| Other CISA Certification Interview Questions |
|| Asked @
|Which of the following is a network architecture
configuration that links each station directly to a main hub?
D. Completed connected
|As a result of a business process reengineering (BPR) project:
A. an IS auditor would be concerned with the key controls
that existed in the prior business process and not those in
the new process.
B. system processes are automated in such a way that there
are more manual interventions and manual controls.
C. the newly designed business processes usually do not
involve changes in the way(s) of doing business.
D. advantages usually are realized when the reengineering
process appropriately suits the business and risk.
|Which of the following provides a mechanism for coding and
compiling programs interactively?
B. Utility programs
C. Online programming facilities
D. Network management software
|During the review of an organization's disaster recovery and
business continuity plan, the IS auditor found that a paper
test was performed to verify the existence of all necessary
procedures and actions within the recovery plan. This is a:
A. preparedness test.
B. module test.
C. full test.
D. walk-through test.
|Large-scale systems development efforts:
A. are not affected by the use of prototyping tools.
B. can be carried out independent of other organizational
C. require that business requirements be defined before the
D. require that project phases and deliverables be defined
during the duration of the project.
|Which of the following is LEAST likely to be contained in a
digital certificate for the purposes of verification by a
trusted third party (TTP)/certification authority (CA)?
A. Name of the TTP/CA
B. Public key of the sender
C. Name of the public key holder
D. Time period for which the key is valid
|Which of the following concerns associated with the World
Wide Web would be addressed by a firewall?
A. Unauthorized access from outside the organization
B. Unauthorized access from within the organization
C. A delay in Internet connectivity
D. A delay in downloading using file transfer protocol (FTP)
|The responsibility for designing, implementing and
maintaining a system of internal control lies with:
A. the IS auditor.
C. the external auditor.
D. the programming staff.
|A vendor/contractor?s performance against service level
agreements must be evaluated by the:
D. contractor?s management.
|Which of the following is a benefit of using callback devices?
A. Provide an audit trail
B. Can be used in a switchboard environment
C. Permit unlimited user mobility
D. Allow call forwarding
|The PRIMARY objective of a firewall is to protect:
A. internal systems from exploitation by external threats.
B. external systems from exploitation by internal threats.
C. internal systems from exploitation by internal threats.
D. itself and attached systems against being used to attack
|If a database is restored using before-image dumps, where
should the process be restarted following an interruption?
A. Before the last transaction
B. After the last transaction
C. The first transaction after the latest checkpoint
D. The last transaction before the latest checkpoint
|For more CISA Certification Interview Questions Click Here |