ExamGecko
Home Home / Isaca / CISA

Isaca CISA Practice Test - Questions Answers, Page 98

Question list
Search
Search

List of questions

Search

Related questions

Which of the following responsibilities of an organization's quality assurance (QA) function should raise concern for an IS auditor?

A.
Ensuring standards are adhered to within the development process
A.
Ensuring standards are adhered to within the development process
Answers
B.
nsuring the test work supports observations
B.
nsuring the test work supports observations
Answers
C.
Updating development methodology
C.
Updating development methodology
Answers
D.
Implementing solutions to correct defects
D.
Implementing solutions to correct defects
Answers
Suggested answer: D

Explanation:

Implementing solutions to correct defects is a responsibility of the development function, not the quality assurance (QA) function. The QA function should ensure that the development process follows the established standards and methodologies, and that the defects are identified and reported. The QA function should not be involved in fixing the defects, as this would compromise its independence and objectivity.The other options are valid responsibilities of the QA function, and they should not raise concern for an IS auditor.Reference:CISA Review Manual (Digital Version)1, page 300.

Which of the following is MOST critical to the success of an information security program?

A.
User accountability for information security
A.
User accountability for information security
Answers
B.
Management's commitment to information security
B.
Management's commitment to information security
Answers
C.
Integration of business and information security
C.
Integration of business and information security
Answers
D.
Alignment of information security with IT objectives
D.
Alignment of information security with IT objectives
Answers
Suggested answer: B

Explanation:

Management's commitment to information security is the most critical factor for the success of an information security program, as it sets the tone and direction for the organization's security culture and practices. Management's commitment is demonstrated by establishing a clear security policy, providing adequate resources, assigning roles and responsibilities, enforcing compliance, and supporting continuous improvement.The other options are important elements of an information security program, but they depend on management's commitment to be effective.Reference:CISA Review Manual (Digital Version)1, page 439.

Which of the following provides the MOST protection against emerging threats?

A.
Demilitarized zone (DMZ)
A.
Demilitarized zone (DMZ)
Answers
B.
Heuristic intrusion detection system (IDS)
B.
Heuristic intrusion detection system (IDS)
Answers
C.
Real-time updating of antivirus software
C.
Real-time updating of antivirus software
Answers
D.
Signature-based intrusion detection system (IDS)
D.
Signature-based intrusion detection system (IDS)
Answers
Suggested answer: B

Explanation:

A heuristic intrusion detection system (IDS) provides the most protection against emerging threats, as it uses behavioral analysis and anomaly detection to identify unknown or zero-day attacks. A heuristic IDS can adapt to changing patterns and learn from previous incidents, making it more effective than a signature-based IDS, which relies on predefined rules and signatures to detect known attacks. A demilitarized zone (DMZ) is a network segment that separates the internal network from the external network, and it can provide some protection against external threats, but not against internal or emerging threats.Real-time updating of antivirus software is important to protect against malware, but it may not be sufficient to prevent new or sophisticated attacks that exploit unknown vulnerabilities.Reference:CISA Review Manual (Digital Version)1, page 452-453.

During an external review, an IS auditor observes an inconsistent approach in classifying system criticality within the organization. Which of the following should be recommended as the PRIMARY factor to determine system criticality?

A.
Recovery point objective (RPO)
A.
Recovery point objective (RPO)
Answers
B.
Maximum allowable downtime (MAD)
B.
Maximum allowable downtime (MAD)
Answers
C.
Mean time to restore (MTTR)
C.
Mean time to restore (MTTR)
Answers
D.
Key performance indicators (KPls)
D.
Key performance indicators (KPls)
Answers
Suggested answer: B

Explanation:

The primary factor to determine system criticality is the maximum allowable downtime (MAD), which is the maximum period of time that a system can be unavailable before causing significant damage or risk to the organization. The MAD reflects the business impact and the recovery requirements of the system, and it can be used to prioritize the systems and allocate the resources for disaster recovery planning. The other options are not as important as the MAD, and they may vary depending on the system characteristics and the recovery strategy. The recovery point objective (RPO) is the maximum amount of data loss that is acceptable for a system. The mean time to restore (MTTR) is the average time required to restore a system after a failure.The key performance indicators (KPIs) are metrics that measure the performance and effectiveness of a system.Reference:CISA Review Manual (Digital Version)1, page 468-469.

Which of the following would provide the BEST evidence that a cloud provider's change management process is effective?

