ExamGecko
Home Home / Isaca / CISA

Isaca CISA Practice Test - Questions Answers, Page 73

Question list
Search
Search

List of questions

Search

Related questions











Which of the following is the MOST important consideration when developing tabletop exercises within a cybersecurity incident response plan?

A.
Ensure participants are selected from all cross-functional units in the organization.
A.
Ensure participants are selected from all cross-functional units in the organization.
Answers
B.
Create exercises that are challenging enough to prove inadequacies in the current incident response plan.
B.
Create exercises that are challenging enough to prove inadequacies in the current incident response plan.
Answers
C.
Ensure the incident response team will have enough distractions to simulate real-life situations.
C.
Ensure the incident response team will have enough distractions to simulate real-life situations.
Answers
D.
Identify the scope and scenarios that are relevant to current threats faced by the organization.
D.
Identify the scope and scenarios that are relevant to current threats faced by the organization.
Answers
Suggested answer: D

Explanation:

The most important consideration when developing tabletop exercises within a cybersecurity incident response plan is to identify the scope and scenarios that are relevant to current threats faced by the organization, as this will ensure that the exercises are realistic, meaningful, and effective in testing and improving the incident response capabilities12.The scope and scenarios should reflect the organization's risk profile, business objectives, and operational environment, and should cover a variety of potential incidents that could impact the organization's assets, operations, and reputation34.

Reference

1: Cybersecurity Incident Response Exercise Guidance - ISACA2: Cybersecurity Tabletop Exercises: Everything You Ever Wanted to Know3: CISA Tabletop Exercise Package4: Boost Your Incident Response Plan with Tabletop Exercises

In an annual audit cycle, the audit of an organization's IT department resulted in many findings. Which of the following would be the MOST important consideration when planning the next audit?

A.
Postponing the review until all of the findings have been rectified
A.
Postponing the review until all of the findings have been rectified
Answers
B.
Limiting the review to the deficient areas
B.
Limiting the review to the deficient areas
Answers
C.
Verifying that all recommendations have been implemented
C.
Verifying that all recommendations have been implemented
Answers
D.
Following up on the status of all recommendations
D.
Following up on the status of all recommendations
Answers
Suggested answer: D

Explanation:

The most important consideration when planning the next audit after many findings is to follow up on the status of all recommendations, as this will ensure that the audit findings are addressed in a timely and effective manner, and that the root causes of the issues are resolved12.Following up on the status of all recommendations will also help to assess the progress and performance of the IT department, and to identify any new or emerging risks or challenges34.

Reference

1: What to consider when resolving internal audit findings32: A brief guide to follow up43: Guidance on auditing planning for Internal Audit24: Corrective Action Plan (CAP): How to Manage Audit Findings1

An IS auditor would MOST likely recommend that IT management use a balanced scorecard to:

A.
indicate whether the organization meets quality standards.
A.
indicate whether the organization meets quality standards.
Answers
B.
ensure that IT staff meet performance requirements.
B.
ensure that IT staff meet performance requirements.
Answers
C.
train and educate IT staff.
C.
train and educate IT staff.
Answers
D.
assess IT functions and processes.
D.
assess IT functions and processes.
Answers
Suggested answer: D

Explanation:

A balanced scorecard is a strategic planning framework that companies use to assign priority to their products, projects, and services; communicate about their targets or goals; and plan their routine activities1. The scorecard enables companies to monitor and measure the success of their strategies to determine how well they have performed.A balanced scorecard for IT management can help assess IT functions and processes by defining four perspectives: financial, customer, internal business process, and learning and growth2.These perspectives can help IT management align their IT objectives with the organization's vision and mission, identify and prioritize the key performance indicators (KPIs) for IT, and evaluate the effectiveness and efficiency of IT operations and services3.

Reference

1: Balanced Scorecard - Overview, Four Perspectives2: The IT Balanced Scorecard (BSC) Explained - BMC Software3: A BALANCED SCORECARD (BSC) FOR IT PERFORMANCE MANAGEMENT - SAS Support

A sample for testing must include the 80 largest client balances and a random sample of the rest. What should the IS auditor recommend?

A.
Query the database.
A.
Query the database.
Answers
B.
Develop an integrated test facility (ITF).
B.
Develop an integrated test facility (ITF).
Answers
C.
Use generalized audit software.
C.
Use generalized audit software.
Answers
D.
Leverage a random number generator.
D.
Leverage a random number generator.
Answers
Suggested answer: C

Explanation:

Generalized audit software is a type of computer-assisted audit technique (CAAT) that allows the IS auditor to perform various audit tasks on the data stored in different file formats and databases1.Generalized audit software can help the IS auditor to select a sample for testing that includes the 80 largest client balances and a random sample of the rest, by using functions such as sorting, filtering, stratifying, and randomizing the data23.Generalized audit software can also help the IS auditor to perform other audit procedures on the sample, such as verifying the accuracy, completeness, and validity of the data4.

Reference

1: Generalized Audit Software (GAS) - ISACA2: Audit Sampling - ISACA3: How to use generalized audit software to perform audit sampling4: Generalized Audit Software: A Review of Five Packages

Which of the following is the MOST appropriate testing approach when auditing a daily data flow between two systems via an automated interface to confirm that it is complete and accurate?

A.
Confirm that the encryption standard applied to the interface is in line with best practice.
A.
Confirm that the encryption standard applied to the interface is in line with best practice.
Answers
B.
Inspect interface configurations and an example output of the systems.
B.
Inspect interface configurations and an example output of the systems.
Answers
C.
Perform data reconciliation between the two systems for a sample of 25 days.
C.
Perform data reconciliation between the two systems for a sample of 25 days.
Answers
D.
Conduct code review for both systems and inspect design documentation.
D.
Conduct code review for both systems and inspect design documentation.
Answers
Suggested answer: C

Explanation:

The most appropriate testing approach when auditing a daily data flow between two systems via an automated interface is to perform data reconciliation between the two systems for a sample of 25 days.Data reconciliation is a process of verifying that the data transferred from one system to another is complete and accurate, and that there are no discrepancies or errors in the data flow1.Data reconciliation can be performed by using generalized audit software, which is a type of computer-assisted audit technique (CAAT) that allows the IS auditor to perform various audit tasks on the data stored in different file formats and databases2. By performing data reconciliation for a sample of 25 days, the IS auditor can test the reliability and consistency of the data flow over a reasonable period of time, and identify any potential issues or anomalies that could affect the quality of the data or the functionality of the systems.

Reference

1: Data Flow Testing - GeeksforGeeks2: Generalized Audit Software (GAS) - ISACA

In reviewing the IT strategic plan, the IS auditor should consider whether it identifies the:

A.
allocation of IT staff.
A.
allocation of IT staff.
Answers
B.
project management methodologies used.
B.
project management methodologies used.
Answers
C.
major IT initiatives.
C.
major IT initiatives.
Answers
D.
links to operational tactical plans.
D.
links to operational tactical plans.
Answers
Suggested answer: C

Explanation:

In reviewing the IT strategic plan, the IS auditor should consider whether it identifies the major IT initiatives that are aligned with the organization's vision, mission, and objectives, and that support the business strategy and priorities12.The major IT initiatives should also be realistic, measurable, and achievable, and should have clear timelines, budgets, and responsibilities34.

Reference

1: IT Strategy Template for a Successful Strategic Plan | Gartner22: IT Strategy Template for a Successful Strategic Plan | Gartner43: Conduct a Strategic Plan Review & Assessment - Governance34: Time To Conduct A Strategy Review?Here's How To Get Started1

An IS auditor has been asked to review an event log aggregation system to ensure risk management practices have been applied. Which of the following should be of MOST concern to the auditor?

