ExamGecko
Home Home / Isaca / CISA

Isaca CISA Practice Test - Questions Answers, Page 69

Question list
Search
Search

Related questions











What should an IS auditor evaluate FIRST when reviewing an organization's response to new privacy legislation?

A.
Implementation plan for restricting the collection of personal information
A.
Implementation plan for restricting the collection of personal information
Answers
B.
Privacy legislation in other countries that may contain similar requirements
B.
Privacy legislation in other countries that may contain similar requirements
Answers
C.
Operational plan for achieving compliance with the legislation
C.
Operational plan for achieving compliance with the legislation
Answers
D.
Analysis of systems that contain privacy components
D.
Analysis of systems that contain privacy components
Answers
Suggested answer: D

Explanation:

The first thing that an IS auditor should evaluate when reviewing an organization's response to new privacy legislation is the analysis of systems that contain privacy components. Privacy components are elements of a system that collect, process, store, or transmit personal information that is subject to privacy legislation. An analysis of systems that contain privacy components should identify what types of personal information are involved, where they are located, how they are used, who has access to them, and what risks or threats they face. An analysis of systems that contain privacy components is essential for determining the scope and impact of the new privacy legislation on the organization's systems and processes.

The other options are not as important as option D. An implementation plan for restricting the collection of personal information is a possible action, but not the first thing to evaluate, when reviewing an organization's response to new privacy legislation. An implementation plan for restricting the collection of personal information is a document that outlines how an organization will comply with the principle of data minimization, which states that personal information should be collected only for specific and legitimate purposes and only to the extent necessary for those purposes. An implementation plan for restricting the collection of personal information should be based on an analysis of systems that contain privacy components. Privacy legislation in other countries that may contain similar requirements is a possible source of reference, but not the first thing to evaluate, when reviewing an organization's response to new privacy legislation. Privacy legislation in other countries that may contain similar requirements is a set of laws or regulations that governs the protection of personal information in other jurisdictions that may have comparable or compatible standards or expectations as the new privacy legislation. Privacy legislation in other countries that may contain similar requirements may provide guidance or best practices for complying with the new privacy legislation. However, privacy legislation in other countries that may contain similar requirements should not be used as a substitute for an analysis of systems that contain privacy components. An operational plan for achieving compliance with the legislation is a possible deliverable, but not the first thing to evaluate, when reviewing an organization's response to new privacy legislation. An operational plan for achieving compliance with the legislation is a document that describes how an organization will implement and maintain the necessary policies, procedures, controls, and measures to comply with the new privacy legislation. An operational plan for achieving compliance with the legislation should be derived from an analysis of systems that contain privacy components.Reference: Privacy law - Wikipedia,Data Protection and Privacy Legislation Worldwide | UNCTAD,Data minimization - Wikipedia

Which of the following is MOST important to include in security awareness training?

A.
How to respond to various types of suspicious activity
A.
How to respond to various types of suspicious activity
Answers
B.
The importance of complex passwords
B.
The importance of complex passwords
Answers
C.
Descriptions of the organization's security infrastructure
C.
Descriptions of the organization's security infrastructure
Answers
D.
Contact information for the organization's security team
D.
Contact information for the organization's security team
Answers
Suggested answer: A

Explanation:

The most important thing to include in security awareness training is how to respond to various types of suspicious activity. Security awareness training is a program that educates employees about the importance of security and how to avoid common threats and risks. One of the main objectives of security awareness training is to enable employees to recognize and report any signs of malicious or unauthorized activity, such as phishing emails, malware infections, data breaches, or social engineering attempts. By teaching employees how to respond to various types of suspicious activity, security awareness training can help to prevent or mitigate the impact of security incidents, protect the organization's assets and reputation, and comply with legal and regulatory requirements.

