CISA Premium Bundle

CISA Premium Bundle

Isaca CISA Certification Exam

4.5 
(53940 ratings)
980 QuestionsPractice Tests
980 PDFPrint version
November 15, 2024Last update

Isaca CISA Free Practice Questions

we provide Realistic Isaca CISA free practice exam which are the best for clearing CISA test, and to get certified by Isaca Isaca CISA. The CISA Questions & Answers covers all the knowledge points of the real CISA exam. Crack your Isaca CISA Exam with latest dumps, guaranteed!

Online CISA free questions and answers of New Version:

NEW QUESTION 1

What are used as the framework for developing logical access controls?

  • A. Information systems security policies
  • B. Organizational security policies
  • C. Access Control Lists (ACL)
  • D. Organizational charts for identifying roles and responsibilities

Answer: A

Explanation:
Information systems security policies are used as the framework for developing logical access controls.

NEW QUESTION 2

The use of digital signatures:

  • A. requires the use of a one-time password generato
  • B. provides encryption to a messag
  • C. validates the source of a messag
  • D. ensures message confidentialit

Answer: C

Explanation:

The use of a digital signature verifies the identity of the sender, but does not encrypt the whole message, and hence is not enough to ensure confidentiality. A one-time password generator is an option, but is not a requirement for using digital signatures.

NEW QUESTION 3

Off-site data storage should be kept synchronized when preparing for recovery of time-sensitive data such as that resulting from which of the following? Choose the BEST answer.

  • A. Financial reporting
  • B. Sales reporting
  • C. Inventory reporting
  • D. Transaction processing

Answer: D

Explanation:
Off-site data storage should be kept synchronized when preparing for the recovery of timesensitive data such as that resulting from transaction processing.

NEW QUESTION 4

Which of the following is the MOST important function to be performed by IS management when a service has been outsourced?

  • A. Ensuring that invoices are paid to the provider
  • B. Participating in systems design with the provider
  • C. Renegotiating the provider's fees
  • D. Monitoring the outsourcing provider's performance

Answer: D

Explanation:

In an outsourcing environment, the company is dependent on the performance of the service provider. Therefore, it is critical the outsourcing provider's performance be monitored to ensure that services are delivered to the company as required. Payment of invoices is a finance function, which would be completed per contractual requirements. Participating in systems design is a byproduct of monitoring the outsourcing provider's performance, while renegotiating fees is usually a one-time activity.

NEW QUESTION 5

Which of the following ensures confidentiality of information sent over the internet?

  • A. Digital signature
  • B. Digital certificate
  • C. Online Certificate Status Protocol
  • D. Private key cryptosystem

Answer: D

Explanation:

Confidentiality is assured by a private key cryptosystem. Digital signatures assure data integrity, authentication and nonrepudiation, but not confidentially. A digital certificate is a certificate that uses a digital signature to bind together a public key with an identity; therefore, it does not address confidentiality. Online Certificate Status Protocol (OCSP) is an Internet protocol used for obtaining the revocation status of a digital certificate.

NEW QUESTION 6

All Social Engineering techniques are based on flaws in:

  • A. human logi
  • B. hardware logi
  • C. software logi
  • D. device logi
  • E. group logi
  • F. None of the choice

Answer: A

Explanation:

Social engineering is a collection of techniques used to manipulate people into performing actions or divulging confidential information. While similar to a confidence trick or simple fraud, the term typically applies to trickery for information gathering or computer system access. All Social Engineering techniques are based on flaws in human logic known as cognitive biases. These bias flaws are used in various combinations to create attack techniques.

NEW QUESTION 7

The responsibility for authorizing access to application data should be with the:

  • A. data custodia
  • B. database administrator (DBA).
  • C. data owne
  • D. security administrato

Answer: C

Explanation:

Data owners should have the authority and responsibility for granting access to the data and applications for which they are responsible. Data custodians are responsible only for storing and safeguarding the datA. The database administrator (DBA) isresponsible for managing the database and the security administrator is responsible for implementing and maintaining IS security. The ultimate responsibility for data resides with the data owner.

NEW QUESTION 8

After identifying potential security vulnerabilities, what should be the IS auditor's next step?

  • A. To evaluate potential countermeasures and compensatory controls
  • B. To implement effective countermeasures and compensatory controls
  • C. To perform a business impact analysis of the threats that would exploit the vulnerabilities
  • D. To immediately advise senior management of the findings

Answer: C

Explanation:
After identifying potential security vulnerabilities, the IS auditor's next step is to perform a business impact analysis of the threats that would exploit the vulnerabilities.

NEW QUESTION 9

What is the most common reason for information systems to fail to meet the needs of users? Choose the BEST answer.

  • A. Lack of funding
  • B. Inadequate user participation during system requirements definition
  • C. Inadequate senior management participation during system requirements definition
  • D. Poor IT strategic planning

Answer: B

Explanation:
Inadequate user participation during system requirements definition is the most common reason for information systems to fail to meet the needs of users.

NEW QUESTION 10

An IS auditor has identified the lack of an authorization process for users of an application. The IS auditor's main concern should be that:

  • A. more than one individual can claim to be a specific use
  • B. there is no way to limit the functions assigned to user
  • C. user accounts can be share
  • D. users have a need-to-know privileg

Answer: B

Explanation:

Without an appropriate authorization process, it will be impossible to establish functional limits and accountability. The risk that more than one individual can claim to be a specific user is associated with the authentication processes, rather thanwith authorization. The risk that user accounts can be shared is associated with identification processes, rather than with authorization. The need-to-know basis is the best approach to assigning privileges during the authorization process.

NEW QUESTION 11

To minimize costs and improve service levels an outsourcer should seek which of the following contract clauses?

  • A. O/S and hardware refresh frequencies
  • B. Gain-sharing performance bonuses
  • C. Penalties for noncompliance
  • D. Charges tied to variable cost metrics

Answer: B

Explanation:

Because the outsourcer will share a percentage of the achieved savings, gain-sharing performance bonuses provide a financial incentive to go above and beyond the stated terms of the contract and can lead to cost savings for the client. Refresh frequencies and penalties for noncompliance would only encourage the outsourcer to meet minimum requirements. Similarly, tying charges to variable cost metrics would not encourage the outsourcer to seek additional efficiencies that might benefit the client.

NEW QUESTION 12

An investment advisor e-mails periodic newsletters to clients and wants reasonable assurance that no one has modified the newsletter. This objective can be achieved by:

  • A. encrypting the hash of the newsletter using the advisor's private ke
  • B. encrypting the hash of the newsletter using the advisor's public ke
  • C. digitally signing the document using the advisor's private ke
  • D. encrypting the newsletter using the advisor's private ke

Answer: A

Explanation:

There is no attempt on the part of the investment advisor to prove their identity or to keep the newsletter confidential. The objective is to assure the receivers that it came to them without any modification, i.e., it has message integrity. Choice Ais correct because the hash is encrypted using the advisor's private key. The recipients can open the newsletter, recompute the hash and decrypt the received hash using the advisor's public key. If the two hashes are equal, the newsletter was not modified in transit. Choice B is not feasible, for no one other than the investment advisor can open it. Choice C addresses sender authentication but not message integrity. Choice D addresses confidentiality, but not message integrity, because anyone can obtain the investment advisor's public key, decrypt the newsletter, modify it and send it to others. The interceptor will not be able to use the advisor's private key, because they do not have it. Anything encrypted using the interceptor's privatekey can be decrypted by the receiver only by using their public key.

NEW QUESTION 13

Which of the following would be BEST prevented by a raised floor in the computer machine room?

  • A. Damage of wires around computers and servers
  • B. A power failure from static electricity
  • C. Shocks from earthquakes
  • D. Water flood damag

Answer: A

Explanation:

The primary reason for having a raised floor is to enable power cables and data cables to be installed underneath the floor. This eliminates the safety and damage risks posed when cables are placed in a spaghetti-like fashion on an open floor. Staticelectricity should be avoided in the machine room; therefore, measures such as specially manufactured carpet or shoes would be more appropriate for static prevention than a raised floor. Raised floors do not address shocks from earthquakes. To address earthquakes, anti-seismic architecture would be required to establish a quake-resistant structural framework. Computer equipment needs to be protected against water. However, a raised floor would not prevent damage to the machines in the event of overhead water pipe leakage.

NEW QUESTION 14

Fourth-Generation Languages (4GLs) are most appropriate for designing the application's graphical user interface (GUI). They are inappropriate for designing any intensive data-calculation procedures. True or false?

  • A. True
  • B. False

Answer: A

Explanation:
Fourth-generation languages(4GLs) are most appropriate for designing the application's graphical user interface (GUI). They are inappropriate for designing any intensive data-calculation procedures.

NEW QUESTION 15

After completing the business impact analysis (BIA), what is the next step in the business continuity planning process?

  • A. Test and maintain the pla
  • B. Develop a specific pla
  • C. Develop recovery strategie
  • D. implement the pla

Answer: C

Explanation:

The next phase in the continuity plan development is to identify the various recovery strategies and select the most appropriate strategy for recovering from a disaster. After
selecting a strategy, a specific plan can be developed, tested and implemented.

NEW QUESTION 16

Talking about biometric measurement, which of the following measures the percent of invalid users who are incorrectly accepted in?

  • A. failure to reject rate
  • B. false accept rate
  • C. false reject rate
  • D. failure to enroll rate
  • E. None of the choice

Answer: B

Explanation:

Performance of a biometric measure is usually referred to in terms of the false accept rate (FAR), the false non match or reject rate (FRR), and the failure to enroll rate (FTE or FER). The FAR measures the percent of invalid users who are incorrectly accepted in, while the FRR measures the percent of valid users who are wrongly rejected.

NEW QUESTION 17

If a database is restored from information backed up before the last system image, which of the following is recommended?

  • A. The system should be restarted after the last transactio
  • B. The system should be restarted before the last transactio
  • C. The system should be restarted at the first transactio
  • D. The system should be restarted on the last transactio

Answer: B

Explanation:
If a database is restored from information backed up before the last system image, the system should be restarted before the last transaction because the final transaction must be reprocessed.

NEW QUESTION 18

After discovering a security vulnerability in a third-party application that interfaces with several external systems, a patch is applied to a significant number of modules. Which of the following tests should an IS auditor recommend?

  • A. Stress
  • B. Black box
  • C. Interface
  • D. System

Answer: D

Explanation:

Given the extensiveness of the patch and its interfaces to external systems, system testing is most appropriate. Interface testing is not enough, and stress or black box testing are inadequate in these circumstances.

NEW QUESTION 19
......

P.S. Easily pass CISA Exam with 980 Q&As Allfreedumps.com Dumps & pdf Version, Welcome to Download the Newest Allfreedumps.com CISA Dumps: https://www.allfreedumps.com/CISA-dumps.html (980 New Questions)


START CISA EXAM