ExamGecko
Home Home / Isaca / CISA

Isaca CISA Practice Test - Questions Answers, Page 77

Question list
Search
Search

List of questions

Search

Related questions











Which of the following is MOST likely to be reduced when implementing optimal risk management strategies?

A.
Sampling risk
A.
Sampling risk
Answers
B.
Residual risk
B.
Residual risk
Answers
C.
Detection risk
C.
Detection risk
Answers
D.
Inherent risk
D.
Inherent risk
Answers
Suggested answer: D

Audit frameworks can assist the IS audit function by:

A.
defining the authority and responsibility of the IS audit function.
A.
defining the authority and responsibility of the IS audit function.
Answers
B.
providing direction and information regarding the performance of audits.
B.
providing direction and information regarding the performance of audits.
Answers
C.
outlining the specific steps needed to complete audits.
C.
outlining the specific steps needed to complete audits.
Answers
D.
providing details on how to execute the audit program.
D.
providing details on how to execute the audit program.
Answers
Suggested answer: B

A current project to develop IT-based solutions will need additional funding to meet changes in business requirements. Who is BEST suited to obtain this additional funding?

A.
Project sponsor
A.
Project sponsor
Answers
B.
Project manager
B.
Project manager
Answers
C.
IT strategy committee
C.
IT strategy committee
Answers
D.
Board of directors
D.
Board of directors
Answers
Suggested answer: A

An IS auditor reviewing an information processing environment decides to conduct external penetration testing. Which of the following is MOST appropriate to include in the audit scope for the organization to distinguish between the auditor's penetration attacks and actual attacks?

A.
Restricted host IP addresses of simulated attacks
A.
Restricted host IP addresses of simulated attacks
Answers
B.
Testing techniques of simulated attacks
B.
Testing techniques of simulated attacks
Answers
C.
Source IP addresses of simulated attacks
C.
Source IP addresses of simulated attacks
Answers
D.
Timing of simulated attacks
D.
Timing of simulated attacks
Answers
Suggested answer: C

The PRIMARY role of an IS auditor in the remediation of problems found during an audit engagement is to:

A.
help auditee management by providing the solution.
A.
help auditee management by providing the solution.
Answers
B.
explain the findings and provide general advice.
B.
explain the findings and provide general advice.
Answers
C.
present updated policies to management for approval.
C.
present updated policies to management for approval.
Answers
D.
take ownership of the problems and oversee remediation efforts.
D.
take ownership of the problems and oversee remediation efforts.
Answers
Suggested answer: B

An IS auditor has been asked to review the quality of data in a general ledger system. Which of the following would provide the auditor with the MOST meaningful results?

A.
Discussion of the largest account values with business owners
A.
Discussion of the largest account values with business owners
Answers
B.
Integrity checks against source documentation
B.
Integrity checks against source documentation
Answers
C.
System vulnerability assessment
C.
System vulnerability assessment
Answers
D.
Interviews with system owners and operators
D.
Interviews with system owners and operators
Answers
Suggested answer: B

An organization is establishing a steering committee for the implementation of a new enterprise resource planning (ERP) system that uses Agile project management methodology. What is the MOST important criterion for the makeup of this committee?

A.
Senior management representation
A.
Senior management representation
Answers
B.
Ability to meet the time commitment required
B.
Ability to meet the time commitment required
Answers
C.
Agile project management experience
C.
Agile project management experience
Answers
D.
ERP implementation experience
D.
ERP implementation experience
Answers
Suggested answer: C

Which of the following would be MOST useful to an IS auditor when making recommendations to enable continual improvement of IT processes over time?

A.
Benchmarking studies
A.
Benchmarking studies
Answers
B.
Maturity model
B.
Maturity model
Answers
C.
IT risk register
C.
IT risk register
Answers
D.
IT incident log
D.
IT incident log
Answers
Suggested answer: B

Following a merger, a review of an international organization determines the IT steering committee's decisions do not extend to regional offices as required in the consolidated IT operating model. Which of the following is the IS auditor's BEST recommendation?

A.
Create regional centers of excellence.
A.
Create regional centers of excellence.
Answers
B.
Engage an IT governance consultant.
B.
Engage an IT governance consultant.
Answers
C.
Create regional IT steering committees.
C.
Create regional IT steering committees.
Answers
D.
Update the IT steering committee's formal charter.
D.
Update the IT steering committee's formal charter.
Answers
Suggested answer: D

While conducting a follow-up on an asset management audit, the IS auditor finds paid invoices for IT devices not recorded in the organization's inventory. Which of the following is the auditor's BEST course of action?

A.
Ask the asset management staff where the devices are.
A.
Ask the asset management staff where the devices are.
Answers
B.
Alert both audit and operations management about the discrepancy.
B.
Alert both audit and operations management about the discrepancy.
Answers
C.
Ignore the invoices since they are not part of the follow-up.
C.
Ignore the invoices since they are not part of the follow-up.
Answers
D.
Make a note of the evidence to include it in the scope of a future audit.
D.
Make a note of the evidence to include it in the scope of a future audit.
Answers
Suggested answer: B
Total 1.198 questions
Go to page: of 120