itexamable.com

CISA Exam-Test 1

0%

1858



CISA Exam-Test 1



1 / 30

1. Which of the following is the FIRST step performed prior to creating a risk ranking for the annual internal IS audit plan?











2 / 30

2. After the release of an application system, an IS auditor wants to verify that the system is providing value to the organization. The auditor’s BEST course of action
would be to:











3 / 30

3. Which of the following situations could impair the independence of an IS auditor? The IS auditor:











4 / 30

4. An organization transmits large amount of data from one internal system to another. The IS
auditor is reviewing quality of the data at the originating point. Which of the following should the
auditor verify first?











5 / 30

5. For a retail business with a large volume of transactions, which of the following audit techniques is the MOST appropriate for addressing emerging risk?











6 / 30

6. An organization’s IS audit charter should specify the:











7 / 30

7. An IS auditor discovers a recurring software control process issue that severely impacts the efficiency of a critical business process. Which of the following is the
BEST recommendation?











8 / 30

8. Following a security breach in which a hacker exploited a well-known vulnerability in the domain controller, an IS auditor has been asked to conduct a control assessment. The auditor’s BEST course of action would be to determine if:











9 / 30

9. Which of the following is the MOST critical step when planning an IS audit?











10 / 30

10. When developing a risk-based audit strategy, an IS auditor should conduct a risk assessment to ensure that:











11 / 30

11. To ensure that audit resources deliver the best value to the organization, the FIRST step would be to:











12 / 30

12. An IS auditor finds that corporate mobile devices used by employees have varying levels of password settings. Which of the following would be the BEST
recommendation?











13 / 30

13. Which of the following should be of GREATEST concern to an IS auditor conducting an audit of an organization’s backup processes?











14 / 30

14. A PRIMARY benefit derived for an organization employing control self-assessment (CSA) techniques is that it:











15 / 30

15. The PRIMARY advantage of a continuous audit approach is that it:











16 / 30

16. The internal audit department has written some scripts that are used for continuous auditing of some information systems. The IT department has asked for copies of the scripts so that they can use them for setting up a continuous monitoring process on key systems. Would sharing these scripts with IT affect the ability of the IS auditors to independently and objectively audit the IT function?











17 / 30

17. An IS auditor discovers that devices connected to the network have not been included in a network diagram that had been used to develop the scope of the audit. The chief information officer (CIO) explains that the diagram is being updated and awaiting final approval. The IS auditor should FIRST:











18 / 30

18. An IS auditor is evaluating management’s risk assessment of information systems. The IS auditor should FIRST review:











19 / 30

19. An IS auditor is reviewing a software application that is built on the principles of service-oriented architecture (SOA). What is the INITIAL step?











20 / 30

20. The MOST appropriate action for an IS auditor to take when shared user accounts are discovered is to:











21 / 30

21. An organization allows its employees to use personal mobile devices for work. Which of the
following would BEST maintain information security without compromising employee privacy?











22 / 30

22. The decisions and actions of an IS auditor are MOST likely to affect which of the following types of risk?











23 / 30

23. An IS auditor is developing an audit plan for an environment that includes new systems. The company’s management wants the IS auditor to focus on recently implemented systems. How should the IS auditor respond?











24 / 30

24. An IS auditor reviewing the system development life cycle (SDLC) finds there is no requirement
for business cases. Which of the following should be of GREATEST concern to the organization?











25 / 30

25. Which of the following responsibilities would MOST likely compromise the independence of an IS auditor when reviewing the risk management process?











26 / 30

26. The BEST method an organization can employ to align its business continuity plan (BCP) and
disaster recovery plan (DRP) with core business needs is to:











27 / 30

27. Which of the following is the BEST factor for determining the required extent of data collection during the planning phase of an IS compliance audit?











28 / 30

28. An IS auditor analyzing the audit log of a database management system (DBMS) finds that some transactions were partially executed as a result of an error and have not been rolled back. Which of the following transaction processing features has been violated?











29 / 30

29. An audit charter should:











30 / 30

30. An internal IS audit function is planning a general IS audit. Which of the following activities takes place during the FIRST step of the planning phase?















Juco Bags in Dubai, Juco Bags in UAE, Juco Bags in Sharjah