ExamGecko
Home Home / Isaca / CISA

Isaca CISA Practice Test - Questions Answers, Page 72

Question list
Search
Search

List of questions

Search

Related questions











An IS auditor is assessing the adequacy of management's remediation action plan. Which of the following should be the MOST important consideration?

A.
Plan approval by the audit committee
A.
Plan approval by the audit committee
Answers
B.
Impacts on future audit work
B.
Impacts on future audit work
Answers
C.
Criticality of audit findings
C.
Criticality of audit findings
Answers
D.
Potential cost savings
D.
Potential cost savings
Answers
Suggested answer: C

Explanation:

The most important consideration when assessing the adequacy of management's remediation action plan is the criticality of the audit findings, as this reflects the level of risk and impact that the findings pose to the organization's objectives, performance, and value. The IS auditor should evaluate whether the remediation action plan addresses the root causes, mitigates the risks, and resolves the issues of the audit findings in a timely and effective manner. The IS auditor should also consider the feasibility, reasonableness, and measurability of the remediation actions.

Reference

ISACA CISA Review Manual, 27th Edition, page 256

How to Write an Audit Finding - Dallas Chapter of the IIA

How to Write an Audit Report: 14 Steps (with Pictures) - wikiHow

During a physical security audit, an IS auditor was provided a proximity badge that granted access to three specific floors in a corporate office building. Which of the following issues should be of MOST concern?

A.
The proximity badge did not work for the first two days of audit fieldwork.
A.
The proximity badge did not work for the first two days of audit fieldwork.
Answers
B.
There was no requirement for an escort during fieldwork.
B.
There was no requirement for an escort during fieldwork.
Answers
C.
There was no follow-up for unsuccessful attempted access violations.
C.
There was no follow-up for unsuccessful attempted access violations.
Answers
D.
The proximity badge incorrectly granted access to restricted areas.
D.
The proximity badge incorrectly granted access to restricted areas.
Answers
Suggested answer: D

Explanation:

The proximity badge incorrectly granting access to restricted areas is the most concerning issue, as it indicates a failure of the access control system to enforce the principle of least privilege and protect the sensitive or critical assets of the organization. The proximity badge should only grant access to the areas that are necessary for the IS auditor to perform the audit fieldwork, and not to any other areas that may contain confidential information, valuable equipment, or hazardous materials. The incorrect access could result in unauthorized disclosure, modification, or destruction of the assets, as well as potential safety or legal issues.

Reference

ISACA CISA Review Manual, 27th Edition, page 254

Office & Workplace Physical Security Assessment Checklist

Physical Security: Planning, Measures & Examples

Which of the following BEST ensures that effective change management is in place in an IS environment?

A.
User authorization procedures for application access are well established.
A.
User authorization procedures for application access are well established.
Answers
B.
User-prepared detailed test criteria for acceptance testing of the software.
B.
User-prepared detailed test criteria for acceptance testing of the software.
Answers
C.
Adequate testing was carried out by the development team.
C.
Adequate testing was carried out by the development team.
Answers
D.
Access to production source and object programs is well controlled.
D.
Access to production source and object programs is well controlled.
Answers
Suggested answer: D

Explanation:

Access to production source and object programs is the best way to ensure that effective change management is in place in an IS environment, as it prevents unauthorized or accidental changes to the production code that could affect the functionality, performance, or security of the system. Access to production source and object programs should be restricted to authorized personnel only, and any changes should follow a formal change management process that includes documentation, approval, testing, and review.

Reference

ISACA CISA Review Manual, 27th Edition, page 254

Change Management Best Practices for the Engineering and ...

Change Management - an overview | ScienceDirect Topics

An IS auditor discovers from patch logs that some in-scope systems are not compliant with the regular patching schedule. What should the auditor do NEXT?

A.
Interview IT management to clarify the current procedure.
A.
Interview IT management to clarify the current procedure.
Answers
B.
Report this finding to senior management.
B.
Report this finding to senior management.
Answers
C.
Review the organization's patch management policy.
C.
Review the organization's patch management policy.
Answers
D.
Request a plan of action to be established as a follow-up item.
D.
Request a plan of action to be established as a follow-up item.
Answers
Suggested answer: C

Explanation:

The IS auditor should review the organization's patch management policy to determine the expected frequency and scope of patching, as well as the roles and responsibilities of the patch management team.This will help the auditor assess the severity and impact of the non-compliance, and identify the root cause and possible remediation actions12.

Reference

1: How to Create a Patch Management Policy: Complete Guide2: Free Patch Management Policy Template (+Examples)

Which of the following applications has the MOST inherent risk and should be prioritized during audit planning?

A.
A decommissioned legacy application
A.
A decommissioned legacy application
Answers
B.
An onsite application that is unsupported
B.
An onsite application that is unsupported
Answers
C.
An outsourced accounting application
C.
An outsourced accounting application
Answers
D.
An internally developed application
D.
An internally developed application
Answers
Suggested answer: C

Explanation:

An outsourced accounting application has the most inherent risk and should be prioritized during audit planning because it involves external parties, sensitive data, and complex transactions that are susceptible to material misstatement, error, or fraud12.An outsourced accounting application also requires more oversight and monitoring from the internal audit department to ensure compliance with the service level agreement and the organization's policies and standards3.

Reference

1: Inherent Risk: Definition, Examples, and 3 Types of Audit Risks2: 3 Types of Audit Risk - Inherent, Control and Detection - Accountinguide3: IS Audit Basics: The Core of IT Auditing

During an audit of payment services of a branch based in a foreign country, a large global bank's audit team identifies an opportunity to use data analytics techniques to identify abnormal payments. Which of the following is the team's MOST important course of action?

A.
Consult the legal department to understand the procedure for requesting data from a different jurisdiction.
A.
Consult the legal department to understand the procedure for requesting data from a different jurisdiction.
Answers
B.
Conduct a walk through of the analytical strategy with stakeholders of the audited branch to obtain their buy-in.
B.
Conduct a walk through of the analytical strategy with stakeholders of the audited branch to obtain their buy-in.
Answers
C.
Request the data from the branch as the team audit charter covers the country where it is based.
C.
Request the data from the branch as the team audit charter covers the country where it is based.
Answers
D.
Agree on a data extraction and sharing strategy with the IT team of the audited branch.
D.
Agree on a data extraction and sharing strategy with the IT team of the audited branch.
Answers
Suggested answer: A

Explanation:

The audit team's most important course of action is to consult the legal department to understand the procedure for requesting data from a different jurisdiction, as this will ensure that the data analytics techniques are compliant with the applicable laws and regulations of both countries12.Requesting data from a foreign branch may involve legal risks such as data privacy, data sovereignty, and data protection34, and the audit team should seek legal guidance before proceeding with the data extraction and analysis.

Reference

1: Data Analytics and Auditing Standards2: Data Analytics and the Audit Process3: Data Privacy and Data Protection: US Law and Legislation4: Data Sovereignty: What It Is and Why It Matters

Which of the following is the BEST way to foster continuous improvement of IS audit processes and practices?

A.
Invite external auditors and regulators to perform regular assessments of the IS audit function.
A.
Invite external auditors and regulators to perform regular assessments of the IS audit function.
Answers
B.
Implement rigorous managerial review and sign-off of IS audit deliverables.
B.
Implement rigorous managerial review and sign-off of IS audit deliverables.
Answers
C.
Frequently review IS audit policies, procedures, and instruction manuals.
C.
Frequently review IS audit policies, procedures, and instruction manuals.
Answers
D.
Establish and embed quality assurance (QA) within the IS audit function.
D.
Establish and embed quality assurance (QA) within the IS audit function.
Answers
Suggested answer: D

Explanation:

The best way to foster continuous improvement of IS audit processes and practices is to establish and embed quality assurance (QA) within the IS audit function, as this will ensure that the IS audit activities are aligned with the standards, expectations, and objectives of the organization and the stakeholders12.QA involves periodic internal and external assessments, benchmarking, feedback, and root cause analysis to identify and address gaps, issues, and opportunities for improvement34.

