itexamable.com

CISA Exam-Test 23

/30
195

CISA EXAM-TEST 23

1 / 30

1. The PRIMARY objective of conducting a postimplementation review for a business process automation project is to:

2 / 30

2. Responsibility and reporting lines cannot always be established when auditing automated systems because:

3 / 30

3. Which of the following should be of MOST concern to an IS auditor during the review of a
quality management system?

4 / 30

4. What is essential for the IS auditor to obtain a clear understanding of network management?

5 / 30

5. Which of the following procedures would MOST effectively detect the loading of illegal software packages onto a network?

6 / 30

6. Once an organization has finished the business process reengineering (BPR) of all its critical operations, an IS auditor would MOST likely focus on a review of:

7 / 30

7. Which of the following best characterizes "worms"?

8 / 30

8. An IS auditor is reviewing database log settings and notices that only INSERT and DELETE
operations are being monitored in the database. What is the MOST significant risk?

9 / 30

9. An organization has outsourced its help desk function. Which of the following indicators would be the BEST to include in the service level agreement (SLA)?

10 / 30

10. A financial institution that processes millions of transactions each day has a central communications processor (switch) for connecting to automated teller machines (ATMs). Which of the following would be the BEST contingency plan for the communications processor?

11 / 30

11. An organization is considering using a new IT service provider. From an audit perspective, which of the following would be the MOST important item to review?

12 / 30

12. Which audit approach is MOST helpful in optimizing the use of IS audit resources?

13 / 30

13. An IS auditor should ensure that review of online electronic funds transfer (EFT) reconciliation procedures should include:

14 / 30

14. Which of the following BEST minimizes performance degradation of servers used to
authenticate users of an e-commerce website?

15 / 30

15. An IS auditor is to assess the suitability of a service level agreement (SLA) between the organization and the supplier of outsourced services. To which of the following observations should the IS auditor pay the MOST attention? The SLA does not contain a:

16 / 30

16. What benefit does using capacity-monitoring software to monitor usage patterns and trends provide to management?

17 / 30

17. Which of the following BEST reduces the ability of one device to capture the packets that are meant for another device?

18 / 30

18. Management considered two projections for its disaster recovery plan (DRP): plan A with two months to fully recover and plan B with eight months to fully recover. The recovery point objectives are the same in both plans. It is reasonable to expect that plan B projected higher:

19 / 30

19. Which of the following is often used as a detection and deterrent control against Internet attacks?

20 / 30

20. Which of the following BEST helps an IS auditor assess and measure the value of a newly implemented system?

21 / 30

21. An IS auditor evaluating the resilience of a high-availability network should be MOST concerned if:

22 / 30

22. An advantage of using unshielded twisted-pair (UTP) cable for data communication over other copper-based cables is that UTP cable:

23 / 30

23. An IS auditor reviewing a new outsourcing contract with a service provider would be MOST concerned if which of the following was missing?

24 / 30

24. There are several methods of providing telecommunication continuity. The method of routing traffic through split cable or duplicate cable facilities is called:

25 / 30

25. What are often the primary safeguards for systems software and data?

26 / 30

26. Which of the following reports should an IS auditor use to check compliance with a service level agreement's (SLA) requirement for uptime?

27 / 30

27. The BEST way to validate whether a malicious act has actually occurred in an application is
to review.

28 / 30

28. When reviewing the configuration of network devices, an IS auditor should FIRST identify:

29 / 30

29. When reviewing an organization's approved software product list, which of the following is the MOST important thing to verify?

30 / 30

30. When two or more systems are integrated, the IS auditor must review input/output controls in the: