ExamGecko
Home Home / Isaca / CISA

Isaca CISA Practice Test - Questions Answers, Page 47

Question list
Search
Search

List of questions

Search

Related questions











An IS auditor concludes that logging and monitoring mechanisms within an organization are ineffective because critical servers are not included within the central log repository. Which of the following audit procedures would have MOST likely identified this exception?

A.
Inspecting a sample of alerts generated from the central log repository
A.
Inspecting a sample of alerts generated from the central log repository
Answers
B.
Comparing a list of all servers from the directory server against a list of all servers present in the central log repository
B.
Comparing a list of all servers from the directory server against a list of all servers present in the central log repository
Answers
C.
Inspecting a sample of alert settings configured in the central log repository
C.
Inspecting a sample of alert settings configured in the central log repository
Answers
D.
Comparing all servers included in the current central log repository with the listing used for the prior-year audit
D.
Comparing all servers included in the current central log repository with the listing used for the prior-year audit
Answers
Suggested answer: B

Explanation:

The audit procedure that would have most likely identified the exception of critical servers not included in the central log repository is to compare a list of all servers from the directory server against a list of all servers present in the central log repository. This would allow the IS auditor to detect any discrepancies or omissions in the central log repository. The other audit procedures (A, C and D) would not be effective in identifying this exception, as they would only focus on the alerts generated, the alert settings configured, or the servers included in the previous year's audit, which may not reflect the current state of the central log repository.Reference:IS Audit and Assurance Guideline 2202: Evidence Collection Techniques,CISA Review Manual (Digital Version), Chapter 5: Protection of Information Assets, Section 5.3: Logging and Monitoring

A financial group recently implemented new technologies and processes, Which type of IS audit would provide the GREATEST level of assurance that the department's objectives have been met?

A.
Performance audit
A.
Performance audit
Answers
B.
Integrated audit
B.
Integrated audit
Answers
C.
Cyber audit
C.
Cyber audit
Answers
D.
Financial audit
D.
Financial audit
Answers
Suggested answer: B

Explanation:

The type of IS audit that would provide the greatest level of assurance that the department's objectives have been met after implementing new technologies and processes is an integrated audit. An integrated audit is an audit that combines financial, operational, compliance, and IT auditing aspects to provide a holistic view of the organization's performance and risks. An integrated audit can evaluate whether the new technologies and processes are aligned with the organization's goals, strategies, policies, and controls, and whether they are delivering value, efficiency, effectiveness, and reliability. The other types of IS audits (A, C and D) would not provide the same level of assurance, as they would only focus on specific aspects of the organization's activities, such as performance, cyber security, or financial reporting, which may not capture the full impact of the new technologies and processes.Reference:CISA Certification | Certified Information Systems Auditor | ISACA,CISA Review Manual (Digital Version), Chapter 1: The Process of Auditing Information Systems, Section 1.2: Types of IS Audit Engagements

Which of the following areas is MOST likely to be overlooked when implementing a new data classification process?

A.
End-user computing (EUC) systems
A.
End-user computing (EUC) systems
Answers
B.
Email attachments
B.
Email attachments
Answers
C.
Data sent to vendors
C.
Data sent to vendors
Answers
D.
New system applications
D.
New system applications
Answers
Suggested answer: A

Explanation:

The area that is most likely to be overlooked when implementing a new data classification process is end-user computing (EUC) systems. EUC systems are applications or tools that are developed or customized by end users, often without formal IT involvement or approval. EUC systems may contain sensitive or confidential data that need to be classified and protected according to the organization's policies and standards. However, EUC systems may not be subject to the same controls, oversight, or documentation as formal IT systems, and may not be included in the scope of the data classification process. Therefore, EUC systems pose a significant risk of data leakage, unauthorized access, or noncompliance. The other areas (B, C and D) are less likely to be overlooked, as they are more visible and manageable by the IT department or the data owners.Reference:IS Audit and Assurance Guideline 2202: Evidence Collection Techniques,CISA Review Manual (Digital Version), Chapter 5: Protection of Information Assets, Section 5.2: Data Classification

An IS auditor Is renewing the deployment of a new automated system Which of the following findings presents the MOST significant risk?

A.
The new system has resulted m layoffs of key experienced personnel.
A.
The new system has resulted m layoffs of key experienced personnel.
Answers
B.
Users have not been trained on the new system.
B.
Users have not been trained on the new system.
Answers
C.
Data from the legacy system is not migrated correctly to the new system.
C.
Data from the legacy system is not migrated correctly to the new system.
Answers
D.
The new system is not platform agnostic
D.
The new system is not platform agnostic
Answers
Suggested answer: C

Explanation:

The finding that presents the most significant risk when reviewing the deployment of a new automated system is that data from the legacy system is not migrated correctly to the new system. Data migration is a critical process that involves transferring data from one system to another, ensuring its accuracy, completeness, integrity, and usability. If data migration is not performed correctly, it can result in data loss, corruption, inconsistency, or duplication, which can affect the functionality, performance, reliability, and security of the new system. Data migration errors can also have serious business implications, such as affecting decision making, reporting, compliance, customer service, and revenue. The other findings (A, B and D) are less significant risks, as they can be mitigated by rehiring or retraining personnel, providing user training, or adapting the system to different platforms.

Which of the following is an advantage of using agile software development methodology over the waterfall methodology?

A.
Less funding required overall
A.
Less funding required overall
Answers
B.
Quicker deliverables
B.
Quicker deliverables
Answers
C.
Quicker end user acceptance
C.
Quicker end user acceptance
Answers
D.
Clearly defined business expectations
D.
Clearly defined business expectations
Answers
Suggested answer: B

Explanation:

The advantage of using agile software development methodology over the waterfall methodology is that it allows for quicker deliverables. Agile software development is an iterative and incremental approach that emphasizes customer feedback, collaboration, and adaptation. Agile software development delivers working software in short cycles, called sprints, that typically last from two to four weeks. This enables the development team to respond to changing requirements, deliver value faster, and improve quality. Waterfall software development is a linear and sequential approach that follows a predefined set of phases, such as planning, analysis, design, implementation, testing, and maintenance. Waterfall software development requires a clear and stable definition of the project scope, deliverables, and expectations before starting the development process. Waterfall software development can be slow, rigid, and costly, especially if changes occur during the later stages of the project.Reference:CISA Review Manual (Digital Version), Chapter 3: Information Systems Acquisition, Development & Implementation, Section 3.1: Project Management Practices

Which of the following is the BEST control to minimize the risk of unauthorized access to lost company-owned mobile devices?

A.
Password/PIN protection
A.
Password/PIN protection
Answers
B.
Device tracking software
B.
Device tracking software
Answers
C.
Device encryption
C.
Device encryption
Answers
D.
Periodic backup
D.
Periodic backup
Answers
Suggested answer: C

Explanation:

The best control to minimize the risk of unauthorized access to lost company-owned mobile devices is device encryption. Device encryption is a process that transforms data on a device into an unreadable format using a cryptographic key. Device encryption protects the data stored on the device from being accessed by unauthorized parties, even if they bypass the password or PIN protection. Device encryption can also prevent data leakage if the device is disposed of or recycled without proper data sanitization. Password or PIN protection is a basic control that prevents unauthorized access to the device by requiring a secret code or pattern to unlock it. However, password or PIN protection can be easily compromised by brute force attacks, shoulder surfing, or social engineering. Device tracking software is a tool that allows the device owner or administrator to locate, lock, or wipe the device remotely in case of loss or theft. However, device tracking software depends on the device's network connectivity and GPS functionality, which may not be available or reliable in some situations. Periodic backup is a process that copies the data from the device to another storage location for recovery purposes. Periodic backup can help restore the data in case of loss or damage of the device, but it does not prevent unauthorized access to the data on the device itself.Reference:CISA Review Manual (Digital Version), Chapter 5: Protection of Information Assets, Section 5.4: Mobile Devices

Which of the following is the BEST approach for determining the overall IT risk appetite of an organization when business units use different methods for managing IT risks?

A.
Average the business units' IT risk levels
A.
Average the business units' IT risk levels
Answers
B.
Identify the highest-rated IT risk level among the business units
B.
Identify the highest-rated IT risk level among the business units
Answers
C.
Prioritize the organization's IT risk scenarios
C.
Prioritize the organization's IT risk scenarios
Answers
D.
Establish a global IT risk scoring criteria
D.
Establish a global IT risk scoring criteria
Answers
Suggested answer: C

Explanation:

The best approach for determining the overall IT risk appetite of an organization when business units use different methods for managing IT risks is to prioritize the organization's IT risk scenarios. IT risk appetite is the amount and type of IT risk that an organization is willing to accept in pursuit of its objectives. IT risk scenarios are hypothetical situations that describe the potential impact of IT risk events on the organization's objectives, processes, and resources. By prioritizing the organization's IT risk scenarios, the IS auditor can identify the most significant IT risks that affect the organization as a whole, and align them with the organization's strategic goals, values, and culture. Prioritizing the organization's IT risk scenarios can also help to communicate and monitor the IT risk appetite across the organization, and facilitate consistent and informed decision making. The other approaches (A, B and D) are not effective for determining the overall IT risk appetite of an organization, as they do not consider the impact and likelihood of IT risks on the organization's objectives, nor do they account for the diversity and complexity of IT risks across different business units.Reference:CISA Review Manual (Digital Version), Chapter 2: Governance and Management of Information Technology, Section 2.3: Information Technology Risk Management

Which of the following should be of GREATEST concern to an |$ auditor reviewing data conversion and migration during the implementation of a new application system?

A.
The change management process was not formally documented
A.
The change management process was not formally documented
Answers
B.
Backups of the old system and data are not available online
B.
Backups of the old system and data are not available online
Answers
C.
Unauthorized data modifications occurred during conversion,
C.
Unauthorized data modifications occurred during conversion,
Answers
D.
Data conversion was performed using manual processes
D.
Data conversion was performed using manual processes
Answers
Suggested answer: C

Explanation:

The finding that should be of greatest concern to an IS auditor reviewing data conversion and migration during the implementation of a new application system is that unauthorized data modifications occurred during conversion. Data conversion and migration is a process that involves transferring data from one system to another, ensuring its accuracy, completeness, integrity, and usability. Unauthorized data modifications during conversion can result in data loss, corruption, inconsistency, or duplication, which can affect the functionality, performance, reliability, and security of the new system. Unauthorized data modifications can also have serious business implications, such as affecting decision making, reporting, compliance, customer service, and revenue. The IS auditor should verify that adequate controls are in place to prevent, detect, and correct unauthorized data modifications during conversion, such as access control, data validation, reconciliation, audit trail, and backup and recovery. The other findings (A, B and D) are less concerning, as they can be mitigated by documenting the change management process, restoring the backups of the old system and data from offline storage, or automating the data conversion process.Reference:CISA Review Manual (Digital Version), Chapter 3: Information Systems Acquisition, Development & Implementation, Section 3.4: System Implementation

An IS auditor has discovered that a software system still in regular use is years out of date and no longer supported. The auditee has stated that it will take six months until the software is running on the current version. Which of the following is the BEST way to reduce the immediate risk associated with using an unsupported version of the software?

A.
Verify all patches have been applied to the software system's outdated version.
A.
Verify all patches have been applied to the software system's outdated version.
Answers
B.
Close all unused ports on the outdated software system.
B.
Close all unused ports on the outdated software system.
Answers
C.
Monitor network traffic attempting to reach the outdated software system.
C.
Monitor network traffic attempting to reach the outdated software system.
Answers
D.
Segregate the outdated software system from the main network.
D.
Segregate the outdated software system from the main network.
Answers
Suggested answer: D

Explanation:

The best way to reduce the immediate risk associated with using an unsupported version of the software is to segregate the outdated software system from the main network. This will limit the exposure of the system to potential attacks and prevent it from compromising other systems on the network. Segregating the system will also reduce the impact of any security incidents that may occur on the system.

Monitoring network traffic attempting to reach the outdated software system (option C) is not the best way to reduce the risk, as it will not prevent or stop any attacks on the system. It will only provide visibility into the network activity and alert the auditee of any suspicious or malicious traffic.

Verifying all patches have been applied to the software system's outdated version (option A) and closing all unused ports on the outdated software system (option B) are also not the best ways to reduce the risk, as they will not address the underlying issue of using an unsupported version of the software. Patches and ports may still have vulnerabilities that are not fixed by the vendor, and attackers may exploit them to gain access to the system.

Therefore, option D is the correct answer.

Introduction (Part 1 of 7: Mitigating Risks of Unsupported Operating Systems)

Summary (Part 7 of 7: Mitigating Risks of Unsupported Operating Systems)

Upgrade, Retire, or Replace Unsupported Software (Part 4 of 7: Mitigating Risks of Unsupported Operating Systems)

An IS auditor finds that while an organization's IT strategy is heavily focused on research and development, the majority of protects n the IT portfolio focus on operations and maintenance. Which of the Mowing is the BEST recommendation?

A.
Align the IT strategy will business objectives
A.
Align the IT strategy will business objectives
Answers
B.
Review priorities in the IT portfolio
B.
Review priorities in the IT portfolio
Answers
C.
Change the IT strategy to focus on operational excellence.
C.
Change the IT strategy to focus on operational excellence.
Answers
D.
Align the IT portfolio with the IT strategy.
D.
Align the IT portfolio with the IT strategy.
Answers
Suggested answer: A

Explanation:

The best recommendation is to align the IT strategy with the business objectives. This will ensure that the IT projects and initiatives are consistent with the organization's vision, mission, and goals. IT strategy should be derived from and support the business strategy, not the other way around. By aligning the IT strategy with the business objectives, the organization can achieve better value, performance, and alignment from its IT investments.

Reviewing priorities in the IT portfolio (option B) is not the best recommendation, as it does not address the root cause of the misalignment between the IT strategy and the IT portfolio. The IT portfolio should reflect the IT strategy, which in turn should reflect the business objectives. Simply changing the priorities in the IT portfolio without aligning the IT strategy with the business objectives may result in suboptimal or conflicting outcomes.

Changing the IT strategy to focus on operational excellence (option C) is also not the best recommendation, as it may not be aligned with the business objectives. The organization's IT strategy should be based on its competitive advantage, market position, customer needs, and industry trends. If the organization's business strategy is heavily focused on research and development, then changing the IT strategy to focus on operational excellence may not be appropriate or beneficial.

Aligning the IT portfolio with the IT strategy (option D) is also not the best recommendation, as it does not address the misalignment between the IT strategy and the business objectives. Aligning the IT portfolio with the IT strategy may improve the coherence and consistency of the IT projects, but it may not ensure that they are aligned with the organization's vision, mission, and goals.

Therefore, option A is the correct answer.

The Challenges of Aligning IT and the Business | CIO Insight

Strategic alignment and value maximization for IT project portfolios ...

A Guide to IT Portfolio Management | Adobe Workfront

Total 1.198 questions
Go to page: of 120