itexamable.com

CISA Exam-Test 19

/30
193

CISA EXAM-TEST 19

1 / 30

1. Which of the following is a prevalent risk in the development of end-user computing (EUC) applications?

2 / 30

2. Which of the following is MOST critical when creating data for testing the logic in a new or modified application system?

3 / 30

3. A company has recently upgraded its purchase system to incorporate electronic data interchange (EDI) transmissions. Which of the following controls should be implemented in the EDI interface to provide for efficient data mapping?

4 / 30

4. An IS auditor who has discovered unauthorized transactions during a review of electronic data interchange (EDI) transactions is likely to recommend improving the:

5 / 30

5. An IS auditor is reviewing an enterprise's system development testing policy. Which of the following statements concerning use of production data for testing would the IS auditor consider to be MOST appropriate?

6 / 30

6. Which of the following is the MOST critical and contributes the greatest to the quality of data in a data warehouse?

7 / 30

7. Which testing approach is MOST appropriate to ensure that internal application interface errors are identified as soon as possible?

8 / 30

8. When transmitting a payment instruction, which of the following will help verify that the instruction was not duplicated?

9 / 30

9. Which of the following type of lock uses a numeric keypad or dial to gain entry?

10 / 30

10. During a review of IT service desk practices, an IS auditor notes that help desk personnel are
spending more time fulfilling user requests (or password resets than resolving critical incidents.
Which of the following recommendations to IT management would BEST address this situation?

11 / 30

11. Which of the following is the GREATEST risk to the effectiveness of application system controls?

12 / 30

12. Which of the following attack could be avoided by creating more security awareness in the organization and provide adequate security knowledge to all employees?

13 / 30

13. A company has implemented a new client-server enterprise resource planning (ERP) system. Local branches transmit customer orders to a central manufacturing facility. Which of the following would BEST ensure that the orders are processed accurately and the corresponding products are produced?

14 / 30

14. A clerk changed the interest rate for a loan on a master file. The rate entered is outside the normal range for such a loan. Which of the following controls is MOST effective in providing reasonable assurance that the change was authorized?

15 / 30

15. An IS auditor has found time constraints and expanded needs to be the root causes for recent violations of corporate data definition standards in a new business intelligence project. Which of the following is the MOST appropriate suggestion for an auditor to make?

16 / 30

16. An IS auditor recommends that an initial validation control be programmed into a credit card transaction capture application. The initial validation process would MOST likely:

17 / 30

17. Which of the following type of lock uses a magnetic or embedded chip based plastic card key or token entered into a sensor/reader to gain access?

18 / 30

18. Which of the following will BEST ensure the successful offshore development of business applications?

19 / 30

19. Which of the following is an advantage of the top-down approach to software testing?

20 / 30

20. Which of the following is found in an audit charter?

21 / 30

21. Which of the following is MOST important for an IS auditor to consider during a review of the
IT governance of an organization?

22 / 30

22. Which of the following is penetration test where the penetration tester is provided with limited or no knowledge of the target's information systems?

23 / 30

23. Which of the following represents the GREATEST potential risk in an electronic data interchange (EDI) environment?

24 / 30

24. Which of the following is MOST important lo have in place for he continuous improvement of
process maturity within a large IT support function?

25 / 30

25. When reviewing input controls, an IS auditor observes that, in accordance with corporate policy, procedures allow supervisory override of data validation edits. The IS auditor should:

26 / 30

26. Due to a high volume of customer orders, an organization plans to implement a new
application for customers to use for online ordering Which type of testing is MOST important to
ensure the security of the application prior to go-live?

27 / 30

27. Which of the following should be developed during the requirements definition phase of a software development project to address aspects of software testing?

28 / 30

28. A company uses a bank to process its weekly payroll. Time sheets and payroll adjustment forms (e.g., hourly rate changes, terminations) are completed and delivered to the bank, which prepares checks (cheques) and reports for distribution. To BEST ensure payroll data accuracy:

29 / 30

29. The MAIN purpose of a transaction audit trail is to:

30 / 30

30. Which of the following protocol is PRIMARILY used to provide confidentiality in a web based application thus protecting data sent across a client machine and a server?

Tote Bags in Dubai | Tote Bags in UAE | Tote Bags in Sharjah