ExamGecko
Home Home / Isaca / CISA

Isaca CISA Practice Test - Questions Answers, Page 4

Question list
Search
Search

List of questions

Search

Related questions

An IS auditor found that a company executive is encouraging employee use of social networking sites for business purposes. Which of the following recommendations would BEST help to reduce the risk of data leakage?

A.
Requiring policy acknowledgment and nondisclosure agreements (NDAs) signed by employees
A.
Requiring policy acknowledgment and nondisclosure agreements (NDAs) signed by employees
Answers
B.
Establishing strong access controls on confidential data
B.
Establishing strong access controls on confidential data
Answers
C.
Providing education and guidelines to employees on use of social networking sites
C.
Providing education and guidelines to employees on use of social networking sites
Answers
D.
Monitoring employees' social networking usage
D.
Monitoring employees' social networking usage
Answers
Suggested answer: C

Explanation:

The best recommendation to reduce the risk of data leakage from employee use of social networking sites for business purposes is to provide education and guidelines to employees on use of social networking sites. Education and guidelines can help employees understand the benefits and risks of using social media for business purposes, such as enhancing brand awareness, engaging with customers, or sharing industry insights. They can also inform employees about the dos and don'ts of social media etiquette, such as respecting privacy, protecting intellectual property, avoiding conflicts of interest, or complying with legal obligations. Education and guidelines can also raise awareness of potential data leakage scenarios, such as phishing attacks, malicious links, fake profiles, or oversharing sensitive information, and provide tips on how to prevent or respond to them.

An IS auditor notes that several employees are spending an excessive amount of time using social media sites for personal reasons. Which of the following should the auditor recommend be performed FIRST?

A.
Implement a process to actively monitor postings on social networking sites.
A.
Implement a process to actively monitor postings on social networking sites.
Answers
B.
Adjust budget for network usage to include social media usage.
B.
Adjust budget for network usage to include social media usage.
Answers
C.
Use data loss prevention (DLP) tools on endpoints.
C.
Use data loss prevention (DLP) tools on endpoints.
Answers
D.
implement policies addressing acceptable usage of social media during working hours.
D.
implement policies addressing acceptable usage of social media during working hours.
Answers
Suggested answer: D

Explanation:

The first course of action that the auditor should recommend after finding that several employees are spending an excessive amount of time using social media sites for personal reasons is to implement policies addressing acceptable usage of social media during working hours. Policies can help define the scope, purpose, rules, and expectations of using social media in the workplace, both for personal and professional reasons. Policies can also specify the consequences of violating the policies, such as disciplinary actions or termination. Policies can help deter employees from misusing social media at work, which could affect their productivity, performance, or security. Policies can also help protect the organization from legal liabilities or reputational damages that could arise from inappropriate or unlawful employee behavior on social media.

Which of the following fire suppression systems needs to be combined with an automatic switch to shut down the electricity supply in the event of activation?

A.
Carbon dioxide
A.
Carbon dioxide
Answers
B.
FM-200
B.
FM-200
Answers
C.
Dry pipe
C.
Dry pipe
Answers
D.
Halon
D.
Halon
Answers
Suggested answer: A

Explanation:

Carbon dioxide fire suppression systems need to be combined with an automatic switch to shut down the electricity supply in the event of activation. This is because carbon dioxide displaces oxygen in the air and can create a suffocation hazard for people in the protected area. Therefore, it is essential to cut off the power source before releasing carbon dioxide to avoid electrical shocks and sparks that could ignite the fire again. Carbon dioxide systems are typically used for total flooding applications in spaces that are not habitable, such as server rooms or data centers.

Which of the following would MOST likely impair the independence of the IS auditor when performing a post-implementation review of an application system?

A.
The IS auditor provided consulting advice concerning application system best practices.
A.
The IS auditor provided consulting advice concerning application system best practices.
Answers
B.
The IS auditor participated as a member of the application system project team, but did not have operational responsibilities.
B.
The IS auditor participated as a member of the application system project team, but did not have operational responsibilities.
Answers
C.
The IS auditor designed an embedded audit module exclusively for auditing the application system.
C.
The IS auditor designed an embedded audit module exclusively for auditing the application system.
Answers
D.
The IS auditor implemented a specific control during the development of the application system.
D.
The IS auditor implemented a specific control during the development of the application system.
Answers
Suggested answer: D

Explanation:

The IS auditor's independence would be most likely impaired if they implemented a specific control during the development of an application system. This is because the IS auditor would be auditing their own work, which creates a self-review threat that could compromise their objectivity and impartiality. The IS auditor should avoid participating in any operational or management activities that could affect their ability to perform an unbiased audit. The other options do not pose a significant threat to the IS auditor's independence, as long as they follow the ethical standards and guidelines of the profession.

An organization plans to receive an automated data feed into its enterprise data warehouse from a third-party service provider. Which of the following would be the BEST way to prevent accepting bad data?

A.
Obtain error codes indicating failed data feeds.
A.
Obtain error codes indicating failed data feeds.
Answers
B.
Appoint data quality champions across the organization.
B.
Appoint data quality champions across the organization.
Answers
C.
Purchase data cleansing tools from a reputable vendor.
C.
Purchase data cleansing tools from a reputable vendor.
Answers
D.
Implement business rules to reject invalid data.
D.
Implement business rules to reject invalid data.
Answers
Suggested answer: D

Explanation:

The best way to prevent accepting bad data from a third-party service provider is to implement business rules to reject invalid data. Business rules are logical expressions that define the business requirements and constraints for specific data elements. They can be used to validate, transform, or filter incoming data from external sources, ensuring that only high-quality data is accepted into the enterprise data warehouse. Business rules can also help to identify and resolve data quality issues, such as missing values, duplicates, outliers, or inconsistencies.

