ExamGecko
Home Home / Isaca / CISA

Isaca CISA Practice Test - Questions Answers, Page 49

Question list
Search
Search

Related questions











Which of the following provides a new IS auditor with the MOST useful information to evaluate overall IT performance?

A.
IT value analysis
A.
IT value analysis
Answers
B.
Prior audit reports
B.
Prior audit reports
Answers
C.
IT balanced scorecard
C.
IT balanced scorecard
Answers
D.
Vulnerability assessment report
D.
Vulnerability assessment report
Answers
Suggested answer: C

Explanation:

An IT balanced scorecard (BSC) is a performance metric that is used to identify, improve, and control the various functions and outcomes of an IT department or organization. An IT BSC is based on the concept of the balanced scorecard, which was introduced by Robert Kaplan and David Norton in 1992 as a strategic management system that translates the vision and strategy of an organization into measurable objectives and actions. An IT BSC adapts the balanced scorecard framework to the specific needs and goals of the IT function, aligning it with the business strategy and value proposition.

An IT BSC typically consists of four perspectives that help managers plan, implement, and evaluate the IT performance: customer, internal process, learning and growth, and financial. Each perspective defines a set of objectives, measures, targets, and initiatives that reflect the IT contribution to the organization's success. For example, the customer perspective may measure the satisfaction and retention of internal and external customers who use IT services or products; the internal process perspective may measure the efficiency and effectiveness of IT processes such as development, delivery, support, or security; the learning and growth perspective may measure the skills, knowledge, innovation, and culture of the IT staff; and the financial perspective may measure the costs, benefits, and return on investment of IT projects or assets.

An IT BSC provides a new IS auditor with the most useful information to evaluate overall IT performance because it:

Provides a comprehensive and balanced view of the IT function from multiple angles and stakeholders

Links the IT objectives and activities to the business strategy and value creation

Enables a clear communication and alignment of expectations and priorities among IT managers, staff, customers, and other stakeholders

Facilitates a continuous monitoring and improvement of IT performance based on data-driven feedback and analysis

Supports a holistic and integrated approach to IT governance, risk management, and compliance

Therefore, an IT BSC is a valuable tool for a new IS auditor to assess how well the IT function is fulfilling its mission and delivering value to the organization.

The IT Balanced Scorecard (BSC) Explained - BMC Software

What Is a Balanced Scorecard (BSC), How Is it Used in Business?

Lost in the Woods: COBIT 2019 and the IT Balanced Scorecard - ISACA

A disaster recovery plan (DRP) should include steps for:

A.
assessing and quantifying risk.
A.
assessing and quantifying risk.
Answers
B.
negotiating contracts with disaster planning consultants.
B.
negotiating contracts with disaster planning consultants.
Answers
C.
identifying application control requirements.
C.
identifying application control requirements.
Answers
D.
obtaining replacement supplies.
D.
obtaining replacement supplies.
Answers
Suggested answer: D

Explanation:

A disaster recovery plan (DRP) is a set of detailed, documented guidelines that outline a business' critical assets and explain how the organization will respond to unplanned incidents.Unplanned incidents or disasters typically include cyberattacks, system failures, power outages, natural disasters, equipment failures, or infrastructure damage1. A DRP aims to minimize the impact of a disaster on the business continuity, data integrity, and service delivery of the organization. A DRP also helps the organization recover from a disaster as quickly and efficiently as possible.

A DRP should include steps for obtaining replacement supplies, as this is an essential part of restoring the normal operation of the organization after a disaster. Replacement supplies may include hardware, software, data, network components, office equipment, or other resources that are needed to resume the business functions and processes that were disrupted by the disaster. Obtaining replacement supplies may involve contacting vendors, suppliers, or partners; activating backup or alternative systems; or purchasing or renting new equipment. A DRP should identify the sources, locations, and costs of the replacement supplies, as well as the procedures and responsibilities for acquiring and installing them.

The other three options are not steps that a DRP should include, as they are either part of the pre-disaster planning process or not directly related to the disaster recovery objectives.Assessing and quantifying risk is a step that should be done before creating a DRP, as it helps identify the potential threats and vulnerabilities that could affect the organization and determine the likelihood and impact of each scenario2.Negotiating contracts with disaster planning consultants is also a pre-disaster activity that may help the organization design, implement, test, and maintain a DRP with external expertise and guidance3. Identifying application control requirements is not a step in a DRP, but rather a part of the application development and maintenance process that ensures the quality, security, and reliability of the software applications used by the organization.

Therefore, obtaining replacement supplies is the correct answer.

What is a Disaster Recovery Plan? + Complete Checklist

Risk Assessment - ISACA

Disaster Recovery Planning - ISACA

[Application Controls - ISACA]

Which of the following is the BEST indication that there are potential problems within an organization's IT service desk function?

A.
Undocumented operating procedures
A.
Undocumented operating procedures
Answers
B.
Lack of segregation of duties
B.
Lack of segregation of duties
Answers
C.
An excessive backlog of user requests
C.
An excessive backlog of user requests
Answers
D.
Lack of key performance indicators (KPIs)
D.
Lack of key performance indicators (KPIs)
Answers
Suggested answer: C

Explanation:

An IT service desk is a function that provides technical support and assistance to the users of an organization's IT systems and services. An IT service desk typically handles issues such as software installation, hardware troubleshooting, network connectivity, password reset, system configuration, and user training. An IT service desk aims to ensure that the IT systems and services are available, reliable, secure, and efficient for the users.

One of the best indications that there are potential problems within an organization's IT service desk function is an excessive backlog of user requests. A backlog is a list of user requests that have not been resolved or completed by the IT service desk within a specified time frame. An excessive backlog means that the IT service desk is unable to meet the demand or expectations of the users, and that the users are experiencing delays, dissatisfaction, or frustration with the IT service desk.

An excessive backlog of user requests can indicate various problems within the IT service desk function, such as:

Insufficient staff, resources, or capacity to handle the volume or complexity of user requests

Ineffective processes, procedures, or tools for managing, prioritizing, or resolving user requests

Lack of skills, knowledge, or training among the IT service desk staff to deal with different types of user requests

Poor communication, collaboration, or coordination among the IT service desk staff or with other IT functions or stakeholders

Low quality, performance, or security of the IT systems or services that cause frequent or recurring user issues

Therefore, an excessive backlog of user requests is the best indication that there are potential problems within an organization's IT service desk function.

What is an IT Service Desk? Definition and Functions - Indeed

The Most Common IT Help Desk Issues - SherpaDesk

18 Common IT Help Desk Problems and Solutions - E-Pulse Blog

While evaluating the data classification process of an organization, an IS auditor's PRIMARY focus should be on whether:

A.
data classifications are automated.
A.
data classifications are automated.
Answers
B.
a data dictionary is maintained.
B.
a data dictionary is maintained.
Answers
C.
data retention requirements are clearly defined.
C.
data retention requirements are clearly defined.
Answers
D.
data is correctly classified.
D.
data is correctly classified.
Answers
Suggested answer: D

Explanation:

Data classification is the process of organizing and labeling data into categories based on file type, contents, and other metadata. Data classification helps organizations answer important questions about their data that inform how they mitigate risk and manage data governance policies.Data classification also enables appropriate protection measures, and efficient search, retrieval and use of each data category12.

While evaluating the data classification process of an organization, an IS auditor's primary focus should be on whether data is correctly classified. This means that the data is assigned to the appropriate classification level based on its sensitivity, importance, integrity, availability, compliance requirements, and business value.Correct data classification ensures that the data is protected according to its risk level, and that the organization can comply with relevant laws and regulations that apply to different types of data3.

The other three options are not the primary focus of an IS auditor while evaluating the data classification process, although they may be relevant or useful for certain aspects of data management. Data classifications are automated means that the organization uses software tools or algorithms to analyze and label data based on predefined rules or criteria. This can improve the efficiency and consistency of data classification, but it does not guarantee that the data is correctly classified. The IS auditor still needs to verify the accuracy and validity of the automated classifications, and check for any errors or anomalies.

A data dictionary is maintained means that the organization keeps a record of the definitions, formats, sources, and relationships of the data elements in its systems or databases. This can enhance the understanding and usability of the data, but it does not ensure that the data is correctly classified. The IS auditor still needs to examine the content and context of the data, and compare it with the classification criteria and policies.

Data retention requirements are clearly defined means that the organization specifies how long it will keep different types of data, and when it will delete or archive them. This can help reduce storage costs, improve performance, and comply with legal obligations, but it does not ensure that the data is correctly classified. The IS auditor still needs to assess whether the data is stored and protected according to its classification level, and whether the retention periods are appropriate for each type of data.

Therefore, data is correctly classified is the best answer.

Data Classification: The Basics and a 6-Step Checklist - NetApp

What is Data Classification? Guidelines and Process - Varonis

Data Classification and Handling Procedures Guide

An IS auditor is preparing a plan for audits to be carried out over a specified period. Which of the following activities should the IS auditor perform FIRST?

A.
Allocate audit resources.
A.
Allocate audit resources.
Answers
B.
Prioritize risks.
B.
Prioritize risks.
Answers
C.
Review prior audit reports.
C.
Review prior audit reports.
Answers
D.
Determine the audit universe.
D.
Determine the audit universe.
Answers
Suggested answer: D

Explanation:

An audit universe is a comprehensive list of all the auditable entities, processes, and activities within an organization. It helps the IS auditor to identify the scope, objectives, and priorities of the audit plan, as well as the resources and methodologies required to conduct the audits. An audit universe can also help the IS auditor to ensure that all the key risks, controls, and regulations are covered by the audit plan, and that there are no gaps or overlaps in the audit coverage.

The first activity that the IS auditor should perform when preparing a plan for audits to be carried out over a specified period is to determine the audit universe. This involves defining the criteria and methods for identifying and categorizing the auditable units, such as by business function, process, system, location, or risk level. The IS auditor should also consult with the management and other stakeholders to obtain their input and expectations for the audit plan. The IS auditor should then document and validate the audit universe, and update it regularly to reflect any changes in the organization's structure, operations, or environment.

The other three activities are also important for preparing an audit plan, but they should be performed after determining the audit universe. Allocating audit resources involves assigning staff, time, budget, and tools to each audit based on their complexity, priority, and availability. Prioritizing risks involves assessing the likelihood and impact of each risk associated with each auditable unit, and ranking them according to their significance and urgency. Reviewing prior audit reports involves analyzing the findings, recommendations, and actions from previous audits related to each auditable unit, and evaluating their current status and relevance.

Therefore, determining the audit universe is the best answer.

Audit Universe -- UPDATED 2022 -- Examples, Templates & More!

01 February 2023 Audit universe - IIA

When assessing the overall effectiveness of an organization's disaster recovery planning process, which of the following is MOST important for the IS auditor to verify?

A.
Management contracts with a third party for warm site services.
A.
Management contracts with a third party for warm site services.
Answers
B.
Management schedules an annual tabletop exercise.
B.
Management schedules an annual tabletop exercise.
Answers
C.
Management documents and distributes a copy of the plan to all personnel.
C.
Management documents and distributes a copy of the plan to all personnel.
Answers
D.
Management reviews and updates the plan annually or as changes occur.
D.
Management reviews and updates the plan annually or as changes occur.
Answers
Suggested answer: D

Explanation:

The overall effectiveness of an organization's disaster recovery planning process depends on how well the plan reflects the current and future needs and risks of the organization, and how well the plan is tested, communicated, and maintained. Among the four options given, the most important one for the IS auditor to verify is that management reviews and updates the plan annually or as changes occur.

A disaster recovery plan is not a static document that can be created once and forgotten. It is a dynamic and evolving process that requires regular review and update to ensure that it remains relevant, accurate, and effective. A disaster recovery plan should be reviewed and updated at least annually, or whenever there are significant changes in the organization's structure, operations, environment, or regulations. These changes could affect the business impact analysis, risk assessment, recovery objectives, recovery strategies, roles and responsibilities, or resources of the disaster recovery plan. If the plan is not updated to reflect these changes, it could become obsolete, incomplete, or inconsistent, and fail to meet the organization's recovery needs or expectations.

The other three options are not as important as reviewing and updating the plan, although they may also contribute to the effectiveness of the disaster recovery planning process. Contracting with a third party for warm site services is a possible recovery strategy that involves using a partially equipped facility that can be quickly activated in case of a disaster. However, this strategy may not be suitable or sufficient for every organization or scenario, and it does not guarantee the success of the disaster recovery plan. Scheduling an annual tabletop exercise is a good practice that involves simulating a disaster scenario and testing the plan in a hypothetical setting. However, this exercise may not be enough to evaluate the feasibility or readiness of the plan, and it should be complemented by other types of tests, such as walkthroughs, drills, or full-scale exercises. Documenting and distributing a copy of the plan to all personnel is an essential step that ensures that everyone involved in or affected by the plan is aware of their roles and responsibilities, and has access to the relevant information and instructions. However, this step alone does not ensure that the plan is understood or followed by all personnel, and it should be accompanied by proper training, education, and awareness programs.

Therefore, reviewing and updating the plan annually or as changes occur is the best answer.

In the development of a new financial application, the IS auditor's FIRST involvement should be in the:

A.
control design.
A.
control design.
Answers
B.
feasibility study.
B.
feasibility study.
Answers
C.
application design.
C.
application design.
Answers
D.
system test.
D.
system test.
Answers
Suggested answer: B

Explanation:

In the development of a new financial application, the IS auditor's first involvement should be in the feasibility study. A feasibility study is a preliminary analysis that evaluates the technical, operational, economic, and legal aspects of a proposed project or system. A feasibility study helps determine whether the project or system is viable, feasible, and desirable for the organization and its stakeholders.

