itexamable.com

CISA Exam-Test 24

/30
179

CISA EXAM-TEST 24

1 / 30

1. Determining the service delivery objective (SDO) should be based PRIMARILY on:

2 / 30

2. Which of the following assures an enterprise of the existence and effectiveness of internal controls relative to the service provided by a third party?

3 / 30

3. Which of the following is the GREATEST benefit of implementing an incident management
process?

4 / 30

4. The PRIMARY objective of service-level management (SLM) is to:

5 / 30

5. An organization has implemented an online customer help desk application using a software as a service (SaaS) operating model. An IS auditor is asked to recommend the best control to monitor the service level agreement (SLA) with the SaaS vendor as it relates to availability. What is the BEST recommendation that the IS auditor can provide?

6 / 30

6. The PRIMARY benefit of an IT manager monitoring technical capacity is to:

7 / 30

7. In a contract with a hot, warm or cold site, contractual provisions should PRIMARILY cover which of the following considerations?

8 / 30

8. The MAIN reason for requiring that all computer clocks across an organization be synchronized is to:

9 / 30

9. An IS auditor reviewing a cloud computing environment managed by a third party should be MOST concerned when:

10 / 30

10. When reviewing the desktop software compliance of an organization, the IS auditor should be MOST concerned if the installed software:

11 / 30

11. Establishing data ownership is an important first step for which of the following processes?

12 / 30

12. Which of the following issues should be a MAJOR concern to an IS auditor who is reviewing a service level agreement (SLA)?

13 / 30

13. Which of the following is BEST characterized by unauthorized modification of data before or during systems data entry?

14 / 30

14. Which of the following should be of PRIMARY concern to an IS auditor reviewing the management of external IT service providers?

15 / 30

15. To verify that the correct version of a data file was used for a production run, an IS auditor should review:

16 / 30

16. While performing a review of a critical third-party application, an IS auditor would be MOST concerned with discovering:

17 / 30

17. Which of the following is used to evaluate biometric access controls?

18 / 30

18. Which of the following reports is the MOST appropriate source of information for an IS auditor to validate that an Internet service provider (ISP) has been complying with an enterprise service level agreement (SLA) for the availability of outsourced telecommunication services?

19 / 30

19. An organization is planning to deploy an outsourced cloud-based application that is used to track job applicant data for the human resources (HR) department. Which of the following should be the GREATEST concern to an IS auditor?

20 / 30

20. During a human resources (HR) audit, an IS auditor is informed that there is a verbal agreement between the IT and HR departments as to the level of IT services expected. In this situation, what should the IS auditor do FIRST?

21 / 30

21. Which of the following recovery strategies is MOST appropriate for a business having multiple offices within a region and a limited recovery budget?

22 / 30

22. The information security function in a large organization is MOST effective when:

23 / 30

23. When reviewing backup policies, an IS auditor MUST verify that backup intervals of critical
systems do not exceed which of the following?

24 / 30

24. What is an effective countermeasure for the vulnerability of data entry operators potentially leaving their computers without logging off?

25 / 30

25. During a data center audit, an IS auditor observes that some parameters in the tape management system are set to bypass or ignore tape header records. Which of the following is the MOST effective compensating control for this weakness?

26 / 30

26. Which of the following provides the strongest authentication for physical access control?

27 / 30

27. An IS auditor is assessing services provided by an Internet service provider (ISP) during an IS compliance audit of a nationwide corporation that operates a governmental program. Which of the following is MOST important?

28 / 30

28. Which of the following represents the GREATEST risk created by a reciprocal agreement for disaster recovery made between two companies?

29 / 30

29. When reviewing a project to replace multiple manual data entry systems with an artificial
intelligence (Al) system, the IS auditor should be MOST concerned with the impact At will have on:

30 / 30

30. Which of the following is MOST important for an IS auditor to examine when reviewing an
organization's privacy policy?