Reference

1: The Basics and Principles of Continuous Improvement42: ISO 9001 Auditing Practices Group Guidance on53: INSIGHTS TO QUALITY34: Continuous Auditing: Coordinating Continuous Auditing and Monitoring to Provide Continuous Assurance2

Which of the following BEST indicates that the effectiveness of an organization's security awareness program has improved?

A.
A decrease in the number of information security audit findings
A.
A decrease in the number of information security audit findings
Answers
B.
An increase in the number of staff who complete awareness training
B.
An increase in the number of staff who complete awareness training
Answers
C.
An increase in the number of phishing emails reported by employees
C.
An increase in the number of phishing emails reported by employees
Answers
D.
A decrease in the number of malware outbreaks
D.
A decrease in the number of malware outbreaks
Answers
Suggested answer: C

Explanation:

The effectiveness of an organization's security awareness program can be measured by capturing data on changes in the way people react to threats, such as the ability to recognize and avoid social engineering attacks1.An increase in the number of phishing emails reported by employees indicates that they are more aware of the signs and risks of phishing, and are more likely to take appropriate actions to prevent or mitigate the impact of such attacks23.

Reference

1: The Importance Of Measuring Security Awareness2: Measuring the effectiveness of your security awareness program3: How effective is security awareness training?

The effectiveness of an organization's security awareness program can be measured by capturing data on changes in the way people react to threats, such as the ability to recognize and avoid social engineering attacks1.An increase in the number of phishing emails reported by employees indicates that they are more aware of the signs and risks of phishing, and are more likely to take appropriate actions to prevent or mitigate the impact of such attacks23.

Reference

1: The Importance Of Measuring Security Awareness2: Measuring the effectiveness of your security awareness program3: How effective is security awareness training?

Which of the following should be the GREATEST concern to an IS auditor reviewing the information security framework of an organization?

A.
The information security policy has not been updated in the last two years.
A.
The information security policy has not been updated in the last two years.
Answers
B.
Senior management was not involved in the development of the information security policy.
B.
Senior management was not involved in the development of the information security policy.
Answers
C.
A list of critical information assets was not included in the information security policy.
C.
A list of critical information assets was not included in the information security policy.
Answers
D.
The information security policy is not aligned with regulatory requirements.
D.
The information security policy is not aligned with regulatory requirements.
Answers
Suggested answer: D

Explanation:

The effectiveness of an organization's security awareness program can be measured by capturing data on changes in the way people react to threats, such as the ability to recognize and avoid social engineering attacks1.An increase in the number of phishing emails reported by employees indicates that they are more aware of the signs and risks of phishing, and are more likely to take appropriate actions to prevent or mitigate the impact of such attacks23.

Reference

1: The Importance Of Measuring Security Awareness2: Measuring the effectiveness of your security awareness program3: How effective is security awareness training?

An IS auditor finds that a recently deployed application has a number of developers with inappropriate update access left over from the testing environment. Which of the following would have BEST prevented the update access from being migrated?

A.
Establishing a role-based matrix for provisioning users
A.
Establishing a role-based matrix for provisioning users
Answers
B.
Re-assigning user access rights in the quality assurance (QA) environment
B.
Re-assigning user access rights in the quality assurance (QA) environment
Answers
C.
Holding the application owner accountable for application security
C.
Holding the application owner accountable for application security
Answers
D.
Including a step within the system development life cycle (SDLC) to clean up access prior to go-live
D.
Including a step within the system development life cycle (SDLC) to clean up access prior to go-live
Answers
Suggested answer: D
Total 1.198 questions
Go to page: of 120