Topic 3: Exam Pool C
Which of the following is the PRIMARY benefit of implementing configuration management for IT?
A.
It helps audit in verifying IT conformance to business requirements
B.
It establishes the dependency of application systems with various IT assets
C.
It provides visibility to the overall function and technical attributes of IT assets
D.
It helps automate change and release management processes in IT.
It provides visibility to the overall function and technical attributes of IT assets
Which of the following is the PRIMARY advantage of single sign-on (SSO)?
A.
Improves system performance
B.
Ensures good password practices
C.
Improves security
D.
Reduces administrative work load
Reduces administrative work load
What is the PRIMARY benefit of prototyping as a method of system development?
A.
Reduces the need for testing.
B.
Minimizes the time the IS auditor has to review the system
C.
Increases the likelihood of user satisfaction
D.
Eliminates the need for documentation
Increases the likelihood of user satisfaction
Which of the following is MOST important for an IS auditor to do during an exit meeting with an auditee?
A.
Ensure that the facts presented in the report are correct.
B.
Specify implementation dates for the recommendations
C.
Request input in determining corrective action.
D.
Communicate the recommendations to senior management
Specify implementation dates for the recommendations
When engaging services from external auditors, which of the following should be established FIRST7
A.
Termination conditions agreements
B.
Nondisclosure agreements
C.
Service level agreements
D.
Operational level agreements
Nondisclosure agreements
Which of ihe following BEST indicates a need to review an organization's information security policy?
A.
Completion of annual IT risk assessment
B.
Increasing complexity of business transactions
C.
Increasing exceptions approved by management
D.
High number of low-risk findings in the audit report
Increasing complexity of business transactions
A previously agreed-upon recommendation was not implemented because the auditee no longer agrees with the original finding. The IS auditor's FIRST course of action should be to:
A.
exclude the finding in the follow-up audit report.
B.
escalate the disagreement to the audit committee
C.
assess the reason for the disagreement.
D.
require implementation of the original recommendation
assess the reason for the disagreement.
A vulnerability in which of the following virtual systems would be of GREATEST concern to the IS auditor?
A.
The virtual application server
B.
The virtual machine management server
C.
The virtual antivirus server
D.
The virtual file server
The virtual machine management server
An organization is developing data classification standards and has asked internal audit for advice on aligning the standards with best practices. Internal audit would MOST likely recommend the standards should be:
A.
based on the results of an organization-wide risk assessment
B.
based on the business requirements for confidentiality of the information.
C.
aligned with the organization's segregation of duties requirements
D.
based on the business requirements for authentication of the information.
based on the results of an organization-wide risk assessment
Which of the following methods should be used to purge confidential data from write-once optical media?
A.
Degauss the media.
B.
Destroy the media
C.
Remove the references to data from the access index
D.
Write over the data with null values.
Destroy the media
A large insurance company is about to replace a major financial application. Which of the following is the IS auditor's PRIMARY focus when conducting the pre-implementation review?
A.
Procedure updates
B.
Migration of data
C.
System manuals
D.
Unit testing
Migration of data
An organization allows its employees to use personal mobile devices for work. Which of the following would BEST maintain information security without compromising employee privacy?
A.
Installing security software on the devices
B.
Restricting the use of devices for personal purposes during working hours
C.
Partitioning the work environment from personal space on devices
D.
Preventing users from adding applications
Partitioning the work environment from personal space on devices
| Page 29 out of 85 Pages |
| 1617181920212223242526272829303132333435363738394041 |
| CISA Practice Test Home |
Real-World Scenario Mastery: Our CISA practice exam don't just test definitions. They present you with the same complex, scenario-based problems you'll encounter on the actual exam.
Strategic Weakness Identification: Each practice session reveals exactly where you stand. Discover which domains need more attention, before exam day arrives.
Confidence Through Familiarity: There's no substitute for knowing what to expect. When you've worked through our comprehensive CISA practice exam questions pool covering all topics, the real exam feels like just another practice session.