ExamGecko
Home Home / Isaca / CISA

Isaca CISA Practice Test - Questions Answers, Page 51

Question list
Search
Search

List of questions

Search

Related questions











When auditing an organization's software acquisition process the BEST way for an IS auditor to understand the software benefits to the organization would be to review the

A.
feasibility study
A.
feasibility study
Answers
B.
business case
B.
business case
Answers
C.
request for proposal (RFP)
C.
request for proposal (RFP)
Answers
D.
alignment with IT strategy
D.
alignment with IT strategy
Answers
Suggested answer: B

Explanation:

The best way for an IS auditor to understand the software benefits to the organization would be to review the business case, which is a document that provides the justification and rationale for acquiring a software solution based on its expected costs, benefits, risks, and alignment with the organization's goals and strategies. The business case helps to evaluate the feasibility and viability of the software acquisition and to support the decision-making process. A feasibility study is a document that analyzes the technical, operational, economic, legal, and social aspects of a software solution to determine its feasibility and suitability for the organization's needs, but it does not necessarily provide a clear indication of the software benefits to the organization. A request for proposal (RFP) is a document that solicits proposals from potential vendors or suppliers for a software solution based on the organization's requirements and specifications, but it does not necessarily provide a clear indication of the software benefits to the organization.The alignment with IT strategy is a factor that influences the software acquisition process and ensures that the software solution supports and enables the organization's IT strategy, but it is not a document that can be reviewed by an IS auditor to understand the software benefits to the organization.Reference:CISA Review Manual (Digital Version), Chapter 3: Information Systems Acquisition, Development & Implementation, Section 3.1: Business Case Development

An IS auditor conducts a review of a third-party vendor's reporting of key performance indicators (KPIs) Which of the following findings should be of MOST concern to the auditor?

A.
KPI data is not being analyzed
A.
KPI data is not being analyzed
Answers
B.
KPIs are not clearly defined
B.
KPIs are not clearly defined
Answers
C.
Some KPIs are not documented
C.
Some KPIs are not documented
Answers
D.
KPIs have never been updated
D.
KPIs have never been updated
Answers
Suggested answer: B

Explanation:

KPIs are not clearly defined is the most concerning finding for an IS auditor, because it implies that the third-party vendor does not have a clear understanding of what constitutes success or failure in their performance. This can lead to inaccurate or misleading reporting, poor decision making, and lack of accountability.KPIs should be SMART (specific, measurable, achievable, relevant, and time-bound) and aligned with the business objectives and expectations of the stakeholders12.Reference:1: CISA Review Manual (Digital Version), Chapter 5, Section 5.3.22: CISA Online Review Course, Module 5, Lesson 3

Which of the following BEST protects evidence in a forensic investigation?

A.
imaging the affected system
A.
imaging the affected system
Answers
B.
Powering down the affected system
B.
Powering down the affected system
Answers
C.
Protecting the hardware of the affected system
C.
Protecting the hardware of the affected system
Answers
D.
Rebooting the affected system
D.
Rebooting the affected system
Answers
Suggested answer: A

Explanation:

Imaging the affected system is the best way to protect evidence in a forensic investigation, because it creates a bit-by-bit copy of the original data that can be analyzed without altering or compromising the original source.Imaging preserves the integrity and authenticity of the evidence and allows for verification and validation of the results34.Powering down or rebooting the affected system can cause data loss or corruption, while protecting the hardware does not prevent unauthorized access or tampering with the software or data.Reference:3: CISA Review Manual (Digital Version), Chapter 6, Section 6.4.14: CISA Online Review Course, Module 6, Lesson 4

Email required for business purposes is being stored on employees' personal devices.

Which of the following is an IS auditor's BEST recommendation?

A.
Require employees to utilize passwords on personal devices
A.
Require employees to utilize passwords on personal devices
Answers
B.
Prohibit employees from storing company email on personal devices
B.
Prohibit employees from storing company email on personal devices
Answers
C.
Ensure antivirus protection is installed on personal devices
C.
Ensure antivirus protection is installed on personal devices
Answers
D.
Implement an email containerization solution on personal devices
D.
Implement an email containerization solution on personal devices
Answers
Suggested answer: D

Explanation:

Implementing an email containerization solution on personal devices is the best recommendation for an IS auditor, because it allows the organization to separate and secure the email data from the rest of the device data.Email containerization creates a virtual environment that encrypts and isolates the email data, preventing unauthorized access, leakage, or loss of sensitive information12.Requiring passwords or antivirus protection on personal devices may not be sufficient or enforceable, while prohibiting employees from storing company email on personal devices may not be feasible or practical.Reference:1: CISA Review Manual (Digital Version), Chapter 5, Section 5.4.32: CISA Online Review Course, Module 5, Lesson 4

In which of the following system development life cycle (SDLC) phases would an IS auditor expect to find that controls have been incorporated into system specifications?

A.
Implementation
A.
Implementation
Answers
B.
Development
B.
Development
Answers
C.
Feasibility
C.
Feasibility
Answers
D.
Design
D.
Design
Answers
Suggested answer: D

Explanation:

The design phase of the system development life cycle (SDLC) is where an IS auditor would expect to find that controls have been incorporated into system specifications, because this is where the system requirements are translated into detailed design specifications that include the technical, functional, and security aspects of the system34.The implementation phase is where the system is deployed and tested, the development phase is where the system is coded and unit tested, and the feasibility phase is where the system objectives and scope are defined.Reference:3: CISA Review Manual (Digital Version), Chapter 4, Section 4.2.24: CISA Online Review Course, Module 4, Lesson 2

Which of the following is the MAJOR advantage of automating internal controls?

A.
To enable the review of large value transactions
A.
To enable the review of large value transactions
Answers
B.
To efficiently test large volumes of data
B.
To efficiently test large volumes of data
Answers
C.
To help identity transactions with no segregation of duties
C.
To help identity transactions with no segregation of duties
Answers
D.
To assist in performing analytical reviews
D.
To assist in performing analytical reviews
Answers
Suggested answer: B

Explanation:

The major advantage of automating internal controls is to efficiently test large volumes of data, because automated controls can perform repetitive tasks faster, more accurately, and more consistently than manual controls.Automated controls can also provide audit trails and exception reports that facilitate the monitoring and evaluation of the control effectiveness12.Reviewing large value transactions, identifying transactions with no segregation of duties, and performing analytical reviews are possible benefits of automating internal controls, but not the major advantage.Reference:1: CISA Review Manual (Digital Version), Chapter 5, Section 5.2.22: CISA Online Review Course, Module 5, Lesson 2

Which of the following is MOST important to consider when developing a service level agreement (SLAP)?

A.
Description of the services from the viewpoint of the provider
A.
Description of the services from the viewpoint of the provider
Answers
B.
Detailed identification of work to be completed
B.
Detailed identification of work to be completed
Answers
C.
Provisions for regulatory requirements that impact the end users' businesses
C.
Provisions for regulatory requirements that impact the end users' businesses
Answers
D.
Description of the services from the viewpoint of the client organization
D.
Description of the services from the viewpoint of the client organization
Answers
Suggested answer: D

Explanation:

The most important factor to consider when developing a service level agreement (SLA) is the description of the services from the viewpoint of the client organization, because the SLA should reflect the needs and expectations of the client and specify the measurable outcomes and performance indicators that the provider must deliver34.The description of the services from the viewpoint of the provider, the detailed identification of work to be completed, and the provisions for regulatory requirements that impact the end users' businesses are also important elements of an SLA, but not as crucial as the client's perspective.Reference:3: CISA Review Manual (Digital Version), Chapter 5, Section 5.3.14: CISA Online Review Course, Module 5, Lesson 3

Which of the following is the BEST way to address potential data privacy concerns associated with inadvertent disclosure of machine identifier information contained within security logs?

A.
Unit the use of logs to only those purposes for which they were collected
A.
Unit the use of logs to only those purposes for which they were collected
Answers
B.
Restrict the transfer of log files from host machine to online storage
B.
Restrict the transfer of log files from host machine to online storage
Answers
C.
Only collect logs from servers classified as business critical
C.
Only collect logs from servers classified as business critical
Answers
D.
Limit log collection to only periods of increased security activity
D.
Limit log collection to only periods of increased security activity
Answers
Suggested answer: A

Explanation:

Limiting the use of logs to only those purposes for which they were collected is the best way to address potential data privacy concerns associated with inadvertent disclosure of machine identifier information contained within security logs, because it minimizes the risk of unauthorized access, misuse, or leakage of personal data that may be embedded in the logs.Logs should be collected and processed in accordance with the data protection principles and regulations, such as the General Data Protection Regulation (GDPR)12.Restricting the transfer of log files from host machine to online storage, only collecting logs from servers classified as business critical, and limiting log collection to only periods of increased security activity are not effective ways to address data privacy concerns, because they do not prevent or mitigate the potential disclosure of personal data in the logs.Reference:1: CISA Review Manual (Digital Version), Chapter 5, Section 5.4.42: CISA Online Review Course, Module 5, Lesson 4

Which of the following would BEST help to ensure that an incident receives attention from appropriate personnel in a timely manner?

A.
Completing the incident management log
A.
Completing the incident management log
Answers
B.
Broadcasting an emergency message
B.
Broadcasting an emergency message
Answers
C.
Requiring a dedicated incident response team
C.
Requiring a dedicated incident response team
Answers
D.
Implementing incident escalation procedures
D.
Implementing incident escalation procedures
Answers
Suggested answer: D

Explanation:

Implementing incident escalation procedures is the best way to ensure that an incident receives attention from appropriate personnel in a timely manner, because it defines the roles and responsibilities, communication channels, and escalation criteria for handling different types of incidents34. Incident escalation procedures help to prioritize and coordinate the response efforts and ensure that the incident is resolved by the most qualified and authorized personnel.Completing the incident management log, broadcasting an emergency message, and requiring a dedicated incident response team are not sufficient to ensure that an incident receives attention from appropriate personnel in a timely manner, because they do not specify how to escalate the incident based on its severity, impact, or complexity.Reference:3: CISA Review Manual (Digital Version), Chapter 6, Section 6.3.24: CISA Online Review Course, Module 6, Lesson 3

Which of the following is the BEST source of information for examining the classification of new data?

A.
Input by data custodians
A.
Input by data custodians
Answers
B.
Security policy requirements
B.
Security policy requirements
Answers
C.
Risk assessment results
C.
Risk assessment results
Answers
D.
Current level of protection
D.
Current level of protection
Answers
Suggested answer: C

Explanation:

The best source of information for examining the classification of new data is the risk assessment results, because they provide an objective and consistent basis for determining the value, sensitivity, and criticality of the data, as well as the potential impact of unauthorized disclosure, modification, or loss of the data12.The risk assessment results can help to define the appropriate classification levels and criteria for the data, such as public, internal, confidential, or restricted12.Input by data custodians, security policy requirements, and current level of protection are not the best sources of information for examining the classification of new data, because they may not reflect the actual risk exposure or business needs of the data.Reference:1: CISA Review Manual (Digital Version), Chapter 5, Section 5.4.22: CISA Online Review Course, Module 5, Lesson 4

Total 1.198 questions
Go to page: of 120