The latest ISACA CISA (Certified Information Systems Auditor) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the ISACA CISA exam and earn ISACA CISA certification.
Table of Contents
- CISA Question 991
- Question
- Answer
- Explanation
- CISA Question 992
- Question
- Answer
- Explanation
- CISA Question 993
- Question
- Answer
- Explanation
- CISA Question 994
- Question
- Answer
- Explanation
- CISA Question 995
- Question
- Answer
- Explanation
- CISA Question 996
- Question
- Answer
- Explanation
- CISA Question 997
- Question
- Answer
- Explanation
- CISA Question 998
- Question
- Answer
- Explanation
- CISA Question 999
- Question
- Answer
- Explanation
- CISA Question 1000
- Question
- Answer
- Explanation
CISA Question 991
Question
What is the primary security concern for EDI environments?
A. Transaction authentication
B. Transaction completeness
C. Transaction accuracy
D. Transaction authorization
Answer
D. Transaction authorization
Explanation
Transaction authorization is the primary security concern for EDI environments.
CISA Question 992
Question
After identifying potential security vulnerabilities, what should be the IS auditor’s next step?
A. To evaluate potential countermeasures and compensatory controls
B. To implement effective countermeasures and compensatory controls
C. To perform a business impact analysis of the threats that would exploit the vulnerabilities
D. To immediately advise senior management of the findings
Answer
C. To perform a business impact analysis of the threats that would exploit the vulnerabilities
Explanation
After identifying potential security vulnerabilities, the IS auditor’s next step is to perform a business impact analysis of the threats that would exploit the vulnerabilities.
CISA Question 993
Question
Authentication techniques for sending and receiving data between EDI systems is crucial to prevent which of the following?
A. Unsynchronized transactions
B. Unauthorized transactions
C. Inaccurate transactions
D. Incomplete transactions
Answer
B. Unauthorized transactions
Explanation
Authentication techniques for sending and receiving data between EDI systems are crucial to prevent unauthorized transactions.
CISA Question 994
Question
Input/output controls should be implemented for which applications in an integrated systems environment?
A. The receiving application
B. The sending application
C. Both the sending and receiving applications
D. Output on the sending application and input on the receiving application
Answer
C. Both the sending and receiving applications
Explanation
Input/output controls should be implemented for both the sending and receiving applications in an integrated systems environment.
CISA Question 995
Question
Above almost all other concerns, what often results in the greatest negative impact on the implementation of new application software?
A. Failing to perform user acceptance testing
B. Lack of user training for the new system
C. Lack of software documentation and run manuals
D. Insufficient unit, module, and systems testing
Answer
A. Failing to perform user acceptance testing
Explanation
Above almost all other concerns, failing to perform user acceptance testing often results in the greatest negative impact on the implementation of new application software.
CISA Question 996
Question
When should plans for testing for user acceptance be prepared?
A. In the requirements definition phase of the systems-development project
B. In the feasibility phase of the systems-development project
C. In the design phase of the systems-development project
D. In the development phase of the systems-development project
Answer
A. In the requirements definition phase of the systems-development project
Explanation
Plans for testing for user acceptance are usually prepared in the requirements definition phase of the systems-development project.
CISA Question 997
Question
Who is responsible for the overall direction, costs, and timetables for systems-development projects?
A. The project sponsor
B. The project steering committee
C. Senior management
D. The project team leader
Answer
B. The project steering committee
Explanation
The project steering committee is responsible for the overall direction, costs, and timetables for systems-development projects.
CISA Question 998
Question
What is the most common reason for information systems to fail to meet the needs of users?
A. Lack of funding
B. Inadequate user participation during system requirements definition
C. Inadequate senior management participation during system requirements definition
D. Poor IT strategic planning
Answer
B. Inadequate user participation during system requirements definition
Explanation
Inadequate user participation during system requirements definition is the most common reason for information systems to fail to meet the needs of users.
CISA Question 999
Question
Which of the following uses a prototype that can be updated continually to meet changing user or business requirements?
A. PERT
B. Rapid application development (RAD)
C. Function point analysis (FPA)
D. GANTT
Answer
B. Rapid application development (RAD)
Explanation
Rapid application development (RAD) uses a prototype that can be updated continually to meet changing user or business requirements.
CISA Question 1000
Question
What kind of testing should programmers perform following any changes to an application or system?
A. Unit, module, and full regression testing
B. Module testing
C. Unit testing
D. Regression testing
Answer
A. Unit, module, and full regression testing
Explanation
Programmers should perform unit, module, and full regression testing following any changes to an application or system.