itexamable.com

CISA Exam-Test 27

/30
206

CISA EXAM-TEST 27

1 / 30

1. The development of an IS security policy is ultimately the responsibility of the:

2 / 30

2. An IS auditor examining the security configuration of an operating system should review the:

3 / 30

3. An IS auditor finds that periodic reviews of read-only users for a reporting system are not being performed. Which of the following should be the IS auditor's NEXT course of action?

4 / 30

4. Vendors have released patches fixing security flaws in their software. Which of the following should an IS auditor recommend in this situation?

5 / 30

5. After discovering a security vulnerability in a third-party application that interfaces with several external systems, a patch is applied to a significant number of modules. Which of the following tests should an IS auditor recommend?

6 / 30

6. An IS auditor performing an application maintenance audit would review the log of program changes for the:

7 / 30

7. The FIRST step in the execution of a problem management mechanism should be:

8 / 30

8. Which of the following would BEST maintain the integrity of a firewall log?

9 / 30

9. Which of the following should be an IS auditor's GREATEST concern when a security audit
reveals the organization's vulnerability assessment approach is limited to running a vulnerability
scanner on its network?

10 / 30

10. Which of the following should an incident response team address FIRST after a major incident in an information processing facility?

11 / 30

11. Which of the following is the BEST way to confirm that a digital signature is valid?

12 / 30

12. Which of the following specifically addresses how to detect cyberattacks against an organization's IT systems and how to recover from an attack?

13 / 30

13. The PRIMARY objective of performing a postincident review is that it presents an opportunity to:

14 / 30

14. An IS auditor reviewing database controls discovered that changes to the database during normal working hours were handled through a standard set of procedures. However, changes made after normal hours required only an abbreviated number of steps. In this situation, which of the following would be considered an adequate set of compensating controls?

15 / 30

15. How is the risk of improper file access affected upon implementing a database system?

16 / 30

16. A programmer maliciously modified a production program to change data and then restored the original code. Which of the following would MOST effectively detect the malicious activity?

17 / 30

17. In a small organization, an employee performs computer operations and, when the situation demands, program modifications. Which of the following should the IS auditor recommend?

18 / 30

18. An IS auditor needs to review the procedures used to restore a software application to its state prior to an upgrade. Therefore, the auditor needs to assess:

19 / 30

19. Which of the following would an IS auditor consider to be MOST helpful when evaluating the effectiveness and adequacy of a preventive computer maintenance program?

20 / 30

20. Which of the following tests performed by an IS auditor would be the MOST effective in determining compliance with an organization's change control procedures?

21 / 30

21. An IS auditor is performing a review of a network, and users report that the network is slow and web pages periodically time out. The IS auditor confirms the users' feedback and reports the findings to the network manager. The most appropriate action for the network management team should be to FIRST:

22 / 30

22. An IS auditor is assigned to review the development of a specific application. Which of the
following would be the MOST significant step following the feasibility study?

23 / 30

23. Which of the following controls would be MOST effective in ensuring that production source code and object code are synchronized?

24 / 30

24. Which of the following is a MAJOR concern during a review of help desk activities?

25 / 30

25. An organization is in the process of deciding whether to allow a bring your own device
(BYOD) program. If approved, which of the following should be the FIRST control required before
implementation''

26 / 30

26. . Which of the following is the BEST way to address ongoing concerns with the quality and accuracy of internal audits?

27 / 30

27. An IS auditor is evaluating the effectiveness of the organization's change management process. What is the MOST important control that the IS auditor should look for to ensure system availability?

28 / 30

28. The MAIN criterion for determining the severity level of a service disruption incident is:

29 / 30

29. If an IS auditor finds evidence of risk involved in not implementing proper segregation of duties, such as having the security administrator perform an operations function, what is the auditor's primary responsibility?

30 / 30

30. An IS auditor has obtained a large complex data set for analysis. Which of the following
activities will MOST improve the output from the use of data analytics tools?