ExamGecko
Home Home / Isaca / CISA

Isaca CISA Practice Test - Questions Answers, Page 60

Question list
Search
Search

List of questions

Search

Related questions











An IS auditor is evaluating the progress of a web-based customer service application development project. Which of the following would be MOST helpful for this evaluation?

A.
Backlog consumption reports
A.
Backlog consumption reports
Answers
B.
Critical path analysis reports
B.
Critical path analysis reports
Answers
C.
Developer status reports
C.
Developer status reports
Answers
D.
Change management logs
D.
Change management logs
Answers
Suggested answer: A

Explanation:

A backlog consumption report is a report that shows the amount of work that has been completed and the amount of work that remains to be done in a project. It is a useful tool for measuring the progress and performance of a web-based customer service application development project, as it can indicate whether the project is on track, ahead or behind schedule, and how much effort is required to finish the project. A backlog consumption report can also help identify any issues or risks that may affect the project delivery. Critical path analysis reports, developer status reports and change management logs are also helpful for evaluating a project, but they are not as helpful as a backlog consumption report, as they do not provide a clear picture of the overall project status and completion rate.Reference:

: [Backlog Consumption Report Definition]

:Backlog Consumption Report | ISACA

Which of the following would protect the confidentiality of information sent in email messages?

A.
Secure Hash Algorithm 1(SHA-1)
A.
Secure Hash Algorithm 1(SHA-1)
Answers
B.
Digital signatures
B.
Digital signatures
Answers
C.
Encryption
C.
Encryption
Answers
D.
Digital certificates
D.
Digital certificates
Answers
Suggested answer: C

Explanation:

Encryption is the process of transforming information into an unreadable form using a secret key, so that only authorized parties can access it. Encryption would protect the confidentiality of information sent in email messages, as it would prevent unauthorized parties from intercepting and reading the messages. Secure Hash Algorithm 1 (SHA-1) is a cryptographic hash function that produces a fixed-length output from an input. SHA-1 does not encrypt information, but rather verifies its integrity by detecting any changes or modifications. Digital signatures are electronic signatures that use encryption and hash functions to authenticate the identity of the sender and the integrity of the message. Digital signatures do not protect the confidentiality of information, but rather ensure its authenticity and non-repudiation. Digital certificates are electronic documents that contain the public key and identity information of an entity, such as a person, organization or device. Digital certificates are issued by trusted third parties called certificate authorities (CAs). Digital certificates do not protect the confidentiality of information, but rather enable secure communication and encryption by verifying the identity and public key of an entity.Reference:

: [Encryption Definition]

: [Secure Hash Algorithm 1 (SHA-1) Definition]

: [Digital Signature Definition]

: [Digital Certificate Definition]

Which of the following provides the MOST reliable method of preventing unauthonzed logon?

A.
issuing authentication tokens
A.
issuing authentication tokens
Answers
B.
Reinforcing current security policies
B.
Reinforcing current security policies
Answers
C.
Limiting after-hours usage
C.
Limiting after-hours usage
Answers
D.
Installing an automatic password generator
D.
Installing an automatic password generator
Answers
Suggested answer: A

Explanation:

Issuing authentication tokens is the most reliable method of preventing unauthorized logon, as it provides a strong form of authentication that requires users to present something they have (the token) and something they know (the personal identification number or PIN) to access the system. Authentication tokens are physical devices that generate a one-time password or code that changes periodically and is synchronized with the authentication server. This makes it difficult for attackers to steal or guess the credentials of legitimate users. Reinforcing current security policies, limiting after-hours usage and installing an automatic password generator are not as reliable as issuing authentication tokens, as they do not provide a strong form of authentication and may still be vulnerable to unauthorized logon attempts.Reference:

: [Authentication Token Definition]

:Authentication | ISACA

An IS auditor learns a server administration team regularly applies workarounds to address repeated failures of critical data processing services Which of the following would BEST enable the organization to resolve this issue?

A.
Problem management
A.
Problem management
Answers
B.
Incident management
B.
Incident management
Answers
C.
Service level management
C.
Service level management
Answers
D.
Change management
D.
Change management
Answers
Suggested answer: A

Explanation:

Problem management is the best way to enable the organization to resolve the issue of repeated failures of critical data processing services, as it focuses on identifying and eliminating the root causes of incidents and preventing their recurrence. Problem management involves analyzing incidents, performing root cause analysis, finding solutions, implementing changes and documenting lessons learned. Incident management is not the best way to resolve the issue, as it focuses on restoring normal service operation as quickly as possible after an incident occurs, but does not address the underlying causes or prevent future incidents. Service level management is not the best way to resolve the issue, as it focuses on defining, monitoring and reporting on the service levels agreed upon between service providers and customers, but does not address the causes or solutions of incidents. Change management is not the best way to resolve the issue, as it focuses on ensuring that changes are implemented in a controlled and coordinated manner, but does not address the identification or elimination of incidents.Reference:

: [Problem Management Definition]

: [Incident Management Definition]

: [Service Level Management Definition]

: [Change Management Definition]

:IT Service Management | ISACA

Which of the following information security requirements BE ST enables the tracking of organizational data in a bring your own device (BYOD) environment?

A.
Employees must immediately report lost or stolen mobile devices containing organizational data
A.
Employees must immediately report lost or stolen mobile devices containing organizational data
Answers
B.
Employees must sign acknowledgment of the organization's mobile device acceptable use policy
B.
Employees must sign acknowledgment of the organization's mobile device acceptable use policy
Answers
C.
Employees must enroll their personal devices in the organization's mobile device management program
C.
Employees must enroll their personal devices in the organization's mobile device management program
Answers
Suggested answer: C

Explanation:

The best way to track organizational data in a BYOD environment is to enroll the personal devices in the organization's mobile device management (MDM) program. This will allow the organization to monitor, control, and secure the data on the devices remotely. Employees must also report lost or stolen devices and sign the acceptable use policy, but these are not sufficient to enable tracking of data.Reference:Info Technology & Systems Resources | COBIT, Risk, Governance ... - ISACA, section ''Book IT Control Objectives for Sarbanes-Oxley, 4th Edition | Digital | English''

A company requires that all program change requests (PCRs) be approved and all modifications be automatically logged. Which of the following IS audit procedures will BEST determine whether unauthorized changes have been made to production programs?

A.
Trace a sample of complete PCR forms to the log of all program changes
A.
Trace a sample of complete PCR forms to the log of all program changes
Answers
B.
Use source code comparison software to determine whether any changes have been made to a sample of programs since the last audit date
B.
Use source code comparison software to determine whether any changes have been made to a sample of programs since the last audit date
Answers
C.
Review a sample of PCRs for proper approval throughout the program change process
C.
Review a sample of PCRs for proper approval throughout the program change process
Answers
D.
Trace a sample of program change from the log to completed PCR forms
D.
Trace a sample of program change from the log to completed PCR forms
Answers
Suggested answer: B

Explanation:

The best way to determine whether unauthorized changes have been made to production programs is to use source code comparison software to compare the current version of the programs with the previous version or the approved version. This will identify any changes that have been made without proper authorization or documentation. Tracing PCRs to logs or vice versa will only verify that the authorized changes have been recorded, but not detect any unauthorized changes.Reference:Standards, Guidelines, Tools and Techniques - ISACA, section ''IS Audit and Assurance Tools and Techniques''

Which of the following is the PRIMARY reason to perform a risk assessment?

A.
To determine the current risk profile
A.
To determine the current risk profile
Answers
B.
To ensure alignment with the business impact analysis (BIA)
B.
To ensure alignment with the business impact analysis (BIA)
Answers
C.
To achieve compliance with regulatory requirements
C.
To achieve compliance with regulatory requirements
Answers
D.
To help allocate budget for risk mitigation controls
D.
To help allocate budget for risk mitigation controls
Answers
Suggested answer: A

Explanation:

The primary reason to perform a risk assessment is to determine the current risk profile of the organization, which is the level of risk exposure and the likelihood and impact of potential threats. This will help the organization to identify and prioritize the risks that need to be addressed and to align the risk management strategy with the business objectives. A risk assessment may also help to achieve compliance, support the BIA, and allocate budget, but these are not the primary reasons.Reference:ISACA Glossary of Terms, section ''risk assessment''

Which of the following is an IS auditor's BEST approach when prepanng to evaluate whether the IT strategy supports the organization's vision and mission?

A.
Review strategic projects tor return on investments (ROls)
A.
Review strategic projects tor return on investments (ROls)
Answers
B.
Solicit feedback from other departments to gauge the organization's maturity
B.
Solicit feedback from other departments to gauge the organization's maturity
Answers
C.
Meet with senior management to understand business goals
C.
Meet with senior management to understand business goals
Answers
D.
Review the organization's key performance indicators (KPls)
D.
Review the organization's key performance indicators (KPls)
Answers
Suggested answer: C

Explanation:

The best approach for an IS auditor to evaluate whether the IT strategy supports the organization's vision and mission is to meet with senior management to understand the business goals and how IT can enable them. This will help the IS auditor to assess the alignment and integration of IT with the business strategy and to identify any gaps or opportunities for improvement. Reviewing ROIs, KPIs, or feedback from other departments may provide some insights, but they are not sufficient to evaluate the IT strategy.Reference:IS Audit and Assurance Standards, section ''Standard 1201: Engagement Planning''

A review of IT interface controls finds an organization does not have a process to identify and correct records that do not get transferred to the receiving system Which of the following is the IS auditors BEST recommendation?

A.
Enable automatic encryption decryption and electronic signing of data files
A.
Enable automatic encryption decryption and electronic signing of data files
Answers
B.
implement software to perform automatic reconciliations of data between systems
B.
implement software to perform automatic reconciliations of data between systems
Answers
C.
Have coders perform manual reconciliation of data between systems
C.
Have coders perform manual reconciliation of data between systems
Answers
D.
Automate the transfer of data between systems as much as feasible
D.
Automate the transfer of data between systems as much as feasible
Answers
Suggested answer: B

Explanation:

The best recommendation for an organization that does not have a process to identify and correct records that do not get transferred to the receiving system is to implement software to perform automatic reconciliations of data between systems. This will ensure that the data integrity and completeness are maintained and that any errors or discrepancies are detected and resolved in a timely manner. Enabling encryption, decryption, and electronic signing of data files may enhance the data security and authenticity, but not the data accuracy or consistency. Having coders perform manual reconciliation of data between systems may be prone to human errors and inefficiencies. Automating the transfer of data between systems as much as feasible may reduce the chances of data loss or corruption, but not eliminate them completely.Reference:IS Audit and Assurance Standards, section ''Standard 1202: Risk Assessment in Planning''

A firewall between internal network segments improves security and reduces risk by:

A.
Jogging all packets passing through network segments
A.
Jogging all packets passing through network segments
Answers
B.
inspecting all traffic flowing between network segments and applying security policies
B.
inspecting all traffic flowing between network segments and applying security policies
Answers
C.
monitoring and reporting on sessions between network participants
C.
monitoring and reporting on sessions between network participants
Answers
D.
ensuring all connecting systems have appropriate security controls enabled.
D.
ensuring all connecting systems have appropriate security controls enabled.
Answers
Suggested answer: B

Explanation:

A firewall between internal network segments improves security and reduces risk by inspecting all traffic flowing between network segments and applying security policies. This will prevent unauthorized or malicious access, data leakage, or network attacks from compromising the network resources or data. Logging all packets passing through network segments may provide audit trails and evidence, but not prevent or mitigate security incidents. Monitoring and reporting on sessions between network participants may help to identify anomalous or suspicious activities, but not block or filter them. Ensuring all connecting systems have appropriate security controls enabled may enhance the overall network security posture, but not isolate or segregate different network segments.Reference:Info Technology & Systems Resources | COBIT, Risk, Governance ... - ISACA, section ''Book COBIT 2019 Design Guide: Designing an Information and Technology Governance Solution | Digital | English''

Total 1.198 questions
Go to page: of 120