Certified Information Systems Auditor (CISA) - Mock Exam 5
Certified Information Systems Auditor (CISA) - Mock Exam 5
Certified Information Systems Auditor (CISA) - Mock Exam 5
18. Ensuring that security and control policies support business and IT
objectives is a primary objective of _______________
a. An IT security policies audit
b. A processing audit
c. A software audit
d. A vulnerability assessment
27. What type of fire-suppression system suppresses fire via water released
from the main valve to be delivered via a system of dry pipes installed
throughout the facilities?
a. A dry-pipe sprinkler system
b. A deluge sprinkler system
c. A wet-pipe system
d. A halon sprinkler system
28. Is the following statement true or false?
Digital signatures require the sender to "sign" the data by encrypting the
data with the sender's public key, then decrypted by the recipient using
the recipient's private key.
a. True
b. False
34. Which of the following uses a prototype that can be updated continually
to meet changing user or business requirements?
a. PERT
b. Rapid application development (RAD)
c. Function point analysis (FPA)
d. GANTT
35. Who is responsible for the overall direction, costs, and timetables for
systems-development projects?
a. The project sponsors
b. The project steering committee
c. Senior management
d. The project team leader
36. Input/output controls should be implemented for which applications in
an integrated systems environment?
a. The receiving application
b. The sending application
c. Both the sending and receiving of applications
d. Output on the sending application and input on the receiving
application