An IS auditor suspects an organization's computer may have been used to commit a crime. Which of the following is the auditor's BEST course of action?

A.
Examine the computer to search for evidence supporting the suspicions.
A.
Examine the computer to search for evidence supporting the suspicions.
Answers
B.
Advise management of the crime after the investigation.
B.
Advise management of the crime after the investigation.
Answers
C.
Contact the incident response team to conduct an investigation.
C.
Contact the incident response team to conduct an investigation.
Answers
D.
Notify local law enforcement of the potential crime before further investigation.
D.
Notify local law enforcement of the potential crime before further investigation.
Answers
Suggested answer: C

Explanation:

The IS auditor's best course of action if they suspect an organization's computer may have been used to commit a crime is to contact the incident response team to conduct an investigation. The incident response team is a group of experts who are responsible for responding to security incidents, such as data breaches, ransomware attacks, or cybercrimes. The incident response team can help to preserve and collect digital evidence, determine the scope and impact of the incident, contain and eradicate the threat, and restore normal operations. The IS auditor should not examine the computer themselves, as they may inadvertently alter or destroy potential evidence, or compromise the chain of custody. The IS auditor should also not notify local law enforcement before further investigation, as this may escalate the situation unnecessarily or interfere with the internal investigation process. The IS auditor should advise management of the crime after the investigation, or as soon as possible if there is an imminent risk or legal obligation to do so.

Which of the following access rights presents the GREATEST risk when granted to a new member of the system development staff?

A.
Write access to production program libraries
A.
Write access to production program libraries
Answers
B.
Write access to development data libraries
B.
Write access to development data libraries
Answers
C.
Execute access to production program libraries
C.
Execute access to production program libraries
Answers
D.
Execute access to development program libraries
D.
Execute access to development program libraries
Answers
Suggested answer: A

Explanation:

Write access to production program libraries presents the greatest risk when granted to a new member of the system development staff. Production program libraries contain executable code that runs on live systems and supports critical business functions. Write access allows a user to modify or delete existing programs, or add new programs to the library. If a user were to make unauthorized or erroneous changes to production programs, it could cause serious disruptions, errors, or security breaches in the organization's operations. Therefore, write access to production program libraries should be restricted to authorized personnel only, and subject to strict change management controls.

An IS auditor is conducting a post-implementation review of an enterprise resource planning (ERP) system. End users indicated concerns with the accuracy of critical automatic calculations made by the system. The auditor's FIRST course of action should be to:

A.
review recent changes to the system.
A.
review recent changes to the system.
Answers
B.
verify completeness of user acceptance testing (UAT).
B.
verify completeness of user acceptance testing (UAT).
Answers
C.
verify results to determine validity of user concerns.
C.
verify results to determine validity of user concerns.
Answers
D.
review initial business requirements.
D.
review initial business requirements.
Answers
Suggested answer: C

Explanation:

The IS auditor's first course of action should be to verify the results of the critical automatic calculations made by the system to determine the validity of user concerns. This is because the IS auditor needs to obtain sufficient and appropriate audit evidence to support the audit findings and conclusions. By verifying the results, the IS auditor can assess whether there are any errors or discrepancies in the system's calculations that could affect the accuracy and reliability of the financial data. The IS auditor can use various techniques to verify the results, such as re-performing the calculations, comparing them with expected values, or tracing them to source documents.

Which of the following provides the MOST reliable audit evidence on the validity of transactions in a financial application?

A.
Walk-through reviews
A.
Walk-through reviews
Answers
B.
Substantive testing
B.
Substantive testing
Answers
C.
Compliance testing
C.
Compliance testing
Answers
D.
Design documentation reviews
D.
Design documentation reviews
Answers
Suggested answer: B

Explanation:

Substantive testing provides the most reliable audit evidence on the validity of transactions in a financial application. Substantive testing is an audit procedure that examines the financial statements and supporting documentation to see if they contain errors or misstatements. Substantive testing can help to verify that the transactions recorded in the financial application are authorized, complete, accurate, and properly classified. Substantive testing can include methods such as vouching, confirmation, analytical procedures, or physical examination.

During an incident management audit, an IS auditor finds that several similar incidents were logged during the audit period. Which of the following is the auditor's MOST important course of action?

A.
Document the finding and present it to management.
A.
Document the finding and present it to management.
Answers
B.
Determine if a root cause analysis was conducted.
B.
Determine if a root cause analysis was conducted.
Answers
C.
Confirm the resolution time of the incidents.
C.
Confirm the resolution time of the incidents.
Answers
D.
Validate whether all incidents have been actioned.
D.
Validate whether all incidents have been actioned.
Answers
Suggested answer: B

Explanation:

The IS auditor's most important course of action after finding that several similar incidents were logged during the audit period is to determine if a root cause analysis was conducted. A root cause analysis is a systematic process that identifies the underlying causes of system failures or incidents. A root cause analysis can help to prevent recurrence of similar incidents, improve system performance and reliability, and enhance incident management processes. The IS auditor should evaluate whether a root cause analysis was performed for each incident, whether it was timely and thorough, and whether it resulted in effective corrective actions.

Total 1.198 questions
Go to page: of 120