CISA Quiz - Week1

CISA Quiz - Week1

Professional Development

10 Qs

quiz-placeholder

Similar activities

Chapter 1

Chapter 1

Professional Development

15 Qs

Internal Quality Auditor (IQA) PAMA ARIA 2025

Internal Quality Auditor (IQA) PAMA ARIA 2025

Professional Development

15 Qs

Chapter 13

Chapter 13

Professional Development

15 Qs

Internal Audit Feb 2020

Internal Audit Feb 2020

Professional Development

12 Qs

REview KESA

REview KESA

Professional Development

15 Qs

M4Q3

M4Q3

Professional Development

10 Qs

Audit Planning

Audit Planning

Professional Development

15 Qs

Part 1 SU 1.4

Part 1 SU 1.4

Professional Development

10 Qs

CISA Quiz - Week1

CISA Quiz - Week1

Assessment

Quiz

Professional Development

Professional Development

Medium

Used 76+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following programs would a sound information security policy MOST likely include to handle suspected intrusions?

Response

Correction

Detection

Monitoring

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The development of an IS security policy is ultimately the responsibility of the:

IS department.

security committee.

security administrator.

board of directors.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An IS auditor finds that not all employees are aware of the enterprise's information security policy. The IS auditor should conclude that:

this lack of knowledge may lead to unintentional disclosure of sensitive information.

information security is not critical to all functions.

IS audit should provide security training to the employees.

the audit finding will cause management to provide continuous training to staff.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The rate of change in technology increases the importance of:

outsourcing the IS function.

implementing and enforcing good processes.

hiring personnel willing to make a career within the organization.

meeting user requirements.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The PRIMARY objective of an audit of IT security policies is to ensure that:

they are distributed and available to all staff.

security and control policies support business and IT objectives.

there is a published organizational chart with functional descriptions.

duties are appropriately segregated.

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is the GREATEST risk of an inadequate policy definition for ownership of data and systems?

User management coordination does not exist.

Specific user accountability cannot be established.

Unauthorized users may have access to originate, modify or delete data.

Audit recommendations may not be implemented.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The advantage of a bottom-up approach to the development of organizational policies is that the policies:

are developed for the organization as a whole.

are more likely to be derived as a result of a risk assessment.

will not conflict with overall corporate policy.

ensure consistency across the organization.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?