itexamable.com

CISA Exam-Test 26

/30
208

CISA EXAM-TEST 26

1 / 30

1. Online banking transactions are being posted to the database when processing suddenly comes to a halt. The integrity of the transaction processing is BEST ensured by:

2 / 30

2. Which of the following security measures BEST ensures the integrity of information stored in a data warehouse?

3 / 30

3. What often results in project scope creep when functional requirements are not defined as well as they could be?

4 / 30

4. An IS auditor finds that the data warehouse query performance decreases significantly at certain times of the day. Which of the following controls would be MOST relevant for the IS auditor to review?

5 / 30

5. Which of the following is widely accepted as one of the critical components in networking management?

6 / 30

6. When performing a database review, an IS auditor notices that some tables in the database are not normalized. The IS auditor should next:

7 / 30

7. Which of the following is the PRIMARY purpose of using data analytics when auditing an
enterprise resource planning (ERP) system for a large organization?

8 / 30

8. What can be used to help identify and investigate unauthorized transactions?

9 / 30

9. During maintenance of a relational database, several values of the foreign key in a transaction table have been corrupted. The consequence is that:

10 / 30

10. Which of the following is a network diagnostic tool that monitors and records network information?

11 / 30

11. In a relational database with referential integrity, the use of which of the following keys would prevent deletion of a row from a customer table as long as the customer number of that row is stored with live orders on the orders table?

12 / 30

12. Which of the following controls will MOST effectively detect the presence of bursts of errors in network transmissions?

13 / 30

13. Which of the following is the PRIMARY purpose of conducting follow-up audits for material
observations?

14 / 30

14. A database administrator has detected a performance problem with some tables, which could be solved through denormalization. This situation will increase the risk of:

15 / 30

15. Which of the following database controls would ensure that the integrity of transactions is maintained in an online transaction processing system's database?

16 / 30

16. During the audit of a database server, which of the following would be considered the GREATEST exposure?

17 / 30

17. A benefit of quality of service (QoS) is that the:

18 / 30

18. Which of the following would prevent accountability for an action performed, thus allowing nonrepudiation?

19 / 30

19. Which of the following is MOST directly affected by network performance monitoring tools?

20 / 30

20. Business units are concerned about the performance of a newly implemented system. Which of the following should an IS auditor recommend?

21 / 30

21. When storing data archives off-site, what must be done with the data to ensure data completeness?

22 / 30

22. What is an edit check to determine whether a field contains valid data?

23 / 30

23. An IS auditor finds the timeliness and depth of information regarding the organization's IT
projects varies based on which project manager is assigned. Which of the following
recommendations would be A MOST helpful in achieving predictable and repeatable project
management processes?

24 / 30

24. A review of wide area network (WAN) usage discovers that traffic on one communication line between sites, synchronously linking the master and standby database, peaks at 96 percent of the line capacity. An IS auditor should conclude that:

25 / 30

25. A cyclic redundancy check (CRC) is commonly used to determine the:

26 / 30

26. Within the context of an IT-related governance framework, which type of organization
would be considered MOST mature?

27 / 30

27. An IS auditor analyzing the audit log of a database management system (DBMS) finds that some transactions were partially executed as a result of an error and have not been rolled back. Which of the following transaction processing features has been violated?

28 / 30

28. While reviewing the IT infrastructure, an IS auditor notices that storage resources are continuously being added. The IS auditor should:

29 / 30

29. During an audit of a small enterprise, the IS auditor noted that the IS director has superuser-privilege access that allows the director to process requests for changes to the application access roles (access types). Which of the following should the IS auditor recommend?

30 / 30

30. An organization's security policy mandates that all new employees must receive appropriate
security awareness training. Which of the following metrics would BEST assure compliance with this
policy?