ISACA CISA Exam Practice Questions (P. 4)
- Full Access (1824 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #31
An IS auditor is reviewing processes for importing market price data from external data providers. Which of the following findings should the auditor consider
MOST critical?
MOST critical?
- AThe quality of the data is not monitored.
- BThe transfer protocol does not require authentication.
- CImported data is not disposed frequently.
- DThe transfer protocol is not encrypted.Most Voted
Correct Answer:
A
A
send
light_mode
delete
Question #32
In a controlled application development environment, the MOST important segregation of duties should be between the person who implements changes into the production environment and the:
- Aapplication programmer.
- Bquality assurance (QA) personnel.Most Voted
- Ccomputer operator.
- Dsystems programmer.
Correct Answer:
A
A
send
light_mode
delete
Question #33
A small startup organization does not have the resources to implement segregation of duties. Which of the following is the MOST effective compensating control?
- ARotation of log monitoring and analysis responsibilitiesMost Voted
- BAdditional management reviews and reconciliations
- CMandatory vacations
- DThird-party assessments
Correct Answer:
B
B
send
light_mode
delete
Question #34
When planning an audit to assess application controls of a cloud-based system, it is MOST important for the IS auditor to understand the:
- Aavailability reports associated with the cloud-based system.
- Barchitecture and cloud environment of the system.Most Voted
- Cpolicies and procedures of the business area being audited.
- Dbusiness process supported by the system.
Correct Answer:
D
D
send
light_mode
delete
Question #35
Which of the following data would be used when performing a business impact analysis (BIA)?
- AProjected impact of current business on future business
- BExpected costs for recovering the businessMost Voted
- CCost of regulatory compliance
- DCost-benefit analysis of running the current business
Correct Answer:
A
A
send
light_mode
delete
Question #36
Which of the following is the BEST indicator of the effectiveness of an organization's incident response program?
- ANumber of successful penetration tests
- BPercentage of protected business applications
- CNumber of security vulnerability patches
- DFinancial impact per security eventMost Voted
Correct Answer:
B
B
send
light_mode
delete
Question #37
An organization recently implemented a cloud document storage solution and removed the ability for end users to save data to their local workstation hard drives.
Which of the following findings should be the IS auditor's GREATEST concern?
Which of the following findings should be the IS auditor's GREATEST concern?
- AMobile devices are not encrypted.Most Voted
- BUsers are not required to sign updated acceptable use agreements.
- CThe business continuity plan (BCP) was not updated.
- DUsers have not been trained on the new system.
Correct Answer:
C
C
send
light_mode
delete
Question #38
Which of the following security measures will reduce the risk of propagation when a cyberattack occurs?
- AData loss prevention (DLP) system
- BPerimeter firewall
- CNetwork segmentation O Web application firewallMost Voted
Correct Answer:
C
C
send
light_mode
delete
Question #39
An IS auditor notes that the previous year's disaster recovery test was not completed within the scheduled time frame due to insufficient hardware allocated by a third-party vendor. Which of the following provides the BEST evidence that adequate resources are now allocated to successfully recover the systems?
- AHardware change management policy
- BAn up-to-date RACI chart
- CVendor memo indicating problem correction
- DService level agreement (SLA)Most Voted
Correct Answer:
C
C
send
light_mode
delete
Question #40
When implementing Internet Protocol security (IPsec) architecture, the servers involved in application delivery:
- Achannel access only through the public-facing firewall.
- Bchannel access through authentication.Most Voted
- Ccommunicate via Transport Layer Security (TLS).
- Dblock authorized users from unauthorized activities.
Correct Answer:
C
C
send
light_mode
delete
All Pages