itexamable.com

CISA Exam-Test 4

0%
528

CISA Exam-Test 4

1 / 30

1. Which of the following BEST demonstrates the degree of alignment between IT and business
strategy?

2 / 30

2. Which of the following is the BEST way to demonstrate to senior management that organizational security practices comply with industry standards?

3 / 30

3. IT plan Develop a new IT strategic plan that encompasses the new legislation

4 / 30

4. An IS auditor wants to analyze audit trails on critical servers to discover potential anomalies in user or system behavior. Which of the following is the MOST suitable for performing that task?

5 / 30

5. An IS auditor has assessed a payroll service provider's security policy and finds significant
topics are missing.
Which of the following is the auditor's BEST course of action?

6 / 30

6. During a compliance audit of a small bank, the IS auditor notes that both the IT and accounting functions are being performed by the same user of the financial system. Which of the following reviews conducted by the user's supervisor would represent the BEST compensating control?

7 / 30

7. Which of the following audit techniques would BEST help an IS auditor in determining whether there have been unauthorized program changes since the last authorized program update?

8 / 30

8. An organization developed a comprehensive three-year IT strategic plan Halfway into the
plan a major legislative change impacting the organization is enacted Which oi the following should
be management's NEXT course of action?

9 / 30

9. When using an integrated test facility (ITF), an IS auditor should ensure that:

10 / 30

10. An enterprise is developing a strategy to upgrade to a newer version of its database software. Which of the following tasks can an IS auditor perform without compromising the objectivity of the IS audit function?

11 / 30

11. An IS auditor is testing employee access to a large financial system, and the IS auditor selected a sample from the current employee list provided by the auditee. Which of the following evidence is the MOST reliable to support the testing?

12 / 30

12. Which of the following sampling methods would be the MOST effective to determine whether purchase orders issued to vendors have been authorized as per the authorization matrix?

13 / 30

13. During a review of the IT strategic plan, an IS auditor finds several IT initiatives focused on delivering new systems and technology are not aligned with the organization's strategy.Wch of the following would be the IS auditor’s BEST recommendation?

14 / 30

14. While reviewing sensitive electronic work papers, the IS auditor noticed that they were not encrypted. This could compromise the:

15 / 30

15. Although management has stated otherwise, an IS auditor has reasons to believe that the organization is using software that is not licensed. In this situation, the IS auditor should FIRST:

16 / 30

16. An IS auditor assessing the controls within a newly implemented call center would FIRST

17 / 30

17. During the collection of forensic evidence, which of the following actions would MOST likely result in the destruction or corruption of evidence on a compromised system?

18 / 30

18. An IS auditor who was involved in designing an organization's business continuity plan (BCP) has been assigned to audit the plan. The IS auditor should:

19 / 30

19. The MOST important reason for an IS auditor to obtain sufficient and appropriate audit evidence is to:

20 / 30

20. An organization was severely impacted after an advanced persistent threat (APT) attack. Afterwards, it was found that the initial breach happened a month prior to the attack. Management’s GREATEST concern should be:

21 / 30

21. In the process of evaluating program change controls, an IS auditor would use source code comparison software to:

22 / 30

22. An IS auditor is validating a control that involves a review of system-generated exception reports. Which of the following is the BEST evidence of the effectiveness of the control?

23 / 30

23. After initial investigation, an IS auditor has reasons to believe that fraud may be present. The IS auditor should:

24 / 30

24. Which of the following observations noted during a review of the organization’s social media practices should be of MOST concern to the IS auditor?

25 / 30

25. An IS auditor has been assigned to conduct a test that compares job run logs to computer job schedules. Which of the following observations would be of the GREATEST concern to the IS auditor?

26 / 30

26. Which of the following would an IS auditor use to determine if unauthorized modifications were made to production programs?

27 / 30

27. Which of the following will MOST successfully identify overlapping key controls in business application systems?

28 / 30

28. When reviewing business continuity plan (BCP) test results, it is MOST important for the IS auditor to determine whether the test:

29 / 30

29. An IS auditor is carrying out a system configuration review. Which of the following would be the BEST evidence in support of the current system configuration settings?

30 / 30

30. Which of the following should an IS auditor use to detect duplicate invoice records within an invoice master file?