Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

CISA Practice Exam Questions and Answers

Beoordeling
-
Verkocht
-
Pagina's
10
Cijfer
A+
Geüpload op
30-07-2022
Geschreven in
2021/2022

The objective of concurrency control in a database system is to: Select an answer: A. restrict updating of the database to authorized users. B. prevent integrity problems when two processes attempt to update the same data at the same time. C. prevent inadvertent or unauthorized disclosure of data in the database. D. ensure the accuracy, completeness and consistency of data. B. prevent integrity problems when two processes attempt to update the same data at the same time. Which of the following security measures BEST ensures the integrity of information stored in a data warehouse? a read-only restriction 00:38 01:36 An organization has just completed its annual risk assessment. Regarding the business continuity plan, what should an IS auditor recommend as the next step for the organization? Review and evaluate the business continuity plan for adequacy An IS auditor discovers that devices connected to the network are not included in a network diagram that had been used to develop the scope of the audit. The chief information officer explains that the diagram is being updated and awaiting final approval. The IS auditor should FIRST: evaluate the impact of the undocumented devices on the audit scope. When auditing the archiving process of emails, the IS auditor should pay the MOST attention to: the existence of a data retention policy. During an audit of an enterprise that is dedicated to e-commerce, the IS manager states that digital signatures are used when receiving communications from customers. To substantiate this, an IS auditor must prove that which of the following is used? A hash of the data that is transmitted and encrypted with the customer's private key A consulting firm has created a File Transfer Protocol (FTP) site for the purpose of receiving financial data and has communicated the site's address, user ID and password to the financial services company in separate email messages. The company is to transmit its data to the FTP site after manually encrypting the data. The IS auditor's GREATEST concern with this process is that: the users may not remember to manually encrypt the data before transmission. Which of the following choices would be the BEST source of information when developing a risk-based audit plan? Senior management identify key business processes. An IS auditor performing a review of application controls would evaluate the: impact of any exposures discovered. An IS auditor is reviewing Secure Sockets Layer enabled web sites for the company. Which of the following choices would be the HIGHEST risk? Self-signed digital certificates A large chain of shops with electronic funds transfer at point-of-sale devices has a central communications processor for connecting to the banking network. Which of the following is the BEST disaster recovery plan for the communications processor? Alternative standby processor at another network node Which of the following should an IS auditor review to understand project progress in terms of time, budget and deliverables for early detection of possible overruns and for projecting estimates at completion? earned value analysis (This is an industry standard method for measuring a project's progress at any given point in time, forecasting its completion date and final cost, and analyzing variances in the schedule and budget as the project proceeds. It compares the planned amount of work with what has actually been completed to determine if the cost, schedule and work accomplished are progressing in accordance with the plan. EVA works most effectively if a well-formed work breakdown structure exists.)

Meer zien Lees minder
Instelling
Vak

Voorbeeld van de inhoud

CISA Practice Exam Questions
The objective of concurrency control in a database system is to:
Select an answer:
A. restrict updating of the database to authorized users.
B. prevent integrity problems when two processes attempt to update the same data at
the same time.
C. prevent inadvertent or unauthorized disclosure of data in the database.
D. ensure the accuracy, completeness and consistency of data. - Answer B. prevent
integrity problems when two processes attempt to update the same data at the same
time.

Which of the following security measures BEST ensures the integrity of information
stored in a data warehouse? - Answer a read-only restriction

An organization has just completed its annual risk assessment. Regarding the business
continuity plan, what should an IS auditor recommend as the next step for the
organization? - Answer Review and evaluate the business continuity plan for adequacy

An IS auditor discovers that devices connected to the network are not included in a
network diagram that had been used to develop the scope of the audit. The chief
information officer explains that the diagram is being updated and awaiting final
approval. The IS auditor should FIRST: - Answer evaluate the impact of the
undocumented devices on the audit scope.

When auditing the archiving process of emails, the IS auditor should pay the MOST
attention to: - Answer the existence of a data retention policy.

During an audit of an enterprise that is dedicated to e-commerce, the IS manager states
that digital signatures are used when receiving communications from customers. To
substantiate this, an IS auditor must prove that which of the following is used? - Answer
A hash of the data that is transmitted and encrypted with the customer's private key

A consulting firm has created a File Transfer Protocol (FTP) site for the purpose of
receiving financial data and has communicated the site's address, user ID and
password to the financial services company in separate email messages. The company
is to transmit its data to the FTP site after manually encrypting the data. The IS auditor's
GREATEST concern with this process is that: - Answer the users may not remember to
manually encrypt the data before transmission.

Which of the following choices would be the BEST source of information when
developing a risk-based audit plan? - Answer Senior management identify key business
processes.

, An IS auditor performing a review of application controls would evaluate the: - Answer
impact of any exposures discovered.

An IS auditor is reviewing Secure Sockets Layer enabled web sites for the company.
Which of the following choices would be the HIGHEST risk? - Answer Self-signed digital
certificates

A large chain of shops with electronic funds transfer at point-of-sale devices has a
central communications processor for connecting to the banking network. Which of the
following is the BEST disaster recovery plan for the communications processor? -
Answer Alternative standby processor at another network node

Which of the following should an IS auditor review to understand project progress in
terms of time, budget and deliverables for early detection of possible overruns and for
projecting estimates at completion? - Answer earned value analysis
(This is an industry standard method for measuring a project's progress at any given
point in time, forecasting its completion date and final cost, and analyzing variances in
the schedule and budget as the project proceeds. It compares the planned amount of
work with what has actually been completed to determine if the cost, schedule and work
accomplished are progressing in accordance with the plan. EVA works most effectively
if a well-formed work breakdown structure exists.)

The MAIN purpose for periodically testing offsite disaster recovery facilities is to: -
Answer ensure the continued compatibility of the contingency facilities.

The success of control self-assessment depends highly on: - Answer line managers
assuming a portion of the responsibility for control monitoring
(The primary objective of a control self-assessment (CSA) program is to leverage the
internal audit function by shifting some of the control monitoring responsibilities to the
functional area line managers. The success of a CSA program depends on the degree
to which line managers assume responsibility for controls. This enables line managers
to detect and respond to control errors promptly.)

What is a risk associated with attempting to control physical access to sensitive areas
such as computer rooms using card keys or locks? - Answer Unauthorized individuals
wait for controlled doors to open and walk in behind those authorized.

The vice president of human resources has requested an IS audit to identify payroll
overpayments for the previous year. Which would be the BEST audit technique to use in
this situation? - Answer Generalized audit software
(This features include mathematical computations, stratification, statistical analysis,
sequence checking, duplicate checking and re-computations. An IS auditor, using
generalized audit software, can design appropriate tests to recompute the payroll,
thereby determining whether there were overpayments and to whom they were made.)

Geschreven voor

Vak

Documentinformatie

Geüpload op
30 juli 2022
Aantal pagina's
10
Geschreven in
2021/2022
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$11.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF


Ook beschikbaar in voordeelbundel

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
EvaTee Phoenix University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
5224
Lid sinds
4 jaar
Aantal volgers
3568
Documenten
55973
Laatst verkocht
4 uur geleden
TIGHT DEADLINE? I CAN HELP

Many students don\'t have the time to work on their academic papers due to balancing with other responsibilities, for example, part-time work. I can relate. kindly don\'t hesitate to contact me, my study guides, notes and exams or test banks, are 100% graded

3.8

951 beoordelingen

5
453
4
167
3
173
2
48
1
110

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen