ExamGecko
Home / Isaca / CISA / List of questions
Ask Question

Isaca CISA Practice Test - Questions Answers, Page 9

Add to Whishlist

List of questions

Question 81

Report Export Collapse

Which of the following is MOST important to ensure when planning a black box penetration test?

The management of the client organization is aware of the testing.
The management of the client organization is aware of the testing.
The test results will be documented and communicated to management.
The test results will be documented and communicated to management.
The environment and penetration test scope have been determined.
The environment and penetration test scope have been determined.
Diagrams of the organization's network architecture are available.
Diagrams of the organization's network architecture are available.
Suggested answer: C
Explanation:

A black box penetration test is a type of security assessment that simulates an attack on a system or network without any prior knowledge of its configuration or architecture. The main objective of this test is to identify vulnerabilities and weaknesses that can be exploited by external or internal threat actors. To plan a black box penetration test, it is most important to ensure that the environment and penetration test scope have been determined. This means that the tester and the client organization have agreed on the boundaries, objectives, methods, and deliverables of the test, as well as the legal and ethical aspects of the engagement. Without a clear definition of the environment and scope, the test may not be effective, efficient, or compliant with relevant standards and regulations. Additionally, the tester may cause unintended damage or disruption to the client's systems or networks, or violate their privacy or security policies.

What are black box, grey box, and white box penetration testing?

What Is Black-Box Penetration Testing and Why Should You Choose It?

asked 18/09/2024
Ishan Patel
47 questions

Question 82

Report Export Collapse

Which of the following is the BEST method to safeguard data on an organization's laptop computers?

Disabled USB ports
Disabled USB ports
Full disk encryption
Full disk encryption
Biometric access control
Biometric access control
Two-factor authentication
Two-factor authentication
Suggested answer: B
Explanation:

The best method to safeguard data on an organization's laptop computers is full disk encryption. Full disk encryption is a technique that encrypts all the data stored on a hard drive, including the operating system, applications, files, and folders. This means that if the laptop is lost, stolen, or accessed by an unauthorized person, they will not be able to read or modify any data without knowing the encryption key or password. Full disk encryption provides a strong level of protection for data at rest, as it prevents data leakage or exposure in case of physical theft or loss of the device.

How to Protect the Data on Your Laptop

6 Steps to Practice Strong Laptop Security

asked 18/09/2024
Novy Kingra
46 questions

Question 83

Report Export Collapse

An IS auditor is planning an audit of an organization's accounts payable processes. Which of the following controls is MOST important to assess in the audit?

Segregation of duties between issuing purchase orders and making payments.
Segregation of duties between issuing purchase orders and making payments.
Segregation of duties between receiving invoices and setting authorization limits
Segregation of duties between receiving invoices and setting authorization limits
Management review and approval of authorization tiers
Management review and approval of authorization tiers
Management review and approval of purchase orders
Management review and approval of purchase orders
Suggested answer: A
Explanation:

The most important control to assess in an audit of an organization's accounts payable processes is segregation of duties between issuing purchase orders and making payments. Segregation of duties is a principle that requires different individuals or departments to perform different tasks or functions within a process, in order to prevent fraud, errors, or conflicts of interest. In the accounts payable process, segregation of duties between issuing purchase orders and making payments ensures that no one person can initiate and complete a transaction without proper authorization and verification. This reduces the risk of duplicate payments, overpayments, unauthorized payments, or payments to fictitious vendors.

Accounts payable controls

Accounts Payable Internal Controls: A Simple Checklist

asked 18/09/2024
Steve Marechal
42 questions

Question 84

Report Export Collapse

When evaluating the design of controls related to network monitoring, which of the following is MOST important for an IS auditor to review?

Incident monitoring togs
Incident monitoring togs
The ISP service level agreement
The ISP service level agreement
Reports of network traffic analysis
Reports of network traffic analysis
Network topology diagrams
Network topology diagrams
Suggested answer: D
Explanation:

Network topology diagrams are the most important for an IS auditor to review when evaluating the design of controls related to network monitoring, because they show how the network components are connected and configured, and what security measures are in place to protect the network from unauthorized access or attacks.Incident monitoring logs, the ISP service level agreement, and reports of network traffic analysis are useful for evaluating the effectiveness and performance of network monitoring, but not the design of controls.Reference:CISA Review Manual (Digital Version), Chapter 5, Section 5.3.3

asked 18/09/2024
Alain Bijl
49 questions

Question 85

Report Export Collapse

An organization has recently acquired and implemented intelligent-agent software for granting loans to customers. During the post-implementation review, which of the following is the MOST important procedure for the IS auditor to perform?

