ExamGecko
Home / Isaca / CISA / List of questions
Ask Question

Isaca CISA Practice Test - Questions Answers, Page 24

Add to Whishlist

List of questions

Question 231

Report Export Collapse

Which of the following activities would allow an IS auditor to maintain independence while facilitating a control sell-assessment (CSA)?

Implementing the remediation plan
Implementing the remediation plan
Partially completing the CSA
Partially completing the CSA
Developing the remediation plan
Developing the remediation plan
Developing the CSA questionnaire
Developing the CSA questionnaire
Suggested answer: D
Explanation:

Developing the CSA questionnaire is an activity that would allow an IS auditor to maintain independence while facilitating a control self-assessment (CSA). An IS auditor can design and provide a CSA questionnaire to help the business units or process owners to evaluate their own controls and identify any issues or improvement opportunities. This will enable an IS auditor to support and guide the CSA process without compromising their objectivity or independence. The other options are activities that would impair an IS auditor's independence while facilitating a CSA, as they involve implementing, completing, or developing remediation actions for control issues.Reference:

CISA Review Manual (Digital Version), Chapter 2, Section 2.41

CISA Review Questions, Answers & Explanations Database, Question ID 215

asked 18/09/2024
Christoph Reithmayr
44 questions

Question 232

Report Export Collapse

Which of the following would be an appropriate rote of internal audit in helping to establish an organization's privacy program?

Analyzing risks posed by new regulations
Analyzing risks posed by new regulations
Designing controls to protect personal data
Designing controls to protect personal data
Defining roles within the organization related to privacy
Defining roles within the organization related to privacy
Developing procedures to monitor the use of personal data
Developing procedures to monitor the use of personal data
Suggested answer: A
Explanation:

Analyzing risks posed by new regulations is an appropriate role of internal audit in helping to establish an organization's privacy program. An internal auditor can provide assurance and advisory services on the compliance and effectiveness of the privacy program, as well as identify and assess the potential risks and impacts of new or changing privacy regulations. The other options are not appropriate roles of internal audit, but rather the responsibilities of the management, the information security officer, or the privacy officer.Reference:

CISA Review Manual (Digital Version), Chapter 7, Section 7.4.21

CISA Review Questions, Answers & Explanations Database, Question ID 216

asked 18/09/2024
miguel sartori
40 questions

Question 233

Report Export Collapse

Which of the following occurs during the issues management process for a system development project?

Contingency planning
Contingency planning
Configuration management
Configuration management
Help desk management
Help desk management
Impact assessment
Impact assessment
Suggested answer: D
Explanation:

Impact assessment is an activity that occurs during the issues management process for a system development project. Issues management is a process of identifying, analyzing, resolving, and monitoring issues that may affect the project scope, schedule, budget, or quality. Impact assessment is a technique of evaluating the severity and priority of an issue, as well as its implications for the project objectives and deliverables. The other options are not activities that occur during the issues management process, but rather related to other processes such as contingency planning, configuration management, or help desk management.Reference:

CISA Review Manual (Digital Version), Chapter 4, Section 4.3.31

CISA Review Questions, Answers & Explanations Database, Question ID 217

asked 18/09/2024
Braden Houser
39 questions

Question 234

Report Export Collapse

Which of the following findings from an IT governance review should be of GREATEST concern?

The IT budget is not monitored
The IT budget is not monitored
All IT services are provided by third parties.
All IT services are provided by third parties.
IT value analysis has not been completed.
IT value analysis has not been completed.
IT supports two different operating systems.
IT supports two different operating systems.
Suggested answer: C
Explanation:

IT value analysis has not been completed is a finding from an IT governance review that should be of greatest concern. IT value analysis is a process of measuring and demonstrating the contribution of IT to the organization's goals and objectives. An IS auditor should be concerned about the lack of IT value analysis, as it may indicate that the IT investments and resources are not aligned with the business needs and expectations, or that the IT performance and outcomes are not monitored and evaluated. The other options are less critical findings that may not have a significant impact on the IT governance.Reference:

CISA Review Manual (Digital Version), Chapter 5, Section 5.11

CISA Review Questions, Answers & Explanations Database, Question ID 218

asked 18/09/2024
Micele Mercer
43 questions

Question 235

Report Export Collapse

A month after a company purchased and implemented system and performance monitoring software, reports were too large and therefore were not reviewed or acted upon The MOST effective plan of action would be to:

evaluate replacement systems and performance monitoring software.
evaluate replacement systems and performance monitoring software.
restrict functionality of system monitoring software to security-related events.
restrict functionality of system monitoring software to security-related events.
re-install the system and performance monitoring software.
re-install the system and performance monitoring software.
use analytical tools to produce exception reports from the system and performance monitoring software
use analytical tools to produce exception reports from the system and performance monitoring software
Suggested answer: D
Explanation:

Using analytical tools to produce exception reports from the system and performance monitoring software is the most effective plan of action for a company that purchased and implemented system and performance monitoring software. Exception reports are reports that highlight deviations or anomalies from predefined thresholds or standards. Using analytical tools to produce exception reports can help to reduce the size and complexity of the system and performance monitoring reports, as well as to focus on the most relevant and critical information for review and action. The other options are less effective plans of action, as they may involve unnecessary costs, risks, or efforts.Reference:

CISA Review Manual (Digital Version), Chapter 4, Section 4.2.21

CISA Review Questions, Answers & Explanations Database, Question ID 219

asked 18/09/2024
ABDOUL RAZAK TIENDREBEOGO
30 questions

Question 236

Report Export Collapse

An organization that has suffered a cyber-attack is performing a forensic analysis of the affected users' computers. Which of the following should be of GREATEST concern for the IS auditor reviewing this process?

An imaging process was used to obtain a copy of the data from each computer.
An imaging process was used to obtain a copy of the data from each computer.
The legal department has not been engaged.
The legal department has not been engaged.
The chain of custody has not been documented.
The chain of custody has not been documented.
Audit was only involved during extraction of the Information
Audit was only involved during extraction of the Information
Suggested answer: C
Explanation:

The chain of custody has not been documented is a finding that should be of greatest concern for an IS auditor reviewing a forensic analysis process of an organization that has suffered a cyber attack. The chain of custody is a record of who handled, accessed, or modified the evidence during a forensic investigation. Documenting the chain of custody is essential to preserve the integrity, authenticity, and admissibility of the evidence in a court of law. The other options are less concerning findings that may not affect the validity or reliability of the forensic analysis process.Reference:

CISA Review Manual (Digital Version), Chapter 7, Section 7.51

CISA Review Questions, Answers & Explanations Database, Question ID 220

asked 18/09/2024
NEURONES TECHNOLOGIES
51 questions

Question 237

Report Export Collapse

A new regulation in one country of a global organization has recently prohibited cross-border transfer of personal data. An IS auditor has been asked to determine the organization's level of exposure In the affected country. Which of the following would be MOST helpful in making this assessment?

Developing an inventory of all business entities that exchange personal data with the affected jurisdiction
Developing an inventory of all business entities that exchange personal data with the affected jurisdiction
Identifying data security threats in the affected jurisdiction
Identifying data security threats in the affected jurisdiction
Reviewing data classification procedures associated with the affected jurisdiction
Reviewing data classification procedures associated with the affected jurisdiction
Identifying business processes associated with personal data exchange with the affected jurisdiction
Identifying business processes associated with personal data exchange with the affected jurisdiction
Suggested answer: D
Explanation:

Identifying business processes associated with personal data exchange with the affected jurisdiction is the most helpful activity in making an assessment of the organization's level of exposure in the affected country. An IS auditor should understand how the organization's business operations and functions rely on or involve the cross-border transfer of personal data, as well as the potential impacts and risks of the new regulation on the business continuity and compliance. The other options are less helpful activities that may provide additional information or context for the assessment, but not its primary focus.Reference:

CISA Review Manual (Digital Version), Chapter 7, Section 7.4.21

CISA Review Questions, Answers & Explanations Database, Question ID 221

asked 18/09/2024
Arash Farivarmoheb
47 questions

Question 238

Report Export Collapse

Which of the following is MOST important for an IS auditor to do during an exit meeting with an auditee?

