Topic 6: Exam Pool (Jul-Aug)
An IS auditor is reviewing IT policies and found that most policies have not been reviewed in over 3 years.
The MOST significant risk is that the policies do not reflect.
A.
The vision of the CEO
B.
Current industry best practices
C.
The mission of the organization
D.
Current legal requirements
Current legal requirements
Which of the following roles is ULTIMATELY accountable for the protection of an organization s
information?
A.
The board of directors
B.
The chief information security officer (CISO)
C.
The data owner
D.
The chief information officer (CIO)
The board of directors
Which of the following should an IS auditor review FIRST when planning a customer data privacy audit?
A.
Legal and compliance requirements
B.
Customer agreements
C.
Organizational policies and procedures
D.
Data classification
Organizational policies and procedures
Which of the following is the PRIMARY objective of using a capability maturity model as a tool to
communicate
audit results to senior management?
A.
To evaluate management's action plan
B.
To confirm audit findings
C.
To illustrate improvement opportunities
D.
To prioritize remediation efforts
To illustrate improvement opportunities
Which of the following areas are the MOST likely cause of an application producing several erroneous
reports?
A.
A deficiency in user acceptance testing
B.
A deficiency in IT resource allocation
C.
A deficiency in patch management
D.
A deficiency in database administration
A deficiency in user acceptance testing
An advantage of object-oriented system development is that it:
A.
decreases the need for system documentation.
B.
partitions systems into a client/server architecture.
C.
is suited to data with complex relationships.
D.
is easier to code than procedural languages.
is easier to code than procedural languages.
Which of the following should an IS auditor expect to find in an organization s information security policies?
A.
Secure coding procedures
B.
Authentication requirements
C.
Security configuration settings
D.
Asset provisioning lifecycle
Authentication requirements
Which of the following is the BCST way to determine the effectiveness of a recently installed intrusion
detection system (IDS)?
A.
Implement access control
B.
Conduct attack simulation.
C.
Review audit logs
D.
inspect IDS configuration
Conduct attack simulation.
The risk that the IS auditor will not find an error that has occurred is identified by which of the following
terms?
A.
Prevention
B.
Inherent
C.
Detection
D.
Control
Control
An IT steering committee assists the board of directors to fulfill IT governance duties by:
A.
developing IT policies and procedures for project tracking.
B.
focusing on the supply of IT services and products
C.
overseeing major projects and IT resource allocation
D.
implementing the IT strategy
implementing the IT strategy
The results of a feasibility study for acquiring a new system should provide management with a clear
understanding of:
A.
how hardware selection criteria are aligned with the IS strategic plan.
B.
critical application systems' utilization of computer resources.
C.
the approach to meeting data processing needs
D.
application security over critical data processing.
how hardware selection criteria are aligned with the IS strategic plan.
As part of a quality assurance initiative, an organization has engaged an external auditor to evaluate the
internal IS audit function. Which of the
following observations should be of MOST concern?
A.
The audit team is not sufficiently leveraging data analytics.
B.
Audit reports are not approved by the audit committee.
C.
Audit reports do not state they are conducted in accordance with industry standards.
D.
Audit engagements are not risk-based.
Audit engagements are not risk-based.
| Page 39 out of 85 Pages |
| 2627282930313233343536373839404142434445464748495051 |
| CISA Practice Test Home |
Real-World Scenario Mastery: Our CISA practice exam don't just test definitions. They present you with the same complex, scenario-based problems you'll encounter on the actual exam.
Strategic Weakness Identification: Each practice session reveals exactly where you stand. Discover which domains need more attention, before exam day arrives.
Confidence Through Familiarity: There's no substitute for knowing what to expect. When you've worked through our comprehensive CISA practice exam questions pool covering all topics, the real exam feels like just another practice session.