ExamGecko
Home Home / Isaca / CISA

Isaca CISA Practice Test - Questions Answers, Page 66

Question list
Search
Search

List of questions

Search

Related questions











Which of the following is MOST important for an IS auditor to review when determining whether IT investments are providing value to tie business?

A.
Return on investment (ROI)
A.
Return on investment (ROI)
Answers
B.
Business strategy
B.
Business strategy
Answers
C.
Business cases
C.
Business cases
Answers
D.
Total cost of ownership (TCO)
D.
Total cost of ownership (TCO)
Answers
Suggested answer: B

Explanation:

The answer B is correct because the most important thing for an IS auditor to review when determining whether IT investments are providing value to the business is the business strategy. The business strategy is the plan or direction that guides the organization's decisions and actions to achieve its goals and objectives. The business strategy defines the organization's vision, mission, values, competitive advantage, target market, value proposition, and key performance indicators (KPIs).

IT investments are the expenditures or costs incurred by the organization to acquire, develop, maintain, or improve its IT assets, such as hardware, software, network, data, or services. IT investments can help the organization to support its business processes, operations, functions, and capabilities. IT investments can also help the organization to create or enhance its products, services, or solutions for its customers or stakeholders.

To determine whether IT investments are providing value to the business, an IS auditor needs to review how well the IT investments align with and contribute to the business strategy. Alignment means that the IT investments are consistent and compatible with the business strategy, and that they support and enable the achievement of the strategic goals and objectives. Contribution means that the IT investments are effective and efficient in delivering the expected outcomes and benefits for the business, and that they generate a positive return on investment (ROI) or value for money.

An IS auditor can use various methods or frameworks to review the alignment and contribution of IT investments to the business strategy, such as:

Balanced scorecard: A balanced scorecard is a tool that measures and monitors the performance of an organization across four perspectives: financial, customer, internal process, and learning and growth. A balanced scorecard can help an IS auditor to evaluate how well the IT investments support and improve each perspective of the organization's performance, and how they link to the organization's vision and strategy.

Value chain analysis: A value chain analysis is a tool that identifies and analyzes the primary and support activities that add value to an organization's products or services. A value chain analysis can help an IS auditor to assess how well the IT investments enhance or optimize each activity of the value chain, and how they create or sustain a competitive advantage for the organization.

Business case analysis: A business case analysis is a tool that evaluates the feasibility, viability, and desirability of a proposed project or initiative. A business case analysis can help an IS auditor to examine how well the IT investments address a business problem or opportunity, how they deliver the expected benefits and outcomes for the stakeholders, and how they compare with alternative options or solutions.

The other options are not as important as option B. Return on investment (ROI) (option A) is a metric that measures the profitability or efficiency of an investment by comparing its benefits or returns with its costs or expenses. ROI can help an IS auditor to quantify the value of IT investments for the business, but it does not capture all aspects of value, such as quality, satisfaction, or impact. ROI also depends on how well the IT investments align with the business strategy in the first place. Business cases (option C) are documents that justify and support a proposed project or initiative by describing its objectives, scope, benefits, costs, risks, and alternatives. Business cases can help an IS auditor to understand the rationale and expectations for IT investments, but they do not guarantee that the IT investments will actually deliver the desired value for the business. Business cases also need to be aligned with the business strategy to ensure their relevance and validity. Total cost of ownership (TCO) (option D) is a metric that measures the total costs incurred by an organization to acquire, operate, maintain, and dispose of an IT asset over its life cycle. TCO can help an IS auditor to estimate the financial impact of IT investments for the business, but it does not reflect the benefits or outcomes of IT investments, nor does it indicate how well the IT investments support or enable the business strategy.

IT Strategy: Aligning IT & Business Strategy

How To Measure The Value Of Your Technology Investments

IT Investment Management: A Framework for Assessing ... - GAO

How To Align Your Technology Investments With Your Business Strategy

During a review, an IS auditor discovers that corporate users are able to access cloud-based applications and data any Internet-connected web browser. Which Of the following is the auditor's BEST recommendation to prevent unauthorized access?

A.
Implement an intrusion detection system (IDS),
A.
Implement an intrusion detection system (IDS),
Answers
B.
Update security policies and procedures.
B.
Update security policies and procedures.
Answers
C.
Implement multi-factor authentication.
C.
Implement multi-factor authentication.
Answers
D.
Utilize strong anti-malware controls on all computing devices.
D.
Utilize strong anti-malware controls on all computing devices.
Answers
Suggested answer: C

Explanation:

The best recommendation to prevent unauthorized access to cloud-based applications and data is to implement multi-factor authentication (MFA). MFA is a method of verifying the identity of a user by requiring two or more pieces of evidence, such as a password, a code sent to a phone, or a biometric factor. MFA adds an extra layer of security to prevent unauthorized access, even if the user's password is compromised or stolen. MFA can also help comply with data privacy and security regulations, such as the General Data Protection Regulation (GDPR) and the Health Insurance Portability and Accountability Act (HIPAA).

The other options are not as effective as MFA in preventing unauthorized access. An intrusion detection system (IDS) is a tool that monitors network traffic and alerts administrators of suspicious or malicious activity, but it does not prevent access by itself. Updating security policies and procedures is a good practice, but it does not ensure that users follow them or that they are enforced. Utilizing strong anti-malware controls on all computing devices can help protect against malware infections, but it does not prevent users from accessing cloud-based applications and data from any Internet-connected web browser.

ISACA, CISA Review Manual, 27th Edition, 2019, p.2471

ISACA, CISA Review Questions, Answers & Explanations Database - 12 Month Subscription2

What Is Cloud Security?| Google Cloud3

5 Cloud Application Security Best Practices | Snyk4

An organization is concerned with meeting new regulations for protecting data confidentiality and asks an IS auditor to evaluate their procedures for transporting data. Which of the following would BEST support the organization's objectives?

A.
Cryptographic hashes
A.
Cryptographic hashes
Answers
B.
Virtual local area network (VLAN)
B.
Virtual local area network (VLAN)
Answers
C.
Encryption
C.
Encryption
Answers
D.
Dedicated lines
D.
Dedicated lines
Answers
Suggested answer: C

Explanation:

The best option to support the organization's objectives of protecting data confidentiality while transporting data is encryption. Encryption is a process of transforming data into an unreadable form using a secret key or algorithm, so that only authorized parties can access the original data. Encryption protects the confidentiality of data in transit by preventing unauthorized interception, modification, or disclosure of the data. Encryption can also help comply with data privacy and security regulations, such as the GDPR and HIPAA.

The other options are not as effective as encryption in protecting data confidentiality while transporting data. Cryptographic hashes are mathematical functions that generate a fixed-length output from an input, but they do not encrypt the data. Hashes are used to verify the integrity and authenticity of data, but they do not prevent unauthorized access to the data. Virtual local area network (VLAN) is a logical grouping of network devices that share the same broadcast domain, but they do not encrypt the data. VLANs can improve network performance and security by isolating traffic, but they do not protect the data from being intercepted or modified by external attackers. Dedicated lines are physical connections that provide exclusive access to a network or service, but they do not encrypt the data. Dedicated lines can offer higher bandwidth and reliability, but they do not guarantee the confidentiality of the data from being compromised by physical tampering or eavesdropping.

ISACA, CISA Review Manual, 27th Edition, 2019, p.2471

ISACA, CISA Review Questions, Answers & Explanations Database - 12 Month Subscription2

Data Security and Confidentiality Guidelines - Centers for Disease Control and Prevention3

Information Security | Confidentiality - GeeksforGeeks4

Which of the following provides an IS auditor assurance that the interface between a point-of-sale (POS) system and the general ledger is transferring sales data completely and accurately?

A.
Electronic copies of customer sales receipts are maintained.
A.
Electronic copies of customer sales receipts are maintained.
Answers
B.
Monthly bank statements are reconciled without exception.
B.
Monthly bank statements are reconciled without exception.
Answers
C.
Nightly batch processing has been replaced with real-time processing.
C.
Nightly batch processing has been replaced with real-time processing.
Answers
D.
The data transferred over the POS interface is encrypted.
D.
The data transferred over the POS interface is encrypted.
Answers
Suggested answer: A

Explanation:

The best option to provide an IS auditor assurance that the interface between a point-of-sale (POS) system and the general ledger is transferring sales data completely and accurately is A. Electronic copies of customer sales receipts are maintained. Electronic copies of customer sales receipts are records of the transactions that occurred at the POS system, which can be compared with the data transferred to the general ledger. This can help detect any errors, omissions, or discrepancies in the data transfer process and ensure that the sales data is complete and accurate.

The other options are not as effective as A in providing assurance that the interface between the POS system and the general ledger is transferring sales data completely and accurately. B. Monthly bank statements are reconciled without exception. Monthly bank statements are records of the cash inflows and outflows of the organization, which may not match with the sales data recorded by the POS system and the general ledger. For example, there may be delays, discounts, returns, or refunds that affect the cash flow but not the sales revenue. Therefore, reconciling monthly bank statements without exception does not necessarily mean that the sales data is complete and accurate. C. Nightly batch processing has been replaced with real-time processing. Nightly batch processing is a method of transferring data from the POS system to the general ledger in batches at a scheduled time, usually at night. Real-time processing is a method of transferring data from the POS system to the general ledger as soon as the transactions occur. Real-time processing may improve the timeliness and efficiency of the data transfer process, but it does not guarantee that the sales data is complete and accurate. There may still be errors, omissions, or discrepancies in the data transfer process that need to be detected and corrected. D. The data transferred over the POS interface is encrypted. Encryption is a process of transforming data into an unreadable form using a secret key or algorithm, so that only authorized parties can access the original data. Encryption protects the confidentiality and security of the data transferred over the POS interface, but it does not ensure that the sales data is complete and accurate. There may still be errors, omissions, or discrepancies in the data transfer process that need to be detected and corrected.

ISACA, CISA Review Manual, 27th Edition, 2019, p.2471

ISACA, CISA Review Questions, Answers & Explanations Database - 12 Month Subscription2

Sales Audit Overview - Oracle3

Notes on Audit of Ledgers - Guidelines to Auditors - Accountlearning

What is the PRIMARY purpose of performing a parallel run of a now system?

A.
To train the end users and supporting staff on the new system
A.
To train the end users and supporting staff on the new system
Answers
B.
To verify the new system provides required business functionality
B.
To verify the new system provides required business functionality
Answers
C.
To reduce the need for additional testing
C.
To reduce the need for additional testing
Answers
D.
To validate the new system against its predecessor
D.
To validate the new system against its predecessor
Answers
Suggested answer: D

Explanation:

The primary purpose of performing a parallel run of a new system is to validate the new system against its predecessor. A parallel run is a strategy for system changeover where a new system slowly assumes the roles of the older system while both systems operate simultaneously. This allows for comparison of the results and outputs of both systems to ensure that the new system is working correctly and reliably. A parallel run can also help identify and resolve any errors, discrepancies, or inconsistencies in the new system before the old system is discontinued.

The other options are not the primary purpose of performing a parallel run of a new system. A. To train the end users and supporting staff on the new system. Training is an important part of system implementation, but it is not the main reason for doing a parallel run. Training can be done before, during, or after the parallel run, depending on the needs and preferences of the organization. B. To verify the new system provides required business functionality. Verifying the business functionality of the new system is part of user acceptance testing (UAT), which is a formal and structured process of testing whether the new system meets the specifications and expectations of the users and stakeholders. UAT is usually done before the parallel run, as a prerequisite for system changeover. C. To reduce the need for additional testing. Reducing the need for additional testing is not the primary purpose of performing a parallel run, but rather a possible benefit or outcome of doing so. A parallel run can help ensure that the new system is thoroughly tested and validated in a real-world environment, which may reduce the likelihood of encountering major issues or defects later on. However, additional testing may still be needed after the parallel run, depending on the feedback and evaluation of the users and stakeholders.

