itexamable.com

CISA Exam-Test 15

/30
236

CISA EXAM-TEST 15

1 / 30

1. When identifying an earlier project completion time, which is to be obtained by paying a premium for early completion, the activities that should be selected are those:

2 / 30

2. In which of the following WAN message transmission technique does two network nodes establish a dedicated communications channel through the network before the nodes may communicate?

3 / 30

3. Which of the following should an IS auditor review to gain an understanding of the effectiveness of controls over the management of multiple projects?

4 / 30

4. By evaluating application development projects against the capability maturity model (CMM), an IS auditor should be able to verify that:

5 / 30

5. The GREATEST advantage of using web services for the exchange of information between two systems is:

6 / 30

6. An organization has purchased a third-party application and made significant modifications. While auditing the development process for this critical, customer-facing application, the IS auditor noted that the vendor has been in business for only one year. Which of the following would help mitigate the risk relating to continued application support?

7 / 30

7. To minimize the cost of a software project, quality management techniques should be applied:

8 / 30

8. When planning to add personnel to tasks imposing time constraints on the duration of a project, which of the following should be revalidated FIRST?

9 / 30

9. An IS auditor finds that periodic reviews of read-only users for a reporting system are not
being performed.
Which of the following should be the IS auditor's NEXT course of action?

10 / 30

10. Which of the following statement INCORRECTLY describes network device such as a Router?

11 / 30

11. Which of the following observations should be of GREATEST concern to an IS auditor
reviewing a large organization's virtualization environment?

12 / 30

12. The most common reason for the failure of information systems to meet the needs of users is that:

13 / 30

13. Change control for business application systems being developed using prototyping could be complicated by the:

14 / 30

14. Which of the following poses the GREATEST security risk when implementing acquired
application systems?

15 / 30

15. Documentation of a business case used in an IT development project should be retained until:

16 / 30

16. Which of the following is the MOST likely benefit of implementing a standardized infrastructure?

17 / 30

17. An IS auditor should know information about different network transmission media. Which of the following transmission media is used for short distance transmission?

18 / 30

18. An IS auditor is told by IS management that the organization has recently reached the highest level of the software capability maturity model (CMM). The software quality process MOST recently added by the organization is:

19 / 30

19. Which of the following is a characteristic of timebox management?

20 / 30

20. When evaluating the controls of an electronic data interchange (EDI) application, an IS auditor should PRIMARILY be concerned with the risk of:

21 / 30

21. Which of the following should be a concern for an IS auditor reviewing an organization's cloud computing strategy which is based on a software as a service (SaaS) model with an external provider?

22 / 30

22. During business process reengineering (BPR) of a bank's teller activities, an IS auditor should
evaluate:

23 / 30

23. Which of the following would BEST help to prioritize project activities and determine the time line for a project?

24 / 30

24. The reason for establishing a stop or freezing point on the design of a new system is to:

25 / 30

25. Who should review and approve system deliverables as they are defined and accomplished to ensure the successful completion and implementation of a new business system application?

26 / 30

26. Which of the following statement INCORRECTLY describes circuit switching technique?

27 / 30

27. Many IT projects experience problems because the development time and/or resource requirements are underestimated. Which of the following techniques would provide the GREATEST assistance in developing an estimate of project duration?

28 / 30

28. Which of the following statement INCORRECTLY describes packet switching technique?

29 / 30

29. Which of the following is the client organization's responsibility in a Software as a Service
(SaaS) environment?

30 / 30

30. The waterfall life cycle model of software development is most appropriately used when:

Cotton Bags in Dubai | Cotton Bags in UAE | Cotton Bags in Sharjah