ExamGecko
Home Home / Isaca / CISA

Isaca CISA Practice Test - Questions Answers, Page 117

Question list
Search
Search

List of questions

Search

Related questions

An IS auditor is evaluating an enterprise resource planning (ERP) migration from local systems to the cloud. Who should be responsible for the data classification in this project?

A.
Information security officer
A.
Information security officer
Answers
B.
Database administrator (DBA)
B.
Database administrator (DBA)
Answers
C.
Information owner
C.
Information owner
Answers
D.
Data architect
D.
Data architect
Answers
Suggested answer: C

Explanation:

The best option for the question is C, information owner. This is because:

The information owner is the person or entity that has the authority and responsibility for the business processes and functions that collect, use, store, and dispose of data1.

The information owner is accountable for ensuring that the data is handled in compliance with the applicable laws, regulations, policies, and standards, such as the GDPR and the PIPEDA1234.

The information owner is in the best position to determine the purpose and necessity of collecting and retaining data, as well as the risks and benefits associated with it1.

The information owner should consult with other stakeholders, such as the risk manager, the database administrator (DBA), and the privacy manager, to establish and implement appropriate data classification policies and procedures2.

Data classification is the process of organizing data in groups based on their attributes and characteristics, and then assigning class labels that describe a set of attributes that hold true for the corresponding data sets345.

Data classification helps organizations to identify, manage, protect, and understand their data, as well as to comply with modern data privacy regulations345.

Data classification also helps to determine appropriate user access levels, which means defining who can access, modify, share, or delete data based on their roles, responsibilities, and needs345.

Therefore, the information owner should be responsible for the data classification in an ERP migration project from local systems to the cloud (option C), as they have the authority and accountability for the data and its protection.

The other options are not correct because:

The information security officer (option A) is responsible for overseeing and coordinating the security policies and practices of the organization that involve data6. The information security officer should advise and assist the information owner on the best practices and standards for data security, but not determine the data classification.

The database administrator (DBA) (option B) is responsible for installing, configuring, monitoring, maintaining, and improving the performance of databases and data stores that contain data5. The DBA should support the information owner in implementing and enforcing the data classification policies and procedures, but not determine them.

The data architect (option D) is responsible for designing, modeling, and documenting the logical and physical structures of databases and data stores that contain data7. The data architect should collaborate with the information owner in creating and maintaining the data classification schema and metadata, but not determine them.

An IS auditor finds that the cost of developing an application is now projected to significantly exceed the budget. Which of the following is the GREATEST risk to communicate to senior management?

A.

Noncompliance with project methodology

A.

Noncompliance with project methodology

Answers
B.

Inability to achieve expected benefits

B.

Inability to achieve expected benefits

Answers
C.

Increased staff turnover

C.

Increased staff turnover

Answers
D.

Project abandonment

D.

Project abandonment

Answers
Suggested answer: B

Which of the following is the PRIMARY reason to involve IS auditors in the software acquisition process?

A.

To help ensure hardware and operating system requirements are considered

A.

To help ensure hardware and operating system requirements are considered

Answers
B.

To help ensure proposed contracts and service level agreements (SLAs) address key elements

B.

To help ensure proposed contracts and service level agreements (SLAs) address key elements

Answers
C.

To help ensure the project management process complies with policies and procedures

C.

To help ensure the project management process complies with policies and procedures

Answers
D.

To help ensure adequate controls to address common threats and risks are considered

D.

To help ensure adequate controls to address common threats and risks are considered

Answers
Suggested answer: A

Which of the following BEST indicates to an IS auditor that an organization handles emergency changes appropriately and transparently?

A.

The application operations manual contains procedures to ensure emergency fixes do not compromise system integrity.

A.

The application operations manual contains procedures to ensure emergency fixes do not compromise system integrity.

Answers
B.

Special logon IDs are used to grant programmers permanent access to the production environment.

B.

Special logon IDs are used to grant programmers permanent access to the production environment.

Answers
C.

Change management controls are retroactively applied.

C.

Change management controls are retroactively applied.

Answers
D.

Emergency changes are applied to production libraries immediately.

D.

Emergency changes are applied to production libraries immediately.

Answers
Suggested answer: A

An organization produces control reports with a desktop application that accesses data in the central production database. Which of the following would give an IS auditor concern about the reliability of these reports?

A.

The reports are printed by the same person who reviews them.

A.

The reports are printed by the same person who reviews them.

Answers
B.

The reports are available to all end users.

B.

The reports are available to all end users.

Answers
C.

The report definitions file is not included in routine backups.

C.

The report definitions file is not included in routine backups.

Answers
D.

The report definitions can be modified by end users.

D.

The report definitions can be modified by end users.

Answers
Suggested answer: D

During a pre-implementation review, an IS auditor notes that some scenarios have not been tested. Management has indicated that the project is critical and cannot be postponed. Which of the following is the auditor's BEST course of action?

A.

Determine whether the tested scenarios covered the most significant project risks.

A.

Determine whether the tested scenarios covered the most significant project risks.

Answers
B.

Help management complete remaining scenario testing before implementation.

B.

Help management complete remaining scenario testing before implementation.

Answers
C.

Recommend project implementation be postponed until all scenarios have been tested.

C.

Recommend project implementation be postponed until all scenarios have been tested.

Answers
D.

Perform remaining scenario testing in the production environment post implementation.

D.

Perform remaining scenario testing in the production environment post implementation.

Answers
Suggested answer: A

During the course of fieldwork, an internal IS auditor observes a critical vulnerability within a newly deployed application. What is the auditor's BEST course of action?

A.

Document the finding in the report.

A.

Document the finding in the report.

Answers
B.

Identify other potential vulnerabilities.

B.

Identify other potential vulnerabilities.

Answers
C.

Notify IT management.

C.

Notify IT management.

Answers
D.

Report the finding to the external auditors.

D.

Report the finding to the external auditors.

Answers
Suggested answer: C

Which of the following should be an IS auditor's GREATEST concern when assessing an IT service configuration database?

A.

The database is read-accessible for all users.

A.

The database is read-accessible for all users.

Answers
B.

The database is write-accessible for all users.

B.

The database is write-accessible for all users.

Answers
C.

The database is not encrypted at rest.

C.

The database is not encrypted at rest.

Answers
D.

The database is executable for all users.

D.

The database is executable for all users.

Answers
Suggested answer: B

Which of the following is the MOST important privacy consideration for an organization that uses a cloud service provider to process customer data?

A.

Data privacy must be managed in accordance with the regulations applicable to the organization.

A.

Data privacy must be managed in accordance with the regulations applicable to the organization.

Answers
B.

Data privacy must be monitored in accordance with industry standards and best practices.

B.

Data privacy must be monitored in accordance with industry standards and best practices.

Answers
C.

No personal information may be transferred to the service provider without notifying the customer.

C.

No personal information may be transferred to the service provider without notifying the customer.

Answers
D.

Customer data transferred to the service provider must be reported to the regulatory authority.

D.

Customer data transferred to the service provider must be reported to the regulatory authority.

Answers
Suggested answer: D

Which of the following findings would be of GREATEST concern when reviewing project risk management practices?

A.

There are no formal milestone sign-offs.

A.

There are no formal milestone sign-offs.

Answers
B.

Qualitative risk analyses have not been updated.

B.

Qualitative risk analyses have not been updated.

Answers
C.

Ongoing issues are not formally tracked.

C.

Ongoing issues are not formally tracked.

Answers
D.

Project management software is not being used.

D.

Project management software is not being used.

Answers
Suggested answer: C
Total 1.198 questions
Go to page: of 120