itexamable.com

CISA Exam-Test 27

/30
202

CISA EXAM-TEST 27

1 / 30

1. An IS auditor performing an application maintenance audit would review the log of program changes for the:

2 / 30

2. An organization is in the process of deciding whether to allow a bring your own device
(BYOD) program. If approved, which of the following should be the FIRST control required before
implementation''

3 / 30

3. Which of the following should be an IS auditor's GREATEST concern when a security audit
reveals the organization's vulnerability assessment approach is limited to running a vulnerability
scanner on its network?

4 / 30

4. An IS auditor is performing a review of a network, and users report that the network is slow and web pages periodically time out. The IS auditor confirms the users' feedback and reports the findings to the network manager. The most appropriate action for the network management team should be to FIRST:

5 / 30

5. An IS auditor finds that periodic reviews of read-only users for a reporting system are not being performed. Which of the following should be the IS auditor's NEXT course of action?

6 / 30

6. An IS auditor has obtained a large complex data set for analysis. Which of the following
activities will MOST improve the output from the use of data analytics tools?

7 / 30

7. An IS auditor examining the security configuration of an operating system should review the:

8 / 30

8. The development of an IS security policy is ultimately the responsibility of the:

9 / 30

9. The MAIN criterion for determining the severity level of a service disruption incident is:

10 / 30

10. In a small organization, an employee performs computer operations and, when the situation demands, program modifications. Which of the following should the IS auditor recommend?

11 / 30

11. Which of the following specifically addresses how to detect cyberattacks against an organization's IT systems and how to recover from an attack?

12 / 30

12. If an IS auditor finds evidence of risk involved in not implementing proper segregation of duties, such as having the security administrator perform an operations function, what is the auditor's primary responsibility?

13 / 30

13. Vendors have released patches fixing security flaws in their software. Which of the following should an IS auditor recommend in this situation?

14 / 30

14. How is the risk of improper file access affected upon implementing a database system?

15 / 30

15. An IS auditor needs to review the procedures used to restore a software application to its state prior to an upgrade. Therefore, the auditor needs to assess:

16 / 30

16. An IS auditor reviewing database controls discovered that changes to the database during normal working hours were handled through a standard set of procedures. However, changes made after normal hours required only an abbreviated number of steps. In this situation, which of the following would be considered an adequate set of compensating controls?

17 / 30

17. After discovering a security vulnerability in a third-party application that interfaces with several external systems, a patch is applied to a significant number of modules. Which of the following tests should an IS auditor recommend?

18 / 30

18. Which of the following is a MAJOR concern during a review of help desk activities?

19 / 30

19. The PRIMARY objective of performing a postincident review is that it presents an opportunity to:

20 / 30

20. Which of the following tests performed by an IS auditor would be the MOST effective in determining compliance with an organization's change control procedures?

21 / 30

21. . Which of the following is the BEST way to address ongoing concerns with the quality and accuracy of internal audits?

22 / 30

22. A programmer maliciously modified a production program to change data and then restored the original code. Which of the following would MOST effectively detect the malicious activity?

23 / 30

23. Which of the following should an incident response team address FIRST after a major incident in an information processing facility?

24 / 30

24. Which of the following would an IS auditor consider to be MOST helpful when evaluating the effectiveness and adequacy of a preventive computer maintenance program?

25 / 30

25. The FIRST step in the execution of a problem management mechanism should be:

26 / 30

26. Which of the following would BEST maintain the integrity of a firewall log?

27 / 30

27. Which of the following is the BEST way to confirm that a digital signature is valid?

28 / 30

28. Which of the following controls would be MOST effective in ensuring that production source code and object code are synchronized?

29 / 30

29. An IS auditor is evaluating the effectiveness of the organization's change management process. What is the MOST important control that the IS auditor should look for to ensure system availability?

30 / 30

30. An IS auditor is assigned to review the development of a specific application. Which of the
following would be the MOST significant step following the feasibility study?