ICAI ISA 3.0 Question Bank 2024: Comprehensive Guide to Success
ICAI ISA 3.0 QUESTION BANK : D I S A (Diploma in Information Systems Audit) is a post-qualification certification course offered by the Institute of Chartered Accountants of India (I C A I). This course equips Chartered Accountants with specialized knowledge and skills in Information Systems Audit. Upon completing the course and passing the final examination, participants receive the DISA certification, which is recognized by numerous organizations and employers in the industry.
In addition to D I S A, I C A I offers the ISA 3.0 (Information Systems Audit) Professional Qualification Course (PQC). This comprehensive program is designed for Chartered Accountants aiming to build a career in Information Systems Audit. The latest version of this course, ISA 3.0, includes topics such as Cybersecurity, Data Analytics, and Artificial Intelligence.
Overall, D ISA and ISA 3.0 PQC offered by I C A I are valuable certification programs for Chartered Accountants seeking to specialize in Information Systems Audit. These certifications enhance knowledge and skills in the field, boost career prospects, and demonstrate proficiency and credibility in the industry.
ICAI ISA 3.0 QUESTION BANK – STUDY MATERIAL BASED
Module-1 :
Module-2:
1 / 34
1.
Who among the following is responsible for ongoing facilitation of a SDLC project?
Question explanation: A is the correct answer. Project Sponsor is a stake holder having maximum interest /
stake in the success of project and his primary responsibility is to coordinate with various stakeholders for success of project. Option B: Project Manager is responsible for executing the project activities. Option C: Steering Committee monitors project progress but is not ongoing activity. Option D: Board of Directors provides direction.
2 / 34
2. An integrated test facility is considered a useful audit tool because it:
Question explanation: C is the correct answer. Integrated test facility compares processing output with independently calculated data. Explanation: An integrated test facility is considered a useful audit tool because it uses the same programs to compare processing using independently calculated data. This involves setting up dummy entities on an application system and processing test or production data against the entity as a means of verifying processing accuracy. Option A, B and D are not the dimensions of integrated test facility.
3 / 34
3. Which of the following ensures completeness and accuracy of accumulated data?
Question explanation: A is the correct answer. Processing controls ensure the completeness and accuracy of accumulated data, for example, editing and run-to-run totals. Option B data file control procedures ensure that only authorized processing occurs to stored data, for example, transaction logs. Option C output controls ensure that data delivered to users will be presented, formatted and delivered in a consistent and secure manner, for example, using report distribution. Option D "Application Controls" is a general term comprising all kinds of controls used in an application.
4 / 34
4. Which of the following are not Application Controls?
Question explanation: B is the correct answer. Access Security is not part of application domain. However options A, C and D are part of the Application Controls.
5 / 34
5. A customer inadvertently orders part number 1234-8 instead of 1243-8. Which of the following controls would detect this error during processing?
Question explanation: B is the correct answer. It checks the transposition of the digits. Option A is used for checking the integrity of the data. Option C is used for keeping input up to a certain limit and option D is used to check the integrity of all records.
6 / 34
6.
A company’s labour distribution report requires extensive corrections each month because of labour hours charged to inactive jobs. Which of the following data processing input controls appears to be missing?
Question explanation : B is the correct answer. It may check the validity and concurrency of the job code. Option A is used for checking the integrity of the data. Option C is used for keeping input up to a certain limit and option D is a figure calculated by the system, adding the values in one of the fields in a segment. This field is called the control totals key figure field.
7 / 34
7. Boundary value analysis belongs to?
Question explanation: B is the correct answer. Boundary Value Analysis is based on testing at the boundaries between partitions and checks the output with expected output. Option A White Box testing evaluates the code and the internal structure of a program. Option C also known as Grey Box testing is a process for debugging software applications by making an input through the front-end, and verifying the data on the back-end. Option D is not applicable.
8 / 34
8. If a company decides to migrate from Windows XP to Windows 7, which type of testing is done to ensure whether your software works on new platform?
Question explanation: B is the correct answer. Portability Testing shows the ease with which a computer software component or application can be moved from one environment to another, e.g. moving of any application from Windows XP to Windows 7. Option A Interoperability testing checks whether software can inter-operate with other software component, software or systems. Option C Usability Testing, is a non-functional testing technique that is a measure of how easily the system can be used by end users. Option D Performance Testing is the process of determining the speed, responsiveness and stability of a computer, network, software program or device under a workload.
9 / 34
9. Which technique is applied for usability testing?
Question explanation: B is the correct answer. Usability Testing is mostly done by users. They are not familiar with internal structure of the system and hence Black Box technique is correct answer. Option A White Box testing evaluates the code and the internal structure of a program. Option C Grey Box testing is a process for debugging software applications by making an input through the front-end, and verifying the data on the back-end. Option D does not exist.
10 / 34
10.
Verifying that whether software components are functioning correctly and identifying the defects in them is objective of which level of testing?
Question explanation: C is the correct answer. Separately testable components are tested in Unit Testing or Component Testing. A Unit Testing tends to test a function, individual program or even a procedure. Option B Acceptance Testing (or User Acceptance Testing) determines whether the system is ready for release. Option A Integration Testing allows individuals to find interface defects between the modules/functions. Option D System Testing is the first level in which the complete application is tested as a whole.
11 / 34
11.
Which testing is concerned with behavior of whole product as per specified requirements?
Question explanation: C is the correct answer. System Testing is based on Functional Requirement Specification (FRS), which tells about general behavior of a system. Acceptance testing (or User Acceptance Testing) determines whether the system is ready for release. Component Testing, also known as Unit, Module or Program Testing, is defined as a software testing type, in which the testing is performed on each individual component separately without integrating with other components. Integration testing allows individuals to find interface defects between the modules/functions.
12 / 34
12. What is the order in which test levels are performed?
Question explanation: D is the correct answer. Test levels can be combined or reorganized depending upon
nature of a project or system architecture. Unit testing refers to test a function, individual program or even a procedure. Integration Testing allows individuals to find interface defects between the modules/functions. System Testing is the first level in which the complete application is tested as a whole. Acceptance Testing (or User Acceptance Testing) determines whether the system is ready for release.
13 / 34
13.
A tester is executing a test to evaluate that it complies with the user requirement that a certain field be populated by using a dropdown box containing a list of values. Tester is performing __________
Question explanation: B is the correct answer. Black Box testing focuses on the inputs and outputs without
knowing their internal code implementation. Option A White Box testing evaluates the
code and the internal structure of a program. Option C Load Testing is performed to determine a system's behavior under both normal and at peak conditions. Option D Regression Testing is defined as a type of software testing to confirm that a recent program or code change has not adversely affected existing features.
14 / 34
14. A major concern associated with using sanitized old production data for testing new application is that:
Question explanation: D is the correct answer. Sanitized data generally may not cover all paths the data can
take and hence system cannot be tested for all possible cases. Option B leakage of production data is not a major concern since data is sanitized. Options A and C are not concerns.
15 / 34
15.
An organization has developed a web-based application for the use of internal users to be hosted on intranet. Before finalizing and making it live it was decided to make it available to users for providing feedback. This is an example of:
Question explanation: C is the correct answer. Beta testing is making product available to users for feedback before launching. Option A Internal Audits seek to identify any shortcomings in a company's internal controls. Option B Alpha Testing is performed by the developers to identify bugs before releasing the product to real or intended users. Option D User Training helps successful system implementation.
16 / 34
16.
Which of the following is main reason to perform User Acceptance Test (UAT)?
Question explanation : B is the correct answer. UAT is mainly conducted to confirm from the users and application owners that application meets their requirements. Option C is a formality to be completed only if requirements are met. Training and implementation planning are different activities which are not dependent on UAT.
17 / 34
17. Which of the following is not an indicator to assess benefit realization for internal application software developed in-house?
Question explanation : C is the correct answer. Since the application is for internal use and developed in house it has nothing to do with reduction in virus attacks. This can be benefit realization for anti-virus solution.
18 / 34
18.
Which of the following is an example of addressing social feasibility issue in SDLC project?
