itexamable.com

CISA Exam-Test 26

/30
211

CISA EXAM-TEST 26

1 / 30

1. During an audit of a small enterprise, the IS auditor noted that the IS director has superuser-privilege access that allows the director to process requests for changes to the application access roles (access types). Which of the following should the IS auditor recommend?

2 / 30

2. What can be used to help identify and investigate unauthorized transactions?

3 / 30

3. Which of the following is widely accepted as one of the critical components in networking management?

4 / 30

4. While reviewing the IT infrastructure, an IS auditor notices that storage resources are continuously being added. The IS auditor should:

5 / 30

5. When performing a database review, an IS auditor notices that some tables in the database are not normalized. The IS auditor should next:

6 / 30

6. Which of the following is the PRIMARY purpose of conducting follow-up audits for material
observations?

7 / 30

7. During the audit of a database server, which of the following would be considered the GREATEST exposure?

8 / 30

8. A benefit of quality of service (QoS) is that the:

9 / 30

9. Which of the following is the PRIMARY purpose of using data analytics when auditing an
enterprise resource planning (ERP) system for a large organization?

10 / 30

10. Which of the following controls will MOST effectively detect the presence of bursts of errors in network transmissions?

11 / 30

11. Which of the following is a network diagnostic tool that monitors and records network information?

12 / 30

12. Which of the following database controls would ensure that the integrity of transactions is maintained in an online transaction processing system's database?

13 / 30

13. During maintenance of a relational database, several values of the foreign key in a transaction table have been corrupted. The consequence is that:

14 / 30

14. Within the context of an IT-related governance framework, which type of organization
would be considered MOST mature?

15 / 30

15. An IS auditor finds the timeliness and depth of information regarding the organization's IT
projects varies based on which project manager is assigned. Which of the following
recommendations would be A MOST helpful in achieving predictable and repeatable project
management processes?

16 / 30

16. A review of wide area network (WAN) usage discovers that traffic on one communication line between sites, synchronously linking the master and standby database, peaks at 96 percent of the line capacity. An IS auditor should conclude that:

17 / 30

17. What is an edit check to determine whether a field contains valid data?

18 / 30

18. Which of the following would prevent accountability for an action performed, thus allowing nonrepudiation?

19 / 30

19. What often results in project scope creep when functional requirements are not defined as well as they could be?

20 / 30

20. A cyclic redundancy check (CRC) is commonly used to determine the:

21 / 30

21. When storing data archives off-site, what must be done with the data to ensure data completeness?

22 / 30

22. An IS auditor finds that the data warehouse query performance decreases significantly at certain times of the day. Which of the following controls would be MOST relevant for the IS auditor to review?

23 / 30

23. Online banking transactions are being posted to the database when processing suddenly comes to a halt. The integrity of the transaction processing is BEST ensured by:

24 / 30

24. An IS auditor analyzing the audit log of a database management system (DBMS) finds that some transactions were partially executed as a result of an error and have not been rolled back. Which of the following transaction processing features has been violated?

25 / 30

25. In a relational database with referential integrity, the use of which of the following keys would prevent deletion of a row from a customer table as long as the customer number of that row is stored with live orders on the orders table?

26 / 30

26. Business units are concerned about the performance of a newly implemented system. Which of the following should an IS auditor recommend?

27 / 30

27. Which of the following is MOST directly affected by network performance monitoring tools?

28 / 30

28. An organization's security policy mandates that all new employees must receive appropriate
security awareness training. Which of the following metrics would BEST assure compliance with this
policy?

29 / 30

29. A database administrator has detected a performance problem with some tables, which could be solved through denormalization. This situation will increase the risk of:

30 / 30

30. Which of the following security measures BEST ensures the integrity of information stored in a data warehouse?