ExamGecko
Home Home / Isaca / CISA

Isaca CISA Practice Test - Questions Answers, Page 36

Question list
Search
Search

List of questions

Search

Related questions











A system administrator recently informed the IS auditor about the occurrence of several unsuccessful intrusion attempts from outside the organization. Which of the following is MOST effective in detecting such an intrusion?

A.
Using smart cards with one-time passwords
A.
Using smart cards with one-time passwords
Answers
B.
Periodically reviewing log files
B.
Periodically reviewing log files
Answers
C.
Configuring the router as a firewall
C.
Configuring the router as a firewall
Answers
D.
Installing biometrics-based authentication
D.
Installing biometrics-based authentication
Answers
Suggested answer: B

Explanation:

Periodically reviewing log files is the most effective way to detect intrusion attempts from outside the organization, as they can provide evidence of unauthorized access attempts, source IP addresses, timestamps and other relevant information. Using smart cards with one-time passwords or installing biometrics-based authentication can prevent unauthorized access, but not detect it. Configuring the router as a firewall can block unwanted traffic, but not log it.Reference:ISACA, CISA Review Manual, 27th Edition, 2018, page 361

An organization has virtualized its server environment without making any other changes to the network or security infrastructure. Which of the following is the MOST significant risk?

A.
Inability of the network intrusion detection system (IDS) to monitor virtual server-lo-server communications
A.
Inability of the network intrusion detection system (IDS) to monitor virtual server-lo-server communications
Answers
B.
Vulnerability in the virtualization platform affecting multiple hosts
B.
Vulnerability in the virtualization platform affecting multiple hosts
Answers
C.
Data center environmental controls not aligning with new configuration
C.
Data center environmental controls not aligning with new configuration
Answers
D.
System documentation not being updated to reflect changes in the environment
D.
System documentation not being updated to reflect changes in the environment
Answers
Suggested answer: A

Explanation:

The most significant risk in virtualizing the server environment without making any other changes to the network or security infrastructure is the inability of the network intrusion detection system (IDS) to monitor virtual server-to-server communications. This can create blind spots for the IDS and allow malicious traffic to bypass detection. A vulnerability in the virtualization platform affecting multiple hosts is a potential risk, but not necessarily more significant than the loss of visibility. Data center environmental controls not aligning with new configuration or system documentation not being updated to reflect changes in the environment are operational issues, not security issues.Reference:ISACA, CISA Review Manual, 27th Edition, 2018, page 373

Which of the following should be of GREATEST concern to an IS auditor reviewing a network printer disposal process?

A.
Disposal policies and procedures are not consistently implemented
A.
Disposal policies and procedures are not consistently implemented
Answers
B.
Evidence is not available to verify printer hard drives have been sanitized prior to disposal.
B.
Evidence is not available to verify printer hard drives have been sanitized prior to disposal.
Answers
C.
Business units are allowed to dispose printers directly to
C.
Business units are allowed to dispose printers directly to
Answers
D.
Inoperable printers are stored in an unsecured area.
D.
Inoperable printers are stored in an unsecured area.
Answers
Suggested answer: B

Explanation:

The greatest concern for an IS auditor reviewing a network printer disposal process is that evidence is not available to verify printer hard drives have been sanitized prior to disposal. This can expose sensitive data to unauthorized parties and cause data breaches. Disposal policies and procedures not being consistently implemented or business units being allowed to dispose printers directly to vendors are compliance issues, but not as critical as data protection. Inoperable printers being stored in an unsecured area is a physical security issue, but not as severe as data leakage.Reference:ISACA, CISA Review Manual, 27th Edition, 2018, page 387

Which of the following backup schemes is the BEST option when storage media is limited?

A.
Real-time backup
A.
Real-time backup
Answers
B.
Virtual backup
B.
Virtual backup
Answers
C.
Differential backup
C.
Differential backup
Answers
D.
Full backup
D.
Full backup
Answers
Suggested answer: C

Explanation:

A differential backup scheme is the best option when storage media is limited, as it only backs up the data that has changed since the last full backup. This reduces the amount of storage space required and also simplifies the restoration process, as only the last full backup and the last differential backup are needed. A real-time backup scheme would require continuous replication of data, which would consume a lot of storage space and network bandwidth. A virtual backup scheme would create a snapshot of the data at a point in time, but it would not reduce the storage space required, as it would still need to store the changes made to the data. A full backup scheme would back up all the data every time, which would require the most storage space and also take longer to complete.Reference:ISACA, CISA Review Manual, 27th Edition, 2018, page 405

During an IT general controls audit of a high-risk area where both internal and external audit teams are reviewing the same approach to optimize resources?

A.
Leverage the work performed by external audit for the internal audit testing.
A.
Leverage the work performed by external audit for the internal audit testing.
Answers
B.
Ensure both the internal and external auditors perform the work simultaneously.
B.
Ensure both the internal and external auditors perform the work simultaneously.
Answers
C.
Request that the external audit team leverage the internal audit work.
C.
Request that the external audit team leverage the internal audit work.
Answers
D.
Roll forward the general controls audit to the subsequent audit year.
D.
Roll forward the general controls audit to the subsequent audit year.
Answers
Suggested answer: A

Explanation:

The best approach to optimize resources when both internal and external audit teams are reviewing the same IT general controls area is to leverage the work performed by external audit for the internal audit testing. This can avoid duplication of efforts, reduce audit costs and enhance coordination between the audit teams. The internal audit team should evaluate the quality and reliability of the external audit work before relying on it. Ensuring both the internal and external auditors perform the work simultaneously is not an efficient use of resources, as it would create redundancy and possible interference. Requesting that the external audit team leverage the internal audit work may not be feasible or acceptable, as the external audit team may have different objectives, standards and independence requirements. Rolling forward the general controls audit to the subsequent audit year is not a good practice, as it would delay the identification and remediation of any control weaknesses in a high-risk area.Reference:ISACA, CISA Review Manual, 27th Edition, 2018, page 247

Which of the following is a corrective control?

A.
Separating equipment development testing and production
A.
Separating equipment development testing and production
Answers
B.
Verifying duplicate calculations in data processing
B.
Verifying duplicate calculations in data processing
Answers
C.
Reviewing user access rights for segregation
C.
Reviewing user access rights for segregation
Answers
D.
Executing emergency response plans
D.
Executing emergency response plans
Answers
Suggested answer: D

Explanation:

A corrective control is a control that aims to restore normal operations after a disruption or incident has occurred. Executing emergency response plans is an example of a corrective control, as it helps to mitigate the impact of an incident and resume business functions. Separating equipment development testing and production is a preventive control, as it helps to avoid errors or unauthorized changes in production systems. Verifying duplicate calculations in data processing is a detective control, as it helps to identify errors or anomalies in data processing. Reviewing user access rights for segregation is also a detective control, as it helps to detect any violations of segregation of duties principles.Reference:ISACA, CISA Review Manual, 27th Edition, 2018, page 64

An IS auditor finds that capacity management for a key system is being performed by IT with no input from the business The auditor's PRIMARY concern would be:

A.
failure to maximize the use of equipment
A.
failure to maximize the use of equipment
Answers
B.
unanticipated increase in business s capacity needs.
B.
unanticipated increase in business s capacity needs.
Answers
C.
cost of excessive data center storage capacity
C.
cost of excessive data center storage capacity
Answers
D.
impact to future business project funding.
D.
impact to future business project funding.
Answers
Suggested answer: B

Explanation:

The auditor's primary concern when capacity management for a key system is being performed by IT with no input from the business would be an unanticipated increase in business's capacity needs. This could result in performance degradation, service disruption or customer dissatisfaction if IT is not able to provide sufficient capacity to meet the business demand. Failure to maximize the use of equipment, cost of excessive data center storage capacity or impact to future business project funding are secondary concerns that relate to resource optimization or budget allocation, but not to service delivery or customer satisfaction.Reference:ISACA, CISA Review Manual, 27th Edition, 2018, page 374

Which of the following IT service management activities is MOST likely to help with identifying the root cause of repeated instances of network latency?

A.
Change management
A.
Change management
Answers
B.
Problem management
B.
Problem management
Answers
C.
incident management
C.
incident management
Answers
D.
Configuration management
D.
Configuration management
Answers
Suggested answer: B

Explanation:

Problem management is an IT service management activity that is most likely to help with identifying the root cause of repeated instances of network latency. Problem management involves analyzing incidents that affect IT services and finding solutions to prevent them from recurring or minimize their impact. Change management is an IT service management activity that involves controlling and documenting any modifications to IT services or infrastructure. Incident management is an IT service management activity that involves restoring normal service operation as quickly as possible after an incident has occurred. Configuration management is an IT service management activity that involves identifying and maintaining records of IT assets and their relationships.Reference:ISACA, CISA Review Manual, 27th Edition, 2018, page 334

The PRIMARY benefit of information asset classification is that it:

A.
prevents loss of assets.
A.
prevents loss of assets.
Answers
B.
helps to align organizational objectives.
B.
helps to align organizational objectives.
Answers
C.
facilitates budgeting accuracy.
C.
facilitates budgeting accuracy.
Answers
D.
enables risk management decisions.
D.
enables risk management decisions.
Answers
Suggested answer: D

Explanation:

The primary benefit of information asset classification is that it enables risk management decisions. Information asset classification helps to identify the value, sensitivity and criticality of information assets, and to determine the appropriate level of protection and controls required for them. This facilitates risk assessment and risk treatment processes, and ensures that information assets are aligned with business objectives and regulatory requirements. Preventing loss of assets, helping to align organizational objectives or facilitating budgeting accuracy are secondary benefits of information asset classification, but not the main purpose.Reference:ISACA, CISA Review Manual, 27th Edition, 2018, page 300

Which of the following is MOST important for an IS auditor to determine during the detailed design phase of a system development project?

A.
Program coding standards have been followed
A.
Program coding standards have been followed
Answers
B.
Acceptance test criteria have been developed
B.
Acceptance test criteria have been developed
Answers
C.
Data conversion procedures have been established.
C.
Data conversion procedures have been established.
Answers
D.
The design has been approved by senior management.
D.
The design has been approved by senior management.
Answers
Suggested answer: B

Explanation:

The most important thing for an IS auditor to determine during the detailed design phase of a system development project is that acceptance test criteria have been developed. Acceptance test criteria define the expected functionality, performance and quality of the system, and are used to verify that the system meets the user requirements and specifications. The IS auditor should ensure that the acceptance test criteria are clear, measurable and agreed upon by all stakeholders. Program coding standards have been followed is something that the IS auditor should check during the coding or testing phase, not the detailed design phase. Data conversion procedures have been established or the design has been approved by senior management are things that the IS auditor should verify during the implementation phase, not the detailed design phase.Reference:ISACA, CISA Review Manual, 27th Edition, 2018, page 323

Total 1.198 questions
Go to page: of 120