ExamGecko
Home Home / Isaca / CISA

Isaca CISA Practice Test - Questions Answers, Page 18

Question list
Search
Search

List of questions

Search

Related questions

An organization has recently implemented a Voice-over IP (VoIP) communication system. Which ot the following should be the IS auditor's PRIMARY concern?

A.
A single point of failure for both voice and data communications
A.
A single point of failure for both voice and data communications
Answers
B.
Inability to use virtual private networks (VPNs) for internal traffic
B.
Inability to use virtual private networks (VPNs) for internal traffic
Answers
C.
Lack of integration of voice and data communications
C.
Lack of integration of voice and data communications
Answers
D.
Voice quality degradation due to packet toss
D.
Voice quality degradation due to packet toss
Answers
Suggested answer: A

Explanation:

The IS auditor's primary concern when an organization has recently implemented a Voice-over IP (VoIP) communication system is a single point of failure for both voice and data communications. VoIP is a technology that allows voice communication over IP networks such as the internet. VoIP can offer benefits such as lower costs, higher flexibility, and better integration with other applications. However, VoIP also introduces risks such as dependency on network availability, performance, and security. If both voice and data communications share the same network infrastructure and devices, then a single point of failure can affect both services simultaneously and cause significant disruption to business operations. Therefore, the IS auditor should evaluate the availability and redundancy of the network components and devices that support VoIP communication. The other options are not as critical as a single point of failure for both voice and data communications, as they do not pose a direct threat to business continuity.Reference:CISA Review Manual, 27th Edition, page 385

Which of the following is a detective control?

A.
Programmed edit checks for data entry
A.
Programmed edit checks for data entry
Answers
B.
Backup procedures
B.
Backup procedures
Answers
C.
Use of pass cards to gain access to physical facilities
C.
Use of pass cards to gain access to physical facilities
Answers
D.
Verification of hash totals
D.
Verification of hash totals
Answers
Suggested answer: D

Explanation:

Verification of hash totals is a detective control. A detective control is a control that aims to identify and report errors or irregularities that have already occurred. Verification of hash totals is a technique that compares the hash values of data before and after transmission or processing to detect any changes or corruption. The other options are examples of other types of controls, such as programmed edit checks (preventive), backup procedures (recovery), and use of pass cards (preventive).Reference:CISA Review Manual, 27th Edition, page 223

Which of the following BEST demonstrates that IT strategy Is aligned with organizational goals and objectives?

A.
IT strategies are communicated to all Business stakeholders
A.
IT strategies are communicated to all Business stakeholders
Answers
B.
Organizational strategies are communicated to the chief information officer (CIO).
B.
Organizational strategies are communicated to the chief information officer (CIO).
Answers
C.
Business stakeholders are Involved In approving the IT strategy.
C.
Business stakeholders are Involved In approving the IT strategy.
Answers
D.
The chief information officer (CIO) is involved In approving the organizational strategies
D.
The chief information officer (CIO) is involved In approving the organizational strategies
Answers
Suggested answer: C

Explanation:

Business stakeholders being involved in approving the IT strategy best demonstrates that IT strategy is aligned with organizational goals and objectives. IT strategy is a plan that defines how IT resources and capabilities will support and enable the achievement of business goals and objectives. Business stakeholders are the individuals or groups who have an interest or influence in the organization's activities and outcomes. By involving business stakeholders in approving the IT strategy, the organization can ensure that the IT strategy reflects and supports the business needs, expectations, and priorities. The other options do not necessarily indicate that IT strategy is aligned with organizational goals and objectives, as they do not involve the participation or feedback of business stakeholders.Reference:CISA Review Manual, 27th Edition, page 97

When testing the adequacy of tape backup procedures, which step BEST verifies that regularly scheduled Backups are timely and run to completion?

