ExamGecko
Home Home / Isaca / CISA

Isaca CISA Practice Test - Questions Answers, Page 59

Question list
Search
Search

List of questions

Search

Related questions











During the discussion of a draft audit report IT management provided suitable evidence that a process has been implemented for a control that had been concluded by the IS auditor as ineffective Which of the following is the auditor's BEST action?

A.
Explain to IT management that the new control will be evaluated during follow-up
A.
Explain to IT management that the new control will be evaluated during follow-up
Answers
B.
Add comments about the action taken by IT management in the report
B.
Add comments about the action taken by IT management in the report
Answers
C.
Change the conclusion based on evidence provided by IT management
C.
Change the conclusion based on evidence provided by IT management
Answers
D.
Re-perform the audit before changing the conclusion
D.
Re-perform the audit before changing the conclusion
Answers
Suggested answer: D

Explanation:

The auditor's best action is to re-perform the audit before changing the conclusion, because the auditor needs to obtain sufficient and appropriate evidence to support the audit opinion. The evidence provided by IT management may not be reliable or relevant, and it may not reflect the actual effectiveness of the control during the audit period. Therefore, the auditor should verify the evidence independently and test the control again to ensure that it meets the audit criteria and objectives. The other options are not appropriate, because they either ignore or accept the evidence provided by IT management without verification, which may compromise the quality and integrity of the audit.Reference:

ISACA, CISA Review Manual, 27th Edition, chapter 1, section 1.51

ISACA, IT Audit and Assurance Standards, Guidelines and Tools and Techniques for IS Audit and Assurance Professionals, section 12062

Which of the following should be the PRIMARY role of an internal audit function in the management of identified business risks?

A.
Establishing a risk appetite
A.
Establishing a risk appetite
Answers
B.
Establishing a risk management framework
B.
Establishing a risk management framework
Answers
C.
Validating enterprise risk management (ERM)
C.
Validating enterprise risk management (ERM)
Answers
D.
Operating the risk management framework
D.
Operating the risk management framework
Answers
Suggested answer: C

Explanation:

The primary role of an internal audit function in the management of identified business risks is to validate the enterprise risk management (ERM) process and provide assurance on its effectiveness. The internal audit function should evaluate whether the ERM process is aligned with the organization's objectives, strategies, policies and culture, and whether it covers all relevant risks and controls. The internal audit function should also assess whether the ERM process is operating as designed and producing reliable and timely information for decision making. The other options are not the primary role of an internal audit function, but rather the responsibilities of senior management, board of directors or risk owners.Reference:

ISACA, CISA Review Manual, 27th Edition, chapter 1, section 1.41

ISACA, IT Audit and Assurance Standards, Guidelines and Tools and Techniques for IS Audit and Assurance Professionals, section 12072

Which of the following is the PRIMARY advantage of using virtualization technology for corporate applications?

A.
Stronger data security
A.
Stronger data security
Answers
B.
Better utilization of resources
B.
Better utilization of resources
Answers
C.
Increased application performance
C.
Increased application performance
Answers
D.
Improved disaster recovery
D.
Improved disaster recovery
Answers
Suggested answer: B

Explanation:

The primary advantage of using virtualization technology for corporate applications is to achieve better utilization of resources, such as hardware, software, network and storage. Virtualization technology allows multiple applications to run on a single physical server or device, which reduces the need for additional hardware and maintenance costs. Virtualization technology also enables dynamic allocation and reallocation of resources according to the demand and priority of the applications, which improves efficiency and flexibility. The other options are not the primary advantage of using virtualization technology, although they may be some of the benefits or challenges depending on the implementation and configuration.Reference:

ISACA, CISA Review Manual, 27th Edition, chapter 4, section 4.21

ISACA, COBIT 2019 Framework: Introduction and Methodology, section 3.23

When evaluating information security governance within an organization, which of the following findings should be of MOST concern to an IS auditor?

