ExamGecko
Home Home / Isaca / CISA

Isaca CISA Practice Test - Questions Answers, Page 14

Question list
Search
Search

List of questions

Search

Related questions

Which of the following is MOST important for an IS auditor to review when evaluating the accuracy of a spreadsheet that contains several macros?

A.
Encryption of the spreadsheet
A.
Encryption of the spreadsheet
Answers
B.
Version history
B.
Version history
Answers
C.
Formulas within macros
C.
Formulas within macros
Answers
D.
Reconciliation of key calculations
D.
Reconciliation of key calculations
Answers
Suggested answer: C

Explanation:

The most important thing for an IS auditor to review when evaluating the accuracy of a spreadsheet that contains several macros is the formulas within macros. Macros are sequences of commands or instructions that can automate tasks or calculations in a spreadsheet. Formulas are expressions that perform calculations on values or data in a spreadsheet. The accuracy of a spreadsheet depends largely on whether the formulas within macros are correct, consistent, and complete. The IS auditor should review the formulas within macros to verify that they produce the expected results and do not contain any errors or inconsistencies. The other options are not as important as formulas within macros, as they do not directly affect the accuracy of a spreadsheet. Encryption of the spreadsheet is a security control that can protect the confidentiality and integrity of the spreadsheet, but it does not ensure its accuracy. Version history is a document control feature that can track and manage changes to the spreadsheet, but it does not verify its accuracy. Reconciliation of key calculations is a validation technique that can compare and confirm the results of calculations with other sources, but it does not evaluate the accuracy of formulas within macros.Reference:CISA Review Manual (Digital Version), Chapter 3, Section 3.2

Which of the following is the BEST recommendation to prevent fraudulent electronic funds transfers by accounts payable employees?

A.
Periodic vendor reviews
A.
Periodic vendor reviews
Answers
B.
Dual control
B.
Dual control
Answers
C.
Independent reconciliation
C.
Independent reconciliation
Answers
D.
Re-keying of monetary amounts
D.
Re-keying of monetary amounts
Answers
E.
Engage an external security incident response expert for incident handling.
E.
Engage an external security incident response expert for incident handling.
Answers
Suggested answer: B

Explanation:

The best recommendation to prevent fraudulent electronic funds transfers by accounts payable employees is dual control. Dual control is a segregation of duties control that requires two or more individuals to perform or authorize a transaction or activity. Dual control can prevent fraudulent electronic funds transfers by requiring independent verification and approval of payment requests, amounts, and recipients by different accounts payable employees. The other options are not as effective as dual control in preventing fraudulent electronic funds transfers, as they do not involve independent checks or approvals. Periodic vendor reviews are detective controls that can help identify any irregularities or anomalies in vendor payments, but they do not prevent fraudulent electronic funds transfers from occurring. Independent reconciliation is a detective control that can help compare and confirm payment records with bank statements, but it does not prevent fraudulent electronic funds transfers from occurring. Re-keying of monetary amounts is an input control that can help detect any errors or discrepancies in payment amounts, but it does not prevent fraudulent electronic funds transfers from occurring.Reference:CISA Review Manual (Digital Version), Chapter 3, Section 3.2

A new regulation requires organizations to report significant security incidents to the regulator within 24 hours of identification. Which of the following is the IS auditor's BEST recommendation to facilitate compliance with the regulation?

A.
Include the requirement in the incident management response plan.
A.
Include the requirement in the incident management response plan.
Answers
B.
Establish key performance indicators (KPIs) for timely identification of security incidents.
B.
Establish key performance indicators (KPIs) for timely identification of security incidents.
Answers
C.
Enhance the alert functionality of the intrusion detection system (IDS).
C.
Enhance the alert functionality of the intrusion detection system (IDS).
Answers
D.
Engage an external security incident response expert for incident handling.
D.
Engage an external security incident response expert for incident handling.
Answers
Suggested answer: A

Explanation:

The best recommendation to facilitate compliance with the regulation that requires organizations to report significant security incidents to the regulator within 24 hours of identification is to include the requirement in the incident management response plan. An incident management response plan is a document that defines the roles, responsibilities, procedures, and tools for managing security incidents effectively and efficiently. Including the requirement in the incident management response plan can help ensure that security incidents are identified, classified, reported, and escalated in accordance with the regulation. The other options are not as effective as including the requirement in the incident management response plan, as they do not address all aspects of incident management or compliance. Establishing key performance indicators (KPIs) for timely identification of security incidents is a monitoring technique that can help measure and improve the performance of incident management processes, but it does not ensure compliance with the regulation. Enhancing the alert functionality of the intrusion detection system (IDS) is a technical control that can help detect and notify security incidents faster, but it does not ensure compliance with the regulation. Engaging an external security incident response expert for incident handling is a contingency measure that can help augment the organization's internal capabilities and resources for managing security incidents, but it does not ensure compliance with the regulation.Reference:CISA Review Manual (Digital Version), Chapter 4, Section 4.2.2

An IS auditor has found that an organization is unable to add new servers on demand in a cost-efficient manner. Which of the following is the auditor's BEST recommendation?

A.
Increase the capacity of existing systems.
A.
Increase the capacity of existing systems.
Answers
B.
Upgrade hardware to newer technology.
B.
Upgrade hardware to newer technology.
Answers
C.
Hire temporary contract workers for the IT function.
C.
Hire temporary contract workers for the IT function.
Answers
D.
Build a virtual environment.
D.
Build a virtual environment.
Answers
Suggested answer: D

Explanation:

The best recommendation for an organization that is unable to add new servers on demand in a cost-efficient manner is to build a virtual environment. A virtual environment is a technology that allows multiple virtual machines to run on a single physical server, sharing its resources and capabilities. A virtual environment can help the organization add new servers on demand in a cost-efficient manner by reducing the need for hardware acquisition, maintenance, and power consumption. The other options are not as effective as building a virtual environment, as they do not address the root cause of the problem or provide the same benefits. Increasing the capacity of existing systems is a short-term solution that can help improve the performance and availability of the current servers, but it does not enable the organization to add new servers on demand in a cost-efficient manner. Upgrading hardware to newer technology is a costly solution that can help enhance the functionality and reliability of the servers, but it does not enable the organization to add new servers on demand in a cost-efficient manner. Hiring temporary contract workers for the IT function is an irrelevant solution that can help supplement the IT staff's skills and knowledge, but it does not enable the organization to add new servers on demand in a cost-efficient manner.Reference:CISA Review Manual (Digital Version), Chapter 3, Section 3.3.1

An IS auditor who was instrumental in designing an application is called upon to review the application. The auditor should:

A.
refuse the assignment to avoid conflict of interest.
A.
refuse the assignment to avoid conflict of interest.
Answers
B.
use the knowledge of the application to carry out the audit.
B.
use the knowledge of the application to carry out the audit.
Answers
C.
inform audit management of the earlier involvement.
C.
inform audit management of the earlier involvement.
Answers
D.
modify the scope of the audit.
D.
modify the scope of the audit.
Answers
Suggested answer: C

Explanation:

The IS auditor should inform audit management of the earlier involvement in designing the application. This is to ensure that there is no conflict of interest or bias that may affect the objectivity or independence of the audit. Audit management can then decide whether to assign a different auditor or to proceed with the same auditor with appropriate safeguards. The other options are not appropriate for the IS auditor to do in this situation. Refusing the assignment to avoid conflict of interest is an extreme measure that may not be necessary or feasible, especially if there are no other qualified auditors available. Using the knowledge of the application to carry out the audit is risky, as it may lead to overlooking or ignoring potential issues or errors in the application. Modifying the scope of the audit is not advisable, as it may compromise the quality or completeness of the audit.Reference:CISA Review Manual (Digital Version), Chapter 2, Section 2.1

Which of the following is the BEST method to prevent wire transfer fraud by bank employees?

A.
Independent reconciliation
A.
Independent reconciliation
Answers
B.
Re-keying of wire dollar amounts
B.
Re-keying of wire dollar amounts
Answers
C.
Two-factor authentication control
C.
Two-factor authentication control
Answers
D.
System-enforced dual control
D.
System-enforced dual control
Answers
Suggested answer: D

Explanation:

The best method to prevent wire transfer fraud by bank employees is system-enforced dual control. System-enforced dual control is a segregation of duties control that requires two or more individuals to perform or authorize a transaction or activity using a system that enforces this requirement. System-enforced dual control can prevent wire transfer fraud by requiring independent verification and approval of payment requests, amounts, and recipients by different bank employees using a system that does not allow any single employee to complete the transaction alone. The other options are not as effective as system-enforced dual control in preventing wire transfer fraud, as they do not involve independent checks or approvals using a system. Independent reconciliation is a detective control that can help compare and confirm payment records with bank statements, but it does not prevent wire transfer fraud from occurring. Re-keying of wire dollar amounts is an input control that can help detect any errors or discrepancies in payment amounts, but it does not prevent wire transfer fraud from occurring. Two-factor authentication control is an access control that can help verify the identity and authorization of bank employees, but it does not prevent wire transfer fraud from occurring.Reference:CISA Review Manual (Digital Version), Chapter 3, Section 3.2

In a small IT web development company where developers must have write access to production, the BEST recommendation of an IS auditor would be to:

A.
hire another person to perform migration to production.
A.
hire another person to perform migration to production.
Answers
B.
implement continuous monitoring controls.
B.
implement continuous monitoring controls.
Answers
C.
remove production access from the developers.
C.
remove production access from the developers.
Answers
D.
perform a user access review for the development team
D.
perform a user access review for the development team
Answers
Suggested answer: C

Explanation:

The best recommendation for a small IT web development company where developers must have write access to production is to remove production access from the developers. Production access is the ability to modify or update the live systems or applications that are used by customers or end users. Production access should be restricted to authorized and qualified personnel only, as any changes or errors in production can affect the functionality, performance, or security of the systems or applications. Developers should not have write access to production, as they may introduce bugs, vulnerabilities, or inconsistencies in the code that can compromise the quality or reliability of the systems or applications. The other options are not as effective as removing production access from the developers, as they do not address the root cause of the problem or provide the same benefits. Hiring another person to perform migration to production is a costly solution that can help segregate the roles and responsibilities of developers and migrators, but it does not remove production access from the developers. Implementing continuous monitoring controls is a good practice that can help detect and correct any issues or anomalies in production, but it does not remove production access from the developers. Performing a user access review for the development team is a detective control that can help verify and validate the access rights and privileges of developers, but it does not remove production access from the developers.Reference:CISA Review Manual (Digital Version), Chapter 3, Section 3.2

Which of the following is the PRIMARY reason for an IS auditor to conduct post-implementation reviews?

A.
To determine whether project objectives in the business case have been achieved
A.
To determine whether project objectives in the business case have been achieved
Answers
B.
To ensure key stakeholder sign-off has been obtained
B.
To ensure key stakeholder sign-off has been obtained
Answers
C.
To align project objectives with business needs
C.
To align project objectives with business needs
Answers
D.
To document lessons learned to improve future project delivery
D.
To document lessons learned to improve future project delivery
Answers
Suggested answer: A

Explanation:

The primary reason for an IS auditor to conduct post-implementation reviews is to determine whether project objectives in the business case have been achieved. A post-implementation review is an audit activity that evaluates whether a project has delivered its expected outcomes or benefits in accordance with its objectives, scope, budget, and schedule. A business case is a document that defines and justifies the need, value, and feasibility of a project. A post-implementation review can help assess whether project objectives in the business case have been achieved by comparing actual results with planned expectations and identifying any gaps or deviations. The other options are not primary reasons for conducting post-implementation reviews, as they do not measure whether project objectives in the business case have been achieved. Ensuring key stakeholder sign-off has been obtained is a project closure activity that confirms that all project deliverables have been completed and accepted by key stakeholders, but it does not evaluate whether project objectives in the business case have been achieved. Aligning project objectives with business needs is a project initiation activity that ensures that the project is aligned with the organization's strategy, goals, and priorities, but it does not evaluate whether project objectives in the business case have been achieved. Documenting lessons learned to improve future project delivery is a project learning activity that captures and shares the knowledge, experience, and feedback gained from the project, but it does not evaluate whether project objectives in the business case have been achieved.Reference:CISA Review Manual (Digital Version), Chapter 3, Section 3.3