The IS auditor's role in the feasibility study is to provide an independent and objective assessment of the project or system's risks, benefits, costs, and impacts. The IS auditor should also ensure that the feasibility study follows a structured and systematic approach, considers all relevant factors and alternatives, and complies with the organization's policies and standards. The IS auditor should also verify that the feasibility study is documented and communicated to the appropriate decision-makers.

The IS auditor's involvement in the feasibility study is important because it can help:

Identify and mitigate potential risks and issues that could affect the project or system's success

Evaluate and justify the project or system's alignment with the organization's strategy, goals, and value proposition

Estimate and optimize the project or system's resources, budget, schedule, and quality

Assess and enhance the project or system's security, reliability, performance, and usability

Ensure that the project or system meets the expectations and requirements of the users and other stakeholders

The other three options are not the first involvement of the IS auditor in the development of a new financial application, although they may be part of the subsequent stages of the development process. Control design is the process of defining and implementing controls that ensure the security, integrity, availability, and efficiency of the system. Application design is the process of specifying the functional and technical features of the system. System test is the process of verifying that the system meets the specifications and requirements.

Therefore, feasibility study is the best answer.

[Feasibility Study - ISACA]

[IS Auditing Guideline G13 Performing an IS Audit Engagement - ISACA]

What is the MOST effective way to detect installation of unauthorized software packages by employees?

A.
Regular scanning of hard drives
A.
Regular scanning of hard drives
Answers
B.
Communicating the policy to employees
B.
Communicating the policy to employees
Answers
C.
Logging of activity on the network
C.
Logging of activity on the network
Answers
D.
Maintaining current antivirus software
D.
Maintaining current antivirus software
Answers
Suggested answer: A

Explanation:

Regular scanning of hard drives is the most effective way to detect installation of unauthorized software packages by employees because it can identify any software that is not approved by the organization and may pose a security risk or violate the software policy. Communicating the policy to employees is important, but it may not prevent or detect unauthorized software installation. Logging of activity on the network can monitor network traffic, but it may not capture all software installation events. Maintaining current antivirus software can protect the system from malicious software, but it may not detect all unauthorized software packages.Reference:

ISACA, CISA Review Manual, 27th Edition, 2020, p.2381

ISACA, CISA Review Questions, Answers & Explanations Database - 12 Month Subscription

Which of the following is MOST effective for controlling visitor access to a data center?

A.
Visitors are escorted by an authorized employee
A.
Visitors are escorted by an authorized employee
Answers
B.
Pre-approval of entry requests
B.
Pre-approval of entry requests
Answers
C.
Visitors sign in at the front desk upon arrival
C.
Visitors sign in at the front desk upon arrival
Answers
D.
Closed-circuit television (CCTV) is used to monitor the facilities
D.
Closed-circuit television (CCTV) is used to monitor the facilities
Answers
Suggested answer: A

Explanation:

The most effective way for controlling visitor access to a data center is to ensure that visitors are escorted by an authorized employee, as this prevents unauthorized or malicious actions by the visitors and provides accountability and supervision.Pre-approval of entry requests, visitors signing in at the front desk upon arrival, and closed-circuit television (CCTV) are also useful measures, but they are not as effective as escorting visitors, as they do not prevent or detect unauthorized or malicious actions by the visitors in real time.Reference:CISA Review Manual (Digital Version), Chapter 5: Protection of Information Assets, Section 5.1: Physical Access Controls1

Which of the following BEST enables an organization to improve the visibility of end-user computing (EUC) applications that support regulatory reporting?

A.
EUC inventory
A.
EUC inventory
Answers
B.
EUC availability controls
B.
EUC availability controls
Answers
C.
EUC access control matrix
C.
EUC access control matrix
Answers
D.
EUC tests of operational effectiveness
D.
EUC tests of operational effectiveness
Answers
Suggested answer: A

Explanation:

The best way to improve the visibility of end-user computing (EUC) applications that support regulatory reporting is to maintain an EUC inventory, as this provides a comprehensive and up-to-date list of all EUC applications, their owners, their locations, their purposes, and their dependencies. An EUC inventory can help identify and manage the risks associated with EUC applications, such as data quality, security, compliance, and continuity.EUC availability controls, EUC access control matrix, and EUC tests of operational effectiveness are important for ensuring the reliability and security of EUC applications, but they do not improve the visibility of EUC applications as much as an EUC inventory.Reference:CISA Review Manual (Digital Version), Chapter 3: Information Systems Acquisition, Development and Implementation, Section 3.4: End-user Computing

Total 1.198 questions
Go to page: of 120