itexamable.com

CISA Exam-Test 28

/30
206

CISA EXAM-TEST 28

1 / 30

1. When reviewing a hardware maintenance program, an IS auditor should assess whether:

2 / 30

2. An IS auditor is reviewing the change management process for an enterprise resource planning (ERP) application. Which of the following is the BEST method for testing program changes?

3 / 30

3. Doing which of the following during peak production hours could result in unexpected downtime?

4 / 30

4. Emergency changes that bypass the normal change control process are MOST acceptable if:

5 / 30

5. Which of the following BEST limits the impact of server failures in a distributed environment?

6 / 30

6. Which of the following processes should an IS auditor recommend to assist in the recording of baselines for software releases?

7 / 30

7. An IS auditor should recommend the use of library control software to provide reasonable assurance that:

8 / 30

8. An IS auditor discovers that developers have operator access to the command line of a production environment operating system. Which of the following controls would BEST mitigate the risk of undetected and unauthorized program changes to the production environment?

9 / 30

9. During fieldwork, an IS auditor experienced a system crash caused by a security patch installation. To provide reasonable assurance that this event will not recur, the IS auditor should ensure that:

10 / 30

10. Which of the following is the MOST important factor when an organization is developing
information security policies and procedures?

11 / 30

11. Which of the following is the MOST critical element of an effective disaster recovery plan (DRP)?

12 / 30

12. The BEST way to prevent fraudulent payments is to implement segregation of duties
between payment processing and:

13 / 30

13. An IS auditor reviewing the use of encryption finds that the symmetric key is sent by an
email message between the parties. Which of the following audit responses is correct in this
situation?

14 / 30

14. Which of the following is the MOST efficient way to test the design effectiveness of a change control process?

15 / 30

15. To ensure an organization is complying with privacy requirements, an IS auditor should FIRST review

16 / 30

16. The purpose of code signing is to provide assurance that:

17 / 30

17. The management of an organization has decided to establish a security awareness program. Which of the following would MOST likely be a part of the program?

18 / 30

18. When reviewing system parameters, an IS auditor's PRIMARY concern should be that:

19 / 30

19. A database administrator (DBA) who needs to make emergency changes to a database after normal working hours should log in:

20 / 30

20. The BEST audit procedure to determine if unauthorized changes have been made to production code is to:

21 / 30

21. control prevent the display of fares if they are not within the defined threshold? For me it is a Preventive control

22 / 30

22. Which of the following implementation strategies for new applications presents the
GREATEST risk during data conversion and migration from an old system to a new system?

23 / 30

23. Which of the following is the initial step in creating a firewall policy?

24 / 30

24. Applying a retention date on a file will ensure that:

25 / 30

25. In a small organization, developers may release emergency changes directly to production. Which of the following will BEST control the risk in this situation?

26 / 30

26. Which of the following would MOST likely indicate that a customer data warehouse should remain in-house rather than be outsourced to an offshore operation?

27 / 30

27. During the review of an in-house developed application, the GREATEST concern to an IS auditor is if a:

28 / 30

28. An organization has recently installed a security patch, which crashed the production server. To minimize the probability of this occurring again, an IS auditor should:

29 / 30

29. In the event of a data center disaster, which of the following would be the MOST appropriate strategy to enable a complete recovery of a critical database?

30 / 30

30. When developing a security architecture, which of the following steps should be executed FIRST?