In a 24/7 processing environment, a database contains several privileged application accounts with passwords set to never expire. Which of the following recommendations would BEST address the risk with minimal disruption to the business?

A.
Modify applications to no longer require direct access to the database.
A.
Modify applications to no longer require direct access to the database.
Answers
B.
Introduce database access monitoring into the environment
B.
Introduce database access monitoring into the environment
Answers
C.
Modify the access management policy to make allowances for application accounts.
C.
Modify the access management policy to make allowances for application accounts.
Answers
D.
Schedule downtime to implement password changes.
D.
Schedule downtime to implement password changes.
Answers
Suggested answer: B

Explanation:

The best recommendation to address the risk of privileged application accounts with passwords set to never expire in a 24/7 processing environment is to introduce database access monitoring into the environment. Database access monitoring is a security control that tracks and records all activities and transactions performed on a database, especially by privileged users or accounts. Database access monitoring can help address the risk of privileged application accounts with passwords set to never expire by detecting and alerting any unauthorized or abnormal access or actions on the database. The other options are not as effective as database access monitoring in addressing the risk, as they may cause disruption to the business or violate the access management policy. Modifying applications to no longer require direct access to the database is a complex and costly solution that may affect the functionality or performance of the applications, and it may not be feasible or practical in a 24/7 processing environment. Modifying the access management policy to make allowances for application accounts is a risky solution that may create exceptions or loopholes in the policy, and it may not comply with the best practices or standards for password management. Scheduling downtime to implement password changes is a disruptive solution that may affect the availability or continuity of the systems or applications, and it may not be acceptable or possible in a 24/7 processing environment.Reference:CISA Review Manual (Digital Version), Chapter 5, Section 5.2.4

Management is concerned about sensitive information being intentionally or unintentionally emailed as attachments outside the organization by employees. What is the MOST important task before implementing any associated email controls?

A.
Require all employees to sign nondisclosure agreements (NDAs).
A.
Require all employees to sign nondisclosure agreements (NDAs).
Answers
B.
Develop an acceptable use policy for end-user computing (EUC).
B.
Develop an acceptable use policy for end-user computing (EUC).
Answers
C.
Develop an information classification scheme.
C.
Develop an information classification scheme.
Answers
D.
Provide notification to employees about possible email monitoring.
D.
Provide notification to employees about possible email monitoring.
Answers
Suggested answer: C

Explanation:

The most important task before implementing any associated email controls to prevent sensitive information from being emailed outside the organization by employees is to develop an information classification scheme. An information classification scheme is a framework that defines the categories and levels of sensitivity for different types of information, such as public, internal, confidential, or secret. An information classification scheme can help implement email controls by providing criteria and guidelines for identifying, labeling, handling, and protecting sensitive information in email attachments. The other options are not as important as developing an information classification scheme, as they do not address the root cause of the problem or provide the same benefits. Requiring all employees to sign nondisclosure agreements (NDAs) is a legal control that can help deter or penalize employees from disclosing sensitive information, but it does not prevent them from emailing it outside the organization. Developing an acceptable use policy for end-user computing (EUC) is a governance control that can help define and communicate the rules and expectations for using IT resources, such as email, but it does not prevent employees from emailing sensitive information outside the organization. Providing notification to employees about possible email monitoring is a transparency control that can help inform and warn employees about the potential consequences of emailing sensitive information outside the organization, but it does not prevent them from doing so.Reference:CISA Review Manual (Digital Version), Chapter 5, Section 5.3.2

Total 1.198 questions
Go to page: of 120