| Other CISA Certification Interview Questions |
|| Asked @
|Failure to adequately define or manage the requirements for
a system can result in a number of risks. The GREATEST risk is:
A. inadequate user involvement.
B. inadequate allocation of resources.
C. scope creep.
D. an incorrect estimation of the critical path.
|Which of the following facilitates program maintenance?
A. More cohesive and loosely coupled programs
B. Less cohesive and loosely coupled programs
C. More cohesive and strongly coupled programs
D. Less cohesive and strongly coupled programs
|A sequence of bits appended to a digital document that is
used to secure an e-mail sent through the Internet is called a:
A. digest signature.
B. electronic signature.
C. digital signature.
D. hash signature.
|The responsibility for designing, implementing and
maintaining a system of internal control lies with:
A. the IS auditor.
C. the external auditor.
D. the programming staff.
|Which of the following types of firewalls provide the
GREATEST degree and granularity of control?
A. Screening router
B. Packet filter
C. Application gateway
D. Circuit gateway
|An IS auditor evaluating data integrity in a transaction
driven system environment should review atomicity, to
A. the database survives failures (hardware or software).
B. each transaction is separated from other transactions.
C. integrity conditions are maintained.
D. a transaction is completed or not, or a database is
updated or not.
|The rate of change of technology increases the importance of:
A. outsourcing the IS function.
B. implementing and enforcing good processes.
C. hiring personnel willing to make a career within the
D. meeting user requirements.
|If a database is restored using before-image dumps, where
should the process be restarted following an interruption?
A. Before the last transaction
B. After the last transaction
C. The first transaction after the latest checkpoint
D. The last transaction before the latest checkpoint
|Which of the following is a dynamic analysis tool for the
purpose of testing software modules?
A. Blackbox test
B. Desk checking
C. Structured walk-through
D. Design and code
|An organization wants to enforce data integrity principles
and achieve faster performance/execution in a database
application. Which of the following design principles should
A. User (customized) triggers
B. Data validation at the front end
C. Data validation at the back end
D. Referential integrity
|An offsite information processing facility having electrical
wiring, air conditioning and flooring, but no computer or
communications equipment is a:
A. cold site.
B. warm site.
C. dial-up site.
D. duplicate processing facility.
|An integrated test facility is considered a useful audit
tool because it:
A. is a cost-efficient approach to auditing application
B. enables the financial and IS auditors to integrate their
C. compares processing output with independently calculated
D. provides the IS auditor with a tool to analyze a large
range of information.
|For more CISA Certification Interview Questions Click Here |