ExamGecko
Home Home / Isaca / CISA

Isaca CISA Practice Test - Questions Answers, Page 3

Question list
Search
Search

Related questions

Which of the following is the BEST data integrity check?

A.
Counting the transactions processed per day
A.
Counting the transactions processed per day
Answers
B.
Performing a sequence check
B.
Performing a sequence check
Answers
C.
Tracing data back to the point of origin
C.
Tracing data back to the point of origin
Answers
D.
Preparing and running test data
D.
Preparing and running test data
Answers
Suggested answer: C

Explanation:

Data integrity is the property that ensures that data is accurate, complete, consistent, and reliable throughout its lifecycle. The best data integrity check is tracing data back to the point of origin, which is the source where the data was originally created or captured. This check can verify that data has not been altered or corrupted during transmission, processing, or storage. It can also identify any errors or discrepancies in data entry or conversion. Counting the transactions processed per day is a performance measure that does not directly assess data integrity. Performing a sequence check is a validity check that ensures that data follows a predefined order or pattern. It can detect missing or out-of-order data elements, but it cannot verify their accuracy or completeness. Preparing and running test data is a testing technique that simulates real data to evaluate how a system handles different scenarios. It can help identify errors or bugs in the system logic or functionality, but it cannot ensure data integrity in production environments.Reference:Information Systems Operations and Business Resilience,CISA Review Manual (Digital Version)

Spreadsheets are used to calculate project cost estimates. Totals for each cost category are then keyed into the job-costing system. What is the BEST control to ensure that data is accurately entered into the system?

A.
Reconciliation of total amounts by project
A.
Reconciliation of total amounts by project
Answers
B.
Validity checks, preventing entry of character data
B.
Validity checks, preventing entry of character data
Answers
C.
Reasonableness checks for each cost type
C.
Reasonableness checks for each cost type
Answers
D.
Display the back of the project detail after the entry
D.
Display the back of the project detail after the entry
Answers
Suggested answer: A

Explanation:

Reconciliation of total amounts by project is the best control to ensure that data is accurately entered into the job-costing system from spreadsheets. Reconciliation is a process of comparing two sets of data to identify any differences or discrepancies between them. By reconciling the total amounts by project from spreadsheets with those from the job-costing system, any errors or omissions in data entry can be detected and corrected. Validity checks are controls that verify that data conforms to predefined formats or ranges. They can prevent entry of character data into numeric fields, but they cannot ensure that the numeric data is correct or complete. Reasonableness checks are controls that verify that data is within expected or acceptable limits. They can detect outliers or anomalies in data, but they cannot ensure that the data matches the source. Display back of project detail after entry is a control that allows the user to review and confirm the data entered into the system. It can help reduce human errors, but it cannot guarantee that the data is accurate or consistent with the source.Reference:Information Systems Operations and Business Resilience,CISA Review Manual (Digital Version)

An incorrect version of the source code was amended by a development team. This MOST likely indicates a weakness in:

A.
incident management.
A.
incident management.
Answers
B.
quality assurance (QA).
B.
quality assurance (QA).
Answers
C.
change management.
C.
change management.
Answers
D.
project management.
D.
project management.
Answers
Suggested answer: C

Explanation:

A weakness in change management is the most likely cause of an incorrect version of source code being amended by a development team. Change management is the process of controlling and documenting changes to IT systems and software. It ensures that changes are authorized, tested, and implemented in a controlled manner. If change management is weak, there is a risk of using outdated or incorrect versions of source code, which can lead to errors, defects, or security vulnerabilities in the software.

An organizations audit charier PRIMARILY:

A.
describes the auditors' authority to conduct audits.
A.
describes the auditors' authority to conduct audits.
Answers
B.
defines the auditors' code of conduct.
B.
defines the auditors' code of conduct.
Answers
C.
formally records the annual and quarterly audit plans.
C.
formally records the annual and quarterly audit plans.
Answers
D.
documents the audit process and reporting standards.
D.
documents the audit process and reporting standards.
Answers
Suggested answer: A

Explanation:

An organization's audit charter primarily describes the auditors' authority to conduct audits. The audit charter is a formal document that defines the purpose, scope, responsibilities, and reporting relationships of the internal audit function. It also establishes the auditors' right of access to information, records, personnel, and physical properties relevant to their work. The audit charter provides the basis for the auditors' independence and accountability to the governing body and senior management.

The decision to accept an IT control risk related to data quality should be the responsibility of the:

A.
information security team.
A.
information security team.
Answers
B.
IS audit manager.
B.
IS audit manager.
Answers
C.
chief information officer (CIO).
C.
chief information officer (CIO).
Answers
D.
business owner.
D.
business owner.
Answers
Suggested answer: D

Explanation:

The decision to accept an IT control risk related to data quality should be the responsibility of the business owner. The business owner is the person who has the authority and accountability for the business process that relies on the data quality. The business owner should understand the impact of data quality issues on the business objectives, performance, and compliance. The business owner should also be involved in defining the data quality requirements, assessing the data quality risks, and implementing the data quality controls or mitigation strategies.

