ExamGecko
Home Home / Isaca / CISA

Isaca CISA Practice Test - Questions Answers, Page 82

Question list
Search
Search

List of questions

Search

Related questions











The waterfall life cycle model of software development is BEST suited for which of the following situations?

A.
The project will involve the use of new technology.
A.
The project will involve the use of new technology.
Answers
B.
The project intends to apply an object-oriented design approach.
B.
The project intends to apply an object-oriented design approach.
Answers
C.
The project requirements are well understood.
C.
The project requirements are well understood.
Answers
D.
The project is subject to time pressures.
D.
The project is subject to time pressures.
Answers
Suggested answer: C

Which of the following is the GREATEST risk related to the use of virtualized environments?

A.
The host may be a potential single point of failure within the system.
A.
The host may be a potential single point of failure within the system.
Answers
B.
There may be insufficient processing capacity to assign to guests.
B.
There may be insufficient processing capacity to assign to guests.
Answers
C.
There may be increased potential for session hijacking.
C.
There may be increased potential for session hijacking.
Answers
D.
Ability to change operating systems may be limited.
D.
Ability to change operating systems may be limited.
Answers
Suggested answer: A

Which of the following cloud capabilities BEST enables an organization to meet unexpectedly high service demand?

A.
Scalability
A.
Scalability
Answers
B.
High availability
B.
High availability
Answers
C.
Alternate routing
C.
Alternate routing
Answers
D.
Flexibility
D.
Flexibility
Answers
Suggested answer: A

Which of the following is the MAIN risk associated with adding a new system functionality during the development phase without following a project change management process?

A.
The project may go over budget.
A.
The project may go over budget.
Answers
B.
The added functionality has not been documented.
B.
The added functionality has not been documented.
Answers
C.
The project may fail to meet the established deadline.
C.
The project may fail to meet the established deadline.
Answers
D.
The new functionality may not meet requirements.
D.
The new functionality may not meet requirements.
Answers
Suggested answer: D

An IS audit manager is preparing the staffing plan for an audit engagement of a cloud service provider. What should be the manager's PRIMARY concern when being made aware that a new auditor in the department previously worked for this provider?

A.
Independence
A.
Independence
Answers
B.
Professional conduct
B.
Professional conduct
Answers
C.
Subject matter expertise
C.
Subject matter expertise
Answers
D.
Resource availability
D.
Resource availability
Answers
Suggested answer: A

Which of the following is the PRIMARY purpose of a rollback plan for a system change?

A.
To ensure steps exist to remove the change if necessary
A.
To ensure steps exist to remove the change if necessary
Answers
B.
To ensure testing can be re-performed if required
B.
To ensure testing can be re-performed if required
Answers
C.
To ensure a backup exists before implementing a change
C.
To ensure a backup exists before implementing a change
Answers
D.
To ensure the system change is effective
D.
To ensure the system change is effective
Answers
Suggested answer: A

An IS auditor reviewing the system development life cycle (SDLC) finds there is no requirement for business cases. Which of the following should be offGREATEST concern to the organization?

A.
Vendor selection criteria are not sufficiently evaluated.
A.
Vendor selection criteria are not sufficiently evaluated.
Answers
B.
Business resources have not been optimally assigned.
B.
Business resources have not been optimally assigned.
Answers
C.
Business impacts of projects are not adequately analyzed.
C.
Business impacts of projects are not adequately analyzed.
Answers
D.
Project costs exceed established budgets.
D.
Project costs exceed established budgets.
Answers
Suggested answer: B

Which of the following would be MOST useful to an IS auditor when making recommendations to enable continual improvement of IT processes over time?

A.
IT incident log
A.
IT incident log
Answers
B.
Benchmarking studies
B.
Benchmarking studies
Answers
C.
Maturity model
C.
Maturity model
Answers
D.
IT risk register
D.
IT risk register
Answers
Suggested answer: B

What type of control has been implemented when secure code reviews are conducted as part of a deployment program?

A.
Monitoring
A.
Monitoring
Answers
B.
Deterrent
B.
Deterrent
Answers
C.
Detective
C.
Detective
Answers
D.
Corrective
D.
Corrective
Answers
Suggested answer: C

Which of the following will provide the GREATEST assurance to IT management that a quality management system (QMS) is effective?

A.
A high percentage of stakeholders satisfied with the quality of IT
A.
A high percentage of stakeholders satisfied with the quality of IT
Answers
B.
A high percentage of IT processes reviewed by quality assurance (QA)
B.
A high percentage of IT processes reviewed by quality assurance (QA)
Answers
C.
A high percentage of incidents being quickly resolved
C.
A high percentage of incidents being quickly resolved
Answers
D.
A high percentage of IT employees attending quality training
D.
A high percentage of IT employees attending quality training
Answers
Suggested answer: A
Total 1.198 questions
Go to page: of 120