A.
Observing the execution of a daily backup run
A.
Observing the execution of a daily backup run
Answers
B.
Evaluating the backup policies and procedures
B.
Evaluating the backup policies and procedures
Answers
C.
Interviewing key personnel evolved In the backup process
C.
Interviewing key personnel evolved In the backup process
Answers
D.
Reviewing a sample of system-generated backup logs
D.
Reviewing a sample of system-generated backup logs
Answers
Suggested answer: D

Explanation:

Reviewing a sample of system-generated backup logs is the best step to verify that regularly scheduled backups are timely and run to completion. Backup logs are records that document the details and results of backup operations, such as the date, time, duration, status, errors, and exceptions. By reviewing a sample of backup logs, the IS auditor can check whether the backups are performed according to the schedule and whether they are completed successfully or not. The other steps do not provide as much evidence or assurance as reviewing backup logs, as they do not show the actual outcome or performance of backup operations.Reference:CISA Review Manual, 27th Edition, page 247

Which of the following observations would an IS auditor consider the GREATEST risk when conducting an audit of a virtual server farm tor potential software vulnerabilities?

A.
Guest operating systems are updated monthly
A.
Guest operating systems are updated monthly
Answers
B.
The hypervisor is updated quarterly.
B.
The hypervisor is updated quarterly.
Answers
C.
A variety of guest operating systems operate on one virtual server
C.
A variety of guest operating systems operate on one virtual server
Answers
D.
Antivirus software has been implemented on the guest operating system only.
D.
Antivirus software has been implemented on the guest operating system only.
Answers
Suggested answer: D

Explanation:

Antivirus software has been implemented on the guest operating system only is the observation that an IS auditor would consider the greatest risk when conducting an audit of a virtual server farm for potential software vulnerabilities. A virtual server farm is a collection of servers that run multiple virtual machines (VMs) on a single physical host using a software layer called a hypervisor. A guest operating system is the operating system installed on each VM. Antivirus software is a software program that detects and removes malicious software from a computer system. If antivirus software has been implemented on the guest operating system only, it means that the hypervisor and the host operating system are not protected from malware attacks, which could compromise the security and availability of all VMs running on the same host. Therefore, antivirus software should be implemented on both the guest and host operating systems as well as on the hypervisor.Reference:CISA Review Manual, 27th Edition, page 378

To develop meaningful recommendations 'or findings, which of the following is MOST important 'or an IS auditor to determine and understand?

A.
Root cause
A.
Root cause
Answers
B.
Responsible party
B.
Responsible party
Answers
C.
impact
C.
impact
Answers
D.
Criteria
D.
Criteria
Answers
Suggested answer: A

Explanation:

Root cause is the most important thing for an IS auditor to determine and understand to develop meaningful recommendations for findings. A root cause is the underlying factor or condition that leads to a problem or issue. A finding is a statement that describes a problem or issue identified during an audit. A recommendation is a suggestion or advice that aims to address or resolve a finding. To develop meaningful recommendations for findings, an IS auditor should determine and understand the root cause of each finding, as this can help to identify the most effective and appropriate actions to prevent or correct the problem or issue. The other options are not as important as determining and understanding the root cause, as they do not directly address or resolve the finding.Reference:CISA Review Manual, 27th Edition, page 434

An IS auditor notes that IT and the business have different opinions on the availability of their application servers. Which of the following should the IS auditor review FIRST in order to understand the problem?

A.
The exact definition of the service levels and their measurement
A.
The exact definition of the service levels and their measurement
Answers
B.
The alerting and measurement process on the application servers
B.
The alerting and measurement process on the application servers
Answers
C.
The actual availability of the servers as part of a substantive test
C.
The actual availability of the servers as part of a substantive test
Answers
D.
The regular performance-reporting documentation
D.
The regular performance-reporting documentation
Answers
Suggested answer: A

Explanation:

The exact definition of the service levels and their measurement is the first thing that the IS auditor should review in order to understand the problem of different opinions on the availability of their application servers. Service levels are the agreed-upon standards or targets for delivering IT services, such as availability, reliability, performance, and security. Service level measurement is the process of collecting, analyzing, and reporting data related to the achievement of service levels. By reviewing the exact definition of the service levels and their measurement, the IS auditor can identify any gaps, inconsistencies, or ambiguities that may cause confusion or disagreement among IT and the business. The other options are not as important as reviewing the exact definition of the service levels and their measurement, as they do not address the root cause of the problem.Reference:CISA Review Manual, 27th Edition, page 372

During an audit of a financial application, it was determined that many terminated users' accounts were not disabled. Which of the following should be the IS auditor's NEXT step?

A.
Perform substantive testing of terminated users' access rights.
A.
Perform substantive testing of terminated users' access rights.
Answers
B.
Perform a review of terminated users' account activity
B.
Perform a review of terminated users' account activity
Answers
C.
Communicate risks to the application owner.
C.
Communicate risks to the application owner.
Answers
D.
Conclude that IT general controls ate ineffective.
D.
Conclude that IT general controls ate ineffective.
Answers
Suggested answer: B

Explanation:

The IS auditor's next step after determining that many terminated users' accounts were not disabled is to perform a review of terminated users' account activity. This means that the IS auditor should check whether any of the terminated users' accounts were accessed or used after their termination date, which could indicate unauthorized or fraudulent activity. The IS auditor should also assess the impact and risk of such activity on the confidentiality, integrity, and availability of IT resources and data. The other options are not as appropriate as performing a review of terminated users' account activity, as they do not provide sufficient evidence or assurance of the extent and effect of the problem.Reference:CISA Review Manual, 27th Edition, page 240

An organization is considering allowing users to connect personal devices to the corporate network. Which of the following should be done FIRST?

A.
Conduct security awareness training.
A.
Conduct security awareness training.
Answers
B.
Implement an acceptable use policy
B.
Implement an acceptable use policy
Answers
C.
Create inventory records of personal devices
C.
Create inventory records of personal devices
Answers
D.
Configure users on the mobile device management (MDM) solution
D.
Configure users on the mobile device management (MDM) solution
Answers
Suggested answer: B

Explanation:

The first thing that should be done before allowing users to connect personal devices to the corporate network is to implement an acceptable use policy. An acceptable use policy is a document that defines the rules and guidelines for using personal devices on the corporate network, such as security requirements, access rights, responsibilities, and consequences. An acceptable use policy can help to protect the organization from potential risks such as data leakage, malware infection, or legal liability. The other options are not as important as implementing an acceptable use policy, as they do not establish the boundaries and expectations for using personal devices on the corporate network.Reference:CISA Review Manual, 27th Edition, page 318

An organization is planning an acquisition and has engaged an IS auditor lo evaluate the IT governance framework of the target company. Which of the following would be MOST helpful In determining the effectiveness of the framework?

A.
Sell-assessment reports of IT capability and maturity
A.
Sell-assessment reports of IT capability and maturity
Answers
B.
IT performance benchmarking reports with competitors
B.
IT performance benchmarking reports with competitors
Answers
C.
Recent third-party IS audit reports
C.
Recent third-party IS audit reports
Answers
D.
Current and previous internal IS audit reports
D.
Current and previous internal IS audit reports
Answers
Suggested answer: C

Explanation:

Recent third-party IS audit reports would be most helpful in determining the effectiveness of the IT governance framework of the target company. IT governance is a framework that defines the roles, responsibilities, and processes for aligning IT strategy with business strategy. A third-party IS audit is an independent and objective examination of an organization's IT governance framework by an external auditor. Recent third-party IS audit reports can provide reliable and unbiased evidence of the strengths, weaknesses, and maturity of the IT governance framework of the target company. The other options are not as helpful as recent third-party IS audit reports, as they may not be as comprehensive, accurate, or current as external audits.Reference:CISA Review Manual, 27th Edition, page 94

Total 1.198 questions
Go to page: of 120