The other options are not as important as option A. The importance of complex passwords is a useful topic, but not the most important thing to include in security awareness training. Complex passwords are passwords that are hard to guess or crack by using a combination of letters, numbers, symbols, and cases. Complex passwords can help to protect user accounts and data from unauthorized access, but they are not sufficient to prevent all types of security incidents. Moreover, complex passwords may be difficult to remember or manage by users, and may require additional measures such as password managers or multi-factor authentication. Descriptions of the organization's security infrastructure is a technical topic, but not the most important thing to include in security awareness training. Security infrastructure is the set of hardware, software, policies, and procedures that provide the foundation for the organization's security posture and capabilities. Security infrastructure may include firewalls, antivirus software, encryption tools, access control systems, backup systems, etc. Descriptions of the organization's security infrastructure may be relevant for some employees who are involved in security operations or administration, but they may not be necessary or understandable for all employees who need security awareness training. Contact information for the organization's security team is a practical detail, but not the most important thing to include in security awareness training. Security team is the group of people who are responsible for planning, implementing, monitoring, and improving the organization's security strategy and activities. Contact information for the organization's security team may be useful for employees who need to report or escalate a security issue or request a security service or support. However, contact information for the organization's security team is not enough to ensure that employees know how to respond to various types of suspicious activity.Reference:Security Awareness Training | SANS Security Awareness,Security Awareness Training | KnowBe4,Security Awareness Training Course (ISC) | Coursera

A core system fails a week after a scheduled update, causing an outage that impacts service. Which of the following is MOST important for incident management to focus on when addressing the issue?

A.
Analyzing the root cause of the outage to ensure the incident will not reoccur
A.
Analyzing the root cause of the outage to ensure the incident will not reoccur
Answers
B.
Restoring the system to operational state as quickly as possible
B.
Restoring the system to operational state as quickly as possible
Answers
C.
Ensuring all resolution steps are fully documented prior to returning the system to service
C.
Ensuring all resolution steps are fully documented prior to returning the system to service
Answers
D.
Rolling back the unsuccessful change to the previous state
D.
Rolling back the unsuccessful change to the previous state
Answers
Suggested answer: B

Explanation:

The most important thing for incident management to focus on when addressing an issue that causes an outage is restoring the system to operational state as quickly as possible. Incident management is the process of detecting, investigating, and resolving incidents that disrupt or degrade a service or system. An incident is an unplanned event that affects the normal functioning or quality of a service or system. An outage is a type of incident that causes a complete loss of service or system availability. The main goal of incident management is to restore the service or system to its operational state as quickly as possible, minimizing the impact on users and business operations.

*The other options are not as important as option B. Analyzing the root cause of the outage to ensure the incident will not re-occur is a valuable activity, but not the most important thing for incident management to focus on when addressing an issue that causes an outage. Root cause analysis is a process of identifying and eliminating the underlying factors that caused an incident or problem. Root cause analysis can help to prevent or reduce the likelihood of similar incidents or problems in the future. However, root cause analysis is usually performed after the incident has been resolved and the service or system has been restored. Ensuring all resolution steps are fully documented prior to returning the system to service is a good practice, but not the most important thing for incident management to focus on when addressing an issue that causes an outage. Documentation is a process of recording and maintaining information about an incident and its resolution steps. Documentation can help to improve communication, accountability, learning, and improvement within incident management. However, documentation should not delay or interfere with the restoration of the service or system. Rolling back the unsuccessful change to the previous state is a possible solution, but not the most important thing for incident management to focus on when addressing an issue that causes an outage. Rolling back is a process of reverting a change that has been applied to a service or system that caused an incident or problem. Rolling back can help to restore the service or system to its previous state before the change was made.

Which of the following is MOST helpful for an IS auditor to review when evaluating an organizations business process that are supported by applications and IT systems?

A.
Configuration management database (CMDB)
A.
Configuration management database (CMDB)
Answers
B.
Enterprise architecture (EA)
B.
Enterprise architecture (EA)
Answers
C.
IT portfolio management
C.
IT portfolio management
Answers
D.
IT service management
D.
IT service management
Answers
Suggested answer: B

Explanation:

The most helpful thing for an IS auditor to review when evaluating an organization's business processes that are supported by applications and IT systems is the enterprise architecture (EA). EA is the practice of designing a business with a holistic view, considering all of its parts and how they interact. EA defines the overall goals, the strategies that support those goals, and the tactics that are needed to execute those strategies. EA also outlines the ways various components of IT projects interact with one another and with the business processes. By reviewing the EA, an IS auditor can gain a comprehensive understanding of how the organization aligns its IT efforts with its overall mission, business strategy, and priorities. An IS auditor can also assess the effectiveness, efficiency, agility, and continuity of complex business operations.

