ExamGecko
Home Home / Isaca / CISA

Isaca CISA Practice Test - Questions Answers, Page 50

Question list
Search
Search

Related questions











Which of the following provides the MOST useful information regarding an organization's risk appetite and tolerance?

A.
Gap analysis
A.
Gap analysis
Answers
B.
Audit reports
B.
Audit reports
Answers
C.
Risk profile
C.
Risk profile
Answers
D.
Risk register
D.
Risk register
Answers
Suggested answer: C

Explanation:

The most useful information regarding an organization's risk appetite and tolerance is provided by its risk profile, as this is a document that summarizes the key risks that the organization faces, the potential impacts and likelihoods of those risks, and the acceptable levels of risk exposure for different objectives and activities. A gap analysis is a tool that compares the current state and the desired state of a process or a system, and identifies the gaps that need to be addressed. Audit reports are documents that present the findings, conclusions, and recommendations of an audit engagement.A risk register is a tool that records and tracks the identified risks, their causes, their consequences, and their mitigation actions.Reference:CISA Review Manual (Digital Version), Chapter 2: Governance and Management of IT, Section 2.1: IT Governance

Which of the following is MOST helpful to an IS auditor when assessing the effectiveness of controls?

A.
A control self-assessment (CSA)
A.
A control self-assessment (CSA)
Answers
B.
Results of control testing
B.
Results of control testing
Answers
C.
Interviews with management
C.
Interviews with management
Answers
D.
A control matrix
D.
A control matrix
Answers
Suggested answer: B

Explanation:

The most helpful thing for an IS auditor when assessing the effectiveness of controls is the results of control testing, as this provides objective and reliable evidence of how well the controls are designed and operating in practice. A control self-assessment (CSA) is a technique that involves the participation of process owners and stakeholders in evaluating the effectiveness of controls, but it may not be as rigorous or independent as control testing. Interviews with management are useful for gaining an understanding of the control environment and culture, but they may not reflect the actual performance of controls.A control matrix is a tool that maps the controls to the objectives, risks, and requirements, but it does not measure the effectiveness of controls.Reference:CISA Review Manual (Digital Version), Chapter 1: Information Systems Auditing Process, Section 1.3: IT Audit Process

An organization is planning to implement a work-from-home policy that allows users to work remotely as needed. Which of the following is the BEST solution for ensuring secure remote access to corporate resources?

A.
Additional firewall rules
A.
Additional firewall rules
Answers
B.
Multi-factor authentication
B.
Multi-factor authentication
Answers
C.
Virtual private network (VPN)
C.
Virtual private network (VPN)
Answers
D.
Virtual desktop
D.
Virtual desktop
Answers
Suggested answer: C

Explanation:

The best solution for ensuring secure remote access to corporate resources is to use a virtual private network (VPN), as this creates an encrypted tunnel between the user's device and the corporate network, preventing unauthorized interception or modification of data in transit. Additional firewall rules may help to restrict access to certain ports or protocols, but they do not provide encryption or authentication. Multi-factor authentication may help to verify the identity of the user, but it does not protect the data in transit.Virtual desktop may help to provide a consistent user interface and access to applications, but it does not ensure the security of the communication channel.Reference:CISA Review Manual (Digital Version), Chapter 5: Protection of Information Assets, Section 5.2: Network Security Devices and Technologies

Which of the following is the BEST indication to an IS auditor that management's post-implementation review was effective?

A.
Lessons learned were documented and applied.
A.
Lessons learned were documented and applied.
Answers
B.
Business and IT stakeholders participated in the post-implementation review.
B.
Business and IT stakeholders participated in the post-implementation review.
Answers
C.
Post-implementation review is a formal phase in the system development life cycle (SDLC).
C.
Post-implementation review is a formal phase in the system development life cycle (SDLC).
Answers
D.
Internal audit follow-up was completed without any findings.
D.
Internal audit follow-up was completed without any findings.
Answers
Suggested answer: A

Explanation:

The best indication to an IS auditor that management's post-implementation review was effective is that lessons learned were documented and applied, as this shows that the management has identified and addressed the issues and gaps that arose during the implementation, and has improved the processes and practices for future projects. Business and IT stakeholders participating in the post-implementation review is a good practice, but it does not guarantee that the review was effective or that the outcomes were implemented. Post-implementation review being a formal phase in the system development life cycle (SDLC) is a requirement, but it does not ensure that the review was effective or that the outcomes were implemented.Internal audit follow-up being completed without any findings is a desirable result, but it does not indicate that the management's post-implementation review was effective or that the outcomes were implemented.Reference:CISA Review Manual (Digital Version), Chapter 3: Information Systems Acquisition, Development and Implementation, Section 3.2: Project Management Practices1

Which of the following would be the BEST criteria for monitoring an IT vendor's service levels?

A.
Service auditor's report
A.
Service auditor's report
Answers
B.
Performance metrics
B.
Performance metrics
Answers
C.
Surprise visit to vendor
C.
Surprise visit to vendor
Answers
D.
Interview with vendor
D.
Interview with vendor
Answers
Suggested answer: B

Explanation:

The best criteria for monitoring an IT vendor's service levels are the performance metrics, as they provide quantifiable and measurable indicators of how well the vendor is delivering the agreed-upon services, such as availability, reliability, quality, timeliness, and customer satisfaction. A service auditor's report is a document that provides an independent opinion on the vendor's controls and processes, but it may not reflect the actual service levels or performance. A surprise visit to the vendor may help to verify the vendor's compliance and operations, but it may not be feasible or effective for monitoring the service levels on a regular basis.An interview with the vendor may help to obtain feedback and insights from the vendor's perspective, but it may not be objective or reliable for monitoring the service levels.Reference:CISA Review Manual (Digital Version), Chapter 2: Governance and Management of IT, Section 2.4: IT Service Delivery and Support

Which of the following is the MOST effective method of destroying sensitive data stored on electronic media?

A.
Degaussing
A.
Degaussing
Answers
B.
Random character overwrite
B.
Random character overwrite
Answers
C.
Physical destruction
C.
Physical destruction
Answers
D.
Low-level formatting
D.
Low-level formatting
Answers
Suggested answer: C

Explanation:

The most effective method of destroying sensitive data stored on electronic media is physical destruction, which involves breaking, shredding, melting, or incinerating the media to make it unreadable and unrecoverable. Degaussing, random character overwrite, and low-level formatting are methods of sanitizing or erasing data from electronic media, but they do not guarantee complete destruction of data and may leave some traces that can be recovered by advanced techniques.Therefore, physical destruction is the most secure and reliable method of data disposal for sensitive data.Reference:CISA Review Manual (Digital Version), Chapter 5: Protection of Information Assets, Section 5.4: Data Disposal

An organization has engaged a third party to implement an application to perform business-critical calculations. Which of the following is the MOST important process to help ensure the application provides accurate calculations?

A.
Key performance indicator (KPI) monitoring
A.
Key performance indicator (KPI) monitoring
Answers
B.
Change management
B.
Change management
Answers
C.
Configuration management
C.
Configuration management
Answers
D.
Quality assurance (QA)
D.
Quality assurance (QA)
Answers
Suggested answer: D

Explanation:

The most important process to help ensure the application provides accurate calculations is quality assurance (QA), which involves verifying that the application meets the specified requirements and standards, and testing the application for functionality, performance, reliability, security, and usability. QA helps to identify and correct any defects or errors in the application before it is deployed to the production environment.Key performance indicator (KPI) monitoring, change management, and configuration management are important processes for managing and maintaining the application after it is implemented, but they do not directly ensure the accuracy of the calculations performed by the application.Reference:CISA Review Manual (Digital Version), Chapter 3: Information Systems Acquisition, Development & Implementation, Section 3.3: Practices for Quality Assurance

Which of the following is the BEST source of information to determine the required level of data protection on a file server?

A.
Data classification policy and procedures
A.
Data classification policy and procedures
Answers
B.
Access rights of similar file servers
B.
Access rights of similar file servers
Answers
C.
Previous data breach incident reports
C.
Previous data breach incident reports
Answers
D.
Acceptable use policy and privacy statements
D.
Acceptable use policy and privacy statements
Answers
Suggested answer: A

Explanation:

The best source of information to determine the required level of data protection on a file server is the data classification policy and procedures, which define the criteria and methods for classifying data according to its sensitivity, value, and criticality, and specify the appropriate security measures and controls for each data category. Data classification policy and procedures help to ensure that data is protected in proportion to its importance and risk exposure.Access rights of similar file servers, previous data breach incident reports, and acceptable use policy and privacy statements are not sufficient or reliable sources of information to determine the required level of data protection on a file server, as they do not provide clear and consistent guidance on how to classify and protect data.Reference:CISA Review Manual (Digital Version), Chapter 5: Protection of Information Assets, Section 5.1: Information Asset Security Framework

Which of the following should be the FIRST step when conducting an IT risk assessment?

A.
Identify potential threats.
A.
Identify potential threats.
Answers
B.
Assess vulnerabilities.
B.
Assess vulnerabilities.
Answers
C.
Identify assets to be protected.
C.
Identify assets to be protected.
Answers
D.
Evaluate controls in place.
D.
Evaluate controls in place.
Answers
Suggested answer: C

Explanation:

The first step when conducting an IT risk assessment is to identify assets to be protected, which include hardware, software, data, processes, people, and facilities that support the business objectives and operations of an organization. Identifying assets to be protected helps to establish the scope and boundaries of the risk assessment, as well as the value and criticality of each asset.Identifying potential threats, assessing vulnerabilities, and evaluating controls in place are subsequent steps in the risk assessment process that depend on the identification of assets to be protected.Reference:CISA Review Manual (Digital Version), Chapter 2: Governance & Management of IT, Section 2.3: IT Risk Management

Which of the following is a concern associated with virtualization?

A.
The physical footprint of servers could decrease within the data center.
A.
The physical footprint of servers could decrease within the data center.
Answers
B.
Performance issues with the host could impact the guest operating systems.
B.
Performance issues with the host could impact the guest operating systems.
Answers
C.
Processing capacity may be shared across multiple operating systems.
C.
Processing capacity may be shared across multiple operating systems.
Answers
D.
One host may have multiple versions of the same operating system.
D.
One host may have multiple versions of the same operating system.
Answers
Suggested answer: B

Explanation:

A concern associated with virtualization is that performance issues with the host could impact the guest operating systems, which are the operating systems that run on virtual machines within the host. For example, if the host has insufficient memory, CPU, disk space, or network bandwidth, it could affect the performance and availability of the guest operating systems and the applications running on them.The physical footprint of servers could decrease within the data center, processing capacity may be shared across multiple operating systems, and one host may have multiple versions of the same operating system are not concerns associated with virtualization, but rather benefits or features of virtualization that can help reduce costs, improve efficiency, and enhance flexibility.Reference:CISA Review Manual (Digital Version), Chapter 4: Information Systems Operations and Business Resilience, Section 4.2: IT Service Delivery and Support

Total 1.198 questions
Go to page: of 120