ExamGecko
Home Home / Isaca / CISA

Isaca CISA Practice Test - Questions Answers, Page 115

Question list
Search
Search

List of questions

Search

Related questions

When reviewing past results of a recurring annual audit, an IS auditor notes that findings may not have been reported and independence may not have been maintained. Which of the following is the auditor's BEST course of action?

A.
Inform senior management.
A.
Inform senior management.
Answers
B.
Reevaluate internal controls.
B.
Reevaluate internal controls.
Answers
C.
Inform audit management.
C.
Inform audit management.
Answers
D.
Re-perform past audits to ensure independence.
D.
Re-perform past audits to ensure independence.
Answers
Suggested answer: C

Explanation:

If an IS auditor suspects that independence may not have been maintained in past audits, the best course of action is to inform audit management. Audit management has the responsibility and authority to address such issues.They can review the situation, determine if there was indeed a lack of independence, and decide on the appropriate actions to take123. While informing senior management, reevaluating internal controls, and re-performing past audits might be necessary at some point, the first step should be to inform audit management.

Which of the following is MOST important to consider when assessing the scope of privacy concerns for an IT project?

A.
Data ownership
A.
Data ownership
Answers
B.
Applicable laws and regulations
B.
Applicable laws and regulations
Answers
C.
Business requirements and data flows
C.
Business requirements and data flows
Answers
D.
End-user access rights
D.
End-user access rights
Answers
Suggested answer: B

Explanation:

When assessing the scope of privacy concerns for an IT project, the most important factor to consider is the applicable laws and regulations. These laws and regulations define the legal requirements for data privacy and protection that the project must comply with.They can vary greatly depending on the jurisdiction and the type of data being processed, and non-compliance can result in significant penalties123. While data ownership, business requirements and data flows, and end-user access rights are also important considerations, they are typically guided by these legal requirements.

A secure server room has a badge reader system that records name, date, and time information whenever a staff member uses a badge to enter or exit. When reviewing the system logs, an IS auditor notices records for some employees entering, but not exiting, the room. Which of the following would be the MOST effective compensating control to recommend?

A.
Installing security cameras at the doors
A.
Installing security cameras at the doors
Answers
B.
Changing to a biometric access control system
B.
Changing to a biometric access control system
Answers
C.
Implementing a monitored mantrap at entrance and exit points
C.
Implementing a monitored mantrap at entrance and exit points
Answers
D.
Requiring two-factor authentication at entrance and exit points
D.
Requiring two-factor authentication at entrance and exit points
Answers
Suggested answer: C

Explanation:

A monitored mantrap at entrance and exit points would be the most effective compensating control in this scenario. A mantrap is a physical security access control system comprising a small space having two sets of interlocking doors such that the first set of doors must close before the second set opens.By implementing a monitored mantrap, unauthorized access can be prevented and it can ensure that all individuals are logged when they enter and exit the server room12.

An IS auditor learns that an organization's business continuity plan (BCP) has not been updated in the last 18 months and that the organization recently closed a production plant. Which of the following is the auditor's BEST course of action?

A.
Determine whether the business impact analysis (BIA) is current with the organization's structure and context.
A.
Determine whether the business impact analysis (BIA) is current with the organization's structure and context.
Answers
B.
Determine the types of technologies used at the plant and how they may affect the BCP.
B.
Determine the types of technologies used at the plant and how they may affect the BCP.
Answers
C.
Perform testing to determine the impact to the recovery time objective (R TO).
C.
Perform testing to determine the impact to the recovery time objective (R TO).
Answers
D.
Assess the risk to operations from the closing of the plant.
D.
Assess the risk to operations from the closing of the plant.
Answers
Suggested answer: A

Explanation:

The IS auditor should first determine whether the business impact analysis (BIA) is current with the organization's structure and context. The BIA is a critical component of the BCP and should reflect the current state of the organization.If the BIA is not up-to-date, it may not accurately reflect the impact of a disruption to the organization's operations, including the closure of a production plant12.

References: ISACA's Information Systems Auditor Study Materials1

An IS auditor should be MOST concerned if which of the following fire suppression systems is utilized to protect an asset storage closet?

A.
Deluge system
A.
Deluge system
Answers
B.
Wet pipe system
B.
Wet pipe system
Answers
C.
Preaction system
C.
Preaction system
Answers
D.
CO2 system
D.
CO2 system
Answers
Suggested answer: D

Explanation:

A CO2 system could be a concern for an IS auditor when used to protect an asset storage closet. While CO2 systems are effective at suppressing fires, they can pose a significant safety risk to personnel. In the event of a fire, the CO2 system would fill the room with carbon dioxide, displacing the oxygen.This could be hazardous to anyone who might be in the room at the time12.

An IS auditor has been tasked with auditing the inventory control process for a large organization that processes millions of data transactions. Which of the following is the BEST testing strategy to adopt?

A.
Continuous monitoring
A.
Continuous monitoring
Answers
B.
Control self-assessments (CSAs)
B.
Control self-assessments (CSAs)
Answers
C.
Risk assessments
C.
Risk assessments
Answers
D.
Stop-or-go sampling
D.
Stop-or-go sampling
Answers
Suggested answer: A

Explanation:

Given the large volume of data transactions, continuous monitoring is the best testing strategy for auditing the inventory control process.Continuous monitoring involves the automated review of operational and financial data to identify anomalies or areas of concern12.This approach allows for real-time identification and resolution of issues, making it particularly effective for large organizations with high transaction volumes12.

Which of the following is the BEST method to maintain an audit trail of changes made to the source code of a program?

A.
Embed details within source code.
A.
Embed details within source code.
Answers
B.
Standardize file naming conventions.
B.
Standardize file naming conventions.
Answers
C.
Utilize automated version control.
C.
Utilize automated version control.
Answers
D.
Document details on a change register.
D.
Document details on a change register.
Answers
Suggested answer: C

Explanation:

Automated version control systems are the best method to maintain an audit trail of changes made to the source code of a program.They automatically track and manage changes to the source code over time, allowing you to see what changes were made, when they were made, and who made them1.This provides a clear and detailed audit trail that can be invaluable for debugging, understanding the evolution of the code, and ensuring accountability23.

An IS auditor Is reviewing a recent security incident and is seeking information about me approval of a recent modification to a database system's security settings Where would the auditor MOST likely find this information?

A.
System event correlation report
A.
System event correlation report
Answers
B.
Database log
B.
Database log
Answers
C.
Change log
C.
Change log
Answers
D.
Security incident and event management (SIEM) report
D.
Security incident and event management (SIEM) report
Answers
Suggested answer: C

Explanation:

A change log is a record of all changes made to a system or application, including the date, time, description, and approval of each change. A change log can help an IS auditor to trace the source and authorization of a modification to a system's security settings. A system event correlation report is a tool that analyzes data from multiple sources to identify patterns and anomalies that indicate potential security incidents. A database log is a record of all transactions and activities performed on a database, such as queries, updates, and backups. A security incident and event management (SIEM) report is a tool that collects, analyzes, and reports on data from various sources to detect and respond to security incidents.

An internal audit team is deciding whether to use an audit management application hosted by a third party in a different country.

What should be the MOST important consideration related to the uploading of payroll audit documentation in the hosted application?

A.
Financial regulations affecting the organization
A.
Financial regulations affecting the organization
Answers
B.
Data center physical access controls whore the application is hosted
B.
Data center physical access controls whore the application is hosted
Answers
C.
Privacy regulations affecting the organization
C.
Privacy regulations affecting the organization
Answers
D.
Per-unit cost charged by the hosting services provider for storage
D.
Per-unit cost charged by the hosting services provider for storage
Answers
Suggested answer: C

Explanation:

This is because privacy regulations are laws or rules that protect the personal information of individuals from unauthorized access, use, disclosure, or transfer by third parties. Payroll audit documentation may contain sensitive and confidential data, such as employee names, salaries, benefits, taxes, deductions, and bank accounts. If the audit management application is hosted by a third party in a different country, the organization may need to comply with the privacy regulations of both its own country and the host country, as well as any international or regional agreements or frameworks that apply. Privacy regulations may impose various requirements and obligations on the organization, such as obtaining consent from the data subjects, implementing appropriate security measures, notifying data breaches, and ensuring data quality and accuracy. Privacy regulations may also grant various rights to the data subjects, such as accessing, correcting, deleting, or transferring their data. Failing to comply with privacy regulations may expose the organization to significant risks and consequences, such as legal actions, fines, sanctions, reputational damage, or loss of trust.

Some examples of privacy regulations affecting the organization are:

The General Data Protection Regulation (GDPR), which is a comprehensive and strict privacy regulation that applies to any organization that processes personal data of individuals in the European Union (EU) or offers goods or services to them, regardless of where the organization or the data is located1.

The California Consumer Privacy Act (CCPA), which is a broad and influential privacy regulation that applies to any organization that collects personal information of California residents and meets certain thresholds of revenue, data volume, or data sharing2.

The Health Insurance Portability and Accountability Act (HIPAA), which is a sector-specific privacy regulation that applies to any organization that handles protected health information (PHI) of individuals in the United States, such as health care providers, health plans, or health care clearinghouses3.

Therefore, before using an audit management application hosted by a third party in a different country, the internal audit team should conduct a thorough assessment of the privacy regulations affecting the organization and ensure that they have adequate policies, procedures, and controls in place to comply with them.

Data from a system of sensors located outside of a network is received by the open ports on a server. Which of the following is the BEST way to ensure the integrity of the data being collected from the sensor system?

A.
Route the traffic from the sensor system through a proxy server.
A.
Route the traffic from the sensor system through a proxy server.
Answers
B.
Hash the data that is transmitted from the sensor system.
B.
Hash the data that is transmitted from the sensor system.
Answers
C.
Implement network address translation on the sensor system.
C.
Implement network address translation on the sensor system.
Answers
D.
Transmit the sensor data via a virtual private network (VPN) to the server.
D.
Transmit the sensor data via a virtual private network (VPN) to the server.
Answers
Suggested answer: B
Total 1.198 questions
Go to page: of 120