A.
Minutes from regular change management meetings with the vendor
A.
Minutes from regular change management meetings with the vendor
Answers
B.
Written assurances from the vendor's CEO and CIO
B.
Written assurances from the vendor's CEO and CIO
Answers
C.
The results of a third-party review provided by the vendor
C.
The results of a third-party review provided by the vendor
Answers
D.
A copy of change management policies provided by the vendor
D.
A copy of change management policies provided by the vendor
Answers
Suggested answer: C

Explanation:

The results of a third-party review provided by the vendor would provide the best evidence that a cloud provider's change management process is effective, because it would be an independent and objective assessment of the vendor's compliance with best practices and standards for managing changes in the cloud environment. A third-party review would also include testing of the vendor's change management controls and procedures, and provide recommendations for improvement if needed.

Minutes from regular change management meetings with the vendor would not provide sufficient evidence, because they would only reflect the vendor's self-reported information and may not capture all the changes that occurred or their impact on the cloud services. Written assurances from the vendor's CEO and CIO would also not provide sufficient evidence, because they would be based on the vendor's own opinion and may not be verified by external sources. A copy of change management policies provided by the vendor would not provide sufficient evidence, because it would only show the vendor's intended approach to change management, but not how it is implemented or monitored in practice.

ISACA Cloud Computing Audit Program, Section 4.5: Change Management

Cloud Computing: Business Benefits With Security, Governance and Assurance Perspectives, Section 4.3: Change Management

An IS audit reveals an IT application is experiencing poor performance including data inconsistency and integrity issues. What is the MOST likely cause?

A.
Database clustering
A.
Database clustering
Answers
B.
Data caching
B.
Data caching
Answers
C.
Reindexing of the database table
C.
Reindexing of the database table
Answers
D.
Load balancing
D.
Load balancing
Answers
Suggested answer: B

Explanation:

Data caching is the most likely cause of poor performance, data inconsistency and integrity issues in an IT application, because it involves storing frequently accessed data in a temporary memory location (cache) to reduce the latency and bandwidth consumption of retrieving data from the original source. However, data caching can also introduce problems such as stale data (when the cache is not updated with changes made to the original source), cache coherence (when multiple caches store copies of the same data and need to be synchronized), and cache corruption (when the cache is damaged or tampered with).

Database clustering is not a likely cause of poor performance, data inconsistency and integrity issues, because it involves distributing data across multiple servers or nodes to improve availability, scalability and load balancing of database operations. Database clustering can also enhance data consistency and integrity by using replication and synchronization mechanisms to ensure that all nodes have the same view of the data.

Reindexing of the database table is not a likely cause of poor performance, data inconsistency and integrity issues, because it involves rebuilding or reorganizing indexes on tables or views to improve query performance and reduce fragmentation of index pages. Reindexing can also improve data consistency and integrity by ensuring that indexes reflect the current state of the data in the tables or views.

Load balancing is not a likely cause of poor performance, data inconsistency and integrity issues, because it involves distributing workloads across multiple servers or resources to optimize resource utilization, throughput and response time of applications. Load balancing can also enhance data consistency and integrity by using algorithms and protocols to route requests to the most appropriate server or resource based on availability, capacity and performance.

Data Caching

Database Clustering

Reindexing Database Tables in SQL Server

[Load Balancing]

Which of the following is the MOST significant impact to an organization that does not use an IT governance framework?

A.
adequate measurement of key risk indicators (KRIS)
A.
adequate measurement of key risk indicators (KRIS)
Answers
B.
Inadequate alignment of IT plans and business objectives
B.
Inadequate alignment of IT plans and business objectives
Answers
C.
Inadequate business impact analysis (BIA) results and predictions
C.
Inadequate business impact analysis (BIA) results and predictions
Answers
D.
Inadequate measurement of key performance indicators (KPls)
D.
Inadequate measurement of key performance indicators (KPls)
Answers
Suggested answer: B

Explanation:

The most significant impact to an organization that does not use an IT governance framework is inadequate alignment of IT plans and business objectives.IT governance is a framework for the governance and management of enterprise information and technology (I&T) that supports enterprise goal achievement1. IT governance helps to ensure that IT investments and activities are aligned with the business strategy, vision, and values of the organization.IT governance also helps to optimize the value of IT, manage IT-related risks, and measure and monitor IT performance1.

Without an IT governance framework, an organization may face challenges such as:

Lack of clarity and direction for IT decision making

Inconsistent or conflicting IT priorities and demands

Inefficient or ineffective use of IT resources and capabilities

Poor quality or delivery of IT services and products

Increased exposure to IT-related threats and vulnerabilities

Reduced customer satisfaction and trust in IT

Missed opportunities for innovation and competitive advantage

Therefore, an organization that does not use an IT governance framework may fail to achieve its business objectives and may lose its competitive edge in the market.

