itexamable.com

CISA Exam-Test 17

/30
215

CISA EXAM-TEST 17

1 / 30

1. An IS auditor assesses the project management process for an internal software development project. In respect to the software functionality, the IS auditor should look for sign-off by:

2 / 30

2. Which of the following cryptography demands less computational power and offers more security per bit?

3 / 30

3. The GREATEST risk of database denormalization is:

4 / 30

4. Information for detecting unauthorized input from a user workstation would be BEST provided by the:

5 / 30

5. Which of the following would BEST help to detect errors in data processing?

6 / 30

6. An IS auditor reviewing a series of completed projects finds that the implemented functionality often exceeded requirements and most of the projects ran significantly over budget. Which of these areas of the organization's project management process is the MOST likely cause of this issue?

7 / 30

7. The editing/validation of data entered at a remote site would be performed MOST effectively at the:

8 / 30

8. There are many known weaknesses within an Intrusion Detection System (IDS). Which of the following is NOT a limitation of an IDS?

9 / 30

9. During the audit of an acquired software package, an IS auditor finds that the software purchase was based on information obtained through the Internet, rather than from responses to a request for proposal (RFP). The IS auditor should FIRST:

10 / 30

10. Which of the following is the most important element in the design of a data warehouse?

11 / 30

11. The PRIMARY purpose of audit trails is to:

12 / 30

12. The objective of a vulnerability identification step in a risk assessment process is to.

13 / 30

13. Which of the following data validation edits is effective in detecting transposition and transcription errors?

14 / 30

14. Before implementing controls in a newly developed system, management should PRIMARILY ensure that the controls:

15 / 30

15. An IS auditor invited to a project development meeting notes that no project risk has been documented. When the IS auditor raises this issue, the project manager responds that it is too early to identify risk and that, if risk starts impacting the project, a risk manager will be hired. The appropriate response of the IS auditor would be to:

16 / 30

16. Which of the following functionality is NOT performed by the application layer of a TCP/IP model?

17 / 30

17. Which of the following comparisons are used for identification and authentication in a biometric system?

18 / 30

18. When reviewing an organization's data protection practices, an IS auditor should be MOST
concerned with a lack of

19 / 30

19. The phases and deliverables of a system development life cycle (SDLC) project should be determined:

20 / 30

20. Which of the following techniques would BEST help an IS auditor gain reasonable assurance that a project can meet its target date?

21 / 30

21. Which of the following group is MOST likely responsible for the implementation of IT
projects?

22 / 30

22. Which of the following is the BEST guidance from an IS auditor to an organization planning an
initiative to improve the effectiveness of its IT processes?

23 / 30

23. A failure discovered in which of the following testing stages would have the GREATEST impact on the implementation of new application software?

24 / 30

24. When reviewing a project where quality is a major concern, an IS auditor should use the project management triangle to explain that:

25 / 30

25. When implementing an application software package, which of the following presents the GREATEST risk?

26 / 30

26. Which of the following cryptography is based on practical application of the characteristics of the smallest “grains” of light, the photon, the physical laws governing their generation and propagation and detection?

27 / 30

27. A project manager for a project that is scheduled to take 18 months to complete announces that the project is in a healthy financial position because, after six months, only one-sixth of the budget has been spent. The IS auditor should FIRST determine:

28 / 30

28. Ideally, stress testing should be carried out in a:

29 / 30

29. The purpose of a checksum on an amount field in an electronic data interchange (EDI) communication of financial transactions is to ensure:

30 / 30

30. Which of the following would be the MOST cost-effective recommendation for reducing the number of defects encountered during software development projects?

Customized Jute Bags in Dubai | Customized Jute Bags in Sharjah