exploit the weakness.
Answers
Suggested answer: A

Explanation:

When an IS auditor discovers a security weakness in the database configuration, the next course of action should be to identify existing mitigating controls. This involves assessing whether any controls are already in place to address the weakness and mitigate the risk.Understanding the current state of controls helps the auditor determine the severity of the issue and whether additional corrective actions are necessary1.Reference:1(https://www.isaca.org/resources/insights-and-expertise/audit-programs-and-tools)

When planning a follow-up, the IS auditor is informed by operational management that recent organizational changes have addressed the previously identified risk and implementing the action plan is no longer necessary. What should the auditor do NEXT?

A.
Report that the changes make it impractical to determine whether the risks have been addressed.
A.
Report that the changes make it impractical to determine whether the risks have been addressed.
Answers
B.
Accept management's assertion and report that the risks have been addressed.
B.
Accept management's assertion and report that the risks have been addressed.
Answers
C.
Determine whether the changes have introduced new risks that need to be addressed.
C.
Determine whether the changes have introduced new risks that need to be addressed.
Answers
D.
Review the changes and determine whether the risks have been addressed.
D.
Review the changes and determine whether the risks have been addressed.
Answers
Suggested answer: B

Explanation:

When operational management informs the IS auditor that recent organizational changes have addressed previously identified risks and implementing the action plan is no longer necessary, the IS auditor should accept management's assertion and report that the risks have been addressed. However, it is essential to document this communication and ensure that there is evidence supporting management's claim. If there are any doubts or concerns, further investigation may be necessary.The auditor should not assume new risks without proper assessment or evidence1.Reference:1(https://www.isaca.org/resources/isaca-journal/issues/2016/volume-6/enhancing-the-audit-follow-up-process-using-cobit-5)

Which of the following would BEST indicate the effectiveness of a security awareness training program?

A.
Results of third-party social engineering tests
A.
Results of third-party social engineering tests
Answers
B.
Employee satisfaction with training
B.
Employee satisfaction with training
Answers
C.
Increased number of employees completing training
C.
Increased number of employees completing training
Answers
D.
Reduced unintentional violations
D.
Reduced unintentional violations
Answers
Suggested answer: D

Explanation:

The effectiveness of a security awareness training program is best indicated by areduction in unintentional violations. When employees are well-trained and aware of security practices, they are less likely to inadvertently violate security policies or make mistakes that could lead to breaches.While other factors (such as third-party social engineering tests, employee satisfaction, and completion rates) provide valuable insights, the ultimate goal of security awareness training is to minimize unintentional errors and improve overall security posture12.Reference:1(https://www.isaca.org/resources/isaca-journal/issues/2023/volume-2/considerations-for-developing-cybersecurity-awareness-training)2(https://www.isaca.org/resources/news-and-trends/isaca-now-blog/2023/security-awareness-training-a-critical-success-factor-for-organizations)

Which of the following would be an auditor's GREATEST concern when reviewing data inputs from spreadsheets into the core finance system?

A.
Undocumented code formats data and transmits directly to the database.
A.
Undocumented code formats data and transmits directly to the database.
Answers
B.
There is not a complete inventory of spreadsheets, and file naming is inconsistent.
B.
There is not a complete inventory of spreadsheets, and file naming is inconsistent.
Answers
C.
The department data protection policy has not been reviewed or updated for two years.
C.
The department data protection policy has not been reviewed or updated for two years.
Answers
D.
Spreadsheets are accessible by all members of the finance department.
D.
Spreadsheets are accessible by all members of the finance department.
Answers
Suggested answer: A

Explanation:

The auditor's greatest concern when reviewing data inputs from spreadsheets into the core finance system would be undocumented code that formats data and transmits directly to the database. This is because undocumented code can introduce errors, inconsistencies, and security risks in the data processing and reporting. Undocumented code can also make it difficult to verify the accuracy, completeness, and validity of the data inputs and outputs, as well as to trace the source and destination of the data. Undocumented code can also violate the principles of segregation of duties, as the same person who creates the code may also have access to the data and the database.

The other options are not as concerning as undocumented code, although they may also pose some risks. A lack of complete inventory of spreadsheets and inconsistent file naming may make it challenging to identify and locate the relevant spreadsheets, but they do not directly affect the quality or integrity of the data inputs. The department data protection policy not being reviewed or updated for two years may indicate a lack of awareness or compliance with the current data protection regulations, but it does not necessarily imply that the data inputs are compromised or inaccurate. Spreadsheets being accessible by all members of the finance department may increase the risk of unauthorized or accidental changes to the data, but it can be mitigated by implementing access controls, password protection, and audit trails.

ISACA, CISA Review Manual, 27th Edition, 2019, p.2261

Five Common Spreadsheet Risks and Ways to Control Them2

GREATEST Concerns When Reviewing Data Inputs from Spreadsheets3

An IS audit manager is reviewing workpapers for a recently completed audit of the corporate disaster recovery test. Which of the following should the IS audit manager specifically review to substantiate the conclusions?