Review system and error logs to verify transaction accuracy.
Review system and error logs to verify transaction accuracy.
Review input and output control reports to verify the accuracy of the system decisions.
Review input and output control reports to verify the accuracy of the system decisions.
Review signed approvals to ensure responsibilities for decisions of the system are well defined.
Review signed approvals to ensure responsibilities for decisions of the system are well defined.
Review system documentation to ensure completeness.
Review system documentation to ensure completeness.
Suggested answer: B
Explanation:

Reviewing input and output control reports to verify the accuracy of the system decisions is the most important procedure for the IS auditor to perform during the post-implementation review of intelligent-agent software for granting loans to customers, because it can help identify any errors or anomalies in the system logic or data that may affect the quality and reliability of the system outcomes.Reviewing system and error logs, signed approvals, and system documentation are also important procedures, but they are not as critical as verifying the accuracy of the system decisions.Reference:CISA Review Manual (Digital Version), Chapter 4, Section 4.2.21

asked 18/09/2024
Alex Zandamela
25 questions

Question 86

Report Export Collapse

What is the BEST control to address SQL injection vulnerabilities?

Unicode translation
Unicode translation
Secure Sockets Layer (SSL) encryption
Secure Sockets Layer (SSL) encryption
Input validation
Input validation
Digital signatures
Digital signatures
Suggested answer: C
Explanation:

Input validation is the best control to address SQL injection vulnerabilities, because it can prevent malicious users from entering SQL commands or statements into input fields that are intended for data entry, such as usernames or passwords. SQL injection is a technique that exploits a security vulnerability in an application's software by inserting SQL code into a query string that can execute commands on a database server.Unicode translation, SSL encryption, and digital signatures are not effective controls against SQL injection, because they do not prevent or detect SQL code injection into input fields.Reference:CISA Review Manual (Digital Version), Chapter 5, Section 5.4.2

asked 18/09/2024
metodija durtanoski
46 questions

Question 87

Report Export Collapse

An online retailer is receiving customer complaints about receiving different items from what they ordered on the organization's website. The root cause has been traced to poor data quality. Despite efforts to clean erroneous data from the system, multiple data quality issues continue to occur. Which of the following recommendations would be the BEST way to reduce the likelihood of future occurrences?

Assign responsibility for improving data quality.
Assign responsibility for improving data quality.
Invest in additional employee training for data entry.
Invest in additional employee training for data entry.
Outsource data cleansing activities to reliable third parties.
Outsource data cleansing activities to reliable third parties.
Implement business rules to validate employee data entry.
Implement business rules to validate employee data entry.
Suggested answer: D
Explanation:

Implementing business rules to validate employee data entry is the best way to reduce the likelihood of future occurrences of poor data quality that cause customer complaints about receiving different items from what they ordered on the organization's website. Business rules are logical statements that define the conditions and actions for data validation, such as checking for data completeness, accuracy, consistency, and integrity.Assigning responsibility for improving data quality, investing in additional employee training for data entry, and outsourcing data cleansing activities to reliable third parties are also possible ways to improve data quality, but they are not as effective as implementing business rules to validate employee data entry.Reference:CISA Review Manual (Digital Version), Chapter 4, Section 4.3.1

asked 18/09/2024
Minoel Prendi
37 questions

Question 88

Report Export Collapse

Which of the following components of a risk assessment is MOST helpful to management in determining the level of risk mitigation to apply?

Risk identification
Risk identification
Risk classification
Risk classification
Control self-assessment (CSA)
Control self-assessment (CSA)
Impact assessment
Impact assessment
Suggested answer: D
asked 18/09/2024
Dewald Van Schalkwyk
41 questions

Question 89

Report Export Collapse

Which of the following would BEST facilitate the successful implementation of an IT-related framework?

Aligning the framework to industry best practices
Aligning the framework to industry best practices
Establishing committees to support and oversee framework activities
Establishing committees to support and oversee framework activities
Involving appropriate business representation within the framework
Involving appropriate business representation within the framework
Documenting IT-related policies and procedures
Documenting IT-related policies and procedures
Suggested answer: C
asked 18/09/2024
Mitesh Solanki
50 questions

Question 90

Report Export Collapse

During a review of a production schedule, an IS auditor observes that a staff member is not complying with mandatory operational procedures. The auditor's NEXT step should be to:

note the noncompliance in the audit working papers.
note the noncompliance in the audit working papers.
issue an audit memorandum identifying the noncompliance.
issue an audit memorandum identifying the noncompliance.
include the noncompliance in the audit report.
include the noncompliance in the audit report.
determine why the procedures were not followed.
determine why the procedures were not followed.
Suggested answer: D
asked 18/09/2024
Tyler Evans
50 questions
Total 1.402 questions
Go to page: of 141
Search

Related questions