ExamGecko
Home / Isaca / CISA / List of questions
Ask Question

Isaca CISA Practice Test - Questions Answers, Page 3

Add to Whishlist

List of questions

Question 21

Report Export Collapse

Which of the following is the BEST data integrity check?

Counting the transactions processed per day
Counting the transactions processed per day
Performing a sequence check
Performing a sequence check
Tracing data back to the point of origin
Tracing data back to the point of origin
Preparing and running test data
Preparing and running test data
Suggested answer: C
Explanation:

Data integrity is the property that ensures that data is accurate, complete, consistent, and reliable throughout its lifecycle. The best data integrity check is tracing data back to the point of origin, which is the source where the data was originally created or captured. This check can verify that data has not been altered or corrupted during transmission, processing, or storage. It can also identify any errors or discrepancies in data entry or conversion. Counting the transactions processed per day is a performance measure that does not directly assess data integrity. Performing a sequence check is a validity check that ensures that data follows a predefined order or pattern. It can detect missing or out-of-order data elements, but it cannot verify their accuracy or completeness. Preparing and running test data is a testing technique that simulates real data to evaluate how a system handles different scenarios. It can help identify errors or bugs in the system logic or functionality, but it cannot ensure data integrity in production environments.Reference:Information Systems Operations and Business Resilience,CISA Review Manual (Digital Version)

asked 18/09/2024
Kaddy Kabuya
54 questions

Question 22

Report Export Collapse

Spreadsheets are used to calculate project cost estimates. Totals for each cost category are then keyed into the job-costing system. What is the BEST control to ensure that data is accurately entered into the system?

Reconciliation of total amounts by project
Reconciliation of total amounts by project
Validity checks, preventing entry of character data
Validity checks, preventing entry of character data
Reasonableness checks for each cost type
Reasonableness checks for each cost type
Display the back of the project detail after the entry
Display the back of the project detail after the entry
Suggested answer: A
Explanation:

Reconciliation of total amounts by project is the best control to ensure that data is accurately entered into the job-costing system from spreadsheets. Reconciliation is a process of comparing two sets of data to identify any differences or discrepancies between them. By reconciling the total amounts by project from spreadsheets with those from the job-costing system, any errors or omissions in data entry can be detected and corrected. Validity checks are controls that verify that data conforms to predefined formats or ranges. They can prevent entry of character data into numeric fields, but they cannot ensure that the numeric data is correct or complete. Reasonableness checks are controls that verify that data is within expected or acceptable limits. They can detect outliers or anomalies in data, but they cannot ensure that the data matches the source. Display back of project detail after entry is a control that allows the user to review and confirm the data entered into the system. It can help reduce human errors, but it cannot guarantee that the data is accurate or consistent with the source.Reference:Information Systems Operations and Business Resilience,CISA Review Manual (Digital Version)

asked 18/09/2024
JULIUS BALNEG
42 questions

Question 23

Report Export Collapse

An incorrect version of the source code was amended by a development team. This MOST likely indicates a weakness in:

incident management.
incident management.
quality assurance (QA).
quality assurance (QA).
change management.
change management.
project management.
project management.
Suggested answer: C
Explanation:

A weakness in change management is the most likely cause of an incorrect version of source code being amended by a development team. Change management is the process of controlling and documenting changes to IT systems and software. It ensures that changes are authorized, tested, and implemented in a controlled manner. If change management is weak, there is a risk of using outdated or incorrect versions of source code, which can lead to errors, defects, or security vulnerabilities in the software.

asked 18/09/2024
Massimiliano Parisi
45 questions

Question 24

Report Export Collapse

An organizations audit charier PRIMARILY:

describes the auditors' authority to conduct audits.
describes the auditors' authority to conduct audits.
defines the auditors' code of conduct.
defines the auditors' code of conduct.
formally records the annual and quarterly audit plans.
formally records the annual and quarterly audit plans.
documents the audit process and reporting standards.
documents the audit process and reporting standards.
Suggested answer: A
Explanation:

An organization's audit charter primarily describes the auditors' authority to conduct audits. The audit charter is a formal document that defines the purpose, scope, responsibilities, and reporting relationships of the internal audit function. It also establishes the auditors' right of access to information, records, personnel, and physical properties relevant to their work. The audit charter provides the basis for the auditors' independence and accountability to the governing body and senior management.

asked 18/09/2024
Melih Sivrikaya
40 questions

Question 25

Report Export Collapse

The decision to accept an IT control risk related to data quality should be the responsibility of the:

information security team.
information security team.
IS audit manager.
IS audit manager.
chief information officer (CIO).
chief information officer (CIO).
business owner.
business owner.
Suggested answer: D
Explanation:

The decision to accept an IT control risk related to data quality should be the responsibility of the business owner. The business owner is the person who has the authority and accountability for the business process that relies on the data quality. The business owner should understand the impact of data quality issues on the business objectives, performance, and compliance. The business owner should also be involved in defining the data quality requirements, assessing the data quality risks, and implementing the data quality controls or mitigation strategies.

asked 18/09/2024
Hany Mohammed
45 questions

Question 26

Report Export Collapse

Which of the following data would be used when performing a business impact analysis (BIA)?

Projected impact of current business on future business
Projected impact of current business on future business
Cost-benefit analysis of running the current business
Cost-benefit analysis of running the current business
Cost of regulatory compliance
Cost of regulatory compliance
Expected costs for recovering the business
Expected costs for recovering the business
Suggested answer: D
Explanation:

The expected costs for recovering the business would be used when performing a business impact analysis (BIA). A BIA is a process of identifying and evaluating the potential effects of disruptions to critical business functions or processes. A BIA helps to determine the recovery priorities, strategies, and resources needed to resume normal operations after a disruption. One of the key outputs of a BIA is an estimate of the financial losses or costs associated with different types of disruptions, such as lost revenue, increased expenses, contractual penalties, or regulatory fines.

asked 18/09/2024
Yohan Frachisse
33 questions

Question 27

Report Export Collapse

Which of the following is the MOST important consideration for an IS auditor when assessing the adequacy of an organization's information security policy?

Alignment with the IT tactical plan
Alignment with the IT tactical plan
IT steering committee minutes
IT steering committee minutes
Compliance with industry best practice
Compliance with industry best practice
Business objectives
Business objectives
Suggested answer: D
Explanation:

The most important consideration for an IS auditor when assessing the adequacy of an organization's information security policy is its alignment with the business objectives. The information security policy is a high-level document that defines the organization's vision, goals, principles, and responsibilities for protecting its information assets. The information security policy should support and enable the achievement of the business objectives, such as increasing customer satisfaction, enhancing competitive advantage, or complying with legal requirements. The information security policy should also be consistent with other relevant policies, standards, and frameworks that guide the organization's governance, risk management, and compliance activities.

asked 18/09/2024
JEROME SANANES
46 questions

Question 28

Report Export Collapse

During the evaluation of controls over a major application development project, the MOST effective use of an IS auditor's time would be to review and evaluate:

application test cases.
application test cases.
acceptance testing.
acceptance testing.
cost-benefit analysis.
cost-benefit analysis.
project plans.
project plans.
Suggested answer: A
Explanation:

Reviewing and evaluating application test cases is the most effective use of an IS auditor's time during the evaluation of controls over a major application development project. Application test cases are designed to verify that the application meets the functional and non-functional requirements and specifications. They also help to identify and correct any errors, defects, or vulnerabilities in the application before it is deployed. By reviewing and evaluating the test cases, the IS auditor can assess the quality, reliability, security, and performance of the application and provide recommendations for improvement.

asked 18/09/2024
Nicholas Roy
52 questions

Question 29

Report Export Collapse

An IS auditor finds that firewalls are outdated and not supported by vendors. Which of the following should be the auditor's NEXT course of action?

Report the mitigating controls.
Report the mitigating controls.
Report the security posture of the organization.
Report the security posture of the organization.
Determine the value of the firewall.
Determine the value of the firewall.
Determine the risk of not replacing the firewall.
Determine the risk of not replacing the firewall.
Suggested answer: D
Explanation:

The IS auditor's next course of action after finding that firewalls are outdated and not supported by vendors should be to determine the risk of not replacing the firewall. Outdated firewalls may have known vulnerabilities that can be exploited by attackers to bypass security controls and access the network. They may also lack compatibility with newer technologies or standards that are required for optimal network performance and protection. Not replacing the firewall could expose the organization to various threats, such as data breaches, denial-of-service attacks, malware infections, or regulatory non-compliance. The IS auditor should assess the likelihood and impact of these threats and quantify the risk level for management to make informed decisions.

asked 18/09/2024
Danyail Storey
31 questions

Question 30

Report Export Collapse

Which of the following is the BEST way to determine whether a test of a disaster recovery plan (DRP) was successful?

Analyze whether predetermined test objectives were met.
Analyze whether predetermined test objectives were met.
Perform testing at the backup data center.
Perform testing at the backup data center.
Evaluate participation by key personnel.
Evaluate participation by key personnel.
Test offsite backup files.
Test offsite backup files.
Suggested answer: A
Explanation:

The best way to determine whether a test of a disaster recovery plan (DRP) was successful is to analyze whether predetermined test objectives were met. Test objectives are specific, measurable, achievable, relevant, and time-bound (SMART) goals that define what the test aims to accomplish and how it will be evaluated. Test objectives should be aligned with the DRP objectives and scope, and should cover aspects such as recovery time objectives (RTOs), recovery point objectives (RPOs), critical business functions, roles and responsibilities, communication channels, backup systems, and contingency procedures. By comparing the actual test results with the expected test objectives, the IS auditor can measure the effectiveness and efficiency of the DRP and identify any gaps or weaknesses that need to be addressed.

asked 18/09/2024
Pavel Tylich
43 questions
Total 1.402 questions
Go to page: of 141

Related questions