itexamable.com

CISA Exam-Test 5

/30
443

CISA Exam-Test 5

1 / 30

1. The effect of which of the following should have priority in planning the scope and objectives of an IS audit?

2 / 30

2. The PRIMARY purpose for meeting with auditees prior to formally closing a review is to:

3 / 30

3. Upon completion of audit work, an IS auditor should:

4 / 30

4. Which of the following should be the FIRST action of an IS auditor during a dispute with a department manager over audit findings?

5 / 30

5. General ledger (GL) data are required for an audit. Instead of asking IT to extract the data, the IS auditor is granted direct access to the data. What is the MAIN advantage of this approach?

6 / 30

6. What is the BEST course of action for an IS auditor to take when an outsourced monitoring process for remote access is inadequate and management disagrees because management stated that intrusion detection system (IDS) and firewall controls are in place?

7 / 30

7. An IS auditor conducting a review of software usage and licensing discovers that numerous PCs contain unauthorized software. Which of the following actions should the IS auditor take?

8 / 30

8. While performing an audit of an accounting application's internal data integrity controls, an IS auditor identifies a major control deficiency in the change management software supporting the accounting application. The MOST appropriate action for the IS auditor to take is to:

9 / 30

9. The MOST effective way to determine if IT is meeting business requirements is to establish:

10 / 30

10. When preparing an audit report the IS auditor should ensure that the results are supported by:

11 / 30

11. An IS auditor suspects an incident is occurring while an audit is being performed on a financial system. What should the IS auditor do FIRST?

12 / 30

12. Which of the following would BEST provide executive management with current information on IT-related costs and IT performance indicators?

13 / 30

13. Which of the following is the PRIMARY advantage of the IT portfolio management approach over the balanced scorecard approach when managing IT investments?

14 / 30

14. The final decision to include a material finding in an audit report should be made by the:

15 / 30

15. When an IS auditor evaluates key performance indicators (KPls) (or IT initiatives, it is MOST
important that the KPIs indicate

16 / 30

16. Corrective action has been taken by an auditee immediately after the identification of a reportable finding. The auditor should:

17 / 30

17. A company is using a software developer for a project. At which of the following points
should the software quality assurance (QA) plan be developed?

18 / 30

18. An external IS auditor issues an audit report pointing out the lack of firewall protection features at the perimeter network gateway and recommends a specific vendor product to address this vulnerability. The IS auditor has failed to exercise:

19 / 30

19. To ensure the integrity of a recovered database, which of the following would be MOST
useful?

20 / 30

20. During an exit interview, in cases where there is disagreement regarding the impact of a finding, an IS auditor should:

21 / 30

21. Which of the following is the MOST important skill an IS auditor should develop to understand the constraints of conducting an audit?

22 / 30

22. An IS auditor is planning to evaluate the control design effectiveness related to an automated billing process. Which of the following is the MOST effective approach for the auditor to adopt?

23 / 30

23. Which of the following is an IS auditor s GREATEST concern when an organization does not
regularly update software on individual workstations in the internal environment?

24 / 30

24. After reviewing the disaster recovery planning (DRP) process of an organization, an IS auditor requests a meeting with company management to discuss the findings. Which of the following BEST describes the main goal of this meeting?

25 / 30

25. The internal IS audit team is auditing controls over sales returns and is concerned about fraud. Which of the following sampling methods would BEST assist the IS auditors?

26 / 30

26. When testing segregation of duties, which of the following audit techniques provides the MOST reliable evidence?

27 / 30

27. Which of the following will MOST effectively help to manage the challenges associated with end user-developed application systems?

28 / 30

28. An external IS auditor discovers that systems in the scope of the audit were implemented by an associate. In such a circumstance, IS audit management should:

29 / 30

29. Which of the following BEST describes the objective of an IS auditor discussing the audit findings with the auditee?

30 / 30

30. In evaluating programmed controls over password management, which of the following is the IS auditor MOST likely to rely on?