ExamGecko
Home Home / Isaca / CISA

Isaca CISA Practice Test - Questions Answers, Page 16

Question list
Search
Search

Related questions

Which of the following is a social engineering attack method?

A.
An unauthorized person attempts to gam access to secure premises by following an authonzed person through a secure door.
A.
An unauthorized person attempts to gam access to secure premises by following an authonzed person through a secure door.
Answers
B.
An employee is induced to reveal confidential IP addresses and passwords by answering questions over the phone.
B.
An employee is induced to reveal confidential IP addresses and passwords by answering questions over the phone.
Answers
C.
A hacker walks around an office building using scanning tools to search for a wireless network to gain access.
C.
A hacker walks around an office building using scanning tools to search for a wireless network to gain access.
Answers
D.
An intruder eavesdrops and collects sensitive information flowing through the network and sells it to third parties.
D.
An intruder eavesdrops and collects sensitive information flowing through the network and sells it to third parties.
Answers
Suggested answer: B

Explanation:

An employee is induced to reveal confidential IP addresses and passwords by answering questions over the phone. This is a social engineering attack method that exploits the trust or curiosity of the employee to obtain sensitive information that can be used to access or compromise the network.According to the web search results, social engineering is a technique that uses psychological manipulation to trick users into making security mistakes or giving away sensitive information1.Phishing, whaling, baiting, and pretexting are some of the common forms of social engineering attacks2.Social engineering attacks are often more effective and profitable than purely technical attacks, as they rely on human error rather than system vulnerabilities

When an intrusion into an organization network is deleted, which of the following should be done FIRST?

A.
Block all compromised network nodes.
A.
Block all compromised network nodes.
Answers
B.
Contact law enforcement.
B.
Contact law enforcement.
Answers
C.
Notify senior management.
C.
Notify senior management.
Answers
D.
Identity nodes that have been compromised.
D.
Identity nodes that have been compromised.
Answers
Suggested answer: D

Explanation:

The first thing that should be done when an intrusion into an organization network is detected is to identify nodes that have been compromised. Identifying nodes that have been compromised is a critical step in responding to an intrusion, as it helps determine the scope, impact, and source of the attack, and enables the implementation of appropriate containment and recovery measures. The other options are not the first things that should be done when an intrusion into an organization network is detected, as they may be premature or ineffective without identifying nodes that have been compromised. Blocking all compromised network nodes is a containment measure that can help isolate and prevent the spread of the attack, but it may not be possible or feasible without identifying nodes that have been compromised. Contacting law enforcement is a reporting measure that can help seek external assistance and comply with legal obligations, but it may not be necessary or appropriate without identifying nodes that have been compromised. Notifying senior management is a communication measure that can help inform and escalate the incident, but it may not be urgent or accurate without identifying nodes that have been compromised.Reference:CISA Review Manual (Digital Version), Chapter 4, Section 4.2.2

Which of the following should be GREATEST concern to an IS auditor reviewing data conversion and migration during the implementation of a new application system?

A.
Data conversion was performed using manual processes.
A.
Data conversion was performed using manual processes.
Answers
B.
Backups of the old system and data are not available online.
B.
Backups of the old system and data are not available online.
Answers
C.
Unauthorized data modifications occurred during conversion.
C.
Unauthorized data modifications occurred during conversion.
Answers
D.
The change management process was not formally documented
D.
The change management process was not formally documented
Answers
Suggested answer: C

Explanation:

The greatest concern for an IS auditor reviewing data conversion and migration during the implementation of a new application system is unauthorized data modifications occurred during conversion. Unauthorized data modifications are changes or alterations to data that are not authorized, intended, or expected, such as due to errors, fraud, or sabotage. Unauthorized data modifications occurred during conversion can compromise the accuracy, completeness, and integrity of the data being converted and migrated to the new application system, and may result in data loss, corruption, or inconsistency. The other options are not as concerning as unauthorized data modifications occurred during conversion in reviewing data conversion and migration during the implementation of a new application system, as they do not affect the accuracy, completeness, or integrity of the data being converted and migrated. Data conversion was performed using manual processes is a possible factor that may increase the risk or complexity of data conversion and migration, but it does not necessarily imply that unauthorized data modifications occurred during conversion. Backups of the old system and data are not available online is a possible factor that may affect the availability or accessibility of the old system and data for backup or recovery purposes, but it does not imply that unauthorized data modifications occurred during conversion. The change management process was not formally documented is a possible factor that may affect the quality or consistency of the change management process for implementing the new application system, but it does not imply that unauthorized data modifications occurred during conversion.Reference:CISA Review Manual (Digital Version), Chapter 3, Section 3.3

Which of the following documents would be MOST useful in detecting a weakness in segregation of duties?

A.
System flowchart
A.
System flowchart
Answers
B.
Data flow diagram
B.
Data flow diagram
Answers
C.
Process flowchart
C.
Process flowchart
Answers
D.
Entity-relationship diagram
D.
Entity-relationship diagram
Answers
Suggested answer: C

Explanation:

The best document for an IS auditor to use in detecting a weakness in segregation of duties is a process flowchart. A process flowchart is a diagram that illustrates the sequence of steps, activities, tasks, or decisions involved in a business process. A process flowchart can help detect a weakness in segregation of duties by showing who performs what actions or roles in a process, and whether there is any overlap or conflict of interest among them. The other options are not as useful as a process flowchart in detecting a weakness in segregation of duties, as they do not show who performs what actions or roles in a process. A system flowchart is a diagram that illustrates the components, functions, interactions, or logic of an information system. A data flow diagram is a diagram that illustrates how data flows from sources to destinations through processes, stores, or external entities. An entity-relationship diagram is a diagram that illustrates how entities (such as tables) are related to each other through attributes (such as keys) in a database.Reference:CISA Review Manual (Digital Version), Chapter 3, Section 3.2

Which of the following would be to MOST concern when determine if information assets are adequately safequately safeguarded during transport and disposal?

A.
Lack of appropriate labelling
A.
Lack of appropriate labelling
Answers
B.
Lack of recent awareness training.
B.
Lack of recent awareness training.
Answers
C.
Lack of password protection
C.
Lack of password protection
Answers
D.
Lack of appropriate data classification
D.
Lack of appropriate data classification
Answers
Suggested answer: D

Explanation:

The most concerning issue when determining if information assets are adequately safeguarded during transport and disposal is lack of appropriate data classification. Data classification is a process that assigns categories or levels of sensitivity to different types of information assets based on their value, criticality, or risk to the organization. Data classification can help safeguard information assets during transport and disposal by providing criteria and guidelines for identifying, labeling, handling, and protecting information assets according to their sensitivity. Lack of appropriate data classification can compromise the security and confidentiality of information assets during transport and disposal by exposing them to unauthorized access, disclosure, theft, damage, or destruction. The other options are not as concerning as lack of appropriate data classification in safeguarding information assets during transport and disposal, as they do not affect the identification, labeling, handling, or protection of information assets according to their sensitivity. Lack of appropriate labeling is a possible factor that may increase the risk of misplacing, losing, or mishandling information assets during transport and disposal, but it does not affect the classification of information assets according to their sensitivity. Lack of recent awareness training is a possible factor that may affect the knowledge or behavior of staff involved in transporting or disposing of information assets, but it does not affect the classification of information assets according to their sensitivity. Lack of password protection is a possible factor that may affect the security or confidentiality of information assets stored on devices during transport and disposal, but it does not affect the classification of information assets according to their sensitivity.Reference:CISA Review Manual (Digital Version), Chapter 5, Section 5.3.2

During the design phase of a software development project, the PRIMARY responsibility of an IS auditor is to evaluate the:

A.
Future compatibility of the application.
A.
Future compatibility of the application.
Answers
B.
Proposed functionality of the application.
B.
Proposed functionality of the application.
Answers
C.
Controls incorporated into the system specifications.
C.
Controls incorporated into the system specifications.
Answers
D.
Development methodology employed.
D.
Development methodology employed.
Answers
Suggested answer: C

Explanation:

The primary responsibility of an IS auditor during the design phase of a software development project is to evaluate the controls incorporated into the system specifications. Controls are mechanisms or procedures that aim to ensure the security, reliability, or performance of a system or process. System specifications are documents that define and describe the requirements, features, functions, or components of a system or software. Evaluating the controls incorporated into the system specifications is a key responsibility of an IS auditor during the design phase of a software development project, as it helps ensure that the system or software meets the organization's objectives, standards, and expectations for security, reliability, or performance. The other options are not primary responsibilities of an IS auditor during the design phase of a software development project, as they do not directly relate to evaluating the controls incorporated into the system specifications. Future compatibility of the application is a possible factor that may affect the functionality or usability of the application in different environments or platforms, but it is not a primary responsibility of an IS auditor during the design phase of a software development project. Proposed functionality of the application is a possible factor that may affect the suitability or value of the application for meeting user needs or expectations, but it is not a primary responsibility of an IS auditor during the design phase of a software development project. Development methodology employed is a possible factor that may affect the quality or consistency of the software development process, but it is not a primary responsibility of an IS auditor during the design phase of a software development project.Reference:CISA Review Manual (Digital Version), Chapter 3, Section 3.3

Which of the following is the MOST important reason to implement version control for an end-user computing (EUC) application?

A.
To ensure that older versions are availability for reference
A.
To ensure that older versions are availability for reference
Answers
B.
To ensure that only the latest approved version of the application is used
B.
To ensure that only the latest approved version of the application is used
Answers
C.
To ensure compatibility different versions of the application
C.
To ensure compatibility different versions of the application
Answers
D.
To ensure that only authorized users can access the application
D.
To ensure that only authorized users can access the application
Answers
Suggested answer: B

Which of the following is the MOST effective way for an organization to project against data loss?

A.
Limit employee internet access.
A.
Limit employee internet access.
Answers
B.
Implement data classification procedures.
B.
Implement data classification procedures.
Answers
C.
Review firewall logs for anomalies.
C.
Review firewall logs for anomalies.
Answers
D.
Conduct periodic security awareness training.
D.
Conduct periodic security awareness training.
Answers
Suggested answer: D

Explanation:

Data loss can occur due to various reasons, such as accidental deletion, hardware failure, malware infection, theft, or unauthorized access. Data classification procedures can help to identify and protect sensitive data, but they are not sufficient to prevent data loss. The most effective way to protect against data loss is to conduct periodic security awareness training for employees, which can educate them on the importance of data security, the best practices for data handling and storage, and the common threats and risks to data.

Using a continuous auditing module is an audit procedure that would provide the best assurance that an application program is functioning as designed. A continuous auditing module is a software tool that performs automated and continuous testing and monitoring of an application program's inputs, outputs, processes, and controls. A continuous auditing module can help to verify the accuracy, completeness, validity, reliability, and timeliness of the application program's data and transactions. A continuous auditing module can also help to identify and report any errors, anomalies, deviations, or exceptions in the application program's performance or compliance.

The other options are not as effective or relevant as using a continuous auditing module for providing assurance that an application program is functioning as designed. Interviewing business management is a technique for obtaining information and opinions from the users or owners of the application program, but it does not directly test or verify the functionality or quality of the application program. Confirming accounts is a technique for verifying the existence and accuracy of account balances or transactions, but it does not necessarily reflect the design or operation of the application program. Reviewing program documentation is a technique for examining the specifications, requirements, and procedures of the application program, but it does not provide evidence of the actual implementation or execution of the application program.

ISACA, CISA Review Manual, 27th Edition, 2019, p.2361

Continuous audit and monitoring - PwC2

Management has requested a post-implementation review of a newly implemented purchasing package to determine to what extent business requirements are being met. Which of the following is MOST likely to be assessed?

A.
Purchasing guidelines and policies
A.
Purchasing guidelines and policies
Answers
B.
Implementation methodology
B.
Implementation methodology
Answers
C.
Results of line processing
C.
Results of line processing
Answers
D.
Test results
D.
Test results
Answers
Suggested answer: C

Explanation:

A post-implementation review is a process of evaluating the outcome and benefits of a project or a system after it has been implemented. The main purpose of a post-implementation review is to determine to what extent the business requirements are being met by the new system. Therefore, the most likely aspect to be assessed is the results of line processing, which refers to the actual performance and functionality of the system in the operational environment.

The implementation of an IT governance framework requires that the board of directors of an organization:

A.
Address technical IT issues.
A.
Address technical IT issues.
Answers
B.
Be informed of all IT initiatives.
B.
Be informed of all IT initiatives.
Answers
C.
Have an IT strategy committee.
C.
Have an IT strategy committee.
Answers
D.
Approve the IT strategy.
D.
Approve the IT strategy.
Answers
Suggested answer: D

Explanation:

IT governance is a framework that defines the roles, responsibilities, and processes for aligning IT strategy with business strategy. The board of directors of an organization is ultimately accountable for IT governance and has the authority to approve the IT strategy. The board of directors does not need to address technical IT issues, be informed of all IT initiatives, or have an IT strategy committee, as these tasks can be delegated to other stakeholders or committees within the organization.

×End Practice TestAre you sure you want to end the test?YesNo

Total 1.198 questions
Go to page: of 120