Go Back on CISA Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99



Pass exam with Dumps4free or we will provide you with three additional months of access for FREE.

CISA Practice Test


Page 5 out of 204 Pages

Topic 1: Exam Pool A

Which of the following is a passive attack on a network?


A.

Sequence analysis


B.

Traffic analysis


C.

Message service interruption


D.

Message modification





B.
  

Traffic analysis



When conducting a follow-up audit on an organization s firewall configuration, the IS auditor discovered that the firewall had been integrated into a new system that provides both firewall and intrusion detection capabilities. The IS auditor should:


A.

review the compatibility of the new system with existing network controls


B.

consider the follow-up audit unnecessary since the firewall is no longer being used


C.

assess whether the integrated system addresses the identified risk


D.

evaluate whether current staff is able to support the new system





C.
  

assess whether the integrated system addresses the identified risk



Spreadsheets are used to calculate project cost estimates Totals for each cost category are then keyed into the job-costing system. What is the BIST control to ensure that data are accurately entered into the system?


A.

Validity checks preventing entry of character data


B.

Reconciliation total amounts by project


C.

Display back of project detail after entry


D.

Reasonableness checks for each cost type





B.
  

Reconciliation total amounts by project



The objective of using coding standards for systems development is to:


A.

ensure that business needs are met


B.

facilitate user testing


C.

facilitate program maintenance


D.

ensure the completeness of requirements.





C.
  

facilitate program maintenance



An audit committee is reviewing an annual IT risk assessment Which of the following is the BEST justification for the audits selected?


A.

Underlying business risks


B.

Applications impacted


C.

Likelihood of an IT process failure


D.

Key IT general process controls





A.
  

Underlying business risks




Page 5 out of 204 Pages
Previous