CISA Practice exam 1

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/103

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

104 Terms

1
New cards

IS auditor is reviewing database security for an organizatino. What would be most important consideration for database hardening.

2
New cards

The BEST method of confirming the accuracy of a system tax calculation is by:

3
New cards

IS auditor reviewing wireless network security determines that the Dynamic host Configuration Protocol is disabled at all wireless access points. What does this practice help with

4
New cards

During planning stage of IS auditor, what is the primary goal of an IS auditor?

5
New cards

In a risk-based information systems (IS) audit, where both inherent and control risk ahve been assessed as high, an IS auditor would most likely compensate the scenario by performing additional what?

6
New cards

What is a key benefit of a control self-assessment (CSA)?

7
New cards

To support an organization’s goals, an IT department should have

8
New cards

IS auditor has been assigned to conduct a test that compares job run logs to computer job schedules. What observation would be the greatest concern to the IS auditor?

9
New cards

IS auditor uses computer-assisted audit techniques (CAATs) to collect and analyze data. What attribute of evidence is most affected by using CAATs?

10
New cards

What should be the first action of an IS auditor during a dispute with a department manager over audit findings?

11
New cards

What is the primary consideration for an IS auditor reviewing the prioritzation and coordinatio of IT projects and program management?

12
New cards

An organization purchased a third-party application and made significant modifications. While auditing the development process for this customer-facing application, the IS auditor noted that the vendor has been in business for only one year. What would help mitigate the risk relating to continued application support?

13
New cards

What antispam filtering method has the lowest possibility fo false-positive alerts?

14
New cards

What represents the greatest risk crated by a reciprocal agreement for disaster recovery between two organizations?

15
New cards

Offsite information processing facility (IPF) with electrical wiring, air conditioning and flooring, but no computer or communications equipment is referred to as what?

16
New cards

what type of penetration test simulates a real attack and is used to test incident handling and repsonse capability of the target?

17
New cards

IS auditor reviewing an org’s disaster recovery plan (DRP) should primarily verify that it is

18
New cards

An organizatio nhas contracted with a vendor for a turnkey solution for its electronic toll collection system (ETCS). The vendor has provided its proprietary application software as part of the solution. What should the contract require?

\

19
New cards

An IS auditor who has discovered unauthorized transactions during a review of electronic data interchange (EDI) transactions is likely to recommend improving what?

20
New cards

Organization with extremely high security requirements is evaluating the effectiveness of biometric systems. What performance indicator is most important?

21
New cards

email traffic from the internet is routed via firewall-1 to the mail gateway. Mail is routed from the mail gateway, vai firewall-2, to the mail recipients in the internal network. The IDS detects traffic for the internal wall did not originate from teh mail gateway. The first action triggered by the IDS should be to?

22
New cards

digitial signatures require what in regards to public/private keys?

23
New cards

IS auditor found that the enterprise architecture (EA) recently adopted by an organization has an adequate current-state representation. However, the organization has started a separate project to develop a future-state representation. The IS auditor should do what?

24
New cards

when reviewing system parameters, an IS auditor’s primary concern should be that?

25
New cards

IS auditor reviewing a recently completed conversion to a new enterprise resource planning system. In the final stage of the conversion process, the organization ran the old and new systems in parallel for 30 days before allowing the new system to run on its own. What is the most significatn advantage to the organization using this strategy?

26
New cards

What is the best factor for determining the required extent of data collection during the planning phase of an IS compliance audit?

27
New cards

When determing the acceptable time period for the resumption of critical business processes, what should be evaluated?

28
New cards

what should the IS auditor review to ensure the correct version of a data file is used for a production run?

29
New cards

what is the best way to minimize unauthorized access to unattended end-user PC systems?

30
New cards
31
New cards
32
New cards
33
New cards
34
New cards
35
New cards
36
New cards
37
New cards
38
New cards
39
New cards
40
New cards
41
New cards
42
New cards
43
New cards
44
New cards
45
New cards
46
New cards
47
New cards
48
New cards
49
New cards
50
New cards
51
New cards
52
New cards
53
New cards
54
New cards
55
New cards
56
New cards
57
New cards
58
New cards
59
New cards
60
New cards
61
New cards
62
New cards
63
New cards
64
New cards
65
New cards
66
New cards
67
New cards
68
New cards
69
New cards
70
New cards
71
New cards
72
New cards
73
New cards
74
New cards
75
New cards
76
New cards
77
New cards
78
New cards
79
New cards
80
New cards
81
New cards
82
New cards
83
New cards
84
New cards
85
New cards
86
New cards
87
New cards
88
New cards
89
New cards
90
New cards
91
New cards
92
New cards
93
New cards
94
New cards
95
New cards
96
New cards
97
New cards
98
New cards
99
New cards
100
New cards