ExamGecko
Home / Isaca / CISA / List of questions
Ask Question

Isaca CISA Practice Test - Questions Answers, Page 18

Add to Whishlist

List of questions

Question 171

Report Export Collapse

An organization has recently implemented a Voice-over IP (VoIP) communication system. Which ot the following should be the IS auditor's PRIMARY concern?

A single point of failure for both voice and data communications
A single point of failure for both voice and data communications
Inability to use virtual private networks (VPNs) for internal traffic
Inability to use virtual private networks (VPNs) for internal traffic
Lack of integration of voice and data communications
Lack of integration of voice and data communications
Voice quality degradation due to packet toss
Voice quality degradation due to packet toss
Suggested answer: A
Explanation:

The IS auditor's primary concern when an organization has recently implemented a Voice-over IP (VoIP) communication system is a single point of failure for both voice and data communications. VoIP is a technology that allows voice communication over IP networks such as the internet. VoIP can offer benefits such as lower costs, higher flexibility, and better integration with other applications. However, VoIP also introduces risks such as dependency on network availability, performance, and security. If both voice and data communications share the same network infrastructure and devices, then a single point of failure can affect both services simultaneously and cause significant disruption to business operations. Therefore, the IS auditor should evaluate the availability and redundancy of the network components and devices that support VoIP communication. The other options are not as critical as a single point of failure for both voice and data communications, as they do not pose a direct threat to business continuity.Reference:CISA Review Manual, 27th Edition, page 385

asked 18/09/2024
Latonya Ganison
31 questions

Question 172

Report Export Collapse

Which of the following is a detective control?

Programmed edit checks for data entry
Programmed edit checks for data entry
Backup procedures
Backup procedures
Use of pass cards to gain access to physical facilities
Use of pass cards to gain access to physical facilities
Verification of hash totals
Verification of hash totals
Suggested answer: D
Explanation:

Verification of hash totals is a detective control. A detective control is a control that aims to identify and report errors or irregularities that have already occurred. Verification of hash totals is a technique that compares the hash values of data before and after transmission or processing to detect any changes or corruption. The other options are examples of other types of controls, such as programmed edit checks (preventive), backup procedures (recovery), and use of pass cards (preventive).Reference:CISA Review Manual, 27th Edition, page 223

asked 18/09/2024
William Macy
58 questions

Question 173

Report Export Collapse

Which of the following BEST demonstrates that IT strategy Is aligned with organizational goals and objectives?

IT strategies are communicated to all Business stakeholders
IT strategies are communicated to all Business stakeholders
Organizational strategies are communicated to the chief information officer (CIO).
Organizational strategies are communicated to the chief information officer (CIO).
Business stakeholders are Involved In approving the IT strategy.
Business stakeholders are Involved In approving the IT strategy.
The chief information officer (CIO) is involved In approving the organizational strategies
The chief information officer (CIO) is involved In approving the organizational strategies
Suggested answer: C
Explanation:

Business stakeholders being involved in approving the IT strategy best demonstrates that IT strategy is aligned with organizational goals and objectives. IT strategy is a plan that defines how IT resources and capabilities will support and enable the achievement of business goals and objectives. Business stakeholders are the individuals or groups who have an interest or influence in the organization's activities and outcomes. By involving business stakeholders in approving the IT strategy, the organization can ensure that the IT strategy reflects and supports the business needs, expectations, and priorities. The other options do not necessarily indicate that IT strategy is aligned with organizational goals and objectives, as they do not involve the participation or feedback of business stakeholders.Reference:CISA Review Manual, 27th Edition, page 97

asked 18/09/2024
Tim Roe
37 questions

Question 174

Report Export Collapse

When testing the adequacy of tape backup procedures, which step BEST verifies that regularly scheduled Backups are timely and run to completion?

Observing the execution of a daily backup run
Observing the execution of a daily backup run
Evaluating the backup policies and procedures
Evaluating the backup policies and procedures
Interviewing key personnel evolved In the backup process
Interviewing key personnel evolved In the backup process
Reviewing a sample of system-generated backup logs
Reviewing a sample of system-generated backup logs
Suggested answer: D
Explanation:

Reviewing a sample of system-generated backup logs is the best step to verify that regularly scheduled backups are timely and run to completion. Backup logs are records that document the details and results of backup operations, such as the date, time, duration, status, errors, and exceptions. By reviewing a sample of backup logs, the IS auditor can check whether the backups are performed according to the schedule and whether they are completed successfully or not. The other steps do not provide as much evidence or assurance as reviewing backup logs, as they do not show the actual outcome or performance of backup operations.Reference:CISA Review Manual, 27th Edition, page 247

asked 18/09/2024
Shrini Ch
38 questions

Question 175

Report Export Collapse

Which of the following observations would an IS auditor consider the GREATEST risk when conducting an audit of a virtual server farm tor potential software vulnerabilities?

Guest operating systems are updated monthly
Guest operating systems are updated monthly
The hypervisor is updated quarterly.
The hypervisor is updated quarterly.
A variety of guest operating systems operate on one virtual server
A variety of guest operating systems operate on one virtual server
Antivirus software has been implemented on the guest operating system only.
Antivirus software has been implemented on the guest operating system only.
Suggested answer: D
Explanation:

Antivirus software has been implemented on the guest operating system only is the observation that an IS auditor would consider the greatest risk when conducting an audit of a virtual server farm for potential software vulnerabilities. A virtual server farm is a collection of servers that run multiple virtual machines (VMs) on a single physical host using a software layer called a hypervisor. A guest operating system is the operating system installed on each VM. Antivirus software is a software program that detects and removes malicious software from a computer system. If antivirus software has been implemented on the guest operating system only, it means that the hypervisor and the host operating system are not protected from malware attacks, which could compromise the security and availability of all VMs running on the same host. Therefore, antivirus software should be implemented on both the guest and host operating systems as well as on the hypervisor.Reference:CISA Review Manual, 27th Edition, page 378

asked 18/09/2024
Alysson Rodrigo Freires Neto
49 questions

Question 176

Report Export Collapse

To develop meaningful recommendations 'or findings, which of the following is MOST important 'or an IS auditor to determine and understand?

Root cause
Root cause
Responsible party
Responsible party
impact
impact
Criteria
Criteria
Suggested answer: A
Explanation:

Root cause is the most important thing for an IS auditor to determine and understand to develop meaningful recommendations for findings. A root cause is the underlying factor or condition that leads to a problem or issue. A finding is a statement that describes a problem or issue identified during an audit. A recommendation is a suggestion or advice that aims to address or resolve a finding. To develop meaningful recommendations for findings, an IS auditor should determine and understand the root cause of each finding, as this can help to identify the most effective and appropriate actions to prevent or correct the problem or issue. The other options are not as important as determining and understanding the root cause, as they do not directly address or resolve the finding.Reference:CISA Review Manual, 27th Edition, page 434

asked 18/09/2024
Storage Junk
53 questions

Question 177

Report Export Collapse

An IS auditor notes that IT and the business have different opinions on the availability of their application servers. Which of the following should the IS auditor review FIRST in order to understand the problem?

The exact definition of the service levels and their measurement
The exact definition of the service levels and their measurement
The alerting and measurement process on the application servers
The alerting and measurement process on the application servers
The actual availability of the servers as part of a substantive test
The actual availability of the servers as part of a substantive test
The regular performance-reporting documentation
The regular performance-reporting documentation
Suggested answer: A
Explanation:

The exact definition of the service levels and their measurement is the first thing that the IS auditor should review in order to understand the problem of different opinions on the availability of their application servers. Service levels are the agreed-upon standards or targets for delivering IT services, such as availability, reliability, performance, and security. Service level measurement is the process of collecting, analyzing, and reporting data related to the achievement of service levels. By reviewing the exact definition of the service levels and their measurement, the IS auditor can identify any gaps, inconsistencies, or ambiguities that may cause confusion or disagreement among IT and the business. The other options are not as important as reviewing the exact definition of the service levels and their measurement, as they do not address the root cause of the problem.Reference:CISA Review Manual, 27th Edition, page 372

asked 18/09/2024
John Shelby
43 questions

Question 178

Report Export Collapse

During an audit of a financial application, it was determined that many terminated users' accounts were not disabled. Which of the following should be the IS auditor's NEXT step?

Perform substantive testing of terminated users' access rights.
Perform substantive testing of terminated users' access rights.
Perform a review of terminated users' account activity
Perform a review of terminated users' account activity
Communicate risks to the application owner.
Communicate risks to the application owner.
Conclude that IT general controls ate ineffective.
Conclude that IT general controls ate ineffective.
Suggested answer: B
Explanation:

The IS auditor's next step after determining that many terminated users' accounts were not disabled is to perform a review of terminated users' account activity. This means that the IS auditor should check whether any of the terminated users' accounts were accessed or used after their termination date, which could indicate unauthorized or fraudulent activity. The IS auditor should also assess the impact and risk of such activity on the confidentiality, integrity, and availability of IT resources and data. The other options are not as appropriate as performing a review of terminated users' account activity, as they do not provide sufficient evidence or assurance of the extent and effect of the problem.Reference:CISA Review Manual, 27th Edition, page 240

asked 18/09/2024
samuel crook
50 questions

Question 179

Report Export Collapse

An organization is considering allowing users to connect personal devices to the corporate network. Which of the following should be done FIRST?

Conduct security awareness training.
Conduct security awareness training.
Implement an acceptable use policy
Implement an acceptable use policy
Create inventory records of personal devices
Create inventory records of personal devices
Configure users on the mobile device management (MDM) solution
Configure users on the mobile device management (MDM) solution
Suggested answer: B
Explanation:

The first thing that should be done before allowing users to connect personal devices to the corporate network is to implement an acceptable use policy. An acceptable use policy is a document that defines the rules and guidelines for using personal devices on the corporate network, such as security requirements, access rights, responsibilities, and consequences. An acceptable use policy can help to protect the organization from potential risks such as data leakage, malware infection, or legal liability. The other options are not as important as implementing an acceptable use policy, as they do not establish the boundaries and expectations for using personal devices on the corporate network.Reference:CISA Review Manual, 27th Edition, page 318

asked 18/09/2024
Sébastien PIERRE
55 questions

Question 180

Report Export Collapse

An organization is planning an acquisition and has engaged an IS auditor lo evaluate the IT governance framework of the target company. Which of the following would be MOST helpful In determining the effectiveness of the framework?

Sell-assessment reports of IT capability and maturity
Sell-assessment reports of IT capability and maturity
IT performance benchmarking reports with competitors
IT performance benchmarking reports with competitors
Recent third-party IS audit reports
Recent third-party IS audit reports
Current and previous internal IS audit reports
Current and previous internal IS audit reports
Suggested answer: C
Explanation:

Recent third-party IS audit reports would be most helpful in determining the effectiveness of the IT governance framework of the target company. IT governance is a framework that defines the roles, responsibilities, and processes for aligning IT strategy with business strategy. A third-party IS audit is an independent and objective examination of an organization's IT governance framework by an external auditor. Recent third-party IS audit reports can provide reliable and unbiased evidence of the strengths, weaknesses, and maturity of the IT governance framework of the target company. The other options are not as helpful as recent third-party IS audit reports, as they may not be as comprehensive, accurate, or current as external audits.Reference:CISA Review Manual, 27th Edition, page 94

asked 18/09/2024
Jason Hicks
48 questions
Total 1.402 questions
Go to page: of 141
Search

Related questions