ExamGecko
Home Home / Isaca / CISA

Isaca CISA Practice Test - Questions Answers, Page 28

Question list
Search
Search

List of questions

Search

Related questions











Which of the following would MOST effectively ensure the integrity of data transmitted over a network?

A.
Message encryption
A.
Message encryption
Answers
B.
Certificate authority (CA)
B.
Certificate authority (CA)
Answers
C.
Steganography
C.
Steganography
Answers
D.
Message digest
D.
Message digest
Answers
Suggested answer: D

Explanation:

The most effective way to ensure the integrity of data transmitted over a network is to use a message digest. A message digest is a cryptographic function that generates a unique and fixed-length value (also known as a hash or checksum) from any input data. The message digest can be used to verify that the data has not been altered or corrupted during transmission by comparing it with the message digest generated at the destination. Message encryption is a method of protecting the confidentiality of data transmitted over a network by transforming it into an unreadable format using a secret key. Message encryption does not ensure the integrity of data, as it does not prevent or detect unauthorized modifications. Certificate authority (CA) is an entity that issues and manages digital certificates that bind public keys to identities. CA does not ensure the integrity of data, as it does not prevent or detect unauthorized modifications. Steganography is a technique of hiding data within other data, such as images or audio files. Steganography does not ensure the integrity of data, as it does not prevent or detect unauthorized modifications.Reference:

CISA Review Manual, 27th Edition, pages 383-3841

CISA Review Questions, Answers & Explanations Database, Question ID: 258

Which of the following should be an IS auditor's GREATEST concern when an international organization intends to roll out a global data privacy policy?

A.
Requirements may become unreasonable.
A.
Requirements may become unreasonable.
Answers
B.
The policy may conflict with existing application requirements.
B.
The policy may conflict with existing application requirements.
Answers
C.
Local regulations may contradict the policy.
C.
Local regulations may contradict the policy.
Answers
D.
Local management may not accept the policy.
D.
Local management may not accept the policy.
Answers
Suggested answer: C

Explanation:

The greatest concern for an IS auditor when an international organization intends to roll out a global data privacy policy is that local regulations may contradict the policy. Data privacy regulations vary across different countries and regions, and they may impose different or conflicting requirements on how personal data can be collected, processed, stored, transferred, and disclosed. The organization should ensure that its global data privacy policy complies with the applicable local regulations in each jurisdiction where it operates, or risk facing legal sanctions or reputational damage. Requirements may become unreasonable, but this is not a major concern for an IS auditor, as it is a business decision that should be based on a cost-benefit analysis. The policy may conflict with existing application requirements, but this is not a serious concern for an IS auditor, as it can be resolved by modifying or updating the applications to align with the policy. Local management may not accept the policy, but this is not a critical concern for an IS auditor, as it can be mitigated by providing adequate training and awareness on the policy and its benefits.Reference:

CISA Review Manual, 27th Edition, pages 406-4071

CISA Review Questions, Answers & Explanations Database, Question ID: 2592

An IS auditor finds a high-risk vulnerability in a public-facing web server used to process online customer payments. The IS auditor should FIRST

A.
document the exception in an audit report.
A.
document the exception in an audit report.
Answers
B.
review security incident reports.
B.
review security incident reports.
Answers
C.
identify compensating controls.
C.
identify compensating controls.
Answers
D.
notify the audit committee.
D.
notify the audit committee.
Answers
Suggested answer: C

Explanation:

The first action that an IS auditor should take when finding a high-risk vulnerability in a public-facing web server used to process online customer payments is to identify compensating controls. Compensating controls are alternative or additional controls that provide reasonable assurance of mitigating the risk of exploiting the vulnerability. The IS auditor should assess the effectiveness of the compensating controls and determine whether they reduce the risk to an acceptable level. If not, the IS auditor should recommend remediation actions to address the vulnerability. Documenting the exception in an audit report is an important action, but it should not be the first action, as it does not address the urgency of the situation. Reviewing security incident reports is a useful action, but it should not be the first action, as it does not provide assurance of preventing future incidents. Notifying the audit committee is a necessary action, but it should not be the first action, as it does not involve taking any corrective measures.Reference:

CISA Review Manual, 27th Edition, pages 295-2961

CISA Review Questions, Answers & Explanations Database, Question ID: 260

Stress testing should ideally be earned out under a:

A.
test environment with production workloads.
A.
test environment with production workloads.
Answers
B.
production environment with production workloads.
B.
production environment with production workloads.
Answers
C.
production environment with test data.
C.
production environment with test data.
Answers
D.
test environment with test data.
D.
test environment with test data.
Answers
Suggested answer: A

Explanation:

Stress testing is a type of performance testing that evaluates the behavior and reliability of a system under extreme conditions, such as high workload, limited resources, or concurrent users. Stress testing should ideally be carried out under a test environment with production workloads, as this would simulate the most realistic and demanding scenario for the system without affecting the actual production environment. A production environment with production workloads is not suitable for stress testing, as it could cause disruption or damage to the system and its users. A production environment with test data is not suitable for stress testing, as it could compromise the integrity and security of the production data. A test environment with test data is not suitable for stress testing, as it could underestimate the potential issues and risks that could occur in the production environment.Reference:

CISA Review Manual, 27th Edition, pages 471-4721

CISA Review Questions, Answers & Explanations Database, Question ID: 261

An organization was recently notified by its regulatory body of significant discrepancies in its reporting data. A preliminary investigation revealed that the discrepancies were caused by problems with the organization's data quality Management has directed the data quality team to enhance their program. The audit committee has asked internal audit to be advisors to the process. To ensure that management concerns are addressed, which data set should internal audit recommend be reviewed FIRST?

A.
Data with customer personal information
A.
Data with customer personal information
Answers
B.
Data reported to the regulatory body
B.
Data reported to the regulatory body
Answers
C.
Data supporting financial statements
C.
Data supporting financial statements
Answers
D.
Data impacting business objectives
D.
Data impacting business objectives
Answers
Suggested answer: B

Explanation:

To ensure that management concerns are addressed, internal audit should recommend that the data quality team review the data reported to the regulatory body first. This is because this data set is the most relevant and critical to the issue that triggered the enhancement of the data quality program. The data reported to the regulatory body should be accurate, complete, consistent, and timely, as any discrepancies could result in fines, penalties, or reputational damage for the organization. Data with customer personal information is important for data quality, but it is not directly related to the regulatory reporting issue. Data supporting financial statements is important for data quality, but it may not be the same as the data reported to the regulatory body. Data impacting business objectives is important for data quality, but it may not be as urgent or sensitive as the data reported to the regulatory body.Reference:

CISA Review Manual, 27th Edition, pages 404-4051

CISA Review Questions, Answers & Explanations Database, Question ID: 262

Due to a recent business divestiture, an organization has limited IT resources to deliver critical projects Reviewing the IT staffing plan against which of the following would BEST guide IT management when estimating resource requirements for future projects?

A.
Human resources (HR) sourcing strategy
A.
Human resources (HR) sourcing strategy
Answers
B.
Records of actual time spent on projects
B.
Records of actual time spent on projects
Answers
C.
Peer organization staffing benchmarks
C.
Peer organization staffing benchmarks
Answers
D.
Budgeted forecast for the next financial year
D.
Budgeted forecast for the next financial year
Answers
Suggested answer: B

Explanation:

The best source of information for IT management to estimate resource requirements for future projects is the records of actual time spent on projects. This data can provide a realistic and reliable basis for forecasting future resource needs based on historical trends and patterns. The records of actual time spent on projects can also help IT management to identify any gaps or inefficiencies in resource allocation and utilization. The human resources (HR) sourcing strategy is not a good source of information for estimating resource requirements for future projects, as it may not reflect the actual demand and availability of IT resources. The peer organization staffing benchmarks are not a good source of information for estimating resource requirements for future projects, as they may not account for the specific characteristics and needs of each organization. The budgeted forecast for the next financial year is not a good source of information for estimating resource requirements for future projects, as it may not be based on accurate or realistic assumptions.Reference:

CISA Review Manual, 27th Edition, pages 465-4661

CISA Review Questions, Answers & Explanations Database, Question ID: 263

Which of the following environments is BEST used for copying data and transformation into a compatible data warehouse format?

A.
Testing
A.
Testing
Answers
B.
Replication
B.
Replication
Answers
C.
Staging
C.
Staging
Answers
D.
Development
D.
Development
Answers
Suggested answer: C

Explanation:

The best environment for copying data and transforming it into a compatible data warehouse format is the staging environment. The staging environment is a temporary area where data from various sources are extracted, transformed, and loaded (ETL) before being moved to the data warehouse. The staging environment allows for data cleansing, validation, integration, and standardization without affecting the source or target systems. The testing environment is not suitable for copying data and transforming it into a compatible data warehouse format, as it is used for verifying and validating the functionality and performance of applications or systems. The replication environment is not suitable for copying data and transforming it into a compatible data warehouse format, as it is used for creating identical copies of data or systems for backup or recovery purposes. The development environment is not suitable for copying data and transforming it into a compatible data warehouse format, as it is used for creating or modifying applications or systems.Reference:

CISA Review Manual, 27th Edition, pages 475-4761

CISA Review Questions, Answers & Explanations Database, Question ID: 2642

Which of the following would be of MOST concern for an IS auditor evaluating the design of an organization's incident management processes?

A.
Service management standards are not followed.
A.
Service management standards are not followed.
Answers
B.
Expected time to resolve incidents is not specified.
B.
Expected time to resolve incidents is not specified.
Answers
C.
Metrics are not reported to senior management.
C.
Metrics are not reported to senior management.
Answers
D.
Prioritization criteria are not defined.
D.
Prioritization criteria are not defined.
Answers
Suggested answer: D

Explanation:

he design of an incident management process should include prioritization criteria to ensure that incidents are handled according to their impact and urgency. Without prioritization criteria, the organization may not be able to allocate resources effectively and respond to incidents in a timely manner. Expected time to resolve incidents, service management standards, and metrics reporting are important aspects of incident management, but they are not as critical as prioritization criteria for the design of the process.Reference:ISACA Journal Article: Incident Management: A Practical Approach

What is the MAIN reason to use incremental backups?

A.
To improve key availability metrics
A.
To improve key availability metrics
Answers
B.
To reduce costs associates with backups
B.
To reduce costs associates with backups
Answers
C.
To increase backup resiliency and redundancy
C.
To increase backup resiliency and redundancy
Answers
D.
To minimize the backup time and resources
D.
To minimize the backup time and resources
Answers
Suggested answer: D

Explanation:

Incremental backups are backups that only copy the data that has changed since the last backup, whether it was a full or incremental backup. The main reason to use incremental backups is to minimize the backup time and resources, as they require less storage space and network bandwidth than full backups. Incremental backups can also improve key availability metrics, such as recovery point objective (RPO) and recovery time objective (RTO), but that is not their primary purpose. Reducing costs associated with backups and increasing backup resiliency and redundancy are possible benefits of incremental backups, but they depend on other factors, such as the backup frequency, retention policy, and media type.Reference:CISA Review Manual (Digital Version): Chapter 5 - Information Systems Operations and Business Resilience

An organization plans to receive an automated data feed into its enterprise data warehouse from a third-party service provider. Which of the following would be the BEST way to prevent accepting bad data?

A.
Obtain error codes indicating failed data feeds.
A.
Obtain error codes indicating failed data feeds.
Answers
B.
Purchase data cleansing tools from a reputable vendor.
B.
Purchase data cleansing tools from a reputable vendor.
Answers
C.
Appoint data quality champions across the organization.
C.
Appoint data quality champions across the organization.
Answers
D.
Implement business rules to reject invalid data.
D.
Implement business rules to reject invalid data.
Answers
Suggested answer: D

Explanation:

The best way to prevent accepting bad data from a third-party service provider is to implement business rules to reject invalid data. Business rules are logical statements that define the data quality requirements and standards for the organization. By implementing business rules, the organization can ensure that only data that meets the predefined criteria is accepted into the enterprise data warehouse. Obtaining error codes indicating failed data feeds, purchasing data cleansing tools from a reputable vendor, and appointing data quality champions across the organization are useful measures to improve data quality, but they do not prevent accepting bad data in the first place.Reference:ISACA Journal Article: Data Quality Management

Total 1.198 questions
Go to page: of 120