| Other CISA Certification Interview Questions |
|| Asked @
|Which of the following techniques or tools would assist an
IS auditor when performing a statistical sampling of
financial transactions maintained in a financial management
B. Parallel simulation
C. Generalized audit software
D. Regression testing
|An IS auditor recommends that an initial validation control
be programmed into a credit card transaction capture
application. The initial validation process would MOST likely:
A. check to ensure the type of transaction is valid for that
B. verify the format of the number entered then locate it on
C. ensure that the transaction entered is within the
cardholder's credit limit.
D. confirm that the card is not shown as lost or stolen on
the master file.
|During a review of a large data center an IS auditor
observed computer operators acting as backup tape librarians
and security administrators. Which of these situations would
be MOST critical to report?
A. Computer operators acting as tape librarians
B. Computer operators acting as security administrators
C. Computer operators acting as a tape librarian and
D. It is not necessary to report any of these situations.
|When implementing and application software package, which of
the following presents the GREATEST risk?
A. Uncontrolled multiple software versions
B. Source programs that are not synchronized with object code
C. Incorrectly set parameters
D. Programming errors
|IT governance ensures that an organization aligns its IT
A. Enterprise objectives.
B. IT objectives.
C. Audit objectives.
D. Finance objectives.
|Which of the following is the MOST effective technique for
providing security during data transmission?
A. Communication log
B. Systems software log
D. Standard protocol
|Which of the following is the basic objective of a control
|In a small organization, where segregation of duties is not
practical, an employee performs the function of computer
operator and application programmer. Which of the following
controls should the IS auditor recommend?
A. Automated logging of changes to development libraries
B. Additional staff to provide segregation of duties
C. Procedures that verify that only approved program changes
D. Access controls to prevent the operator from making
|The BEST overall quantitative measure of the performance of
biometric control devices is:
A. false rejection rate.
B. false acceptance rate.
C. equal error rate.
D. estimated error rate.
|The use of statistical sampling procedures helps minimize:
A. sampling risk.
B. detection risk.
C. inherent risk.
D. control risk.
|Which of the following is an objective of a control
self-assessment (CSA) program?
A. Audit responsibility enhancement
B. Problem identification
C. Solution brainstorming
D. Substitution for an audit
|Which of the following processes is the FIRST step in
developing a business continuity and disaster recovery plan
for an organization?
A. Alternate site selection
B. Business impact analysis
C. Test procedures and frequency
D. Information classification
|For more CISA Certification Interview Questions Click Here |