Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

Certified Information Systems Auditor Version: 3.9

Rating
-
Sold
-
Pages
493
Grade
A+
Uploaded on
01-08-2022
Written in
2022/2023

Isaca CISA Certified Information Systems Auditor Version: 3.9 Topic 1, Main Questions (240 Main Questions) QUESTION NO: 1 IS management has decided to rewrite a legacy customer relations system using fourth generation languages (4GLs). Which of the following risks is MOST often associated with system development using 4GLs? A. Inadequate screen/report design facilities B. Complex programming language subsets C. Lack of portability across operating systems D. Inability to perform data intensive operations QUESTION NO: 2 Which of the following would be the BEST method for ensuring that critical fields in a master record have been updated properly? A. Field checks B. Control totals C. Reasonableness checks D. A before-and-after maintenance report QUESTION NO: 3 Which of the following is a dynamic analysis tool for the purpose of testing software modules? A. Blackbox test B. Desk checking C. Structured walk-through D. Design and code QUESTION NO: 4 Which of the following is MOST likely to result from a business process reengineering (BPR) project? A. An increased number of people using technology B. Significant cost savings, through a reduction in the complexity of information technology C. A weaker organizational structures and less accountability D. Increased information protection (IP) risk will increase QUESTION NO: 5 Which of the following devices extends the network and has the capacity to store frames and act as a storage and forward device? A. Router B. Bridge C. Repeater D. Gateway QUESTION NO: 6 Which of the following is a benefit of using callback devices? A. Provide an audit trail B. Can be used in a switchboard environment C. Permit unlimited user mobility D. Allow call forwarding QUESTION NO: 7 A call-back system requires that a user with an id and password call a remote server through a dial-up line, then the server disconnects and: A. dials back to the user machine based on the user id and password using a telephone number from its database. B. dials back to the user machine based on the user id and password using a telephone number provided by the user during this connection. C. waits for a redial back from the user machine for reconfirmation and then verifies the user id and password using its database. D. waits for a redial back from the user machine for reconfirmation and then verifies the user id and password using the sender's database. QUESTION NO: 8 Structured programming is BEST described as a technique that: A. provides knowledge of program functions to other programmers via peer reviews. B. reduces the maintenance time of programs by the use of small-scale program modules. C. makes the readable coding reflect as closely as possible the dynamic execution of the program. D. controls the coding and testing of the high-level functions of the program in the development process. QUESTION NO: 9 Which of the following data validation edits is effective in detecting transposition and transcription errors? A. Range check B. Check digit C. Validity check D. Duplicate check QUESTION NO: 10 An offsite information processing facility having electrical wiring, air conditioning and flooring, but no computer or communications equipment is a: A. cold site. B. warm site. C. dial-up site. D. duplicate processing facility. .....................................................continued.......................................................

Show more Read less
Institution
Course

Content preview

Isaca CISA




Certified Information Systems Auditor
Version: 3.9

, Isaca CISA Exam
Topic 1, Main Questions (240 Main Questions)

QUESTION NO: 1

IS management has decided to rewrite a legacy customer relations system using fourth generation
languages (4GLs). Which of the following risks is MOST often associated with system
development using 4GLs?

A. Inadequate screen/report design facilities
B. Complex programming language subsets
C. Lack of portability across operating systems
D. Inability to perform data intensive operations

Answer: D
Explanation:
4GLs are usually not suitable for data intensive operations. Instead, they are used mainly for
graphic user interface (GUI) design or as simple query/report generators.



QUESTION NO: 2

Which of the following would be the BEST method for ensuring that critical fields in a master
record have been updated properly?

A. Field checks
B. Control totals
C. Reasonableness checks
D. A before-and-after maintenance report

Answer: D
Explanation:
A before-and-after maintenance report is the best answer because a visual review would provide
the most positive verification that updating was proper.



QUESTION NO: 3

Which of the following is a dynamic analysis tool for the purpose of testing software modules?

