Skip to Content

ISACA CISA Certified Information Systems Auditor Exam Questions and Answers – 25

The latest ISACA CISA (Certified Information Systems Auditor) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the ISACA CISA exam and earn ISACA CISA certification.

ISACA Certified Information Systems Auditor (CISA) Exam Questions and Answers

CISA Question 2681

Question

The information in the knowledge base can be expressed in several ways. Which of the following way uses questionnaires to lead the user through a series of choices until a conclusion is reached?

A. Decision tree
B. Rules
C. Semantic nets
D. Knowledge interface

Answer

A. Decision tree

Explanation

Decision tree uses questionnaires to lead the user through a series of choices, until a conclusion is reached. Flexibility is compromised because the user must answer the questions in an exact sequence.

For CISA Exam you should know below information about Artificial Intelligence and Expert System
Artificial intelligence is the study and application of the principles by which:
Knowledge is acquired and used –
Goals are generated and achieved
Information is communicated –
Collaboration is achieved –
Concepts are formed –
Languages are developed –

Two main programming languages that have been developed for artificial intelligence are LISP and PROLOG.
Expert system are compromised primary components, called shells, when they are not populated with particular data, and the shells are designed to host new expert system.
Keys to the system is the knowledge base (KB), which contains specific information or fact patterns associated with a particular subject matter and the rule for interpreting these facts. The KB interface with a database in obtaining data to analyze a particular problem in deriving an expert conclusion. The information in the KB can be expressed in several ways:
Decision Tree – Using questionnaires to lead the user through a series of choices, until a conclusion is reached. Flexibility is compromised because the user must answer the questions in an exact sequence.
Rule – Expressing declarative knowledge through the use of if-then relationships. For example, if a patient’s body temperature is over 39 degrees Celsius and their pulse is under 60, then they might be suffering from a certain disease.
Semantic nets – Consist of a graph in which the node represent physical or conceptual object and the arcs describe the relationship between the nodes. Semantic nets resemble a data flow diagram and make use of an inheritance mechanism to prevent duplication of a data.
Additionally, the inference engine shown is a program that uses the KB and determines the most appropriate outcome based on the information supplied by the user. In addition, an expert system includes the following components
Knowledge interface – Allows the expert to enter knowledge into the system without the traditional mediation of a software engineer.
Data Interface – Enables the expert system to collect data from nonhuman sources, such as measurement instruments in a power plant.

The following were incorrect answers:
Rule – Expressing declarative knowledge through the use of if-then relationships.
Semantic nets – Semantic nets consist of a graph in which the node represent physical or conceptual object and the arcs describe the relationship between the nodes.
Knowledge interface – Allows the expert to enter knowledge into the system without the traditional mediation of a software engineer.

CISA Question 2682

Question

Which of the following method of expressing knowledge base consist of a graph in which nodes represent physical or conceptual objects and the arcs describes the relationship between nodes?

A. Decision tree
B. Rules
C. Semantic nets
D. Knowledge interface

Answer

C. Semantic nets

Explanation

Semantic nets consist of a graph in which the node represent physical or conceptual object and the arcs describe the relationship between the nodes.

For CISA Exam you should know below information about Artificial Intelligence and Expert System
Artificial intelligence is the study and application of the principles by which:
Knowledge is acquired and used –
Goals are generated and achieved
Information is communicated –
Collaboration is achieved –
Concepts are formed –
Languages are developed –

Two main programming languages that have been developed for artificial intelligence are LISP and PROLOG.
Expert system are compromised primary components, called shells, when they are not populated with particular data, and the shells are designed to host new expert system.
Keys to the system is the knowledge base (KB), which contains specific information or fact patterns associated with a particular subject matter and the rule for interpreting these facts. The KB interface with a database in obtaining data to analyze a particular problem in deriving an expert conclusion. The information in the KB can be expressed in several ways:
Decision Tree – Using questionnaires to lead the user through a series of choices, until a conclusion is reached. Flexibility is compromised because the user must answer the questions in an exact sequence.
Rule – Expressing declarative knowledge through the use of if-then relationships. For example, if a patient’s body temperature is over 39 degrees Celsius and their pulse is under 60, then they might be suffering from a certain disease.
Semantic nets – Consist of a graph in which the node represent physical or conceptual object and the arcs describe the relationship between the nodes. Semantic nets resemble a data flow diagram and make use of an inheritance mechanism to prevent duplication of a data.
Additionally, the inference engine shown is a program that uses the KB and determines the most appropriate outcome based on the information supplied by the user. In addition, an expert system includes the following components
Knowledge interface – Allows the expert to enter knowledge into the system without the traditional mediation of a software engineer.
Data Interface – Enables the expert system to collect data from nonhuman sources, such as measurement instruments in a power plant.