Ensure that the facts presented in the report are correct
Ensure that the facts presented in the report are correct
Communicate the recommendations lo senior management
Communicate the recommendations lo senior management
Specify implementation dates for the recommendations.
Specify implementation dates for the recommendations.
Request input in determining corrective action.
Request input in determining corrective action.
Suggested answer: A
Explanation:

Ensuring that the facts presented in the report are correct is the most important thing for an IS auditor to do during an exit meeting with an auditee. An IS auditor should confirm that the audit findings and observations are accurate, complete, and supported by sufficient evidence, as well as that the auditee understands and agrees with them. This will help to avoid any misunderstandings or disputes later on, as well as to enhance the credibility and quality of the audit report. The other options are less important things for an IS auditor to do during an exit meeting, as they may involve communicating the recommendations to senior management, specifying implementation dates for the recommendations, or requesting input in determining corrective action.Reference:

CISA Review Manual (Digital Version), Chapter 2, Section 2.5.21

CISA Review Questions, Answers & Explanations Database, Question ID 222

asked 18/09/2024
Liam Derwin
52 questions

Question 239

Report Export Collapse

Which of the following controls BEST ensures appropriate segregation of dudes within an accounts payable department?

Ensuring that audit trails exist for transactions
Ensuring that audit trails exist for transactions
Restricting access to update programs to accounts payable staff only
Restricting access to update programs to accounts payable staff only
Including the creator's user ID as a field in every transaction record created
Including the creator's user ID as a field in every transaction record created
Restricting program functionality according to user security profiles
Restricting program functionality according to user security profiles
Suggested answer: D
Explanation:

Restricting program functionality according to user security profiles is the best control for ensuring appropriate segregation of duties within an accounts payable department. An IS auditor should verify that the access rights and permissions of the accounts payable staff are based on their roles and responsibilities, and that they are not able to perform incompatible or conflicting functions such as creating, approving, or paying invoices. This will help to prevent fraud, errors, or abuse of authority within the accounts payable process. The other options are less effective controls for ensuring segregation of duties, as they may involve audit trails, access restrictions, or user identification.Reference:

CISA Review Manual (Digital Version), Chapter 6, Section 6.31

CISA Review Questions, Answers & Explanations Database, Question ID 223

asked 18/09/2024
Christian Weber
42 questions

Question 240

Report Export Collapse

An internal audit department recently established a quality assurance (QA) program. Which of the following activities Is MOST important to include as part of the QA program requirements?

Long-term Internal audit resource planning
Long-term Internal audit resource planning
Ongoing monitoring of the audit activities
Ongoing monitoring of the audit activities
Analysis of user satisfaction reports from business lines
Analysis of user satisfaction reports from business lines
Feedback from Internal audit staff
Feedback from Internal audit staff
Suggested answer: B
Explanation:

Ongoing monitoring of the audit activities is the most important activity to include as part of the quality assurance (QA) program requirements for an internal audit department. An IS auditor should perform regular reviews and evaluations of the audit processes, methods, standards, and outcomes to ensure that they comply with the QA program objectives and criteria. This will help to maintain and improve the quality and consistency of the audit services and deliverables. The other options are less important activities to include as part of the QA program requirements, as they may involve long-term resource planning, user satisfaction reports, or feedback from internal audit staff.Reference:

CISA Review Manual (Digital Version), Chapter 2, Section 2.61

CISA Review Questions, Answers & Explanations Database, Question ID 224

asked 18/09/2024
Yahya Ozer
39 questions
Total 1.402 questions
Go to page: of 141
Search

Related questions