A.
Log feeds are uploaded via batch process.
A.
Log feeds are uploaded via batch process.
Answers
B.
Completeness testing has not been performed on the log data.
B.
Completeness testing has not been performed on the log data.
Answers
C.
The log data is not normalized.
C.
The log data is not normalized.
Answers
D.
Data encryption standards have not been considered.
D.
Data encryption standards have not been considered.
Answers
Suggested answer: B

Explanation:

The IS auditor should be most concerned if completeness testing has not been performed on the log data, as this could indicate that some logs are missing, corrupted, or tampered with, and that the log aggregation system is not reliable or accurate12.Completeness testing is a process of verifying that all the logs generated by the source systems are successfully collected, transferred, and stored by the log aggregation system, and that there are no gaps or inconsistencies in the log data34. Completeness testing is essential for ensuring the integrity and validity of the log data, and for supporting the risk management practices of the organization.

Reference

1: Log Aggregation: How it Works, Methods, and Tools - Exabeam22: Log Aggregation & Monitoring Relation in Cybersecurity43: Log Aggregation: What It Is & How It Works | Datadog34: Data Flow Testing - GeeksforGeeks1

An IS auditor found that operations personnel failed to run a script contributing to year-end financial statements. Which of the following is the BEST recommendation?

A.
Retrain operations personnel.
A.
Retrain operations personnel.
Answers
B.
Implement a closing checklist.
B.
Implement a closing checklist.
Answers
C.
Update the operations manual.
C.
Update the operations manual.
Answers
D.
Bring staff with financial experience into operations.
D.
Bring staff with financial experience into operations.
Answers
Suggested answer: B

Explanation:

The best recommendation for the IS auditor to make is to implement a closing checklist, as this will help to ensure that all the required tasks and scripts are performed and verified during the year-end closing process12.A closing checklist can also help to prevent errors, omissions, and delays that could affect the accuracy and timeliness of the financial statements3.

Reference

1: Year-end closing procedures for GL - Dynamics GP | Microsoft Learn12: Year-end activities FAQ - Finance | Dynamics 365 | Microsoft Learn23: Year-End Closing Checklist: 10 Steps to Close Your Books3: Year End Closing Checklist: 7 Steps to Make it Easy

Which of the following is the GREATEST risk associated with security patches being automatically downloaded and applied to production servers?

A.
Supporting documentation is not updated.
A.
Supporting documentation is not updated.
Answers
B.
Anti-malware is disabled during patch installation.
B.
Anti-malware is disabled during patch installation.
Answers
C.
Patches may be installed regardless of their criticality.
C.
Patches may be installed regardless of their criticality.
Answers
D.
Patches may result in major service failures.
D.
Patches may result in major service failures.
Answers
Suggested answer: D

Explanation:

The greatest risk associated with security patches being automatically downloaded and applied to production servers is that patches may result in major service failures, as they may introduce new bugs, conflicts, or incompatibilities that could affect the functionality, performance, or availability of the servers12.Automatic patching may also bypass the testing and validation processes that are necessary to ensure the quality and reliability of the patches34.

Reference

1: Do you leave Windows Automatic Updates enabled on your production IIS server?- Server Fault12: Azure now installs security updates on Windows VMs automatically33: Server Patch Management | Process of Server Patching - ManageEngine24: Windows Security Updates | Microsoft Patch Updates Guide - ManageEngine4

Effective separation of duties in an online environment can BEST be achieved by utilizing:

A.
appropriate supervision.
A.
appropriate supervision.
Answers
B.
transaction logging.
B.
transaction logging.
Answers
C.
written procedure manuals.
C.
written procedure manuals.
Answers
D.
access authorization tables.
D.
access authorization tables.
Answers
Suggested answer: D

Explanation:

Access authorization tables are the best way to achieve effective separation of duties in an online environment, as they allow the definition and enforcement of different access rights and privileges for different users or roles, based on the principle of least privilege12.Access authorization tables can help to prevent unauthorized or inappropriate actions, such as fraud, errors, or misuse of the system, by ensuring that no user has enough privileges to perform all parts of a transaction or business process34.

Reference

1: Separation of Duty (SOD) - Glossary | CSRC32: Separation of Duties within Information Systems43: Separation of Duties: Implementation & Challenges in IT24: Implementing Segregation of Duties: A Practical Experience Based on Best Practices - ISACA1

Total 1.198 questions
Go to page: of 120