10 tips on How to CISA Test Like a Badass [301 to 310]

Isaca qualification may be the planets the majority of well-respected global qualification. Therefore CISA is extremely necessary for those people who are anxious to penetrate the IT organization. But its extremely tough if youre active working or studying to pass through the Isaca CISA check. Actualtests Isaca CISA research instructions will help you saving a lot of time,power as well as resource inside the CISA check. You can actually manage this kind of CISA check successfully through our CISA pdf as well as check powerplant. Were able to keep the merchandise promptly and let individuals to discover Isaca understanding quickly. You can also download the Isaca CISA pdf test version free.

2016 Jun CISA test engine

Q301. - (Topic 2) 

During a change control audit of a production system, an IS auditor finds that the change management process is not formally documented and that some migration procedures failed. What should the IS auditor do next? 

A. Recommend redesigning the change management process. 

B. Gain more assurance on the findings through root cause analysis. 

C. Recommend that program migration be stopped until the change process is documented. 

D. Document the finding and present it to management. 

Answer: B 

Explanation: 

A change management process is critical to IT production systems. Before recommending that the organization take any other action (e.g., stopping migrations, redesigning the change management process), the IS auditor should gain assurance that the incidents reported are related to deficiencies in the change management process and not caused by some process other than change management. 


Q302. - (Topic 1) 

Off-site data storage should be kept synchronized when preparing for recovery of time-sensitive data such as that resulting from which of the following? Choose the BEST answer. 

A. Financial reporting 

B. Sales reporting 

C. Inventory reporting 

D. Transaction processing 

Answer: D 

Explanation: Off-site data storage should be kept synchronized when preparing for the recovery of timesensitive data such as that resulting from transaction processing. 


Q303. - (Topic 1) 

Fourth-Generation Languages (4GLs) are most appropriate for designing the application's graphical user interface (GUI). They are inappropriate for designing any intensive data-calculation procedures. True or false? 

A. True 

B. False 

Answer: A 

Explanation: Fourth-generation languages(4GLs) are most appropriate for designing the application's graphical user interface (GUI). They are inappropriate for designing any intensive data-calculation procedures. 


Q304. - (Topic 1) 

Which of the following provide(s) near-immediate recoverability for time-sensitive systems and transaction processing? 

A. Automated electronic journaling and parallel processing 

B. Data mirroring and parallel processing 

C. Data mirroring 

D. Parallel processing 

Answer: B 

Explanation: Data mirroring and parallel processing are both used to provide near-immediate recoverability for time-sensitive systems and transaction processing. 


Q305. - (Topic 1) 

Database snapshots can provide an excellent audit trail for an IS auditor. True or false? 

A. True 

B. False 

Answer: A 

Explanation: Database snapshots can provide an excellent audit trail for an IS auditor. 


CISA sample question

Up to date CISA testing engine:

Q306. - (Topic 3) 

When developing a formal enterprise security program, the MOST critical success factor (CSF) would be the: 

A. establishment of a review board. 

B. creation of a security unit. 

C. effective support of an executive sponsor. 

D. selection of a security process owner. 

Answer: C 

Explanation: 

The executive sponsor would be in charge of supporting the organization's strategic security program, and would aid in directing the organization's overall security management activities. Therefore, support by the executive level of management is themost critical success factor (CSF). None of the other choices are effective without visible sponsorship of top management. 


Q307. - (Topic 4) 

An IS auditor is assigned to audit a software development project which is more than 80 percent complete, but has already overrun time by 10 percent and costs by 25 percent. Which of the following actions should the IS auditor take? 

A. Report that the organization does not have effective project management. 

B. Recommend the project manager be changed. 

C. Review the IT governance structure. 

D. Review the conduct of the project and the business case. 

Answer: D 

Explanation: 

Before making any recommendations, an IS auditor needs to understand the project and the factors that have contributed to making the project over budget and over schedule. The organization may have effective project management practices and sound ITgovernance and still be behind schedule or over budget. There is no indication that the project manager should be changed without looking into the reasons for the overrun. 


Q308. - (Topic 4) 

An appropriate control for ensuring the authenticity of orders received in an EDI application is to: 

A. acknowledge receipt of electronic orders with a confirmation message. 

B. perform reasonableness checks on quantities ordered before filling orders. 

C. verify the identity of senders and determine if orders correspond to contract terms. 

D. encrypt electronic orders. 

Answer: C 

Explanation: 

An electronic data interchange (EDI) system is subject not only to the usual risk exposures of computer systems but also to those arising from the potential ineffectiveness of controls on the part of the trading partner and the third-party service provider, making authentication of users and messages a major security concern. Acknowledging the receipt of electronic orders with a confirming message is good practice but will not authenticate orders from customers. Performing reasonableness checkson quantities ordered before placing orders is a control for ensuring the correctness of the company's orders, not the authenticity of its customers' orders. Encrypting sensitive messages is an appropriate step but does not apply to messages received. 


Q309. - (Topic 1) 

Which of the following would prevent accountability for an action performed, thus allowing nonrepudiation? 

A. Proper authentication 

B. Proper identification AND authentication 

C. Proper identification 

D. Proper identification, authentication, AND authorization 

Answer: B 

Explanation: If proper identification and authentication are not performed during access control, no accountability can exist for any action performed. 


Q310. - (Topic 4) 

When auditing the proposed acquisition of a new computer system, an IS auditor should FIRST establish that: 

A. a clear business case has been approved by management. 

B. corporate security standards will be met. 

C. users will be involved in the implementation plan. 

D. the new system will meet all required user functionality. 

Answer: A 

Explanation: 

The first concern of an IS auditor should be to establish that the proposal meets the needs of the business, and this should be established by a clear business case. Although compliance with security standards is essential, as is meeting the needs ofthe users and having users involved in the implementation process, it is too early in the procurement process for these to be an IS auditor's first concern. 



see more CISA dumps