ExamGecko
Home Home / Isaca / CISA

Isaca CISA Practice Test - Questions Answers, Page 56

Question list
Search
Search

Related questions











An organization's IT risk assessment should include the identification of:

A.
vulnerabilities
A.
vulnerabilities
Answers
B.
compensating controls
B.
compensating controls
Answers
C.
business needs
C.
business needs
Answers
D.
business process owners
D.
business process owners
Answers
Suggested answer: A

Explanation:

An IT risk assessment is the process of identifying and assessing the threats facing an organization's information systems, networks, and data. An IT risk assessment helps an organization to understand its current risk profile, prioritize its risks, and implement appropriate controls to mitigate them. An IT risk assessment also helps an organization to comply with relevant laws and standards, such as ISO 27001 or CMMC.

One of the key steps in an IT risk assessment is the identification of vulnerabilities. Vulnerabilities are the weaknesses or gaps in an organization's information security that could be exploited by internal or external threats. Vulnerabilities can exist in various aspects of an organization's information security, such as:

Hardware: The physical devices and components that store or process information

Software: The applications and programs that run on hardware devices

Network: The communication channels and protocols that connect hardware devices

Data: The information that is stored or transmitted by hardware devices or software applications

People: The users or personnel who access or manage information systems or data

Processes: The procedures or workflows that govern how information systems or data are used or maintained

By identifying vulnerabilities in each of these aspects, an organization can assess its exposure to potential threats, such as hackers, malware, natural disasters, human errors, or sabotage. By identifying vulnerabilities, an organization can also determine its risk level for each threat scenario, based on the likelihood and impact of a successful attack. By identifying vulnerabilities, an organization can also identify the existing or required controls to prevent or reduce the impact of an attack.

Therefore, an IT risk assessment should include the identification of vulnerabilities as a crucial component.

4: What Is an IT Risk Assessment? (Plus Benefits and Components) | Indeed.com

5: How to Perform a Successful IT Risk Assessment - Hyperproof

6: IT Risk Resources | ISACA

A characteristic of a digital signature is that it

A.
is under control of the receiver
A.
is under control of the receiver
Answers
B.
is unique to the message
B.
is unique to the message
Answers
C.
is validated when data are changed
C.
is validated when data are changed
Answers
D.
has a reproducible hashing algorithm
D.
has a reproducible hashing algorithm
Answers
Suggested answer: B

Explanation:

A digital signature is a specific type of e-signature that is backed by a digital certificate. A digital certificate is a document that contains the public key of a signer and is issued by a trusted third party called a certificate authority (CA). A digital signature provides proof of the identity of the signer and the integrity of the signed document.

A characteristic of a digital signature is that it is unique to the message. This means that a digital signature cannot be copied from one document to another without being detected as invalid. A digital signature is created by applying a mathematical function called a hashing algorithm to the document. A hashing algorithm produces a fixed-length output called a hash or digest from any input data. The hash is unique to the input data; any change in the input data will result in a different hash.

The signer then encrypts the hash with their private key (a secret key that only they know) to create the digital signature. The encrypted hash is attached to the document as the digital signature. The recipient of the document can verify the digital signature by decrypting it with the signer's public key (a key that is publicly available and matches the private key) to obtain the hash. The recipient then applies the same hashing algorithm to the document to generate another hash. The recipient then compares the two hashes; if they match, it means that the document has not been altered and that the signer is authentic.

Therefore, a digital signature is unique to the message because it is derived from the hash of the message, which is unique to the message.

7: Free Online Signature Generator (Type or Draw) | Signaturely

8: What are digital signatures and certificates? | Acrobat Sign - Adobe

9: eSign PDF with Electronic Signature Free Online - Smallpdf

Demonstrated support from which of the following roles in an organization has the MOST influence over information security governance?

A.
Chief information security officer (CISO)
A.
Chief information security officer (CISO)
Answers
B.
Information security steering committee
B.
Information security steering committee
Answers
C.
Board of directors
C.
Board of directors
Answers
D.
Chief information officer (CIO)
D.
Chief information officer (CIO)
Answers
Suggested answer: C

Explanation:

Information security governance is the subset of enterprise governance that provides strategic direction, ensures that objectives are achieved, manages risk appropriately, uses organizational resources responsibly, and monitors the success or failure of the enterprise security program. Information security governance is essential for ensuring that an organization's information assets are protected from internal and external threats, and that the organization complies with relevant laws and standards.

Demonstrated support from which of the following roles in an organization has the most influence over information security governance? The answer is C, the board of directors. The board of directors is the highest governing body of an organization, responsible for overseeing its strategic direction, performance, and accountability. The board of directors sets the tone at the top for information security governance by:

Establishing a clear vision, mission, and values for information security

Approving and reviewing information security policies and standards

Allocating sufficient resources and budget for information security

Appointing and empowering a chief information security officer (CISO) or equivalent role

Holding management accountable for information security performance and compliance

Communicating and promoting information security awareness and culture

The board of directors has the most influence over information security governance because it has the ultimate authority and responsibility for ensuring that information security is aligned with the organization's business objectives, risks, and stakeholder expectations.

10: What is Information Security Governance? --- RiskOptics - Reciprocity

11: Information Security Governance and Risk Management | Moss Adams

12: ISO/IEC 27014:2020 - Information security, cybersecurity and privacy ...

Which of the following is the BEST methodology to use for estimating the complexity of developing a large business application?

A.
Function point analysis
A.
Function point analysis
Answers
B.
Work breakdown structure
B.
Work breakdown structure
Answers
C.
Critical path analysts
C.
Critical path analysts
Answers
D.
Software cost estimation
D.
Software cost estimation
Answers
Suggested answer: A

Explanation:

Function point analysis (FPA) is the best methodology to use for estimating the complexity of developing a large business application. FPA is a technique that measures the functionality of a software system based on the user requirements and the business processes that the system supports. FPA assigns a numerical value to each function or feature of the system, based on its type, complexity, and relative size. The total number of function points represents the size and complexity of the system, which can be used to estimate the development effort, cost, and time.

FPA has several advantages over other estimation methods, such as:

It is independent of the technology, programming language, or development methodology used for the system. Therefore, it can be applied consistently across different platforms and environments.

It is based on the user perspective and the business value of the system, rather than the technical details or implementation aspects. Therefore, it can be performed early in the project life cycle, before the design or coding phases.

It is objective and standardized, as it follows a set of rules and guidelines defined by the International Function Point Users Group (IFPUG). Therefore, it can reduce ambiguity and improve accuracy and reliability of the estimates.

It is adaptable and scalable, as it can handle changes in the user requirements or the system scope. Therefore, it can support agile and iterative development approaches.

1: Function Point Analysis -- Introduction and Fundamentals

2: Software Engineering | Functional Point (FP) Analysis

One advantage of monetary unit sampling is the fact that

A.
results are stated m terms of the frequency of items in error
A.
results are stated m terms of the frequency of items in error
Answers
B.
it can easily be applied manually when computer resources are not available
B.
it can easily be applied manually when computer resources are not available
Answers
C.
large-value population items are segregated and audited separately
C.
large-value population items are segregated and audited separately
Answers
D.
it increases the likelihood of selecting material items from the population
D.
it increases the likelihood of selecting material items from the population
Answers
Suggested answer: D

Explanation:

Monetary unit sampling (MUS) is a statistical sampling method that is used to determine if the account balances or monetary amounts in a population contain any misstatements. MUS treats each individual dollar in the population as a separate sampling unit, so that larger balances or amounts have a higher probability of being selected than smaller ones. MUS then projects the results of testing the sample to the entire population in terms of dollar values, rather than error rates.

One advantage of MUS is that it increases the likelihood of selecting material items from the population. Material items are those that have a significant impact on the financial statements and could influence the decisions of users. By giving more weight to larger items, MUS ensures that material misstatements are more likely to be detected and reported. MUS also reduces the sample size required to achieve a desired level of confidence and precision, as compared to other sampling methods that do not consider the value of items.

4: Monetary unit sampling definition --- AccountingTools

5: How Does Monetary Unit Sampling Work? - dummies

6: Audit sampling | ACCA Qualification | Students | ACCA Global

An organization has replaced all of the storage devices at its primary data center with new higher-capacity units The replaced devices have been installed at the disaster recovery site to replace older units An IS auditor s PRIMARY concern would be whether

A.
the recovery site devices can handle the storage requirements
A.
the recovery site devices can handle the storage requirements
Answers
B.
hardware maintenance contract is in place for both old and new storage devices
B.
hardware maintenance contract is in place for both old and new storage devices
Answers
C.
the procurement was in accordance with corporate policies and procedures
C.
the procurement was in accordance with corporate policies and procedures
Answers
D.
the relocation plan has been communicated to all concerned parties
D.
the relocation plan has been communicated to all concerned parties
Answers
Suggested answer: A

Explanation:

An IS auditor's primary concern would be whether the recovery site devices can handle the storage requirements. The storage requirements are determined by the amount and type of data that needs to be backed up and restored in case of a disaster at the primary data center. The recovery site devices should have enough capacity, performance, reliability, and compatibility to meet these requirements.

If the recovery site devices cannot handle the storage requirements, then there is a risk that some data may not be backed up properly or may not be available for recovery when needed. This could result in data loss, corruption, or inconsistency, which could affect the business continuity and integrity of the organization.

Therefore, an IS auditor should verify that:

The recovery site devices have sufficient storage space to accommodate all the data that needs to be backed up from the primary data center.

The recovery site devices have adequate bandwidth and speed to transfer and access data efficiently and effectively.

The recovery site devices have appropriate security features and controls to protect data from unauthorized access or modification.

The recovery site devices are compatible with the primary data center devices in terms of hardware, software, format, and protocol.

10: What Is a Disaster Recovery Site? Hot, Cold & Warm Site

11: Disaster recovery site - What is the ideal distance to mitigate risks? - Advisera

12: Offsite Data Backup Storage vs Disaster Recovery (DR) - LINBIT

When reviewing the functionality of an intrusion detection system (IDS), the IS auditor should be MOST concerned if:

A.
legitimate packets blocked by the system have increased
A.
legitimate packets blocked by the system have increased
Answers
B.
actual attacks have not been identified
B.
actual attacks have not been identified
Answers
C.
detected events have increased
C.
detected events have increased
Answers
D.
false positives have been reported
D.
false positives have been reported
Answers
Suggested answer: B

Explanation:

The main purpose of an IDS is to detect and report malicious or suspicious activity on a network or a host. If an IDS fails to identify actual attacks, it means that the IDS is not functioning properly or effectively, and it exposes the organization to serious security risks and potential damage. This is the most concerning scenario for an IS auditor, as it indicates a major deficiency in the IDS performance and configuration.

Reference What is an intrusion detection system (IDS)? What is Intrusion Detection Systems (IDS)? How does it Work? When reviewing an intrusion detection system (IDS), an IS auditor ... Intrusion Detection Systems (IDS)---An Overview with a Generalized ... An overview of issues in testing intrusion detection systems - NIST A Review of Intrusion Detection Systems and Their ...

With regard to resilience, which of the following is the GREATEST risk to an organization that has implemented a new critical system?

A.
A business impact analysis (BIA) has not been performed
A.
A business impact analysis (BIA) has not been performed
Answers
B.
Business data is not sanitized in the development environment
B.
Business data is not sanitized in the development environment
Answers
C.
There is no plan for monitoring system downtime
C.
There is no plan for monitoring system downtime
Answers
D.
The process owner has not signed off on user acceptance testing (UAT)
D.
The process owner has not signed off on user acceptance testing (UAT)
Answers
Suggested answer: A

Explanation:

Resilience is the ability of an organization to continue to operate effectively during or after a disruptive event. A business impact analysis (BIA) is a key process to identify the critical systems and processes that support the organization's objectives and determine the impact of their disruption. Without a BIA, the organization may not be able to prioritize the recovery of the most important systems and processes, which poses the greatest risk to its resilience.The other options are not as significant as a BIA, as they relate to data quality, system monitoring, and user acceptance testing, which are important but not essential for resilience.Reference:CISA Review Manual (Digital Version), Domain 4: Information Systems Operations and Business Resilience, Section 4.2 Business Continuity Planning1

Which of the following poses the GREATEST risk to an organization when employees use public social networking sites?

A.
Cross-site scripting (XSS)
A.
Cross-site scripting (XSS)
Answers
B.
Copyright violations
B.
Copyright violations
Answers
C.
Social engineering
C.
Social engineering
Answers
D.
Adverse posts about the organization
D.
Adverse posts about the organization
Answers
Suggested answer: C

Explanation:

Social engineering is the manipulation of people to perform actions or divulge confidential information. It is a common technique used by attackers to gain unauthorized access to systems or data. Employees who use public social networking sites may be vulnerable to social engineering attacks, such as phishing, baiting, or pretexting, which pose the greatest risk to the organization's security.The other options are not as serious as social engineering, as they relate to web application vulnerabilities, intellectual property rights, and reputation management, which are less likely to compromise the organization's assets or operations.Reference:CISA Review Manual (Digital Version), Domain 5: Protection of Information Assets, Section 5.3 Security Awareness Training1

A computer forensic audit is MOST relevant in which of the following situations?

A.
Inadequate controls in the IT environment
A.
Inadequate controls in the IT environment
Answers
B.
Mismatches in transaction data
B.
Mismatches in transaction data
Answers
C.
Missing server patches
C.
Missing server patches
Answers
D.
Data loss due to hacking of servers
D.
Data loss due to hacking of servers
Answers
Suggested answer: D

Explanation:

A computer forensic audit is a process of collecting, preserving, analyzing, and presenting digital evidence from electronic devices in a legally admissible manner. It is most relevant in situations where data loss due to hacking of servers occurs, as it can help to identify the source, method, and extent of the attack, as well as recover the lost or damaged data.The other options are not as suitable for a computer forensic audit, as they relate to internal control issues, data quality issues, or system maintenance issues, which can be addressed by other types of audits or reviews.Reference:CISA Review Manual (Digital Version), Domain 4: Information Systems Operations and Business Resilience, Section 4.5 Computer Forensics1

Total 1.198 questions
Go to page: of 120