itexamable.com

CISA Exam-Test 12

/30
246

CISA EXAM-TEST 12

1 / 30

1. An IS auditor is reviewing an IT security risk management program. Measures of security risk should:

2 / 30

2. What is the most effective means of determining that controls are functioning properly within an operating system?

3 / 30

3. When an organization's disaster recovery plan (DRP) has a reciprocal agreement, which of the following risk treatment approaches is being applied?

4 / 30

4. While reviewing the IT governance processes of an organization, an IS auditor discovers that the firm has recently implemented an IT balanced scorecard (BSC). The implementation is complete; however, the IS auditor notices that performance indicators are not objectively measurable. What is the PRIMARY risk presented by this situation?

5 / 30

5. Who is responsible for reviewing the result and deliverables within and at the end of each phase, as well as confirming compliance with requirements?

6 / 30

6. Which of the following should be considered FIRST when implementing a risk management program?

7 / 30

7. Which of the following is the key benefit of a control self-assessment (CSA)?

8 / 30

8. An organization has a well-established risk management process. Which of the following risk management practices would MOST likely expose the organization to the greatest amount of compliance risk?

9 / 30

9. A poor choice of passwords and unencrypted data transmissions over unprotected communications lines are examples of:

10 / 30

10. After an organization completed a threat and vulnerability analysis as part of a risk assessment, the final report suggested that an intrusion prevention system (IPS) should be installed at the main Internet gateways, and that all business units should be separated via a proxy firewall. Which of the following is the BEST method to determine whether the controls should be implemented?

11 / 30

11. An IS auditor is reviewing the risk management process. Which of the following is the MOST important consideration during this review?

12 / 30

12. Before implementing an IT balanced scorecard (BSC), an organization must:

13 / 30

13. To address the risk of operations staff's failure to perform the daily backup, management requires that the systems administrator sign off on the daily backup. This is an example of risk:

14 / 30

14. Which of the following is the MOST reliable network connection medium in an environment
where there is strong electromagnetic interface?

15 / 30

15. Which of the following insurance types provide for a loss arising from fraudulent acts by employees?

16 / 30

16. Which of the following statement INCORRECTLY describes the traditional audit approach in comparison to the Control self-assessment approach?

17 / 30

17. which of the following type of testing uses a set of test cases that focus on the control structure of the procedural design?

18 / 30

18. Which of the following is the PRIMARY objective of an IT performance measurement process?

19 / 30

19. Which of the following is an attribute of the control self-assessment (CSA) approach?

20 / 30

20. As a driver of IT governance, transparency of IT's cost, value and risk is primarily achieved through:

21 / 30

21. he PRIMARY benefit of implementing a security program as part of a security governance framework is the:

22 / 30

22. Reconciliations have identified data discrepancies between an enterprise data warehouse
and a revenue system for key financial reports. What is the GREATEST risk to the organization in this
situation?

23 / 30

23. When developing a business continuity plan (BCP), which of the following tools should be used to gain an understanding of the organization's business processes?

24 / 30

24. Which of the following type of testing has two major categories: QAT and UAT?

25 / 30

25. During an audit, an IS auditor notices that the IT department of a medium-sized organization has no separate risk management function, and the organization's operational risk documentation only contains a few broadly described types of IT risk. What is the MOST appropriate recommendation in this situation?

26 / 30

26. An organization is deciding whether to outsource its customer relationship management
systems to a provider located in another country. Which of the following should be the PRIMARY
influence in the outsourcing decision?

27 / 30

27. An IS auditor performing an audit of the risk assessment process should FIRST confirm that:

28 / 30

28. Assess the skill set within the security function

29 / 30

29. Which of the following must exist to ensure the viability of a duplicate information processing facility?

30 / 30

30. Which of the following should be of MOST concern lo an IS auditor reviewing the public key
infrastructure (PKI) for enterprise email?

Jute Bags in Sharjah | Cotton Bags in Sharjah | Canvas Bags in Sharjah