Which of the following data would be used when performing a business impact analysis (BIA)?

A.
Projected impact of current business on future business
A.
Projected impact of current business on future business
Answers
B.
Cost-benefit analysis of running the current business
B.
Cost-benefit analysis of running the current business
Answers
C.
Cost of regulatory compliance
C.
Cost of regulatory compliance
Answers
D.
Expected costs for recovering the business
D.
Expected costs for recovering the business
Answers
Suggested answer: D

Explanation:

The expected costs for recovering the business would be used when performing a business impact analysis (BIA). A BIA is a process of identifying and evaluating the potential effects of disruptions to critical business functions or processes. A BIA helps to determine the recovery priorities, strategies, and resources needed to resume normal operations after a disruption. One of the key outputs of a BIA is an estimate of the financial losses or costs associated with different types of disruptions, such as lost revenue, increased expenses, contractual penalties, or regulatory fines.

Which of the following is the MOST important consideration for an IS auditor when assessing the adequacy of an organization's information security policy?

A.
Alignment with the IT tactical plan
A.
Alignment with the IT tactical plan
Answers
B.
IT steering committee minutes
B.
IT steering committee minutes
Answers
C.
Compliance with industry best practice
C.
Compliance with industry best practice
Answers
D.
Business objectives
D.
Business objectives
Answers
Suggested answer: D

Explanation:

The most important consideration for an IS auditor when assessing the adequacy of an organization's information security policy is its alignment with the business objectives. The information security policy is a high-level document that defines the organization's vision, goals, principles, and responsibilities for protecting its information assets. The information security policy should support and enable the achievement of the business objectives, such as increasing customer satisfaction, enhancing competitive advantage, or complying with legal requirements. The information security policy should also be consistent with other relevant policies, standards, and frameworks that guide the organization's governance, risk management, and compliance activities.

During the evaluation of controls over a major application development project, the MOST effective use of an IS auditor's time would be to review and evaluate:

A.
application test cases.
A.
application test cases.
Answers
B.
acceptance testing.
B.
acceptance testing.
Answers
C.
cost-benefit analysis.
C.
cost-benefit analysis.
Answers
D.
project plans.
D.
project plans.
Answers
Suggested answer: A

Explanation:

Reviewing and evaluating application test cases is the most effective use of an IS auditor's time during the evaluation of controls over a major application development project. Application test cases are designed to verify that the application meets the functional and non-functional requirements and specifications. They also help to identify and correct any errors, defects, or vulnerabilities in the application before it is deployed. By reviewing and evaluating the test cases, the IS auditor can assess the quality, reliability, security, and performance of the application and provide recommendations for improvement.

An IS auditor finds that firewalls are outdated and not supported by vendors. Which of the following should be the auditor's NEXT course of action?

A.
Report the mitigating controls.
A.
Report the mitigating controls.
Answers
B.
Report the security posture of the organization.
B.
Report the security posture of the organization.
Answers
C.
Determine the value of the firewall.
C.
Determine the value of the firewall.
Answers
D.
Determine the risk of not replacing the firewall.
D.
Determine the risk of not replacing the firewall.
Answers
Suggested answer: D

Explanation:

The IS auditor's next course of action after finding that firewalls are outdated and not supported by vendors should be to determine the risk of not replacing the firewall. Outdated firewalls may have known vulnerabilities that can be exploited by attackers to bypass security controls and access the network. They may also lack compatibility with newer technologies or standards that are required for optimal network performance and protection. Not replacing the firewall could expose the organization to various threats, such as data breaches, denial-of-service attacks, malware infections, or regulatory non-compliance. The IS auditor should assess the likelihood and impact of these threats and quantify the risk level for management to make informed decisions.

Which of the following is the BEST way to determine whether a test of a disaster recovery plan (DRP) was successful?

A.
Analyze whether predetermined test objectives were met.
A.
Analyze whether predetermined test objectives were met.
Answers
B.
Perform testing at the backup data center.
B.
Perform testing at the backup data center.
Answers
C.
Evaluate participation by key personnel.
C.
Evaluate participation by key personnel.
Answers
D.
Test offsite backup files.
D.
Test offsite backup files.
Answers
Suggested answer: A

Explanation:

The best way to determine whether a test of a disaster recovery plan (DRP) was successful is to analyze whether predetermined test objectives were met. Test objectives are specific, measurable, achievable, relevant, and time-bound (SMART) goals that define what the test aims to accomplish and how it will be evaluated. Test objectives should be aligned with the DRP objectives and scope, and should cover aspects such as recovery time objectives (RTOs), recovery point objectives (RPOs), critical business functions, roles and responsibilities, communication channels, backup systems, and contingency procedures. By comparing the actual test results with the expected test objectives, the IS auditor can measure the effectiveness and efficiency of the DRP and identify any gaps or weaknesses that need to be addressed.

Total 1.198 questions
Go to page: of 120