ExamGecko
Home Home / Isaca / CISA

Isaca CISA Practice Test - Questions Answers, Page 2

Question list
Search
Search

Related questions

Controls related to authorized modifications to production programs are BEST tested by:

A.
tracing modifications from the original request for change forward to the executable program.
A.
tracing modifications from the original request for change forward to the executable program.
Answers
B.
tracing modifications from the executable program back to the original request for change.
B.
tracing modifications from the executable program back to the original request for change.
Answers
C.
testing only the authorizations to implement the new program.
C.
testing only the authorizations to implement the new program.
Answers
D.
reviewing only the actual lines of source code changed in the program.
D.
reviewing only the actual lines of source code changed in the program.
Answers
Suggested answer: A

Explanation:

Controls related to authorized modifications to production programs are best tested by tracing modifications from the original request for change forward to the executable program, as this ensures that the change management process was followed and that the modifications were approved, documented, tested, and implemented correctly. Tracing modifications from the executable program back to the original request for change may not reveal any unauthorized or undocumented changes that occurred during the process. Testing only the authorizations to implement the new program or reviewing only the actual lines of source code changed in the program are not sufficient to test the controls related to authorized modifications, as they do not cover the entire change management process.Reference:CISA Review Manual (Digital Version), Chapter 4: Information Systems Operations, Maintenance and Service Management, Section 4.2: Change Management

Which of the following is a PRIMARY responsibility of an IT steering committee?

A.
Prioritizing IT projects in accordance with business requirements
A.
Prioritizing IT projects in accordance with business requirements
Answers
B.
Reviewing periodic IT risk assessments
B.
Reviewing periodic IT risk assessments
Answers
C.
Validating and monitoring the skill sets of IT department staff
C.
Validating and monitoring the skill sets of IT department staff
Answers
D.
Establishing IT budgets for the business
D.
Establishing IT budgets for the business
Answers
Suggested answer: A

Explanation:

A primary responsibility of an IT steering committee is prioritizing IT projects in accordance with business requirements, as this ensures that IT resources are allocated to support the strategic objectives and needs of the organization. Reviewing periodic IT risk assessments, validating and monitoring the skill sets of IT department staff, and establishing IT budgets for the business are important activities, but they are not the primary responsibility of an IT steering committee. They may be delegated to other IT governance bodies or functions within the organization.Reference:CISA Review Manual (Digital Version), Chapter 1: Information Systems Auditing Process, Section 1.2: IT Governance

Which of the following is MOST important to define within a disaster recovery plan (DRP)?

A.
Business continuity plan (BCP)
A.
Business continuity plan (BCP)
Answers
B.
Test results for backup data restoration
B.
Test results for backup data restoration
Answers
C.
A comprehensive list of disaster recovery scenarios and priorities
C.
A comprehensive list of disaster recovery scenarios and priorities
Answers
D.
Roles and responsibilities for recovery team members
D.
Roles and responsibilities for recovery team members
Answers
Suggested answer: D

Explanation:

The most important thing to define within a disaster recovery plan (DRP) is the roles and responsibilities for recovery team members, as this ensures that everyone knows what to do, who to report to, and how to communicate in the event of a disaster. A business continuity plan (BCP) is a broader document that covers the overall strategy and objectives for maintaining or resuming business operations after a disaster. Test results for backup data restoration are important to verify the integrity and availability of backup data, but they are not part of the DRP itself.A comprehensive list of disaster recovery scenarios and priorities is useful to identify the potential risks and impacts of different types of disasters, but it is not as critical as defining the roles and responsibilities for recovery team members.Reference:CISA Review Manual (Digital Version), Chapter 4: Information Systems Operations, Maintenance and Service Management, Section 4.3: Disaster Recovery Planning1

Management has learned the implementation of a new IT system will not be completed on time and has requested an audit. Which of the following audit findings should be of GREATEST concern?

