ExamGecko
Home Home / Isaca / CISA

Isaca CISA Practice Test - Questions Answers, Page 80

Question list
Search
Search

List of questions

Search

Related questions











Which of the following is an effective way to ensure the integrity of file transfers in a peer-to-peer (P2P) computing environment?

A.
Associate a message authentication code with each file transferred.
A.
Associate a message authentication code with each file transferred.
Answers
B.
Ensure the files are transferred through an intrusion detection system (IDS).
B.
Ensure the files are transferred through an intrusion detection system (IDS).
Answers
C.
Encrypt the packets shared between peers within the environment.
C.
Encrypt the packets shared between peers within the environment.
Answers
D.
Connect the client computers in the environment to a jump server.
D.
Connect the client computers in the environment to a jump server.
Answers
Suggested answer: A

Which of the following criteria is MOST important for the successful delivery of benefits from an IT project?

A.
Assessing the impact of changes to individuals and business units within the organization
A.
Assessing the impact of changes to individuals and business units within the organization
Answers
B.
Involving key stakeholders during the development and execution phases of the project
B.
Involving key stakeholders during the development and execution phases of the project
Answers
C.
Ensuring that IT project managers have sign-off authority on the business case
C.
Ensuring that IT project managers have sign-off authority on the business case
Answers
D.
Quantifying the size of the software development effort required by the project
D.
Quantifying the size of the software development effort required by the project
Answers
Suggested answer: B

Which of the following tasks would cause the GREATEST segregation of duties (SoD) concern if performed by the person who reconciles the organization's device inventory?

A.
Tracking devices used for spare parts
A.
Tracking devices used for spare parts
Answers
B.
Creating the device policy
B.
Creating the device policy
Answers
C.
vIssuing devices to employees
C.
vIssuing devices to employees
Answers
D.
Approving the issuing of devices
D.
Approving the issuing of devices
Answers
Suggested answer: C

An organization allows programmers to change production systems in emergency situations without seeking prior approval. Which of the following controls should an IS auditor consider MOST

important?

A.
Programmers' subsequent reports
A.
Programmers' subsequent reports
Answers
B.
Limited number of super users
B.
Limited number of super users
Answers
C.
Operator logs
C.
Operator logs
Answers
D.
Automated log of changes
D.
Automated log of changes
Answers
Suggested answer: D

An IS auditor is reviewing documentation from a change that was applied to an application. Which of the following findings would be the GREATEST concern?

A.
Testing documentation does not show manager approval.
A.
Testing documentation does not show manager approval.
Answers
B.
Testing documentation is dated three weeks before the system implementation date.
B.
Testing documentation is dated three weeks before the system implementation date.
Answers
C.
Testing documentation is approved prior to completion of user acceptance testing (UAT).
C.
Testing documentation is approved prior to completion of user acceptance testing (UAT).
Answers
D.
Testing documentation is kept in hard copy format.
D.
Testing documentation is kept in hard copy format.
Answers
Suggested answer: C

A new system development project is running late against a critical implementation deadline. Which of the following is the MOST important activity?

A.
Ensure that code has been reviewed.
A.
Ensure that code has been reviewed.
Answers
B.
Perform user acceptance testing (UAT).
B.
Perform user acceptance testing (UAT).
Answers
C.
Document last-minute enhancements.
C.
Document last-minute enhancements.
Answers
D.
Perform a pre-implementation audit.
D.
Perform a pre-implementation audit.
Answers
Suggested answer: B

Which of the following BEST addresses the availability of an online store?

A.
RAID level 5 storage devices
A.
RAID level 5 storage devices
Answers
B.
A mirrored site at another location
B.
A mirrored site at another location
Answers
C.
Online backups
C.
Online backups
Answers
D.
Clustered architecture
D.
Clustered architecture
Answers
Suggested answer: D

In order for a firewall to effectively protect a network against external attacks, what fundamental practice must be followed?

A.
The firewall must be placed in the demilitarized zone (DMZ).
A.
The firewall must be placed in the demilitarized zone (DMZ).
Answers
B.
Only essential external services should be permitted.
B.
Only essential external services should be permitted.
Answers
C.
Filters for external information must be defined.
C.
Filters for external information must be defined.
Answers
D.
All external communication must be via the firewall.
D.
All external communication must be via the firewall.
Answers
Suggested answer: B

What is the MOST effective way to manage contractors' access to a data center?

A.
Badge identification worn by visitors
A.
Badge identification worn by visitors
Answers
B.
Escort requirement for visitor access
B.
Escort requirement for visitor access
Answers
C.
Management approval of visitor access
C.
Management approval of visitor access
Answers
D.
Verification of visitor identification
D.
Verification of visitor identification
Answers
Suggested answer: B

Which of the following is the BEST way to strengthen the security of smart devices to prevent data leakage?

A.
Enforce strong security settings on smart devices.
A.
Enforce strong security settings on smart devices.
Answers
B.
Require employees to formally acknowledge security procedures.
B.
Require employees to formally acknowledge security procedures.
Answers
C.
Review access logs to the organization's sensitive data in a timely manner.
C.
Review access logs to the organization's sensitive data in a timely manner.
Answers
D.
Include usage restrictions in bring your own device (BYOD) security procedures.
D.
Include usage restrictions in bring your own device (BYOD) security procedures.
Answers
Suggested answer: A
Total 1.198 questions
Go to page: of 120