itexamable.com

CISA Exam-Test 8

/30
330

CISA EXAM-TEST 8

1 / 30

1. An IS audit reveals an organization's IT department reports any deviations from its security
standards to an internal IT risk committee involving IT senior management. Which of the following
should be the IS auditor's GREATEST concern?

2 / 30

2. Which of the following would an IS auditor consider the MOST relevant to short-term planning for an IT department?

3 / 30

3. Which of the following would an IS auditor consider to be the MOST important when evaluating an organization's IT strategy? That it:

4 / 30

4. Which of the following goals would you expect to find in an organization's strategic plan?

5 / 30

5. When reviewing an organization's strategic IT plan, an IS auditor should expect to find:

6 / 30

6. To help ensure the accuracy and completeness of end-user computing output, it is MOST important to include strong:

7 / 30

7. Which of the following is the BEST approach to identify whether a vulnerability is actively being exploited?

8 / 30

8. An IS auditor is performing a review of the software quality management process in an organization. The FIRST step should be to:

9 / 30

9. Which of the following is the GREATEST risk of an inadequate policy definition for ownership of data and systems?

10 / 30

10. The MOST important point of consideration for an IS auditor while reviewing an enterprise's project portfolio is that it:

11 / 30

11. When auditing the IT governance framework and IT risk management practices that exist within an organization, the IS auditor identified some undefined responsibilities regarding IT management and governance roles. Which of the following recommendations is the MOST appropriate?

12 / 30

12. What is the MOST effective way to ensure security policies and procedures are up-to-date?

13 / 30

13. Which of the following is the MOST effective means of helping management and the IT
strategy committee to monitor IT performance?

14 / 30

14. The PRIMARY focus of audit follow-up reports should be to:

15 / 30

15. The rate of change in technology increases the importance of:

16 / 30

16. Which of the following is the BEST enabler for strategic alignment between business and IT?

17 / 30

17. Which of the following is the BEST reason to implement a policy which places conditions on secondary employment for IT employees?

18 / 30

18. When reviewing the IT strategic planning process, an IS auditor should ensure that the plan:

19 / 30

19. An IS auditor reviewing an organization's IT strategic plan should FIRST review:

20 / 30

20. An IS auditor finds that not all employees are aware of the enterprise's information security policy. The IS auditor should conclude that:

21 / 30

21. A security company and service provider have merged and the CEO has requested one
comprehensive set of security policies be developed for the newly formed company. The IS auditor s
BEST recommendation would be to:

22 / 30

22. An IS auditor is verifying IT policies and found that some of the policies have not been approved by management (as required by policy), but the employees strictly follow the policies. What should the IS auditor do FIRST?

23 / 30

23. Which of the following controls should be implemented to BEST minimize system downtime for maintenance?

24 / 30

24. When reviewing the IT strategy, an IS auditor can BEST assess whether the strategy supports the organizations' business objectives by determining whether IT:

25 / 30

25. Effective IT governance will ensure that the IT plan is consistent with the organization's:

26 / 30

26. When auditing the archiving of the company's email communications, the IS auditor should pay the MOST attention to:

27 / 30

27. An e-commerce enterprise's disaster recovery (DR) site has 30% less processing capability
than the primary site. Based on this information, which of the following presents the GREATEST risk?

28 / 30

28. An organization's senior management is encouraging employees to use social media for promotional purposes. Which of the following should be the information security manager's FIRST step to support this strategy

29 / 30

29. To aid management in achieving IT and business alignment, an IS auditor should recommend the use of:

30 / 30

30. An IS auditor has been assigned to review an organization's information security policy. Which of the following issues represents the HIGHEST potential risk?