ExamGecko
Home Home / Isaca / CISA

Isaca CISA Practice Test - Questions Answers, Page 118

Question list
Search
Search

List of questions

Search

Related questions

An IS auditor finds that a new network connection allows communication between the Internet and the internal enterprise resource planning (ERP) system. Which of the following is the PRIMARY business impact to include when presenting this observation to management?

A.

An increase to the threat landscape

A.

An increase to the threat landscape

Answers
B.

A decrease in data quality in the ERP system

B.

A decrease in data quality in the ERP system

Answers
C.

A decrease in network performance

C.

A decrease in network performance

Answers
D.

An increase in potential fines from regulators

D.

An increase in potential fines from regulators

Answers
Suggested answer: A

Which of the following is the PRIMARY benefit of effective implementation of appropriate data classification?

A.

Ability to meet business requirements

A.

Ability to meet business requirements

Answers
B.

Assurance that sensitive data is encrypted

B.

Assurance that sensitive data is encrypted

Answers
C.

Increased accuracy of sensitive data

C.

Increased accuracy of sensitive data

Answers
D.

Management of business risk to sensitive data

D.

Management of business risk to sensitive data

Answers
Suggested answer: D

A network analyst is monitoring the network after hours and detects activity that appears to be a brute-force attempt to compromise a critical server. After reviewing the alerts to ensure their accuracy, what should be done NEXT?

A.

Perform a root cause analysis.

A.

Perform a root cause analysis.

Answers
B.

Document all steps taken in a written report.

B.

Document all steps taken in a written report.

Answers
C.

Isolate the affected system.

C.

Isolate the affected system.

Answers
D.

Invoke the incident response plan.

D.

Invoke the incident response plan.

Answers
Suggested answer: D

During an IS audit of a data center, it was found that programmers are allowed to make emergency fixes to operational programs. Which of the following should be the IS auditor's PRIMARY recommendation?

A.

Programmers should be allowed to implement emergency fixes only after obtaining verbal agreement from the application owner.

A.

Programmers should be allowed to implement emergency fixes only after obtaining verbal agreement from the application owner.

Answers
B.

Emergency program changes should be subject to program migration and testing procedures before they are applied to operational systems.

B.

Emergency program changes should be subject to program migration and testing procedures before they are applied to operational systems.

Answers
C.

Bypass user ID procedures should be put in place to ensure that the changes are subject to after-the-event approval and testing.

C.

Bypass user ID procedures should be put in place to ensure that the changes are subject to after-the-event approval and testing.

Answers
Suggested answer: B

What should be an IS auditor's PRIMARY focus when reviewing a patch management procedure in an environment where availability is a top priority?

A.

Deployment automation to all servers

A.

Deployment automation to all servers

Answers
B.

Technical skills of the deployment team

B.

Technical skills of the deployment team

Answers
C.

Comprehensive testing prior to deployment

C.

Comprehensive testing prior to deployment

Answers
D.

Validity certification prior to deployment

D.

Validity certification prior to deployment

Answers
Suggested answer: C

Which of the following observations should be of GREATEST concern to an IS auditor assessing access controls for the accounts payable module of a finance system?

A.

Payment files are stored on a shared drive in a writable format prior to processing.

A.

Payment files are stored on a shared drive in a writable format prior to processing.

Answers
B.

Accounts payable staff have access to update vendor bank account details.

B.

Accounts payable staff have access to update vendor bank account details.

Answers
C.

The IS auditor was granted access to create purchase orders.

C.

The IS auditor was granted access to create purchase orders.

Answers
D.

Configured delegation limits do not align to the organization's delegation's policy.

D.

Configured delegation limits do not align to the organization's delegation's policy.

Answers
Suggested answer: B

An IS auditor determines elevated administrator accounts for servers that are not properly checked out and then back in after each use. Which of the following is the MOST appropriate sampling technique to determine the scope of the problem?

A.

Haphazard sampling

A.

Haphazard sampling

Answers
B.

Random sampling

B.

Random sampling

Answers
C.

Statistical sampling

C.

Statistical sampling

Answers
D.

Stratified sampling

D.

Stratified sampling

Answers
Suggested answer: C

To help determine whether a controls-reliant approach to auditing financial systems in a company should be used, which sequence of IS audit work is MOST appropriate?

A.

Review of the general IS controls followed by a review of the application controls

A.

Review of the general IS controls followed by a review of the application controls

Answers
B.

Detailed examination of financial transactions followed by review of the general ledger

B.

Detailed examination of financial transactions followed by review of the general ledger

Answers
C.

Review of major financial applications followed by a review of IT governance processes

C.

Review of major financial applications followed by a review of IT governance processes

Answers
D.

Review of application controls followed by a test of key business process controls

D.

Review of application controls followed by a test of key business process controls

Answers
Suggested answer: A

While reviewing the effectiveness of an incident response program, an IS auditor notices a high number of reported incidents involving malware originating from removable media found by employees. Which of the following is the MOST appropriate recommendation to management?

A.

Restrict access to removable media ports on company devices.

A.

Restrict access to removable media ports on company devices.

Answers
B.

Install an additional antivirus program to increase protection.

B.

Install an additional antivirus program to increase protection.

Answers
C.

Ensure the antivirus program contains up-to-date signature files for all company devices.

C.

Ensure the antivirus program contains up-to-date signature files for all company devices.

Answers
D.

Implement an organization-wide removable media policy.

D.

Implement an organization-wide removable media policy.

Answers
Suggested answer: D

An IS auditor is reviewing a network diagram. Which of the following would be the BEST location for placement of a firewall?

A.

Between each host and the local network switch/hub

A.

Between each host and the local network switch/hub

Answers
B.

Between virtual local area networks (VLANs)

B.

Between virtual local area networks (VLANs)

Answers
C.

Inside the demilitarized zone (DMZ)

C.

Inside the demilitarized zone (DMZ)

Answers
D.

At borders of network segments with different security levels

D.

At borders of network segments with different security levels

Answers
Suggested answer: D
Total 1.198 questions
Go to page: of 120