ISACA CISA Exam Practice Questions (P. 2)
- Full Access (1824 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #11
Which of the following would be MOST effective to protect information assets in a data center from theft by a vendor?
- AConceal data devices and information labels.
- BIssue an access card to the vendor.
- CMonitor and restrict vendor activities.Most Voted
- DRestrict use of portable and wireless devices.
Correct Answer:
C
C

It's crucial to closely monitor and control vendor activities within a data center. Implementing adequate surveillance, access controls, and monitoring mechanisms ensures that unauthorized actions like theft or misuse of critical information by vendors are prevented. These measures allow for instant detection and facilitate prompt response, securing the data center against potential threats posed by vendors.
send
light_mode
delete
Question #12
An employee loses a mobile device resulting in loss of sensitive corporate data. Which of the following would have BEST prevented data leakage?
- AData encryption on the mobile deviceMost Voted
- BThe triggering of remote data wipe capabilities
- CAwareness training for mobile device users
- DComplex password policy for mobile devices
Correct Answer:
A
A

Data encryption is the most effective method to prevent data leakage in case a mobile device is lost. The encryption secures the data, making it inaccessible without the correct decryption key, regardless of who possesses the device. This primary level of security ensures confidentiality and integrity of sensitive data, serving as a proactive measure, whereas options like remote data wipe are reactive and dependent on certain conditions such as internet connectivity. Thus, encryption provides more reliable and consistent protection against unauthorized access to sensitive data.
send
light_mode
delete
Question #13
During the evaluation of controls over a major application development project, the MOST effective use of an IS auditor's time would be to review and evaluate:
- Acost-benefit analysis.
- Bacceptance testing.
- Capplication test cases.
- Dproject plans.Most Voted
Correct Answer:
C
C

When focusing on the effectiveness of an IS auditor's time in reviewing a major application development project, the optimal area to evaluate is indeed the application test cases. This approach directly examines the robustness of the control environment. Application test cases provide clear, concrete evidence of how the controls are applied and whether they are effective in mitigating risks associated with the application. This method ensures a practical, hands-on review of what has been implemented versus planned or documented strategies, offering a precise insight into the actual functioning of controls.
send
light_mode
delete
Question #14
Upon completion of audit work, an IS auditor should:
- Aprovide a report to the auditee stating the initial findings.
- Bprovide a report to senior management prior to discussion with the auditee.
- Cdistribute a summary of general findings to the members of the auditing team.Most Voted
- Dreview the working papers with the auditee.
Correct Answer:
A
A

Correct post-audit practices involve timely communication of findings to the auditee. Providing a preliminary report of initial findings to the auditee (Option A) fosters transparency and lays the groundwork for any necessary corrections or clarifications before the final report is issued. This approach not only ensures that the auditee is fully informed but also enhances the credibility and integrity of the audit process by including them in every step after the audit's completion. This set procedure aids in maintaining a cooperative relationship between the auditor and the auditee, essential for effective audit outcomes.
send
light_mode
delete
Question #15
During an IT general controls audit of a high-risk area where both internal and external audit teams are reviewing the same areas simultaneously, which of the following is the BEST approach to optimize resources?
- ALeverage the work performed by external audit for the internal audit testing.
- BEnsure both the internal and external auditors perform the work simultaneously.Most Voted
- CRoll forward the general controls audit to the subsequent audit year.
- DRequest that the external audit team leverage the internal audit work.
Correct Answer:
A
A

Opting to leverage external audit work for internal audit testing in high-risk areas is an effective strategy to optimize auditing resources. External audits are typically comprehensive, addressing stakeholder requirements across the board. When internal auditors use these findings, it streamlines efforts, minimizes duplication, and enables a focus on areas needing more attention. This approach is crucial for maintaining efficiency without compromising the meticulous examination of high-risk controls.
send
light_mode
delete
Question #16
The GREATEST benefit of using a prototyping approach in software development is that it helps to:
- Aimprove efficiency of quality assurance (QA) testing.
- Bconceptualize and clarify requirements.Most Voted
- Cdecrease the time allocated for user testing and review.
- Dminimize scope changes to the system.
Correct Answer:
D
D
send
light_mode
delete
Question #17
After an employee termination, a network account was removed, but the application account remained active. To keep this issue from recurring, which of the following is the BEST recommendation?
- AIntegrate application accounts with network single sign-on.Most Voted
- BPerform periodic access reviews.
- CRetrain system administration staff.
- DLeverage shared accounts for the application.
Correct Answer:
B
B
send
light_mode
delete
Question #18
During an IT governance audit, an IS auditor notes that IT policies and procedures are not regularly reviewed and updated. The GREATEST concern to the IS auditor is that policies and procedures might not:
- Areflect current practices.Most Voted
- Bbe subject to adequate quality assurance (QA).
- Cinclude new systems and corresponding process changes.
- Dincorporate changes to relevant laws.
Correct Answer:
D
D
send
light_mode
delete
Question #19
Management receives information indicating a high level of risk associated with potential flooding near the organization's data center with in the next few years. As a result, a decision has been made to move data center operations to another facility on higher ground. Which approach has been adopted?
- ARisk reductionMost Voted
- BRisk acceptance
- CRisk transfer
- DRisk avoidance
Correct Answer:
D
D
send
light_mode
delete
Question #20
An emergency power-off switch should:
- Anot be in the computer room.
- Bnot be identified
- Cbe protected.Most Voted
- Dbe illuminated.
Correct Answer:
D
D
send
light_mode
delete
All Pages