CISA Dumps Isaca CISA: 100% Valid and Newest Version CISA Questions & Answers Shared by Certleader
CISA Dumps Isaca CISA: 100% Valid and Newest Version CISA Questions & Answers Shared by Certleader
https://www.certleader.com/CISA-dumps.html ( Q&As)
CISA Dumps
Isaca CISA
https://www.certleader.com/CISA-dumps.html
NEW QUESTION 1
- (Topic 1)
How is risk affected if users have direct access to a database at the system level?
A. Risk of unauthorized access increases, but risk of untraceable changes to the database decrease
B. Risk of unauthorized and untraceable changes to the database increase
C. Risk of unauthorized access decreases, but risk of untraceable changes to the database increase
D. Risk of unauthorized and untraceable changes to the database decrease
Answer: B
Explanation:
If users have direct access to a database at the system level, risk of unauthorized and untraceable changes to the database increases.
NEW QUESTION 2
- (Topic 1)
Which of the following is a good control for protecting confidential data residing on a PC?
A. Personal firewall
B. File encapsulation
C. File encryption
D. Host-based intrusion detection
Answer: C
Explanation:
File encryption is a good control for protecting confidential data residing on a PC.
NEW QUESTION 3
- (Topic 1)
Which type of major BCP test only requires representatives from each operational area to meet to review the plan?
A. Parallel
B. Preparedness
C. Walk-thorough
D. Paper
Answer: C
Explanation:
Of the three major types of BCP tests (paper, walk-through, and preparedness), a walk-through test requires only that representatives from each operational area
meet to review the plan.
NEW QUESTION 4
- (Topic 1)
Which of the following is best suited for searching for address field duplications?
Answer: B
Explanation:
Generalized audit software can be used to search for address field duplications.
NEW QUESTION 5
- (Topic 1)
When should application controls be considered within the system-development process?
Answer: D
Explanation:
Application controls should be considered as early as possible in the system-development process, even in the development of the project's functional
specifications.
NEW QUESTION 6
- (Topic 1)
What is the primary security concern for EDI environments? Choose the BEST answer.
A. Transaction authentication
B. Transaction completeness
C. Transaction accuracy
D. Transaction authorization
Answer: D
Explanation:
Transaction authorization is the primary security concern for EDI environments.
NEW QUESTION 7
- (Topic 2)
Which of the following would normally be the MOST reliable evidence for an auditor?
Answer: A
Explanation:
Evidence obtained from independent third parties almost always is considered to be the most reliable. Choices B, C and D would not be considered as reliable.
NEW QUESTION 8
- (Topic 2)
An IS auditor conducting a review of software usage and licensing discovers that numerous PCs contain unauthorized software. Which of the following actions
should the IS auditor take?
Answer: C
Explanation:
The use of unauthorized or illegal software should be prohibited by an organization. Software piracy results in inherent exposure and can result in severe fines. An
IS auditor must convince the user and user management of the risk and the need to eliminate the risk. An IS auditor should not assume the role of the enforcing
officer and take on any personal involvement in removing or deleting the unauthorized software.
NEW QUESTION 9
- (Topic 3)
When reviewing an organization's strategic IT plan an IS auditor should expect to find:
A. an assessment of the fit of the organization's application portfolio with business objective
B. actions to reduce hardware procurement cos
C. a listing of approved suppliers of IT contract resource
D. a description of the technical architecture for the organization's network perimeter securit
Answer: A
Explanation:
An assessment of how well an organization's application portfolio supports the organization's business objectives is a key component of the overall IT strategic
planning process. This drives the demand side of IT planning and should convert into a set of strategic IT intentions. Further assessment can then be made of how
well the overall IT organization, encompassing applications, infrastructure, services, management processes, etc., can support the business objectives.
Operational efficiency initiatives belong to tactical planning, not strategic planning. The purpose of an IT strategic plan is toset out how IT will be used to achieve or
support an organization's business objectives. A listing of approved suppliers of IT contract resources is a tactical rather than a strategic concern. An IT strategic
plan would not normally include detail ofa specific technical architecture.
NEW QUESTION 10
- (Topic 4)
The most common reason for the failure of information systems to meet the needs of users is that:
Answer: D
Explanation:
Lack of adequate user involvement, especially in the system's requirements phase, will usually result in a system that does not fully or adequately address the
needs of the user. Only users can define what their needs are, and therefore what the system should accomplish.
NEW QUESTION 11
- (Topic 4)
Which of the following is a dynamic analysis tool for the purpose of testing software modules?
Answer: A
Explanation:
A black box test is a dynamic analysis tool for testing software modules. During the testing of software modules a black box test works first in a cohesive manner
as a single unit/entity consisting of numerous modules, and second with the user data that flows across software modules, in some cases, this even drives the
software behavior. In choices B, C and D, the software (design or code) remains static and someone closely examines it by applying their mind, without actually
activating the software. Therefore, these cannot be referred to as dynamic analysis tools.
NEW QUESTION 12
- (Topic 4)
When transmitting a payment instruction, which of the following will help verify that the instruction was not duplicated?
Answer: D
Explanation:
When transmitting data, a sequence number and/or time stamp built into the message to make it unique can be checked by the recipient to ensure that the
message was not intercepted and replayed. This is known as replay protection, and could be used toverify that a payment instruction was not duplicated. Use of a
cryptographic hashing algorithm against the entire message helps achieve data integrity. Enciphering the message digest using the sender's private key, which
signs the sender's digital signature to the document, helps in authenticating the transaction. When the message is deciphered by the receiver using the sender's
public key, it ensures that the message could only have come from the sender. This process of sender authentication achieves nonrepudiation.
NEW QUESTION 13
- (Topic 5)
Which of the following is the BEST type of program for an organization to implement to aggregate, correlate and store different log and event files, and then
produce weekly and monthly reports for IS auditors?
Answer: C
Explanation:
A log management tool is a product designed to aggregate events from many log files (with distinct formats and from different sources), store them and typically
correlate them offline to produce many reports (e.g., exception reports showing differentstatistics including anomalies and suspicious activities), and to answer time-
based queries (e.g., how many users have entered the system between 2 a.m. and 4 a.m. over the past three weeks?). A SIEM product has some similar features.
It correlatesevents from log files, but does it online and normally is not oriented to storing many weeks of historical information and producing audit reports. A
correlation engine is part of a SIEM product. It is oriented to making an online correlation of events. An extract, transform, load (ETL) is part of a business
intelligence system, dedicated to extracting operational or production data, transforming that data and loading them to a central repository (data warehouse or data
mart); an ETL does not correlate data or produce reports, and normally it does not have extractors to read log file formats.
NEW QUESTION 14
- (Topic 5)
A company is implementing a dynamic host configuration protocol (DHCP). Given that the following conditions exist, which represents the GREATEST concern?
Answer: D
Explanation:
Given physical access to a port, anyone can connect to the internal network. The other choices do not present the exposure that access to a port does. DHCP
provides convenience (an advantage) to the laptop users. Sharing IP addresses and the existence of a firewall can be security measures.
NEW QUESTION 15
- (Topic 6)
An IS auditor conducting an access control review in a client-server environment discovers that all printing options are accessible by all users. In this situation, the
Answer: A
Explanation:
Information in all its forms needs to be protected from unauthorized access. Unrestricted access to the report option results in an exposure. Efficiency and
effectiveness are not relevant factors in this situation. Greater control over reports will not be accomplished since reports need not be in a printed form only.
Information could be transmitted outside as electronic files, because print options allow for printing in an electronic form as well.
NEW QUESTION 16
- (Topic 6)
During an audit of an enterprise that is dedicated to e-commerce, the IS manager states that digital signatures are used when receiving communications from
customers. To substantiate this, an IS auditor must prove that which of the following is used?
A. A biometric, digitalized and encrypted parameter with the customer's public key
B. A hash of the data that is transmitted and encrypted with the customer's private key
C. A hash of the data that is transmitted and encrypted with the customer's public key
D. The customer's scanned signature encrypted with the customer's public key
Answer: B
Explanation:
The calculation of a hash, or digest, of the data that are transmitted and its encryption require the public key of the client (receiver) and is called a signature of the
message, or digital signature. The receiver performs the same process and then compares the received hash, once it has been decrypted with their private key, to
the hash that is calculated with the received datA. If they are the same, the conclusion would be that there is integrity in the data that have arrived and the origin is
authenticated. The concept of encrypting the hash with the private key of the originator provides non repudiation, as it can only be decrypted with their public key
and, as the CD suggests, the private key would not be known to the recipient. Simply put, in a key-pair situation, anything that can be decrypted by a sender's
public key must have been encrypted with their private key, so they must have been the sender, i.e., non repudiation. Choice C is incorrect because, if this were
the case, the hash could not be decrypted by the recipient, so the benefit of non repudiation would be lost and there could be no verification that the message had
not been intercepted and amended. A digital signature is created by encrypting with a private key. A person creating the signature uses their own private key,
otherwise everyone would be able to create a signature with any public key. Therefore, the signature of the client is created with the client's private key, and this
can be verified-by
NEW QUESTION 17
- (Topic 6)
A web server is attacked and compromised. Which of the following should be performed FIRST to handle the incident?
Answer: C
Explanation:
The first action is to disconnect the web server from the network to contain the damage and prevent more actions by the attacker. Dumping the volatile storage
data to a disk may be used at the investigation stage but does not contain an attack in progress. To run the server in a fail-safe mode, the server needs to be shut
down. Shutting down the server could potentially erase information that might be needed for a forensic investigation or to develop a strategy to prevent future
similar attacks.
NEW QUESTION 18
- (Topic 8)
Integer overflow occurs primarily with:
A. string formatting
B. debug operations
C. output formatting
D. input verifications
E. arithmetic operations
F. None of the choice
Answer: E
Explanation:
An integer overflow occurs when an arithmetic operation attempts to create a numeric value that is larger than can be represented within the available storage
space. On some processors the result saturates - once the maximum value is reached attempts to make it larger simply return the maximum result.
NEW QUESTION 19
- (Topic 8)
Which of the following refers to the act of creating and using an invented scenario to persuade a target to perform an action?
A. Pretexting
B. Backgrounding
C. Check making
D. Bounce checking
E. None of the choice
Answer: A
Explanation:
Pretexting is the act of creating and using an invented scenario to persuade a target to release information or perform an action and is usually done over the
telephone. It is more than a simple lie as it most often involves some prior research or set up and the use of pieces of known information.
NEW QUESTION 20
- (Topic 8)
Which of the following should be seen as one of the most significant factors considered when determining the frequency of IS audits within your organization?
Answer: D
Explanation:
You use a risk assessment process to describe and analyze the potential audit risks inherent in a given line of business. You should update such risk assessment
at least annually to reflect changes. The level and nature of risk should be the most significant factors to be considered when determining the frequency of audits.
NEW QUESTION 21
......
100% Pass Your CISA Exam with Our Prep Materials Via below:
https://www.certleader.com/CISA-dumps.html