itexamable.com

CISA Exam-Test 18

/30
186

CISA EXAM-TEST 18

1 / 30

1. When a new system is to be implemented within a short time frame, it is MOST important to:

2 / 30

2. A company undertakes a business process reengineering (BPR) project in support of a new and direct marketing approach to its customers. Which of the following would be an IS auditor's main concern about the new process?

3 / 30

3. The use of object-oriented design and development techniques would MOST likely:

4 / 30

4. Which of the following statement is NOT true about Voice-Over IP (VoIP)?

5 / 30

5. During which of the following phases in system development would user acceptance test plans normally be prepared?

6 / 30

6. Functionality is a characteristic associated with evaluating the quality of software products throughout their life cycle, and is BEST described as the set of attributes that bear on the:

7 / 30

7. The GREATEST benefit of implementing an expert system is the:

8 / 30

8. An advantage of using sanitized live transactions in test data is that:

9 / 30

9. An organization has contracted with a vendor for a turnkey solution for their electronic toll collection system (ETCS). The vendor has provided its proprietary application software as part of the solution. The contract should require that:

10 / 30

10. A company has contracted with an external consulting firm to implement a commercial financial system to replace its existing system developed in-house. In reviewing the proposed development approach, which of the following would be of GREATEST concern?

11 / 30

11. Which of the following functionality is NOT supported by SSL protocol?

12 / 30

12. Which of the following is the BEST approach to identify whether a vulnerability is actively
being exploited?

13 / 30

13. During an audit of a data classification policy, an IS auditor finds that many documents are
inappropriately classified as confidential. Which of the following is the GREATEST concern?

14 / 30

14. In an online transaction processing system, data integrity is maintained by ensuring that a transaction is either completed in its entirety or not at all. This principle of data integrity is known as:

15 / 30

15. Identify the correct sequence which needs to be followed as a chain of event in regards to evidence handling in computer forensics?

16 / 30

16. During the development of an application, quality assurance testing and user acceptance testing were combined. The MAJOR concern for an IS auditor reviewing the project is that there will be:

17 / 30

17. An IS auditor's PRIMARY concern when application developers wish to use a copy of yesterday's production transaction file for volume tests is that:

18 / 30

18. Which of the following is NOT a true statement about public key infrastructure (PKI)?

19 / 30

19. A decision support system (DSS) is used to help high-level management:

20 / 30

20. Which of the following is an advantage of prototyping?

21 / 30

21. An IS auditor reviewing a proposed application software acquisition should ensure that the:

22 / 30

22. Which of the following is the PRIMARY objective of implementing privacy-related controls
within an organization"?

23 / 30

23. In computer forensics, which of the following is the process that allows bit-for-bit copy of a data to avoid damage of original data or information when multiple analysis may be performed?

24 / 30

24. An advantage in using a bottom-up vs. a top-down approach to software testing is that:

25 / 30

25. The GREATEST advantage of rapid application development (RAD) over the traditional system development life cycle (SDLC) is that it:

26 / 30

26. Which of the following is the PRIMARY purpose for conducting parallel testing?

27 / 30

27. Which of the following is MOST important for an IS auditor to consider when reviewing
documentation for an organization's forensics policy?

28 / 30

28. Which of the following is the PRIMARY purpose of quality assurance (QA) within an IS audit
department?

29 / 30

29. Which of the following systems or tools can recognize that a credit card transaction is more likely to have resulted from a stolen credit card than from the holder of the credit card?

30 / 30

30. Which of the following should be included in a feasibility study for a project to implement an electronic data interchange (EDI) process?

Jute Bags in Dubai | Jute Bags in UAE | Jute Bags in Sharjah