The latest ISACA CISA (Certified Information Systems Auditor) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the ISACA CISA exam and earn ISACA CISA certification.
Table of Contents
- CISA Question 1241
- Question
- Answer
- Explanation
- CISA Question 1242
- Question
- Answer
- Explanation
- CISA Question 1243
- Question
- Answer
- Explanation
- CISA Question 1244
- Question
- Answer
- Explanation
- CISA Question 1245
- Question
- Answer
- Explanation
- CISA Question 1246
- Question
- Answer
- Explanation
- CISA Question 1247
- Question
- Answer
- Explanation
- CISA Question 1248
- Question
- Answer
- Explanation
- CISA Question 1249
- Question
- Answer
- Explanation
- CISA Question 1250
- Question
- Answer
- Explanation
CISA Question 1241
Question
To affix a digital signature to a message, the sender must first create a message digest by applying a cryptographic hashing algorithm against:
A. the entire message and thereafter enciphering the message digest using the sender’s private key.
B. any arbitrary part of the message and thereafter enciphering the message digest using the sender’s private key.
C. the entire message and thereafter enciphering the message using the sender’s private key.
D. the entire message and thereafter enciphering the message along with the message digest using the sender’s private key.
Answer
A. the entire message and thereafter enciphering the message digest using the sender’s private key.
Explanation
A digital signature is a cryptographic method that ensures data integrity, authentication of the message, and non-repudiation. To ensure these, the sender first creates a message digest by applying a cryptographic hashing algorithm against the entire message and thereafter enciphers the message digest using the sender’s private key. A message digest is created by applying a cryptographic hashing algorithm against the entire message not on any arbitrary part of the message. After creating the message digest, only the message digest is enciphered using the sender’s private key, not the message.
CISA Question 1242
Question
An IS auditor reviewing the key roles and responsibilities of the database administrator (DBA) is LEAST likely to expect the job description of the DBA to include:
A. defining the conceptual schema.
B. defining security and integrity checks.
C. liaising with users in developing data model.
D. mapping data model with the internal schema.
Answer
D. mapping data model with the internal schema.
Explanation
A DBA only in rare instances should be mapping data elements from the data model to the internal schema (physical data storage definitions). To do so would eliminate data independence for application systems. Mapping of the data model occurs with the conceptual schema since the conceptual schema represents the enterprise-wide view of data within an organization and is the basis for deriving and end-user department data model.
CISA Question 1243
Question
A database administrator is responsible for:
A. defining data ownership.
B. establishing operational standards for the data dictionary.
C. creating the logical and physical database.
D. establishing ground rules for ensuring data integrity and security.
Answer
C. creating the logical and physical database.
Explanation
A database administrator is responsible for creating and controlling the logical and physical database. Defining data ownership resides with the head of the user department or top management if the data is common to the organization. IS management and the data administrator are responsible for establishing operational standards for the data dictionary. Establishing ground rules for ensuring data integrity and security in line with the corporate security policy is a function of the security administrator.
CISA Question 1244
Question
A data administrator is responsible for:
A. maintaining database system software.
B. defining data elements, data names and their relationship.
C. developing physical database structures.
D. developing data dictionary system software.
Answer
B. defining data elements, data names and their relationship.
Explanation
A data administrator is responsible for defining data elements, data names and their relationship. Choices A, C and D are functions of a database administrator (DBA)
CISA Question 1245
Question
Which of the following tests is an IS auditor performing when a sample of programs is selected to determine if the source and object versions are the same?
A. A substantive test of program library controls
B. A compliance test of program library controls
C. A compliance test of the program compiler controls
D. A substantive test of the program compiler controls
Answer
B. A compliance test of program library controls
Explanation
A compliance test determines if controls are operating as designed and are being applied in a manner that complies with management policies and procedures.
For example, if the IS auditor is concerned whether program library controls are working properly, the IS auditor might select a sample of programs to determine if the source and object versions are the same. In other words, the broad objective of any compliance test is to provide auditors with reasonable assurance that a particular control on which the auditor plans to rely is operating as the auditor perceived it in the preliminary evaluation.
CISA Question 1246
Question
Which of the following types of data validation editing checks is used to determine if a field contains data, and not zeros or blanks?
A. Check digit
B. Existence check
C. Completeness check
D. Reasonableness check
Answer
C. Completeness check
Explanation
A completeness check is used to determine if a field contains data and not zeros or blanks.
CISA Question 1247
Question
Which of the following network configuration options contains a direct link between any two host machines?
A. Bus
B. Ring
C. Star
D. Completely connected (mesh)
Answer
D. Completely connected (mesh)
Explanation
A completely connected mesh configuration creates a direct link between any two host machines.
CISA Question 1248
Question
The MOST significant level of effort for business continuity planning (BCP) generally is required during the:
A. testing stage.
B. evaluation stage.
C. maintenance stage.
D. early stages of planning.
Answer
D. early stages of planning.
Explanation
Company.com in the early stages of a BCP will incur the most significant level of program development effort, which will level out as the BCP moves into maintenance, testing and evaluation stages. It is during the planning stage that an IS auditor will play an important role in obtaining senior management’s commitment to resources and assignment of BCP responsibilities.
CISA Question 1249
Question
In an EDI process, the device which transmits and receives electronic documents is the:
A. communications handler.
B. EDI translator.
C. application interface.
D. EDI interface.
Answer
A. communications handler.
Explanation
A communications handler transmits and receives electronic documents between trading partners and/or wide area networks (WANs).
CISA Question 1250
Question
A number of system failures are occurring when corrections to previously detected errors are resubmitted for acceptance testing. This would indicate that the maintenance team is probably not adequately performing which of the following types of testing?
A. Unit testing
B. Integration testing
C. Design walk-throughs
D. Configuration management
Answer
B. Integration testing
Explanation
A common system maintenance problem is that errors are often corrected quickly (especially when deadlines are tight), units are tested by the programmer, and then transferred to the acceptance test area. This often results in system problems that should have been detected during integration or system testing. Integration testing aims at ensuring that the major components of the system interface correctly.