ExamGecko
Home Home / Isaca / CISA

Isaca CISA Practice Test - Questions Answers, Page 92

Question list
Search
Search

List of questions

Search

Related questions











The PRIMARY goal of capacity management is to:

A.
minimize data storage needs across the organization.
A.
minimize data storage needs across the organization.
Answers
B.
provide necessary IT resources to meet business requirements.
B.
provide necessary IT resources to meet business requirements.
Answers
C.
minimize system idle time to optimize cost.
C.
minimize system idle time to optimize cost.
Answers
D.
ensure that IT teams have sufficient personnel.
D.
ensure that IT teams have sufficient personnel.
Answers
Suggested answer: B

Which of the following is the PRIMARY benefit of benchmarking an organization's software development lifecycle practices against a capability maturity model?

A.
Reliable products are guaranteed.
A.
Reliable products are guaranteed.
Answers
B.
Repeatable software development procedures are established.
B.
Repeatable software development procedures are established.
Answers
C.
Programmers' efficiency is improved.
C.
Programmers' efficiency is improved.
Answers
D.
Security requirements are added to software development processes.
D.
Security requirements are added to software development processes.
Answers
Suggested answer: B

An IS auditor finds a user account where privileged access is not appropriate for the user's role. Which of the following would provide the BEST evidence to determine whether the risk of this access has been exploited?

A.
Activity log for the account
A.
Activity log for the account
Answers
B.
Interview with the user's manager
B.
Interview with the user's manager
Answers
C.
Last logon date for the account
C.
Last logon date for the account
Answers
D.
Documented approval for the account
D.
Documented approval for the account
Answers
Suggested answer: A

A telecommunications company has recently created a new fraud department with three employees and acquired a fraud detection system that uses artificial intelligence (AI) modules. Which of the following would be of GREATEST concern to an IS auditor reviewing the system?

A.
A very large number of true negatives
A.
A very large number of true negatives
Answers
B.
A small number of false negatives
B.
A small number of false negatives
Answers
C.
A small number of true positives
C.
A small number of true positives
Answers
D.
A large number of false positives
D.
A large number of false positives
Answers
Suggested answer: B

Which of the following technology trends can lead to more robust data loss prevention (DLP) tools?

A.
Cloud computing
A.
Cloud computing
Answers
B.
Robotic process automation (RPA)
B.
Robotic process automation (RPA)
Answers
C.
Internet of Things (IoT)
C.
Internet of Things (IoT)
Answers
D.
Machine learning algorithms
D.
Machine learning algorithms
Answers
Suggested answer: D

A global bank plans to use a cloud provider for backup of customer financial data. Which of the following should be the PRIMARY focus of this project?

A.
Backup testing schedule
A.
Backup testing schedule
Answers
B.
Data retention policy
B.
Data retention policy
Answers
C.
Transfer frequency
C.
Transfer frequency
Answers
D.
Data confidentiality
D.
Data confidentiality
Answers
Suggested answer: D

An IS auditor is reviewing a machine learning algorithm-based system for loan approvals and is preparing a data set to test the algorithm for bias. Which of the following is MOST important for the auditor's test data set to include?

A.
Applicants of all ages
A.
Applicants of all ages
Answers
B.
Applicants from a range of geographic areas and income levels
B.
Applicants from a range of geographic areas and income levels
Answers
C.
Incomplete records and incorrectly formatted data
C.
Incomplete records and incorrectly formatted data
Answers
D.
Duplicate records
D.
Duplicate records
Answers
Suggested answer: B

Which of the following BEST enables an organization to standardize its IT infrastructure to align with business goals?

A.
Enterprise architecture (EA)
A.
Enterprise architecture (EA)
Answers
B.
Operational technologies
B.
Operational technologies
Answers
C.
Data architecture
C.
Data architecture
Answers
D.
Robotic process automation (RPA)
D.
Robotic process automation (RPA)
Answers
Suggested answer: A

Which of the following is MOST helpful for understanding an organization's key driver to modernize application platforms?

A.
Vendor software inventories
A.
Vendor software inventories
Answers
B.
Network architecture diagrams
B.
Network architecture diagrams
Answers
C.
System-wide incident reports
C.
System-wide incident reports
Answers
D.
Inventory of end-of-life software
D.
Inventory of end-of-life software
Answers
Suggested answer: D

Which type of testing is used to identify security vulnerabilities in source code in the development environment?

A.
Interactive application security testing (IAST)
A.
Interactive application security testing (IAST)
Answers
B.
Runtime application self-protection (RASP)
B.
Runtime application self-protection (RASP)
Answers
C.
Dynamic analysis security testing (DAST)
C.
Dynamic analysis security testing (DAST)
Answers
D.
Static analysis security testing (SAST)
D.
Static analysis security testing (SAST)
Answers
Suggested answer: D
Total 1.198 questions
Go to page: of 120