CISA Demo
CISA Demo
Isaca
CISA Exam
Isaca Certification
QA:364
Questions and Answers PDF 1/105
Question: 1
An IT balanced scorecard is the MOST effective means of monitoring:
Answer: A
Explanation:
Question: 2
When reviewing an organization's information security policies, an IS auditor should verify that the
policies have been defined PRIMARILY on the basis of:
Answer: B
Explanation:
Question: 3
Which of the following would be an IS auditor's GREATEST concern when reviewing the early stages
of a software development project?
Answer: C
Explanation:
Question: 4
Which of the following is the BEST data integrity check?
Answer: C
Explanation:
Question: 5
Spreadsheets are used to calculate project cost estimates. Totals for each cost category are then
keyed into the job-costing system. What is the BEST control to ensure that data is accurately entered
into the system?
Answer: C
Explanation:
Question: 6
An incorrect version of source code was amended by a development team. This MOST likely indicates
a weakness in:
A. incident management.
B. quality assurance (QA).
C. change management.
D. project management.
Answer: C
Explanation:
Question: 7
An organizations audit charier PRIMARILY:
Questions and Answers PDF 3/105
Answer: A
Explanation:
Question: 8
The decision to accept an IT control risk related to data quality should be the responsibility of the:
Answer: D
Explanation:
Question: 9
Which of the following data would be used when performing a business impact analysis (BIA)?
Answer: A
Explanation:
Question: 10
Which of the following is the MOST important consideration for an IS auditor when assessing the
adequacy of an organization's information security policy?
Answer: D
Explanation:
Question: 11
Questions and Answers PDF 4/105
During the evaluation of controls over a major application development project, the MOST effective
use of an IS auditor's time would be to review and evaluate:
Answer: A
Explanation:
Question: 12
An IS auditor finds that firewalls are outdated and not supported by vendors. Which of the following
should be the auditor's NEXT course of action?
Answer: D
Explanation:
Question: 13
Which of the following is the BEST way to determine whether a test of a disaster recovery plan (DRP)
was successful?
Answer: C
Explanation:
Question: 14
An IS auditor found that a company executive is encouraging employee use of social networking sites
for business purposes. Which of the following recommendations would BEST help to reduce the risk
of data leakage?
Answer: B
Explanation:
Question: 15
An IS auditor notes that several employees are spending an excessive amount of time using social
media sites for personal reasons. Which of the following should the auditor recommend be
performed FIRST?
Answer: D
Explanation:
Question: 16
Which of the following fire suppression systems needs to be combined with an automatic switch to
shut down the electricity supply in the event of activation?
A. Carbon dioxide
B. FM-200
C. Dry pipe
D. Halon
Answer: C
Explanation:
Question: 17
Which of the following would MOST likely impair the independence of the IS auditor when
performing a post-implementation review of an application system?
A. The IS auditor provided consulting advice concerning application system best practices.
B. The IS auditor participated as a member of the application system project team, but did not have
operational responsibilities.
C. The IS auditor designed an embedded audit module exclusively for auditing the application
system.
D. The IS auditor implemented a specific control during the development of the application system.
Answer: D
Questions and Answers PDF 6/105
Explanation:
Question: 18
An organization plans to receive an automated data feed into its enterprise data warehouse from a
third-party service provider. Which of the following would be the BEST way to prevent accepting bad
data?
Answer: D
Explanation:
Question: 19
An IS auditor suspects an organization's computer may have been used to commit a crime. Which of
the following is the auditor's BEST course of action?
Answer: C
Explanation:
Question: 20
Which of the following access rights presents the GREATEST risk when granted to a new member of
the system development staff?
Answer: A
Explanation:
Question: 21
An IS auditor is conducting a post-implementation review of an enterprise resource planning (ERP)
system. End users indicated concerns with the accuracy of critical automatic calculations made by
Questions and Answers PDF 7/105
Answer: C
Explanation:
Question: 22
Which of the following provides the MOST reliable audit evidence on the validity of transactions in a
financial application?
A. Walk-through reviews
B. Substantive testing
C. Compliance testing
D. Design documentation reviews
Answer: B
Explanation:
Question: 23
During an incident management audit, an IS auditor finds that several similar incidents were logged
during the audit period. Which of the following is the auditor's MOST important course of action?
Answer: B
Explanation:
Question: 24
During an external review, an IS auditor observes an inconsistent approach in classifying system
criticality within the organization. Which of the following should be recommended as the PRIMARY
factor to determine system criticality?
Answer: B
Explanation:
Question: 25
An IS auditor discovers an option in a database that allows the administrator to directly modify any
table. This option is necessary to overcome bugs in the software, but is rarely used. Changes to tables
are automatically logged. The IS auditor's FIRST action should be to:
A. recommend that the option to directly modify the database be removed immediately.
B. recommend that the system require two persons to be involved in modifying the database.
C. determine whether the log of changes to the tables is backed up.
D. determine whether the audit trail is secured and reviewed.
Answer: D
Explanation:
Question: 26
An IS auditor finds that a key Internet-facing system is vulnerable to attack and that patches are not
available. What should the auditor recommend be done FIRST?
Answer: D
Explanation:
Question: 27
IS management has recently disabled certain referential integrity controls in the database
management system (DBMS) software to provide users increased query performance. Which of the
following controls will MOST effectively compensate for the lack of referential integrity?
Answer: B
Explanation:
Question: 28
Questions and Answers PDF 9/105
A system administrator recently informed the IS auditor about the occurrence of several unsuccessful
intrusion attempts from outside the organization. Which of the following is MOST effective in
detecting such an intrusion?
Answer: A
Explanation:
Question: 29
The PRIMARY advantage of object-oriented technology is enhanced:
Answer: C
Explanation:
Question: 30
From an IS auditor's perspective, which of the following would be the GREATEST risk associated with
an incomplete inventory of deployed software in an organization?
Answer: C
Explanation:
Question: 31
Which of the following BEST minimizes performance degradation of servers used to authenticate
users of an e-commerce website?
A. Configure a single server as a primary authentication server and a second server as a secondary
authentication server.
B. Configure each authentication server as belonging to a cluster of authentication servers.
Questions and Answers PDF 10/105
C. Configure each authentication server and ensure that each disk of its RAID is attached to the
primary controller.
D. Configure each authentication server and ensure that the disks of each server form part of a
duplex.
Answer: B
Explanation:
Question: 32
During an audit of a reciprocal disaster recovery agreement between two companies, the IS auditor
would be MOST concerned with the:
Answer: D
Explanation:
Question: 33
Which of the following attack techniques will succeed because of an inherent security weakness in
an Internet firewall?
A. Phishing
B. Using a dictionary attack of encrypted passwords
C. Intercepting packets and viewing passwords
D. Flooding the site with an excessive number of packets
Answer: D
Explanation:
Question: 34
Which of the following is an executive management concern that could be addressed by the
implementation of a security metrics dashboard?
Answer: A
Explanation: