itexamable.com

CISA Exam-Test 17

/30
213

CISA EXAM-TEST 17

1 / 30

1. Information for detecting unauthorized input from a user workstation would be BEST provided by the:

2 / 30

2. A project manager for a project that is scheduled to take 18 months to complete announces that the project is in a healthy financial position because, after six months, only one-sixth of the budget has been spent. The IS auditor should FIRST determine:

3 / 30

3. The GREATEST risk of database denormalization is:

4 / 30

4. Which of the following techniques would BEST help an IS auditor gain reasonable assurance that a project can meet its target date?

5 / 30

5. When reviewing a project where quality is a major concern, an IS auditor should use the project management triangle to explain that:

6 / 30

6. During the audit of an acquired software package, an IS auditor finds that the software purchase was based on information obtained through the Internet, rather than from responses to a request for proposal (RFP). The IS auditor should FIRST:

7 / 30

7. Before implementing controls in a newly developed system, management should PRIMARILY ensure that the controls:

8 / 30

8. An IS auditor assesses the project management process for an internal software development project. In respect to the software functionality, the IS auditor should look for sign-off by:

9 / 30

9. The PRIMARY purpose of audit trails is to:

10 / 30

10. There are many known weaknesses within an Intrusion Detection System (IDS). Which of the following is NOT a limitation of an IDS?

11 / 30

11. Which of the following cryptography is based on practical application of the characteristics of the smallest “grains” of light, the photon, the physical laws governing their generation and propagation and detection?

12 / 30

12. Which of the following is the most important element in the design of a data warehouse?

13 / 30

13. Which of the following data validation edits is effective in detecting transposition and transcription errors?

14 / 30

14. An IS auditor reviewing a series of completed projects finds that the implemented functionality often exceeded requirements and most of the projects ran significantly over budget. Which of these areas of the organization's project management process is the MOST likely cause of this issue?

15 / 30

15. The phases and deliverables of a system development life cycle (SDLC) project should be determined:

16 / 30

16. Which of the following is the BEST guidance from an IS auditor to an organization planning an
initiative to improve the effectiveness of its IT processes?

17 / 30

17. Ideally, stress testing should be carried out in a:

18 / 30

18. Which of the following group is MOST likely responsible for the implementation of IT
projects?

19 / 30

19. The objective of a vulnerability identification step in a risk assessment process is to.

20 / 30

20. The editing/validation of data entered at a remote site would be performed MOST effectively at the:

21 / 30

21. When reviewing an organization's data protection practices, an IS auditor should be MOST
concerned with a lack of

22 / 30

22. When implementing an application software package, which of the following presents the GREATEST risk?

23 / 30

23. An IS auditor invited to a project development meeting notes that no project risk has been documented. When the IS auditor raises this issue, the project manager responds that it is too early to identify risk and that, if risk starts impacting the project, a risk manager will be hired. The appropriate response of the IS auditor would be to:

24 / 30

24. Which of the following would be the MOST cost-effective recommendation for reducing the number of defects encountered during software development projects?

25 / 30

25. Which of the following functionality is NOT performed by the application layer of a TCP/IP model?

26 / 30

26. A failure discovered in which of the following testing stages would have the GREATEST impact on the implementation of new application software?

27 / 30

27. The purpose of a checksum on an amount field in an electronic data interchange (EDI) communication of financial transactions is to ensure:

28 / 30

28. Which of the following comparisons are used for identification and authentication in a biometric system?

29 / 30

29. Which of the following would BEST help to detect errors in data processing?

30 / 30

30. Which of the following cryptography demands less computational power and offers more security per bit?

Customized Jute Bags in Dubai | Customized Jute Bags in Sharjah