itexamable.com

CISA Exam-Test 22

/30
192

CISA EXAM-TEST 22

1 / 30

1. Which of the following BEST ensures the integrity of a server's operating system (OS)?

2 / 30

2. Which of the following attacks would MOST likely result in the interception and modification
of traffic for mobile phones connecting to potentially insecure public Wi-Fi networks?

3 / 30

3. Two months after a major application implementation, management, who assume that the project went well, requests that an IS auditor perform a review of the completed project. The IS auditor's PRIMARY focus should be to:

4 / 30

4. An IS audit group has been involved in the integration of an automated audit tool kit with an existing enterprise resource planning (ERP) system. Due to performance issues, the audit tool kit is not permitted to go live. What should the IS auditor's BEST recommendation be?

5 / 30

5. An IS auditor usually places more reliance on evidence directly collected. What is an example of such evidence?

6 / 30

6. Which of the following would be the BEST approach to ensure that sufficient test coverage will be achieved for a project with a strict end date and a fixed time to perform testing?

7 / 30

7. During a postimplementation review, which of the following activities should be performed?

8 / 30

8. Which of the following line media would provide the BEST security for a telecommunication network?

9 / 30

9. Management observed that the initial phase of a multiphase implementation was behind schedule and over budget. Prior to commencing with the next phase, an IS auditor's PRIMARY suggestion for a postimplementation focus should be to:

10 / 30

10. During the review of a web-based software development project, an IS auditor realizes that coding standards are not enforced and code reviews are rarely carried out. This will MOST likely increase the likelihood of a successful:

11 / 30

11. Which of the following is the MOST effective when determining the correctness of individual account balances migrated from one database to another?

12 / 30

12. An e-commerce enterprise's disaster recovery (DR) site has 30% less processing capability than the primary site. Based on this information, which of the following presents the GREATEST risk?

13 / 30

13. When reviewing the implementation of a local area network (LAN), an IS auditor should FIRST review the:

14 / 30

14. Due to a reorganization, a business application system will be extended to other departments. Which of the following should be of the GREATEST concern for an IS auditor?

15 / 30

15. Which of the following helps an IS auditor evaluate the quality of new software that is developed and implemented?

16 / 30

16. In assessing the priority given to systems covered in an organization's business continuity
plan (BCP), an IS auditor should FIRST:

17 / 30

17. A company is implementing a Dynamic Host Configuration Protocol (DHCP). Given that the following conditions exist, which represents the GREATEST concern?

18 / 30

18. What topology provides the greatest redundancy of routes and the greatest network fault tolerance?

19 / 30

19. An IS auditor is conducting a postimplementation review of an enterprise's network. Which of the following findings would be of MOST concern?

20 / 30

20. An organization is replacing a payroll program that it developed in-house, with the relevant subsystem of a commercial enterprise resource planning (ERP) system. Which of the following would represent the HIGHEST potential risk?

21 / 30

21. A financial institution has a system interface that is used by its branches to obtain applicable
currency exchange rates when processing transactions Which of the following should be the
PRIMARY control objective for maintaining the security of the system interface?

22 / 30

22. During a postimplementation review of an enterprise resource management system, an IS auditor would MOST likely:

23 / 30

23. An IS auditor is reviewing a new web-based order entry system the week before it goes live. The IS auditor has identified that the application, as designed, may be missing several critical controls regarding how the system stores customer credit card information. The IS auditor should FIRST:

24 / 30

24. Which of the following network components is PRIMARILY set up to serve as a security measure by preventing unauthorized traffic between different segments of the network?

25 / 30

25. An IS auditor finds that user acceptance testing of a new system is being repeatedly interrupted by defect fixes from the developers. Which of the following would be the BEST recommendation for an IS auditor to make?

26 / 30

26. Which of the following carries the LOWEST risk when managing failures while transitioning from legacy applications to new applications?

27 / 30

27. An IT service desk has recorded several incidents related to server downtime following the failure of a network time protocol (NTP) server. Which of the following is the BEST methodology to help identify the root cause?

28 / 30

28. Which of the following should occur EARLIEST in a business continuity management lifecycle?

29 / 30

29. An organization's IT security policy states that user ID's must uniquely identify individual's
and that user should not disclose their passwords. An IS auditor discovers that several generic user
ID's are being used.

30 / 30

30. A retail outlet has introduced radio frequency identification (RFID) tags to create unique serial numbers for all products. Which of the following is the PRIMARY concern associated with this initiative?