| Other CISA Certification Interview Questions |
|| Asked @
|The editing/validation of data entered at a remote site
would be performed MOST effectively at the:
A. central processing site after running the application system.
B. central processing site during the running of the
C. remote processing site after transmission to the central
D. remote processing site prior to transmission of the data
to the central processing site.
|When an organization's network is connected to an external
network in an Internet client-server model not under that
organization's control, security becomes a concern. In
providing adequate security in this environment, which of
the following assurance levels is LEAST important?
A. Server and client authentication
B. Data integrity
C. Data recovery
D. Data confidentiality
|The feature of a digital signature that ensures the sender
cannot later deny generating and sending the message is:
A. data integrity.
D. replay protection.
|In a risk-based audit approach, an IS auditor, in addition
to risk, would be influenced by:
A. the availability of CAATs.
B. management's representation.
C. organizational structure and job responsibilities.
D. the existence of internal and operational controls
|Which of the following is LEAST likely to be contained in a
digital certificate for the purposes of verification by a
trusted third party (TTP)/certification authority (CA)?
A. Name of the TTP/CA
B. Public key of the sender
C. Name of the public key holder
D. Time period for which the key is valid
|Which of the following is an implementation risk within the
process of decision support systems?
A. Management control
B. Semistructured dimensions
C. Inability to specify purpose and usage patterns
D. Changes in decision processes
|A control for a company that wants to prevent virus-infected
programs (or other type of unauthorized modified programs)
would be to:
A. utilize integrity checkers.
B. verify program's lengths.
C. backup the source and object code.
D. implement segregation of duties.
|A probable advantage to an organization that has outsourced
its data processing services is that:
A. needed IS expertise can be obtained from the outside.
B. greater control can be exercised over processing.
C. processing priorities can be established and enforced
D. greater user involvement is required to communicate user
|Which of the following types of transmission media provide
the BEST security against unauthorized access?
A. Copper wire
B. Twisted pair
C. Fiber-optic cables
D. Coaxial cables
|Following the development of an application system, it is
determined that several design objectives have not been
achieved. This is MOST likely to have been caused by:
A. insufficient user involvement.
B. early dismissal of the project manager.
C. inadequate quality assurance (QA) tools.
D. noncompliance with defined approval points.
|Which of the following is the MOST fundamental step in
effectively preventing a virus attack?
A. Executing updated antivirus software in the background on
a periodic basis
B. Buying standard antivirus software, which is installed on
all servers and workstations
C. Ensuring that all software is checked for a virus in a
separate PC before being loaded into the production environment
D. Adopting a comprehensive antivirus policy and
communicating it to all users
|Which of the following tests confirm that the new system can
operate in its target environment?
A. Sociability testing
B. Regression testing
C. Validation testing
D. Black box testing
|For more CISA Certification Interview Questions Click Here |