Skip to Content

ISACA CISA Certified Information Systems Auditor Exam Questions and Answers – 11

The latest ISACA CISA (Certified Information Systems Auditor) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the ISACA CISA exam and earn ISACA CISA certification.

ISACA Certified Information Systems Auditor (CISA) Exam Questions and Answers

CISA Question 1191

Question

What is the most common purpose of a virtual private network implementation?

A. A virtual private network (VPN) helps to secure access between an enterprise and its partners when communicating over an otherwise unsecured channel such as the Internet.
B. A virtual private network (VPN) helps to secure access between an enterprise and its partners when communicating over a dedicated T1 connection.
C. A virtual private network (VPN) helps to secure access within an enterprise when communicating over a dedicated T1 connection between network segments within the same facility.
D. A virtual private network (VPN) helps to secure access between an enterprise and its partners when communicating over a wireless connection.

Answer

A. A virtual private network (VPN) helps to secure access between an enterprise and its partners when communicating over an otherwise unsecured channel such as the Internet.

Explanation

A virtual private network (VPN) helps to secure access between an enterprise and its partners when communicating over an otherwise unsecured channel such as the Internet.

CISA Question 1192

Question

How is risk affected if users have direct access to a database at the system level?

A. Risk of unauthorized access increases, but risk of untraceable changes to the database decreases.
B. Risk of unauthorized and untraceable changes to the database increases.
C. Risk of unauthorized access decreases, but risk of untraceable changes to the database increases.
D. Risk of unauthorized and untraceable changes to the database decreases.

Answer

B. Risk of unauthorized and untraceable changes to the database increases.

Explanation

If users have direct access to a database at the system level, risk of unauthorized and untraceable changes to the database increases.

CISA Question 1193

Question

What is essential for the IS auditor to obtain a clear understanding of network management?

A. Security administrator access to systems
B. Systems logs of all hosts providing application services
C. A graphical map of the network topology
D. Administrator access to systems

Answer

C. A graphical map of the network topology

Explanation

A graphical interface to the map of the network topology is essential for the IS auditor to obtain a clear understanding of network management.

CISA Question 1194

Question

Why does the IS auditor often review the system logs?

A. To get evidence of password spoofing
B. To get evidence of data copy activities
C. To determine the existence of unauthorized access to data by a user or program
D. To get evidence of password sharing

Answer

C. To determine the existence of unauthorized access to data by a user or program

Explanation

When trying to determine the existence of unauthorized access to data by a user or program, the IS auditor will often review the system logs.

CISA Question 1195

Question

Atomicity enforces data integrity by ensuring that a transaction is either completed in its entirely or not at all. Atomicity is part of the ACID test
reference for transaction processing.
True or false?

A. True
B. False

Answer

A. True

Explanation

Atomicity enforces data integrity by ensuring that a transaction is either completed in its entirely or not at all. Atomicity is part of the ACID test reference for transaction processing.

CISA Question 1196

Question

What would an IS auditor expect to find in the console log?

A. Evidence of password spoofing
B. System errors
C. Evidence of data copy activities
D. Evidence of password sharing

Answer

B. System errors

Explanation

An IS auditor can expect to find system errors to be detailed in the console log.

CISA Question 1197

Question

How is the time required for transaction processing review usually affected by properly implemented Electronic Data Interface (EDI)?

A. EDI usually decreases the time necessary for review.
B. EDI usually increases the time necessary for review.
C. Cannot be determined.
D. EDI does not affect the time necessary for review.

Answer

A. EDI usually decreases the time necessary for review.

Explanation

Electronic data interface (EDI) supports intervendor communication while decreasing the time necessary for review because it is usually configured to readily identify errors requiring follow-up.

CISA Question 1198

Question

What kind of protocols does the OSI Transport Layer of the TCP/IP protocol suite provide to ensure reliable communication?

A. Nonconnection-oriented protocols
B. Connection-oriented protocols
C. Session-oriented protocols
D. Nonsession-oriented protocols

Answer

B. Connection-oriented protocols

Explanation

The transport layer of the TCP/IP protocol suite provides for connection- oriented protocols to ensure reliable communication.

CISA Question 1199

Question

An IS auditor usually places more reliance on evidence directly collected. What is an example of such evidence?

A. Evidence collected through personal observation
B. Evidence collected through systems logs provided by the organization’s security administration
C. Evidence collected through surveys collected from internal staff
D. Evidence collected through transaction reports provided by the organization’s IT administration

Answer

A. Evidence collected through personal observation

Explanation

An IS auditor usually places more reliance on evidence directly collected, such as through personal observation.

CISA Question 1200

Question

What topology provides the greatest redundancy of routes and the greatest network fault tolerance?

A. A star network topology
B. A mesh network topology with packet forwarding enabled at each host
C. A bus network topology
D. A ring network topology

Answer

B. A mesh network topology with packet forwarding enabled at each host

Explanation

A mesh network topology provides a point-to-point link between every network host. If each host is configured to route and forward communication, this topology provides the greatest redundancy of routes and the greatest network fault tolerance.