itexamable.com

CISA Exam-Test 25

/30
186

CISA EXAM-TEST 25

1 / 30

1. Which of the following is an object-oriented technology characteristic that permits an enhanced degree of security over data?

2 / 30

2. The objective of concurrency control in a database system is to:

3 / 30

3. Which one of the following could be used to provide automated assurance that proper data files are being used during processing?

4 / 30

4. An IS auditor finds out-of-range data in some tables of a database. Which of the following controls should the IS auditor recommend to avoid this situation?

5 / 30

5. Of the three major types of off-site processing facilities, what type is often an acceptable solution for preparing for recovery of noncritical systems and data?

6 / 30

6. The MOST important function of a business continuity plan (BCP) is to.

7 / 30

7. An IS auditor reviewing a purchase accounting system notices several duplicate payments
made for the services rendered. Which of the following is the auditor's BEST recommendation for
preventing duplicate payments?

8 / 30

8. During the review of an enterprise's preventive maintenance process for systems at a data center, the IS auditor has determined that adequate maintenance is being performed on all critical computing, power and cooling systems. Additionally, it is MOST important for the IS auditor to ensure that the organization:

9 / 30

9. Which of the following should be the FIRST step in an organization's forensics process to
preserve evidence?

10 / 30

10. In which of the following situations is it MOST appropriate to implement data mirroring as the recovery strategy?

11 / 30

11. Which of the following would help to ensure the portability of an application connected to a database?

12 / 30

12. During an application audit, an IS auditor is asked to provide assurance of the database referential integrity. Which of the following should be reviewed?

13 / 30

13. Which of the following would an IS auditor recommend as the MOST effective preventive
control to reduce the risk of data leakage?

14 / 30

14. What influences decisions regarding criticality of assets?

15 / 30

15. An IS auditor notes that patches for the operating system used by an organization are deployed by the IT department as advised by the vendor. The MOST significant concern an IS auditor should have with this practice is that IT has NOT considered:

16 / 30

16. Which of the following processes will be MOST effective in reducing the risk that unauthorized software on a backup server is distributed to the production server?

17 / 30

17. The application systems of an organization using open-source software have no single recognized developer producing patches. Which of the following would be the MOST secure way of updating open-source software?

18 / 30

18. Which of the following would BEST ensure continuity of a wide area network (WAN) across the organization?

19 / 30

19. Which type of major BCP test only requires representatives from each operational area to meet to review the plan?

20 / 30

20. During an IS audit of a bank, the IS auditor is assessing whether the enterprise properly manages staff member access to the operating system. The IS auditor should determine whether the enterprise performs:

21 / 30

21. An enterprise uses privileged accounts to process configuration changes for mission-critical applications. Which of the following would be the BEST and appropriate control to limit the risk in such a situation?

22 / 30

22. Which of the following controls would provide the GREATEST assurance of database integrity?

23 / 30

23. An IS auditor discovers that some users have installed personal software on their PCs. This is not explicitly forbidden by the security policy. Of the following, the BEST approach for an IS auditor is to recommend that the:

24 / 30

24. Which of the following sampling techniques is BEST to use when verifying the operating
effectiveness of internal controls during an audit of transactions?

25 / 30

25. In auditing a database environment, an IS auditor will be MOST concerned if the database administrator (DBA) is performing which of the following functions?

26 / 30

26. The database administrator (DBA) suggests that database efficiency can be improved by denormalizing some tables. This would result in:

27 / 30

27. An IS auditor determined that the IT manager recently changed the vendor that is responsible for performing maintenance on critical computer systems to cut costs. While the new vendor is less expensive, the new maintenance contract specifies a change in incident resolution time specified by the original vendor. Which of the following should be the GREATEST concern to the IS auditor?

28 / 30

28. An IS auditor discovers that some hard drives disposed of by an enterprise were not sanitized in a manner that would reasonably ensure the data could not be recovered. In addition, the enterprise does not have a written policy on data disposal. The IS auditor should FIRST:

29 / 30

29. Which of the following is MOST is critical during the business impact assessment phase of business continuity planning?

30 / 30

30. An IS auditor is reviewing database security for an organization. Which of the following is the MOST important consideration for database hardening?