6 CISA Law Regulation Questions Answer and Explanation

Free Exam Simulator

Question 1 - ID: 3012790
An IS auditor is reviewing regulatory compliance of an organization. Which of the following is the major concern?
Select one
 
A.
B.
C.
D.
Answer and explanation:
In absence of list of all applicable laws and regulations, it is not possible to monitor the compliance level and ensue adherence to respective laws and regulation. Other options are not as critical as option D. .
Question 2 - ID: 3612099
An IS auditor has found time constraints and expanded needs to be the root causes for recent violations of corporate data definition standards in a new business intelligence project. Which of the following is the MOST appropriate suggestion for an auditor to make?
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
Punishing the violators would be outside the authority of the auditor and inappropriate until the reason for the violations have been determined.
B
Delaying the project would be an inappropriate suggestion because of business requirements or the likely damage to entire project profitability.
C
The usage of nonstandard data definitions would lower the efficiency of the new development and increase the risk of errors in critical business decisions. To change data definition standards after project conclusion is risky and is not a viable solution.
D
Provided that data architecture, technical and operational requirements are sufficiently documented, the alignment to standards could be treated as a specific work package assigned to new project resources.
Question 3 - ID: 2812020
Which of the following is the MOST likely benefit of implementing a standardized infrastructure?
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
While standardization can reduce support costs, the transition to a standardized kit can be expensive; therefore, the overall level of IT infrastructure investment is not likely to be reduced
B
A standardized infrastructure may simplify testing of changes, but it does not reduce the need for such testing.
C
A standardized infrastructure results in a more homogeneous environment, which is more prone to attacks.
D
A standardized IT infrastructure provides a consistent set of platforms and operating systems across the organization. This standardization reduces the time and effort required to manage a set of disparate platforms and operating systems. In addition, the implementation of enhanced operational support tools (e.g., password management tools, patch management tools and auto provisioning of user access) is simplified. These tools can help the organization reduce the cost of IT service delivery and operational support.
Question 4 - ID: 4412791
Which of the following is MOST essential to optimize IT activities?
Select one
 
A.
B.
C.
D.
Answer and explanation:
Utmost important and essential option will be compliance with regulatory requirements.
Question 5 - ID: 5012177
Vendors have released patches fixing security flaws in their software. Which of the following should an IS auditor recommend in this situation?
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
To install the patch without knowing what it might affect could easily cause problems. The installation of a patch may also affect system availability; therefore, the patch should be rolled out at a time that is acceptable to the business.
B
Declining to deal with vendors does not take care of the flaw and may severely limit service options.
C
New software versions with all fixes included are not always available and a full installation could be time consuming.
D
The effect of installing the patch should be immediately evaluated and installation should occur based on the results of the evaluation. There are numerous cases where a patch from one vendor has affected other systems; therefore, it is necessary to test the patches as much as possible before rolling them out to the entire organization.
Question 6 - ID: 7712069
During the review of a web-based software development project, an IS auditor realizes that coding standards are not enforced, and code reviews are rarely carried out. This will MOST likely increase the likelihood of a successful:
Select one
 
A.
B.
C.
D.
Answer and explanation:
A
A distributed denial-of-service attack floods its target with numerous packets, to prevent it from responding to legitimate requests. This is not related to coding standards.
B
Poorly written code, especially in web-based applications, is often exploited by hackers using buffer overflow techniques.
C
A brute force attack is used to crack passwords, but this is not related to coding standards.
D
War dialing uses modem-scanning tools to hack private branch exchanges or other telecommunications services.

Free Exam Simulator