ExamGecko
Home Home / Isaca / CISA

Isaca CISA Practice Test - Questions Answers, Page 41

Question list
Search
Search

List of questions

Search

Related questions











Which of the following would MOST effectively help to reduce the number of repealed incidents in an organization?

A.
Testing incident response plans with a wide range of scenarios
A.
Testing incident response plans with a wide range of scenarios
Answers
B.
Prioritizing incidents after impact assessment.
B.
Prioritizing incidents after impact assessment.
Answers
C.
Linking incidents to problem management activities
C.
Linking incidents to problem management activities
Answers
D.
Training incident management teams on current incident trends
D.
Training incident management teams on current incident trends
Answers
Suggested answer: C

Explanation:

Linking incidents to problem management activities would most effectively help to reduce the number of repeated incidents in an organization, because problem management aims to identify and eliminate the root causes of incidents and prevent their recurrence. Testing incident response plans, prioritizing incidents, and training incident management teams are all good practices, but they do not directly address the issue of repeated incidents.Reference:ISACA ITAF 3rd Edition Section 3600

Which of the following is the MOST significant risk that IS auditors are required to consider for each engagement?

A.
Process and resource inefficiencies
A.
Process and resource inefficiencies
Answers
B.
Irregularities and illegal acts
B.
Irregularities and illegal acts
Answers
C.
Noncompliance with organizational policies
C.
Noncompliance with organizational policies
Answers
D.
Misalignment with business objectives
D.
Misalignment with business objectives
Answers
Suggested answer: D

Explanation:

The most significant risk that IS auditors are required to consider for each engagement is the misalignment with business objectives. This is because IS audit engagements are intended to provide assurance that the IT systems and processes support the achievement of the business objectives and strategies.If there is a misalignment, it could result in wasted resources, missed opportunities, inefficiencies, errors, or failures that could adversely affect the organization's performance and reputation12.Reference:1: CISA Review Manual (Digital Version), Chapter 1: The Process of Auditing Information Systems, Section 1.3: Audit Risk, page 282: CISA Online Review Course, Module 1: The Process of Auditing Information Systems, Lesson 1.3: Audit Risk

An externally facing system containing sensitive data is configured such that users have either read-only or administrator rights. Most users of the system have administrator access. Which of the following is the GREATEST risk associated with this situation?

A.
Users can export application logs.
A.
Users can export application logs.
Answers
B.
Users can view sensitive data.
B.
Users can view sensitive data.
Answers
C.
Users can make unauthorized changes.
C.
Users can make unauthorized changes.
Answers
D.
Users can install open-licensed software.
D.
Users can install open-licensed software.
Answers
Suggested answer: C

Explanation:

The greatest risk associated with having most users with administrator access to an externally facing system containing sensitive data is that users can make unauthorized changes to the system or the data, which could compromise the integrity, confidentiality, and availability of the system and the data. Users can export application logs, view sensitive data, and install open-licensed software are also risks, but they are not as severe as unauthorized changes.Reference:ISACA CISA Review Manual 27th Edition Chapter 4

During an audit of an organization's risk management practices, an IS auditor finds several documented IT risk acceptances have not been renewed in a timely manner after the assigned expiration date When assessing the seventy of this finding, which mitigating factor would MOST significantly minimize the associated impact?

A.
There are documented compensating controls over the business processes.
A.
There are documented compensating controls over the business processes.
Answers
B.
The risk acceptances were previously reviewed and approved by appropriate senior management
B.
The risk acceptances were previously reviewed and approved by appropriate senior management
Answers
C.
The business environment has not significantly changed since the risk acceptances were approved.
C.
The business environment has not significantly changed since the risk acceptances were approved.
Answers
D.
The risk acceptances with issues reflect a small percentage of the total population
D.
The risk acceptances with issues reflect a small percentage of the total population
Answers
Suggested answer: A

Explanation:

The mitigating factor that would most significantly minimize the impact of not renewing IT risk acceptances in a timely manner is having documented compensating controls over the business processes. Compensating controls are alternative controls that reduce or eliminate the risk when the primary control is not feasible or cost-effective. The other factors, such as previous approval by senior management, unchanged business environment, and small percentage of issues, do not mitigate the risk as effectively as compensating controls.Reference:ISACA CISA Review Manual 27th Edition Chapter 1

Which of the following is the MOST effective way for an organization to help ensure agreed-upon action plans from an IS audit will be implemented?

A.
Ensure sufficient audit resources are allocated,
A.
Ensure sufficient audit resources are allocated,
Answers
B.
Communicate audit results organization-wide.
B.
Communicate audit results organization-wide.
Answers
C.
Ensure ownership is assigned.
C.
Ensure ownership is assigned.
Answers
D.
Test corrective actions upon completion.
D.
Test corrective actions upon completion.
Answers
Suggested answer: C

Explanation:

The most effective way for an organization to help ensure agreed-upon action plans from an IS audit will be implemented is to ensure ownership is assigned. This means that the management of the audited area should accept responsibility for implementing the action plans and report on their progress and completion to the audit committee or senior management.This will ensure accountability, commitment, and follow-up for the audit recommendations34.Reference:3: CISA Review Manual (Digital Version), Chapter 1: The Process of Auditing Information Systems, Section 1.6: Reporting, page 414: CISA Online Review Course, Module 1: The Process of Auditing Information Systems, Lesson 1.6: Reporting

Which of the following is the BEST metric to measure the alignment of IT and business strategy?

A.
Level of stakeholder satisfaction with the scope of planned IT projects
A.
Level of stakeholder satisfaction with the scope of planned IT projects
Answers
B.
Percentage of enterprise risk assessments that include IT-related risk
B.
Percentage of enterprise risk assessments that include IT-related risk
Answers
C.
Percentage of stat satisfied with their IT-related roles
C.
Percentage of stat satisfied with their IT-related roles
Answers
D.
Frequency of business process capability maturity assessments
D.
Frequency of business process capability maturity assessments
Answers
Suggested answer: B

Explanation:

The best metric to measure the alignment of IT and business strategy is the percentage of enterprise risk assessments that include IT-related risk. This metric indicates how well the organization identifies and manages the IT risks that could affect its strategic objectives and performance. A high percentage of enterprise risk assessments that include IT-related risk shows that the organization considers IT as an integral part of its business strategy and aligns its IT resources and capabilities with its business needs and goals .Reference:: CISA Review Manual (Digital Version), Chapter 2: Governance and Management of IT, Section 2.2: IT Strategy, page 67 : CISA Online Review Course, Module 2: Governance and Management of IT, Lesson 2.2: IT Strategy

Which of the following is MOST important for an IS auditor to confirm when reviewing an organization's plans to implement robotic process automation (RPA> to automate routine business tasks?

A.
The end-to-end process is understood and documented.
A.
The end-to-end process is understood and documented.
Answers
B.
Roles and responsibilities are defined for the business processes in scope.
B.
Roles and responsibilities are defined for the business processes in scope.
Answers
C.
A benchmarking exercise of industry peers who use RPA has been completed.
C.
A benchmarking exercise of industry peers who use RPA has been completed.
Answers
D.
A request for proposal (RFP) has been issued to qualified vendors.
D.
A request for proposal (RFP) has been issued to qualified vendors.
Answers
Suggested answer: A

Explanation:

The most important thing for an IS auditor to confirm when reviewing an organization's plans to implement robotic process automation (RPA) to automate routine business tasks is that the end-to-end process is understood and documented. This is because RPA involves the use of software robots or digital workers to mimic human actions and execute predefined rules and workflows.Therefore, it is essential that the IS auditor verifies that the organization has a clear and accurate understanding of the current state of the process, the desired state of the process, the inputs and outputs, the exceptions and errors, the roles and responsibilities, and the performance measures12.Without a proper documentation of the end-to-end process, the organization may face challenges in designing, developing, testing, deploying, and monitoring the RPA solution3.Reference:1: CISA Review Manual (Digital Version), Chapter 4: Information Systems Operations and Business Resilience, Section 4.2: IT Service Delivery and Support, page 2112: CISA Online Review Course, Module 4: Information Systems Operations and Business Resilience, Lesson 4.2: IT Service Delivery and Support3: ISACA Journal Volume 5, 2019, Article: Robotic Process Automation: Benefits, Risks and Controls

Which of the following should be performed FIRST before key performance indicators (KPIs) can be implemented?

A.
Analysis of industry benchmarks
A.
Analysis of industry benchmarks
Answers
B.
Identification of organizational goals
B.
Identification of organizational goals
Answers
C.
Analysis of quantitative benefits
C.
Analysis of quantitative benefits
Answers
D.
Implementation of a balanced scorecard
D.
Implementation of a balanced scorecard
Answers
Suggested answer: B

Explanation:

The first thing that should be performed before key performance indicators (KPIs) can be implemented is the identification of organizational goals.This is because KPIs are measurable values that demonstrate how effectively an organization is achieving its key business objectives4. Therefore, it is necessary that the organization defines its goals clearly and aligns them with its vision, mission, and strategy.By identifying its goals, the organization can then determine what KPIs are relevant and meaningful to measure its progress and performance .Reference:4: CISA Review Manual (Digital Version), Chapter 2: Governance and Management of IT, Section 2.3: Benefits Realization, page 77 : CISA Online Review Course, Module 2: Governance and Management of IT, Lesson 2.3: Benefits Realization : ISACA Journal Volume 1, 2020, Article: How to Measure Anything in IT Governance

During audit framework. an IS auditor teams that employees are allowed to connect their personal devices to company-owned computers. How can the auditor BEST validate that appropriate security controls are in place to prevent data loss?

A.
Conduct a walk-through to view results of an employee plugging in a device to transfer confidential data.
A.
Conduct a walk-through to view results of an employee plugging in a device to transfer confidential data.
Answers
B.
Review compliance with data loss and applicable mobile device user acceptance policies.
B.
Review compliance with data loss and applicable mobile device user acceptance policies.
Answers
C.
Verify the data loss prevention (DLP) tool is properly configured by the organization.
C.
Verify the data loss prevention (DLP) tool is properly configured by the organization.
Answers
D.
Verify employees have received appropriate mobile device security awareness training.
D.
Verify employees have received appropriate mobile device security awareness training.
Answers
Suggested answer: B

Explanation:

The best way to validate that appropriate security controls are in place to prevent data loss is to review compliance with data loss and applicable mobile device user acceptance policies. This will ensure that the organization has established clear rules and guidelines for employees to follow when connecting their personal devices to company-owned computers. A walk-through, a DLP tool configuration, and a security awareness training are not sufficient to validate the effectiveness of the controls, as they may not cover all possible scenarios and risks.Reference:IT Audit Fundamentals Certificate Resources

If enabled within firewall rules, which of the following services would present the GREATEST risk?

A.
Simple mail transfer protocol (SMTP)
A.
Simple mail transfer protocol (SMTP)
Answers
B.
Simple object access protocol (SOAP)
B.
Simple object access protocol (SOAP)
Answers
C.
Hypertext transfer protocol (HTTP)
C.
Hypertext transfer protocol (HTTP)
Answers
D.
File transfer protocol (FTP)
D.
File transfer protocol (FTP)
Answers
Suggested answer: D

Explanation:

File transfer protocol (FTP) is a service that allows users to transfer files between computers over a network. If enabled within firewall rules, FTP would present the greatest risk, as it can expose sensitive data to unauthorized access, modification, or deletion. FTP does not provide encryption or authentication, which makes it vulnerable to eavesdropping, spoofing, and tampering attacks. Simple mail transfer protocol (SMTP), simple object access protocol (SOAP), and hypertext transfer protocol (HTTP) are also services that can be used to exchange data over a network, but they have more security features than FTP, such as encryption, authentication, or validation.Reference:CISA Review Manual (Digital Version)

Total 1.198 questions
Go to page: of 120