Pass the Isaca Isaca Certification CISA Questions and answers with CertsForce

Viewing page 7 out of 9 pages
Viewing questions 301-350 out of questions
Questions # 301:

The charging method that effectively encourages the MOST efficient use of IS resources is:

Options:

A.

specific charges that can be tied back to specific usage.


B.

total utilization to achieve full operating capacity.


C.

residual income in excess of actual incurred costs.


D.

allocations based on the ability to absorb charges.


Expert Solution
Questions # 302:

A computer forensic audit is MOST relevant in which of the following situations?

Options:

A.

Inadequate controls in the IT environment


B.

Mismatches in transaction data


C.

Missing server patches


D.

Data loss due to hacking of servers


Expert Solution
Questions # 303:

Which of the following is an advantage of using agile software development methodology over the waterfall methodology?

Options:

A.

Less funding required overall


B.

Quicker deliverables


C.

Quicker end user acceptance


D.

Clearly defined business expectations


Expert Solution
Questions # 304:

With regard to resilience, which of the following is the GREATEST risk to an organization that has implemented a new critical system?

Options:

A.

A business impact analysis (BIA) has not been performed


B.

Business data is not sanitized in the development environment


C.

There is no plan for monitoring system downtime


D.

The process owner has not signed off on user acceptance testing (UAT)


Expert Solution
Questions # 305:

Which of the following is the BEST indication that there are potential problems within an organization's IT service desk function?

Options:

A.

Undocumented operating procedures


B.

Lack of segregation of duties


C.

An excessive backlog of user requests


D.

Lack of key performance indicators (KPIs)


Expert Solution
Questions # 306:

An IS auditor is reviewing a data conversion project Which of the following is the auditor's BEST recommendation prior to go-live?

Options:

A.

Review test procedures and scenarios


B.

Conduct a mock conversion test


C.

Establish a configuration baseline


D.

Automate the test scripts


Expert Solution
Questions # 307:

Which of the following findings should be of GREATEST concern to an IS auditor reviewing an organization s newly implemented online security awareness program'?

Options:

A.

Only new employees are required to attend the program


B.

Metrics have not been established to assess training results


C.

Employees do not receive immediate notification of results


D.

The timing for program updates has not been determined


Expert Solution
Questions # 308:

When auditing an organization's software acquisition process the BEST way for an IS auditor to understand the software benefits to the organization would be to review the

Options:

A.

feasibility study


B.

business case


C.

request for proposal (RFP)


D.

alignment with IT strategy


Expert Solution
Questions # 309:

An organization has recently moved to an agile model for deploying custom code to its in-house accounting software system. When reviewing the procedures in place for production code deployment, which of the following is the MOST significant security concern to address?

Options:

A.

Software vulnerability scanning is done on an ad hoc basis.


B.

Change control does not include testing and approval from quality assurance (QA).


C.

Production code deployment is not automated.


D.

Current DevSecOps processes have not been independently verified.


Expert Solution
Questions # 310:

Which of following is MOST important to determine when conducting a post-implementation review?

Options:

A.

Whether the solution architecture compiles with IT standards


B.

Whether success criteria have been achieved


C.

Whether the project has been delivered within the approved budget


D.

Whether lessons teamed have been documented


Expert Solution
Questions # 311:

Which of the following is the MOST effective method of destroying sensitive data stored on electronic media?

Options:

A.

Degaussing


B.

Random character overwrite


C.

Physical destruction


D.

Low-level formatting


Expert Solution
Questions # 312:

An IT balanced scorecard is PRIMARILY used for:

Options:

A.

evaluating the IT project portfolio


B.

measuring IT strategic performance


C.

allocating IT budget and resources


D.

monitoring risk in lT-related processes


Expert Solution
Questions # 313:

Which of the following is MOST important during software license audits?

Options:

A.

Judgmental sampling


B.

Substantive testing


C.

Compliance testing


D.

