ExamGecko
Home / Isaca / CISA / List of questions
Ask Question

Isaca CISA Practice Test - Questions Answers, Page 4

Add to Whishlist

List of questions

Question 31

Report Export Collapse

An IS auditor found that a company executive is encouraging employee use of social networking sites for business purposes. Which of the following recommendations would BEST help to reduce the risk of data leakage?

Requiring policy acknowledgment and nondisclosure agreements (NDAs) signed by employees
Requiring policy acknowledgment and nondisclosure agreements (NDAs) signed by employees
Establishing strong access controls on confidential data
Establishing strong access controls on confidential data
Providing education and guidelines to employees on use of social networking sites
Providing education and guidelines to employees on use of social networking sites
Monitoring employees' social networking usage
Monitoring employees' social networking usage
Suggested answer: C
Explanation:

The best recommendation to reduce the risk of data leakage from employee use of social networking sites for business purposes is to provide education and guidelines to employees on use of social networking sites. Education and guidelines can help employees understand the benefits and risks of using social media for business purposes, such as enhancing brand awareness, engaging with customers, or sharing industry insights. They can also inform employees about the dos and don'ts of social media etiquette, such as respecting privacy, protecting intellectual property, avoiding conflicts of interest, or complying with legal obligations. Education and guidelines can also raise awareness of potential data leakage scenarios, such as phishing attacks, malicious links, fake profiles, or oversharing sensitive information, and provide tips on how to prevent or respond to them.

asked 18/09/2024
Kurt Van Rymenant
52 questions

Question 32

Report Export Collapse

An IS auditor notes that several employees are spending an excessive amount of time using social media sites for personal reasons. Which of the following should the auditor recommend be performed FIRST?

Implement a process to actively monitor postings on social networking sites.
Implement a process to actively monitor postings on social networking sites.
Adjust budget for network usage to include social media usage.
Adjust budget for network usage to include social media usage.
Use data loss prevention (DLP) tools on endpoints.
Use data loss prevention (DLP) tools on endpoints.
implement policies addressing acceptable usage of social media during working hours.
implement policies addressing acceptable usage of social media during working hours.
Suggested answer: D
Explanation:

The first course of action that the auditor should recommend after finding that several employees are spending an excessive amount of time using social media sites for personal reasons is to implement policies addressing acceptable usage of social media during working hours. Policies can help define the scope, purpose, rules, and expectations of using social media in the workplace, both for personal and professional reasons. Policies can also specify the consequences of violating the policies, such as disciplinary actions or termination. Policies can help deter employees from misusing social media at work, which could affect their productivity, performance, or security. Policies can also help protect the organization from legal liabilities or reputational damages that could arise from inappropriate or unlawful employee behavior on social media.

asked 18/09/2024
Arvee Natividad
48 questions

Question 33

Report Export Collapse

Which of the following fire suppression systems needs to be combined with an automatic switch to shut down the electricity supply in the event of activation?

Carbon dioxide
Carbon dioxide
FM-200
FM-200
Dry pipe
Dry pipe
Halon
Halon
Suggested answer: A
Explanation:

Carbon dioxide fire suppression systems need to be combined with an automatic switch to shut down the electricity supply in the event of activation. This is because carbon dioxide displaces oxygen in the air and can create a suffocation hazard for people in the protected area. Therefore, it is essential to cut off the power source before releasing carbon dioxide to avoid electrical shocks and sparks that could ignite the fire again. Carbon dioxide systems are typically used for total flooding applications in spaces that are not habitable, such as server rooms or data centers.

asked 18/09/2024
John Bocachica
49 questions

Question 34

Report Export Collapse

Which of the following would MOST likely impair the independence of the IS auditor when performing a post-implementation review of an application system?

The IS auditor provided consulting advice concerning application system best practices.
The IS auditor provided consulting advice concerning application system best practices.
The IS auditor participated as a member of the application system project team, but did not have operational responsibilities.
The IS auditor participated as a member of the application system project team, but did not have operational responsibilities.
The IS auditor designed an embedded audit module exclusively for auditing the application system.
The IS auditor designed an embedded audit module exclusively for auditing the application system.
The IS auditor implemented a specific control during the development of the application system.
The IS auditor implemented a specific control during the development of the application system.
Suggested answer: D
Explanation:

The IS auditor's independence would be most likely impaired if they implemented a specific control during the development of an application system. This is because the IS auditor would be auditing their own work, which creates a self-review threat that could compromise their objectivity and impartiality. The IS auditor should avoid participating in any operational or management activities that could affect their ability to perform an unbiased audit. The other options do not pose a significant threat to the IS auditor's independence, as long as they follow the ethical standards and guidelines of the profession.

asked 18/09/2024
Adish Narayan
40 questions

Question 35

Report Export Collapse

An organization plans to receive an automated data feed into its enterprise data warehouse from a third-party service provider. Which of the following would be the BEST way to prevent accepting bad data?

Obtain error codes indicating failed data feeds.
Obtain error codes indicating failed data feeds.
Appoint data quality champions across the organization.
Appoint data quality champions across the organization.
Purchase data cleansing tools from a reputable vendor.
Purchase data cleansing tools from a reputable vendor.
Implement business rules to reject invalid data.
Implement business rules to reject invalid data.
Suggested answer: D
Explanation:

The best way to prevent accepting bad data from a third-party service provider is to implement business rules to reject invalid data. Business rules are logical expressions that define the business requirements and constraints for specific data elements. They can be used to validate, transform, or filter incoming data from external sources, ensuring that only high-quality data is accepted into the enterprise data warehouse. Business rules can also help to identify and resolve data quality issues, such as missing values, duplicates, outliers, or inconsistencies.

asked 18/09/2024
JR Gee
35 questions

Question 36

Report Export Collapse

An IS auditor suspects an organization's computer may have been used to commit a crime. Which of the following is the auditor's BEST course of action?

Examine the computer to search for evidence supporting the suspicions.
Examine the computer to search for evidence supporting the suspicions.
Advise management of the crime after the investigation.
Advise management of the crime after the investigation.
Contact the incident response team to conduct an investigation.
Contact the incident response team to conduct an investigation.
Notify local law enforcement of the potential crime before further investigation.
Notify local law enforcement of the potential crime before further investigation.
Suggested answer: C
Explanation:

The IS auditor's best course of action if they suspect an organization's computer may have been used to commit a crime is to contact the incident response team to conduct an investigation. The incident response team is a group of experts who are responsible for responding to security incidents, such as data breaches, ransomware attacks, or cybercrimes. The incident response team can help to preserve and collect digital evidence, determine the scope and impact of the incident, contain and eradicate the threat, and restore normal operations. The IS auditor should not examine the computer themselves, as they may inadvertently alter or destroy potential evidence, or compromise the chain of custody. The IS auditor should also not notify local law enforcement before further investigation, as this may escalate the situation unnecessarily or interfere with the internal investigation process. The IS auditor should advise management of the crime after the investigation, or as soon as possible if there is an imminent risk or legal obligation to do so.

asked 18/09/2024
Arash Rind
50 questions

Question 37

Report Export Collapse

Which of the following access rights presents the GREATEST risk when granted to a new member of the system development staff?

Write access to production program libraries
Write access to production program libraries
Write access to development data libraries
Write access to development data libraries
Execute access to production program libraries
Execute access to production program libraries
Execute access to development program libraries
Execute access to development program libraries
Suggested answer: A
Explanation:

Write access to production program libraries presents the greatest risk when granted to a new member of the system development staff. Production program libraries contain executable code that runs on live systems and supports critical business functions. Write access allows a user to modify or delete existing programs, or add new programs to the library. If a user were to make unauthorized or erroneous changes to production programs, it could cause serious disruptions, errors, or security breaches in the organization's operations. Therefore, write access to production program libraries should be restricted to authorized personnel only, and subject to strict change management controls.

asked 18/09/2024
Anirban Ganguly
57 questions

Question 38

Report Export Collapse

An IS auditor is conducting a post-implementation review of an enterprise resource planning (ERP) system. End users indicated concerns with the accuracy of critical automatic calculations made by the system. The auditor's FIRST course of action should be to:

review recent changes to the system.
review recent changes to the system.
verify completeness of user acceptance testing (UAT).
verify completeness of user acceptance testing (UAT).
verify results to determine validity of user concerns.
verify results to determine validity of user concerns.
review initial business requirements.
review initial business requirements.
Suggested answer: C
Explanation:

The IS auditor's first course of action should be to verify the results of the critical automatic calculations made by the system to determine the validity of user concerns. This is because the IS auditor needs to obtain sufficient and appropriate audit evidence to support the audit findings and conclusions. By verifying the results, the IS auditor can assess whether there are any errors or discrepancies in the system's calculations that could affect the accuracy and reliability of the financial data. The IS auditor can use various techniques to verify the results, such as re-performing the calculations, comparing them with expected values, or tracing them to source documents.

asked 18/09/2024
Amarjeet Saini
39 questions

Question 39

Report Export Collapse

Which of the following provides the MOST reliable audit evidence on the validity of transactions in a financial application?

Walk-through reviews
Walk-through reviews
Substantive testing
Substantive testing
Compliance testing
Compliance testing
Design documentation reviews
Design documentation reviews
Suggested answer: B
Explanation:

Substantive testing provides the most reliable audit evidence on the validity of transactions in a financial application. Substantive testing is an audit procedure that examines the financial statements and supporting documentation to see if they contain errors or misstatements. Substantive testing can help to verify that the transactions recorded in the financial application are authorized, complete, accurate, and properly classified. Substantive testing can include methods such as vouching, confirmation, analytical procedures, or physical examination.

asked 18/09/2024
Geoffrey Vd Molen
45 questions

Question 40

Report Export Collapse

During an incident management audit, an IS auditor finds that several similar incidents were logged during the audit period. Which of the following is the auditor's MOST important course of action?

Document the finding and present it to management.
Document the finding and present it to management.
Determine if a root cause analysis was conducted.
Determine if a root cause analysis was conducted.
Confirm the resolution time of the incidents.
Confirm the resolution time of the incidents.
Validate whether all incidents have been actioned.
Validate whether all incidents have been actioned.
Suggested answer: B
Explanation:

The IS auditor's most important course of action after finding that several similar incidents were logged during the audit period is to determine if a root cause analysis was conducted. A root cause analysis is a systematic process that identifies the underlying causes of system failures or incidents. A root cause analysis can help to prevent recurrence of similar incidents, improve system performance and reliability, and enhance incident management processes. The IS auditor should evaluate whether a root cause analysis was performed for each incident, whether it was timely and thorough, and whether it resulted in effective corrective actions.

asked 18/09/2024
Asad yaseen
44 questions
Total 1.402 questions
Go to page: of 141
Search

Related questions