The latest ISACA CISA (Certified Information Systems Auditor) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the ISACA CISA exam and earn ISACA CISA certification.
Table of Contents
- CISA Question 1191
- Question
- Answer
- Explanation
- CISA Question 1192
- Question
- Answer
- Explanation
- CISA Question 1193
- Question
- Answer
- Explanation
- CISA Question 1194
- Question
- Answer
- Explanation
- CISA Question 1195
- Question
- Answer
- Explanation
- CISA Question 1196
- Question
- Answer
- Explanation
- CISA Question 1197
- Question
- Answer
- Explanation
- CISA Question 1198
- Question
- Answer
- Explanation
- CISA Question 1199
- Question
- Answer
- Explanation
- CISA Question 1200
- Question
- Answer
- Explanation
CISA Question 1191
Question
What is the most common purpose of a virtual private network implementation?
A. A virtual private network (VPN) helps to secure access between an enterprise and its partners when communicating over an otherwise unsecured channel such as the Internet.
B. A virtual private network (VPN) helps to secure access between an enterprise and its partners when communicating over a dedicated T1 connection.
C. A virtual private network (VPN) helps to secure access within an enterprise when communicating over a dedicated T1 connection between network segments within the same facility.
D. A virtual private network (VPN) helps to secure access between an enterprise and its partners when communicating over a wireless connection.
Answer
A. A virtual private network (VPN) helps to secure access between an enterprise and its partners when communicating over an otherwise unsecured channel such as the Internet.
Explanation
A virtual private network (VPN) helps to secure access between an enterprise and its partners when communicating over an otherwise unsecured channel such as the Internet.
CISA Question 1192
Question
How is risk affected if users have direct access to a database at the system level?
A. Risk of unauthorized access increases, but risk of untraceable changes to the database decreases.
B. Risk of unauthorized and untraceable changes to the database increases.
C. Risk of unauthorized access decreases, but risk of untraceable changes to the database increases.
D. Risk of unauthorized and untraceable changes to the database decreases.
Answer
B. Risk of unauthorized and untraceable changes to the database increases.
Explanation
If users have direct access to a database at the system level, risk of unauthorized and untraceable changes to the database increases.
CISA Question 1193
Question
What is essential for the IS auditor to obtain a clear understanding of network management?
A. Security administrator access to systems
B. Systems logs of all hosts providing application services
C. A graphical map of the network topology
D. Administrator access to systems
Answer
C. A graphical map of the network topology
Explanation
A graphical interface to the map of the network topology is essential for the IS auditor to obtain a clear understanding of network management.
CISA Question 1194
Question
Why does the IS auditor often review the system logs?
A. To get evidence of password spoofing
B. To get evidence of data copy activities
C. To determine the existence of unauthorized access to data by a user or program
D. To get evidence of password sharing
Answer
C. To determine the existence of unauthorized access to data by a user or program
Explanation
When trying to determine the existence of unauthorized access to data by a user or program, the IS auditor will often review the system logs.
CISA Question 1195
Question
Atomicity enforces data integrity by ensuring that a transaction is either completed in its entirely or not at all. Atomicity is part of the ACID test
reference for transaction processing.
True or false?
A. True
B. False
Answer
A. True
Explanation
Atomicity enforces data integrity by ensuring that a transaction is either completed in its entirely or not at all. Atomicity is part of the ACID test reference for transaction processing.
CISA Question 1196
Question
What would an IS auditor expect to find in the console log?
A. Evidence of password spoofing
B. System errors
C. Evidence of data copy activities
D. Evidence of password sharing
Answer
B. System errors
Explanation
An IS auditor can expect to find system errors to be detailed in the console log.
CISA Question 1197
Question
How is the time required for transaction processing review usually affected by properly implemented Electronic Data Interface (EDI)?
A. EDI usually decreases the time necessary for review.
B. EDI usually increases the time necessary for review.
C. Cannot be determined.
D. EDI does not affect the time necessary for review.
Answer
A. EDI usually decreases the time necessary for review.
Explanation
Electronic data interface (EDI) supports intervendor communication while decreasing the time necessary for review because it is usually configured to readily identify errors requiring follow-up.
CISA Question 1198
Question
What kind of protocols does the OSI Transport Layer of the TCP/IP protocol suite provide to ensure reliable communication?
A. Nonconnection-oriented protocols
B. Connection-oriented protocols
C. Session-oriented protocols
D. Nonsession-oriented protocols
Answer
B. Connection-oriented protocols
Explanation
The transport layer of the TCP/IP protocol suite provides for connection- oriented protocols to ensure reliable communication.
CISA Question 1199
Question
An IS auditor usually places more reliance on evidence directly collected. What is an example of such evidence?
A. Evidence collected through personal observation
B. Evidence collected through systems logs provided by the organization’s security administration
C. Evidence collected through surveys collected from internal staff
D. Evidence collected through transaction reports provided by the organization’s IT administration
Answer
A. Evidence collected through personal observation
Explanation
An IS auditor usually places more reliance on evidence directly collected, such as through personal observation.
CISA Question 1200
Question
What topology provides the greatest redundancy of routes and the greatest network fault tolerance?
A. A star network topology
B. A mesh network topology with packet forwarding enabled at each host
C. A bus network topology
D. A ring network topology
Answer
B. A mesh network topology with packet forwarding enabled at each host
Explanation
A mesh network topology provides a point-to-point link between every network host. If each host is configured to route and forward communication, this topology provides the greatest redundancy of routes and the greatest network fault tolerance.