itexamable.com

CISA Exam-Test 2

0%
822

CISA Exam-Test 2

1 / 30

1. Which of the following should the IS auditor do FIRST to ensure data transfer integrity for Internet of Things (IoT) devices?

2 / 30

2. The practice of periodic secure code reviews is which type of control?

3 / 30

3. An IS auditor is conducting a compliance test to determine whether controls support management policies and procedures. The test will assist the IS auditor to determine:

4 / 30

4. The extent to which data will be collected during an IS audit should be determined based on the:

5 / 30

5. An IS auditor reviews an organizational chart PRIMARILY for:

6 / 30

6. A vendor service level agreement (SLA) requires backups to be physically secured. An IS audit of the backup system revealed a number of the backup media

7 / 30

7. Which of the following is the GREATEST security risk associated with data migration from a
legacy human resources (HR) system to a cloud-based system''

8 / 30

8. An IS auditor reviews one day of logs for a remotely managed server and finds one case where logging failed and the backup restarts cannot be confirmed. What should the IS auditor do?

9 / 30

9. An IS auditor has been asked by management to review a potentially fraudulent transaction. The PRIMARY focus of an IS auditor while evaluating the transaction should be to:

10 / 30

10. Which of the following should be an IS auditor's GREATEST concern when reviewing an
outsourcing arrangement with a third-party cloud service provider to host personally identifiable

11 / 30

11. An IS auditor should use statistical sampling and not judgmental (nonstatistical) sampling, when:

12 / 30

12. The scheduling of audit follow-ups should be based PRIMARILY on:

13 / 30

13. Data flow diagrams are used by IS auditors to:

14 / 30

14. While planning an IS audit, an assessment of risk should be made to provide:

15 / 30

15. An IS auditor performing a review of application controls would evaluate the:

16 / 30

16. When planning an application audit, it is MOST important to evaluate risk factors by interviewing:

17 / 30

17. The PRIMARY purpose of an IT forensic audit is:

18 / 30

18. The PRIMARY reason an IS auditor performs a functional walk-through during the preliminary phase of an audit assignment is to:

19 / 30

19. An IS auditor has identified a business process to be audited. The IS auditor should NEXT identify the:

20 / 30

20. During a review of operations, it is noted that during a batch update, an error was detected
and the database initiated a roll-back. An IT operator stopped the roll-back and re-initiated the
update. What should the operator have done PRIOR to re-initiating the update?

21 / 30

21. During a change control audit of a production system, an IS auditor finds that the change management process is not formally documented and that some migration procedures failed. What should the IS auditor do next?

22 / 30

22. Which of the following is an advantage of an integrated test facility (ITF)?

23 / 30

23. An IS auditor evaluating logical access controls should FIRST:

24 / 30

24. Which of the following is MOST important for an IS auditor to evaluate when determining the effectiveness of an information security program?

25 / 30

25. During the planning stage of an IS audit, the PRIMARY goal of an IS auditor is to:

26 / 30

26. Which of the following should be of GREATEST concern to an IS auditor testing interface
controls for an associated bank wire transfer process?

27 / 30

27. Which audit technique provides the BEST evidence of the segregation of duties in an IT department?

28 / 30

28. In planning an IS audit, the MOST critical step is the identification of the:

29 / 30

29. When selecting audit procedures, an IS auditor should use professional judgment to ensure that:

30 / 30

30. Which of the following BEST describes the purpose of performing a risk assessment in the planning phase of an IS audit?

Canvas Bags in Dubai | Canvas Bags in UAE | Canvas Bags in Sharjah