ExamGecko
Home Home / Isaca / CISA

Isaca CISA Practice Test - Questions Answers, Page 89

Question list
Search
Search

List of questions

Search

Related questions











An IS auditor discovers that a developer has used the same key to grant access to multiple applications making calls to an application programming interface (API). Which of the following is the BEST recommendation to address this situation?

A.
Replace the API key with time-limited tokens that grant least privilege access.
A.
Replace the API key with time-limited tokens that grant least privilege access.
Answers
B.
Authorize the API key to allow read-only access by all applications.
B.
Authorize the API key to allow read-only access by all applications.
Answers
C.
Implement a process to expire the API key after a previously agreed-upon period of time.
C.
Implement a process to expire the API key after a previously agreed-upon period of time.
Answers
D.
Coordinate an API key rotation exercise with all impacted application owners.
D.
Coordinate an API key rotation exercise with all impacted application owners.
Answers
Suggested answer: A

In an area susceptible to unexpected increases in electrical power, which of the following would MOST effectively protect the system?

A.
Generator
A.
Generator
Answers
B.
Voltage regulator
B.
Voltage regulator
Answers
C.
Circuit breaker
C.
Circuit breaker
Answers
D.
Alternate power supply line
D.
Alternate power supply line
Answers
Suggested answer: B

An organization plans to centrally decommission end-of-life databases and migrate the data to the latest model of hardware. Which of the following BEST ensures data integrity is preserved during the migration?

A.
Reconciling sample data to most recent backups
A.
Reconciling sample data to most recent backups
Answers
B.
Obfuscating confidential data
B.
Obfuscating confidential data
Answers
C.
Encrypting the data
C.
Encrypting the data
Answers
D.
Comparing checksums
D.
Comparing checksums
Answers
Suggested answer: D

During a closing meeting, the IT manager disagrees with a valid audit finding presented by the IS auditor and requests the finding be excluded from the final report. Which of the following is the auditor's BEST course of action?

A.
Request that the IT manager be removed from the remaining meetings and future audits.
A.
Request that the IT manager be removed from the remaining meetings and future audits.
Answers
B.
Modify the finding to include the IT manager's comments and inform the audit manager of the changes.
B.
Modify the finding to include the IT manager's comments and inform the audit manager of the changes.
Answers
C.
Remove the finding from the report and continue presenting the remaining findings.
C.
Remove the finding from the report and continue presenting the remaining findings.
Answers
D.
Provide the evidence which supports the finding and keep the finding in the report.
D.
Provide the evidence which supports the finding and keep the finding in the report.
Answers
Suggested answer: D

During which IT project phase is it MOST appropriate to conduct a benefits realization analysis?

A.
Post-implementation review phase
A.
Post-implementation review phase
Answers
B.
Final implementation phase
B.
Final implementation phase
Answers
C.
User acceptance testing (UAT) phase
C.
User acceptance testing (UAT) phase
Answers
D.
Design review phase
D.
Design review phase
Answers
Suggested answer: A

When planning a review of IT governance, an IS auditor is MOST likely to:

A.
assess whether business process owner responsibilities are consistent.
A.
assess whether business process owner responsibilities are consistent.
Answers
B.
obtain information about the control framework adopted by management.
B.
obtain information about the control framework adopted by management.
Answers
C.
examine audit committee minutes for IT-related controls.
C.
examine audit committee minutes for IT-related controls.
Answers
D.
define key performance indicators (KPIs).
D.
define key performance indicators (KPIs).
Answers
Suggested answer: B

Which of the following is the BEST indicator that a third-party vendor adheres to the controls required by the organization?

A.
Review of monthly performance reports submitted by the vendor
A.
Review of monthly performance reports submitted by the vendor
Answers
B.
Certifications maintained by the vendor
B.
Certifications maintained by the vendor
Answers
C.
Regular independent assessment of the vendor
C.
Regular independent assessment of the vendor
Answers
D.
Substantive log file review of the vendor's system
D.
Substantive log file review of the vendor's system
Answers
Suggested answer: C

Which of the following would BEST prevent an arbitrary application of a patch?

A.
Database access control
A.
Database access control
Answers
B.
Established maintenance windows
B.
Established maintenance windows
Answers
C.
Network based access controls
C.
Network based access controls
Answers
D.
Change management
D.
Change management
Answers
Suggested answer: D

Which of the following would be MOST important to include in an IS audit report?

A.
Observations not reported as findings due to inadequate evidence
A.
Observations not reported as findings due to inadequate evidence
Answers
B.
The roadmap for addressing the various risk areas
B.
The roadmap for addressing the various risk areas
Answers
C.
The level of unmitigated risk along with business impact
C.
The level of unmitigated risk along with business impact
Answers
D.
Specific technology solutions for each audit observation
D.
Specific technology solutions for each audit observation
Answers
Suggested answer: C

At the end of each business day, a business-critical application generates a report of financial transac-tions greater than a certain value, and an employee then checks these transactions for errors. What type of control is in place?

A.
Detective
A.
Detective
Answers
B.
Preventive
B.
Preventive
Answers
C.
Corrective
C.
Corrective
Answers
D.
Deterrent
D.
Deterrent
Answers
Suggested answer: A
Total 1.198 questions
Go to page: of 120