100% satisfaction guarantee Immediately available after payment Read online or as PDF No strings attached 4,6 TrustPilot
logo-home
Exam (elaborations)

ISACA : IT CERTIFICATIONS EXAM WITH ANSWERS 2024 UPDATE

Rating
-
Sold
-
Pages
153
Grade
A+
Uploaded on
04-01-2024
Written in
2023/2024

Topic 1, Main Questions (240 Main Questions) IS management has decided to rewrite a legacy customer relations system using fourth generation languages (4GLs). Which of the following risks is MOST often associated with system development using 4GLs? A. Inadequate screen/report design facilities B. Complex programming language subsets C. Lack of portability across operating systems D. Inability to perform data intensive operations Answer: D Explanation: 4GLs are usually not suitable for data intensive operations. Instead, they are used mainly for graphic user interface (GUI) design or as simple query/report generators. Which of the following would be the BEST method for ensuring that critical fields in a master record have been updated properly? A. Field checks B. Control totals C. Reasonableness checks D. A before-and-after maintenance report Answer: D Explanation: A before-and-after maintenance report is the best answer because a visual review would provide the most positive verification that updating was proper. Which of the following is a dynamic analysis tool for the purpose of testing software modules? A. Blackbox test B. Desk checking C. Structured walk-through D. Design and code Answer: A Explanation: A blackbox test is a dynamic analysis tool for testing software modules. During the testing of software modules a blackbox test works first in a cohesive manner as one single unit/entity, consisting of numerous modules and second, with the user data that flows across software modules. In some cases, this even drives the software behavior. Which of the following is MOST likely to result from a business process reengineering (BPR) project? A. An increased number of people using technology B. Significant cost savings, through a reduction in the complexity of information technology C. A weaker organizational structures and less accountability D. Increased information protection (IP) risk will increase Answer: A Explanation: A BPR project more often leads to an increased number of people using technology, and this would be a cause for concern. Incorrect answers: B. As BPR is often technology oriented, and this technology is usually more complex and volatile than in the past, cost savings do not often materialize in this areA. D. There is no reason for IP to conflict with a BPR project, unless the project is not run properly. Which of the following devices extends the network and has the capacity to store frames and act as a storage and forward device? A. Router B. Bridge C. Repeater D. Gateway Answer: B Explanation: A bridge connects two separate networks to form a logical network (e.g., joining an ethernet and token network) and has the storage capacity to store frames and act as a storage and forward device. Bridges operate at the OSI data link layer by examining the media access control header of a data packet. Which of the following is a benefit of using callback devices? A. Provide an audit trail B. Can be used in a switchboard environment C. Permit unlimited user mobility D. Allow call forwarding Answer: A Explanation: A callback feature hooks into the access control software and logs all authorized and unauthorized access attempts, permitting the follow-up and further review of potential breaches. Call forwarding (choice D) is a means of potentially bypassing callback control. By dialing through an authorized phone number from an unauthorized phone number, a perpetrator can gain computer access. This vulnerability can be controlled through callback systems that are available. A call-back system requires that a user with an id and password call a remote server through a dial-up line, then the server disconnects and: A. dials back to the user machine based on the user id and password using a telephone number from its database. B. dials back to the user machine based on the user id and password using a telephone number provided by the user during this connection. C. waits for a redial back from the user machine for reconfirmation and then verifies the user id and password using its database. D. waits for a redial back from the user machine for reconfirmation and then verifies the user id and password using the sender's database. Answer: A Explanation

Show more Read less
Institution
Course

Content preview

ISACA : IT CERTIFICATIONS EXAM WITH ANSWERS 2024
UPDATE

, Isaca CISA : Practice Test
Topic 1, Main Questions (240 Main Questions)




Question No : 1 - (Topic 1)

IS management has decided to rewrite a legacy customer relations system using fourth
generation languages (4GLs). Which of the following risks is MOST often associated with
system development using 4GLs?

A. Inadequate screen/report design facilities
B. Complex programming language subsets
C. Lack of portability across operating systems
D. Inability to perform data intensive operations

Answer: D
Explanation:
4GLs are usually not suitable for data intensive operations. Instead, they are used mainly
for graphic user interface (GUI) design or as simple query/report generators.




Question No : 2 - (Topic 1)

Which of the following would be the BEST method for ensuring that critical fields in a
master record have been updated properly?

A. Field checks
B. Control totals
C. Reasonableness checks
D. A before-and-after maintenance report

Answer: D
Explanation:
A before-and-after maintenance report is the best answer because a visual review would
provide the most positive verification that updating was proper.




Question No : 3 - (Topic 1)

Which of the following is a dynamic analysis tool for the purpose of testing software
modules?

A. Blackbox test
B. Desk checking


www.CertificationKing.com 2

, Isaca CISA : Practice Test
C. Structured walk-through
D. Design and code

Answer: A
Explanation:
A blackbox test is a dynamic analysis tool for testing software modules. During the testing
of software modules a blackbox test works first in a cohesive manner as one single
unit/entity, consisting of numerous modules and second, with the user data that flows
across software modules. In some cases, this even drives the software behavior.




Question No : 4 - (Topic 1)

Which of the following is MOST likely to result from a business process reengineering
(BPR) project?

A. An increased number of people using technology
B. Significant cost savings, through a reduction in the complexity of information technology
C. A weaker organizational structures and less accountability
D. Increased information protection (IP) risk will increase

Answer: A
Explanation:
A BPR project more often leads to an increased number of people using technology, and
this would be a cause for concern. Incorrect answers:
B. As BPR is often technology oriented, and this technology is usually more complex and
volatile than in the past, cost savings do not often materialize in this areA.
D. There is no reason for IP to conflict with a BPR project, unless the project is not run
properly.




Question No : 5 - (Topic 1)

Which of the following devices extends the network and has the capacity to store frames
and act as a storage and forward device?

A. Router
B. Bridge
C. Repeater
D. Gateway

Answer: B



www.CertificationKing.com 3

, Isaca CISA : Practice Test
Explanation:
A bridge connects two separate networks to form a logical network (e.g., joining an
ethernet and token network) and has the storage capacity to store frames and act as a
storage and forward device. Bridges operate at the OSI data link layer by examining the
media access control header of a data packet.




Question No : 6 - (Topic 1)

Which of the following is a benefit of using callback devices?

A. Provide an audit trail
B. Can be used in a switchboard environment
C. Permit unlimited user mobility
D. Allow call forwarding

Answer: A
Explanation:
A callback feature hooks into the access control software and logs all authorized and
unauthorized access attempts, permitting the follow-up and further review of potential
breaches. Call forwarding (choice D) is a means of potentially bypassing callback control.
By dialing through an authorized phone number from an unauthorized phone number, a
perpetrator can gain computer access. This vulnerability can be controlled through callback
systems that are available.




Question No : 7 - (Topic 1)

A call-back system requires that a user with an id and password call a remote server
through a dial-up line, then the server disconnects and:

A. dials back to the user machine based on the user id and password using a telephone
number from its database.
B. dials back to the user machine based on the user id and password using a telephone
number provided by the user during this connection.
C. waits for a redial back from the user machine for reconfirmation and then verifies the
user id and password using its database.
D. waits for a redial back from the user machine for reconfirmation and then verifies the
user id and password using the sender's database.

Answer: A
Explanation:



www.CertificationKing.com 4

Written for

Course

Document information

Uploaded on
January 4, 2024
Number of pages
153
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

R445,14
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Read online or as PDF
No strings attached


Document also available in package deal

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
THEEXCELLENCELIBRARY Harvard University
Follow You need to be logged in order to follow users or courses
Sold
18
Member since
2 year
Number of followers
6
Documents
2641
Last sold
2 months ago
THE EXCELLENCE LIBRARY

The Excellence Library Where Academic Success Begins. Welcome to The Excellence Library — your trusted marketplace for past and upcoming exam papers with verified answers, spanning all academic fields. Whether you're a med student, a future lawyer, a high schooler prepping for finals, or a researcher looking for model dissertations — we've got you covered. What We Offer Accurate & Complete Exam Papers From Medicine, Nursing, Law (Bar Exams), High School subjects, and more. Model Dissertations & Novels Top-tier academic references and full-text materials to guide your writing and study. Affordable & Fair Pricing Quality resources at a price that respects students' budgets. Why Choose Us? Thoroughly Reviewed Answers – Every paper includes clear, correct solutions. Massive Library – Thousands of documents, constantly updated. Academic Excellence, Delivered – We help you prepare smarter, not harder. Fast Delivery – Get what you need, when you need it. Our Goal To empower students and professionals by offering reliable, affordable academic materials — helping you succeed one paper at a time.

Read more Read less
2,5

2 reviews

5
0
4
0
3
1
2
1
1
0

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions