ExamGecko
Home Home / Isaca / CISA

Isaca CISA Practice Test - Questions Answers, Page 76

Question list
Search
Search

List of questions

Search

Related questions











Which of the following BEST describes the role of the IS auditor in a control self-assessment (CSA)?

A.
Implementer
A.
Implementer
Answers
B.
Facilitator
B.
Facilitator
Answers
C.
Approver
C.
Approver
Answers
D.
Reviewer
D.
Reviewer
Answers
Suggested answer: B

An IS auditor is reviewing an organization that performs backups on local database servers every two weeks and does not have a formal policy to govern data backup and restoration procedures. Which of the following findings presents the GREATEST risk to the organization?

A.
Lack of offsite data backups
A.
Lack of offsite data backups
Answers
B.
Absence of a data backup policy
B.
Absence of a data backup policy
Answers
C.
Lack of periodic data restoration testing
C.
Lack of periodic data restoration testing
Answers
D.
Insufficient data backup frequency
D.
Insufficient data backup frequency
Answers
Suggested answer: D

An organization's information security policies should be developed PRIMARILY on the basis of:

A.
enterprise architecture (EA).
A.
enterprise architecture (EA).
Answers
B.
industry best practices.
B.
industry best practices.
Answers
C.
a risk management process.
C.
a risk management process.
Answers
D.
past information security incidents.
D.
past information security incidents.
Answers
Suggested answer: C

Which of the following BEST enables an IS auditor to confirm the batch processing to post transactions from an input source is successful?

A.
Error log review
A.
Error log review
Answers
B.
Total number of items
B.
Total number of items
Answers
C.
Hash totals
C.
Hash totals
Answers
D.
Aggregate monetary amount
D.
Aggregate monetary amount
Answers
Suggested answer: C

An organization's strategy to source certain IT functions from a Software as a Service (SaaS) provider should be approved by the:

A.
chief financial officer (CFO).
A.
chief financial officer (CFO).
Answers
B.
chief risk officer (CRO).
B.
chief risk officer (CRO).
Answers
C.
IT steering committee.
C.
IT steering committee.
Answers
D.
IT operations manager.
D.
IT operations manager.
Answers
Suggested answer: C

Which of the following should be the GREATEST concern for an IS auditor performing a post-implementation review for a major system upgrade?

A.
Changes are promoted to production by the development group.
A.
Changes are promoted to production by the development group.
Answers
B.
Object code can be accessed by the development group.
B.
Object code can be accessed by the development group.
Answers
C.
Developers have access to the testing environment.
C.
Developers have access to the testing environment.
Answers
D.
Change approvals are not formally documented.
D.
Change approvals are not formally documented.
Answers
Suggested answer: D

An organization requires the use of a key card to enter its data center. Recently, a control was implemented that requires biometric authentication for each employee.

Which type of control has been added?

A.
Corrective
A.
Corrective
Answers
B.
Compensating
B.
Compensating
Answers
C.
Preventive
C.
Preventive
Answers
D.
Detective
D.
Detective
Answers
Suggested answer: C

A steering committee established to oversee an organization's digital transformation program is MOSTlikely to be involved with which of the following activities?

A.
Preparing project status reports
A.
Preparing project status reports
Answers
B.
Designing interface controls
B.
Designing interface controls
Answers
C.
Reviewing escalated project issues
C.
Reviewing escalated project issues
Answers
D.
Documenting requirements
D.
Documenting requirements
Answers
Suggested answer: C

Which of the following practices associated with capacity planning provides the GREATEST assurance that future incidents related to existing server performance will be prevented?

A.
Reviewing results from simulated high-demand stress test scenarios
A.
Reviewing results from simulated high-demand stress test scenarios
Answers
B.
Performing a root cause analysis for past performance incidents
B.
Performing a root cause analysis for past performance incidents
Answers
C.
Anticipating current service level agreements (SLAs) will remain unchanged
C.
Anticipating current service level agreements (SLAs) will remain unchanged
Answers
D.
Duplicating existing disk drive systems to improve redundancy and data storage
D.
Duplicating existing disk drive systems to improve redundancy and data storage
Answers
Suggested answer: A

Who is PRIMARILY responsible for the design of IT controls to meet control objectives?

A.
Risk management
A.
Risk management
Answers
B.
Business management
B.
Business management
Answers
C.
IT manager
C.
IT manager
Answers
D.
Internal auditor
D.
Internal auditor
Answers
Suggested answer: C
Total 1.198 questions
Go to page: of 120