The following were incorrect answers:
Decision Tree – Using questionnaires to lead the user through a series of choices, until a conclusion is reached. Flexibility is compromised because the user must answer the questions in an exact sequence.
Rule – Expressing declarative knowledge through the use of if-then relationships.
Semantic nets – Semantic nets consist of a graph in which the node represent physical or conceptual object and the arcs describe the relationship between the nodes.

CISA Question 2683

Question

Which of the following component of an expert system allows the expert to enter knowledge into the system without the traditional mediation of a software engineer?

A. Decision tree
B. Rules
C. Semantic nets
D. Knowledge interface

Answer

D. Knowledge interface

Explanation

Knowledge interface allows the expert to enter knowledge into the system without the traditional mediation of a software engineer.

For CISA Exam you should know below information about Artificial Intelligence and Expert System
Artificial intelligence is the study and application of the principles by which:
Knowledge is acquired and used –
Goals are generated and achieved
Information is communicated –
Collaboration is achieved –
Concepts are formed –
Languages are developed –

Two main programming languages that have been developed for artificial intelligence are LISP and PROLOG.
Expert system are compromised primary components, called shells, when they are not populated with particular data, and the shells are designed to host new expert system.
Keys to the system is the knowledge base (KB), which contains specific information or fact patterns associated with a particular subject matter and the rule for interpreting these facts. The KB interface with a database in obtaining data to analyze a particular problem in deriving an expert conclusion. The information in the KB can be expressed in several ways:
Decision Tree – Using questionnaires to lead the user through a series of choices, until a conclusion is reached. Flexibility is compromised because the user must answer the questions in an exact sequence.
Rule – Expressing declarative knowledge through the use of if-then relationships. For example, if a patient’s body temperature is over 39 degrees Celsius and their pulse is under 60, then they might be suffering from a certain disease.
Semantic nets – Consist of a graph in which the node represent physical or conceptual object and the arcs describe the relationship between the nodes. Semantic nets resemble a data flow diagram and make use of an inheritance mechanism to prevent duplication of a data.
Additionally, the inference engine shown is a program that uses the KB and determines the most appropriate outcome based on the information supplied by the user. In addition, an expert system includes the following components
Knowledge interface – Allows the expert to enter knowledge into the system without the traditional mediation of a software engineer.
Data Interface – Enables the expert system to collect data from nonhuman sources, such as measurement instruments in a power plant.

The following were incorrect answers:
Decision Tree – Using questionnaires to lead the user through a series of choices, until a conclusion is reached. Flexibility is compromised because the user must answer the questions in an exact sequence.
Rule – Expressing declarative knowledge through the use of if-then relationships.
Semantic nets – Semantic nets consist of a graph in which the node represent physical or conceptual object and the arcs describe the relationship between the nodes.

CISA Question 2684

Question

Which of the following component of an expert system enables the expert system to collect data from nonhuman sources, such as measurement instruments in a power plant?

A. Decision tree
B. Rules
C. Semantic nets
D. Data interface

Answer

D. Data interface

Explanation

Data Interface enables the expert system to collect data from nonhuman sources, such as measurement instruments in a power plant.

For CISA Exam you should know below information about Artificial Intelligence and Expert System
Artificial intelligence is the study and application of the principles by which:
Knowledge is acquired and used –
Goals are generated and achieved
Information is communicated –
Collaboration is achieved –
Concepts are formed –
Languages are developed –

Two main programming languages that have been developed for artificial intelligence are LISP and PROLOG.
Expert system are compromised primary components, called shells, when they are not populated with particular data, and the shells are designed to host new expert system.
Keys to the system is the knowledge base (KB), which contains specific information or fact patterns associated with a particular subject matter and the rule for interpreting these facts. The KB interface with a database in obtaining data to analyze a particular problem in deriving an expert conclusion. The information in the KB can be expressed in several ways:
Decision Tree – Using questionnaires to lead the user through a series of choices, until a conclusion is reached. Flexibility is compromised because the user must answer the questions in an exact sequence.
Rule – Expressing declarative knowledge through the use of if-then relationships. For example, if a patient’s body temperature is over 39 degrees Celsius and their pulse is under 60, then they might be suffering from a certain disease.
Semantic nets – Consist of a graph in which the node represent physical or conceptual object and the arcs describe the relationship between the nodes. Semantic nets resemble a data flow diagram and make use of an inheritance mechanism to prevent duplication of a data.
Additionally, the inference engine shown is a program that uses the KB and determines the most appropriate outcome based on the information supplied by the user. In addition, an expert system includes the following components
Knowledge interface – Allows the expert to enter knowledge into the system without the traditional mediation of a software engineer.
Data Interface – Enables the expert system to collect data from nonhuman sources, such as measurement instruments in a power plant.

The following were incorrect answers:
Decision Tree – Using questionnaires to lead the user through a series of choices, until a conclusion is reached. Flexibility is compromised because the user must answer the questions in an exact sequence.
Rule – Expressing declarative knowledge through the use of if-then relationships.
Semantic nets – Semantic nets consist of a graph in which the node represent physical or conceptual object and the arcs describe the relationship between the nodes.

CISA Question 2685

Question

Which of the following function in traditional EDI translate data between the standard format and trading partner’s propriety format?

A. Communication handler
B. Application Interface
C. Application System
D. EDI Translator

Answer

D. EDI Translator

Explanation

EDI Translator translates data between standard format (ANSI X12) and trading partner’s propriety information.

For CISA Exam you should know below information about Traditional EDI functions.
Moving data in a batch transmission process through the traditional EDI process generally involves three functions within each trading partner’s computer system
Communication handler – Process for transmitting and receiving electronic documents between trading partners via dial-up lines, public switched networks, multiple dedicated lines or a value added network (VAN). VAN use computerized message switching and storage capabilities to provide electronic mailbox services similar to post offices. The VAN receives all the outbound transactions from an organization, sort them by destination and passes them to precipitants when they log on to check their mailbox and receive transmission.
EDI Interface – Interface function that manipulates and routes data between the application system and the communication handler. The interface consists of two components
EDI Translator – The device translates data between standard format (ANSI X12) and trading partner’s propriety information.
Application Interface – This interface moves electronic transactions to or from the application systems and perform data mapping. Data mapping is the process by which data are extracted from EDI translation process and integrated with the data or process of receiving company.
3. Application System – The program that process the data sent to, or received from, the trading partner. Although new controls should be developed for the EDI interface, the control for existing applications, if left unchanged, are usually unaffected.

The following were incorrect answers:
Communication handler – Process for transmitting and receiving electronic documents between trading partners via dial-up lines, public switched networks, multiple dedicated lines or a value added network (VAN).
Application System – The program that process the data sent to, or received from, the trading partner. Although new controls should be developed for the EDI interface, the control for existing applications, if left unchanged, are usually unaffected.
Application Interface – This interface moves electronic transactions to or from the application systems and perform data mapping.

CISA Question 2686

Question

Which of the following function in traditional EDI process manipulates and routes data between the application system and the communication handler?

A. Communication handler
B. EDI Interface
C. Application System
D. EDI Translator

Answer

B. EDI Interface

Explanation

EDI Interface manipulates and routes data between the application system and the communication handler.

For CISA Exam you should know below information about Traditional EDI functions.
Moving data in a batch transmission process through the traditional EDI process generally involves three functions within each trading partner’s computer system
Communication handler – Process for transmitting and receiving electronic documents between trading partners via dial-up lines, public switched networks, multiple dedicated lines or a value added network (VAN). VAN use computerized message switching and storage capabilities to provide electronic mailbox services similar to post offices. The VAN receives all the outbound transactions from an organization, sort them by destination and passes them to precipitants when they log on to check their mailbox and receive transmission.
EDI Interface – Interface function that manipulates and routes data between the application system and the communication handler. The interface consists of two components
EDI Translator – The device translates data between standard format (ANSI X12) and trading partner’s propriety information.
Application Interface – This interface moves electronic transactions to or from the application systems and perform data mapping. Data mapping is the process by which data are extracted from EDI translation process and integrated with the data or process of receiving company.
3. Application System – The program that process the data sent to, or received from, the trading partner. Although new controls should be developed for the EDI interface, the control for existing applications, if left unchanged, are usually unaffected.

The following were incorrect answers:
Communication handler – Process for transmitting and receiving electronic documents between trading partners via dial-up lines, public switched networks, multiple dedicated lines or a value added network (VAN).
Application System – The program that process the data sent to, or received from, the trading partner. Although new controls should be developed for the EDI interface, the control for existing applications, if left unchanged, are usually unaffected.
EDI Translator – The device translates data between standard format (ANSI X12) and trading partner’s propriety information.

CISA Question 2687

Question

Which of the following function in traditional EDI process is used for transmitting and receiving electronic documents between trading partners via dial up lines, public switched network or VAN?

A. Communication handler
B. EDI Interface
C. Application System
D. EDI Translator

Answer

A. Communication handler

Explanation

Communication handler – Process for transmitting and receiving electronic documents between trading partners via dial-up lines, public switched networks, multiple dedicated lines or a value added network (VAN).

For CISA Exam you should know below information about Traditional EDI functions.
Moving data in a batch transmission process through the traditional EDI process generally involves three functions within each trading partner’s computer system
Communication handler – Process for transmitting and receiving electronic documents between trading partners via dial-up lines, public switched networks, multiple dedicated lines or a value added network (VAN). VAN use computerized message switching and storage capabilities to provide electronic mailbox services similar to post offices. The VAN receives all the outbound transactions from an organization, sort them by destination and passes them to precipitants when they log on to check their mailbox and receive transmission.
EDI Interface – Interface function that manipulates and routes data between the application system and the communication handler. The interface consists of two components
EDI Translator – The device translates data between standard format (ANSI X12) and trading partner’s propriety information.
Application Interface – This interface moves electronic transactions to or from the application systems and perform data mapping. Data mapping is the process by which data are extracted from EDI translation process and integrated with the data or process of receiving company.
3. Application System – The program that process the data sent to, or received from, the trading partner. Although new controls should be developed for the EDI interface, the control for existing applications, if left unchanged, are usually unaffected.

The following were incorrect answers:
EDI Interface – Interface function that manipulates and routes data between the application system and the communication handler.
Application System – The program that process the data sent to, or received from, the trading partner. Although new controls should be developed for the EDI interface, the control for existing applications, if left unchanged, are usually unaffected.
EDI Translator – The device translates data between standard format (ANSI X12) and trading partner’s propriety information.

CISA Question 2688

Question

Which of the following fourth generation language is a development tools to generate lower level programming languages?

A. Query and report generator
B. Embedded database 4GLs
C. Relational database 4GL
D. Application generators

Answer

D. Application generators

Explanation

Application generators – These development tools generate lower level programming languages(3GL) such as COBOL and C. The application can be further tailored and customized. Data processing development personnel, not end user, use application generators.

For CISA exam you should know below mentioned types of 4GLs:
Query and report generator – These specialize language can extract and produce reports. Recently more powerful language has been produced that can access database records, produce complex on-line output and be developed in an almost natural language.
Embedded database 4GLs – These depend on self-contained database management systems. These characteristics often makes them more user-friendly but also may lead to applications that are not integrated well with other product applications. Example includes FOCUS, RAMIS II and NOMAD 2.
Relational database 4GLs – These high level language products are usually an optional feature on vendor’s DBMS product line. These allow the application developer to make better use of DBMS product, but they often are not end-user-oriented. Example include SQL+ MANTIS and NATURAL.
Application generators – These development tools generate lower level programming languages(3GL) such as COBOL and C. The application can be further tailored and customized. Data processing development personnel, not end user, use application generators.

The following were incorrect answers:
Query and report generator – These specialize language can extract and produce reports.
Relational database 4GLs – These high level language products are usually an optional feature on vendor’s DBMS product line.
Embedded database 4GLs – These depend on self-contained database management systems. These characteristics often makes them more user-friendly but also may lead to applications that are not integrated well with other product applications.

CISA Question 2689

Question

Which of the following fourth generation language depends on self-contained database management systems?

A. Query and report generator
B. Embedded database 4GLs
C. Relational database 4GL
D. Application generators

Answer

B. Embedded database 4GLs

Explanation

Embedded database 4GLsare depend on self-contained database management systems. These characteristics often makes them more userfriendly but also may lead to applications that are not integrated well with other product applications. Example includes FOCUS, RAMIS II and NOMAD 2.

For CISA exam you should know below mentioned types of 4GLs:
Query and report generator – These specialize language can extract and produce reports. Recently more powerful language has been produced that can access database records, produce complex on-line output and be developed in an almost natural language.
Embedded database 4GLs – These depend on self-contained database management systems. These characteristics often makes them more user-friendly but also may lead to applications that are not integrated well with other product applications. Example includes FOCUS, RAMIS II and NOMAD 2.
Relational database 4GLs – These high level language products are usually an optional feature on vendor’s DBMS product line. These allow the application developer to make better use of DBMS product, but they often are not end-user-oriented. Example include SQL+ MANTIS and NATURAL.
Application generators – These development tools generate lower level programming languages(3GL) such as COBOL and C. The application can be further tailored and customized. Data processing development personnel, not end user, use application generators.

The following were incorrect answers:
Query and report generator – These specialize language can extract and produce reports.
Relational database 4GLs – These high level language products are usually an optional feature on vendor’s DBMS product line.
Application generators – These development tools generate lower level programming languages(3GL) such as COBOL and C.

CISA Question 2690

Question

Which of the following E-commerce model covers all the transactions between companies and government organization?

A. B-to-C relationships
B. B-to-B relationships
C. B-to-E relationships
D. B-to-G relationships

Answer

D. B-to-G relationships

Explanation

Business-to-Government(B-to-G) relationships covers all the transactions between companies and government organizations. Currently this category is infancy, but it could expand quit rapidly as government use their own operations to promote awareness and growth of e-commerce.
In addition to public procurement, administrations may also offer the option of electronic interchange for such transactions as VAT returns and the payment of corporate taxes.

For CISA exam you should know below E-commerce models:
Business-to-Consumer (B-to-C) relationships – The greatest potential power of E-commerce comes from its ability to redefine relationship with customers in creating a new convenient, low-cost channel to transact business. Companies can tailor their marketing strategies to an individual customer’s needs and wants.
As more of its business shifts on-line, a company will have an enhanced ability to track how its customer interact with it.
Business-to-Business (B-to-B) relationships – The relationship among the selling services of two or more business opens up the possibility of re-engineering business process across the boundaries that have traditionally separated external entities from each other. Because of the ease of access and the ubiquity of the Internet, for example companies can build business process that combine previously separated activities. The result is faster, higher quality and lower-cost set of transactions. The market has ever created to subdivision of B-to-B called business-to-small business(B-to-SB) relationships
Business-to-employee(B-to-E) relationships – Web technologies also assist in the dissemination of information to and among an organization employees.
Business-to-Government(B-to-G) relationships – covers all the transactions between companies and government organizations. Currently this category is infancy, but it could expand quit rapidly as government use their own operations to promote awareness and growth of e-commerce.
In addition to public procurement, administrations may also offer the option of electronic interchange for such transactions as VAT returns and the payment of corporate taxes.

The following were incorrect answers:
The other options presented does not covers all transactions between companies and government organizations.

Ads Blocker Image Powered by Code Help Pro

Ads Blocker Detected!!!

We have detected that you are using extensions to block ads. We need money to operate the site, and almost all of it comes from online advertising. Please support us by disabling these ads blocker.

Please disable ad blocker