ExamGecko
Home Home / Isaca / CISA

Isaca CISA Practice Test - Questions Answers, Page 79

Question list
Search
Search

List of questions

Search

Related questions











When building or upgrading enterprise cryptographic infrastructure, which of the following is the MOST critical requirement for growing business environments?

A.
Service discovery
A.
Service discovery
Answers
B.
Backup and restoration capabilities
B.
Backup and restoration capabilities
Answers
C.
Network throttling
C.
Network throttling
Answers
D.
Scalable architectures and systems
D.
Scalable architectures and systems
Answers
Suggested answer: D

Which of the following is the PRIMARY reason an IS auditor would recommend offsite backups although critical data is already on a redundant array of inexpensive disks (RAID)?

A.
The array cannot offer protection against disk corruption.
A.
The array cannot offer protection against disk corruption.
Answers
B.
The array cannot recover from a natural disaster.
B.
The array cannot recover from a natural disaster.
Answers
C.
The array relies on proper maintenance.
C.
The array relies on proper maintenance.
Answers
D.
Disks of the array cannot be hot-swapped for quick recovery.
D.
Disks of the array cannot be hot-swapped for quick recovery.
Answers
Suggested answer: B

Management has requested a post-implementation review of a newly implemented purchasing package to determine the extent that business requirements are being met. Which of the following is MOST likely to be assessed?

A.
Acceptance testing results
A.
Acceptance testing results
Answers
B.
Results of live processing
B.
Results of live processing
Answers
C.
Implementation methodology
C.
Implementation methodology
Answers
D.
Purchasing guidelines and policies
D.
Purchasing guidelines and policies
Answers
Suggested answer: C

An organization requires the use of a key card to enter its data center. Recently, a control was implemented that requires biometric authentication for each employee. Which type of control has been added?

A.
Detective
A.
Detective
Answers
B.
Preventive
B.
Preventive
Answers
C.
Compensating
C.
Compensating
Answers
D.
Corrective
D.
Corrective
Answers
Suggested answer: B

During which process is regression testing MOST commonly used?

A.
System modification
A.
System modification
Answers
B.
Unit testing
B.
Unit testing
Answers
C.
Stress testing
C.
Stress testing
Answers
D.
Program development
D.
Program development
Answers
Suggested answer: A

A review of IT interface controls finds an organization does not have a process to identify and correct records that do not get transferred to the receiving system. Which of the following is the IS

auditor's BEST recommendation?

A.
Enable automatic encryption, decryption, and electronic signing of data files.
A.
Enable automatic encryption, decryption, and electronic signing of data files.
Answers
B.
Automate the transfer of data between systems as much as is feasible.
B.
Automate the transfer of data between systems as much as is feasible.
Answers
C.
Have coders perform manual reconciliation of data between systems.D
C.
Have coders perform manual reconciliation of data between systems.D
Answers
D.
Implement software to perform automatic reconciliations of data between systems.
D.
Implement software to perform automatic reconciliations of data between systems.
Answers
Suggested answer: D

Which of the following should be of GREATEST concern to an IS auditor assessing the effectiveness of an organization's information security governance?

A.
Risk assessments of information assets are not periodically performed.
A.
Risk assessments of information assets are not periodically performed.
Answers
B.
All Control Panel Items
B.
All Control Panel Items
Answers
C.
The information security policy does not extend to service providers.
C.
The information security policy does not extend to service providers.
Answers
D.
There is no process to measure information security performance.
D.
There is no process to measure information security performance.
Answers
E.
The information security policy is not reviewed by executive management.
E.
The information security policy is not reviewed by executive management.
Answers
Suggested answer: C

Which of the following can BEST reduce the impact of a long-term power failure?

A.
Power conditioning unit
A.
Power conditioning unit
Answers
B.
Emergency power-off switches
B.
Emergency power-off switches
Answers
C.
Battery bank
C.
Battery bank
Answers
D.
Redundant power source
D.
Redundant power source
Answers
Suggested answer: D

Which of the following findings would be of GREATEST concern when auditing an organization's end-user computing (EUC)?

A.
Errors flowed through to financial statements
A.
Errors flowed through to financial statements
Answers
B.
Reduced oversight by the IT department
B.
Reduced oversight by the IT department
Answers
C.
Inconsistency of patching processes being followed
C.
Inconsistency of patching processes being followed
Answers
D.
Inability to monitor EUC audit logs and activities
D.
Inability to monitor EUC audit logs and activities
Answers
Suggested answer: C

Which of the following security measures will reduce the risk of propagation when a cyberattack occurs?

A.
Perimeter firewall
A.
Perimeter firewall
Answers
B.
Data loss prevention (DLP) system
B.
Data loss prevention (DLP) system
Answers
C.
Network segmentation
C.
Network segmentation
Answers
D.
Web application firewall (WAF)
D.
Web application firewall (WAF)
Answers
Suggested answer: C
Total 1.198 questions
Go to page: of 120