Download New Updated (July) Isaca CISA Actual Test 81-90

Ensurepass

 

QUESTION 81

Who is accountable for maintaining appropriate security measures over information assets?

 

A.

Data and systems owners

B.

Data and systems users

C.

Data and systems custodians

D.

Data and systems auditors

 

Correct Answer: A

Explanation:

Data and systems owners are accountable for maintaining appropriate security measures over information assets.

 

 

QUESTION 82

When should application controls be considered within the system-development process?

 

A.

After application unit testing

B.

After application module testing

C.

After applications systems testing

D.

As early as possible, even in the development of the project’s functional specifications

 

Correct Answer: D

Explanation:

Application controls should be considered as early as possible in the system-development process, even in the development of the project’s functional specifications.

 

 

QUESTION 83

What type of cryptosystem is characterized by data being encrypted by the sender using the recipient’s public key, and the data then being decrypted using the recipient’s private key?

 

A.

With public-key encryption, or symmetric encryption

B.

With public-key encryption, or asymmetric encryption

C.

With shared-key encryption, or symmetric encryption

D.

With shared-key encryption, or asymmetric encryption

 

Correct Answer: B

Explanation:

With public key encryption or asymmet
ric encryption, data is encrypted by the sender using the recipient’s public key; the data is then decrypted using the recipient’s private key.

 

 

QUESTION 84

Fourth-Generation Languages (4GLs) are most appropriate for designing the application’s graphical user interface (GUI). They are inappropriate for designing any intensive data- calculation procedures. True or false?

 

A.

True

B.

False

 

Correct Answer: A

Explanation:

Fourth-generation languages(4GLs) are most appropriate for designing the application’s graphical user interface (GUI). They are inappropriate for designing any intensive data-calculation procedures.

 

 

QUESTION 85

The use of statistical sampling procedures helps minimize:

 

A.

Detection risk

B.

Business risk

C.

Controls risk

D.

Compliance risk

 

Correct Answer: A

Explanation:

The use of statistical sampling procedures helps minimize detection risk.

 

 

QUESTION 86

Who is ultimately responsible for providing requirement specifications to the software- development team?

 

A.

The project sponsor

B.

The project members

C.

The project leader

D.

The project steering committee

 

Correct Answer: A

Explanation:

The project sponsor is ultimately responsible for providing requirement specifications to the software-development team.

 

 

QUESTION 87

Which of the following can help detect transmission errors by appending specially calculated bits onto the end of each segment of data?

 

A.

Redundancy check

B.

Completeness check

C.

Accuracy check

D.

Parity check

 

Correct Answer: A

Explanation:

A redundancy check can help detect transmission errors by appending especially calculated bits onto the end of each segment of datA.

 

 

QUESTION 88

What is a reliable technique for estimating the scope and cost of a software-development project?

 

A.

Function point analysis (FPA)

B.

Feature point analysis (FPA)

C.

GANTT

D.

PERT

 

Correct Answer: A

Explanation:

A function point analysis (FPA) is a reliable technique for estimating the scope and cost of a software-development project.

 

 

QUESTION 89

Proper segregation of duties does not prohibit a quality control administrator from also being responsible for change control and problem management. True or false?

 

A.

True

B.

False

 

Correct Answer: A

Explanation:

Proper segregation of duties does not prohibit a quality-control administrator from also being responsible for change control and problem management.

 

 

QUESTION 90

When participating in a systems-development project, an IS auditor should focus on system controls rather than ensuring that adequate and complete documentation exists for all projects. True or false?

 

A.

True

B.

False

 

Correct Answer: B

Explanation:

When participating in a systems-development project, an IS auditor should also strive to ensure that adequate and complete documentation exists for all projects.

 

Free VCE & PDF File for Isaca CISA Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …