ExamGecko
Home Home / Isaca / CISA

Isaca CISA Practice Test - Questions Answers, Page 19

Question list
Search
Search

List of questions

Search

Related questions

An IS auditor has been asked to audit the proposed acquisition of new computer hardware. The auditor's PRIMARY concern Is that:

A.
the implementation plan meets user requirements.
A.
the implementation plan meets user requirements.
Answers
B.
a full, visible audit trail will be Included.
B.
a full, visible audit trail will be Included.
Answers
C.
a dear business case has been established.
C.
a dear business case has been established.
Answers
D.
the new hardware meets established security standards
D.
the new hardware meets established security standards
Answers
Suggested answer: C

Explanation:

The IS auditor's primary concern when auditing the proposed acquisition of new computer hardware is that a clear business case has been established. A business case is a document that justifies the need, feasibility, and benefits of a proposed project or investment. A clear business case can help to ensure that the acquisition of new computer hardware is aligned with the organization's goals, objectives, and requirements, and that it provides value for money and return on investment. The other options are not as important as establishing a clear business case, as they do not address the rationale or justification for acquiring new computer hardware.Reference:CISA Review Manual, 27th Edition, page 467

During the implementation of a new system, an IS auditor must assess whether certain automated calculations comply with the regulatory requirements Which of the following is the BEST way to obtain this assurance?

A.
Review sign-off documentation
A.
Review sign-off documentation
Answers
B.
Review the source code related to the calculation
B.
Review the source code related to the calculation
Answers
C.
Re-perform the calculation with audit software
C.
Re-perform the calculation with audit software
Answers
D.
Inspect user acceptance lest (UAT) results
D.
Inspect user acceptance lest (UAT) results
Answers
Suggested answer: C

Explanation:

The best way to obtain assurance that certain automated calculations comply with the regulatory requirements is to re-perform the calculation with audit software. This will allow the auditor to independently verify the accuracy and validity of the calculation and compare it with the expected results. Reviewing sign-off documentation, source code, or user acceptance test results may not provide sufficient evidence or assurance that the calculation is correct and compliant.Reference:

CISA Review Manual (Digital Version), page 325

CISA Questions, Answers & Explanations Database, question ID 3335

An organization has developed mature risk management practices that are followed across all departments What is the MOST effective way for the audit team to leverage this risk management maturity?

A.
Implementing risk responses on management's behalf
A.
Implementing risk responses on management's behalf
Answers
B.
Integrating the risk register for audit planning purposes
B.
Integrating the risk register for audit planning purposes
Answers
C.
Providing assurances to management regarding risk
C.
Providing assurances to management regarding risk
Answers
D.
Facilitating audit risk identification and evaluation workshops
D.
Facilitating audit risk identification and evaluation workshops
Answers
Suggested answer: B

Explanation:

The most effective way for the audit team to leverage the risk management maturity of the organization is to integrate the risk register for audit planning purposes. The risk register is a document that records the identified risks, their likelihood, impact, and mitigation strategies for a project or an organization. By using the risk register, the audit team can align their audit objectives, scope, and procedures with the organization's risk profile and priorities. This will help the audit team to provide more value-added and relevant assurance and recommendations to the management and stakeholders.

Some of the web sources that support this answer are:

Audit Maturity And Risk Management | Ideagen

Building a Mature Enterprise Risk Management Plan | AuditBoard

CISA Certified Information Systems Auditor -- Question0551

During an exit interview, senior management disagrees with some of me facts presented m the draft audit report and wants them removed from the report. Which of the following would be the auditor's BEST course of action?

A.
Revise the assessment based on senior management's objections.
A.
Revise the assessment based on senior management's objections.
Answers
B.
Escalate the issue to audit management.
B.
Escalate the issue to audit management.
Answers
C.
Finalize the draft audit report without changes.
C.
Finalize the draft audit report without changes.
Answers
D.
Gather evidence to analyze senior management's objections
D.
Gather evidence to analyze senior management's objections
Answers
Suggested answer: D

Explanation:

The auditor's best course of action when senior management disagrees with some of the facts presented in the draft audit report is to gather evidence to analyze senior management's objections. The auditor should not revise the assessment, escalate the issue, or finalize the report without changes until they have evaluated the validity and relevance of senior management's objections and resolved any discrepancies or misunderstandings. The auditor should maintain a professional and objective attitude and seek to present a fair and accurate audit report based on sufficient and appropriate evidence.Reference:

CISA Review Manual (Digital Version), page 372

CISA Questions, Answers & Explanations Database, question ID 3338

Which of the following is the BEST source of information tor an IS auditor to use when determining whether an organization's information security policy is adequate?

A.
Information security program plans
A.
Information security program plans
Answers
B.
Penetration test results
B.
Penetration test results
Answers
C.
Risk assessment results
C.
Risk assessment results
Answers
D.
Industry benchmarks
D.
Industry benchmarks
Answers
Suggested answer: C

Explanation:

The best source of information for an IS auditor to use when determining whether an organization's information security policy is adequate is the risk assessment results. The risk assessment results provide the auditor with an overview of the organization's risk profile, including the identification, analysis, and evaluation of the risks that affect the confidentiality, integrity, and availability of the information assets. The auditor can use the risk assessment results to compare the organization's information security policy with the risk appetite, risk tolerance, and risk treatment strategies of the organization. The auditor can also use the risk assessment results to evaluate if the information security policy is aligned with the organization's objectives, requirements, and regulations.

Some of the web sources that support this answer are:

Performance Measurement Guide for Information Security

ISO 27001 Annex A.5 - Information Security Policies

[CISA Certified Information Systems Auditor -- Question0551]

Following a security breach in which a hacker exploited a well-known vulnerability in the domain controller, an IS audit has been asked to conduct a control assessment. the auditor's BEST course of action would be to determine if:

A.
the patches were updated.
A.
the patches were updated.
Answers
B.
The logs were monitored.
B.
The logs were monitored.
Answers
C.
The network traffic was being monitored.
C.
The network traffic was being monitored.
Answers
D.
The domain controller was classified for high availability.
D.
The domain controller was classified for high availability.
Answers
Suggested answer: B

Explanation:

The auditor's best course of action after a security breach in which a hacker exploited a well-known vulnerability in the domain controller is to determine if the logs were monitored. Log monitoring is an essential control for detecting and responding to security incidents, especially when known vulnerabilities exist in the system. The auditor should assess if the logs were properly configured, collected, reviewed, analyzed, and acted upon by the responsible parties. Updating patches, monitoring network traffic, and classifying domain controllers for high availability are also important controls, but they are not directly related to the detection and response of the security breach.Reference:

CISA Review Manual (Digital Version), page 301

CISA Questions, Answers & Explanations Database, question ID 3340

An IS auditor Is reviewing a recent security incident and is seeking information about me approval of a recent modification to a database system's security settings Where would the auditor MOST likely find this information?

A.
System event correlation report
A.
System event correlation report
Answers
B.
Database log
B.
Database log
Answers
C.
Change log
C.
Change log
Answers
D.
Security incident and event management (SIEM) report
D.
Security incident and event management (SIEM) report
Answers
Suggested answer: C

Explanation:

A change log is a record of all changes made to a system or application, including the date, time, description, and approval of each change. A change log can help an IS auditor to trace the source and authorization of a modification to a system's security settings. A system event correlation report is a tool that analyzes data from multiple sources to identify patterns and anomalies that indicate potential security incidents. A database log is a record of all transactions and activities performed on a database, such as queries, updates, and backups. A security incident and event management (SIEM) report is a tool that collects, analyzes, and reports on data from various sources to detect and respond to security incidents.

Which of the following security risks can be reduced by a property configured network firewall?

A.
SQL injection attacks
A.
SQL injection attacks
Answers
B.
Denial of service (DoS) attacks
B.
Denial of service (DoS) attacks
Answers
C.
Phishing attacks
C.
Phishing attacks
Answers
D.
Insider attacks
D.
Insider attacks
Answers
Suggested answer: B

Explanation:

A network firewall is a device or software that monitors and controls the incoming and outgoing network traffic based on predefined rules. A network firewall can help reduce the risk of denial of service (DoS) attacks, which are attempts to overwhelm a system or network with excessive requests or traffic, by filtering or blocking unwanted or malicious packets. A SQL injection attack is a type of code injection attack that exploits a vulnerability in a web application's database query, by inserting malicious SQL statements into the input fields. A phishing attack is a type of social engineering attack that attempts to trick users into revealing sensitive information or installing malware, by sending fraudulent emails or messages that impersonate legitimate entities. An insider attack is a type of malicious activity that originates from within an organization, such as employees, contractors, or partners, who abuse their access privileges or credentials to compromise the confidentiality, integrity, or availability of information systems or data. A network firewall cannot prevent these types of attacks, as they rely on exploiting human or application weaknesses rather than network vulnerabilities.

Which of the following will MOST likely compromise the control provided By a digital signature created using RSA encryption?

A.
Reversing the hash function using the digest
A.
Reversing the hash function using the digest
Answers
B.
Altering the plaintext message
B.
Altering the plaintext message
Answers
C.
Deciphering the receiver's public key
C.
Deciphering the receiver's public key
Answers
D.
Obtaining the sender's private key
D.
Obtaining the sender's private key
Answers
Suggested answer: D

Explanation:

A digital signature is a cryptographic technique that verifies the authenticity and integrity of a message or document, by using a hash function and an asymmetric encryption algorithm. A hash function is a mathematical function that transforms any input data into a fixed-length output value called a digest, which is unique for each input. An asymmetric encryption algorithm uses two keys: a public key and a private key. The public key can be shared with anyone, while the private key must be kept secret by the owner. To create a digital signature, the sender first applies a hash function to the plaintext message to generate a digest. Then, the sender encrypts the digest with their private key to produce the digital signature. To verify the digital signature, the receiver decrypts the digital signature with the sender's public key to obtain the digest. Then, the receiver applies the same hash function to the plaintext message to generate another digest. If the two digests match, it means that the message has not been altered and that it came from the sender. The security of a digital signature depends on the secrecy of the sender's private key. If an attacker obtains the sender's private key, they can create fake digital signatures for any message they want, thus compromising the control provided by the digital signature. Reversing the hash function using the digest is not possible, as hash functions are designed to be one-way functions that cannot be inverted. Altering the plaintext message will result in a different digest after applying the hash function, which will not match with the decrypted digest from the digital signature, thus invalidating the digital signature. Deciphering the receiver's public key is not relevant, as public keys are meant to be publicly available and do not affect the security of digital signatures.

Which of the following is the BEST reason for an organization to use clustering?

A.
To decrease system response time
A.
To decrease system response time
Answers
B.
To Improve the recovery lime objective (RTO)
B.
To Improve the recovery lime objective (RTO)
Answers
C.
To facilitate faster backups
C.
To facilitate faster backups
Answers
D.
To improve system resiliency
D.
To improve system resiliency
Answers
Suggested answer: D

Explanation:

Clustering is a technique that groups multiple servers or nodes together to act as one system, providing high availability, scalability, and load balancing for applications or services. Clustering can improve system resiliency, which is the ability of a system to withstand or recover from failures or disruptions without compromising its functionality or performance. Clustering can achieve this by providing redundancy and fault tolerance for critical components or processes, enabling automatic failover and recovery in case of node failures, distributing workload among multiple nodes to avoid overloading or bottlenecks, and allowing dynamic addition or removal of nodes to meet changing demand or capacity needs. Clustering may also decrease system response time by improving performance and efficiency through load balancing and parallel processing, but this is not its primary purpose. Clustering may facilitate faster backups by enabling concurrent backup operations across multiple nodes, but this is not its main benefit. Clustering may improve the recovery time objective (RTO), which is the maximum acceptable time for restoring a system or service after a disruption, by reducing the downtime and data loss caused by failures, but this is not the best reason for using clustering, as there may be other factors that affect the RTO, such as backup frequency, recovery procedures, and testing methods.

Total 1.198 questions
Go to page: of 120