Voordeelbundel
CISA Exam Review Questions & 100% Correct Answers
CISA Exam Review Questions & 100% Correct Answers
[Meer zien]CISA Exam Review Questions & 100% Correct Answers
[Meer zien]Information system auditors have identified separation of duties in enterprise 
resource planning (ERP) systems. 
Which of the following is the best way to prevent repetitive configuration from 
occurring? 
A. Use a role-based model to grant user access 
B. Regularly monitor access rights 
C. Corr...
Voorbeeld 2 van de 7 pagina's
In winkelwagenInformation system auditors have identified separation of duties in enterprise 
resource planning (ERP) systems. 
Which of the following is the best way to prevent repetitive configuration from 
occurring? 
A. Use a role-based model to grant user access 
B. Regularly monitor access rights 
C. Corr...
Audit Charter 
 :~~ An overarching document that covers the entire scope of the audit 
activities in an entity. (Purpose, responsibility, authority, and 
accountability). An engagement letter is more focused on a particular audit 
exercise that is sought to be initiated in an organization with a ...
Voorbeeld 2 van de 13 pagina's
In winkelwagenAudit Charter 
 :~~ An overarching document that covers the entire scope of the audit 
activities in an entity. (Purpose, responsibility, authority, and 
accountability). An engagement letter is more focused on a particular audit 
exercise that is sought to be initiated in an organization with a ...
In a public key infrastructure (PKI), which of the following may be relied upon to 
prove that an online transaction was authorized by a specific customer? 
Correct A. Nonrepudiation 
B. Encryption 
C. Authentication 
D. Integrity 
. 
 :~~ You are correct, the answer is A. 
A. Nonrepudiation, achi...
Voorbeeld 4 van de 286 pagina's
In winkelwagenIn a public key infrastructure (PKI), which of the following may be relied upon to 
prove that an online transaction was authorized by a specific customer? 
Correct A. Nonrepudiation 
B. Encryption 
C. Authentication 
D. Integrity 
. 
 :~~ You are correct, the answer is A. 
A. Nonrepudiation, achi...
Which of the following best describes a baseline document? 
a. A PCI industry standard requiring a 15-minute session timeout 
b. Installation step recommendations from the vendor for an Active Directory 
server 
c. A network topography diagram of the Active Directory forest 
d. Security configurati...
Voorbeeld 4 van de 55 pagina's
In winkelwagenWhich of the following best describes a baseline document? 
a. A PCI industry standard requiring a 15-minute session timeout 
b. Installation step recommendations from the vendor for an Active Directory 
server 
c. A network topography diagram of the Active Directory forest 
d. Security configurati...
An IS auditor is reviewing access to an application to determine whether the 10 
most recent "new user" forms were correctly authorized. This is an example of: 
 :~~ compliance testing. 
The decisions and actions of an IS auditor are MOST likely to affect which of the 
following risks? 
 :~~ Det...
Voorbeeld 3 van de 16 pagina's
In winkelwagenAn IS auditor is reviewing access to an application to determine whether the 10 
most recent "new user" forms were correctly authorized. This is an example of: 
 :~~ compliance testing. 
The decisions and actions of an IS auditor are MOST likely to affect which of the 
following risks? 
 :~~ Det...
Where in the Word program window can you find the top and bottom margins? 
 :~~ vertical ruler 
What is an interactive object that you use to customize a document with your own 
information called? 
 :~~ content control 
In the accompanying figure, the text labeled 3 is ____. 
 :~~ Justified 
Press...
Voorbeeld 3 van de 17 pagina's
In winkelwagenWhere in the Word program window can you find the top and bottom margins? 
 :~~ vertical ruler 
What is an interactive object that you use to customize a document with your own 
information called? 
 :~~ content control 
In the accompanying figure, the text labeled 3 is ____. 
 :~~ Justified 
Press...
You can use a ___ function to return a value from a table that is based on an 
approximate match lookup. 
 :~~ VLOOKUP 
The ___ error value means that a value is not available to a function or formula. 
 :~~ #N/A 
If you are creating a calculated column or formula within an Excel table, you can 
u...
Voorbeeld 2 van de 6 pagina's
In winkelwagenYou can use a ___ function to return a value from a table that is based on an 
approximate match lookup. 
 :~~ VLOOKUP 
The ___ error value means that a value is not available to a function or formula. 
 :~~ #N/A 
If you are creating a calculated column or formula within an Excel table, you can 
u...
