CISA Certified Information Systems Auditor – Question2628

Which of the following is the MOST effective control for a utility program?

A.
Renaming the versions in the programmers’ libraries
B. Installing the program on a separate server
C. Storing the program in a production library
D. Allowing only authorized personnel to use the program

Correct Answer: D

CISA Certified Information Systems Auditor – Question2625

The PRIMARY advantage of object-oriented technology is enhanced:

A.
efficiency due to the re-use of elements of logic.
B. management of sequential program execution for data access.
C. management of a restricted variety of data types for a data object.
D. grouping of objects into methods for data access.

Correct Answer: A

CISA Certified Information Systems Auditor – Question2623

Both statistical and nonstatistical sampling techniques:

A.
permit the auditor to quantify the probability of error.
B. permit the auditor to quantify and fix the level of risk.
C. require judgment when defining population characteristics.
D. provide each item an equal opportunity of being selected.

Correct Answer: A

CISA Certified Information Systems Auditor – Question2622

Which of the following is the GREATEST benefit of implementing an incident management process?

A.
Opportunity for frequent reassessment of incidents
B. Reduction in security threats
C. Reduction in the business impact of incidents
D. Reduction of costs by the efficient use of resources

Correct Answer: C

CISA Certified Information Systems Auditor – Question2621

Which of the following is MOST important for an IS auditor to consider when reviewing the effectiveness of an incident response program?

A.
Incidents are categorized according to industry standards.
B. Lessons learned are incorporated into incident response processes.
C. Incidents are escalated to senior management in a timely manner.
D. The plan is reviewed and updated annually.

Correct Answer: B

CISA Certified Information Systems Auditor – Question2620

When an intrusion into an organization’s network is detected, which of the following should be performed FIRST?

A.
Block all compromised network nodes.
B. Protect information in the compromised systems.
C. Develop a response to the incident.
D. Identify nodes that have been compromised.

Correct Answer: C

CISA Certified Information Systems Auditor – Question2619

An IS auditor learns a server administration team regularly applies workarounds to address repeated failures of critical data processing services. Which of the following would BEST enable the organization to resolve this issue?

A.
Service level management
B. Change management
C. Problem management
D. Incident management

Correct Answer: C