Stop-or-go sampling


Expert Solution
Questions # 314:

An auditee disagrees with a recommendation for corrective action that appears in the draft engagement report. Which of the following is the IS auditor's BEST course of action when preparing the final report?

Options:

A.

Come to an agreement prior to issuing the final report.


B.

Include the position supported by senior management in the final engagement report


C.

Ensure the auditee's comments are included in the working papers


D.

Exclude the disputed recommendation from the final engagement report


Expert Solution
Questions # 315:

Which of the following is the BEST indicator for measuring performance of IT help desk function?

Options:

A.

Percentage of problems raised from incidents


B.

Mean time to categorize tickets


C.

Number 0t incidents reported


D.

Number of reopened tickets


Expert Solution
Questions # 316:

Which of the following would be MOST impacted if an IS auditor were to assist with the implementation of recommended control enhancements?

Options:

A.

Independence


B.

Integrity


C.

Materiality


D.

Accountability


Expert Solution
Questions # 317:

An organization is concerned with meeting new regulations for protecting data confidentiality and asks an IS auditor to evaluate their procedures for transporting data. Which of the

following would BEST support the organization's objectives?

Options:

A.

Cryptographic hashes


B.

Virtual local area network (VLAN)


C.

Encryption


D.

Dedicated lines


Expert Solution
Questions # 318:

When reviewing a project to replace multiple manual data entry systems with an artificial intelligence (Al) system, the IS auditor should be MOST concerned with the impact Al will have on

Options:

A.

employee retention


B.

enterprise architecture (EA)


C.

future task updates


D.

task capacity output


Expert Solution
Questions # 319:

When planning an audit, it is acceptable for an IS auditor to rely on a third-party provider’s external audit report on service level management when the

Options:

A.

scope and methodology meet audit requirements


B.

service provider is independently certified and accredited


C.

report confirms that service levels were not violated


D.

report was released within the last 12 months


Expert Solution
Questions # 320:

Users are complaining that a newly released enterprise resource planning (ERP) system is functioning too slowly. Which of the following tests during the quality assurance (QA) phase would have identified this concern?

Options:

A.

Stress


B.

Regression


C.

Interface


D.

Integration


Expert Solution
Questions # 321:

Recovery facilities providing a redundant combination of Internet connections to the local communications loop is an example of which type of telecommunications continuity?

Options:

A.

Voice recovery


B.

Alternative routing


C.

Long-haul network diversity


D.

Last-mile circuit protection


Expert Solution
Questions # 322:

The use of control totals satisfies which of the following control objectives?

Options:

A.

Transaction integrity


B.

Processing integrity


C.

Distribution control


D.

System recoverability


Expert Solution
Questions # 323:

Which of the following should be of MOST concern to an IS auditor reviewing the information systems acquisition, development, and implementation process?

Options:

A.

Data owners are not trained on the use of data conversion tools.


B.

A post-implementation lessons-learned exercise was not conducted.


C.

There is no system documentation available for review.


D.

System deployment is routinely performed by contractors.


Expert Solution
Questions # 324:

When evaluating information security governance within an organization, which of the following findings should be of MOST concern to an IS auditor?

Options:

A.

The information security department has difficulty filling vacancies


B.

An information security governance audit was not conducted within the past year


C.

The data center manager has final sign-off on security projects


D.

Information security policies are updated annually


Expert Solution
Questions # 325:

Which of the following should be of GREATEST concern to an IS auditor conducting an audit of an organization that recently experienced a ransomware attack?

Options:

A.

Antivirus software was unable to prevent the attack even though it was properly updated


B.

The most recent security patches were not tested prior to implementation


C.

Backups were only performed within the local network


D.

Employees were not trained on cybersecurity policies and procedures


Expert Solution
Questions # 326:

Which of the following is the BEST testing approach to facilitate rapid identification of application interface errors?

Options:

A.

Integration testing


B.

Regression testing


C.

Automated testing


D.

User acceptance testing (UAT)


Expert Solution
Questions # 327:

Which of the following is the MOST important factor when an organization is developing information security policies and procedures?

Options:

A.

Consultation with security staff


B.

Inclusion of mission and objectives


C.

Compliance with relevant regulations


D.

Alignment with an information security framework


Expert Solution
Questions # 328:

Which of the following should be of GREATEST concern to an IS auditor assessing the effectiveness of an organization's vulnerability scanning program''

Options:

A.

Steps taken to address identified vulnerabilities are not formally documented


B.

Results are not reported to individuals with authority to ensure resolution


C.

Scans are performed less frequently than required by the organization's vulnerability scanning schedule


D.

Results are not approved by senior management


Expert Solution
Questions # 329:

The operations team of an organization has reported an IS security attack Which of the following should be the FIRST step for the security incident response team?

Options:

A.

Report results to management


B.

Document lessons learned


C.

Perform a damage assessment


D.

Prioritize resources for corrective action


Expert Solution
Questions # 330:

Which of the following BEST addresses the availability of an online store?

Options:

A.

RAID level 5 storage devices


B.

Online backups


C.

A mirrored site at another location


D.

Clustered architecture


Expert Solution
Questions # 331:

Controls related to authorized modifications to production programs are BEST tested by:

Options:

A.

tracing modifications from the original request for change forward to the executable program.


B.

tracing modifications from the executable program back to the original request for change.


C.

testing only the authorizations to implement the new program.


D.

reviewing only the actual lines of source code changed in the program.


Expert Solution
Questions # 332:

An IS auditor finds that while an organization's IT strategy is heavily focused on research and development, the majority of protects n the IT portfolio focus on operations and maintenance. Which of the Mowing is the BEST recommendation?

Options:

A.

Align the IT strategy will business objectives


B.

Review priorities in the IT portfolio


C.

Change the IT strategy to focus on operational excellence.


D.

Align the IT portfolio with the IT strategy.


Expert Solution
Questions # 333:

An organization implemented a cybersecurity policy last year Which of the following is the GREATE ST indicator that the policy may need to be revised?

Options:

A.

A significant increase in authorized connections to third parties


B.

A significant increase in cybersecurity audit findings


C.

A significant increase in approved exceptions


D.

A significant increase in external attack attempts


Expert Solution
Questions # 334:

An organization is planning to implement a work-from-home policy that allows users to work remotely as needed. Which of the following is the BEST solution for ensuring secure remote access to corporate resources?

Options:

A.

Additional firewall rules


B.

Multi-factor authentication


C.

Virtual private network (VPN)


D.

Virtual desktop


Expert Solution
Questions # 335:

When testing the accuracy of transaction data, which of the following situations BEST justifies the use of a smaller sample size?

Options:

A.

The IS audit staff has a high level of experience.


B.

It is expected that the population is error-free.


C.

Proper segregation of duties is in place.


D.

The data can be directly changed by users.


Expert Solution
Questions # 336:

Which of the following is the BEST indication of effective IT investment management?

Options:

A.

IT investments are implemented and monitored following a system development life cycle (SDLC)


B.

IT investments are mapped to specific business objectives


C.

Key performance indicators (KPIs) are defined for each business requiring IT Investment


D.

The IT Investment budget is significantly below industry benchmarks


Expert Solution
Questions # 337:

The PRIMARY purpose of requiring source code escrow in a contractual agreement is to:

Options:

A.

comply with vendor management policy


B.

convert source code to new executable code.


C.

satisfy regulatory requirements.


D.

ensure the source code is available.


Expert Solution
Questions # 338:

Which of the following should be the FIRST step to successfully implement a corporate data classification program?

Options:

A.

Approve a data classification policy.


B.

Select a data loss prevention (DLP) product.


C.

Confirm that adequate resources are available for the project.


D.

Check for the required regulatory requirements.


Expert Solution
Questions # 339:

Which of the following is the GREATEST benefit of adopting an international IT governance framework rather than establishing a new framework based on the actual situation of a specific organization1?

Options:

A.

Readily available resources such as domains and risk and control methodologies


B.

Comprehensive coverage of fundamental and critical risk and control areas for IT governance


C.

Fewer resources expended on trial-and-error attempts to fine-tune implementation methodologies


D.

Wide acceptance by different business and support units with IT governance objectives


Expert Solution
Questions # 340:

An IS auditor is asked to review an organization's technology relationships, interfaces, and data. Which of the following enterprise architecture (EA) areas is MOST appropriate this review? (Choose Correct answer and give explanation from CISA Certification - Information Systems Auditor official book)

Options:

A.

Reference architecture


B.

Infrastructure architecture


C.

Information security architecture


D.

Application architecture


Expert Solution
Questions # 341:

Which of the following is the BEST indication to an IS auditor that management's post-implementation review was effective?

Options:

A.

Lessons learned were documented and applied.


B.

Business and IT stakeholders participated in the post-implementation review.


C.

Post-implementation review is a formal phase in the system development life cycle (SDLC).


D.

Internal audit follow-up was completed without any findings.


Expert Solution
Questions # 342:

An IS department is evaluated monthly on its cost-revenue ratio user satisfaction rate, and computer downtime This is BEST zed as an application of.

Options:

A.

risk framework


B.

balanced scorecard


C.

value chain analysis


D.

control self-assessment (CSA)


Expert Solution
Questions # 343:

A vendor requires privileged access to a key business application. Which of the following is the BEST recommendation to reduce the risk of data leakage?

Options:

A.

Implement real-time activity monitoring for privileged roles


B.

Include the right-to-audit in the vendor contract


C.

Perform a review of privileged roles and responsibilities


D.

Require the vendor to implement job rotation for privileged roles


Expert Solution
Questions # 344:

Which of the following is the MOST efficient solution for a multi-location healthcare organization that wants to be able to access patient data wherever patients present themselves

for care?

Options:

A.

Infrastructure as a Service (laaS) provider


B.

Software as a Service (SaaS) provider


C.

Network segmentation


D.

Dynamic localization


Expert Solution
Questions # 345:

Which of the following BEST protects evidence in a forensic investigation?

Options:

A.

imaging the affected system


B.

Powering down the affected system


C.

Protecting the hardware of the affected system


D.

Rebooting the affected system


Expert Solution
Questions # 346:

As part of business continuity planning, which of the following is MOST important to assess when conducting a business impact analysis (B1A)?

Options:

A.

Risk appetite


B.

Critical applications m the cloud


C.

Completeness of critical asset inventory


D.

Recovery scenarios


Expert Solution
Questions # 347:

Which of the following areas is MOST likely to be overlooked when implementing a new data classification process?

Options:

A.

End-user computing (EUC) systems


B.

Email attachments


C.

Data sent to vendors


D.

New system applications


Expert Solution
Questions # 348:

During a database management evaluation an IS auditor discovers that some accounts with database administrator (DBA) privileges have been assigned a default password with an unlimited number of failed login attempts Which of the following is the auditor's BEST course of action?

Options:

A.

Identify accounts that have had excessive failed login attempts and request they be disabled


B.

Request the IT manager to change administrator security parameters and update the finding


C.

Document the finding and explain the risk of having administrator accounts with inappropriate security settings


Expert Solution
Questions # 349:

Following a breach, what is the BEST source to determine the maximum amount of time before customers must be notified that their personal information may have been compromised?

Options:

A.

Industry regulations


B.

Industry standards


C.

Incident response plan


D.

Information security policy


Expert Solution
Questions # 350:

Which of the following risk scenarios is BEST addressed by implementing policies and procedures related to full disk encryption?

Options:

A.

Data leakage as a result of employees leaving to work for competitors


B.

Noncompliance fines related to storage of regulated information


C.

Unauthorized logical access to information through an application interface


D.

Physical theft of media on which information is stored


Expert Solution
Viewing page 7 out of 9 pages
Viewing questions 301-350 out of questions