Skip to Content

ISACA CISA Certified Information Systems Auditor Exam Questions and Answers – 9

The latest ISACA CISA (Certified Information Systems Auditor) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the ISACA CISA exam and earn ISACA CISA certification.

ISACA Certified Information Systems Auditor (CISA) Exam Questions and Answers

CISA Question 991

Question

What is the primary security concern for EDI environments?

A. Transaction authentication
B. Transaction completeness
C. Transaction accuracy
D. Transaction authorization

Answer

D. Transaction authorization

Explanation

Transaction authorization is the primary security concern for EDI environments.

CISA Question 992

Question

After identifying potential security vulnerabilities, what should be the IS auditor’s next step?

A. To evaluate potential countermeasures and compensatory controls
B. To implement effective countermeasures and compensatory controls
C. To perform a business impact analysis of the threats that would exploit the vulnerabilities
D. To immediately advise senior management of the findings

Answer

C. To perform a business impact analysis of the threats that would exploit the vulnerabilities

Explanation

After identifying potential security vulnerabilities, the IS auditor’s next step is to perform a business impact analysis of the threats that would exploit the vulnerabilities.

CISA Question 993

Question

Authentication techniques for sending and receiving data between EDI systems is crucial to prevent which of the following?

A. Unsynchronized transactions
B. Unauthorized transactions
C. Inaccurate transactions
D. Incomplete transactions

Answer

B. Unauthorized transactions

Explanation

Authentication techniques for sending and receiving data between EDI systems are crucial to prevent unauthorized transactions.

CISA Question 994

Question

Input/output controls should be implemented for which applications in an integrated systems environment?

A. The receiving application
B. The sending application
C. Both the sending and receiving applications
D. Output on the sending application and input on the receiving application

Answer

C. Both the sending and receiving applications

Explanation

Input/output controls should be implemented for both the sending and receiving applications in an integrated systems environment.

CISA Question 995

Question

Above almost all other concerns, what often results in the greatest negative impact on the implementation of new application software?

A. Failing to perform user acceptance testing
B. Lack of user training for the new system
C. Lack of software documentation and run manuals
D. Insufficient unit, module, and systems testing

Answer

A. Failing to perform user acceptance testing

Explanation

Above almost all other concerns, failing to perform user acceptance testing often results in the greatest negative impact on the implementation of new application software.

CISA Question 996

Question

When should plans for testing for user acceptance be prepared?

A. In the requirements definition phase of the systems-development project
B. In the feasibility phase of the systems-development project
C. In the design phase of the systems-development project
D. In the development phase of the systems-development project

Answer

A. In the requirements definition phase of the systems-development project

Explanation

Plans for testing for user acceptance are usually prepared in the requirements definition phase of the systems-development project.

CISA Question 997

Question

Who is responsible for the overall direction, costs, and timetables for systems-development projects?

A. The project sponsor
B. The project steering committee
C. Senior management
D. The project team leader

Answer

B. The project steering committee

Explanation

The project steering committee is responsible for the overall direction, costs, and timetables for systems-development projects.

CISA Question 998

Question

What is the most common reason for information systems to fail to meet the needs of users?

A. Lack of funding
B. Inadequate user participation during system requirements definition
C. Inadequate senior management participation during system requirements definition
D. Poor IT strategic planning

Answer

B. Inadequate user participation during system requirements definition

Explanation

Inadequate user participation during system requirements definition is the most common reason for information systems to fail to meet the needs of users.

CISA Question 999

Question

Which of the following uses a prototype that can be updated continually to meet changing user or business requirements?

A. PERT
B. Rapid application development (RAD)
C. Function point analysis (FPA)
D. GANTT

Answer

B. Rapid application development (RAD)

Explanation

Rapid application development (RAD) uses a prototype that can be updated continually to meet changing user or business requirements.

CISA Question 1000

Question

What kind of testing should programmers perform following any changes to an application or system?

A. Unit, module, and full regression testing
B. Module testing
C. Unit testing
D. Regression testing

Answer

A. Unit, module, and full regression testing

Explanation

Programmers should perform unit, module, and full regression testing following any changes to an application or system.