COBIT 2019 Framework Introduction and Methodology, Section 1.1: What Is Governance of Enterprise I&T?

IT Governance: Definitions, Frameworks and Planning, Section 1: What Is IT Governance?

During the review of a system disruption incident, an IS auditor notes that IT support staff were put in a position to make decisions beyond their level of authority.

Which of the following is the BEST recommendation to help prevent this situation in the future?

A.
Introduce escalation protocols.
A.
Introduce escalation protocols.
Answers
B.
Develop a competency matrix.
B.
Develop a competency matrix.
Answers
C.
Implement fallback options.
C.
Implement fallback options.
Answers
D.
Enable an emergency access ID.
D.
Enable an emergency access ID.
Answers
Suggested answer: A

Explanation:

The best recommendation to help prevent the situation where IT support staff were put in a position to make decisions beyond their level of authority during the review of a system disruption incident is to introduce escalation protocols.Escalation protocols are policies and procedures that define who should be notified, involved, or consulted when an incident occurs, how the communication and handover should take place, and what criteria or triggers should be used to escalate the incident to a higher level of authority or expertise2. Escalation protocols help to ensure that:

Incidents are handled by the appropriate staff with the required skills, knowledge, and experience

Incidents are resolved in a timely and effective manner

Incidents are escalated to senior management or specialized teams when necessary

Incidents are documented and reported accurately and transparently

Incidents are analyzed and learned from to prevent recurrence or mitigate impact

Therefore, by introducing escalation protocols, an organization can improve its incident management process and avoid putting IT support staff in a position to make decisions beyond their level of authority.

Escalation policies for effective incident management, Section 1: What is incident escalation?

Which of the following is the BEST reason to implement a data retention policy?

A.
To establish a recovery point objective (RPO) for disaster recovery procedures
A.
To establish a recovery point objective (RPO) for disaster recovery procedures
Answers
B.
To limit the liability associated with storing and protecting information
B.
To limit the liability associated with storing and protecting information
Answers
C.
To document business objectives for processing data within the organization
C.
To document business objectives for processing data within the organization
Answers
D.
To assign responsibility and ownership for data protection outside IT
D.
To assign responsibility and ownership for data protection outside IT
Answers
Suggested answer: B

Explanation:

The best reason to implement a data retention policy is to limit the liability associated with storing and protecting information.A data retention policy is a business' established protocol for maintaining information, typically defining what data needs to be retained, the format in which it should be kept, how long it should be stored for, whether it should eventually be archived or deleted, who has the authority to dispose of it, and what procedure to follow in the event of a policy violation1. A data retention policy can help an organization to:

Comply with legal and regulatory requirements that mandate the retention and disposal of certain types of data, such as financial records, health records, or personal data

Reduce the risk of data breaches, theft, loss, or corruption by minimizing the amount of data stored and ensuring proper security measures are in place

Save costs and resources by optimizing the use of storage space and reducing the need for backup and recovery operations

Enhance operational efficiency and performance by eliminating unnecessary or outdated data and improving data quality and accessibility

Support business continuity and disaster recovery plans by ensuring critical data is available and recoverable in case of an emergency

Facilitate audit trails and investigations by providing evidence of data authenticity, integrity, and provenance

Therefore, by implementing a data retention policy, an organization can limit its liability associated with storing and protecting information, as well as improve its data governance and management practices.

Data Retention Policy 101: Best Practices, Examples & More

An IS auditor has learned that access privileges are not periodically reviewed or updated. Which of the following would provide the BEST evidence to determine whether transactions have been executed by authorized employees?

A.
Audit trails
A.
Audit trails
Answers
B.
Control totals
B.
Control totals
Answers
C.
Reconciliations
C.
Reconciliations
Answers
D.
Change logs
D.
Change logs
Answers
Suggested answer: A

Explanation:

The best evidence to determine whether transactions have been executed by authorized employees is audit trails. Audit trails are secure records that catalog events or procedures to provide support documentation.They are used to authenticate security and operational actions, mitigate challenges, or provide proof of compliance and operational integrity2. Audit trails can track and trace the following information related to transactions:

Who initiated, approved, modified, or deleted a transaction

When a transaction occurred (date and time)

Where a transaction took place (location or device)

What type of transaction was performed (action or operation)

Why a transaction was executed (purpose or reason)

By analyzing audit trails, an IS auditor can verify whether transactions have been executed by authorized employees or not. Audit trails can also identify any unauthorized, fraudulent, or erroneous transactions that may have occurred. Audit trails can also help to resolve any disputes or discrepancies that may arise from transactions.

What Is an Audit Trail? Everything You Need to Know

Total 1.198 questions
Go to page: of 120