itexamable.com

CISA Exam-Test 3

0%
597

CISA Exam-Test 3

1 / 30

1. Which of the following forms of evidence would an IS auditor consider the MOST reliable?

2 / 30

2. An organization seeks to control costs related to storage media throughout the information
life cycle while still meeting business and regulatory requirements. Which of the following is the BEST
way to achieve this objective?

3 / 30

3. An IS auditor wants to determine the number of purchase orders not appropriately approved. Which of the following sampling techniques should an IS auditor use to draw such conclusions?

4 / 30

4. What is the PRIMARY requirement that a data mining and auditing software tool should meet? The software tool should:

5 / 30

5. Which of the following IS functions can be performed by the same group or individual while
still providing the proper segregation of duties?

6 / 30

6. An organization recently implemented a cloud document storage solution and removed the
ability for end users to save data to their local workstation hard drives Which of the following
findings should be the IS auditor's GREATEST concern?

7 / 30

7. While conducting an audit, an IS auditor detects the presence of a virus. What should be the IS auditor's next step?

8 / 30

8. When testing program change requests for a remote system, an IS auditor finds that the number of changes available for sampling would not provide a reasonable level of assurance. What is the MOST appropriate action for the IS auditor to take?

9 / 30

9. During a vendor management database audit, an IS auditor identifies multiple instances of duplicate vendor records. In order to prevent recurrence of the same
issue, which of the following would be the IS auditor’s BEST recommendation to management?

10 / 30

10. An IS auditor finds that one employee has unauthorized access to confidential data. The IS auditor’s BEST recommendation should be to:

11 / 30

11. Which of the following would normally be the MOST reliable evidence for an IS auditor?

12 / 30

12. Which of the following sampling methods is MOST useful when testing for compliance?

13 / 30

13. During a follow-up audit, an IS auditor finds that some critical recommendations have not been addressed as management has decided to accept the risk. Whichof the following is the IS auditor’s BEST course of action?

14 / 30

14. When performing a computer forensic investigation, in regard to the evidence gathered, an IS auditor should be MOST concerned with:

15 / 30

15. The BEST method of confirming the accuracy of a system tax calculation is by:

16 / 30

16. An IS auditor uses computer-assisted audit techniques (CAATs) to collect and analyze data. Which of the following attributes of evidence is MOST affected by the use of CAATs?

17 / 30

17. An IS auditor interviewing a payroll clerk finds that the answers do not support job descriptions and documented procedures. Under these circumstances, the IS auditor should:

18 / 30

18. Audit management has just completed the annual audit plan for the upcoming year, which
consists entirely of high-risk processor. However it is determined that there are insufficient resources
to execute the plan. What should be done NEXT?

19 / 30

19. An IS auditor finds a small number of user access requests that had not been authorized by managers through the normal predefined workflow steps and escalation rules. The IS auditor should:

20 / 30

20. Comparing data from an accounts payable application with invoices received from vendors in the month of December is BEST described as:

21 / 30

21. During a security audit of IT processes, an IS auditor found that documented security procedures did not exist. The IS auditor should:

22 / 30

22. An auditor is creating an audit program in which the objective is to establish the adequacy of
personal data privacy controls in a payroll process. Which of the following would be MOST important3
to include?

23 / 30

23. An IS auditor is reviewing access to an application to determine whether recently added accounts were appropriately authorized. This is an example of:

24 / 30

24. Which of the following should be the GREATEST concern to an IS auditor evaluating an organization’s policies?

25 / 30

25. The vice president of human resources has requested an IS audit to identify payroll overpayments for the previous year. Which would be the BEST audit technique to use in this situation?

26 / 30

26. A substantive test to verify that tape library inventory records are accurate is:

27 / 30

27. When evaluating the collective effect of preventive, detective and corrective controls within a process, an IS auditor should be aware of which of the following?

28 / 30

28. In the course of performing a risk analysis, an IS auditor has identified threats and potential impacts. Next, the IS auditor should:

29 / 30

29. An IS auditor is reviewing security controls for a critical web-based system prior to implementation. The results of the penetration test are inconclusive, and the results will not be finalized prior to implementation. Which of the following is the BEST option for the IS auditor??

30 / 30

30. An IS auditor is evaluating the access controls at a multinational company with a shared network infrastructure. Which of the following is MOST important?

Jute Bags in Dubai | Jute Bags in UAE