The other options are not as helpful as option B. A configuration management database (CMDB) is a database that stores and manages information about the components that make up an IT system. A CMDB tracks individual configuration items (CIs), such as hardware, software, or data assets, and their attributes, dependencies, and changes over time. A CMDB can help an IS auditor to monitor the performance, availability, and configuration of IT assets, but it does not provide a holistic view of how they support the business processes. IT portfolio management is the practice of managing IT investments, projects, and activities as a portfolio. IT portfolio management aims to optimize the value, risk, and cost of IT initiatives and align them with the business objectives. IT portfolio management can help an IS auditor to evaluate the return on IT investments and the alignment of IT projects with the business strategy, but it does not provide a detailed view of how they support the business processes. IT service management (ITSM) is the practice of planning, implementing, managing, and optimizing IT services to meet the needs of end users and customers. ITSM focuses on delivering IT as a service using standardized processes and best practices. ITSM can help an IS auditor to review the quality, efficiency, and effectiveness of IT service delivery and support, but it does not provide a comprehensive view of how they support the business processes.Reference:What is enterprise architecture (EA)? - RingCentral,What is a configuration management database (CMDB)? - Red Hat,IT Portfolio Management Strategies | Smartsheet,What is IT service management (ITSM)? | IBM

Which of the following would be of GREATEST concern to an IS auditor reviewing an IT strategy document?

A.
Target architecture is defined at a technical level.
A.
Target architecture is defined at a technical level.
Answers
B.
The previous year's IT strategic goals were not achieved.
B.
The previous year's IT strategic goals were not achieved.
Answers
C.
Strategic IT goals are derived solely from the latest market trends.
C.
Strategic IT goals are derived solely from the latest market trends.
Answers
D.
Financial estimates of new initiatives are disclosed within the document.
D.
Financial estimates of new initiatives are disclosed within the document.
Answers
Suggested answer: C

Explanation:

The most concerning thing for an IS auditor reviewing an IT strategy document is that the strategic IT goals are derived solely from the latest market trends. An IT strategy document is a blueprint that defines how an organization will use technology to achieve its goals. It should be based on a thorough analysis of the organization's internal and external factors, such as its vision, mission, values, objectives, strengths, weaknesses, opportunities, threats, customers, competitors, regulations, and industry standards. An IT strategy document should also align with the organization's business strategy and reflect its unique needs and capabilities. If an IT strategy document is derived solely from the latest market trends, it may not be relevant or appropriate for the organization's specific situation. It may also lack coherence, consistency, feasibility, or sustainability.

The other options are not as concerning as option C. Target architecture is defined at a technical level is not a concern for an IS auditor reviewing an IT strategy document. Target architecture is the desired state of an organization's IT systems in terms of their structure, functionality, performance, security, interoperability, and integration. Defining target architecture at a technical level can help an IS auditor to understand how the organization plans to achieve its strategic IT goals and what technical requirements and standards it needs to follow. The previous year's IT strategic goals were not achieved is not a concern for an IS auditor reviewing an IT strategy document. The previous year's IT strategic goals are the outcomes that the organization intended to accomplish with its IT initiatives in the past year. Not achieving these goals may indicate some challenges or gaps in the organization's IT performance or execution. However, this does not necessarily affect the quality or validity of the current IT strategy document. An IS auditor should focus on evaluating whether the current IT strategy document is realistic, measurable, achievable, relevant, and time-bound. Financial estimates of new initiatives are disclosed within the document is not a concern for an IS auditor reviewing an IT strategy document. Financial estimates are projections of the costs and benefits of new initiatives that are part of the IT strategy document. Disclosing financial estimates within the document can help an IS auditor to assess whether the new initiatives are aligned with the organization's budget and resources and whether they provide value for money.Reference:IT Strategy Template for a Successful Strategic Plan | Gartner,Definitive Guide to Developing an IT Strategy and Roadmap - CioPages,An Example of a Well-Developed IT Strategy Plan - Resolute

An organization has shifted from a bottom-up approach to a top-down approach in the development of IT policies. This should result in:

A.
greater consistency across the organization.
A.
greater consistency across the organization.
Answers
B.
a synthesis of existing operational policies.
B.
a synthesis of existing operational policies.
Answers
C.
a more comprehensive risk assessment plan.
C.
a more comprehensive risk assessment plan.
Answers
D.
greater adherence to best practices.
D.
greater adherence to best practices.
Answers
Suggested answer: A

Explanation:

A top-down approach in the development of IT policies means that the policies are derived from the strategic objectives and goals of the organization, and are aligned with the business needs and expectations. This should result in greater consistency across the organization, as the policies will be coherent, integrated and applicable to all levels and functions of the organization. A bottom-up approach, on the other hand, means that the policies are developed by individual units or departments based on their operational needs and preferences, which may lead to inconsistency, duplication or conflict among different policies.Reference:ISACA Frameworks: Blueprints for Success,IT Governance and Process Maturity

An organization considering the outsourcing of a business application should FIRST:

A.
define service level requirements.
A.
define service level requirements.
Answers
B.
perform a vulnerability assessment.
B.
perform a vulnerability assessment.
Answers
C.
conduct a cost-benefit analysis.
C.
conduct a cost-benefit analysis.
Answers
D.
issue a request for proposal (RFP).
D.
issue a request for proposal (RFP).
Answers
Suggested answer: C

Explanation:

An organization considering the outsourcing of a business application should first conduct a cost-benefit analysis to evaluate the feasibility, viability and desirability of the outsourcing decision. A cost-benefit analysis should compare the costs and benefits of outsourcing versus keeping the application in-house, taking into account factors such as financial, operational, strategic, legal, regulatory, security and quality aspects. A cost-benefit analysis should also identify the risks and opportunities associated with outsourcing, and provide a basis for defining the service level requirements, performing a vulnerability assessment, and issuing a request for proposal (RFP) in the subsequent stages of the outsourcing process.Reference:Info Technology & Systems Resources | COBIT, Risk, Governance ... - ISACA,CISA Certification | Certified Information Systems Auditor | ISACA

Which of the following is an example of a preventive control for physical access?

A.
Keeping log entries for all visitors to the building
A.
Keeping log entries for all visitors to the building
Answers
B.
Implementing a fingerprint-based access control system for the building
B.
Implementing a fingerprint-based access control system for the building
Answers
C.
Installing closed-circuit television (CCTV) cameras for all ingress and egress points
C.
Installing closed-circuit television (CCTV) cameras for all ingress and egress points
Answers
D.
Implementing a centralized logging server to record instances of staff logging into workstations
D.
Implementing a centralized logging server to record instances of staff logging into workstations
Answers
Suggested answer: B

Explanation:

A preventive control is a control that aims to deter or prevent undesirable events from occurring. A fingerprint-based access control system for the building is an example of a preventive control for physical access, as it restricts unauthorized persons from entering the premises. Keeping log entries for all visitors to the building, installing CCTV cameras for all ingress and egress points, and implementing a centralized logging server to record instances of staff logging into workstations are examples of detective controls, which are controls that aim to discover or detect undesirable events that have already occurred.

The BEST way to evaluate the effectiveness of a newly developed application is to:

A.
perform a post-implementation review-
A.
perform a post-implementation review-
Answers
B.
analyze load testing results.
B.
analyze load testing results.
Answers
C.
perform a secure code review.
C.
perform a secure code review.
Answers
D.
review acceptance testing results.
D.
review acceptance testing results.
Answers
Suggested answer: D

Explanation:

The best way to evaluate the effectiveness of a newly developed application is to review acceptance testing results. Acceptance testing is a process of verifying that the application meets the specified requirements and expectations of the users and stakeholders. Acceptance testing results can provide evidence of the functionality, usability, reliability, performance, security and quality of the application. Performing a post-implementation review, analyzing load testing results, and performing a secure code review are also important activities for evaluating an application, but they are not as comprehensive or conclusive as acceptance testing results.

Which of the following is the PRIMARY objective of implementing privacy-related controls within an organization?

A.
To prevent confidential data loss
A.
To prevent confidential data loss
Answers
B.
To comply with legal and regulatory requirements
B.
To comply with legal and regulatory requirements
Answers
C.
To identify data at rest and data in transit for encryption
C.
To identify data at rest and data in transit for encryption
Answers
D.
To provide options to individuals regarding use of their data
D.
To provide options to individuals regarding use of their data
Answers
Suggested answer: B

Explanation:

The primary objective of implementing privacy-related controls within an organization is to comply with legal and regulatory requirements that protect the rights and interests of individuals whose personal data are collected, processed, stored, shared or disposed by the organization. Privacy-related controls are based on principles such as lawfulness, fairness, transparency, purpose limitation, data minimization, accuracy, storage limitation, integrity, confidentiality and accountability. These principles aim to ensure that personal data are processed in a manner that respects the privacy of individuals and complies with the applicable laws and regulations in different jurisdictions. Preventing confidential data loss, identifying data at rest and data in transit for encryption, and providing options to individuals regarding use of their data are examples of specific privacy-related controls that support the primary objective of compliance.Reference:Privacy Regulatory Lookup Tool,CDPSE Official Review Manual, 2nd Edition

Total 1.198 questions
Go to page: of 120