itexamable.com

CISA Exam-Test 12

/30
248

CISA EXAM-TEST 12

1 / 30

1. Which of the following is the PRIMARY objective of an IT performance measurement process?

2 / 30

2. An IS auditor performing an audit of the risk assessment process should FIRST confirm that:

3 / 30

3. Which of the following should be of MOST concern lo an IS auditor reviewing the public key
infrastructure (PKI) for enterprise email?

4 / 30

4. Which of the following is the key benefit of a control self-assessment (CSA)?

5 / 30

5. he PRIMARY benefit of implementing a security program as part of a security governance framework is the:

6 / 30

6. When developing a business continuity plan (BCP), which of the following tools should be used to gain an understanding of the organization's business processes?

7 / 30

7. After an organization completed a threat and vulnerability analysis as part of a risk assessment, the final report suggested that an intrusion prevention system (IPS) should be installed at the main Internet gateways, and that all business units should be separated via a proxy firewall. Which of the following is the BEST method to determine whether the controls should be implemented?

8 / 30

8. Assess the skill set within the security function

9 / 30

9. Which of the following statement INCORRECTLY describes the traditional audit approach in comparison to the Control self-assessment approach?

10 / 30

10. While reviewing the IT governance processes of an organization, an IS auditor discovers that the firm has recently implemented an IT balanced scorecard (BSC). The implementation is complete; however, the IS auditor notices that performance indicators are not objectively measurable. What is the PRIMARY risk presented by this situation?

11 / 30

11. Reconciliations have identified data discrepancies between an enterprise data warehouse
and a revenue system for key financial reports. What is the GREATEST risk to the organization in this
situation?

12 / 30

12. Which of the following is an attribute of the control self-assessment (CSA) approach?

13 / 30

13. Before implementing an IT balanced scorecard (BSC), an organization must:

14 / 30

14. An organization has a well-established risk management process. Which of the following risk management practices would MOST likely expose the organization to the greatest amount of compliance risk?

15 / 30

15. Which of the following must exist to ensure the viability of a duplicate information processing facility?

16 / 30

16. When an organization's disaster recovery plan (DRP) has a reciprocal agreement, which of the following risk treatment approaches is being applied?

17 / 30

17. During an audit, an IS auditor notices that the IT department of a medium-sized organization has no separate risk management function, and the organization's operational risk documentation only contains a few broadly described types of IT risk. What is the MOST appropriate recommendation in this situation?

18 / 30

18. What is the most effective means of determining that controls are functioning properly within an operating system?

19 / 30

19. An organization is deciding whether to outsource its customer relationship management
systems to a provider located in another country. Which of the following should be the PRIMARY
influence in the outsourcing decision?

20 / 30

20. As a driver of IT governance, transparency of IT's cost, value and risk is primarily achieved through:

21 / 30

21. An IS auditor is reviewing an IT security risk management program. Measures of security risk should:

22 / 30

22. which of the following type of testing uses a set of test cases that focus on the control structure of the procedural design?

23 / 30

23. Which of the following should be considered FIRST when implementing a risk management program?

24 / 30

24. Who is responsible for reviewing the result and deliverables within and at the end of each phase, as well as confirming compliance with requirements?

25 / 30

25. Which of the following insurance types provide for a loss arising from fraudulent acts by employees?

26 / 30

26. To address the risk of operations staff's failure to perform the daily backup, management requires that the systems administrator sign off on the daily backup. This is an example of risk:

27 / 30

27. Which of the following type of testing has two major categories: QAT and UAT?

28 / 30

28. Which of the following is the MOST reliable network connection medium in an environment
where there is strong electromagnetic interface?

29 / 30

29. A poor choice of passwords and unencrypted data transmissions over unprotected communications lines are examples of:

30 / 30

30. An IS auditor is reviewing the risk management process. Which of the following is the MOST important consideration during this review?

Jute Bags in Sharjah | Cotton Bags in Sharjah | Canvas Bags in Sharjah