A. Blackbox test
B. Desk checking
C. Structured walk-through
D. Design and code

Answer: A
Explanation:



"Pass Any Exam. Any Time." - www.actualtests.com 2

, Isaca CISA Exam
A blackbox test is a dynamic analysis tool for testing software modules. During the testing of
software modules a blackbox test works first in a cohesive manner as one single unit/entity,
consisting of numerous modules and second, with the user data that flows across software
modules. In some cases, this even drives the software behavior.



QUESTION NO: 4

Which of the following is MOST likely to result from a business process reengineering (BPR)
project?

A. An increased number of people using technology
B. Significant cost savings, through a reduction in the complexity of information technology
C. A weaker organizational structures and less accountability
D. Increased information protection (IP) risk will increase

Answer: A
Explanation:
A BPR project more often leads to an increased number of people using technology, and this
would be a cause for concern. Incorrect answers:
B. As BPR is often technology oriented, and this technology is usually more complex and volatile
than in the past, cost savings do not often materialize in this areA.
D. There is no reason for IP to conflict with a BPR project, unless the project is not run properly.



QUESTION NO: 5

Which of the following devices extends the network and has the capacity to store frames and act
as a storage and forward device?

A. Router
B. Bridge
C. Repeater
D. Gateway

Answer: B
Explanation:
A bridge connects two separate networks to form a logical network (e.g., joining an ethernet and
token network) and has the storage capacity to store frames and act as a storage and forward
device. Bridges operate at the OSI data link layer by examining the media access control header
of a data packet.



QUESTION NO: 6
Which of the following is a benefit of using callback devices?

"Pass Any Exam. Any Time." - www.actualtests.com 3

, Isaca CISA Exam
A. Provide an audit trail
B. Can be used in a switchboard environment
C. Permit unlimited user mobility
D. Allow call forwarding

Answer: A
Explanation:
A callback feature hooks into the access control software and logs all authorized and unauthorized
access attempts, permitting the follow-up and further review of potential breaches. Call forwarding
(choice D) is a means of potentially bypassing callback control. By dialing through an authorized
phone number from an unauthorized phone number, a perpetrator can gain computer access. This
vulnerability can be controlled through callback systems that are available.



QUESTION NO: 7

A call-back system requires that a user with an id and password call a remote server through a
dial-up line, then the server disconnects and:

A. dials back to the user machine based on the user id and password using a telephone number
from its database.
B. dials back to the user machine based on the user id and password using a telephone number
provided by the user during this connection.
C. waits for a redial back from the user machine for reconfirmation and then verifies the user id
and password using its database.
D. waits for a redial back from the user machine for reconfirmation and then verifies the user id
and password using the sender's database.

Answer: A
Explanation:
A call-back system in a net centric environment would mean that a user with an id and password
calls a remote server through a dial-up line first, and then the server disconnects and dials back to
the user machine based on the user id and password using a telephone number from its database.
Although the server can depend upon its own database, it cannot know the authenticity of the
dialer when the user dials again. The server cannot depend upon the sender's database to dial
back as the same could be manipulated.



QUESTION NO: 8

Structured programming is BEST described as a technique that:

A. provides knowledge of program functions to other programmers via peer reviews.
B. reduces the maintenance time of programs by the use of small-scale program modules.
C. makes the readable coding reflect as closely as possible the dynamic execution of the program.


"Pass Any Exam. Any Time." - www.actualtests.com 4

Written for

Institution
Course

Document information

Uploaded on
August 1, 2022
Number of pages
493
Written in
2022/2023
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$15.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
docguru Chamberlian School of Nursing
Follow You need to be logged in order to follow users or courses
Sold
286
Member since
5 year
Number of followers
257
Documents
2204
Last sold
1 month ago
doc guru

get all the latest docs reviewed for top grades,,,,

3.5

50 reviews

5
19
4
11
3
6
2
4
1
10

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions