ExamGecko
Home Home / Isaca / CISA

Isaca CISA Practice Test - Questions Answers, Page 12

Question list
Search
Search

List of questions

Search

Related questions

Which of the following is the BEST way to address segregation of duties issues in an organization with budget constraints?

A.
Rotate job duties periodically.
A.
Rotate job duties periodically.
Answers
B.
Perform an independent audit.
B.
Perform an independent audit.
Answers
C.
Hire temporary staff.
C.
Hire temporary staff.
Answers
D.
Implement compensating controls.
D.
Implement compensating controls.
Answers
Suggested answer: D

Explanation:

The best way to address segregation of duties issues in an organization with budget constraints is to implement compensating controls, which are alternative controls that reduce or eliminate the risk of errors or fraud due to inadequate segregation of duties. Compensating controls may include independent reviews, reconciliations, approvals, or supervisions. Rotating job duties periodically may reduce the risk of collusion or abuse of privileges, but it may also affect operational efficiency and continuity. Performing an independent audit may detect segregation of duties issues, but it does not prevent them.Hiring temporary staff may increase operational costs and introduce new risks.Reference:CISA Review Manual (Digital Version), Chapter 2, Section 2.4

An organization's security policy mandates that all new employees must receive appropriate security awareness training. Which of the following metrics would BEST assure compliance with this policy?

A.
Percentage of new hires that have completed the training.
A.
Percentage of new hires that have completed the training.
Answers
B.
Number of new hires who have violated enterprise security policies.
B.
Number of new hires who have violated enterprise security policies.
Answers
C.
Number of reported incidents by new hires.
C.
Number of reported incidents by new hires.
Answers
D.
Percentage of new hires who report incidents
D.
Percentage of new hires who report incidents
Answers
Suggested answer: A

Explanation:

The best metric to assure compliance with the policy of providing security awareness training to all new employees is the percentage of new hires that have completed the training, as this directly measures the extent to which the policy is implemented and enforced.The number of new hires who have violated enterprise security policies, the number of reported incidents by new hires, and the percentage of new hires who report incidents are not directly related to the policy, as they may depend on other factors such as the nature and frequency of threats, the effectiveness of security controls, and the reporting culture of the organization.Reference:CISA Review Manual (Digital Version), Chapter 5, Section 5.7

An IS auditor is following up on prior period items and finds management did not address an audit finding. Which of the following should be the IS auditor's NEXT course of action?

A.
Note the exception in a new report as the item was not addressed by management.
A.
Note the exception in a new report as the item was not addressed by management.
Answers
B.
Recommend alternative solutions to address the repeat finding.
B.
Recommend alternative solutions to address the repeat finding.
Answers
C.
Conduct a risk assessment of the repeat finding.
C.
Conduct a risk assessment of the repeat finding.
Answers
D.
Interview management to determine why the finding was not addressed.
D.
Interview management to determine why the finding was not addressed.
Answers
Suggested answer: D

Explanation:

If an IS auditor finds that management did not address a prior period audit finding, the next course of action should be to interview management to determine why the finding was not addressed, as this would help to understand the root cause, the impact, and the risk level of the issue.Noting the exception in a new report, recommending alternative solutions, or conducting a risk assessment are possible subsequent steps, but they should not precede interviewing management.Reference:CISA Review Manual (Digital Version), Chapter 1, Section 1.6

Which of the following tests would provide the BEST assurance that a health care organization is handling patient data appropriately?

A.
Compliance with action plans resulting from recent audits
A.
Compliance with action plans resulting from recent audits
Answers
B.
Compliance with local laws and regulations
B.
Compliance with local laws and regulations
Answers
C.
Compliance with industry standards and best practice
C.
Compliance with industry standards and best practice
Answers
D.
Compliance with the organization's policies and procedures
D.
Compliance with the organization's policies and procedures
Answers
Suggested answer: B

Explanation:

The best test to provide assurance that a health care organization is handling patient data appropriately is compliance with local laws and regulations, as these are the primary sources of authority and obligation for data protection and privacy.Compliance with action plans, industry standards, or organizational policies and procedures are also important, but they may not cover all the legal requirements or reflect the current best practices for handling patient data.Reference:CISA Review Manual (Digital Version), Chapter 2, Section 2.3

An organization allows employees to retain confidential data on personal mobile devices. Which of the following is the BEST recommendation to mitigate the risk of data leakage from lost or stolen devices?

A.
Require employees to attend security awareness training.
A.
Require employees to attend security awareness training.
Answers
B.
Password protect critical data files.
B.
Password protect critical data files.
Answers
C.
Configure to auto-wipe after multiple failed access attempts.
C.
Configure to auto-wipe after multiple failed access attempts.
Answers
D.
Enable device auto-lock function.
D.
Enable device auto-lock function.
Answers
Suggested answer: C

Explanation:

The best recommendation to mitigate the risk of data leakage from lost or stolen devices that contain confidential data is to configure them to auto-wipe after multiple failed access attempts, as this would prevent unauthorized access and erase sensitive information from the device.Requiring employees to attend security awareness training, password protecting critical data files, or enabling device auto-lock function are also good practices, but they may not be sufficient or effective in preventing data leakage from lost or stolen devices.Reference:CISA Review Manual (Digital Version), Chapter 5, Section 5.3

Which of the following demonstrates the use of data analytics for a loan origination process?

A.
Evaluating whether loan records are included in the batch file and are validated by the servicing system
A.
Evaluating whether loan records are included in the batch file and are validated by the servicing system
Answers
B.
Comparing a population of loans input in the origination system to loans booked on the servicing system
B.
Comparing a population of loans input in the origination system to loans booked on the servicing system
Answers
C.
Validating whether reconciliations between the two systems are performed and discrepancies are investigated
C.
Validating whether reconciliations between the two systems are performed and discrepancies are investigated
Answers
D.
Reviewing error handling controls to notify appropriate personnel in the event of a transmission failure
D.
Reviewing error handling controls to notify appropriate personnel in the event of a transmission failure
Answers
Suggested answer: B

Explanation:

Data analytics can be used to compare data from different sources and identify any discrepancies or anomalies. In this case, comparing a population of loans input in the origination system to loans booked on the servicing system can help detect any errors or frauds in the loan origination process. The other options are not examples of data analytics, but rather controls for data integrity, reconciliation, and error handling.Reference:CISA Review Manual (Digital Version), Chapter 3, Section 3.3.2

Which of the following BEST indicates the effectiveness of an organization's risk management program?

A.
Inherent risk is eliminated.
A.
Inherent risk is eliminated.
Answers
B.
Residual risk is minimized.
B.
Residual risk is minimized.
Answers
C.
Control risk is minimized.
C.
Control risk is minimized.
Answers
D.
Overall risk is quantified.
D.
Overall risk is quantified.
Answers
Suggested answer: B

Explanation:

The effectiveness of a risk management program can be measured by how well it reduces the residual risk, which is the risk that remains after applying controls, to an acceptable level. Inherent risk is the risk that exists before applying any controls, and it cannot be eliminated completely. Control risk is the risk that the controls fail to prevent or detect a risk event, and it is a component of residual risk. Overall risk is not a meaningful metric for assessing the effectiveness of a risk management program, as it does not account for the impact and likelihood of different risk events.Reference:CISA Review Manual (Digital Version), Chapter 1, Section 1.2.2

An IS auditor has been asked to assess the security of a recently migrated database system that contains personal and financial data for a bank's customers. Which of the following controls is MOST important for the auditor to confirm is in place?

A.
The default configurations have been changed.
A.
The default configurations have been changed.
Answers
B.
All tables in the database are normalized.
B.
All tables in the database are normalized.
Answers
C.
The service port used by the database server has been changed.
C.
The service port used by the database server has been changed.
Answers
D.
The default administration account is used after changing the account password.
D.
The default administration account is used after changing the account password.
Answers
Suggested answer: A

Explanation:

Changing the default configurations of a database system is a critical control for securing it from unauthorized access or exploitation. Default configurations often include weak passwords, unnecessary services, open ports, or known vulnerabilities that can be easily exploited by attackers. The other options are not as important as changing the default configurations, as they do not address the root cause of the security risks. Normalizing tables in the database is a design technique for improving data quality and performance, but it does not affect security. Changing the service port used by the database server is a form of security by obscurity, which can be easily bypassed by port scanning tools. Using the default administration account after changing the account password is still risky, as the account name may be known or guessed by attackers.Reference:CISA Review Manual (Digital Version), Chapter 5, Section 5.2.4

Which of the following is the BEST justification for deferring remediation testing until the next audit?

A.
The auditor who conducted the audit and agreed with the timeline has left the organization.
A.
The auditor who conducted the audit and agreed with the timeline has left the organization.
Answers
B.
Management's planned actions are sufficient given the relative importance of the observations.
B.
Management's planned actions are sufficient given the relative importance of the observations.
Answers
C.
Auditee management has accepted all observations reported by the auditor.
C.
Auditee management has accepted all observations reported by the auditor.
Answers
D.
The audit environment has changed significantly.
D.
The audit environment has changed significantly.
Answers
Suggested answer: D

Explanation:

Deferring remediation testing until the next audit is justified only when there are significant changes in the audit environment that affect the relevance or validity of the audit observations and recommendations. For example, if there are changes in the business processes, systems, regulations, or risks that require a new audit scope or approach. The other options are not valid justifications for deferring remediation testing, as they do not address the timeliness or quality of the audit follow-up process. The auditor who conducted the audit and agreed with the timeline has left the organization does not affect the responsibility of the audit function to ensure that remediation testing is performed as planned. Management's planned actions are sufficient given the relative importance of the observations does not guarantee that management will actually implement those actions or that they will be effective in addressing the audit issues. Auditee management has accepted all observations reported by the auditor does not eliminate the need for verification of remediation actions by an independent party.Reference:CISA Review Manual (Digital Version), Chapter 2, Section 2.4

What is BEST for an IS auditor to review when assessing the effectiveness of changes recently made to processes and tools related to an organization's business continuity plan (BCP)?

A.
Full test results
A.
Full test results
Answers
B.
Completed test plans
B.
Completed test plans
Answers
C.
Updated inventory of systems
C.
Updated inventory of systems
Answers
D.
Change management processes
D.
Change management processes
Answers
Suggested answer: A

Explanation:

The best way to assess the effectiveness of changes made to processes and tools related to an organization's BCP is to review the full test results of the BCP. Full test results can provide evidence of whether the changes have improved the BCP's objectives, such as recovery time objectives (RTOs), recovery point objectives (RPOs), and business impact analysis (BIA). The other options are not as effective as reviewing the full test results, as they do not demonstrate the actual performance of the BCP under simulated disaster scenarios. Completed test plans are only documents that outline the scope, objectives, and procedures of the BCP testing, but they do not show the outcomes or issues encountered during the testing. Updated inventory of systems is a component of the BCP that identifies the critical systems and resources required for business continuity, but it does not measure the effectiveness of the BCP changes. Change management processes are controls that ensure that changes to the BCP are authorized, documented, and communicated, but they do not evaluate the impact or benefit of the changes.Reference:CISA Review Manual (Digital Version), Chapter 4, Section 4.2.3

Total 1.198 questions
Go to page: of 120