How To Prepare For and Pass The CISA Examination PDF
How To Prepare For and Pass The CISA Examination PDF
14 March 2017
• Audio is streamed over your computer Use the Papers tab to find the following:
• Dial in numbers and codes are on the left • PDF Copy of today’s presentation
Ken Schmidt
R& M Consulting
Subject matter will help you find and do your job better
NO!
150 multiple choice questions, four hour time limit, across 5 domains
The next opportunity to sit for the exam is the May-June 2017
exam window. Registration for this window is currently open
at www.isaca.org/examreg
http://www.isaca.org/certification/pages/candidates-guide-
for-exams.aspx
10
11
YES!!
12
No IT audit or IT experience:
14
15
Offered by:
16
Offered by:
17
18
19
20
21
22
23
24
A. Contingency planning
C. Project management
25
A. Create an IT risk management department and establish an IT risk framework with the aid
of external risk management experts.
B. Use common industry standard aids to divide the existing risk documentation into
several individual types of risk which will be easier to handle.
D. Establish regular IT risk management meetings to identify and assess risk, and create a
mitigation plan as input to the organization’s risk management.
27
A. A medium-sized organization would normally not have a separate IT risk management department.
Moreover, the risk is usually manageable enough so that external help would not be needed.
B. While common risk may be covered by industry standards, they cannot address the specific situation
of an organization. Individual types of risk will not be discovered without a detailed assessment from
within the organization. Splitting the one risk position into several is not sufficient to manage IT risk.
C. The auditor should recommend a formal IT risk management effort because the failure to
demonstrate responsible IT risk management may be a liability for the organization.
D. Establishing regular IT risk management meetings is the best way to identify and assess IT-related
risk in a medium-sized organization, to address responsibilities to the respective management and to
keep the risk register and mitigation plans up to date.
28
29
A. The most important control to test in this configuration is the server configuration hardening. It is
important to patch known vulnerabilities and to disable all non-required functions before production,
especially when production architecture is different from development and testing architecture.
B. The greatest risk is associated with the difference between the testing and production environments.
Ensuring that physical resources are available is a relatively low risk and easily addressed.
C. Virtual machines (VMs) are often used for optimizing programming and testing infrastructure. In this
scenario, the development environment (VM architecture) is different from the production infrastructure
(physical three-tier). Because the VMs are not related to the web application in production, there is no
real requirement for the system administrators to be familiar with a virtual environment.
D. Because the VMs are only used in a development environment and not in production, it may not be
necessary to include VMs in the disaster recovery plan (DRP).
30
A. concurrent access.
B. Deadlocks
31
C. Access to data is controlled by defining user rights to information and is not affected by
denormalization.
D. Normalization is the removal of redundant data elements from the database structure.
Disabling normalization in relational databases will create redundancy and a risk of not
maintaining consistency of data, with the consequent loss of data integrity.
32
A. Three users with the ability to capture and verify their own messages
B. Five users with the ability to capture and send their own messages
C. Five users with the ability to verify other users and to send their own messages
D. Three users with the ability to capture and verify the messages of other users and to
send their own messages
33
A. The ability of one individual to capture and verify their own messages represents an
inadequate segregation because messages can be taken as correct and as if they had
already been verified. The verification of messages should not be allowed by the person
who sent the message.
B. Users may have the ability to send messages but should not be able to verify their own
messages.
C. This is an example of separation of duties. A person can send their own message but
only verify the messages of other users.
D. The ability to capture and verify the messages of others but only send their own
messages is acceptable.
34
35
36
37
Copyright © 2017 by the Information Systems Audit and Control Association, Inc. (ISACA). All rights reserved. This
webinar may not be used, copied, reproduced, modified, distributed, displayed, stored in a retrieval system, or
transmitted in any form by any means (electronic, mechanical, photocopying, recording or otherwise).
38