A.
The actual start times of some activities were later than originally scheduled.
A.
The actual start times of some activities were later than originally scheduled.
Answers
B.
Tasks defined on the critical path do not have resources allocated.
B.
Tasks defined on the critical path do not have resources allocated.
Answers
C.
The project manager lacks formal certification.
C.
The project manager lacks formal certification.
Answers
D.
Milestones have not been defined for all project products.
D.
Milestones have not been defined for all project products.
Answers
Suggested answer: B

Explanation:

The audit finding that should be of greatest concern is that tasks defined on the critical path do not have resources allocated, as this means that the project is likely to face significant delays and cost overruns, since the critical path is the sequence of activities that determines the minimum time required to complete the project. The actual start times of some activities being later than originally scheduled may indicate some minor deviations from the project plan, but they may not necessarily affect the overall project completion time if they are not on the critical path. The project manager lacking formal certification may affect the quality and efficiency of the project management process, but it does not necessarily imply that the project manager is incompetent or unqualified.Milestones have been defined for all project products, but they may not be realistic or achievable if they do not take into account the resource constraints and dependencies of the critical path tasks.Reference:CISA Review Manual (Digital Version), Chapter 2: Governance and Management of IT, Section 2.3: IT Project Management

Which task should an IS auditor complete FIRST during the preliminary planning phase of a database security review?

A.
Perform a business impact analysis (BIA).
A.
Perform a business impact analysis (BIA).
Answers
B.
Determine which databases will be in scope.
B.
Determine which databases will be in scope.
Answers
C.
Identify the most critical database controls.
C.
Identify the most critical database controls.
Answers
D.
Evaluate the types of databases being used
D.
Evaluate the types of databases being used
Answers
Suggested answer: B

Explanation:

The first task that an IS auditor should complete during the preliminary planning phase of a database security review is to determine which databases will be in scope. The scope defines the boundaries and objectives of the audit, as well as the resources, time, and budget required. The IS auditor should identify the databases that are relevant to the audit based on factors such as their criticality, risk, complexity, size, type, location, and ownership. The IS auditor should also consider the regulatory, contractual, and organizational requirements that apply to the databases. By defining the scope clearly and accurately, the IS auditor can ensure that the audit is focused, feasible, and effective.Reference:

CISA Review Manual (Digital Version)

CISA Questions, Answers & Explanations Database

What is the GREATEST concern for an IS auditor reviewing contracts for licensed software that executes a critical business process?

A.
The contract does not contain a right-to-audit clause.
A.
The contract does not contain a right-to-audit clause.
Answers
B.
An operational level agreement (OLA) was not negotiated.
B.
An operational level agreement (OLA) was not negotiated.
Answers
C.
Several vendor deliverables missed the commitment date.
C.
Several vendor deliverables missed the commitment date.
Answers
D.
Software escrow was not negotiated.
D.
Software escrow was not negotiated.
Answers
Suggested answer: D

Explanation:

The greatest concern for an IS auditor reviewing contracts for licensed software that executes a critical business process is that software escrow was not negotiated. Software escrow is an arrangement where a third-party holds a copy of the source code and documentation of a licensed software in a secure location. The software escrow agreement specifies the conditions under which the licensee can access the escrowed materials, such as in case of bankruptcy, termination, or breach of contract by the licensor. Software escrow is important for ensuring the continuity and availability of a critical business process that depends on a licensed software. Without software escrow, the licensee may face significant risks and challenges in maintaining, modifying, or recovering the software in case of any disruption or dispute with the licensor.Reference:

CISA Review Manual (Digital Version)

CISA Questions, Answers & Explanations Database

During a follow-up audit, an IS auditor finds that some critical recommendations have the IS auditor's BEST course of action?

A.
Require the auditee to address the recommendations in full.
A.
Require the auditee to address the recommendations in full.
Answers
B.
Adjust the annual risk assessment accordingly.
B.
Adjust the annual risk assessment accordingly.
Answers
C.
Evaluate senior management's acceptance of the risk.
C.
Evaluate senior management's acceptance of the risk.
Answers
D.
Update the audit program based on management's acceptance of risk.
D.
Update the audit program based on management's acceptance of risk.
Answers
Suggested answer: C

Explanation:

The best course of action for an IS auditor who finds that some critical recommendations have not been implemented is to evaluate senior management's acceptance of the risk. The IS auditor should understand the reasons why the recommendations have not been implemented and the implications for the organization's risk exposure. The IS auditor should also verify that senior management has formally acknowledged and accepted the residual risk and has documented the rationale and justification for their decision. The IS auditor should communicate the findings and the risk acceptance to the audit committee and other relevant stakeholders.Reference:

CISA Review Manual (Digital Version)

CISA Questions, Answers & Explanations Database

An IT balanced scorecard is the MOST effective means of monitoring:

A.
governance of enterprise IT.
A.
governance of enterprise IT.
Answers
B.
control effectiveness.
B.
control effectiveness.
Answers
C.
return on investment (ROI).
C.
return on investment (ROI).
Answers
D.
change management effectiveness.
D.
change management effectiveness.
Answers
Suggested answer: A

Explanation:

An IT balanced scorecard is a strategic management tool that aligns IT objectives with business goals and measures the performance of IT processes using key performance indicators (KPIs). It is the most effective means of monitoring governance of enterprise IT, which is the process of ensuring that IT supports the organization's strategy and objectives. Governance of enterprise IT covers aspects such as IT value delivery, IT risk management, IT resource management, and IT performance measurement. An IT balanced scorecard can help monitor these aspects and provide feedback to improve IT governance.Reference:ISACA Frameworks: Blueprints for Success,CISA Review Manual (Digital Version)

When reviewing an organization's information security policies, an IS auditor should verify that the policies have been defined PRIMARILY on the basis of:

A.
a risk management process.
A.
a risk management process.
Answers
B.
an information security framework.
B.
an information security framework.
Answers
C.
past information security incidents.
C.
past information security incidents.
Answers
D.
industry best practices.
D.
industry best practices.
Answers
Suggested answer: A

Explanation:

Information security policies are high-level statements that define the organization's approach to protecting its information assets from threats and risks. They should be based primarily on a risk management process, which is a systematic method of identifying, analyzing, evaluating, treating, and monitoring information security risks. A risk management process can help ensure that the policies are aligned with the organization's risk appetite, business objectives, legal and regulatory requirements, and stakeholder expectations. An information security framework is a set of standards, guidelines, and best practices that provide a structure for implementing information security policies. It can support the risk management process, but it is not the primary basis for defining the policies. Past information security incidents and industry best practices can also provide valuable inputs for defining the policies, but they are not sufficient to address the organization's specific context and needs.Reference:Insights and Expertise,CISA Review Manual (Digital Version)

Which of the following would be an IS auditor's GREATEST concern when reviewing the early stages of a software development project?

A.
The lack of technical documentation to support the program code
A.
The lack of technical documentation to support the program code
Answers
B.
The lack of completion of all requirements at the end of each sprint
B.
The lack of completion of all requirements at the end of each sprint
Answers
C.
The lack of acceptance criteria behind user requirements.
C.
The lack of acceptance criteria behind user requirements.
Answers
D.
The lack of a detailed unit and system test plan
D.
The lack of a detailed unit and system test plan
Answers
Suggested answer: C

Explanation:

User requirements are statements that describe what the users expect from the software system in terms of functionality, quality, and usability. They are essential inputs for the software development process, as they guide the design, implementation, testing, and deployment of the system. Therefore, an IS auditor's greatest concern when reviewing the early stages of a software development project would be the lack of acceptance criteria behind user requirements. Acceptance criteria are measurable conditions that define when a user requirement is met or satisfied. They help ensure that the user requirements are clear, complete, consistent, testable, and verifiable. Without acceptance criteria, it would be difficult to evaluate whether the system meets the user expectations and delivers value to the organization. Technical documentation, such as program code, is usually produced in later stages of the software development process. Completion of all requirements at the end of each sprint is not mandatory in agile software development methods, as long as there is a prioritized backlog of requirements that can be delivered incrementally. A detailed unit and system test plan is also important for ensuring software quality, but it depends on well-defined user requirements and acceptance criteria.Reference:Information Systems Acquisition, Development & Implementation,CISA Review Manual (Digital Version)

Total 1.198 questions
Go to page: of 120