100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4.2 TrustPilot
logo-home
Tentamen (uitwerkingen)

CISA Practice Exam Spring 2024 Questions and Correct Answers with Detailed Rationales

Beoordeling
-
Verkocht
-
Pagina's
30
Cijfer
A+
Geüpload op
10-12-2025
Geschreven in
2025/2026

CISA Practice Exam Spring 2024 Questions and Correct Answers with Detailed Rationales Which of the following would be MOST important for an IS auditor to verify while conducting a business continuity audit? A. Data backups are performed on a timely basis. B.A recovery site is contracted for and available as needed. C. Human safety procedures are in place. D. Insurance coverage is adequate and premiums are current. C. Human safety procedures are in place. Explanation: The most important element in any business continuity process is the protection of human life. This takes precedence over all other aspects of the plan. An IS auditor reviewing a network log discovers that an employee ran elevated commands on their PC by invoking the task scheduler to launch restricted applications. This is an example what type of attack? A. A race condition B.A privilege escalation C.A buffer overflow D. An impersonation B.A privilege escalation Explanation: This is a type of attack where higher-level system authority is obtained by various methods. In this example, the task scheduler service runs with administrator permissions, and a security flaw allows programs launched by the scheduler to run at the same permission level. A comprehensive and effective email policy should address the issues of email structure, policy enforcement, monitoring and: A. recovery. B. retention. C. rebuilding. D. reuse. B. retention. Explanation: Besides being a good practice, laws and regulations may require an organization to keep information that has an impact on the financial statements. The prevalence of lawsuits in which email communication is held in the same regard as the official form of classic paper makes the retention policy of corporate email a necessity. All email generated on an organization’s hardware is the property of the organization, and an email policy should address the retention of messages, considering both known and unforeseen litigation. The policy should also address the destruction of emails after a specified time to protect the nature and confidentiality of the messages themselves. An IS auditor who was involved in designing an organization's business continuity plan (BCP) has been assigned to audit the plan. The IS auditor should: A. decline the assignment. B. inform management of the possible conflict of interest after completing the audit assignment. C. inform the BCP team of the possible conflict of interest prior to beginning the assignment. D. communicate the possibility of conflict of interest to audit management prior to starting the assignment. D. communicate the possibility of conflict of interest to audit management prior to starting the assignment. Explanation: A possible conflict of interest, likely to affect the IS auditor’s independence, should be brought to the attention of management prior to starting the assignment. Which of the following is the MOST critical element to effectively execute a disaster recovery plan? A. Offsite storage of backup data B. Up-to-date list of key disaster recovery contacts C. Availability of a replacement data center D. Clearly defined recovery time objective (RTO) A. Offsite storage of backup data Explanation: Remote storage of backups is the most critical disaster recovery plan (DRP) element of the items listed because access to backup data is required to restore systems. An IS auditor found that the enterprise architecture (EA) recently adopted by an organization has an adequate current-state representation. However, the organization has started a separate project to develop a future-state representation. The IS auditor should: A. recommend that this separate project be completed as soon as possible. B. report this issue as a finding in the audit report. C. recommend the adoption of the Zachmann framework. D.re-scope the audit to include the separate project as part of the current audit. B. report this issue as a finding in the audit report. Explanation: It is critical for the EA to include the future state because the gap between the current state and the future state will determine IT strategic and tactical plans. If the EA does not include a future-state representation, it is not complete, and this issue should be reported as a finding. What is the PRIMARY consideration for an IS auditor reviewing the prioritization and coordination of IT projects and program management? A. Projects are aligned with the organization’s strategy. B. Identified project risk is monitored and mitigated. C. Controls related to project planning and budgeting are appropriate. D.IT project metrics are reported accurately. A. Projects are aligned with the organization’s strategy. Explanation: The primary goal of IT projects is to add value to the business, so they must be aligned with the business strategy to achieve the intended results. Therefore, the IS auditor should first focus on ensuring this alignment. An enterprise is developing a strategy to upgrade to a newer version of its database software. Which of the following tasks can an IS auditor perform without compromising the objectivity of the IS audit function? A. Advise on the adoption of application controls to the new database software. B. Provide future estimates of the licensing expenses to the project team. C. Recommend to the project manager how to improve the efficiency of the migration. D. Review the acceptance test case documentation before the tests are carried out. D. Review the acceptance test case documentation before the tests are carried out. The review of the test cases will facilitate the objective of a successful migration and ensure that proper testing is conducted. An IS auditor can advise as to the completeness of the test cases. While designing the business continuity plan for an airline reservation system, the MOST appropriate method of data transfer/backup at an offsite location would be: A. shadow file processing. B. electronic vaulting. C. hard-disk mirroring. D. hot-site provisioning. A. shadow file processing. Which of the following should be a MAJOR concern for an IS auditor reviewing a business continuity plan? A. The plan is approved by the chief information officer. B. The plan contact lists have not been updated. C. Test results are not adequately documented. D. The training schedule for recovery personnel is not included. C. Test results are not adequately documented.

Meer zien Lees minder
Instelling
CISA - Certified Information Systems Auditor
Vak
CISA - Certified Information Systems Auditor










Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
CISA - Certified Information Systems Auditor
Vak
CISA - Certified Information Systems Auditor

Documentinformatie

Geüpload op
10 december 2025
Aantal pagina's
30
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

  • cisa practice exam spring

Voorbeeld van de inhoud

CISA Practice Exam Spring 2024 Questions and Correct Answers with
Detailed Rationales
Which of the following would be MOST important for an IS auditor to verify
while conducting a business continuity audit?
A. Data backups are performed on a timely basis.
B.A recovery site is contracted for and available as needed.
C. Human safety procedures are in place.
D. Insurance coverage is adequate and premiums are current.


C. Human safety procedures are in place.
Explanation: The most important element in any business continuity process is the
protection of human life. This takes precedence over all other aspects of the plan.
An IS auditor reviewing a network log discovers that an employee ran elevated
commands on their PC by invoking the task scheduler to launch restricted
applications. This is an example what type of attack?
A. A race condition
B.A privilege escalation
C.A buffer overflow
D. An impersonation
B.A privilege escalation
Explanation: This is a type of attack where higher-level system authority is
obtained by various methods. In this example, the task scheduler service runs with
administrator permissions, and a security flaw allows programs launched by the
scheduler to run at the same permission level.
A comprehensive and effective email policy should address the issues of email
structure, policy enforcement, monitoring and:
A. recovery.
B. retention.

,C. rebuilding.
D. reuse.
B. retention.
Explanation: Besides being a good practice, laws and regulations may require an
organization to keep information that has an impact on the financial statements.
The prevalence of lawsuits in which email communication is held in the same
regard as the official form of classic paper makes the retention policy of corporate
email a necessity. All email generated on an organization’s hardware is the
property of the organization, and an email policy should address the retention of
messages, considering both known and unforeseen litigation. The policy should
also address the destruction of emails after a specified time to protect the nature
and confidentiality of the messages themselves.
An IS auditor who was involved in designing an organization's business continuity
plan (BCP) has been assigned to audit the plan. The IS auditor should:
A. decline the assignment.
B. inform management of the possible conflict of interest after completing the
audit assignment.
C. inform the BCP team of the possible conflict of interest prior to beginning the
assignment.
D. communicate the possibility of conflict of interest to audit management prior to
starting the assignment.
D. communicate the possibility of conflict of interest to audit management prior to
starting the assignment.
Explanation: A possible conflict of interest, likely to affect the IS auditor’s
independence, should be brought to the attention of management prior to starting
the assignment.
Which of the following is the MOST critical element to effectively execute a
disaster recovery plan?
A. Offsite storage of backup data
B. Up-to-date list of key disaster recovery contacts
C. Availability of a replacement data center

, D. Clearly defined recovery time objective (RTO)
A. Offsite storage of backup data
Explanation: Remote storage of backups is the most critical disaster recovery plan
(DRP) element of the items listed because access to backup data is required to
restore systems.
An IS auditor found that the enterprise architecture (EA) recently adopted by an
organization has an adequate current-state representation. However, the
organization has started a separate project to develop a future-state representation.
The IS auditor should:
A. recommend that this separate project be completed as soon as possible.
B. report this issue as a finding in the audit report.
C. recommend the adoption of the Zachmann framework.
D.re-scope the audit to include the separate project as part of the current audit.
B. report this issue as a finding in the audit report.
Explanation: It is critical for the EA to include the future state because the gap
between the current state and the future state will determine IT strategic and
tactical plans. If the EA does not include a future-state representation, it is not
complete, and this issue should be reported as a finding.
What is the PRIMARY consideration for an IS auditor reviewing the prioritization
and coordination of IT projects and program management?
A. Projects are aligned with the organization’s strategy.
B. Identified project risk is monitored and mitigated.
C. Controls related to project planning and budgeting are appropriate.
D.IT project metrics are reported accurately.
A. Projects are aligned with the organization’s strategy.
Explanation: The primary goal of IT projects is to add value to the business, so
they must be aligned with the business strategy to achieve the intended results.
Therefore, the IS auditor should first focus on ensuring this alignment.
$10.99
Krijg toegang tot het volledige document:

100% tevredenheidsgarantie
Direct beschikbaar na je betaling
Lees online óf als PDF
Geen vaste maandelijkse kosten

Maak kennis met de verkoper
Seller avatar
NurseQueen1
4.7
(3)

Maak kennis met de verkoper

Seller avatar
NurseQueen1 Teachme2-tutor
Bekijk profiel
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
4
Lid sinds
1 jaar
Aantal volgers
0
Documenten
202
Laatst verkocht
1 week geleden
NurseQueen

Welcome to top Grade Exam for high quality study materials, exam guides and notes that will help you ace your exams and stay ahead in your studies. I offer detailed study notes ,w ell elaborated comprehensive answers and well organized summaries across a range of subjects including ,nursing,mental health, medical surgeon,economics,arts,business management and many others. Whether you're preparing for final exams or looking for help with assignments, you will find the resources you need here. With years of experience as a student and a dedicated tutor, I ensure that each document is carefully crafted ,accurate and easy to understand. Browse through my collection today and start studying smarter. I'm here to help you succeed.

Lees meer Lees minder
4.7

3 beoordelingen

5
2
4
1
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen