itexamable.com

CISA Exam-Test 23

/30
194

CISA EXAM-TEST 23

1 / 30

1. Which of the following BEST minimizes performance degradation of servers used to
authenticate users of an e-commerce website?

2 / 30

2. Which of the following procedures would MOST effectively detect the loading of illegal software packages onto a network?

3 / 30

3. An IS auditor reviewing a new outsourcing contract with a service provider would be MOST concerned if which of the following was missing?

4 / 30

4. Which audit approach is MOST helpful in optimizing the use of IS audit resources?

5 / 30

5. Which of the following is often used as a detection and deterrent control against Internet attacks?

6 / 30

6. An IS auditor should ensure that review of online electronic funds transfer (EFT) reconciliation procedures should include:

7 / 30

7. When reviewing the configuration of network devices, an IS auditor should FIRST identify:

8 / 30

8. An IS auditor is to assess the suitability of a service level agreement (SLA) between the organization and the supplier of outsourced services. To which of the following observations should the IS auditor pay the MOST attention? The SLA does not contain a:

9 / 30

9. Management considered two projections for its disaster recovery plan (DRP): plan A with two months to fully recover and plan B with eight months to fully recover. The recovery point objectives are the same in both plans. It is reasonable to expect that plan B projected higher:

10 / 30

10. Which of the following BEST reduces the ability of one device to capture the packets that are meant for another device?

11 / 30

11. When two or more systems are integrated, the IS auditor must review input/output controls in the:

12 / 30

12. Which of the following BEST helps an IS auditor assess and measure the value of a newly implemented system?

13 / 30

13. What benefit does using capacity-monitoring software to monitor usage patterns and trends provide to management?

14 / 30

14. An IS auditor evaluating the resilience of a high-availability network should be MOST concerned if:

15 / 30

15. The BEST way to validate whether a malicious act has actually occurred in an application is
to review.

16 / 30

16. When reviewing an organization's approved software product list, which of the following is the MOST important thing to verify?

17 / 30

17. What are often the primary safeguards for systems software and data?

18 / 30

18. Which of the following best characterizes "worms"?

19 / 30

19. What is essential for the IS auditor to obtain a clear understanding of network management?

20 / 30

20. Responsibility and reporting lines cannot always be established when auditing automated systems because:

21 / 30

21. Which of the following should be of MOST concern to an IS auditor during the review of a
quality management system?

22 / 30

22. An organization is considering using a new IT service provider. From an audit perspective, which of the following would be the MOST important item to review?

23 / 30

23. An IS auditor is reviewing database log settings and notices that only INSERT and DELETE
operations are being monitored in the database. What is the MOST significant risk?

24 / 30

24. The PRIMARY objective of conducting a postimplementation review for a business process automation project is to:

25 / 30

25. Once an organization has finished the business process reengineering (BPR) of all its critical operations, an IS auditor would MOST likely focus on a review of:

26 / 30

26. An organization has outsourced its help desk function. Which of the following indicators would be the BEST to include in the service level agreement (SLA)?

27 / 30

27. An advantage of using unshielded twisted-pair (UTP) cable for data communication over other copper-based cables is that UTP cable:

28 / 30

28. A financial institution that processes millions of transactions each day has a central communications processor (switch) for connecting to automated teller machines (ATMs). Which of the following would be the BEST contingency plan for the communications processor?

29 / 30

29. Which of the following reports should an IS auditor use to check compliance with a service level agreement's (SLA) requirement for uptime?

30 / 30

30. There are several methods of providing telecommunication continuity. The method of routing traffic through split cable or duplicate cable facilities is called: