ExamGecko
Home Home / Isaca / CISA

Isaca CISA Practice Test - Questions Answers, Page 43

Question list
Search
Search

List of questions

Search

Related questions











Which of the following would be of GREATEST concern when reviewing an organization's security information and event management (SIEM) solution?

A.
SIEM reporting is customized.
A.
SIEM reporting is customized.
Answers
B.
SIEM configuration is reviewed annually
B.
SIEM configuration is reviewed annually
Answers
C.
The SIEM is decentralized.
C.
The SIEM is decentralized.
Answers
D.
SIEM reporting is ad hoc.
D.
SIEM reporting is ad hoc.
Answers
Suggested answer: C

Explanation:

The greatest concern that the IS auditor should have when reviewing an organization's security information and event management (SIEM) solution is that the SIEM is decentralized. This is because a decentralized SIEM can pose challenges for collecting, correlating, analyzing and reporting on security events and incidents from multiple sources and locations. A decentralized SIEM can also increase the complexity and cost of maintaining and updating the SIEM components, as well as the risk of inconsistent or incomplete security monitoring and response. The IS auditor should recommend that the organization adopts a centralized or hybrid SIEM architecture that can provide a holistic and integrated view of the security posture and activities across the organization.The other findings are not as concerning as a decentralized SIEM, because they can be addressed by implementing best practices and standards for SIEM reporting and configuration.Reference:CISA Review Manual (Digital Version)1, Chapter 5, Section 5.2.4

Which of the following is MOST important for an IS auditor to look for in a project feasibility study?

A.
An assessment of whether requirements will be fully met
A.
An assessment of whether requirements will be fully met
Answers
B.
An assessment indicating security controls will operate effectively
B.
An assessment indicating security controls will operate effectively
Answers
C.
An assessment of whether the expected benefits can be achieved
C.
An assessment of whether the expected benefits can be achieved
Answers
D.
An assessment indicating the benefits will exceed the implement
D.
An assessment indicating the benefits will exceed the implement
Answers
Suggested answer: C

Explanation:

The most important thing for an IS auditor to look for in a project feasibility study is an assessment of whether the expected benefits can be achieved. A project feasibility study is a preliminary analysis that evaluates the viability and suitability of a proposed project based on various criteria, such as technical, economic, legal, operational, and social factors. The expected benefits are the positive outcomes and value that the project aims to deliver to the organization and its stakeholders. The IS auditor should verify whether the project feasibility study has clearly defined and quantified the expected benefits, and whether it has assessed the likelihood and feasibility of achieving them within the project scope, budget, schedule, and quality parameters.The other options are also important for an IS auditor to look for in a project feasibility study, but not as important as an assessment of whether the expected benefits can be achieved, because they either focus on specific aspects of the project rather than the overall value proposition, or they assume that the project will be implemented rather than evaluating its viability.Reference:CISA Review Manual (Digital Version)1, Chapter 4, Section 4.2.1

What should an IS auditor do FIRST when management responses to an in-person internal control questionnaire indicate a key internal control is no longer effective?

A.
Determine the resources required to make the control effective.
A.
Determine the resources required to make the control effective.
Answers
B.
Validate the overall effectiveness of the internal control.
B.
Validate the overall effectiveness of the internal control.
Answers
C.
Verify the impact of the control no longer being effective.
C.
Verify the impact of the control no longer being effective.
Answers
D.
Ascertain the existence of other compensating controls.
D.
Ascertain the existence of other compensating controls.
Answers
Suggested answer: D

Explanation:

The first thing that an IS auditor should do when management responses to an in-person internal control questionnaire indicate a key internal control is no longer effective is to ascertain the existence of other compensating controls. Compensating controls are alternative controls that provide reasonable assurance of achieving the same objective as the original control. The IS auditor should verify whether there are any compensating controls in place that can mitigate the risk of the key control being ineffective, and evaluate their adequacy and effectiveness.The other options are not the first steps, because they either require more information about the compensating controls, or they are actions to be taken after identifying and assessing the compensating controls.Reference:CISA Review Manual (Digital Version)1, Chapter 2, Section 2.2.3

Which of the following should an IS auditor ensure is classified at the HIGHEST level of sensitivity?

A.
Server room access history
A.
Server room access history
Answers
B.
Emergency change records
B.
Emergency change records
Answers
C.
IT security incidents
C.
IT security incidents
Answers
D.
Penetration test results
D.
Penetration test results
Answers
Suggested answer: D

Explanation:

The IS auditor should ensure that penetration test results are classified at the highest level of sensitivity, because they contain detailed information about the vulnerabilities and weaknesses of the IT systems and networks, as well as the methods and tools used by the testers to exploit them. Penetration test results can be used by malicious actors to launch cyberattacks or cause damage to the organization if they are disclosed or accessed without authorization. Therefore, they should be protected with the highest level of confidentiality, integrity and availability.The other options are not as sensitive as penetration test results, because they either do not reveal as much information about the IT security posture, or they are already known or reported by the organization.Reference:CISA Review Manual (Digital Version)1, Chapter 5, Section 5.2.4

During an exit meeting, an IS auditor highlights that backup cycles are being missed due to operator error and that these exceptions are not being managed. Which of the following is the BEST way to help management understand the associated risk?

A.
Explain the impact to disaster recovery.
A.
Explain the impact to disaster recovery.
Answers
B.
Explain the impact to resource requirements.
B.
Explain the impact to resource requirements.
Answers
C.
Explain the impact to incident management.
C.
Explain the impact to incident management.
Answers
D.
Explain the impact to backup scheduling.
D.
Explain the impact to backup scheduling.
Answers
Suggested answer: A

Explanation:

The best way to help management understand the associated risk of missing backup cycles due to operator error and lack of exception management is to explain the impact to disaster recovery. Disaster recovery is the process of restoring normal operations and functions after a disruptive event, such as a natural disaster, a cyberattack, or a hardware failure. Backup cycles are essential for disaster recovery, because they ensure that the organization has copies of its critical data and systems that can be restored in case of data loss or corruption. If backup cycles are missed due to operator error, and these exceptions are not managed, the organization may not have the latest or complete backups available for disaster recovery, which can result in prolonged downtime, reduced productivity, lost revenue, reputational damage, and legal or regulatory penalties.The other options are not as effective as explaining the impact to disaster recovery, because they either do not address the risk of data loss or corruption, or they focus on operational or technical aspects rather than business outcomes.Reference:CISA Review Manual (Digital Version)1, Chapter 5, Section 5.2.1

Which of the following presents the GREATEST challenge to the alignment of business and IT?

A.
Lack of chief information officer (CIO) involvement in board meetings
A.
Lack of chief information officer (CIO) involvement in board meetings
Answers
B.
Insufficient IT budget to execute new business projects
B.
Insufficient IT budget to execute new business projects
Answers
C.
Lack of information security involvement in business strategy development
C.
Lack of information security involvement in business strategy development
Answers
D.
An IT steering committee chaired by the chief information officer (CIO)
D.
An IT steering committee chaired by the chief information officer (CIO)
Answers
Suggested answer: A

Explanation:

The greatest challenge to the alignment of business and IT is the lack of chief information officer (CIO) involvement in board meetings. The CIO is the senior executive responsible for overseeing the IT strategy, governance, and operations of the organization, and ensuring that they support the business objectives and needs. The CIO should be involved in board meetings to communicate the value and contribution of IT to the organization, to align the IT vision and direction with the business strategy and priorities, and to advocate for the IT resources and investments required to achieve the desired outcomes. The lack of CIO involvement in board meetings can result in a disconnect between business and IT, a loss of trust and confidence in IT, and missed opportunities for innovation and value creation.The other options are not as challenging as the lack of CIO involvement in board meetings, because they either do not affect the strategic alignment of business and IT, or they can be addressed by other means such as collaboration, negotiation, or escalation.Reference:CISA Review Manual (Digital Version)1, Chapter 1, Section 1.2.1

Which of the following is the MOST efficient way to identify segregation of duties violations in a new system?

A.
Review a report of security rights in the system.
A.
Review a report of security rights in the system.
Answers
B.
Observe the performance of business processes.
B.
Observe the performance of business processes.
Answers
C.
Develop a process to identify authorization conflicts.
C.
Develop a process to identify authorization conflicts.
Answers
D.
Examine recent system access rights violations.
D.
Examine recent system access rights violations.
Answers
Suggested answer: A

Explanation:

The most efficient way to identify segregation of duties violations in a new system is to review a report of security rights in the system. Segregation of duties is a control principle that aims to prevent or detect errors, fraud, or abuse by ensuring that no single individual has the ability to perform incompatible or conflicting functions or activities within a system or process. A report of security rights in the system can provide a comprehensive and accurate overview of the roles, responsibilities, and access levels assigned to different users or groups in the system, and can help to identify any potential segregation of duties violations or risks.The other options are not as efficient as reviewing a report of security rights in the system, because they either rely on observation or testing rather than analysis, or they focus on existing rather than potential violations.Reference:CISA Review Manual (Digital Version)1, Chapter 5, Section 5.2.2

An IS auditor has completed the fieldwork phase of a network security review and is preparing the initial following findings should be ranked as the HIGHEST risk?

A.
Network penetration tests are not performed
A.
Network penetration tests are not performed
Answers
B.
The network firewall policy has not been approved by the information security officer.
B.
The network firewall policy has not been approved by the information security officer.
Answers
C.
Network firewall rules have not been documented.
C.
Network firewall rules have not been documented.
Answers
D.
The network device inventory is incomplete.
D.
The network device inventory is incomplete.
Answers
Suggested answer: A

Explanation:

The finding that should be ranked as the highest risk is that network penetration tests are not performed. Network penetration tests are simulated cyberattacks that aim to identify and exploit the vulnerabilities and weaknesses of the network security controls, such as firewalls, routers, switches, servers, and devices. Network penetration tests are essential for assessing the effectiveness and resilience of the network security posture, and for providing recommendations for improvement and remediation. If network penetration tests are not performed, the organization may not be aware of the existing or potential threats and risks to its network, and may not be able to prevent or respond to real cyberattacks, which can result in data breaches, service disruptions, financial losses, reputational damage, and legal or regulatory penalties.The other findings are also important, but not as risky as the lack of network penetration tests, because they either do not directly affect the network security controls, or they can be addressed by documentation or approval processes.Reference:CISA Review Manual (Digital Version)1, Chapter 5, Section 5.2.4

An IS auditor is reviewing logical access controls for an organization's financial business application Which of the following findings should be of GREATEST concern to the auditor?

A.
Users are not required to change their passwords on a regular basis
A.
Users are not required to change their passwords on a regular basis
Answers
B.
Management does not review application user activity logs
B.
Management does not review application user activity logs
Answers
C.
User accounts are shared between users
C.
User accounts are shared between users
Answers
D.
Password length is set to eight characters
D.
Password length is set to eight characters
Answers
Suggested answer: C

Explanation:

The finding that should be of greatest concern to the IS auditor is that user accounts are shared between users. User accounts are unique identifiers that grant access to an organization's financial business application based on the roles and responsibilities of the users. User accounts should be individualized and personalized to ensure accountability, traceability, and auditability of user actions and transactions. User accounts should not be shared between users, because this can compromise the confidentiality, integrity, and availability of the financial data and systems, and can enable unauthorized or fraudulent activities. If user accounts are shared between users, the IS auditor may not be able to determine who performed what action or transaction, or whether the user had the appropriate authorization or approval.The other findings are also concerning, but not as much as user account sharing, because they either affect the password strength or frequency rather than the user identity, or they relate to monitoring rather than controlling user access.Reference:CISA Review Manual (Digital Version)1, Chapter 5, Section 5.2.2

Topic 4, Exam Pool D (NEW)

Which of the following is MOST important for an IS auditor to verify when evaluating an organization's data conversion and infrastructure migration plan?

A.
Strategic: goals have been considered.
A.
Strategic: goals have been considered.
Answers
B.
A rollback plan is included.
B.
A rollback plan is included.
Answers
C.
A code check review is included.
C.
A code check review is included.
Answers
D.
A migration steering committee has been formed.
D.
A migration steering committee has been formed.
Answers
Suggested answer: B

Explanation:

The most important thing for an IS auditor to verify when evaluating an organization's data conversion and infrastructure migration plan is that a rollback plan is included. A rollback plan is a contingency plan that describes the steps and actions to be taken in case the data conversion or infrastructure migration fails or causes unacceptable problems or risks. A rollback plan can help to restore the original data and infrastructure, minimize the impact on the business operations and functions, and ensure the continuity and availability of the IT services. The IS auditor should verify that the rollback plan is feasible, tested, documented, and approved, and that it covers all the possible scenarios and outcomes of the data conversion or infrastructure migration.The other options are not as important as verifying the rollback plan, because they either do not address the potential failure or disruption of the data conversion or infrastructure migration, or they are part of the normal planning and execution process rather than a contingency plan.Reference:CISA Review Manual (Digital Version)1, Chapter 4, Section 4.2.3

Total 1.198 questions
Go to page: of 120