ExamGecko
Home Home / Isaca / CISA

Isaca CISA Practice Test - Questions Answers, Page 120

Question list
Search
Search

Related questions

Which of the following roles is PRIMARILY responsible for mitigating the risk of benefits not being realized in an IT project?

A.

Project sponsor

A.

Project sponsor

Answers
B.

Project manager

B.

Project manager

Answers
C.

Quality assurance (QA) manager

C.

Quality assurance (QA) manager

Answers
D.

Chief risk officer (CRO)

D.

Chief risk officer (CRO)

Answers
Suggested answer: A

Which of the following will BEST ensure that archived electronic information of permanent importance remains accessible over time?

A.

Performing preventive maintenance on old hardware

A.

Performing preventive maintenance on old hardware

Answers
B.

Acquiring applications that emulate old software

B.

Acquiring applications that emulate old software

Answers
C.

Regularly migrating data to current technology

C.

Regularly migrating data to current technology

Answers
D.

Periodically backing up archived data

D.

Periodically backing up archived data

Answers
Suggested answer: C

An organization has decided to build a data warehouse using source data from several disparate systems to support strategic decision-making.

Which of the following is the BEST way to ensure the accuracy and completeness of the data used to support business decisions?

A.

The source data is pre-selected so that it already supports senior management's desired business decision outcome.

A.

The source data is pre-selected so that it already supports senior management's desired business decision outcome.

Answers
B.

The source data is from the current year of operations so that irrelevant data from prior years is not included.

B.

The source data is from the current year of operations so that irrelevant data from prior years is not included.

Answers
C.

The source data is modified in the data warehouse to remove confidential or sensitive information.

C.

The source data is modified in the data warehouse to remove confidential or sensitive information.

Answers
D.

The source data is standardized and cleansed before loading into the data warehouse.

D.

The source data is standardized and cleansed before loading into the data warehouse.

Answers
Suggested answer: D

Which of the following poses the GREATEST risk to an organization related to system interfaces?

A.

There is no process documentation for some system interfaces.

A.

There is no process documentation for some system interfaces.

Answers
B.

Notifications of data transfers through the interfaces are not retained.

B.

Notifications of data transfers through the interfaces are not retained.

Answers
C.

Parts of the data transfer process are performed manually.

C.

Parts of the data transfer process are performed manually.

Answers
D.

There is no reliable inventory of system interfaces.

D.

There is no reliable inventory of system interfaces.

Answers
Suggested answer: D

Which type of threat can utilize a large group of automated social media accounts to steal data, send spam, or launch distributed denial of service (DDoS) attacks?

A.

Botnet attack

A.

Botnet attack

Answers
B.

Data mining

B.

Data mining

Answers
C.

Phishing attempt

C.

Phishing attempt

Answers
D.

Malware sharing

D.

Malware sharing

Answers
Suggested answer: A

Which of the following would be MOST helpful to an IS auditor performing a risk assessment of an application programming interface (API) that feeds credit scores from a well-known commercial credit agency into an organizational system?

A.

A data dictionary of the transferred data

A.

A data dictionary of the transferred data

Answers
B.

A technical design document for the interface configuration

B.

A technical design document for the interface configuration

Answers
C.

The most recent audit report from the credit agency

C.

The most recent audit report from the credit agency

Answers
D.

The approved business case for the API

D.

The approved business case for the API

Answers
Suggested answer: B

IT management has accepted the risk associated with an IS auditor's finding due to the cost and complexity of the corrective actions. Which of the following should be the auditor's NEXT course of action?

A.

Perform a cost-benefit analysis.

A.

Perform a cost-benefit analysis.

Answers
B.

Document and inform the audit committee.

B.

Document and inform the audit committee.

Answers
C.

Report the finding to external regulators.

C.

Report the finding to external regulators.

Answers
D.

Notify senior management.

D.

Notify senior management.

Answers
Suggested answer: B

The MOST important measure of the effectiveness of an organization's security program is the:

A.

comparison with critical incidents experienced by competitors.

A.

comparison with critical incidents experienced by competitors.

Answers
B.

number of vulnerability alerts escalated to senior management.

B.

number of vulnerability alerts escalated to senior management.

Answers
C.

number of new vulnerabilities reported.

C.

number of new vulnerabilities reported.

Answers
D.

adverse impact of incidents on critical business activities.

D.

adverse impact of incidents on critical business activities.

Answers
Suggested answer: D
Total 1.198 questions
Go to page: of 120