Question explanation: B is the correct answer. In order to ensure the acceptability by users, beta version of solution is made available to users. Based on feedback changes are made so that the solution can be socialized. Option A addresses technical feasibility, Option C addresses economic feasibility. Option D addresses IT policy that has nothing to do with SDLC.
19 / 34
19.
Which of the following is the primary reason for organization to outsource the SDLC project? Non-availability of:
Question explanation: A is correct answer. Non availability of skilled resources required for application development is primary reason for outsourcing the SDLC project. Other reasons can be addressed. i.e. (B) budget can be made available; (C) security processes can be established. (D) Infrastructure can be acquired, depending upon design of new application and hence it is not a reason.
20 / 34
20. A “Go or No Go” decision for SDLC project is primarily based on:
Question explanation: B is the correct answer. Business case is a document that narrates all aspect including benefit realization, cost and effort estimates, outcome of feasibility study, available budget. That helps management in decision on the need of the SDLC project. Rest are secondary aspects.
21 / 34
21.
An organization has implemented an IT based solution to support business function. Which of the following situation shall indicate the need to initiate SDLC project?
Question explanation: D is correct answer. When a competitor launches new IT based efficient service, it becomes necessary for management to consider the impact in market place and in order to remain in competition organization should provide similar or better services. Option A and C may not require SDLC since it can be adopted with change management process. B may help in deciding for D, but is not the reason for initiating SDLC project.
22 / 34
22.
IS Auditor has been part of SDLC project team. Which of the following situation does not prevent IS Auditor from performing post implementation review? The IS Auditor has:
D is the correct answer. Active role of IS Auditor in design and development of controls affects the independence. Hence, IS Auditor cannot perform review or audit of the application system. However, developing integrated test facility within the application is not a control, but a facility to be used by auditors in future. Hence, this does not impact independence of IS auditor. Options A, B and C affect independence of an IS Auditor.
23 / 34
23. In which of the following phases of SDLC, controls for security must be considered FIRST?
24 / 34
24.
An organization decided to purchase a configurable application product instead of developing in-house. Outcome of which of the following SDLC phase helped organization in this decision?
Question explanation: B is the correct answer. Make or buy decision is the outcome of feasibility study where technical, economical and social feasibilities are considered. Option A is a statement that indicates what a system needs to do in order to provide a capability. Options C and D are the phases of developing a software.
25 / 34
25.
Organizations should adopt programming/coding standards mainly because, it:
Question explanation: C is correct answer. Adopting coding standards helps organization in ensuring quality of coding and in minimizing the errors. It also helps in reducing obvious errors which may lead to vulnerabilities in application. A is not true since it is required for all languages; B is partially true but is not main reason. D is not main reason.
26 / 34
26. SDLC primarily refers to the process of:
Question explanation: A is correct answer. SDLC primarily focuses on identifying IT based solution to improve business processes delivering services to customers. Other activities may be part of SDLC however, these are IT projects not SDLC projects.
27 / 34
27.
The most successful Project Manager usually:
Question explanation : A is the correct answer. A Project Manager must have experience in working on projects in various roles including the role of a Project Manager. Options B, C and D are secondary aspect.
28 / 34
28.
The Project Manager should be able to fulfill the role of:
Question explanation: A is the correct answer. The Project Manager is responsible for collective project success. The Project Manager integrates a project as a whole. He/she unifies various aspects and processes of initiating, planning, executing, monitoring, control and closure. Options B, C and D is not the role of the Project Manager.
29 / 34
29.
A Project Manager's main responsibility in a project meant to create a product is:
Question explanation: C is the correct answer. A Project Manager is responsible to ensure high quality in a way that the final product meets the specifications and quality benchmarks. Options A, B and C are not the main responsibility of a Project Manager.
30 / 34
30. While performing mid-term review of SDLC project, the IS Auditor primarily focuses on:
Question explanation : A is the correct answer. Auditor should primarily focus on risk management that will provide inputs on events that has impact on all aspects of project. Options B, C and D help in confirming the findings from review of Risk Management process.
31 / 34
31.
Which of the following tools and techniques primarily help in improving productivity of SDLC project team members?
Question explanation: C is the correct answer. Automated tools help team in improving productivity as these tools help in managing mundane and structure activities and developers can focus on core activities. Developers’ workbench provides various functions that help in improving productivity. Option A: Use of standards help in following uniform methods and reducing rework. Option B: Software Sizing is the main input parameter to cost estimation models. Option D: HR policies may help in motivating team but it is secondary.
32 / 34
32.
Monitoring which of the following aspect of SDLC project shall help organization in benefit realization over sustained period of time?
Question explanation: A is the correct answer. Quality is most important aspect for SDLC project, since it minimizes errors that can impact operations. Options B, C and D are of prior to monitoring phase.
33 / 34
33.
Which of the following primarily helps Project Manager in mitigating the risk associated with change in scope of software development project?
Question explanation : D is the correct answer. Scope Creep of continued changes in requirements during SDLC project is most common risk. If not properly handled the project may be delayed and benefit realization from the project shall be affected. The Project Manager therefore, must freeze the scope by base-lining requirements. Any change after baselining shall follow. Option A: Change Management process without base-lining may not help. Project Manager may or may not. Option B: is used for freezing the requirements. Option D: revised effort estimate is applicable after change is approved.
34 / 34
34.
A Multi-National organization has decided to implement an ERP solution across all geographical locations. The organization shall initiate a:
Question explanation: B is the correct answer. A program is concerned with the benefits received, from implementing it, whereas project deals with specific deliverables. The scope of the program is wider in comparison to the project. The project works on a single functional unit, while the program works on various functional units. A portfolio contains both projects and programs and is managed by a portfolio manager. Option D: Feasibility study either has been completed or shall be initiated as part of program.
Your score is
The average score is 63%
Restart quiz
Module-3:
1 / 34
An integrated test facility is considered a useful audit tool because it:
Question explanation: C is the correct answer. Integrated test facility compares processing output with independently calculated data. Explanation: An integrated test facility is considered a useful audit tool because it uses the same programs to compare processing using independently calculated data. This involves setting up dummy entities on an application system and processing test or production data against the entity as a means
of verifying processing accuracy. Option A, B and D are not the dimensions of integrated test facility.
2 / 34
Which of the following ensures completeness and accuracy of accumulated data?
Question explanation: A is the correct answer. Processing controls ensure the completeness and accuracy of accumulated data, for example, editing and run-to-run totals. Option B data file control procedures ensure that only authorized processing occurs to stored data, for example, transaction logs. Option C output controls ensure that data delivered to users will be presented, formatted and delivered in a consistent and secure manner, for example, using report distribution. Option D "Application Controls" is a general term comprising all kinds of controls used in an application.
3 / 34
Which of the following are not Application Controls?
Question explanation: B is the correct answer. Access Security is not part of application domain. However options A, C and D are part of the Application Controls.
4 / 34
A customer inadvertently orders part number 1234-8 instead of 1243-8. Which of the following controls would detect this error during processing?
Question explanation: B is the correct answer. It checks the transposition of the digits. Option A is used for checking the integrity of the data. Option C is used for keeping input up to a certain limit and option D is used to check the integrity of all records.
5 / 34
A company’s labour distribution report requires extensive corrections each month because of labour hours charged to inactive jobs. Which of the following data processing input controls appears to be missing?
Question explanation: B is the correct answer. It may check the validity and concurrency of the job code. Option A is used for checking the integrity of the data. Option C is used for keeping input up to a certain limit and option D is a figure calculated by the system, adding the values in one of the fields in a segment. This field is called the control totals key figure field.
6 / 34
Boundary value analysis belongs to?
Question explanation: B is the correct answer. Boundary Value Analysis is based on testing at the boundaries between partitions and checks the output with expected output. Option A White Box testing evaluates the code and the internal structure of a program. Option C also known as Grey Box testing is a process for debugging software applications by making an input through the front-end, and verifying the data on the back-end. Option D is not applicable.
7 / 34
If a company decides to migrate from Windows XP to Windows 7, which type of testing is done to ensure whether your software works on new platform?
Question explanation: B is the correct answer. Portability Testing shows the ease with which a computer software component or application can be moved from one environment to another, e.g. moving of any application from Windows XP to Windows 7. Option A Interoperability testing checks whether software can inter-operate with other software component, software or systems. Option C Usability Testing, is a non-functional testing technique that is a measure of how easily the system can be used by end users. Option D Performance Testing is the process of determining the speed, responsiveness and stability of a computer, network, software program or device under a workload.
8 / 34
Which technique is applied for usability testing?
Question explanation: B is the correct answer. Usability Testing is mostly done by users. They are not familiar with internal structure of the system and hence Black Box technique is correct answer. Option A White Box testing evaluates the code and the internal structure of a program. Option C Grey Box testing is a process for debugging software applications by making an input through the front-end, and verifying the data on the back-end. Option D does not exist.
9 / 34
Verifying that whether software components are functioning correctly and identifying the defects in them is objective of which level of testing?
Question explanation : C is the correct answer. Separately testable components are tested in Unit Testing or Component Testing. A Unit Testing tends to test a function, individual program or even a procedure. Option B Acceptance Testing (or User Acceptance Testing) determines whether the system is ready for release. Option A Integration Testing allows individuals to find interface defects between the modules/functions. Option D System Testing is the first level in which the complete application is tested as a whole.
10 / 34
Which testing is concerned with behavior of whole product as per specified requirements?
Question explanation: C is the correct answer. System Testing is based on Functional Requirement Specification (FRS), which tells about general behavior of a system. Acceptance testing (or User Acceptance Testing) determines whether the system is ready for release. Component Testing, also known as Unit, Module or Program Testing, is defined as a software testing type, in which the testing is performed on each individual component
separately without integrating with other components. Integration testing allows individuals to find interface defects between the modules/functions.
11 / 34
What is the order in which test levels are performed?
Question explanation: D is the correct answer. Test levels can be combined or reorganized depending upon nature of a project or system architecture. Unit testing refers to test a function, individual program or even a procedure. Integration Testing allows individuals to find interface defects between the modules/functions. System Testing is the first level in which the complete application is tested as a whole. Acceptance Testing (or User Acceptance Testing) determines whether the system is ready for release.
12 / 34
A tester is executing a test to evaluate that it complies with the user requirement that a certain field be populated by using a dropdown box containing a list of values. Tester is performing __________
Question explanation: B is the correct answer. Black Box testing focuses on the inputs and outputs without
knowing their internal code implementation. Option A White Box testing evaluates the code and the internal structure of a program. Option C Load Testing is performed to determine a system's behaviour under both normal and at peak conditions. Option D Regression Testing is defined as a type of software testing to confirm that a recent program or code change has not adversely affected existing features.
13 / 34
A major concern associated with using sanitized old production data for testing new application is that:
Question explanation: D is the correct answer. Sanitized data generally may not cover all paths the data can take and hence system cannot be tested for all possible cases. Option B leakage of production data is not a major concern since data is sanitized. Options A and C are not concerns.
14 / 34
An organization has developed a web-based application for the use of internal users to be hosted on intranet. Before finalizing and making it live it was decided
to make it available to users for providing feedback. This is an example of:
Question explanation: C is the correct answer. Beta testing is making product available to users for feedback before launching. Option A Internal Audits seek to identify any shortcomings in a company's internal controls. Option B Alpha Testing is performed by the developers to identify bugs before releasing the product to real or intended users. Option D User Training helps successful system implementation.
15 / 34
Which of the following is main reason to perform User Acceptance Test (UAT)?
Question explanation: B is the correct answer. UAT is mainly conducted to confirm from the users and application owners that application meets their requirements. Option C is a formality to be completed only if requirements are met. Training and implementation planning are different activities which are not dependent on UAT.
16 / 34
Which of the following is not an indicator to assess benefit realization for internal application software developed in-house?
Question explanation: C is the correct answer. Since the application is for internal use and developed in house it has nothing to do with reduction in virus attacks. This can be benefit realization for anti-virus solution.
17 / 34
Which of the following is an example of addressing social feasibility issue in SDLC project?
Question explanation: B is the correct answer. In order to ensure the acceptability by users, beta version of solution is made available to users. Based on feedback changes are made so that the solution can be socialized. Option A addresses technical feasibility, Option C addresses economic feasibility. Option D addresses IT policy that has nothing to do with SDLC.
18 / 34
Which of the following is the primary reason for organization to outsource the SDLC project? Non-availability of:
Question explanation: A is correct answer. Non availability of skilled resources required for application development is primary reason for outsourcing the SDLC project. Other reasons can be addressed. i.e. (B) budget can be made available; (C) security processes can be established. (D) Infrastructure can be acquired, depending upon design of new application and hence it is not a reason.
19 / 34
A “Go or No Go” decision for SDLC project is primarily based on:
Question explanation: B is the correct answer. Business case is a document that narrates all aspect including benefit realization, cost and effort estimates, outcome of feasibility study, available budget. That helps management in decision on the need of the SDLC project. Rest are secondary aspects.
20 / 34
An organization has implemented an IT based solution to support business function. Which of the following situation shall indicate the need to initiate SDLC project?
Question explanation: D is correct answer. When a competitor launches new IT based efficient service, it becomes necessary for management to consider the impact in market place and in order to remain in competition organization should provide similar or better services. Option A and C may not require SDLC since it can be adopted with change management process. B may help in deciding for D, but is not the reason for initiating SDLC project.
21 / 34
IS Auditor has been part of SDLC project team. Which of the following situation does not prevent IS Auditor from performing post implementation review? The IS Auditor has:
Question explanation: D is the correct answer. Active role of IS Auditor in design and development of controls affects the independence. Hence, IS Auditor cannot perform review or audit of the application system. However, developing integrated test facility within the application is not a control, but a facility to be used by auditors in future. Hence, this does not impact independence of IS auditor. Options A, B and C affect independence of an IS Auditor.
22 / 34
In which of the following phases of SDLC, controls for security must be considered FIRST?
Question explanation: A is the correct answer. Security requirements must be considered during requirement definition. Option B is a phase in which technical, economical and social feasibilities are considered. Option C is the phase during which, the nature of controls to be implemented for security must be considered first. This will ensure that necessary security controls are built while developing application.
23 / 34
An organization decided to purchase a configurable application product instead of developing in-house. Outcome of which of the following SDLC phase helped organization in this decision?
Question explanation: B is the correct answer. Make or buy decision is the outcome of feasibility study where technical, economical and social feasibilities are considered. Option A is a statement that indicates what a system needs to do in order to provide a capability. Options C and D are the phases of developing a software.
24 / 34
Organizations should adopt programming/coding standards mainly because, it:
Question explanation: C is correct answer. Adopting coding standards helps organization in ensuring quality of coding and in minimizing the errors. It also helps in reducing obvious errors which may lead to vulnerabilities in application. A is not true since it is required for all languages; B is partially true but is not main reason. D is not main reason.
25 / 34
SDLC primarily refers to the process of:
Question explanation: A is correct answer. SDLC primarily focuses on identifying IT based solution to improve business processes delivering services to customers. Other activities may be part of SDLC however, these are IT projects not SDLC projects.
26 / 34
The most successful Project Manager usually:
Question explanation: A is the correct answer. A Project Manager must have experience in working on projects in various roles including the role of a Project Manager. Options B, C and D are secondary aspect.
27 / 34
The Project Manager should be able to fulfill the role of:
Question explanation: A is the correct answer. The Project Manager is responsible for collective project success. The Project Manager integrates a project as a whole. He/she unifies various aspects and processes of initiating, planning, executing, monitoring, control and closure. Options B, C and D is not the role of the Project Manager.
28 / 34
A Project Manager's main responsibility in a project meant to create a product is:
Question explanation: C is the correct answer. A Project Manager is responsible to ensure high quality in a way that the final product meets the specifications and quality benchmarks. Options A, B and C are not the main responsibility of a Project Manager.
29 / 34
While performing mid-term review of SDLC project, the IS Auditor primarily focuses on:
Question explanation: A is the correct answer. Auditor should primarily focus on risk management that will provide inputs on events that has impact on all aspects of project. Options B, C and D help in confirming the findings from review of Risk Management process.
30 / 34
Which of the following tools and techniques primarily help in improving productivity of SDLC project team members?
Question explanation: C is the correct answer. Automated tools help team in improving productivity as these tools help in managing mundane and structure activities and developers can focus on core activities. Developers’ workbench provides various functions that help in improving productivity. Option A: Use of standards help in following uniform methods and reducing rework. Option B: Software Sizing is the main input parameter to cost estimation models. Option D: HR policies may help in motivating team but it is secondary.
31 / 34
Monitoring which of the following aspect of SDLC project shall help organization in benefit realization over sustained period of time?
Question explanation: A is the correct answer. Quality is most important aspect for SDLC project, since it minimizes errors that can impact operations. Options B, C and D are of prior to monitoring phase.
32 / 34
A Multi-National organization has decided to implement an ERP solution across all geographical locations. The organization shall initiate a:
Question explanation: B is the correct answer. A program is concerned with the benefits received, from implementing it, whereas project deals with specific deliverables. The scope of the program is wider in comparison to the project. The project works on a single functional unit, while the program works on various functional units. A portfolio contains both projects and programs and is managed by a portfolio manager. Option D: Feasibility study either has been completed or shall be initiated as part of program.
33 / 34
Which of the following primarily helps Project Manager in mitigating the risk associated with change in scope of software development project?
Question explanation: D is the correct answer. Scope Creep of continued changes in requirements during SDLC project is most common risk. If not properly handled the project may be delayed and benefit realization from the project shall be affected. The Project Manager therefore, must freeze the scope by base-lining requirements. Any change after baselining shall follow. Option A: Change Management process without base-lining may not
help. Project Manager may or may not. Option B: is used for freezing the requirements. Option D: revised effort estimate is applicable after change is approved.
34 / 34
Who among the following is responsible for ongoing facilitation of a SDLC project?
Question explanation: A is the correct answer. Project Sponsor is a stake holder having maximum interest / stake in the success of project and his primary responsibility is to coordinate with various stakeholders for success of project. Option B: Project Manager is responsible for executing the project activities. Option C: Steering Committee monitors project progress but is not ongoing activity. Option D: Board of Directors provides direction.
Your score is
The average score is 71%
Restart quiz
Module-4:
1 / 40
Within an Incident Response Management program, the Containment phase aims to
Question explanation : The correct answer is B
When a breach is first discovered, in the containment phase, the Incident Response team after having gathered the information and gained an understanding of the incident, will begin to combat the threat by taking actions to prevent further damage, such as closing ports or blocking IPs. Hence Option B is the correct answer.
2 / 40
Phases of an incident management program
Question explanation: The correct answer is A
Incident response program can be broken down into four broad phases: (1) Preparation; (2) Detection and Analysis; (3) Containment, Eradication, and Recovery; and (4) Post- Event Activity. Hence Option A Prepare, Respond, and follow up, are in correct order. Options B, C and D are incomplete.
3 / 40
SOC shall be ineffective without the support of –
Question explanation : The correct answer is C
Without clear executive support, a SOC may be ineffective, and its value will not be realized. Creating an effective SOC requires support to establish a clear mandate for the SOC and a long-term strategy, and also a strong SOC leader to drive organizational change and develop a culture of security. The SOC leader shall take care of Risks and Quality.
4 / 40
What is the primary purpose of an incident management program?
Question explanation : The correct answer is A
Incident Response Management Program aims to manage the lifecycle of all Incidents (unplanned interruptions or reductions in quality of IT services). The primary objective of this program is to identify, assess, analyze, and correct the incidents to prevent a future re-occurrence and to make available the IT service to users as quickly as possible.
5 / 40
The main goal of Security Operation Centre (SOC) is
Question explanation : The correct answer is B
A Security Operation Centre (SOC) is a centralized function within an organization employing people, processes, and technology to continuously monitor and improve an organization's security posture while preventing, detecting, analyzing, and responding to security incidents. Reporting is not the part of SOC.
