ExamGecko
Home Home / Isaca / CISA

Isaca CISA Practice Test - Questions Answers, Page 95

Question list
Search
Search

List of questions

Search

Related questions











An IS auditor discovers that backups of critical systems are not being performed in accordance with the recovery point objective (RPO) established in the business continuity plan (BCP). What should the auditor do NEXT?

A.
Request an immediate backup be performed.
A.
Request an immediate backup be performed.
Answers
B.
Expand the audit scope.
B.
Expand the audit scope.
Answers
C.
Identify the root cause.
C.
Identify the root cause.
Answers
D.
Include the observation in the report.
D.
Include the observation in the report.
Answers
Suggested answer: B

A small organization is experiencing rapid growth and plans to create a new information security policy. Which of the following is MOST relevant to creating the policy?

A.
Business objectives
A.
Business objectives
Answers
B.
Business impact analysis (BIA)
B.
Business impact analysis (BIA)
Answers
C.
Enterprise architecture (EA)
C.
Enterprise architecture (EA)
Answers
D.
Recent incident trends
D.
Recent incident trends
Answers
Suggested answer: A

An IS auditor wants to gain a better understanding of an organization's selected IT operating system software. Which of the following would be MOST helpful to review?

A.
Service level agreements (SLAs)
A.
Service level agreements (SLAs)
Answers
B.
Project steering committee charter
B.
Project steering committee charter
Answers
C.
IT audit reports
C.
IT audit reports
Answers
D.
Enterprise architecture (EA)
D.
Enterprise architecture (EA)
Answers
Suggested answer: C

Which of the following should be the PRIMARY consideration when validating a data analytic algorithm that has never been used before?

A.
Enhancing the design of data visualization
A.
Enhancing the design of data visualization
Answers
B.
Increasing speed and efficiency of audit procedures
B.
Increasing speed and efficiency of audit procedures
Answers
C.
Confirming completeness and accuracy
C.
Confirming completeness and accuracy
Answers
D.
Decreasing the time for data analytics execution
D.
Decreasing the time for data analytics execution
Answers
Suggested answer: C

Which of the following findings would be of GREATEST concern to an IS auditor reviewing the security architecture of an organization that has just implemented a Zero Trust solution?

A.
An increase in security-related costs
A.
An increase in security-related costs
Answers
B.
User complaints about the new mode of working
B.
User complaints about the new mode of working
Answers
C.
An increase in user identification errors
C.
An increase in user identification errors
Answers
D.
A noticeable drop in the performance of IT systems
D.
A noticeable drop in the performance of IT systems
Answers
Suggested answer: C

Which of the following staff should an IS auditor interview FIRST to obtain a general overview of the various technologies used across different programs?

A.
Technical architect
A.
Technical architect
Answers
B.
Enterprise architect
B.
Enterprise architect
Answers
C.
Program manager
C.
Program manager
Answers
D.
Solution architect
D.
Solution architect
Answers
Suggested answer: B

A mission-critical application utilizes a one-node database server. On multiple occasions, the database service has been stopped to perform routine patching, causing application outages. Which of the following should be the IS auditor's GREATEST concern?

A.
Revenue lost due to application outages
A.
Revenue lost due to application outages
Answers
B.
Patching performed by the vendor
B.
Patching performed by the vendor
Answers
C.
A large number of scheduled database changes
C.
A large number of scheduled database changes
Answers
D.
The presence of a single point of failure
D.
The presence of a single point of failure
Answers
Suggested answer: D

A system performance dashboard indicates several application servers are reaching the defined threshold for maximum CPU allocation. Which of the following would be the IS auditor's BEST recommendation for the IT department?

A.
Increase the defined processing threshold to reflect capacity consumption during normal operations.
A.
Increase the defined processing threshold to reflect capacity consumption during normal operations.
Answers
B.
Notify end users of potential disruptions caused by degradation of servers.
B.
Notify end users of potential disruptions caused by degradation of servers.
Answers
C.
Terminate both ingress and egress connections of these servers to avoid overload.
C.
Terminate both ingress and egress connections of these servers to avoid overload.
Answers
D.
Validate the processing capacity of these servers is adequate to complete computing tasks.
D.
Validate the processing capacity of these servers is adequate to complete computing tasks.
Answers
Suggested answer: D

Which of the following controls helps to ensure that data extraction queries run by the database administrator (DBA) are monitored?

A.
Restricting access to DBA activities
A.
Restricting access to DBA activities
Answers
B.
Performing periodic access reviews
B.
Performing periodic access reviews
Answers
C.
Storing logs of database access
C.
Storing logs of database access
Answers
D.
Reviewing activity logs of the DBA
D.
Reviewing activity logs of the DBA
Answers
Suggested answer: D

When protecting the confidentiality of information assets, the MOST effective control practice is the:

A.
Awareness training of personnel on regulatory requirements
A.
Awareness training of personnel on regulatory requirements
Answers
B.
Utilization of a dual-factor authentication mechanism
B.
Utilization of a dual-factor authentication mechanism
Answers
C.
Configuration of read-only access to all users
C.
Configuration of read-only access to all users
Answers
D.
Enforcement of a need-to-know access control philosophy
D.
Enforcement of a need-to-know access control philosophy
Answers
Suggested answer: D
Total 1.198 questions
Go to page: of 120