ExamGecko
Home Home / Isaca / CISA

Isaca CISA Practice Test - Questions Answers, Page 64

Question list
Search
Search

List of questions

Search

Related questions











Which of the following should be of MOST concern to an IS auditor reviewing the information systems acquisition, development, and implementation process?

A.
Data owners are not trained on the use of data conversion tools.
A.
Data owners are not trained on the use of data conversion tools.
Answers
B.
A post-implementation lessons-learned exercise was not conducted.
B.
A post-implementation lessons-learned exercise was not conducted.
Answers
C.
There is no system documentation available for review.
C.
There is no system documentation available for review.
Answers
D.
System deployment is routinely performed by contractors.
D.
System deployment is routinely performed by contractors.
Answers
Suggested answer: C

An IS auditor is asked to review an organization's technology relationships, interfaces, and data. Which of the following enterprise architecture (EA) areas is MOST appropriate this review? (Choose Correct answer and give explanation from CISA Certification - Information Systems Auditor official book)

A.
Reference architecture
A.
Reference architecture
Answers
B.
Infrastructure architecture
B.
Infrastructure architecture
Answers
C.
Information security architecture
C.
Information security architecture
Answers
D.
Application architecture
D.
Application architecture
Answers
Suggested answer: C

Explanation:

The lack of system documentation should be of most concern to an IS auditor reviewing the information systems acquisition, development, and implementation process. This is because system documentation is a vital source of information that describes the system's purpose, functionality, design, architecture, testing, deployment, operation, and maintenance. System documentation helps the IS auditor to understand and evaluate the system's quality, performance, security, compliance, and alignment with the business requirements and objectives.Without system documentation, the IS auditor may not be able to perform a thorough and effective audit of the system, as well as identify any issues or risks that may affect the system's reliability or integrity12.

Data owners are not trained on the use of data conversion tools is not the most concerning issue, although it may indicate a lack of user readiness or competence for the system implementation. Data conversion tools are software applications that help users to transform data from one format or structure to another, such as from legacy systems to new systems. Data owners are users who have the responsibility and authority to manage and control the data within their domain. Data owners should be trained on how to use data conversion tools to ensure that the data is accurately and securely transferred to the new system, as well as to avoid any data loss, corruption, or inconsistency.However, data owners are not the only users who need training for the system implementation, and data conversion tools are not the only tools that need training34.

A post-implementation lessons-learned exercise was not conducted is not the most concerning issue, although it may indicate a lack of continuous improvement or learning culture for the system development and implementation process. A post-implementation lessons-learned exercise is a meeting or a session that takes place after the completion of a system implementation project, where the project team and stakeholders discuss and document the successes and failures of the project, as well as identify any best practices or areas for improvement for future projects.A post-implementation lessons-learned exercise can help to enhance the project management skills, knowledge, and performance of the project team and stakeholders, as well as to avoid repeating the same mistakes or problems in future projects56.

System deployment is routinely performed by contractors is not the most concerning issue, although it may pose some challenges or risks for the system implementation process. System deployment is the final stage of the system development life cycle (SDLC), where the system is installed and configured on the target environment and made available for use by end-users. System deployment can be performed by internal staff or external contractors, depending on the availability, expertise, and cost of resources. System deployment by contractors may offer some benefits such as faster delivery, lower cost, or higher quality than internal staff.However, system deployment by contractors may also introduce some risks such as loss of control, dependency, or security breaches over the system implementation process

Which of the following is the BEST way to detect unauthorized copies of licensed software on systems?

A.
Implement controls to prohibit downloads of unauthorized software.
A.
Implement controls to prohibit downloads of unauthorized software.
Answers
B.
Conduct periodic software scanning.
B.
Conduct periodic software scanning.
Answers
C.
Perform periodic counting of licenses.
C.
Perform periodic counting of licenses.
Answers
D.
Require senior management approval when installing licenses.
D.
Require senior management approval when installing licenses.
Answers
Suggested answer: B

Explanation:

The best way to detect unauthorized copies of licensed software on systems is to conduct periodic software scanning. Software scanning is a process of using specialized tools or programs to scan the systems and identify the software installed, the license status, the usage, and the compliance with the software policies and agreements. Software scanning can help to detect any unauthorized, unlicensed, or illegal copies of software on the systems, as well as any discrepancies or violations of the software licenses.Software scanning can also help to optimize the software inventory, reduce the software costs, and improve the security and performance of the systems12.

Some examples of software scanning tools are:

Microsoft Software Inventory Analyzer (MSIA): A free tool that scans Windows-based computers and servers and generates reports on the Microsoft products installed, such as operating systems, applications, and updates3.

Belarc Advisor: A free tool that scans Windows-based computers and generates reports on the hardware and software installed, including license keys, versions, usage, and security status4.

Lansweeper: A paid tool that scans Windows, Linux, Mac, and other network devices and generates reports on the hardware and software inventory, license compliance, configuration, and vulnerabilities5.

To conduct periodic software scanning, you need to:

Choose a suitable software scanning tool that meets your needs and budget.

Define the scope and frequency of the software scanning, such as which systems to scan, how often to scan, and what information to collect.

Configure and run the software scanning tool according to the instructions and settings.

Review and analyze the software scanning reports and identify any unauthorized copies of licensed software on the systems.

Take appropriate actions to remove or regularize the unauthorized copies of licensed software on the systems.

Document and report the results and findings of the software scanning.

Which of the following is a method to prevent disclosure of classified documents printed on a shared printer?

A.
Using passwords to allow authorized users to send documents to the printer
A.
Using passwords to allow authorized users to send documents to the printer
Answers
B.
Requiring a key code to be entered on the printer to produce hard copy
B.
Requiring a key code to be entered on the printer to produce hard copy
Answers
C.
Encrypting the data stream between the user's computer and the printer
C.
Encrypting the data stream between the user's computer and the printer
Answers
D.
Producing a header page with classification level for printed documents
D.
Producing a header page with classification level for printed documents
Answers
Suggested answer: B

Explanation:

Requiring a key code to be entered on the printer to produce hard copy is a method to prevent disclosure of classified documents printed on a shared printer. This is because requiring a key code adds an extra layer of security and authentication to the printing process, ensuring that only authorized users can access and retrieve the printed documents.Requiring a key code also prevents unauthorized users from viewing or tampering with the documents while they are in the printer's queue or output tray1.

Using passwords to allow authorized users to send documents to the printer is not a sufficient method to prevent disclosure of classified documents printed on a shared printer. This is because passwords only protect the transmission of the documents from the user's computer to the printer, but they do not protect the documents once they are printed.Passwords can also be compromised or forgotten by users, making them vulnerable to unauthorized access or denial of service2.

Encrypting the data stream between the user's computer and the printer is not a sufficient method to prevent disclosure of classified documents printed on a shared printer. This is because encryption only protects the confidentiality and integrity of the documents while they are in transit, but they do not protect the documents once they are printed.Encryption can also introduce performance issues or compatibility problems with different printers or devices2.

Producing a header page with classification level for printed documents is not a method to prevent disclosure of classified documents printed on a shared printer. This is because producing a header page only informs the users about the sensitivity and handling of the documents, but it does not prevent unauthorized users from accessing or viewing them.Producing a header page can also waste paper and ink, as well as increase the risk of misplacing or mixing up the documents

During a follow-up audit, an IS auditor finds that senior management has implemented a different remediation action plan than what was previously agreed upon. Which of the following is the auditor's BEST course of action?

A.
Report the deviation by the control owner in the audit report.
A.
Report the deviation by the control owner in the audit report.
Answers
B.
Evaluate the implemented control to ensure it mitigates the risk to an acceptable level.
B.
Evaluate the implemented control to ensure it mitigates the risk to an acceptable level.
Answers
C.
Cancel the follow-up audit and reschedule for the next audit period.
C.
Cancel the follow-up audit and reschedule for the next audit period.
Answers
D.
Request justification from management for not implementing the recommended control.
D.
Request justification from management for not implementing the recommended control.
Answers
Suggested answer: B

Explanation:

The IS auditor's best course of action is to evaluate the implemented control to ensure it mitigates the risk to an acceptable level.This is because the objective of a follow-up audit is to verify that corrective actions have been accomplished as scheduled and that they are effective in preventing or minimizing future recurrence1. If senior management has implemented a different remediation action plan than what was previously agreed upon, the IS auditor should assess whether the alternative control is adequate and appropriate for the situation. Requesting justification from management for not implementing the recommended control (option D) may be a secondary step, but it is not the best course of action. Reporting the deviation by the control owner in the audit report (option A) may be premature and unnecessary if the implemented control is satisfactory.Canceling the follow-up audit and rescheduling for the next audit period (option C) is not advisable, as it would delay the verification of the effectiveness of the implemented control and potentially expose the organization to further risks.Reference:1: Follow-up Audits - Canadian Audit and Accountability Foundation

An IS auditor is concerned that unauthorized access to a highly sensitive data center might be gained by piggybacking or tailgating. Which of the following is the BEST recommendation? (Choose Correct answer and give explanation from CISA Certification - Information Systems Auditor official book)

A.
Biometrics
A.
Biometrics
Answers
B.
Procedures for escorting visitors
B.
Procedures for escorting visitors
Answers
C.
Airlock entrance
C.
Airlock entrance
Answers
D.
Intruder alarms
D.
Intruder alarms
Answers
Suggested answer: C

Explanation:

The best recommendation to prevent unauthorized access to a highly sensitive data center by piggybacking or tailgating is to use an airlock entrance. An airlock entrance is a type of access control system that consists of two doors that are interlocked, so that only one door can be opened at a time. This prevents an unauthorized person from following an authorized person into the data center without being detected. An airlock entrance can also be integrated with other security measures, such as biometrics, card readers, or PIN pads, to verify the identity and authorization of each person entering the data center.

Biometrics (option A) is a method of verifying the identity of a person based on their physical or behavioral characteristics, such as fingerprints, iris scans, or voice recognition. Biometrics can provide a high level of security, but they are not sufficient to prevent piggybacking or tailgating, as an unauthorized person can still follow an authorized person who has been authenticated by the biometric system.

Procedures for escorting visitors (option B) is a policy that requires all visitors to the data center to be accompanied by an authorized employee at all times. This can help prevent unauthorized access by visitors, but it does not address the risk of piggybacking or tailgating by other employees or contractors who may have legitimate access to the building but not to the data center.

Intruder alarms (option D) are devices that detect and alert when an unauthorized person enters a restricted area. Intruder alarms can provide a deterrent and a response mechanism for unauthorized access, but they are not effective in preventing piggybacking or tailgating, as they rely on the detection of the intruder after they have already entered the data center.

Which of the following is the PRIMARY purpose of obtaining a baseline image during an operating system audit?

A.
To identify atypical running processes
A.
To identify atypical running processes
Answers
B.
To verify antivirus definitions
B.
To verify antivirus definitions
Answers
C.
To identify local administrator account access
C.
To identify local administrator account access
Answers
D.
To verify the integrity of operating system backups
D.
To verify the integrity of operating system backups
Answers
Suggested answer: A

Explanation:

The primary purpose of obtaining a baseline image during an operating system audit is to identify atypical running processes. A baseline image is a snapshot of the normal state and configuration of an operating system, including the processes that are expected to run on it. By comparing the current state of the operating system with the baseline image, an IS auditor can detect any deviations or anomalies that may indicate unauthorized or malicious activity, such as malware infection, privilege escalation, or data exfiltration. A baseline image can also help an IS auditor to assess the performance and efficiency of the operating system, as well as its compliance with security standards and policies.

Verifying antivirus definitions (option B) is not the primary purpose of obtaining a baseline image, although it may be a part of the baseline configuration. Antivirus definitions are the files that contain the signatures and rules for detecting and removing malware. An IS auditor may verify that the antivirus definitions are up to date and consistent across the operating system, but this does not require obtaining a baseline image.

Identifying local administrator account access (option C) is not the primary purpose of obtaining a baseline image, although it may be a part of the baseline configuration. Local administrator accounts are user accounts that have full control over the operating system and its resources. An IS auditor may identify and review the local administrator accounts to ensure that they are properly secured and authorized, but this does not require obtaining a baseline image.

Verifying the integrity of operating system backups (option D) is not the primary purpose of obtaining a baseline image, although it may be a part of the backup process. Operating system backups are copies of the operating system data and settings that can be used to restore the system in case of failure or disaster. An IS auditor may verify that the operating system backups are complete, accurate, and accessible, but this does not require obtaining a baseline image.

Which of the following is the PRIMARY purpose of obtaining a baseline image during an operating system audit?

A.
To identify atypical running processes
A.
To identify atypical running processes
Answers
B.
To verify antivirus definitions
B.
To verify antivirus definitions
Answers
C.
To identify local administrator account access
C.
To identify local administrator account access
Answers
D.
To verify the integrity of operating system backups
D.
To verify the integrity of operating system backups
Answers
Suggested answer: A

Explanation:

The primary purpose of obtaining a baseline image during an operating system audit is to identify atypical running processes. A baseline image is a snapshot of the normal state and configuration of an operating system, including the processes that are expected to run on it. By comparing the current state of the operating system with the baseline image, an IS auditor can detect any deviations or anomalies that may indicate unauthorized or malicious activity, such as malware infection, privilege escalation, or data exfiltration. A baseline image can also help an IS auditor to assess the performance and efficiency of the operating system, as well as its compliance with security standards and policies.

Verifying antivirus definitions (option B) is not the primary purpose of obtaining a baseline image, although it may be a part of the baseline configuration. Antivirus definitions are the files that contain the signatures and rules for detecting and removing malware. An IS auditor may verify that the antivirus definitions are up to date and consistent across the operating system, but this does not require obtaining a baseline image.

Identifying local administrator account access (option C) is not the primary purpose of obtaining a baseline image, although it may be a part of the baseline configuration. Local administrator accounts are user accounts that have full control over the operating system and its resources. An IS auditor may identify and review the local administrator accounts to ensure that they are properly secured and authorized, but this does not require obtaining a baseline image.

Verifying the integrity of operating system backups (option D) is not the primary purpose of obtaining a baseline image, although it may be a part of the backup process. Operating system backups are copies of the operating system data and settings that can be used to restore the system in case of failure or disaster. An IS auditor may verify that the operating system backups are complete, accurate, and accessible, but this does not require obtaining a baseline image.

The use of control totals satisfies which of the following control objectives?

A.
Transaction integrity
A.
Transaction integrity
Answers
B.
Processing integrity
B.
Processing integrity
Answers
C.
Distribution control
C.
Distribution control
Answers
D.
System recoverability
D.
System recoverability
Answers
Suggested answer: B

Explanation:

The use of control totals satisfies the control objective of processing integrity. Processing integrity refers to the accuracy, completeness, timeliness, and validity of data processing. Control totals are a method of verifying the correctness of data processing by comparing the total value or count of a batch of transactions before and after processing. For example, if a batch of 100 invoices is entered into an accounting system, the total amount and number of invoices should match before and after processing. If there is a discrepancy, it indicates an error in data entry, transmission, or processing. Control totals help to ensure that no transactions are lost, duplicated, or altered during processing.

Control Objectives & Activities: Examples, Appropriateness

Levels and Types of Control | Principles of Management

CISA Review Manual 27th Edition, page 337

A finance department has a multi-year project to upgrade the enterprise resource planning (ERP) system hosting the general ledger. and in year one, the system version upgrade will be applied. Which of the following should be the PRIMARY focus of the IS auditor reviewing the first year of the project?

A.
unit testing
A.
unit testing
Answers
B.
Network performance
B.
Network performance
Answers
C.
User acceptance testing (UAT)
C.
User acceptance testing (UAT)
Answers
D.
Regression testing
D.
Regression testing
Answers
Suggested answer: D

Explanation:

The primary focus of the IS auditor reviewing the first year of the project should be regression testing. Regression testing is a type of testing that ensures that the existing functionality of the system is not affected by the changes or upgrades made to the system. Since the project involves upgrading the ERP system hosting the general ledger, which is a critical and complex component of the finance department, it is important to verify that the upgrade does not introduce any errors or defects that could compromise the accuracy, completeness, and reliability of the financial data and reports. Regression testing can help identify and resolve any issues before they affect the users and the business processes.

Unit testing, network performance, and user acceptance testing (UAT) are also important aspects of the project, but they are not the primary focus of the IS auditor in the first year. Unit testing is a type of testing that verifies that each individual module or component of the system works as expected. Network performance is a measure of how well the system can communicate and exchange data with other systems and devices over a network. User acceptance testing (UAT) is a type of testing that validates that the system meets the user requirements and expectations. These aspects are more relevant in later stages of the project, when the system is more developed and ready for deployment.

ERP Upgrade: The Path to Modernization | SAP

ERP System Validation: Your Guide To Successfully Validating ERP Systems

The role of internal auditors in ERPbased organizations

What is Regression Testing? Definition, Tools & Examples

What is Unit Testing? Definition, Tools & Examples

What is Network Performance? Definition, Metrics & Examples

What is User Acceptance Testing (UAT)? Definition, Process & Examples

Total 1.198 questions
Go to page: of 120