An IS auditor is conducting a compliance test to determine whether controls 
support management policies and procedures. The test will assist the IS auditor to 
determine: 
 :~~ That the control is operating as designed 
Compliance tests can be used to test the existence and effectiveness of a de...
Voorbeeld 4 van de 65 pagina's
In winkelwagenAn IS auditor is conducting a compliance test to determine whether controls 
support management policies and procedures. The test will assist the IS auditor to 
determine: 
 :~~ That the control is operating as designed 
Compliance tests can be used to test the existence and effectiveness of a de...
Source code 
 :~~ uncompiled, archive code 
Object code 
 :~~ compiled code that is distributed and put into production; not able to 
be read by humans 
Inherent risk 
 :~~ the risk that an error could occur assuming no compensating control 
exist 
Control risk 
 :~~ the risk that an error exists ...
Voorbeeld 4 van de 43 pagina's
In winkelwagenSource code 
 :~~ uncompiled, archive code 
Object code 
 :~~ compiled code that is distributed and put into production; not able to 
be read by humans 
Inherent risk 
 :~~ the risk that an error could occur assuming no compensating control 
exist 
Control risk 
 :~~ the risk that an error exists ...
5 Tasks within the domain covering the process of auditing information systems 
 :~~ 1. Develop and implement a risk-based IT audit strategy in compliance 
with IT audit standards to ensure that key areas are included 
2. Plan specific audits to determine whether information systems are protected, ...
Voorbeeld 4 van de 103 pagina's
In winkelwagen5 Tasks within the domain covering the process of auditing information systems 
 :~~ 1. Develop and implement a risk-based IT audit strategy in compliance 
with IT audit standards to ensure that key areas are included 
2. Plan specific audits to determine whether information systems are protected, ...
A company with a limited budget has a recovery time objective (RTO) of 72 hours 
and a recovery point objective (RPO) of 24 hours. Which of the following would 
BEST meet the requirements of the business? 
Select an answer: 
A. 
A hot site 
B. 
A cold site 
C. 
A mirrored site 
D. 
A warm site...
Voorbeeld 4 van de 161 pagina's
In winkelwagenA company with a limited budget has a recovery time objective (RTO) of 72 hours 
and a recovery point objective (RPO) of 24 hours. Which of the following would 
BEST meet the requirements of the business? 
Select an answer: 
A. 
A hot site 
B. 
A cold site 
C. 
A mirrored site 
D. 
A warm site...
An organization is proposing to establish a wireless local area network (WLAN). 
Management asks the IS auditor to recommend security controls for the WLAN. 
Which of the following would be the MOST appropriate recommendation? 
Select an answer: 
A. 
Physically secure wireless access points to pr...
Voorbeeld 4 van de 152 pagina's
In winkelwagenAn organization is proposing to establish a wireless local area network (WLAN). 
Management asks the IS auditor to recommend security controls for the WLAN. 
Which of the following would be the MOST appropriate recommendation? 
Select an answer: 
A. 
Physically secure wireless access points to pr...
Digital signatures require the: 
Select an answer: 
A. 
signer to have a public key and the receiver to have a private key. 
B. 
signer to have a private key and the receiver to have a public key. 
C. 
signer and receiver to have a public key. 
D. 
signer and receiver to have a private key. 
 :~...
Voorbeeld 4 van de 152 pagina's
In winkelwagenDigital signatures require the: 
Select an answer: 
A. 
signer to have a public key and the receiver to have a private key. 
B. 
signer to have a private key and the receiver to have a public key. 
C. 
signer and receiver to have a public key. 
D. 
signer and receiver to have a private key. 
 :~...
The PRIMARY advantage of a continuous audit approach is that it: 
Select an answer: 
A. does not require an IS auditor to collect evidence on system reliability while 
processing is taking place. 
B. requires the IS auditor to review and follow up immediately on all information 
collected. 
C. ca...
Voorbeeld 4 van de 870 pagina's
In winkelwagenThe PRIMARY advantage of a continuous audit approach is that it: 
Select an answer: 
A. does not require an IS auditor to collect evidence on system reliability while 
processing is taking place. 
B. requires the IS auditor to review and follow up immediately on all information 
collected. 
C. ca...
Sharing risk is a key factor in which of the following methods of managing risk? 
Select an answer: 
A. 
Transferring risk 
B. 
Tolerating risk 
C. 
Terminating risk 
D. 
