Topic 1: Exam Pool A
The BEST way to evaluate the effectiveness of a newly developed application is to:
A.
perform a post-implementation review,
B.
review acceptance-testing results
C.
analyze load-testing results,
D.
perform a pre-implementation renew.
review acceptance-testing results
While planning a security audit, an IS auditor is made aware of a security review carried out by external consultants. It is MOST implement for the auditor to:
A.
Re-perform the security review
B.
Asses the objectively and competence of the consultant
C.
Review similar reports issued by the consultants.
D.
Accept the finding and conclusion of the consultants
Review similar reports issued by the consultants.
Which of the following procedures would BEST contribute to the reliability of information in a data warehouse?
A.
Retaining only current data.
B.
Maintain archive data
C.
Maintaining current metadata
D.
Storing only a single type of data
Maintaining current metadata
Which of the following will BEST help to ensure that an in-house application in the production environment is current?
A.
Version control procedures
B.
Change management
C.
Production access control
D.
Quality assurance
Version control procedures
Which of the following is the BEST source for describing the objectives of an organization s information systems?
A.
IT management
B.
Business process owners
C.
Information security management
D.
End users
Business process owners
Which of the following would an IS auditor recommend as the MOST effective preventive control to reduce the risk of data leakage'
A.
Ensure that paper documents arc disposed security.
B.
Implement an intrusion detection system (IDS).
C.
Verify that application logs capture any changes made.
D.
Validate that all data files contain digital watermarks
Validate that all data files contain digital watermarks
An IS auditor notes that help desk personnel are required to make critical decisions duringmajor service disruptions. Which of the following is the auditor's BEST recommendation to address this situation?
A.
Introduce classification of disruptions by risk category.
B.
Provide historical incident response information for the help desk
C.
Implement an incident response plan
D.
Establish shared responsibility among business peers
Implement an incident response plan
Which audit technique provides the GREATEST assurance that incident management procedures are effective?
A.
Determining whether incidents are categorized and addressed
B.
Comparing incident management procedures to best practices
C.
Performing comprehensive vulnerability scanning and penetration testing
D.
Evaluating end-user satisfaction survey results
Evaluating end-user satisfaction survey results
An IS auditor is reviewing the upgrading of an operating system. Which of the following would be the GREATEST audit concern?
A.
The lack of change control
B.
The lack of malware protection
C.
The lack of release notes
D.
The lack of activity logging
The lack of change control
A recent audit identified duplicate software licenses and technologies Which of the following would be MOST helpful to prevent this type of duplication in the future?
A.
Conducting periodic inventory reviews
B.
Updating IT procurement policies and procedures
C.
Centralizing IT procurement and approval practices
D.
Establishing a project management office
Centralizing IT procurement and approval practices
Which of the following is the MOST effective means of helping management and the IT strategy committee to monitor IT performance?
A.
End-user satisfaction surveys
B.
Gap analysis
C.
Measurement of service levers against metrics
D.
Infrastructure monitoring reports
Measurement of service levers against metrics
Two organizations will share ownership of a new enterprise resource management (ERM) system To help ensure the successful implementation of the system, it k MOST important to
define:
A.
the governance model.
B.
access to data.
C.
appropriate procedures
D.
custody of assets
the governance model.
| Page 4 out of 85 Pages |
| 1234567891011121314151617181920212223242526 |
| CISA Practice Test Home |
Real-World Scenario Mastery: Our CISA practice exam don't just test definitions. They present you with the same complex, scenario-based problems you'll encounter on the actual exam.
Strategic Weakness Identification: Each practice session reveals exactly where you stand. Discover which domains need more attention, before exam day arrives.
Confidence Through Familiarity: There's no substitute for knowing what to expect. When you've worked through our comprehensive CISA practice exam questions pool covering all topics, the real exam feels like just another practice session.