itexamable.com

CISA Exam-Test 21

/30
190

CISA EXAM-TEST 21

1 / 30

1. Which of the following systems or tools can recognize that a credit card transaction is more likely to have resulted from a stolen credit card than from the holder of the credit card?

2 / 30

2. At the end of the testing phase of software development, an IS auditor observes that an intermittent software error has not been corrected. No action has been taken to resolve the error. The IS auditor should:

3 / 30

3. An appropriate control for ensuring the authenticity of orders received in an electronic data interchange (EDI) system application is to:

4 / 30

4. If senior management is not committed to strategic planning, how likely is it that a company's implementation of IT will be successful?

5 / 30

5. . What should an IS auditor do if he or she observes that project-approval procedures do not exist?

6 / 30

6. Which of the following would provide an IS auditor with the MOST assurance when auditing
the implementation of a new application system?

7 / 30

7. Which of the following types of testing would determine whether a new or modified system can operate in its target environment without adversely impacting other existing systems?

8 / 30

8. Normally, it would be essential to involve which of the following stakeholders in the initiation stage of a project?

9 / 30

9. From a risk management point of view, the BEST approach when implementing a large and complex IT infrastructure is:

10 / 30

10. An IS auditor will be testing accounts payable controls by performing data analytics on the
entire population of transactions. Which of the following is MOST important for the auditor to
confirm when sourcing the population data?

11 / 30

11. A core tenant of an IS strategy is that it must

12 / 30

12. Following good practices, formal plans for implementation of new information systems are developed during the:

13 / 30

13. An organization is implementing a new system to replace a legacy system. Which of the following conversion practices creates the GREATEST risk?

14 / 30

14. What is the primary objective of a control self-assessment (CSA) program?

15 / 30

15. An IS audit manager finds that data manipulation logic developed by the audit analytics
team leads to incorrect conclusions This inaccurate logic is MOST likely an indication of lich of the
following?

16 / 30

16. An organization is migrating from a legacy system to an enterprise resource planning (ERP) system. While reviewing the data migration activity, the MOST important concern for the IS auditor is to determine that there is a:

17 / 30

17. The specific advantage of white box testing is that it:

18 / 30

18. Which of the following is an implementation risk within the process of decision support systems (DSSs)?

19 / 30

19. An IS auditor is reviewing a project that is using an agile software development approach. Which of the following should the IS auditor expect to find?

20 / 30

20. A bank is relocating its servers to a vendor that provides data center hosting services to
multiple clients. Which of the following controls would restrict other clients from physical access to
the bank servers?

21 / 30

21. During which phase of software application testing should an organization perform the testing of architectural design?

22 / 30

22. Which of the following system and data conversion strategies provides the GREATEST redundancy?

23 / 30

23. A legacy payroll application is migrated to a new application. Which of the following stakeholders should be PRIMARILY responsible for reviewing and signing-off on the accuracy and completeness of the data before going live?

24 / 30

24. The knowledge base of an expert system that uses questionnaires to lead the user through a series of choices before a conclusion is reached is known as:

25 / 30

25. The MAJOR advantage of a component-based development approach is the:

26 / 30

26. Which of the following situations would increase the likelihood of fraud?

27 / 30

27. An IS auditor is evaluating a virtual machine-based (VM-based) architecture used for all programming and testing environments. The production architecture is a three-tier physical architecture. What is the MOST important IT control to test to ensure availability and confidentiality of the web application in production?

28 / 30

28. As part of a follow-up of a previous year's audit, an IS auditor has increased the expected
error rate for a sample. The impact will be:

29 / 30

29. During the system testing phase of an application development project the IS auditor should review the:

30 / 30

30. The reason a certification and accreditation (C&A) process is performed on critical systems is to ensure that: