100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

CISA EXAM 2 – Questions With Reliable Solutions

Beoordeling
-
Verkocht
-
Pagina's
125
Cijfer
A+
Geüpload op
07-01-2026
Geschreven in
2025/2026

CISA EXAM 2 – Questions With Reliable Solutions

Instelling
CISA - Certified Information Systems Auditor
Vak
CISA - Certified Information Systems Auditor











Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
CISA - Certified Information Systems Auditor
Vak
CISA - Certified Information Systems Auditor

Documentinformatie

Geüpload op
7 januari 2026
Aantal pagina's
125
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Voorbeeld van de inhoud

CISA EXAM 2 – Questions With Reliable Solutions

Save




Terms in this set (150)



Q1) Which of the following is the B) Perform an end-to-end walk-through of the
MOST efficient and sufficiently reliable process is correct. Observation is the best and most
way to test the design effectiveness of effective method to test changes to ensure that the
a change control process? process is effectively designed.


A) Interview personnel in charge of D) Test a sample population of change requests is
the change control process incorrect. Testing a sample population of changes is
a test of compliance and operating effectiveness to
B) Perform an end-to-end walk- ensure that users submitted the proper
through of the process documentation/requests. It does not test the
effectiveness of the design.
C) Test a sample of authorized
changes C) Test a sample of authorized changes is incorrect.
Testing changes that have been authorized may not
D) Test a sample population of change provide sufficient assurance of the entire process
requests because it does not test the elements of the process
related to authorization or detect changes that
bypassed the controls.


A) Interview personnel in charge of the change
control process is incorrect. This is not as effective as
a walk-through of the change controls process
because people may know the process but not
follow it.

,Q2) An organization provides C) The firewall is placed on top of the commercial
information to its supply chain operating system with all default installation options
partners and customers through an is correct. The greatest concern when implementing
extranet infrastructure. Which of the firewalls on top of commercial operating systems is
following should be the GREATEST the potential presence of vulnerabilities that could
concern to an IS auditor reviewing the undermine the security posture of the firewall
firewall security architecture? platform itself. In most circumstances, when
commercial firewalls are breached, that breach is
A) Inbound traffic is blocked unless facilitated by vulnerabilities in the underlying
the traffic type and connections have operating system. Keeping all installation options
been specifically permitted. available on the system further increases the risk of
vulnerabilities and exploits.
B) A Secure Sockets Layer has been
implemented for user authentication B) A Secure Sockets Layer has been implemented for
and remote administration of the user authentication and remote administration of the
firewall. firewall is incorrect. Using Secure Sockets Layer for
firewall administration is important because changes
C) The firewall is placed on top of the in user and supply chain partners' roles and profiles
commercial operating system with all will be dynamic.
default instillation options.
D) Firewall policies are updated on the basis of
D) Firewall policies are updated on changing requirements is incorrect. It is appropriate
the basis of changing requirements to maintain the firewall policies as needed.


A) Inbound traffic is blocked unless the traffic type
and connections have been specifically permitted is
incorrect. It is prudent to block all inbound traffic to
an extranet unless permitted.

,Q3) Which of the following choices C) Senior management identify key business
would be the BEST source of processes is correct. Developing a risk-based audit
information when developing a risk- plan must start with the identification of key business
based audit plan? processes, which determine and identify the risk that
needs to be addressed.
A) System custodians identify
vulnerabilities. B) Process owners identify key controls is incorrect.
Although process owners should be consulted to
B)Process owners identify key identify key controls, senior management is a better
controls. source to identify business processes, which are
more important. System custodians identify
C) Senior management identify key vulnerabilities is incorrect.
business processes.
A) System custodians are a good source to better
D) Peer auditors understand previous understand the risk and controls as they apply to
audit results. specific applications; however, senior management is
a better source to identify business processes, which
are more important.


D) Peer auditors understand previous audit results is
incorrect. The review of previous audit results is one
input into the audit planning process; however, if
previous audits focused on a limited or a restricted
scope or if the key business processes have changed
and/or new business processes have been
introduced, then this does contribute to the
development of a risk-based audit plan.

, Q4) Which of the following inputs D) The IT project portfolio analysis is correct.
adds the MOST value to the strategic Portfolio analysis provides the best input into the
IT initiative decision-making process? decision-making process relating to planning
strategic IT initiatives. An analysis of the IT portfolio
A)The maturity of the project provides comparable information of planned
management process initiatives, projects and ongoing IT services, which
allows the IT strategy to be aligned with the business
B) The regulatory environment strategy.


C) Past audit findings A) The maturity of the project management process
is incorrect. The maturity of the project management
D) The IT project portfolio analysis process is more important with respect to managing
the day-to-day operations of IT versus performing
strategic planning.


B) The regulatory environment is incorrect.
Regulatory requirements may drive investment in
certain technologies and initiatives; however, having
to meet regulatory requirements is not typically the
main focus of the IT and business strategy.


C) Past audit findings is incorrect. Past audit findings
may drive investment in certain technologies and
initiatives; however, having to remediate past audit
findings is not the main focus of the IT and business
strategy.

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
LeCrae Harvard University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
2044
Lid sinds
3 jaar
Aantal volgers
1407
Documenten
21294
Laatst verkocht
1 dag geleden
Valuable Notes, Secure Learning

Welcome to ScholarVault—your ultimate destination for premium study materials and academic resources designed to unlock your full potential. As a passionate student myself, I understand how critical it is to have the right tools to excel in your studies. That's why I've curated a collection of high-quality notes, guides, and exam preparation materials that are tailored to help you achieve academic success. At ScholarVault, I believe that knowledge is power, but access to the right knowledge is key. My mission is to provide you with organized, comprehensive, and easy-to-understand study resources that make your learning journey smoother and more effective. Whether you're preparing for exams, reviewing class notes, or tackling tough concepts, you can count on me to deliver valuable, well-crafted content that aligns with your academic goals. Each resource has been carefully created with the intention to simplify complex topics, boost your confidence, and save you time. I aim to provide not just notes, but tools that truly make a difference in how you approach your studies. Explore the vault and discover everything you need to succeed—whether it’s detailed notes, in-depth study guides, or concise exam tips, everything is stored here for your academic growth. Thank you for trusting ScholarVault to be part of your learning experience. I’m excited to help you unlock your academic potential and achieve the success you deserve.

Lees meer Lees minder
4,0

433 beoordelingen

5
202
4
106
3
70
2
16
1
39

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen