ExamGecko
Home Home / Isaca / CISA

Isaca CISA Practice Test - Questions Answers, Page 52

Question list
Search
Search

List of questions

Search

Related questions











When classifying information, it is MOST important to align the classification to:

A.
business risk
A.
business risk
Answers
B.
security policy
B.
security policy
Answers
C.
data retention requirements
C.
data retention requirements
Answers
D.
industry standards
D.
industry standards
Answers
Suggested answer: A

Explanation:

When classifying information, it is most important to align the classification to business risk, because it ensures that the information is protected according to its value and impact to the organization34.Business risk considers factors such as legal, regulatory, contractual, operational, reputational, and financial implications of information disclosure or compromise34. Aligning information classification to business risk also helps to prioritize and allocate resources for information security measures.Security policy, data retention requirements, and industry standards are important considerations for information classification, but not as important as business risk.Reference:3: CISA Review Manual (Digital Version), Chapter 5, Section 5.4.24: CISA Online Review Course, Module 5, Lesson 4

What is the BEST way to reduce the risk of inaccurate or misleading data proliferating through business intelligence systems?

A.
Establish rules for converting data from one format to another
A.
Establish rules for converting data from one format to another
Answers
B.
Implement data entry controls for new and existing applications
B.
Implement data entry controls for new and existing applications
Answers
C.
Implement a consistent database indexing strategy
C.
Implement a consistent database indexing strategy
Answers
D.
Develop a metadata repository to store and access metadata
D.
Develop a metadata repository to store and access metadata
Answers
Suggested answer: A

Explanation:

The best way to reduce the risk of inaccurate or misleading data proliferating through business intelligence systems is to establish rules for converting data from one format to another, because this ensures that the data quality and integrity are maintained throughout the data transformation process.Data conversion rules define the standards, procedures, and methods for transforming data from different sources and formats into a common format and structure that can be used by the business intelligence systems12.Implementing data entry controls for new and existing applications, implementing a consistent database indexing strategy, and developing a metadata repository to store and access metadata are not the best ways to reduce the risk of inaccurate or misleading data proliferating through business intelligence systems, because they do not address the issue of data conversion, which is a critical step in the data integration process for business intelligence systems.Reference:1: CISA Review Manual (Digital Version), Chapter 4, Section 4.3.32: CISA Online Review Course, Module 4, Lesson 3

Which of the following is the MOST important Issue for an IS auditor to consider with regard to Voice-over IP (VoIP) communications?

A.
Continuity of service
A.
Continuity of service
Answers
B.
Identity management
B.
Identity management
Answers
C.
Homogeneity of the network
C.
Homogeneity of the network
Answers
D.
Nonrepudiation
D.
Nonrepudiation
Answers
Suggested answer: C

Explanation:

The most important issue for an IS auditor to consider with regard to Voice-over IP (VoIP) communications is the homogeneity of the network, because it affects the quality, security, and reliability of the VoIP service.A homogeneous network is one that uses a single protocol or standard for VoIP communication, such as Session Initiation Protocol (SIP) or H.32312.A homogeneous network can reduce the complexity, latency, and interoperability issues that may arise from using different or incompatible protocols or devices for VoIP communication12.Continuity of service, identity management, and nonrepudiation are also important issues for VoIP communications, but not as important as the homogeneity of the network.Reference:1: CISA Review Manual (Digital Version), Chapter 4, Section 4.4.32: CISA Online Review Course, Module 4, Lesson 4

Which of the following testing methods is MOST appropriate for assessing whether system integrity has been maintained after changes have been made?

A.
Regression testing
A.
Regression testing
Answers
B.
Unit testing
B.
Unit testing
Answers
C.
Integration testing
C.
Integration testing
Answers
D.
Acceptance testing
D.
Acceptance testing
Answers
Suggested answer: A

Explanation:

Regression testing is the most appropriate testing method for assessing whether system integrity has been maintained after changes have been made.Regression testing is a type of software testing that ensures that previously developed and tested software still performs as expected after a change1Regression testing helps to detect any defects or errors that may have been introduced or uncovered due to the change2Regression testing can be performed at different levels of testing, such as unit, integration, system, and acceptance3

Unit testing is a type of software testing that verifies the functionality of individual components or units of code. Unit testing is usually performed by developers before integrating the code with other components. Unit testing helps to identify and fix errors at an early stage of development, but it does not ensure that the system as a whole works as expected after a change.

Integration testing is a type of software testing that verifies the functionality, performance, and reliability of the interactions between different components or units of code. Integration testing is usually performed after unit testing and before system testing. Integration testing helps to identify and fix errors that may occur when different components are integrated, but it does not ensure that the system as a whole works as expected after a change.

Acceptance testing is a type of software testing that verifies whether the system meets the user requirements and expectations. Acceptance testing is usually performed by end-users or customers after system testing and before deploying the system to production. Acceptance testing helps to ensure that the system delivers the desired value and quality to the users, but it does not ensure that the system as a whole works as expected after a change.

Which of the following should be the FIRST step when planning an IS audit of a third-party service provider that monitors network activities?

A.
Review the third party's monitoring logs and incident handling
A.
Review the third party's monitoring logs and incident handling
Answers
B.
Review the roles and responsibilities of the third-party provider
B.
Review the roles and responsibilities of the third-party provider
Answers
C.
Evaluate the organization's third-party monitoring process
C.
Evaluate the organization's third-party monitoring process
Answers
D.
Determine if the organization has a secure connection to the provider
D.
Determine if the organization has a secure connection to the provider
Answers
Suggested answer: B

Explanation:

The first step when planning an IS audit of a third-party service provider that monitors network activities is to review the roles and responsibilities of the third-party provider. This will help to establish the scope, objectives, and expectations of the audit, as well as to identify any potential risks, issues, or gaps in the service level agreement (SLA) between the organization and the provider.Reviewing the third party's monitoring logs and incident handling, evaluating the organization's third-party monitoring process, and determining if the organization has a secure connection to the provider are important steps, but they should be performed after reviewing the roles and responsibilities of the provider.Reference:CISA Review Manual (Digital Version)1, page 269.

When auditing the closing stages of a system development protect which of the following should be the MOST important consideration?

A.
Control requirements
A.
Control requirements
Answers
B.
Rollback procedures
B.
Rollback procedures
Answers
C.
Functional requirements documentation
C.
Functional requirements documentation
Answers
D.
User acceptance lest (UAT) results
D.
User acceptance lest (UAT) results
Answers
Suggested answer: D

Explanation:

When auditing the closing stages of a system development project, the most important consideration should be the user acceptance test (UAT) results. The UAT is a critical phase of the system development life cycle (SDLC) that ensures that the system meets the functional requirements and expectations of the end users. The UAT results provide evidence of the system's quality, performance, usability, and reliability.Control requirements, rollback procedures, and functional requirements documentation are also important considerations, but they are not as crucial as the UAT results in determining if the system is ready for deployment.Reference:CISA Review Manual (Digital Version)1, page 325.

Which of the following provides the BEST audit evidence that a firewall is configured in compliance with the organization's security policy?

A.
Analyzing how the configuration changes are performed
A.
Analyzing how the configuration changes are performed
Answers
B.
Analyzing log files
B.
Analyzing log files
Answers
C.
Reviewing the rule base
C.
Reviewing the rule base
Answers
D.
Performing penetration testing
D.
Performing penetration testing
Answers
Suggested answer: C

Explanation:

The best audit evidence that a firewall is configured in compliance with the organization's security policy is to review the rule base. The rule base is a set of rules that defines the criteria for allowing or denying network traffic through the firewall. By reviewing the rule base, the auditor can verify if the firewall configuration matches the security policy requirements and objectives.Analyzing how the configuration changes are performed, analyzing log files, and performing penetration testing are useful audit techniques, but they do not provide direct evidence of the firewall configuration compliance.Reference:CISA Review Manual (Digital Version)1, page 383.

A checksum is classified as which type of control?

A.
Detective control
A.
Detective control
Answers
B.
Preventive control
B.
Preventive control
Answers
C.
Corrective control
C.
Corrective control
Answers
D.
Administrative control
D.
Administrative control
Answers
Suggested answer: A

Explanation:

A checksum is classified as a detective control. A checksum is a mathematical value that is calculated from a data set and used to verify the integrity of the data. A checksum can detect if the data has been altered or corrupted during transmission or storage. A checksum does not prevent or correct the data corruption, but it alerts the user or system of the problem. Therefore, it is a detective control. A preventive control is a control that prevents an error or incident from occurring. A corrective control is a control that restores normal operations after an error or incident has occurred.An administrative control is a control that involves policies, procedures, standards, guidelines, or organizational structures.Reference:CISA Review Manual (Digital Version)1, page 439.

Which of the following should be considered when examining fire suppression systems as part of a data center environmental controls review?

A.
Installation manuals
A.
Installation manuals
Answers
B.
Onsite replacement availability
B.
Onsite replacement availability
Answers
C.
Insurance coverage
C.
Insurance coverage
Answers
D.
Maintenance procedures
D.
Maintenance procedures
Answers
Suggested answer: D

Explanation:

The correct answer is D. Maintenance procedures should be considered when examining fire suppression systems as part of a data center environmental controls review. Fire suppression systems are critical for protecting the data center equipment and personnel from fire hazards. Therefore, they should be regularly maintained and tested to ensure their proper functioning and compliance with safety standards. Maintenance procedures should include inspection, cleaning, replacement, and repair of the fire suppression system components, as well as documentation of the maintenance activities and results.Installation manuals, onsite replacement availability, and insurance coverage are not directly related to the fire suppression system performance and effectiveness, and therefore are not relevant for the audit review.Reference:CISA Review Manual (Digital Version)1, page 403.

During a database management evaluation an IS auditor discovers that some accounts with database administrator (DBA) privileges have been assigned a default password with an unlimited number of failed login attempts Which of the following is the auditor's BEST course of action?

A.
Identify accounts that have had excessive failed login attempts and request they be disabled
A.
Identify accounts that have had excessive failed login attempts and request they be disabled
Answers
B.
Request the IT manager to change administrator security parameters and update the finding
B.
Request the IT manager to change administrator security parameters and update the finding
Answers
C.
Document the finding and explain the risk of having administrator accounts with inappropriate security settings
C.
Document the finding and explain the risk of having administrator accounts with inappropriate security settings
Answers
Suggested answer: C

Explanation:

The auditor's best course of action is to document the finding and explain the risk of having administrator accounts with inappropriate security settings. This is because the auditor's role is to identify and report the issues, not to fix them or request others to fix them. The auditor should also communicate the impact of the finding, such as the possibility of unauthorized access, data tampering, or denial of service attacks. The auditor should not assume the responsibility of the IT manager or the DBA, who are in charge of changing the security parameters or disabling the accounts.Reference:

CISA Review Manual (Digital Version), Chapter 4, Section 4.2.21

CISA Online Review Course, Domain 1, Module 3, Lesson 32

Total 1.198 questions
Go to page: of 120