ISACA CISA Exam Practice Questions (P. 5)
- Full Access (1824 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #41
During audit fieldwork, an IS auditor learns that employees are allowed to connect their personal devices to company-owned computers. How can the auditor
BEST validate that appropriate security controls are in place to prevent data loss?
BEST validate that appropriate security controls are in place to prevent data loss?
- AVerify the data loss prevention (DLP) tool is properly configured by the organization.
- BReview compliance with data loss and applicable mobile device user acceptance policies.Most Voted
- CVerify employees have received appropriate mobile device security awareness training.
- DConduct a walk-through to view results of an employee plugging in a device to transfer confidential data.
Correct Answer:
B
B
send
light_mode
delete
Question #42
Management has requested a post-implementation review of a newly implemented purchasing package to determine to what extent business requirements are being met. Which of the following is MOST likely to be assessed?
- AImplementation methodology
- BTest results
- CPurchasing guidelines and policies
- DResults of live processingMost Voted
Correct Answer:
D
D
send
light_mode
delete
Question #43
Which of the following is an advantage of using agile software development methodology over the waterfall methodology?
- AQuicker end user acceptance
- BClearly defined business expectations
- CQuicker deliverablesMost Voted
- DLess funding required overall
Correct Answer:
C
C
send
light_mode
delete
Question #44
In an online application, which of the following would provide the MOST information about the transaction audit trail?
- AFile layouts
- BData architecture
- CSystem/process flowchartMost Voted
- DSource code documentation
Correct Answer:
B
B
send
light_mode
delete
Question #45
On a public-key cryptosystem when there is no previous knowledge between parties, which of the following will BEST help to prevent one person from using a fictitious key to impersonate someone else?
- ASend a certificate that can be verified by a certification authority with the public key.Most Voted
- BEncrypt the message containing the sender's public key, using the recipient's public key.
- CSend the public key to the recipient prior to establishing the connection.
- DEncrypt the message containing the sender's public key, using a private-key cryptosystem.
Correct Answer:
A
A
send
light_mode
delete
Question #46
The IS quality assurance (QA) group is responsible for:
- Amonitoring the execution of computer processing tasks.
- Bdesigning procedures to protect data against accidental disclosure.
- Censuring that program changes adhere to established standards.Most Voted
- Densuring that the output received from system processing is complete.
Correct Answer:
C
C
send
light_mode
delete
Question #47
Which of the following approaches will ensure recovery time objectives (RTOs) are met for an organization's disaster recovery plan (DRP)?
- APerforming a full interruption test
- BPerforming a parallel testMost Voted
- CPerforming a tabletop test
- DPerforming a cyber-resilience test
Correct Answer:
A
A
send
light_mode
delete
Question #48
Which audit approach is MOST helpful in optimizing the use of IS audit resources?
- AAgile auditing
- BContinuous auditing
- CRisk-based auditing
- DOutsourced auditing
Correct Answer:
C
C
send
light_mode
delete
Question #49
Which of the following would provide the MOST important input during the planning phase for an audit on the implementation of a bring your own device (BYOD) program?
- AResults of a risk assessmentMost Voted
- BPolicies including BYOD acceptable use statements
- CFindings from prior audits
- DAn inventory of personal devices to be connected to the corporate network
Correct Answer:
A
A
send
light_mode
delete
Question #50
An IS auditor concludes that logging and monitoring mechanisms within an organization are ineffective because central servers are not included within the central log repository. Which of the following audit procedures would have MOST likely identified this exception?
- AComparing all servers included in the current central log repository with the listing used for the prior-year audit
- BInspecting a sample of alerts generated from the central log repository
- CComparing a list of all servers from the directory server against a list of all servers present in the central log repository
- DInspecting a sample of alert settings configured in the central log repository
Correct Answer:
C
C
send
light_mode
delete
All Pages