Treating risk 
 CORRECT A. Transferring risk (e.g., by taking an insurance policy) is a way 
to share risk. 
B. Tolerating r...
Voorbeeld 4 van de 149 pagina's
In winkelwagenSharing risk is a key factor in which of the following methods of managing risk? 
Select an answer: 
A. 
Transferring risk 
B. 
Tolerating risk 
C. 
Terminating risk 
D. 
Treating risk 
 CORRECT A. Transferring risk (e.g., by taking an insurance policy) is a way 
to share risk. 
B. Tolerating r...
The internal audit department has written some scripts that are used for 
continuous auditing of some information systems. The IT department has asked for 
copies of the scripts so that they can use them for setting up a continuous 
monitoring process on key systems. Would sharing these scripts wi...
Voorbeeld 4 van de 149 pagina's
In winkelwagenThe internal audit department has written some scripts that are used for 
continuous auditing of some information systems. The IT department has asked for 
copies of the scripts so that they can use them for setting up a continuous 
monitoring process on key systems. Would sharing these scripts wi...
An IS auditor is reviewing the software development process for an organization. 
Which of the following functions would be appropriate for the end users to 
perform? 
Select an answer: 
A. 
Program output testing 
B. 
System configuration 
C. 
Program logic specification 
D. 
Performance tuni...
Voorbeeld 4 van de 156 pagina's
In winkelwagenAn IS auditor is reviewing the software development process for an organization. 
Which of the following functions would be appropriate for the end users to 
perform? 
Select an answer: 
A. 
Program output testing 
B. 
System configuration 
C. 
Program logic specification 
D. 
Performance tuni...
Who is responsible for imposing an IT governance model encompassing IT strategy, 
information security, and formal enterprise architectural mandates? 
 :~~ IT executives and the Board of Directors 
The party that performs strategic planning, addresses near-term and long-term 
requirements aligning...
Voorbeeld 4 van de 38 pagina's
In winkelwagenWho is responsible for imposing an IT governance model encompassing IT strategy, 
information security, and formal enterprise architectural mandates? 
 :~~ IT executives and the Board of Directors 
The party that performs strategic planning, addresses near-term and long-term 
requirements aligning...
Which of the following BEST describes the purpose of performing a risk assessment 
in the planning phase of an IS audit? 
A. 
To establish adequate staffing requirements to complete the IS audit 
B. 
To provide reasonable assurance that all material items will be addressed 
C. 
To determine the ...
Voorbeeld 4 van de 67 pagina's
In winkelwagenWhich of the following BEST describes the purpose of performing a risk assessment 
in the planning phase of an IS audit? 
A. 
To establish adequate staffing requirements to complete the IS audit 
B. 
To provide reasonable assurance that all material items will be addressed 
C. 
To determine the ...
In auditing a database environment, an IS auditor will be MOST concerned if the 
database administrator (DBA) is performing which of the following functions? 
Select an answer: 
A. 
Performing database changes according to change management procedures 
B. 
Installing patches or upgrades to the op...
Voorbeeld 4 van de 152 pagina's
In winkelwagenIn auditing a database environment, an IS auditor will be MOST concerned if the 
database administrator (DBA) is performing which of the following functions? 
Select an answer: 
A. 
Performing database changes according to change management procedures 
B. 
Installing patches or upgrades to the op...
To minimize the cost of a software project, quality management techniques 
should be applied: 
Select an answer: 
A. 
as close to their writing (i.e., point of origination) as possible. 
B. 
primarily at project start to ensure that the project is established in accordance 
with organizational g...
Voorbeeld 4 van de 154 pagina's
In winkelwagenTo minimize the cost of a software project, quality management techniques 
should be applied: 
Select an answer: 
A. 
as close to their writing (i.e., point of origination) as possible. 
B. 
primarily at project start to ensure that the project is established in accordance 
with organizational g...
An IS auditor reviewing an outsourcing contract of IT facilities would expect it to 
define the: 
Select an answer: 
A. 
hardware configuration. 
B. 
access control software. 
C. 
ownership of intellectual property. 
D. 
application development methodology. 
 :~~ You are correct, the answer is ...
Voorbeeld 4 van de 155 pagina's
In winkelwagenAn IS auditor reviewing an outsourcing contract of IT facilities would expect it to 
define the: 
Select an answer: 
A. 
hardware configuration. 
B. 
access control software. 
C. 
ownership of intellectual property. 
D. 
application development methodology. 
 :~~ You are correct, the answer is ...
What is the definition of audit? 
 :~~ Auditing is a detailed and specific evaluation of a process, procedure, 
organization, job function, or system, in which results are gathered and 
reported. 
What is the purpose of ethics? 
 :~~ To mandate the professional and personal conduct of auditors 
Ac...
Voorbeeld 3 van de 16 pagina's
In winkelwagenWhat is the definition of audit? 
 :~~ Auditing is a detailed and specific evaluation of a process, procedure, 
organization, job function, or system, in which results are gathered and 
reported. 
What is the purpose of ethics? 
 :~~ To mandate the professional and personal conduct of auditors 
Ac...
Most important step in risk analysis is to identify 
a. Competitors 
b. controls 
c. vulnerabilities 
d. liabilities 
 :~~ c. vulnerabilities 
In a risk based audit planning, an IS auditor's first step is to identify: 
a. responsibilities of stakeholders 
b. high-risk areas within the organization ...
Voorbeeld 4 van de 175 pagina's
In winkelwagenMost important step in risk analysis is to identify 
a. Competitors 
b. controls 
c. vulnerabilities 
d. liabilities 
 :~~ c. vulnerabilities 
In a risk based audit planning, an IS auditor's first step is to identify: 
a. responsibilities of stakeholders 
b. high-risk areas within the organization ...
Audit Charter 
 :~~ a formal document that contains: 
 1. scope of the audit functions 
 2. authority of the audit functions 
 3. responsibility of the audit functions 
Audit Universe 
 :~~ An inventory of all the functions/processes/units under the 
organization 
Qualitative Risk Assessment 
 :~~...
Voorbeeld 2 van de 8 pagina's
In winkelwagenAudit Charter 
 :~~ a formal document that contains: 
 1. scope of the audit functions 
 2. authority of the audit functions 
 3. responsibility of the audit functions 
Audit Universe 
 :~~ An inventory of all the functions/processes/units under the 
organization 
Qualitative Risk Assessment 
 :~~...
Abend 
 :~~ An abnormal end to a computer job; termination of a task prior to its 
completion because of an error condition that cannot be resolved by 
recovery facilities while the task is executing. 
Acceptable interruption window 
 :~~ The maximum period of time that a system can be unavailable...
Voorbeeld 4 van de 262 pagina's
In winkelwagenAbend 
 :~~ An abnormal end to a computer job; termination of a task prior to its 
completion because of an error condition that cannot be resolved by 
recovery facilities while the task is executing. 
Acceptable interruption window 
 :~~ The maximum period of time that a system can be unavailable...
Abend * 
 :~~ An abnormal end to a computer job; termination of a task prior to its 
completion because of an error condition that cannot be resolved by 
recovery facilities while the task is executing. 
Acceptable use policy 
 :~~ A policy that establishes an agreement between users and the 
ent...
Voorbeeld 4 van de 224 pagina's
In winkelwagenAbend * 
 :~~ An abnormal end to a computer job; termination of a task prior to its 
completion because of an error condition that cannot be resolved by 
recovery facilities while the task is executing. 
Acceptable use policy 
 :~~ A policy that establishes an agreement between users and the 
ent...
Audit 
 :~~ Formal examination of information systems to ensure compliance and 
effectiveness. 
Assurance 
 :~~ Confirmation of compliance with laws, regulations, and policies. 
Information assets 
 :~~ Valuable data and information within an organization. 
Control framework 
 :~~ Structure of cont...
Voorbeeld 2 van de 7 pagina's
In winkelwagenAudit 
 :~~ Formal examination of information systems to ensure compliance and 
effectiveness. 
Assurance 
 :~~ Confirmation of compliance with laws, regulations, and policies. 
Information assets 
 :~~ Valuable data and information within an organization. 
Control framework 
 :~~ Structure of cont...
Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!
Je betaalt supersnel en eenmalig met iDeal, creditcard of Stuvia-tegoed voor de samenvatting. Zonder lidmaatschap.
Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!
Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.
Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.
Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper ExamArsenal. Stuvia faciliteert de betaling aan de verkoper.
Nee, je koopt alleen deze samenvatting voor €139,35. Je zit daarna nergens aan vast.
4,6 sterren op Google & Trustpilot (+1000 reviews)
Afgelopen 30 dagen zijn er 81113 samenvattingen verkocht
Opgericht in 2010, al 14 jaar dé plek om samenvattingen te kopen