itexamable.com

CISA Exam-Test 2

0%
815

CISA Exam-Test 2

1 / 30

1. The practice of periodic secure code reviews is which type of control?

2 / 30

2. During the planning stage of an IS audit, the PRIMARY goal of an IS auditor is to:

3 / 30

3. An IS auditor evaluating logical access controls should FIRST:

4 / 30

4. When selecting audit procedures, an IS auditor should use professional judgment to ensure that:

5 / 30

5. Which of the following is the GREATEST security risk associated with data migration from a
legacy human resources (HR) system to a cloud-based system''

6 / 30

6. Which of the following is MOST important for an IS auditor to evaluate when determining the effectiveness of an information security program?

7 / 30

7. An IS auditor reviews an organizational chart PRIMARILY for:

8 / 30

8. Which of the following BEST describes the purpose of performing a risk assessment in the planning phase of an IS audit?

9 / 30

9. An IS auditor has identified a business process to be audited. The IS auditor should NEXT identify the:

10 / 30

10. In planning an IS audit, the MOST critical step is the identification of the:

11 / 30

11. Which of the following is an advantage of an integrated test facility (ITF)?

12 / 30

12. An IS auditor should use statistical sampling and not judgmental (nonstatistical) sampling, when:

13 / 30

13. An IS auditor has been asked by management to review a potentially fraudulent transaction. The PRIMARY focus of an IS auditor while evaluating the transaction should be to:

14 / 30

14. Which of the following should the IS auditor do FIRST to ensure data transfer integrity for Internet of Things (IoT) devices?

15 / 30

15. The PRIMARY purpose of an IT forensic audit is:

16 / 30

16. An IS auditor performing a review of application controls would evaluate the:

17 / 30

17. Data flow diagrams are used by IS auditors to:

18 / 30

18. The PRIMARY reason an IS auditor performs a functional walk-through during the preliminary phase of an audit assignment is to:

19 / 30

19. Which of the following should be of GREATEST concern to an IS auditor testing interface
controls for an associated bank wire transfer process?

20 / 30

20. An IS auditor is conducting a compliance test to determine whether controls support management policies and procedures. The test will assist the IS auditor to determine:

21 / 30

21. While planning an IS audit, an assessment of risk should be made to provide:

22 / 30

22. During a review of operations, it is noted that during a batch update, an error was detected
and the database initiated a roll-back. An IT operator stopped the roll-back and re-initiated the
update. What should the operator have done PRIOR to re-initiating the update?

23 / 30

23. Which audit technique provides the BEST evidence of the segregation of duties in an IT department?

24 / 30

24. During a change control audit of a production system, an IS auditor finds that the change management process is not formally documented and that some migration procedures failed. What should the IS auditor do next?

25 / 30

25. When planning an application audit, it is MOST important to evaluate risk factors by interviewing:

26 / 30

26. The scheduling of audit follow-ups should be based PRIMARILY on:

27 / 30

27. The extent to which data will be collected during an IS audit should be determined based on the:

28 / 30

28. Which of the following should be an IS auditor's GREATEST concern when reviewing an
outsourcing arrangement with a third-party cloud service provider to host personally identifiable

29 / 30

29. An IS auditor reviews one day of logs for a remotely managed server and finds one case where logging failed and the backup restarts cannot be confirmed. What should the IS auditor do?

30 / 30

30. A vendor service level agreement (SLA) requires backups to be physically secured. An IS audit of the backup system revealed a number of the backup media

Canvas Bags in Dubai | Canvas Bags in UAE | Canvas Bags in Sharjah