ISACA, CISA Review Manual, 27th Edition, 2019, p.2471

IS

During which phase of the software development life cycle is it BEST to initiate the discussion of application controls?

A.
Business case development phase when stakeholders are identified
A.
Business case development phase when stakeholders are identified
Answers
B.
Application design phase process functionalities are finalized
B.
Application design phase process functionalities are finalized
Answers
C.
User acceptance testing (UAT) phase when test scenarios are designed
C.
User acceptance testing (UAT) phase when test scenarios are designed
Answers
D.
Application coding phase when algorithms are developed to solve business problems
D.
Application coding phase when algorithms are developed to solve business problems
Answers
Suggested answer: B

Explanation:

The best phase of the software development life cycle to initiate the discussion of application controls is the application design phase when process functionalities are finalized. Application controls are the policies, procedures, and techniques that ensure the completeness, accuracy, validity, and authorization of data input, processing, output, and storage in an application. Application controls help prevent, detect, or correct errors and fraud in software applications. Examples of application controls include input validation, edit checks, reconciliation, encryption, access control, audit trails, etc.

The application design phase is when the software requirements are translated into a logical and physical design that specifies how the application will look and work. This phase is the best time to discuss application controls because it allows the developers to incorporate them into the design specifications and ensure that they are aligned with the business objectives and user needs. By discussing application controls early in the design phase, the developers can also avoid costly rework or changes later in the development process.

The other phases are not as optimal as the application design phase to initiate the discussion of application controls. A. Business case development phase when stakeholders are identified. The business case development phase is when the feasibility, scope, objectives, benefits, risks, and costs of a software project are defined and evaluated. This phase is important for obtaining stakeholder approval and support for the project, but it is too early to discuss application controls in detail because the software requirements and functionalities are not yet clear or finalized. B. User acceptance testing (UAT) phase when test scenarios are designed. The user acceptance testing phase is when the software is tested by the end-users or stakeholders to verify that it meets their expectations and requirements. This phase is too late to discuss application controls because it is near the end of the development process and any changes or additions to the application controls would require retesting and revalidation of the software. C. Application coding phase when algorithms are developed to solve business problems. The application coding phase is when the software design is translated into executable code using programming languages and tools. This phase is not ideal to discuss application controls because it is after the design phase and any changes or additions to the application controls would require redesigning and recoding of the software.

ISACA, CISA Review Manual, 27th Edition, 2019, p.2471

ISACA, CISA Review Questions, Answers & Explanations Database - 12 Month Subscription2

What Is Application Control?| McAfee3

What Is Application Lifecycle Management?| Red Hat4

When testing the accuracy of transaction data, which of the following situations BEST justifies the use of a smaller sample size?

A.
The IS audit staff has a high level of experience.
A.
The IS audit staff has a high level of experience.
Answers
B.
It is expected that the population is error-free.
B.
It is expected that the population is error-free.
Answers
C.
Proper segregation of duties is in place.
C.
Proper segregation of duties is in place.
Answers
D.
The data can be directly changed by users.
D.
The data can be directly changed by users.
Answers
Suggested answer: B

Explanation:

The best situation that justifies the use of a smaller sample size when testing the accuracy of transaction data is B. It is expected that the population is error-free. The sample size is the number of items selected from the population for testing. The sample size depends on various factors, such as the level of confidence, the tolerable error rate, the expected error rate, and the variability of the population. A smaller sample size means that fewer items are tested, which reduces the cost and time of testing, but also increases the sampling risk (the risk that the sample is not representative of the population).

One of the factors that affects the sample size is the expected error rate, which is the auditor's best estimate of the proportion of errors in the population before testing. A higher expected error rate means that more errors are likely to be found in the population, which requires a larger sample size to provide sufficient evidence for the auditor's conclusion. A lower expected error rate means that fewer errors are likely to be found in the population, which allows a smaller sample size to provide sufficient evidence for the auditor's conclusion. Therefore, if it is expected that the population is error-free (i.e., the expected error rate is zero or very low), a smaller sample size can be justified.

The other situations do not justify the use of a smaller sample size when testing the accuracy of transaction data. A. The IS audit staff has a high level of experience. The IS audit staff's level of experience does not affect the sample size, but rather their ability to design and execute the sampling procedures and evaluate the results. The IS audit staff's level of experience may affect their judgment in selecting and applying sampling methods, but it does not change the statistical or mathematical principles that determine the sample size. B. Proper segregation of duties is in place. Proper segregation of duties is an internal control that helps prevent or detect errors or fraud in transaction processing, but it does not affect the sample size. The sample size is based on the characteristics of the population and the objectives of testing, not on the controls in place. Proper segregation of duties may reduce the likelihood or impact of errors or fraud in transaction processing, but it does not eliminate them completely. Therefore, proper segregation of duties does not justify a smaller sample size when testing the accuracy of transaction data. C. The data can be directly changed by users. The data's ability to be directly changed by users does not justify a smaller sample size, but rather a larger one. The data's ability to be directly changed by users increases the risk of errors or fraud in transaction processing, which requires a larger sample size to provide sufficient evidence for the auditor's conclusion. The data's ability to be directly changed by users also increases the variability of the population, which affects the sample size.

ISACA, CISA Review Manual, 27th Edition, 2019, p.2471

ISACA, CISA Review Questions, Answers & Explanations Database - 12 Month Subscription2

Audit Sampling - AICPA3

How to choose a sample size (for the statistically challenged)

The BEST way to prevent fraudulent payments is to implement segregation of duties between the vendor setup and:

A.
payment processing.
A.
payment processing.
Answers
B.
payroll processing.
B.
payroll processing.
Answers
C.
procurement.
C.
procurement.
Answers
D.
product registration.
D.
product registration.
Answers
Suggested answer: A

Explanation:

Segregation of duties is a key internal control that aims to prevent fraud and errors by ensuring that no single individual has the authority to execute two or more conflicting sensitive transactions or functions.In the accounts payable vendor payment cycle, segregation of duties involves separating the tasks of vendor setup, procurement, invoice approval, and payment processing1. This way, an employee cannot create a fictitious vendor and issue a payment to themselves or their accomplices without being detected by another person.Therefore, the best way to prevent fraudulent payments is to implement segregation of duties between the vendor setup and payment processing.Reference:1: Segregation of Duties in the Accounts Payable Vendor Payment Cycle for SMBs - Now With a Podcast! - Debra R Richardson : What is Separation of duties - University of California, Berkeley

Which of following areas is MOST important for an IS auditor to focus on when reviewing the maturity model for a technology organization?

A.
Standard operating procedures
A.
Standard operating procedures
Answers
B.
Service level agreements (SLAs)
B.
Service level agreements (SLAs)
Answers
C.
Roles and responsibility matrix
C.
Roles and responsibility matrix
Answers
D.
Business resiliency
D.
Business resiliency
Answers
Suggested answer: C

Explanation:

A maturity model for a technology organization is a tool that measures the progress and capability of the IT function in relation to its goals, processes, and practices. A maturity model can help identify gaps and areas for improvement, as well as benchmark the IT function against industry standards or best practices. One of the key aspects of a maturity model is the definition and clarity of roles and responsibilities for the IT function and its stakeholders. A roles and responsibility matrix, such as a RACI matrix, is a document that clarifies who is responsible, accountable, consulted, and informed for each task or deliverable in a project or process. A roles and responsibility matrix can help avoid confusion, duplication, or omission of work, as well as ensure accountability and communication among the IT function and its customers, partners, and suppliers. Therefore, an IS auditor should focus on reviewing the roles and responsibility matrix when evaluating the maturity model for a technology organization.

A standard operating procedure (SOP) is a document that describes the steps and instructions for performing a routine or repetitive task or process. SOPs are important for ensuring consistency, quality, and compliance in the IT function, but they are not directly related to the maturity model. A service level agreement (SLA) is a contract that defines the expectations and obligations between an IT service provider and its customers. SLAs are important for ensuring customer satisfaction, performance measurement, and dispute resolution in the IT function, but they are not directly related to the maturity model. A business resiliency plan is a document that outlines how an IT function will continue to operate or recover from a disruption or disaster.Business resiliency is important for ensuring availability, reliability, and security in the IT function, but it is not directly related to the maturity model.Reference:1: Maturity Models for IT & Technology | Splunk2: Responsibility assignment matrix - Wikipedia3: Roles and Responsibilities Matrix - SDLCforms

The charging method that effectively encourages the MOST efficient use of IS resources is:

A.
specific charges that can be tied back to specific usage.
A.
specific charges that can be tied back to specific usage.
Answers
B.
total utilization to achieve full operating capacity.
B.
total utilization to achieve full operating capacity.
Answers
C.
residual income in excess of actual incurred costs.
C.
residual income in excess of actual incurred costs.
Answers
D.
allocations based on the ability to absorb charges.
D.
allocations based on the ability to absorb charges.
Answers
Suggested answer: A

Explanation:

The charging method for IS resources is the way that the IS function allocates its costs to the users or business units that consume its services. The charging method can affect the behavior and incentives of the users and the IS function, as well as the efficiency and effectiveness of the IS resources. Therefore, choosing an appropriate charging method is an important decision for the IS function and its stakeholders.

One of the possible charging methods is to charge specific costs that can be tied back to specific usage. This means that the IS function tracks and measures the actual consumption of each user or business unit for each IS service, and charges them accordingly. For example, if a user uses 10 GB of storage space, 5 hours of CPU time, and 100 MB of network bandwidth, the IS function will charge them based on the unit costs of these resources. This charging method has the advantage of encouraging the most efficient use of IS resources, as it provides clear and accurate feedback to the users about their consumption and costs, and motivates them to optimize their usage and avoid waste or overuse. This charging method also aligns the interests of the IS function and the users, as both parties benefit from reducing costs and improving efficiency.

The other possible charging methods are:

Total utilization to achieve full operating capacity: This means that the IS function charges a fixed amount to each user or business unit based on their proportion of the total operating capacity of the IS resources. For example, if a user or business unit has 10% of the total computing power allocated to them, they will pay 10% of the total IS costs. This charging method has the disadvantage of discouraging efficient use of IS resources, as it does not reflect the actual consumption or usage of each user or business unit, and does not provide any incentive to reduce costs or improve efficiency. This charging method also creates a mismatch between the interests of the IS function and the users, as the IS function benefits from increasing costs and capacity, while the users bear the burden of paying for them.

Residual income in excess of actual incurred costs: This means that the IS function charges a markup or profit margin on top of its actual incurred costs to each user or business unit. For example, if a user or business unit consumes $100 worth of IS resources, the IS function will charge them $120, where $20 is the residual income for the IS function. This charging method has the disadvantage of discouraging efficient use of IS resources, as it increases the costs for the users and reduces their value for money. This charging method also creates a conflict between the interests of the IS function and the users, as the IS function benefits from increasing costs and profits, while the users suffer from paying more than they should.

Allocations based on the ability to absorb charges: This means that the IS function charges different amounts to different users or business units based on their ability to pay or their profitability. For example, if a user or business unit is more profitable or has a higher budget than another user or business unit, they will pay more for the same amount of IS resources. This charging method has the disadvantage of discouraging efficient use of IS resources, as it does not reflect the actual consumption or usage of each user or business unit, and does not provide any incentive to reduce costs or improve efficiency.This charging method also creates an unfair and arbitrary distribution of costs among the users or business units, as some pay more than others for no valid reason.Reference:1: Charging Methods for IT Services - IT Process Wiki2: IT Chargeback Methods - CIO Wiki3: IT Chargeback - Wikipedia

Total 1.198 questions
Go to page: of 120