ExamGecko
Home Home / Isaca / CISA

Isaca CISA Practice Test - Questions Answers, Page 116

Question list
Search
Search

Related questions

Which of the following is the GREATEST advantage of outsourcing the development of an e-banking solution when in-house technical expertise is not available?

A.
Lower start-up costs
A.
Lower start-up costs
Answers
B.
Reduced risk of system downtime
B.
Reduced risk of system downtime
Answers
C.
Direct oversight of risks
C.
Direct oversight of risks
Answers
D.
Increased ability to adapt the system
D.
Increased ability to adapt the system
Answers
Suggested answer: A

Explanation:

Outsourcing the development of an e-banking solution when in-house technical expertise is not available can significantly reduce start-up costs.This is because the organization can avoid the expenses associated with hiring and training a full-time development team, purchasing necessary hardware and software, and maintaining the system1.While outsourcing can also potentially reduce the risk of system downtime, increase the ability to adapt the system, and provide direct oversight of risks, these benefits are not as immediate or guaranteed as the cost savings123.

Which of the following BEST demonstrates to senior management and the board that an audit function is compliant with standards and the code of ethics?

A.
Audit staff interviews
A.
Audit staff interviews
Answers
B.
Quality control reviews
B.
Quality control reviews
Answers
C.
Control self-assessments (CSAs)
C.
Control self-assessments (CSAs)
Answers
D.
Corrective action plans
D.
Corrective action plans
Answers
Suggested answer: B

Explanation:

Quality control reviews are the best way to demonstrate to senior management and the board that an audit function is compliant with standards and the code of ethics.These reviews assess the efficiency and effectiveness of the audit function, ensure compliance with audit standards and ethics, and identify areas for improvement12.While audit staff interviews, control self-assessments (CSAs), and corrective action plans can provide valuable insights, they do not offer the same level of assurance as a comprehensive quality control review12.

Which of the following is found in an audit charter?

A.
The process of developing the annual audit plan
A.
The process of developing the annual audit plan
Answers
B.
The authority given to the audit function
B.
The authority given to the audit function
Answers
C.
Required training for audit staff
C.
Required training for audit staff
Answers
D.
Audit objectives and scope
D.
Audit objectives and scope
Answers
Suggested answer: B

Explanation:

The authority given to the audit function is one of the components that is found in an audit charter.According to the IIA, the audit charter is a formal document that defines internal audit's purpose, authority, responsibility and position within the organization1.The authority given to the audit function includes the scope of its activities, the access to records, personnel and physical properties relevant to its work, and the independence and objectivity of its staff2.The authority given to the audit function helps to ensure that internal auditors can perform their duties effectively and efficiently, and that they can provide assurance and consulting services that add value and improve the organization's operations3.

The other options are not found in an audit charter.The process of developing the annual audit plan is not part of the audit charter, but rather a separate document that outlines the methodology, criteria and resources for selecting and prioritizing audit engagements based on a risk assessment4.Required training for audit staff is not part of the audit charter, but rather a component of the quality assurance and improvement program that evaluates the competence and performance of internal auditors and provides them with opportunities for professional development5. Audit objectives and scope are not part of the audit charter, but rather specific elements of each individual audit engagement that define the expected outcomes and the boundaries of the audit work.

In a review of the organization standards and guidelines for IT management, which of the following should be included in an IS development methodology?

A.
Value-added activity analysis
A.
Value-added activity analysis
Answers
B.
Risk management techniques
B.
Risk management techniques
Answers
C.
Access control rules
C.
Access control rules
Answers
D.
Incident management techniques
D.
Incident management techniques
Answers
Suggested answer: B

Explanation:

Risk management techniques should be included in an IS development methodology. An IS development methodology is a set of guidelines, standards, and procedures that provide a structured and consistent approach to developing information systems.A good IS development methodology should cover all the phases of the system development life cycle (SDLC), from planning and analysis to design, implementation, testing, and maintenance1.

Risk management techniques are an essential part of an IS development methodology, as they help to identify, assess, prioritize, mitigate, monitor, and communicate the risks that may affect the success of the system development project.Risk management techniques can also help to ensure that the system meets the requirements and expectations of the stakeholders, complies with the relevant laws and regulations, and delivers value to the organization2.

The other options are not as relevant or appropriate as risk management techniques for an IS development methodology.Value-added activity analysis is a technique for evaluating the efficiency and effectiveness of business processes, but it is not specific to IS development3.Access control rules are policies and mechanisms for restricting or granting access to information systems and resources, but they are more related to security management than IS development4.Incident management techniques are methods for handling and resolving incidents that disrupt the normal operation of information systems and services, but they are more related to service management than IS development5.

ISACA, CISA Review Manual, 27th Edition, 2019, p.1911

ISACA, CISA Review Manual, 27th Edition, 2019, p.1942

Value-Added Activity Analysis3

Access Control Rules4

Incident Management Techniques5

Which of the following BEST enables an IS auditor to combine and compare access control lists from various applications and devices?

A.
Integrated test facility (ITF)
A.
Integrated test facility (ITF)
Answers
B.
Snapshots
B.
Snapshots
Answers
C.
Data analytics
C.
Data analytics
Answers
D.
Audit hooks
D.
Audit hooks
Answers
Suggested answer: C

Explanation:

Data analytics is the process of analyzing large and complex data sets to discover patterns, trends, and insights that can support decision making and problem solving. Data analytics can enable an IS auditor to combine and compare access control lists from various applications and devices by using techniques such as data extraction, transformation, loading, cleansing, integration, aggregation, visualization, and reporting. Data analytics can help an IS auditor to identify and assess the risks and controls related to access management, such as unauthorized or excessive access, segregation of duties violations, access policy compliance, access activity monitoring, and access review and remediation.

The other options are not as effective or relevant as data analytics for combining and comparing access control lists from various applications and devices. Integrated test facility (ITF) is a technique for testing the validity and accuracy of application processing by inserting fictitious transactions into the system and verifying the results. ITF does not directly involve the analysis of access control lists. Snapshots are records of selected information at a specific point in time that can be used to monitor system activity or performance. Snapshots can provide some information about access control lists, but they are not sufficient to combine and compare them across different sources. Audit hooks are software routines embedded in an application that can trigger an alert or a report when certain conditions are met. Audit hooks can help to detect anomalies or exceptions in access control lists, but they do not provide a comprehensive or integrated view of them.

ISACA, CISA Review Manual, 27th Edition, 2019, p.2361

ISACA, ITAF: A Professional Practices Framework for IS Audit/Assurance, 3rd Edition, 2014, p.882

Data Analytics for Auditing Access Control3

Using swipe cards to limit employee access to restricted areas requires implementing which additional control?

A.
Physical sign-in of all employees for access to restricted areas
A.
Physical sign-in of all employees for access to restricted areas
Answers
B.
Implementation of additional PIN pads
B.
Implementation of additional PIN pads
Answers
C.
Periodic review of access profiles by management
C.
Periodic review of access profiles by management
Answers
D.
Installation of closed-circuit television (CCTV)
D.
Installation of closed-circuit television (CCTV)
Answers
Suggested answer: C

Explanation:

Periodic review of access profiles by management is an additional control that is required when using swipe cards to limit employee access to restricted areas. Swipe cards are a type of physical access control that use magnetic stripes or radio frequency identification (RFID) to store and transmit information about the cardholder's identity and access rights. Swipe cards can help to prevent unauthorized entry, protect sensitive assets and data, and monitor access activity. However, swipe cards alone are not enough to ensure effective access control. They need to be complemented by other controls, such as:

Periodic review of access profiles by management: This is a type of logical access control that involves verifying that the access rights assigned to each cardholder are appropriate, necessary, and consistent with the organization's policies and procedures. Periodic review of access profiles can help to detect and correct any errors, inconsistencies, or violations in the access control system, such as outdated, excessive, or redundant access rights, segregation of duties conflicts, or unauthorized changes. Periodic review of access profiles can also help to ensure compliance with internal and external audit requirements and regulations.

Implementation of additional PIN pads: This is a type of multi-factor authentication (MFA) that requires the cardholder to enter a personal identification number (PIN) in addition to swiping their card. MFA can enhance the security of the access control system by adding another layer of verification and reducing the risk of lost, stolen, or cloned cards being used by unauthorized persons.

Installation of closed-circuit television (CCTV): This is a type of surveillance system that uses cameras and monitors to record and display the images of the people and activities in the restricted areas. CCTV can deter potential intruders, provide evidence of any security incidents or breaches, and enable real-time monitoring and response by security personnel.

The other options are not as effective or relevant as periodic review of access profiles by management for an additional control when using swipe cards. Physical sign-in of all employees for access to restricted areas is a redundant and inefficient control that can be easily bypassed or manipulated. It also does not provide any assurance or verification of the identity or access rights of the cardholders. Audit hooks are software routines embedded in an application that can trigger an alert or a report when certain conditions are met. Audit hooks can help to detect anomalies or exceptions in access control lists, but they do not provide a comprehensive or integrated view of them.

ISACA, CISA Review Manual, 27th Edition, 2019, p. 236

ISACA, ITAF: A Professional Practices Framework for IS Audit/Assurance, 3rd Edition, 2014, p. 88

Data Analytics for Auditing Access Control

Which of the following audit procedures would provide the BEST assurance that an application program is functioning as designed?

A.
Using a continuous auditing module
A.
Using a continuous auditing module
Answers
B.
Interviewing business management
B.
Interviewing business management
Answers
C.
Confirming accounts
C.
Confirming accounts
Answers
D.
Reviewing program documentation
D.
Reviewing program documentation
Answers
Suggested answer: A

Explanation:

Using a continuous auditing module is an audit procedure that would provide the best assurance that an application program is functioning as designed. A continuous auditing module is a software tool that performs automated and continuous testing and monitoring of an application program's inputs, outputs, processes, and controls. A continuous auditing module can help to verify the accuracy, completeness, validity, reliability, and timeliness of the application program's data and transactions. A continuous auditing module can also help to identify and report any errors, anomalies, deviations, or exceptions in the application program's performance or compliance.

The other options are not as effective or relevant as using a continuous auditing module for providing assurance that an application program is functioning as designed. Interviewing business management is a technique for obtaining information and opinions from the users or owners of the application program, but it does not directly test or verify the functionality or quality of the application program. Confirming accounts is a technique for verifying the existence and accuracy of account balances or transactions, but it does not necessarily reflect the design or operation of the application program. Reviewing program documentation is a technique for examining the specifications, requirements, and procedures of the application program, but it does not provide evidence of the actual implementation or execution of the application program.

ISACA, CISA Review Manual, 27th Edition, 2019, p.2361

Continuous audit and monitoring - PwC2


Which type of risk would MOST influence the selection of a sampling methodology?

A.
Inherent
A.
Inherent
Answers
B.
Residual
B.
Residual
Answers
C.
Control
C.
Control
Answers
D.
Detection
D.
Detection
Answers
Suggested answer: D

Explanation:

The type of risk that would most influence the selection of a sampling methodology is detection risk (option D). This is because:

Detection risk is the risk that the auditor will not detect a material misstatement that exists in an assertion1.Detection risk depends on the effectiveness of the audit procedures and how well they are applied by the auditor1.

The selection of a sampling methodology is part of the design of audit procedures, which aims to reduce detection risk to an acceptable level1.The auditor should consider the following factors when selecting a sampling methodology23:

The objectives of the audit procedure and the related assertions.

The characteristics of the population from which the sample will be drawn, such as its size, homogeneity, and structure.

The sampling technique to be used, such as random, systematic, haphazard, or judgmental.

The sample size and the method of selecting sample items.

The evaluation of the sample results and the projection of errors to the population.

The auditor should also consider the advantages and disadvantages of different sampling methodologies, such as statistical and non-statistical sampling23. Statistical sampling is a sampling technique that uses random selection and probability theory to evaluate sample results. Non-statistical sampling is a sampling technique that does not use random selection or probability theory to evaluate sample results.Some of the advantages and disadvantages are as follows23:

Statistical sampling allows the auditor to measure and control sampling risk, which is the risk that the sample is not representative of the population. Statistical sampling also allows the auditor to quantify the precision and reliability of the sample results. However, statistical sampling requires more technical knowledge and skills, as well as more time and cost, than non-statistical sampling.

Non-statistical sampling relies on the auditor's professional judgment and experience to select and evaluate sample items. Non-statistical sampling is more flexible and less complex than statistical sampling. However, non-statistical sampling does not provide an objective basis for measuring and controlling sampling risk, nor does it allow the auditor to quantify the precision and reliability of the sample results.

Therefore, the type of risk that would most influence the selection of a sampling methodology is detection risk (option D), as it determines how effective and efficient the audit procedures should be in order to provide sufficient appropriate audit evidence.

To ensure confidentiality through the use of asymmetric encryption, a message is encrypted with which of the following?

A.
Recipient's public key
A.
Recipient's public key
Answers
B.
Sender's private key
B.
Sender's private key
Answers
C.
Sender's public key
C.
Sender's public key
Answers
D.
Recipient's private key
D.
Recipient's private key
Answers
Suggested answer: A

Explanation:

The best option for ensuring confidentiality through the use of asymmetric encryption is to encrypt a message with the recipient's public key (option A). This is because:

Asymmetric encryption, also known as public-key cryptography, is a type of encryption that uses a pair of keys to encrypt and decrypt data.The pair of keys includes a public key, which can be shared with anyone, and a private key, which is kept secret by the owner12.

In asymmetric encryption, the sender uses the recipient's public key to encrypt the data. The recipient then uses their private key to decrypt the data.This approach allows for secure communication between two parties without the need for both parties to have the same secret key12.

Encrypting a message with the recipient's public key ensures that only the recipient can decrypt it with their private key.This provides confidentiality, which means that the message is protected from unauthorized access or disclosure12.

Encrypting a message with the sender's private key (option B) does not ensure confidentiality, but rather authentication, which means that the message can be verified as coming from the sender.This is because anyone can decrypt the message with the sender's public key, but only the sender can encrypt it with their private key12.

Encrypting a message with the sender's public key (option C) or the recipient's private key (option D) does not make sense, as it would render the message unreadable by both parties.This is because neither party has the corresponding key to decrypt it12.

Therefore, the best option for ensuring confidentiality through the use of asymmetric encryption is to encrypt a message with the recipient's public key (option A), as this ensures that only the recipient can decrypt it with their private key.

Which of the following is the MOST important responsibility of data owners when implementing a data classification process?

A.
Reviewing emergency changes to data
A.
Reviewing emergency changes to data
Answers
B.
Authorizing application code changes
B.
Authorizing application code changes
Answers
C.
Determining appropriate user access levels
C.
Determining appropriate user access levels
Answers
D.
Implementing access rules over database tables
D.
Implementing access rules over database tables
Answers
Suggested answer: C

Explanation:

The most important responsibility of data owners when implementing a data classification process is determining appropriate user access levels (option C). This is because:

Data owners are the persons or entities that have the authority and responsibility for the business processes and functions that collect, use, store, and dispose of data1.

Data owners are accountable for ensuring that the data is handled in compliance with the applicable laws, regulations, policies, and standards, such as the GDPR and the PIPEDA1234.

Data owners are in the best position to determine the purpose and necessity of collecting and retaining data, as well as the risks and benefits associated with it1.

Data owners should consult with other stakeholders, such as the risk manager, the database administrator (DBA), and the privacy manager, to establish and implement appropriate data classification policies and procedures2.

Data classification is the process of organizing data in groups based on their attributes and characteristics, and then assigning class labels that describe a set of attributes that hold true for the corresponding data sets345.

Data classification helps organizations to identify, manage, protect, and understand their data, as well as to comply with modern data privacy regulations345.

Data classification also helps to determine appropriate user access levels, which means defining who can access, modify, share, or delete data based on their roles, responsibilities, and needs345.

Determining appropriate user access levels is the most important responsibility of data owners when implementing a data classification process, as it ensures that only authorized and legitimate users can access sensitive or important data.This provides confidentiality, integrity, availability, and accountability of data345.

Reviewing emergency changes to data (option A), authorizing application code changes (option B), and implementing access rules over database tables (option D) are not the most important responsibilities of data owners when implementing a data classification process. These are more related to the operational aspects of data management, which are usually delegated to other roles, such as the DBA or the IT staff.The data owner should oversee and approve these activities, but not perform them directly1.

Total 1.198 questions
Go to page: of 120