ExamGecko
Home Home / Isaca / CISA

Isaca CISA Practice Test - Questions Answers, Page 87

Question list
Search
Search

List of questions

Search

Related questions











Management receives information indicating a high level of risk associated with potential flooding near the organization's data center within the next few years. As a result, a decision has been made to move data center operations to another facility on higher ground. Which approach has been adopted?

A.
Risk acceptance
A.
Risk acceptance
Answers
B.
Risk transfer
B.
Risk transfer
Answers
C.
Risk reduction
C.
Risk reduction
Answers
D.
Risk avoidance
D.
Risk avoidance
Answers
Suggested answer: D

Which of the following constitutes an effective detective control in a distributed processing environment?

A.
A log of privileged account use is reviewed.
A.
A log of privileged account use is reviewed.
Answers
B.
A disaster recovery plan (DRP)4% in place for the entire system.
B.
A disaster recovery plan (DRP)4% in place for the entire system.
Answers
C.
User IDs are suspended after three incorrect passwords have been entered.
C.
User IDs are suspended after three incorrect passwords have been entered.
Answers
D.
Users are required to request additional access via an electronic mail system.
D.
Users are required to request additional access via an electronic mail system.
Answers
Suggested answer: A

Which of the following is the BEST disposal method for flash drives that previously stored confidential data?

A.
Destruction
A.
Destruction
Answers
B.
Degaussing
B.
Degaussing
Answers
C.
Cryptographic erasure
C.
Cryptographic erasure
Answers
D.
Overwriting
D.
Overwriting
Answers
Suggested answer: A

During a follow-up engagement, an IS auditor confirms evidence of a problem that was not an issue in the original audit. Which of the following is the auditor's BEST course of action?

A.
Include the evidence as part of a future audit.
A.
Include the evidence as part of a future audit.
Answers
B.
Report only on the areas within the scope of the follow-up.
B.
Report only on the areas within the scope of the follow-up.
Answers
C.
Report the risk to management in the follow-up report.
C.
Report the risk to management in the follow-up report.
Answers
D.
Expand the follow-up scope to include examining the evidence.
D.
Expand the follow-up scope to include examining the evidence.
Answers
Suggested answer: C

What should be the PRIMARY focus during a review of a business process improvement project?

A.
Business project plan
A.
Business project plan
Answers
B.
Continuous monitoring plans
B.
Continuous monitoring plans
Answers
C.
The cost of new controls
C.
The cost of new controls
Answers
D.
Business impact
D.
Business impact
Answers
Suggested answer: D

Which of the following is MOST important to the effectiveness of smoke detectors installed in a data processing facility?

A.
Detectors trigger audible alarms when activated.
A.
Detectors trigger audible alarms when activated.
Answers
B.
Detectors have the correct industry certification.
B.
Detectors have the correct industry certification.
Answers
C.
Detectors are linked to dry pipe fire suppression systems.
C.
Detectors are linked to dry pipe fire suppression systems.
Answers
D.
Detectors are linked to wet pipe fire suppression systems.
D.
Detectors are linked to wet pipe fire suppression systems.
Answers
Suggested answer: A

Which of the following BEST indicates a need to review an organization's information security policy?

A.
High number of low-risk findings in the audit report
A.
High number of low-risk findings in the audit report
Answers
B.
Increasing exceptions approved by management
B.
Increasing exceptions approved by management
Answers
C.
Increasing complexity of business transactions
C.
Increasing complexity of business transactions
Answers
D.
Completion of annual IT risk assessment
D.
Completion of annual IT risk assessment
Answers
Suggested answer: B

An IS auditor is evaluating the log management system for an organization with devices and systems in multiple geographic locations. Which of the following is MOST important for the auditor to verify?

A.
Log files are reviewed in multiple locations.
A.
Log files are reviewed in multiple locations.
Answers
B.
Log files are concurrently updated.
B.
Log files are concurrently updated.
Answers
C.
Log files are encrypted and digitally signed.
C.
Log files are encrypted and digitally signed.
Answers
D.
Log files of the servers are synchronized.
D.
Log files of the servers are synchronized.
Answers
Suggested answer: C

An organization is ready to implement a new IT solution consisting of multiple modules. The last module updates the processed data into the database. Which of the following findings should be of MOST concern to the IS auditor?

A.
Absence of a formal change approval process
A.
Absence of a formal change approval process
Answers
B.
Lack of input validation
B.
Lack of input validation
Answers
C.
Use of weak encryption
C.
Use of weak encryption
Answers
D.
Lack of a data dictionary
D.
Lack of a data dictionary
Answers
Suggested answer: B

Which of the following observations regarding change management should be considered the MOST serious risk by an IS auditor?

A.
There is no software used to track change management.
A.
There is no software used to track change management.
Answers
B.
The change is not approved by the business owners.
B.
The change is not approved by the business owners.
Answers
C.
The change is deployed two weeks after approval.
C.
The change is deployed two weeks after approval.
Answers
D.
The development of the change is not cost-effective.
D.
The development of the change is not cost-effective.
Answers
Suggested answer: B
Total 1.198 questions
Go to page: of 120