ExamGecko
Home Home / Isaca / CISA

Isaca CISA Practice Test - Questions Answers, Page 26

Question list
Search
Search

Related questions

For an organization that has plans to implement web-based trading, it would be MOST important for an IS auditor to verify the organization's information security plan includes:

A.
attributes for system passwords.
A.
attributes for system passwords.
Answers
B.
security training prior to implementation.
B.
security training prior to implementation.
Answers
C.
security requirements for the new application.
C.
security requirements for the new application.
Answers
D.
the firewall configuration for the web server.
D.
the firewall configuration for the web server.
Answers
Suggested answer: C

Explanation:

For an organization that has plans to implement web-based trading, it would be most important for an IS auditor to verify that the organization's information security plan includes security requirements for the new application. Security requirements are statements that define what security features and functions are needed to protect the confidentiality, integrity, and availability of the web-based trading application and its data. Security requirements should be identified and documented during the planning phase of the application development life cycle, before any design or coding activities take place. Attributes for system passwords, security training prior to implementation, and firewall configuration for the web server are also important aspects of information security, but they are not as essential as security requirements for ensuring that the web-based trading application meets its security objectives.

Upon completion of audit work, an IS auditor should:

A.
provide a report to senior management prior to discussion with the auditee.
A.
provide a report to senior management prior to discussion with the auditee.
Answers
B.
distribute a summary of general findings to the members of the auditing team.
B.
distribute a summary of general findings to the members of the auditing team.
Answers
C.
provide a report to the auditee stating the initial findings.
C.
provide a report to the auditee stating the initial findings.
Answers
D.
review the working papers with the auditee.
D.
review the working papers with the auditee.
Answers
Suggested answer: B

Explanation:

Upon completion of audit work, an IS auditor should distribute a summary of general findings to the members of the auditing team. This is to ensure that the audit team members are aware of the audit results, have an opportunity to provide feedback, and can agree on the audit conclusions and recommendations. Providing a report to senior management prior to discussion with the auditee, providing a report to the auditee stating the initial findings, and reviewing the working papers with the auditee are not appropriate actions for an IS auditor to take upon completion of audit work, as they may compromise the audit independence, objectivity, and quality.Reference:ISACA CISA Review Manual 27th Edition, page 221

During an audit of a multinational bank's disposal process, an IS auditor notes several findings. Which of the following should be the auditor's GREATEST concern?

A.
Backup media are not reviewed before disposal.
A.
Backup media are not reviewed before disposal.
Answers
B.
Degaussing is used instead of physical shredding.
B.
Degaussing is used instead of physical shredding.
Answers
C.
Backup media are disposed before the end of the retention period
C.
Backup media are disposed before the end of the retention period
Answers
D.
Hardware is not destroyed by a certified vendor.
D.
Hardware is not destroyed by a certified vendor.
Answers
Suggested answer: C

Explanation:

During an audit of a multinational bank's disposal process, an IS auditor should be most concerned about backup media being disposed before the end of the retention period. This is because backup media contain sensitive and critical data that may be required for business continuity, legal compliance, or forensic purposes. Disposing backup media prematurely may result in data loss, unavailability, or corruption, which may have severe consequences for the bank's reputation, operations, and security. Backup media not being reviewed before disposal, degaussing being used instead of physical shredding, and hardware not being destroyed by a certified vendor are also findings that may pose some risks to the bank's disposal process, but they are not as critical as backup media being disposed before the end of the retention period.Reference:ISACA CISA Review Manual 27th Edition, page 302.

Which of the following BEST enables the timely identification of risk exposure?

A.
External audit review
A.
External audit review
Answers
B.
Internal audit review
B.
Internal audit review
Answers
C.
Control self-assessment (CSA)
C.
Control self-assessment (CSA)
Answers
D.
Stress testing
D.
Stress testing
Answers
Suggested answer: C

Explanation:

Control self-assessment (CSA) is a technique that enables business managers and staff to assess and improve the effectiveness of their own controls and risk management processes. CSA can best enable the timely identification of risk exposure, as it allows for continuous monitoring and reporting of risks by those who are closest to the business processes and activities. External audit review, internal audit review, and stress testing are also useful methods for identifying risk exposure, but they are not as timely as CSA, as they are performed periodically or on demand by external or internal parties who may not have as much insight into the business operations and environment.Reference:ISACA CISA Review Manual 27th Edition, page 95.

What is the Most critical finding when reviewing an organization's information security management?

A.
No dedicated security officer
A.
No dedicated security officer
Answers
B.
No official charier for the information security management system
B.
No official charier for the information security management system
Answers
C.
No periodic assessments to identify threats and vulnerabilities
C.
No periodic assessments to identify threats and vulnerabilities
Answers
D.
No employee awareness training and education program
D.
No employee awareness training and education program
Answers
Suggested answer: C

Explanation:

The most critical finding when reviewing an organization's information security management is no periodic assessments to identify threats and vulnerabilities. Periodic assessments are essential for ensuring that the organization's information security policies, procedures, standards, and controls are aligned with the current and emerging risks and threats that may affect its information assets. Without periodic assessments, the organization may not be aware of its actual security posture, gaps, or weaknesses, and may not be able to take appropriate measures to mitigate or prevent potential security incidents. No dedicated security officer, no official charter for the information security management system, and no employee awareness training and education program are also findings that may indicate some deficiencies in the organization's information security management, but they are not as critical as no periodic assessments to identify threats and vulnerabilities.Reference:ISACA CISA Review Manual 27th Edition, page 343.

Which of the following would provide the MOST important input during the planning phase for an audit on the implementation of a bring your own device (BYOD) program?

A.
Findings from prior audits
A.
Findings from prior audits
Answers
B.
Results of a risk assessment
B.
Results of a risk assessment
Answers
C.
An inventory of personal devices to be connected to the corporate network
C.
An inventory of personal devices to be connected to the corporate network
Answers
D.
Policies including BYOD acceptable user statements
D.
Policies including BYOD acceptable user statements
Answers
Suggested answer: D

Explanation:

The most important input during the planning phase for an audit on the implementation of a bring your own device (BYOD) program is policies including BYOD acceptable user statements. Policies are documents that define the organization's objectives, requirements, expectations, and responsibilities regarding a specific topic or area. BYOD policies should include acceptable user statements that specify what types of personal devices are allowed to connect to the corporate network, what security measures must be implemented on those devices, what data can be accessed or stored on those devices, what actions must be taken in case of device loss or theft, and what consequences will apply for non-compliance. Policies including BYOD acceptable user statements can provide an IS auditor with a clear understanding of the scope, criteria, and objectives of the BYOD program audit. Findings from prior audits, results of a risk assessment, and an inventory of personal devices to be connected to the corporate network are also useful inputs for planning a BYOD program audit, but they are not as important as policies including BYOD acceptable user statements.Reference:ISACA CISA Review Manual 27th Edition, page 381.

Which of the following is a social engineering attack method?

A.
An employee is induced to reveal confidential IP addresses and passwords by answering questions over the phone.
A.
An employee is induced to reveal confidential IP addresses and passwords by answering questions over the phone.
Answers
B.
A hacker walks around an office building using scanning tools to search for a wireless network to gain access.
B.
A hacker walks around an office building using scanning tools to search for a wireless network to gain access.
Answers
C.
An intruder eavesdrops and collects sensitive information flowing through the network and sells it to third parties.
C.
An intruder eavesdrops and collects sensitive information flowing through the network and sells it to third parties.
Answers
D.
An unauthorized person attempts to gain access to secure premises by following an authorized person through a secure door.
D.
An unauthorized person attempts to gain access to secure premises by following an authorized person through a secure door.
Answers
Suggested answer: A

Explanation:

Social engineering is a technique that exploits human weaknesses, such as trust, curiosity, or greed, to obtain information or access from a target. An employee is induced to reveal confidential IP addresses and passwords by answering questions over the phone is an example of a social engineering attack method, as it involves manipulating the employee into divulging sensitive information that can be used to compromise the network or system. A hacker walks around an office building using scanning tools to search for a wireless network to gain access, an intruder eavesdrops and collects sensitive information flowing through the network and sells it to third parties, and an unauthorized person attempts to gain access to secure premises by following an authorized person through a secure door are not examples of social engineering attack methods, as they do not involve human interaction or deception.Reference:[ISACA CISA Review Manual 27th Edition], page 361.

The IS auditor has recommended that management test a new system before using it in production mode. The BEST approach for management in developing a test plan is to use processing parameters that are:

A.
randomly selected by a test generator.
A.
randomly selected by a test generator.
Answers
B.
provided by the vendor of the application.
B.
provided by the vendor of the application.
Answers
C.
randomly selected by the user.
C.
randomly selected by the user.
Answers
D.
simulated by production entities and customers.
D.
simulated by production entities and customers.
Answers
Suggested answer: D

Explanation:

The best approach for management in developing a test plan is to use processing parameters that are simulated by production entities and customers. This is because using realistic data and scenarios can help to evaluate the functionality, performance, reliability, and security of the new system under actual operating conditions and expectations. Using processing parameters that are randomly selected by a test generator, provided by the vendor of the application, or randomly selected by the user may not be sufficient or representative of the production environment and may not reveal all the potential issues or defects of the new system.Reference:[ISACA CISA Review Manual 27th Edition], page 266.

In which phase of penetration testing would host detection and domain name system (DNS) interrogation be performed?

A.
Discovery
A.
Discovery
Answers
B.
Attacks
B.
Attacks
Answers
C.
Planning
C.
Planning
Answers
D.
Reporting
D.
Reporting
Answers
Suggested answer: A

Explanation:

Penetration testing is a method of evaluating the security of a system or network by simulating an attack from a malicious source. Penetration testing typically consists of four phases: planning, discovery, attacks, and reporting. In the discovery phase, penetration testers gather information about the target system or network, such as host detection, domain name system (DNS) interrogation, port scanning, service identification, operating system fingerprinting, vulnerability scanning, etc. This information can help to identify potential entry points, weaknesses, or vulnerabilities that can be exploited in the subsequent attack phase. Host detection and DNS interrogation are techniques that can be used in the discovery phase to determine the active hosts and their IP addresses and hostnames on the target network.Reference:[ISACA CISA Review Manual 27th Edition], page 368.

Which of the following should an IS auditor consider the MOST significant risk associated with a new health records system that replaces a legacy system?

A.
Staff were not involved in the procurement process, creating user resistance to the new system.
A.
Staff were not involved in the procurement process, creating user resistance to the new system.
Answers
B.
Data is not converted correctly, resulting in inaccurate patient records.
B.
Data is not converted correctly, resulting in inaccurate patient records.
Answers
C.
The deployment project experienced significant overruns, exceeding budget projections.
C.
The deployment project experienced significant overruns, exceeding budget projections.
Answers
D.
The new system has capacity issues, leading to slow response times for users.
D.
The new system has capacity issues, leading to slow response times for users.
Answers
Suggested answer: B

Explanation:

The most significant risk associated with a new health records system that replaces a legacy system is data not being converted correctly, resulting in inaccurate patient records. Data conversion is the process of transferring data from one format or system to another. Data conversion is a critical step in implementing a new health records system, as it ensures that the patient data are consistent, complete, accurate, and accessible in the new system. Data not being converted correctly may cause errors, discrepancies, or losses in patient records, which may have serious implications for patient safety, quality of care, legal compliance, and privacy protection. Staff not being involved in the procurement process, creating user resistance to the new system; the deployment project experiencing significant overruns, exceeding budget projections; and the new system having capacity issues, leading to slow response times for users are also risks associated with a new health records system implementation, but they are not as significant as data not being converted correctly.Reference:[ISACA CISA Review Manual 27th Edition], page 281.

Total 1.198 questions
Go to page: of 120