itexamable.com

CISA Exam-Test 29

/30
215

CISA EXAM-TEST 29

1 / 30

1. The PRIMARY purpose of implementing Redundant Array of Inexpensive Disks (RAID) level 1 in a file server is to:

2 / 30

2. Which of the following is the BEST indicator of the effectiveness of backup and restore procedures while restoring data after a disaster?

3 / 30

3. During which phase of the incident management life cycle should metrics such as "mean
time to incident discovery" and "cost of recovery" be reported?

4 / 30

4. What is the BEST backup strategy for a large database with data supporting online sales?

5 / 30

5. An IS auditor observed that multiple applications are hosted on the same server. The recovery time objective (RTO) for the server will be:

6 / 30

6. Which of the following should be of GREATEST concern to an IS auditor reviewing the controls for a continuous software release process?

7 / 30

7. In addition to the backup considerations for all systems, which of the following is an important consideration in providing backup for online systems?

8 / 30

8. During an application audit, the IS auditor finds several problems related to corrupt data in the database. Which of the following is a corrective control that the IS auditor should recommend?

9 / 30

9. Which of the following BEST describes the relationship between vulnerability scanning and
penetration testing?

10 / 30

10. Which of the following is the MOST important function to be performed by IS management when a service has been outsourced?

11 / 30

11. While designing the business continuity plan (BCP) for an airline reservation system, the MOST appropriate method of data transfer/backup at an offsite location would be:

12 / 30

12. If a database is restored using before-image dumps, where should the process begin following an interruption?

13 / 30

13. Which of the following is the PRIMARY reason for an IS auditor to use computer-assisted
audit techniques (CAATs)?

14 / 30

14. Which of the following would BEST support 24/7 availability?

15 / 30

15. An IS auditor notes during an audit that an organization's business continuity plan (BCP) does not adequately address information confidentiality during the recovery process. The IS auditor should recommend that the plan be modified to include:

16 / 30

16. Which of the following backup techniques is the MOST appropriate when an organization requires extremely granular data restore points, as defined in the recovery point objective (RPO)?

17 / 30

17. An IS auditor finds that, in accordance with IS policy, IDs of terminated users are deactivated within 90 days of termination. The IS auditor should:

18 / 30

18. An IS auditor is performing a review of the disaster recovery hot site used by a financial institution. Which of the following would be the GREATEST concern?

19 / 30

19. Which of the following should an IS auditor recommend to BEST enforce alignment of an IT project portfolio with strategic organizational priorities?

20 / 30

20. Which of the following would an IS auditor consider to be the MOST important to review when conducting a disaster recovery audit?

21 / 30

21. Which of the following is the MOST important consideration when defining recovery point objectives (RPOs)?

22 / 30

22. Which of the following ensures the availability of transactions in the event of a disaster?

23 / 30

23. An organization plans to launch a social media presence as part of a new customer service
campaign. Which of the following is the MOST significant risk from the perspective of potential
litigation?

24 / 30

24. An offsite information processing facility with electrical wiring, air conditioning and flooring, but no computer or communications equipment, is a:

25 / 30

25. An IS auditor reviewing an outsourcing contract of IT facilities would expect it to define the:

26 / 30

26. Which of the following is the BEST way for an IS auditor to ensure the completeness of data
collected for advanced analytics during an audit?

27 / 30

27. Which of the following is the GREATEST risk when storage growth in a critical file server is not managed properly?

28 / 30

28. A large chain of shops with electronic funds transfer (EFT) at point-of-sale devices has a central communications processor for connecting to the banking network. Which of the following is the BEST disaster recovery plan for the communications processor?

29 / 30

29. In which of the following situations is it MOST appropriate to implement data mirroring as the recovery strategy?

30 / 30

30. disaster recovery plan (DRP) for an organization's financial system specifies that the recovery point objective (RPO) is zero and the recovery time objective (RTO) is 72 hours. Which of the following is the MOST cost-effective solution?