itexamable.com

CISA Exam-Test 11

/30
278

CISA EXAM-TEST 11

1 / 30

1. Assessing IT risk is BEST achieved by:

2 / 30

2. Which of the following is a corrective control that reduces the impact of a threat event?

3 / 30

3. With respect to the outsourcing of IT services, which of the following conditions should be of GREATEST concern to an IS auditor?

4 / 30

4. The MOST important function of a business continuity plan is to:ensure that all business functions are restored

5 / 30

5. When conducting an IT security risk assessment, the IS auditor asked the IT security officer to participate in a risk identification workshop with users and business unit representatives. What is the MOST important recommendation that the IS auditor should make to obtain successful results and avoid future conflicts?

6 / 30

6. While conducting an IS audit of a service provider for a government program involving confidential information, an IS auditor noted that the service provider delegated a part of the IS work to another subcontractor. Which of the following provides the MOST assurance that the requirements for protecting confidentiality of information are met?

7 / 30

7. Overall quantitative business risk for a particular threat can be expressed as:

8 / 30

8. Which of the following Is the MOST effective way for an IS auditor to evaluate whether an
organization is well positioned to defend against an advanced persistent threat (APT)?

9 / 30

9. A financial institution suspects that a manager has been crediting customer accounts without
authorization.
Which of the following is the MOST effective method to validate this concern?

10 / 30

10. Which device acting as a translator is used to connect two networks or applications from layer 4 up to layer 7 of the ISO/OSI Model?

11 / 30

11. Which of the following is the MOST important IS audit consideration when an organization outsources a customer credit review system to a third-party service provider? The provider:

12 / 30

12. A team conducting a risk analysis is having difficulty projecting the financial losses that could result from a risk. To evaluate the potential impact, the team should:

13 / 30

13. An IS auditor is reviewing a contract management process to determine the financial viability of a software vendor for a critical business application. An IS auditor should determine whether the vendor being considered:

14 / 30

14. An IS auditor was hired to review e-business security. The IS auditor's first task was to examine each existing e-business application, looking for vulnerabilities. What would be the next task?

15 / 30

15. Establishing the level of acceptable risk is the responsibility of:

16 / 30

16. An IS auditor observes that an enterprise has outsourced software development to a third party that is a startup company. To ensure that the enterprise's investment in software is protected, which of the following should be recommended by the IS auditor?

17 / 30

17. While conducting an audit of a service provider, an IS auditor observes that the service provider has outsourced a part of the work to another provider. Because the work involves confidential information, the IS auditor's PRIMARY concern should be that the:

18 / 30

18. Which of the following is the MOST important for an IS auditor to consider when reviewing a service level agreement (SLA) with an external IT service provider?

19 / 30

19. What information within change records would provide an IS auditor with the MOST
assurance that configuration management is operating effectively?

20 / 30

20. Which of the following does a lack of adequate security controls represent?

21 / 30

21. An IS auditor has been assigned to review IT structures and activities recently outsourced to various providers. Which of the following should the IS auditor determine FIRST?

22 / 30

22. A start-up company acquiring servers for its order-taking system is unable to predict the volume of transactions. Which of the following is MOST important for the company to consider?

23 / 30

23. When developing a risk management program, what is the FIRST activity to be performed?

24 / 30

24. An external audit team is deciding whether to rely on internal audit’s work for an annual compliance audit. Which of the following is the GREATEST consideration when making this decision?

25 / 30

25. The development of an application has been outsourced to an offshore vendor. Which of the following should be of GREATEST concern to an IS auditor?

26 / 30

26. An IS auditor has been asked to assess the security of a recently migrated database system
that contains personal and financial data for a bank's customers. Which of the following controls is
MOST important for the auditor to confirm is in place?

27 / 30

27. An organization has outsourced its help desk activities. An IS auditor's GREATEST concern when reviewing the contract and associated service level agreement (SLA) between the organization and vendor should be the provisions for:

28 / 30

28. An enterprise hosts its data center onsite and has outsourced the management of its key financial applications to a service provider. Which of the following controls BEST ensures that the service provider's employees adhere to the security policies?

29 / 30

29. In a cloud technology environment, which of the following would pose the GREATEST challenge to the investigation of security incidents?

30 / 30

30. The output of the risk management process is an input for making:

Jute Bags in Dubai | Cotton Bags in Dubai | Canvas Bags in Dubai