itexamable.com

CISA Exam-Test 20

/30
245

CISA EXAM-TEST 20

1 / 30

1. Regression testing is undertaken PRIMARILY to ensure that:

2 / 30

2. Which of the following should be a concern to an IS auditor reviewing a digital forensic
process for a security incident?

3 / 30

3. An organization sells books and music online at its secure web site. Transactions are transferred to the accounting and delivery systems every hour to be processed. Which of the following controls BEST ensures that sales processed on the secure web site are transferred to both the delivery and accounting systems?

4 / 30

4. What is the PRIMARY purpose of performing a parallel run of a new system?

5 / 30

5. Which of the following test techniques would the IS auditor use to identify specific program logic that has not been tested?

6 / 30

6. An enterprise is developing a new procurement system, and things are behind schedule. As a result, it is proposed that the time originally planned for the test phase be shortened. The project manager asks the IS auditor for recommendations to mitigate the risk associated with reduced testing. Which of the following is a suitable risk mitigation strategy?

7 / 30

7. A project development team is considering using production data for its test deck. The team removed sensitive data elements from the bed before loading it into the test environment. Which of the following additional concerns should an IS auditor have with this practice?

8 / 30

8. A large industrial organization is replacing an obsolete legacy system and evaluating whether to buy a custom solution or develop a system in-house. Which of the following will MOST likely influence the decision?

9 / 30

9. Which of the following is a data validation edit and control?

10 / 30

10. Which of the following controls helps prevent duplication of vouchers during data entry?

11 / 30

11. The MOST significant level of effort for business continuity planning (BCP) generally is required during the:

12 / 30

12. The BEST time for an IS auditor to assess the control specifications of a new application software package which is being considered for acquisition is during:

13 / 30

13. An offsite information processing facility having electrical wiring, air conditioning and flooring, but no computer or communications equipment is a:

14 / 30

14. An IS auditor finds out-of-range data in some tables of a database. Which of the following controls should the IS auditor recommend to avoid this situation?

15 / 30

15. An IS auditor is reviewing system development for a health care organization with two application environments—production and test. During an interview, the auditor notes that production data are used in the test environment to test program changes. What is the MOST significant potential risk from this situation?

16 / 30

16. The IS auditor is reviewing a recently completed conversion to a new enterprise resource planning (ERP) system. As the final stage of the conversion process, the organization ran the old and new systems in parallel for 30 days before allowing the new system to run on its own. What is the MOST significant advantage to the organization by using this strategy?

17 / 30

17. Which of the following BEST helps an IS auditor evaluate the quality of programming activities related to future maintenance capabilities?

18 / 30

18. An IS auditor is conducting a pre-implementation review to determine a new system's
production readiness.

19 / 30

19. Which of the following is MOST important for an IS auditor to review when evaluating the
effectiveness of an organization's incident response process?

20 / 30

20. Which of the following is the MOST effective tool for monitoring transactions that exceed predetermined thresholds?

21 / 30

21. An IS auditor who is auditing the software acquisition process will ensure that the:

22 / 30

22. What is the BEST method to facilitate successful user testing and acceptance of a new enterprise resource planning (ERP) payroll system that is replacing an existing legacy system?

23 / 30

23. During a system development life cycle (SDLC) audit of a human resources (HR) and payroll application, the IS auditor notes that the data used for user acceptance testing (UAT) have been masked. The purpose of masking the data is to ensure the:

24 / 30

24. Which of the following is the MOST likely cause of a successful firewall
penetration?

25 / 30

25. An IS auditor is reviewing the software development process for an organization. Which of the following functions would be appropriate for the end users to perform?

26 / 30

26. What kind of software application testing is considered the final stage of testing and typically includes users outside the development team?

27 / 30

27. A LAN administrator normally would be restricted from:

28 / 30

28. A new database is being set up in an overseas location to provide information to the general public and to increase the speed at which the information is made available. The overseas database is to be housed at a data center and will be updated in real time to mirror the information stored locally. Which of the following areas of operations should be considered as having the HIGHEST risk?

29 / 30

29. During the review of data file change management controls, which of the following BEST helps to decrease the research time needed to investigate exceptions?

30 / 30

30. An organization having a number of offices across a wide geographical area has developed a disaster recovery plan (DRP). Using actual resources, which of the following is the MOST cost-effective test of the DRP?