ExamGecko
Home Home / Isaca / CISA

Isaca CISA Practice Test - Questions Answers, Page 57

Question list
Search
Search

List of questions

Search

Related questions











Users are complaining that a newly released enterprise resource planning (ERP) system is functioning too slowly. Which of the following tests during the quality assurance (QA) phase would have identified this concern?

A.
Stress
A.
Stress
Answers
B.
Regression
B.
Regression
Answers
C.
Interface
C.
Interface
Answers
D.
Integration
D.
Integration
Answers
Suggested answer: A

Explanation:

Stress testing is a type of performance testing that evaluates how a system behaves under extreme load conditions, such as high user traffic, large data volumes, or limited resources. It is useful for identifying potential bottlenecks, errors, or failures that may affect the system's functionality or availability. Stress testing during the quality assurance (QA) phase would have identified the concern of users complaining that a newly released ERP system is functioning too slowly.The other options are not as relevant for this concern, as they relate to different aspects of testing, such as regression testing (verifying that existing functionality is not affected by new changes), interface testing (verifying that the system interacts correctly with other systems or components), or integration testing (verifying that the system works as a whole after combining different modules or units).Reference:CISA Review Manual (Digital Version), Domain 5: Protection of Information Assets, Section 5.4 Testing Techniques1

Due to advancements in technology and electronic records, an IS auditor has completed an engagement by email only. Which of the following did the IS auditor potentially compromise?

A.
Proficiency
A.
Proficiency
Answers
B.
Due professional care
B.
Due professional care
Answers
C.
Sufficient evidence
C.
Sufficient evidence
Answers
D.
Reporting
D.
Reporting
Answers
Suggested answer: B

Explanation:

Due professional care is the obligation of an IS auditor to exercise the appropriate level of skill, competence, and diligence in performing an audit. It also requires the IS auditor to comply with the relevant standards, guidelines, and ethical principles of the profession. Completing an engagement by email only may compromise due professional care, as it may limit the IS auditor's ability to obtain sufficient and appropriate evidence, to communicate effectively with the auditee and other stakeholders, and to perform adequate quality assurance and review procedures.The other options are not as relevant as due professional care, as they relate to specific aspects of an audit, such as proficiency (the knowledge and skills of the IS auditor), sufficient evidence (the quantity and quality of the audit evidence), and reporting (the presentation and communication of the audit results).Reference:CISA Review Manual (Digital Version), Domain 1: The Process of Auditing Information Systems, Section 1.2 ISACA IT Audit and Assurance Standards

A programmer has made unauthorized changes lo key fields in a payroll system report. Which of the following control weaknesses would have contributed MOST to this problem?

A.
The programmer did not involve the user in testing
A.
The programmer did not involve the user in testing
Answers
B.
The user requirements were not documented
B.
The user requirements were not documented
Answers
C.
The programmer has access to the production programs
C.
The programmer has access to the production programs
Answers
D.
Payroll files were not under the control of a librarian
D.
Payroll files were not under the control of a librarian
Answers
Suggested answer: C

Explanation:

The programmer having access to the production programs is a control weakness that would have contributed most to the problem of unauthorized changes to key fields in a payroll system report. This is because it violates the principle of segregation of duties, which requires that different individuals or groups perform different functions related to system development, testing, implementation, and operation. Allowing programmers to access production programs increases the risk of errors, fraud, or malicious actions that may compromise the integrity, availability, or confidentiality of the system or its data.The other options are not as significant as having access to production programs, as they relate to other aspects of system development or maintenance, such as user involvement in testing (which affects user satisfaction and acceptance), user requirements documentation (which affects system functionality and quality), and payroll files control (which affects data security and accuracy).Reference:CISA Review Manual (Digital Version), Domain 3: Information Systems Acquisition, Development and Implementation, Section 3.2 Project Management Practices

Which of the following should be the FIRST consideration when deciding whether data should be moved to a cloud provider for storage?

A.
Data storage costs
A.
Data storage costs
Answers
B.
Data classification
B.
Data classification
Answers
C.
Vendor cloud certification
C.
Vendor cloud certification
Answers
D.
Service level agreements (SLAs)
D.
Service level agreements (SLAs)
Answers
Suggested answer: B

Explanation:

Data classification is the first consideration when deciding whether data should be moved to a cloud provider for storage because it determines the level of protection and security required for the data. Data classification also helps to identify the legal and regulatory requirements that apply to the data, such as privacy, retention and disposal policies.Data storage costs, vendor cloud certification and service level agreements (SLAs) are important factors to consider, but they are secondary to data classification.Reference:CISA Review Manual (Digital Version)1, Chapter 5, Section 5.3.2

During an audit which of the following would be MOST helpful in establishing a baseline for measuring data quality?

A.
Input from customers
A.
Input from customers
Answers
B.
Industry standard business definitions
B.
Industry standard business definitions
Answers
C.
Validation of rules by the business
C.
Validation of rules by the business
Answers
D.
Built-in data error prevention application controls
D.
Built-in data error prevention application controls
Answers
Suggested answer: C

Explanation:

Validation of rules by the business is the most helpful in establishing a baseline for measuring data quality because it ensures that the rules reflect the business needs and expectations. Validation of rules by the business also helps to identify and resolve any inconsistencies or conflicts among different data sources or stakeholders.Input from customers, industry standard business definitions and built-in data error prevention application controls are useful for improving data quality, but they are not sufficient for establishing a baseline.Reference:CISA Review Manual (Digital Version)1, Chapter 5, Section 5.4.1

Which of the following is the GREATEST benefit of adopting an international IT governance framework rather than establishing a new framework based on the actual situation of a specific organization1?

A.
Readily available resources such as domains and risk and control methodologies
A.
Readily available resources such as domains and risk and control methodologies
Answers
B.
Comprehensive coverage of fundamental and critical risk and control areas for IT governance
B.
Comprehensive coverage of fundamental and critical risk and control areas for IT governance
Answers
C.
Fewer resources expended on trial-and-error attempts to fine-tune implementation methodologies
C.
Fewer resources expended on trial-and-error attempts to fine-tune implementation methodologies
Answers
D.
Wide acceptance by different business and support units with IT governance objectives
D.
Wide acceptance by different business and support units with IT governance objectives
Answers
Suggested answer: D

Explanation:

The greatest benefit of adopting an international IT governance framework rather than establishing a new framework based on the actual situation of a specific organization is wide acceptance by different business and support units with IT governance objectives. An international IT governance framework, such as COBIT, provides a common language and understanding for IT governance among various stakeholders, such as management, users, auditors and regulators. This facilitates alignment, communication and collaboration among them. Readily available resources, comprehensive coverage and fewer resources expended are also benefits of adopting an international IT governance framework, but they are not the greatest benefit.Reference:CISA Review Manual (Digital Version) , Chapter 1, Section 1.3.1.

When planning an audit, it is acceptable for an IS auditor to rely on a third-party provider's external audit report on service level management when the

A.
scope and methodology meet audit requirements
A.
scope and methodology meet audit requirements
Answers
B.
service provider is independently certified and accredited
B.
service provider is independently certified and accredited
Answers
C.
report confirms that service levels were not violated
C.
report confirms that service levels were not violated
Answers
D.
report was released within the last 12 months
D.
report was released within the last 12 months
Answers
Suggested answer: A

Explanation:

It is acceptable for an IS auditor to rely on a third-party provider's external audit report on service level management when the scope and methodology meet audit requirements. This means that the external audit report covers the same objectives, criteria, standards and procedures that the IS auditor would use to assess the service level management. This way, the IS auditor can avoid duplication of work and reduce audit costs and efforts. The service provider's certification and accreditation, the report's confirmation of service levels and the report's release date are not sufficient to justify reliance on the external audit report.Reference:CISA Review Manual (Digital Version) , Chapter 2, Section 2.3.3.

When assessing whether an organization's IT performance measures are comparable to other organizations in the same industry, which of the following would be MOST helpful to review?

A.
IT governance frameworks
A.
IT governance frameworks
Answers
B.
Benchmarking surveys
B.
Benchmarking surveys
Answers
C.
Utilization reports
C.
Utilization reports
Answers
D.
Balanced scorecard
D.
Balanced scorecard
Answers
Suggested answer: B

Explanation:

IT performance measures are indicators of how well an organization is achieving its IT goals and objectives. Benchmarking surveys are useful tools for comparing an organization's IT performance measures with those of other organizations in the same industry or sector. Benchmarking surveys can provide insights into best practices, gaps, trends, and opportunities for improvement. IT governance frameworks, utilization reports, and balanced scorecards are not as helpful for comparing IT performance measures across organizations, as they may vary in scope, methodology, and terminology.Reference:IT Resources | Knowledge & Insights | ISACA,CISA Review Manual (Digital Version)

Which of the following is the MOST important factor when an organization is developing information security policies and procedures?

A.
Consultation with security staff
A.
Consultation with security staff
Answers
B.
Inclusion of mission and objectives
B.
Inclusion of mission and objectives
Answers
C.
Compliance with relevant regulations
C.
Compliance with relevant regulations
Answers
D.
Alignment with an information security framework
D.
Alignment with an information security framework
Answers
Suggested answer: D

Explanation:

Information security policies and procedures are the foundation of an organization's information security program. They define the roles, responsibilities, rules, and standards for protecting information assets from unauthorized access, use, disclosure, modification, or destruction. The most important factor when developing information security policies and procedures is to align them with an information security framework that provides a comprehensive and consistent approach to managing information security risks. An information security framework can also help ensure compliance with relevant regulations, inclusion of mission and objectives, and consultation with security staff. However, these factors are secondary to alignment with an information security framework.Reference:CISA Certification | Certified Information Systems Auditor | ISACA,CISA Review Manual (Digital Version)

Following a breach, what is the BEST source to determine the maximum amount of time before customers must be notified that their personal information may have been compromised?

A.
Industry regulations
A.
Industry regulations
Answers
B.
Industry standards
B.
Industry standards
Answers
C.
Incident response plan
C.
Incident response plan
Answers
D.
Information security policy
D.
Information security policy
Answers
Suggested answer: A

Explanation:

Following a breach, the maximum amount of time before customers must be notified that their personal information may have been compromised depends on the industry regulations that apply to the organization. Different industries and jurisdictions may have different legal and regulatory requirements for breach notification, such as the General Data Protection Regulation (GDPR) in the European Union, the Health Insurance Portability and Accountability Act (HIPAA) in the United States, or the Personal Information Protection and Electronic Documents Act (PIPEDA) in Canada. Industry standards, incident response plans, and information security policies are not as authoritative as industry regulations in determining the breach notification time frame.Reference:CISA Review Manual (Digital Version), [ISACA Privacy Principles and Program Management Guide]

Total 1.198 questions
Go to page: of 120