Discount Offer
Go Back on CISA Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99



Pass exam with Dumps4free or we will provide you with three additional months of access for FREE.

CISA Practice Test


Page 7 out of 204 Pages

Topic 1: Exam Pool A

When developing a risk-based IS audit plan, the PRIMARY focus should be on functions:


A.

with the most ineffective controls.


B.

with the greatest number of threats.


C.

considered critical to business operations.


D.

considered important by IT management





C.
  

considered critical to business operations.



Which of the following would be MOST helpful when assessing how applications exchange data with other applications?


A.

Results of a risk assessment on the applications


B.

List of servers and their applications


C.

Entity relationship diagram


D.

Configuration management database





C.
  

Entity relationship diagram



An IS auditor has completed a service level management audit related to order management services provided by a third party Which of the following is the MOST significant finding?


A.

The service level agreement does not define how availability is measured


B.

Service desk support is not available outside the company s business hours


C.

Penalties for missing service levels are limited.


D.

The third party has offshore support arrangements.





A.
  

The service level agreement does not define how availability is measured



On a daily basis, an in-house development team moves duplicate copies of production data containing personally identifiable information (Pll) to the test environment Which of the following is the B€ST way to mitigate the privacy risk involved?


A.

Require data owners to sign off on production data


B.

Sanitize the data in the test environment


C.

Encrypt the data file


D.

Obtain customer opt-in acceptances.





B.
  

Sanitize the data in the test environment



Which of the following is the BEST IS audit strategy?


A.

Limit audits to new application system developments


B.

Conduct general control audits annually and application audits in alternating years


C.

Perform audits based on Impact and probability of error and failure.


D.

Cycle general control and application audits over a two-year period





C.
  

Perform audits based on Impact and probability of error and failure.




Page 7 out of 204 Pages
Previous