ExamGecko
Home Home / Isaca / CISA

Isaca CISA Practice Test - Questions Answers, Page 63

Question list
Search
Search

List of questions

Search

Related questions











An IS auditor has been tasked to review the processes that prevent fraud within a business expense claim system. Which of the following stakeholders is MOST important to involve in this review?

A.
Information security manager
A.
Information security manager
Answers
B.
Quality assurance (QA) manager
B.
Quality assurance (QA) manager
Answers
C.
Business department executive
C.
Business department executive
Answers
D.
Business process owner
D.
Business process owner
Answers
Suggested answer: D

Explanation:

The business process owner is the most important stakeholder to involve in the review of the processes that prevent fraud within a business expense claim system. This is because the business process owner is responsible for defining, implementing, and monitoring the business rules and policies that govern the expense claim process. The business process owner also has the authority and accountability to approve or reject expense claims, as well as to investigate and report any suspicious or fraudulent activities.The business process owner can provide valuable insights and feedback to the IS auditor on the effectiveness and efficiency of the current processes, as well as the potential risks and controls that need to be addressed12.

The information security manager is not the most important stakeholder because their role is mainly focused on ensuring the confidentiality, integrity, and availability of the information systems and data that support the expense claim process.The information security manager can help the IS auditor with assessing the technical aspects of the system, such as access controls, encryption, logging, and backup, but they may not have sufficient knowledge or authority over the business rules and policies that prevent fraud1.

The quality assurance (QA) manager is not the most important stakeholder because their role is mainly focused on ensuring the quality and reliability of the software applications and systems that support the expense claim process.The QA manager can help the IS auditor with testing and verifying the functionality and performance of the system, but they may not have sufficient knowledge or authority over the business rules and policies that prevent fraud1.

The business department executive is not the most important stakeholder because their role is mainly focused on overseeing the strategic objectives and financial performance of the business department that uses the expense claim system.The business department executive can help the IS auditor with understanding the business context and needs of the expense claim process, but they may not have sufficient knowledge or authority over the operational details and controls that prevent fraud

Which of the following is MOST important for an IS auditor to validate when auditing network device management?

A.
Devices cannot be accessed through service accounts.
A.
Devices cannot be accessed through service accounts.
Answers
B.
Backup policies include device configuration files.
B.
Backup policies include device configuration files.
Answers
C.
All devices have current security patches assessed.
C.
All devices have current security patches assessed.
Answers
D.
All devices are located within a protected network segment.
D.
All devices are located within a protected network segment.
Answers
Suggested answer: C

Explanation:

The most important thing for an IS auditor to validate when auditing network device management is that all devices have current security patches assessed. This is because security patches are essential for fixing known vulnerabilities and preventing unauthorized access, data breaches, or denial-of-service attacks on the network devices.If the network devices are not patched regularly, they may expose the network to various cyber threats and compromise the confidentiality, integrity, and availability of the network services and data12.

Devices cannot be accessed through service accounts is not the most important thing to validate because service accounts are typically used for automated tasks or processes that require privileged access to network devices. Service accounts can be secured by using strong passwords, limiting their permissions, and monitoring their activities.However, service accounts alone do not protect the network devices from external or internal attacks that exploit unpatched vulnerabilities3.

Backup policies include device configuration files is not the most important thing to validate because backup policies are mainly used for restoring the network devices in case of failure, disaster, or corruption. Backup policies can help with recovering the network functionality and data, but they do not prevent the network devices from being compromised or attacked in the first place.Backup policies should be complemented by security policies that ensure the network devices are patched and protected4.

All devices are located within a protected network segment is not the most important thing to validate because network segmentation is a technique that divides the network into smaller subnets or zones based on different criteria, such as function, security level, or access control. Network segmentation can help isolate and contain the impact of a potential attack on a network device, but it does not prevent the attack from happening. Network segmentation should be combined with security patching and other security measures to ensure the network devices are secure.

Which of the following should be restricted from a network administrator's privileges in an adequately segregated IT environment?

A.
Monitoring network traffic
A.
Monitoring network traffic
Answers
B.
Changing existing configurations for applications
B.
Changing existing configurations for applications
Answers
C.
Hardening network ports
C.
Hardening network ports
Answers
D.
Ensuring transmission protocols are functioning correctly
D.
Ensuring transmission protocols are functioning correctly
Answers
Suggested answer: B

An IS auditor is reviewing the security of a web-based customer relationship management (CRM) system that is directly accessed by customers via the Internet, which of the following should be a concern for the auditor?

A.
The system is hosted on an external third-party service provider's server.
A.
The system is hosted on an external third-party service provider's server.
Answers
B.
The system is hosted in a hybrid-cloud platform managed by a service provider.
B.
The system is hosted in a hybrid-cloud platform managed by a service provider.
Answers
C.
The system is hosted within a demilitarized zone (DMZ) of a corporate network.
C.
The system is hosted within a demilitarized zone (DMZ) of a corporate network.
Answers
D.
The system is hosted within an internal segment of a corporate network.
D.
The system is hosted within an internal segment of a corporate network.
Answers
Suggested answer: D

Explanation:

A web-based CRM system that is directly accessed by customers via the Internet should be hosted in a secure and isolated environment to protect it from external threats and unauthorized access.A web-based CRM system should also be reliable, trusted, and backed up regularly1.

Hosting the system on an external third-party service provider's servers (A) or a hybrid-cloud platform managed by a service provider (B) may not be a concern for the auditor if the service provider has adequate security measures and service level agreements in place.The auditor should verify the security controls and contractual terms of the service provider before trusting them with the CRM data23.

Hosting the system within a demilitarized zone (DMZ) of a corporate network is a common practice to provide an extra layer of security to the CRM system from untrusted networks, such as the Internet.A DMZ is a perimeter network that isolates the CRM system from the internal network and filters the incoming traffic from the external network using a security gateway4567.

Hosting the system within an internal segment of a corporate network (D) is a concern for the auditor because it exposes the CRM system and the internal network to potential attacks from the Internet. The CRM system should not be directly accessible from the Internet without a DMZ or a firewall to protect it.This could compromise the confidentiality, integrity, and availability of the CRM data and the internal network78.

As part of the architecture of virtualized environments, in a bare metal or native visualization the hypervisor runs without:

A.
a host operating system.
A.
a host operating system.
Answers
B.
a guest operating system.
B.
a guest operating system.
Answers
C.
any applications on the guest operating system.
C.
any applications on the guest operating system.
Answers
D.
any applications on the host operating system.
D.
any applications on the host operating system.
Answers
Suggested answer: A

Explanation:

In a bare metal or native virtualization, the hypervisor runs without a host operating system. A hypervisor, also known as a virtual machine monitor or VMM, is a type of virtualization software that supports the creation and management of virtual machines (VMs) by separating a computer's software from its hardware.A bare metal hypervisor, also called a Type I or Native hypervisor, is virtualization software that runs on host machine hardware directly, without requiring an underlying operating system12.This means that the bare metal hypervisor is the host or the operating system (OS) of the hardware1.

A guest operating system is an operating system that runs inside a virtual machine, on top of the hypervisor. A bare metal hypervisor can run multiple guest operating systems simultaneously, each with its own applications and resources.A guest operating system is not required for a bare metal hypervisor to run, but it is necessary for running applications on the virtual machine13.

Applications are software programs that perform specific tasks or functions for users. Applications can run on either the host operating system or the guest operating system, depending on the type of virtualization. In a bare metal virtualization, applications can run on the guest operating system, but not on the host operating system, since there is no host operating system.However, applications are not essential for a bare metal hypervisor to run, as they are only used by the users of the virtual machines

Which of the following should an IS auditor recommend be done FIRST when an organization is made aware of a new regulation that is likely to impact IT security requirements?

A.
Update security policies based on the new regulation.
A.
Update security policies based on the new regulation.
Answers
B.
Determine which systems and IT-related processes may be impacted.
B.
Determine which systems and IT-related processes may be impacted.
Answers
C.
Evaluate how security awareness and training content may be impacted.
C.
Evaluate how security awareness and training content may be impacted.
Answers
D.
Review the design and effectiveness of existing IT controls.
D.
Review the design and effectiveness of existing IT controls.
Answers
Suggested answer: B

Explanation:

The first thing that an IS auditor should recommend when an organization is made aware of a new regulation that is likely to impact IT security requirements is to determine which systems and IT-related processes may be impacted. This is because the impact assessment is a crucial step to understand the scope and magnitude of the changes that the new regulation may entail, as well as the potential risks and gaps that need to be addressed.The impact assessment can help the organization to prioritize and plan the necessary actions and resources to comply with the new regulation in a timely and effective manner12.

Updating security policies based on the new regulation is not the first thing to do, because it requires a clear understanding of the impact and implications of the new regulation, which can only be obtained after conducting an impact assessment.Updating security policies without an impact assessment may result in incomplete, inconsistent, or ineffective policies that may not meet the regulatory requirements or the organizational needs12.

Evaluating how security awareness and training content may be impacted is not the first thing to do, because it is a secondary or supporting activity that depends on the results of the impact assessment and the policy updates.Evaluating security awareness and training content without an impact assessment or policy updates may result in inaccurate, outdated, or irrelevant content that may not reflect the regulatory requirements or the organizational expectations34.

Reviewing the design and effectiveness of existing IT controls is not the first thing to do, because it is a monitoring or assurance activity that follows the implementation of the changes based on the impact assessment and the policy updates.Reviewing IT controls without an impact assessment or policy updates may result in misleading, incomplete, or invalid findings that may not capture the regulatory requirements or the organizational performance

Which of the following should an IS auditor recommend be done FIRST when an organization is made aware of a new regulation that is likely to impact IT security requirements?

A.
Update security policies based on the new regulation.
A.
Update security policies based on the new regulation.
Answers
B.
Determine which systems and IT-related processes may be impacted.
B.
Determine which systems and IT-related processes may be impacted.
Answers
C.
Evaluate how security awareness and training content may be impacted.
C.
Evaluate how security awareness and training content may be impacted.
Answers
D.
Review the design and effectiveness of existing IT controls.
D.
Review the design and effectiveness of existing IT controls.
Answers
Suggested answer: B

Explanation:

The first thing that an IS auditor should recommend when an organization is made aware of a new regulation that is likely to impact IT security requirements is to determine which systems and IT-related processes may be impacted. This is because the impact assessment is a crucial step to understand the scope and magnitude of the changes that the new regulation may entail, as well as the potential risks and gaps that need to be addressed.The impact assessment can help the organization to prioritize and plan the necessary actions and resources to comply with the new regulation in a timely and effective manner12.

Updating security policies based on the new regulation is not the first thing to do, because it requires a clear understanding of the impact and implications of the new regulation, which can only be obtained after conducting an impact assessment.Updating security policies without an impact assessment may result in incomplete, inconsistent, or ineffective policies that may not meet the regulatory requirements or the organizational needs12.

Evaluating how security awareness and training content may be impacted is not the first thing to do, because it is a secondary or supporting activity that depends on the results of the impact assessment and the policy updates.Evaluating security awareness and training content without an impact assessment or policy updates may result in inaccurate, outdated, or irrelevant content that may not reflect the regulatory requirements or the organizational expectations34.

Reviewing the design and effectiveness of existing IT controls is not the first thing to do, because it is a monitoring or assurance activity that follows the implementation of the changes based on the impact assessment and the policy updates.Reviewing IT controls without an impact assessment or policy updates may result in misleading, incomplete, or invalid findings that may not capture the regulatory requirements or the organizational performance

An IS auditor learns that an in-house system development life cycle (SDLC) project has not met user specifications. The auditor should FIRST examine requirements from which of the following phases?

A.
Configuration phase
A.
Configuration phase
Answers
B.
User training phase
B.
User training phase
Answers
C.
Quality assurance (QA) phase
C.
Quality assurance (QA) phase
Answers
D.
Development phase The quality assurance (QA) phase is the phase where the IS auditor should first examine requirements from an in-house SDLC project that has not met user specifications. This is because the QA phase is the phase where the system is tested and verified against the user specifications and the design specifications to ensure that it meets the functional and non-functional requirements, as well as the quality standards and expectations.The QA phase involves various testing activities, such as unit testing, integration testing, system testing, acceptance testing, performance testing, security testing, etc., to identify and resolve any defects, errors, or deviations from the specifications12. The configuration phase is not the phase where the IS auditor should first examine requirements from an in-house SDLC project that has not met user specifications. The configuration phase is the phase where the system is installed and configured on the target environment, such as hardware, software, network, etc., to prepare it for deployment and operation.The configuration phase may involve activities such as installation, customization, migration, integration, etc., to ensure that the system is compatible and interoperable with the existing infrastructure and systems34. The user training phase is not the phase where the IS auditor should first examine requirements from an in-house SDLC project that has not met user specifications. The user training phase is the phase where the end-users are trained and educated on how to use the system effectively and efficiently.The user training phase may involve activities such as developing training materials, conducting training sessions, providing feedback and support, etc., to ensure that the users are familiar and comfortable with the system features and functions56. The development phase is not the phase where the IS auditor should first examine requirements from an in-house SDLC project that has not met user specifications. The development phase is the phase where the system is coded and built based on the design specifications and the user specifications.The development phase may involve activities such as programming, debugging, documenting, etc., to create a working prototype or a final product of the system
D.
Development phase The quality assurance (QA) phase is the phase where the IS auditor should first examine requirements from an in-house SDLC project that has not met user specifications. This is because the QA phase is the phase where the system is tested and verified against the user specifications and the design specifications to ensure that it meets the functional and non-functional requirements, as well as the quality standards and expectations.The QA phase involves various testing activities, such as unit testing, integration testing, system testing, acceptance testing, performance testing, security testing, etc., to identify and resolve any defects, errors, or deviations from the specifications12. The configuration phase is not the phase where the IS auditor should first examine requirements from an in-house SDLC project that has not met user specifications. The configuration phase is the phase where the system is installed and configured on the target environment, such as hardware, software, network, etc., to prepare it for deployment and operation.The configuration phase may involve activities such as installation, customization, migration, integration, etc., to ensure that the system is compatible and interoperable with the existing infrastructure and systems34. The user training phase is not the phase where the IS auditor should first examine requirements from an in-house SDLC project that has not met user specifications. The user training phase is the phase where the end-users are trained and educated on how to use the system effectively and efficiently.The user training phase may involve activities such as developing training materials, conducting training sessions, providing feedback and support, etc., to ensure that the users are familiar and comfortable with the system features and functions56. The development phase is not the phase where the IS auditor should first examine requirements from an in-house SDLC project that has not met user specifications. The development phase is the phase where the system is coded and built based on the design specifications and the user specifications.The development phase may involve activities such as programming, debugging, documenting, etc., to create a working prototype or a final product of the system
Answers
Suggested answer: C

What should an IS auditor do FIRST when a follow-up audit reveals some management action plans have not been initiated?

A.
Confirm whether the identified risks are still valid.
A.
Confirm whether the identified risks are still valid.
Answers
B.
Provide a report to the audit committee.
B.
Provide a report to the audit committee.
Answers
C.
Escalate the lack of plan completion to executive management.
C.
Escalate the lack of plan completion to executive management.
Answers
D.
Request an additional action plan review to confirm the findings.
D.
Request an additional action plan review to confirm the findings.
Answers
Suggested answer: C

Explanation:

The first thing that an IS auditor should do when a follow-up audit reveals some management action plans have not been initiated is to escalate the lack of plan completion to executive management. This is because the failure to implement the agreed management action plans may indicate that the management is not taking the audit findings and recommendations seriously, or that they are accepting too much risk by not addressing the identified issues.Escalating the lack of plan completion to executive management can help to raise awareness and accountability, as well as to seek support and intervention to ensure that the management action plans are executed in a timely and effective manner12.

Confirming whether the identified risks are still valid is not the first thing to do, although it may be a useful step to reassess the current situation and the potential impact of not implementing the management action plans.However, confirming the validity of the risks does not address the root cause of why the management action plans have not been initiated, nor does it provide any assurance or remediation for the unresolved issues34.

Providing a report to the audit committee is not the first thing to do, although it may be a necessary step to communicate and document the results of the follow-up audit.However, providing a report to the audit committee does not guarantee that the management action plans will be initiated, nor does it resolve any conflicts or challenges that may prevent the management from implementing them34.

Requesting an additional action plan review to confirm the findings is not the first thing to do, although it may be a prudent step to verify and validate the accuracy and completeness of the follow-up audit.However, requesting an additional review may delay or defer the implementation of the management action plans, as well as consume more internal audit resources and time

Transaction records from a business database were inadvertently deleted, and system operators decided to restore from a snapshot copy. Which of the following provides assurance that the BEST transactions were recovered successfully?

A.
Review transaction recovery logs to ensure no errors were recorded.
A.
Review transaction recovery logs to ensure no errors were recorded.
Answers
B.
Recount the transaction records to ensure no records are missing.
B.
Recount the transaction records to ensure no records are missing.
Answers
C.
Rerun the process on a backup machine to verify the results are the same.
C.
Rerun the process on a backup machine to verify the results are the same.
Answers
D.
Compare transaction values against external statements to verify accuracy.
D.
Compare transaction values against external statements to verify accuracy.
Answers
Suggested answer: B

Explanation:

Recounting the transaction records to ensure no records are missing provides assurance that the best transactions were recovered successfully from a snapshot copy. This is because recounting the transaction records can verify that the number of records in the restored database matches the number of records in the snapshot copy, which represents the state of the database before the deletion occurred.Recounting the transaction records can also detect any data corruption or inconsistency that may have occurred during the restore process1.

Reviewing transaction recovery logs to ensure no errors were recorded is not the best answer, because transaction recovery logs may not capture all the details or issues that may affect the data quality or integrity.Transaction recovery logs are mainly used to monitor and troubleshoot the restore process, but they may not reflect the actual content or accuracy of the restored data2.

Rerunning the process on a backup machine to verify the results are the same is not the best answer, because rerunning the process may introduce additional errors or inconsistencies that may affect the data quality or integrity.Rerunning the process may also consume more time and resources than necessary, and it may not guarantee that the results are identical to the original data3.

Comparing transaction values against external statements to verify accuracy is not the best answer, because external statements may not be available or reliable for all transactions. External statements are documents or reports that provide information about transactions from a third-party source, such as a bank, a vendor, or a customer.However, external statements may not cover all transactions, or they may have different formats, standards, or timeliness than the internal data

Total 1.198 questions
Go to page: of 120