Pass the Isaca Isaca Certification CISA Questions and answers with CertsForce

Viewing page 9 out of 9 pages
Viewing questions 401-450 out of questions
Questions # 401:

Which of the following is MOST important for an IS auditor to validate when reviewing the controls for an organization's quality management system (QMS)?

Options:

A.

Whether root cause analysis is performed on all failed and rejected changes


B.

Whether critical services are delivered in a timely and sustainable manner


C.

Whether there is a process to monitor continuous improvement areas and necessary targets


D.

Whether the organization follows an industry-recognized service management framework


Expert Solution
Questions # 402:

An IS auditor has been asked to review the quality of data in a general ledger system. Which of the following would provide the auditor with the MOST meaningful results?

Options:

A.

Discussion of the largest account values with business owners


B.

Integrity checks against source documentation


C.

System vulnerability assessment


D.

Interviews with system owners and operators


Expert Solution
Questions # 403:

Which of the following should be the PRIMARY focus when communicating an IS audit issue to management?

Options:

A.

The risk to which the organization is exposed due to the issue


B.

The nature, extent, and timing of subsequent audit follow-up


C.

How the issue was found and who bears responsibility


D.

A detailed solution for resolving the issue


Expert Solution
Questions # 404:

An organization has replaced its call center with Al chatbots that autonomously learn new responses through internet queries and customer conversation history. Which of the following would an IS auditor tasked with verifying IT controls consider to be the GREATEST risk?

Options:

A.

The model may not result in expected efficiencies.


B.

The model's operations may be difficult for the IT team to document.


C.

The model may not generate accurate responses due to overfitting.


D.

It may be difficult to audit the model due to the lack of a suitable framework.


Expert Solution
Questions # 405:

Which of the following would be MOST helpful to an IS auditor performing a risk assessment of an application programming interface (API) that feeds credit scores from a well-known commercial credit agency into an organizational system?

Options:

A.

A data dictionary of the transferred data


B.

A technical design document for the interface configuration


C.

The most recent audit report from the credit agency


D.

The approved business case for the API


Expert Solution
Questions # 406:

The PRIMARY role of an IS auditor in the remediation of problems found during an audit engagement is to:

Options:

A.

help auditee management by providing the solution.


B.

explain the findings and provide general advice.


C.

present updated policies to management for approval.


D.

take ownership of the problems and oversee remediation efforts.


Expert Solution
Questions # 407:

Which of the following can BEST reduce the impact of a long-term power failure?

Options:

A.

Power conditioning unit


B.

Emergency power-off switches


C.

Battery bank


D.

Redundant power source


Expert Solution
Questions # 408:

Which of the following recommendations would BEST prevent the implementation of IT projects without collaborating with the business?

Options:

A.

Partner with the business units to evaluate IT projects.


B.

Review the projects to identify similarities and eliminate duplication.


C.

Periodically review the projects' return on investment (ROI).


D.

Prioritize protects based on business and IT resource availability.


Expert Solution
Questions # 409:

Which of the following should be of MOST concern to an IS auditor reviewing an organization’s business impact analysis (BIA)?

Options:

A.

A risk assessment was not conducted prior to completing the BIA.


B.

System criticality information was only provided by the IT manager.


C.

A questionnaire was used to gather information as opposed to in-person interviews.


D.

The BIA was not signed off by executive management.


Expert Solution
Questions # 410:

An IS auditor can BEST evaluate the business impact of system failures by:

Options:

A.

assessing user satisfaction levels.


B.

interviewing the security administrator.


C.

analyzing equipment maintenance logs.


D.

reviewing system-generated logs.


Expert Solution
Questions # 411:

Which of the following approaches BEST enables an IS auditor to detect security vulnerabilities within an application?

Options:

A.

Threat modeling


B.

Concept mapping


C.

Prototyping


D.

Threat intelligence


Expert Solution
Questions # 412:

Which of the following security measures will reduce the risk of propagation when a cyberattack occurs?

Options:

A.

Perimeter firewall


B.

Data loss prevention (DLP) system


C.

Network segmentation


D.

Web application firewall (WAF)


Expert Solution
Questions # 413:

Which of the following provides the BEST evidence that IT portfolio management is aligned with organizational strategies?

Options:

A.

Finance committee minutes that include approval for the annual IT budget


B.

Project sponsor sign-off on all project documents from beginning to end


C.

IT steering committee minutes that include approval for prioritization of IT projects


D.

Project sponsor sign-off on IT project proposals and milestones


Expert Solution
Questions # 414:

Which of the following BEST indicates that the effectiveness of an organization's security awareness program has improved?

Options:

A.

A decrease in the number of information security audit findings


B.

An increase in the number of staff who complete awareness training


C.

An increase in the number of phishing emails reported by employees


D.

A decrease in the number of malware outbreaks


Expert Solution
Questions # 415:

An organization has moved all of its infrastructure to the cloud. Which of the following would be an IS auditor’s GREATEST concern related to the organization’s ability to continue operations in case of a disaster?

Options:

A.

There is no evidence that disaster recovery plan (DRP) testing was performed after the migration.


B.

Only business-critical servers were configured with redundancy services on the cloud service provider.


C.

The previous infrastructure was not retained to support business operations in case of a disaster.


D.

The step-by-step recovery process was not updated in the disaster recovery plan (DRP) after the migration.


Expert Solution
Questions # 416:

An organization has alternative links in its wide area network (WAN) to provide redundancy. However, each time there is a problem with a link, network administrators have to update the configuration to divert traffic to the other link. Which of the following would be an IS auditor's BEST recommendation?

Options:

A.

Reduce the number of alternative links.


B.

Implement a load-balancing mechanism.


C.

Configure a non-proprietary routing protocol.


D.

Implement an exterior routing protocol.


Expert Solution
Questions # 417:

Which of the following approaches would present the GREATEST concern for the implementation of a quality assurance (QA) function?

Options:

A.

Developers introducing the changes will review the work, as they are most familiar with them.


B.

Peer developers from the same development team who are unfamiliar with the changes will review them.


C.

Developers from a separate development team in the organization will review the submitted changes.


D.

Reviewers outside the development group who do not have development roles will review the changes.


Expert Solution
Questions # 418:

Which of the following would BEST prevent an arbitrary application of a patch?

Options:

A.

Database access control


B.

Established maintenance windows


C.

Network based access controls


D.

Change management


Expert Solution
Questions # 419:

Which of the following applications has the MOST inherent risk and should be prioritized during audit planning?

Options:

A.

A decommissioned legacy application


B.

An onsite application that is unsupported


C.

An outsourced accounting application


D.

An internally developed application


Expert Solution
Questions # 420:

Which of the following is an objective of IT project portfolio management?

Options:

A.

Successful implementation of projects


B.

Selection of sound, strategically aligned investment opportunities


C.

Validation of business case benefits


D.

Establishment of tracking mechanisms


Expert Solution
Questions # 421:

During a pre-implementation review, an IS auditor notes that some scenarios have not been tested. Management has indicated that the project is critical and cannot be postponed. Which of the following is the auditor's BEST course of action?

Options:

A.

Determine whether the tested scenarios covered the most significant project risks.


B.

Help management complete remaining scenario testing before implementation.


C.

Recommend project implementation be postponed until all scenarios have been tested.


D.

Perform remaining scenario testing in the production environment post implementation.


Expert Solution
Questions # 422:

Which of the following responsibilities associated with a disaster recovery plan (DRP) can be outsourced to a Disaster Recovery as a Service (DRaaS) provider?

Options:

A.

System recovery procedures


B.

Stakeholder communications during a disaster


C.

Validation of recovered data


D.

Processes for maintaining currency of data


Expert Solution
Viewing page 9 out of 9 pages
Viewing questions 401-450 out of questions