A.
Overviews of interviews between data center personnel and the auditor
A.
Overviews of interviews between data center personnel and the auditor
Answers
B.
Prior audit reports involving other corporate disaster recovery audits
B.
Prior audit reports involving other corporate disaster recovery audits
Answers
C.
Summary memos reflecting audit opinions regarding noted weaknesses
C.
Summary memos reflecting audit opinions regarding noted weaknesses
Answers
D.
Detailed evidence of the successes and weaknesses of all contingency testing
D.
Detailed evidence of the successes and weaknesses of all contingency testing
Answers
Suggested answer: D

Explanation:

The IS audit manager should specifically review the detailed evidence of the successes and weaknesses of all contingency testing to substantiate the conclusions of the audit of the corporate disaster recovery test. This is because the detailed evidence can provide the audit manager with a clear and objective picture of how well the disaster recovery plan was executed, what issues or gaps were encountered, and what recommendations or actions were taken to address them. The detailed evidence can also help the audit manager to verify the accuracy, completeness, and validity of the audit findings, as well as to evaluate the adequacy and effectiveness of the disaster recovery controls.

The other options are not as specific or relevant as the detailed evidence of all contingency testing. Overviews of interviews between data center personnel and the auditor may provide some useful information, but they are not sufficient to substantiate the conclusions without supporting evidence from the actual testing. Prior audit reports involving other corporate disaster recovery audits may provide some benchmarking or comparison data, but they are not directly related to the current audit scope and objectives. Summary memos reflecting audit opinions regarding noted weaknesses may provide some high-level insights, but they are not enough to substantiate the conclusions without detailed evidence to back them up.

ISACA, CISA Review Manual, 27th Edition, 2019, p.2411

Disaster Recovery Audit Work Program2

IT governance should be driven by:

A.
business unit initiatives.
A.
business unit initiatives.
Answers
B.
balanced scorecards.
B.
balanced scorecards.
Answers
C.
policies and standards.
C.
policies and standards.
Answers
D.
organizational strategies.
D.
organizational strategies.
Answers
Suggested answer: D

Explanation:

IT governance should be driven by organizational strategies.It provides a formal structure for organizations to produce measurable results toward achieving their strategies and ensures that IT investments support business objectives12. While business unit initiatives, balanced scorecards, and policies and standards can play a role in IT governance, they are tools or methods that support the implementation of the organizational strategies.

Which of the following BEST enables an organization to improve the effectiveness of its incident response team?

A.
Conducting periodic testing and incorporating lessons learned
A.
Conducting periodic testing and incorporating lessons learned
Answers
B.
Increasing the mean resolution time and publishing key performance indicator (KPI) metrics
B.
Increasing the mean resolution time and publishing key performance indicator (KPI) metrics
Answers
C.
Disseminating incident response procedures and requiring signed acknowledgment by team members
C.
Disseminating incident response procedures and requiring signed acknowledgment by team members
Answers
D.
Ensuring all team members understand information systems technology
D.
Ensuring all team members understand information systems technology
Answers
Suggested answer: A

Explanation:

Conducting periodic testing and incorporating lessons learned is the best way to improve the effectiveness of an incident response team. This allows the team to practice their response procedures, identify any gaps or weaknesses in their response, and learn from their mistakes. It also helps to keep the team's skills sharp and up-to-date.The lessons learned from these tests can then be used to improve the team's procedures and performance12. While understanding information systems technology, disseminating incident response procedures, and publishing KPI metrics can contribute to the effectiveness of the team, they do not provide the same level of continuous improvement as periodic testing and learning from experience.

Which of the following BEST supports the effectiveness of a compliance program?

A.
Implementing an awareness plan regarding compliance regulation requirements
A.
Implementing an awareness plan regarding compliance regulation requirements
Answers
B.
Implementing a governance, risk, and compliance (GRC) tool to track compliance to regulations
B.
Implementing a governance, risk, and compliance (GRC) tool to track compliance to regulations
Answers
C.
Assessing and tracking all compliance audit findings
C.
Assessing and tracking all compliance audit findings
Answers
D.
Monitoring which compliance regulations apply to the organization
D.
Monitoring which compliance regulations apply to the organization
Answers
Suggested answer: C

Explanation:

Assessing and tracking all compliance audit findings is the best way to support the effectiveness of a compliance program.This allows an organization to identify areas of non-compliance, take corrective action, and monitor improvements over time12. While implementing an awareness plan, using a governance, risk, and compliance (GRC) tool, and monitoring applicable regulations can contribute to a compliance program, they do not provide the same level of continuous improvement and effectiveness as assessing and tracking audit findings.

Total 1.198 questions
Go to page: of 120