IT認証試験問題集
毎月、ITshikenは1500人以上の受験者が試験準備を助けて、試験に合格するために受験者にご協力します
 ホームページ / CISA 問題集  / CISA 問題練習

ISACA CISA 問題練習

Isaca CISA 試験

最新更新時間: 2019/07/10,合計722問。

平成から令和へ:CISA 最新真題を買う時、日本語版と英語版両方を同時に獲得できます。

実際の問題集を練習し、試験のポイントを了解し、テストに申し込むするかどうかを決めることができます。

さらに試験準備時間の35%を節約するには、CISA 問題集を使用してください。

 / 49

Question No : 1
An IS auditor is using a statistical sample to inventory the tape library. What type of test would this be considered?

正解:
Explanation:
Using a statistical sample to inventory the tape library is an example of a substantive test.

Question No : 2
Database snapshots can provide an excellent audit trail for an IS auditor. True or false?

正解:
Explanation:
Database snapshots can provide an excellent audit trail for an IS auditor.

Question No : 3
What is a data validation edit control that matches input data to an occurrence rate? Choose the BEST answer.

正解:
Explanation:
A reasonableness check is a data validation edit control that matches input data to an occurrence rate.

Question No : 4
Processing controls ensure that data is accurate and complete, and is processed only through which of the following? Choose the BEST answer.

正解:
Explanation:
Processing controls ensure that data is accurate and complete, and is processed only through authorized routines.

Question No : 5
Data edits are implemented before processing and are considered which of the following? Choose the BEST answer.

正解:
Explanation:
Data edits are implemented before processing and are considered preventive integrity controls.

Question No : 6
What is used as a control to detect loss, corruption, or duplication of data?

正解:
Explanation:
Hash totals are used as a control to detect loss, corruption, or duplication of data.

Question No : 7
________________ (fill in the blank) should be implemented as early as data preparation to support data integrity at the earliest point possible.

正解:
Explanation:
Control totals should be implemented as early as data preparation to support data integrity at the earliest point possible.

Question No : 8
When should an application-level edit check to verify that availability of funds was completed at the electronic funds transfer (EFT) interface?

正解:
Explanation:
An application-level edit check to verify availability of funds should be completed at the electronic funds transfer (EFT) interface before an EFT is initiated.

Question No : 9
Whenever business processes have been re-engineered, the IS auditor attempts to identify and quantify the impact of any controls that might have been removed, or controls that might not work as effectively after business process changes. True or false?

正解:
Explanation:
Whenever business processes have been re-engineered, the IS auditor should attempt to identify and quantify the impact of any controls that might have been removed, or controls that might not work as effectively after business process changes.

Question No : 10
Business process re-engineering often results in ______________ automation, which results in _____________ number of people using technology. Fill in the blanks.

正解:
Explanation:
Business process re-engineering often results in increased automation, which results in a greater number of people using technology.

Question No : 11
Which of the following exploit vulnerabilities to cause loss or damage to the organization and its assets?

正解:
Explanation:
Threats exploit vulnerabilities to cause loss or damage to the organization and its assets.

Question No : 12
What is the primary security concern for EDI environments? Choose the BEST answer.

正解:
Explanation:
Transaction authorization is the primary security concern for EDI environments.

Question No : 13
After identifying potential security vulnerabilities, what should be the IS auditor's next step?

正解:
Explanation:
After identifying potential security vulnerabilities, the IS auditor's next step is to perform a business impact analysis of the threats that would exploit the vulnerabilities.

Question No : 14
Authentication techniques for sending and receiving data between EDI systems is crucial to prevent which of the following? Choose the BEST answer.

正解:
Explanation:
Authentication techniques for sending and receiving data between EDI systems are crucial to prevent unauthorized transactions.

Question No : 15
Input/output controls should be implemented for which applications in an integrated systems environment?

正解:
Explanation:
Input/output controls should be implemented for both the sending and receiving applications in an integrated systems environment

 / 49
ISACA