A.
The information security department has difficulty filling vacancies
A.
The information security department has difficulty filling vacancies
Answers
B.
An information security governance audit was not conducted within the past year
B.
An information security governance audit was not conducted within the past year
Answers
C.
The data center manager has final sign-off on security projects
C.
The data center manager has final sign-off on security projects
Answers
D.
Information security policies are updated annually
D.
Information security policies are updated annually
Answers
Suggested answer: C

Explanation:

The finding that should be of most concern to an IS auditor when evaluating information security governance within an organization is that the data center manager has final sign-off on security projects. This indicates a lack of segregation of duties and a potential conflict of interest between the operational and security roles. The data center manager may have access to sensitive information or systems that should be protected by security controls, or may influence or override security decisions that are not in the best interest of the organization. This finding also suggests that there is no clear accountability or authority for information security governance at a higher level, such as senior management or board of directors. The other findings are not as concerning as this one, although they may indicate some areas for improvement or monitoring.Reference:

ISACA, CISA Review Manual, 27th Edition, chapter 5, section 5.11

ISACA, IT Governance Using COBIT and Val IT: Student Booklet - 2nd Edition4

A senior auditor is reviewing work papers prepared by a junior auditor indicating that a finding was removed after the auditee said they corrected the problem. Which of the following is the senior auditor s MOST appropriate course of action?

A.
Ask the auditee to retest
A.
Ask the auditee to retest
Answers
B.
Approve the work papers as written
B.
Approve the work papers as written
Answers
C.
Have the finding reinstated
C.
Have the finding reinstated
Answers
D.
Refer the issue to the audit director
D.
Refer the issue to the audit director
Answers
Suggested answer: C

Explanation:

The senior auditor's most appropriate course of action is to have the finding reinstated, because the auditee's claim of correcting the problem is not sufficient evidence to support the removal of the finding. The auditor should verify that the corrective action has been implemented effectively and that it has resolved the underlying issue or risk. The auditor should also document the evidence and results of the verification in the work papers. The other options are not appropriate, because they either accept the auditee's claim without verification, delegate the responsibility to the auditee or escalate the issue unnecessarily.Reference:

ISACA, CISA Review Manual, 27th Edition, chapter 1, section 1.51

ISACA, IT Audit and Assurance Standards, Guidelines and Tools and Techniques for IS Audit and Assurance Professionals, section 12062

Which of the following should be of GREATEST concern to an IS auditor assessing the effectiveness of an organization's vulnerability scanning program''

A.
Steps taken to address identified vulnerabilities are not formally documented
A.
Steps taken to address identified vulnerabilities are not formally documented
Answers
B.
Results are not reported to individuals with authority to ensure resolution
B.
Results are not reported to individuals with authority to ensure resolution
Answers
C.
Scans are performed less frequently than required by the organization's vulnerability scanning schedule
C.
Scans are performed less frequently than required by the organization's vulnerability scanning schedule
Answers
D.
Results are not approved by senior management
D.
Results are not approved by senior management
Answers
Suggested answer: B

Explanation:

The finding that should be of greatest concern to an IS auditor assessing the effectiveness of an organization's vulnerability scanning program is that results are not reported to individuals with authority to ensure resolution. This indicates a lack of accountability and communication for vulnerability management, which may result in unresolved or delayed remediation of identified vulnerabilities. This may expose the organization to increased risk of cyberattacks or breaches. The other findings are also concerning, but not as much as this one, because they may affect the completeness, accuracy or timeliness of the vulnerability scanning process, but not necessarily its effectiveness.Reference:

ISACA, CISA Review Manual, 27th Edition, chapter 4, section 4.41

ISACA, COBIT 2019 Framework: Introduction and Methodology, section 3.2

Which of the following provides the MOST useful information for performing a business impact analysis (B1A)?

A.
inventory of relevant business processes
A.
inventory of relevant business processes
Answers
B.
Policies for business procurement
B.
Policies for business procurement
Answers
C.
Documentation of application configurations
C.
Documentation of application configurations
Answers
D.
Results of business resumption planning efforts
D.
Results of business resumption planning efforts
Answers
Suggested answer: A

Explanation:

A business impact analysis (BIA) is a process that identifies and evaluates the potential effects of disruptions to critical business operations as a result of a disaster, accident or emergency. A BIA should include an inventory of relevant business processes that support the organization's strategic objectives and are essential for its continuity. The inventory should also identify the dependencies, interdependencies, recovery priorities and time frames for each business process. Policies for business procurement, documentation of application configurations and results of business resumption planning efforts are not as useful as an inventory of relevant business processes for performing a BIA.Reference:

:Business Impact Analysis (BIA) Definition

:Business Impact Analysis (BIA) | ISACA

An IS auditor discovers that due to resource constraints a database administrator (DBA) is responsible for developing and executing changes into the production environment Which ot the following should the auditor do FIRSTS

A.
Determine whether another DBA could make the changes
A.
Determine whether another DBA could make the changes
Answers
B.
Report a potential segregation of duties violation
B.
Report a potential segregation of duties violation
Answers
C.
identify whether any compensating controls exist
C.
identify whether any compensating controls exist
Answers
D.
Ensure a change management process is followed prior to implementation
D.
Ensure a change management process is followed prior to implementation
Answers
Suggested answer: C

Explanation:

A database administrator (DBA) is responsible for maintaining the integrity, security and performance of the database systems. A DBA who is also responsible for developing and executing changes into the production environment may have a conflict of interest and pose a risk to the data quality and availability. Therefore, the IS auditor should first identify whether any compensating controls exist to mitigate this risk, such as independent reviews, approvals, audits or monitoring of the changes. Determining whether another DBA could make the changes, reporting a potential segregation of duties violation and ensuring a change management process is followed prior to implementation are possible actions that the auditor could take after identifying the compensating controls or the lack thereof.Reference:

:Database Administrator (DBA) Definition

:Segregation of Duties | ISACA

: [Compensating Control Definition]

A database administrator (DBA) should be prevented from having end user responsibilities:

A.
having end user responsibilities
A.
having end user responsibilities
Answers
B.
accessing sensitive information
B.
accessing sensitive information
Answers
C.
having access to production files
C.
having access to production files
Answers
D.
using an emergency user ID
D.
using an emergency user ID
Answers
Suggested answer: A

Explanation:

A database administrator (DBA) should be prevented from having end user responsibilities to avoid a conflict of interest and a violation of the principle of segregation of duties. End user responsibilities may include initiating transactions, authorizing transactions, recording transactions or reconciling transactions. A DBA who has end user responsibilities may compromise the integrity, confidentiality and availability of the data and the database systems. Accessing sensitive information, having access to production files and using an emergency user ID are not end user responsibilities, but rather potential risks or controls associated with the DBA role.Reference:

:Database Administrator (DBA) Definition

:Segregation of Duties | ISACA

: [End User Definition]

An incident response team has been notified of a virus outbreak in a network subnet. Which of the following should be the NEXT step?

A.
Verify that the compromised systems are fully functional
A.
Verify that the compromised systems are fully functional
Answers
B.
Focus on limiting the damage
B.
Focus on limiting the damage
Answers
C.
Document the incident
C.
Document the incident
Answers
D.
Remove and restore the affected systems
D.
Remove and restore the affected systems
Answers
Suggested answer: B

Explanation:

An incident response team has been notified of a virus outbreak in a network subnet. The next step should be to focus on limiting the damage by containing the virus and preventing it from spreading further. This may involve isolating the affected systems, disconnecting them from the network, blocking malicious traffic or applying patches or antivirus updates. Verifying that the compromised systems are fully functional, documenting the incident and removing and restoring the affected systems are possible steps that could be taken after limiting the damage.Reference:

: [Incident Response Definition]

: [Incident Response Process | ISACA]

: [Virus Definition]

Total 1.198 questions
Go to page: of 120