6 / 40
The computer security incident response team (CSIRT) of an organization publishes detailed descriptions of recent threats. An IS auditor's GREATEST concern should be that the users may:
Question explanation : The correct answer is A
An organization's computer security incident response team (CSIRT) should disseminate recent threats, security guidelines and security updates to the users to assist them in understanding the security risk of errors and omissions. However, this introduces the risk that the users may use this information to launch attacks, directly or
indirectly. An IS auditor should ensure that the CSIRT is actively involved with users to assist them in mitigation of risk arising from security failures and to prevent additional security incidents resulting from the same threat. Option B Forwarding the security alert is not harmful to the organization. Option C Implementing individual solutions is unlikely and inefficient, but not a serious risk. Option D Users failing to understand the threat would not be a serious concern.
7 / 40
How does a SIEM tool handle the issue of Completeness of log?
Question explanation : The correct answer is B
A privileged user with some knowledge on the internal structure of the SIEM data can easily delete logs, backdate logs, or modify existing logs. Hashing log files or log entries and storing the hash on disk for future verification ensuring integrity and completeness of the logs. For encryption, signing and time stamping you need a well-managed public key infrastructure (PKI) with secure hardware storage for keys.
8 / 40
Which one is not the part of SIEM application?
Question explanation: The correct answer is D
Normalization is a database design technique that organizes tables in a manner that reduces redundancy and dependency of data. Normalization divides larger tables into smaller tables and links them using relationships. Option D is not part of SIEM applications.
9 / 40
Which of the following is not a part of SIEM tools?
Question explanation: The correct answer is C
SIEM is defined as a complex set of technologies to provide real-time event collection, monitoring, correlating, and analyzing events across disparate sources, making it easier to monitor and troubleshoot IT infrastructure in real time. An Agent is third party tool for supporting devices. Options A, B and D are part of SIEM tools.
10 / 40
Basic operation of the SIEM tools, on the logs collected from the devices is
Question explanation: The correct answer is D
Log correlation is about constructing rules that look for sequences and patterns in log events that are not visible in the individual log sources. The basic function of an SIEM is to correlate logs online and perform analysis that would otherwise be done by repetitive human analysis.
11 / 40
An organization has recently installed a security patch, which crashed the production server. To minimize the probability of this occurring again, an IS auditor should:
Question explanation: The correct answer is B.
An IS auditor must review the change management process, including patch management procedures, and verify that the process has adequate controls and make suggestions accordingly. The other choices are part of a good change management process but are not an IS auditor's responsibility.
12 / 40
After discovering a security vulnerability in a third-party application that interfaces with several external systems, a patch is applied to a significant number of modules. Which of the following tests should an IS auditor recommend?
Question explanation: The correct answer is D
Given the extensiveness of the patch and its interfaces to external systems, system testing is most appropriate. System testing will test all the functionality and interfaces between modules. Option A Stress testing relates to capacity and availability and does not apply in these circumstances. Option B Black box testing would be performed on the individual modules, but the entire system should be tested because more than one module was changed. Option C Interface testing would test the interaction with external systems, but would not validate the performance of the changed system.
13 / 40
Which of the following is NOT a property of database transactions?
Question explanation : The correct answer is C
It is isolation not insulation. A transaction in a database should be designed in such a way that, it satisfies ACID property. A is Atomicity, C is Consistency, I is Isolation and D is Durability. This means that, when a programmer or DA defines a transaction (such as Insert or Update), it should be defined in such a way that it will satisfy the ACID test i.e. the transaction will be atomic (not divisible further), when completed it will keep the database in consistent state, it will be isolated while it is executing and it will be written on a persistent (permanent) storage such as secondary storage.
14 / 40
Database normalization is
Question explanation: The correct answer is A
Normalization is a database design technique that organizes tables in a manner that reduces redundancy and dependency of data. Normalization divides larger tables into smaller tables and links them using relationships. The purpose of Normalization is to eliminate redundant (useless) data and ensure data is stored logically. The main idea with this is that a table should be about a specific topic and only supporting topics included. By limiting a table to one purpose you reduce the number of duplicate data contained within your database. This eliminates some issues stemming from database modifications.
15 / 40
Which of the following will ensure that a column in one table will have a valid value or shall be “null” in another table’s column?
Question explanation: The correct answer is D
Foreign key. Primary key does not represent relation, it is the same key in another table and represents relation with table where it is the primary key.
16 / 40
In a relational DBMS a record refers to which of the following
Question explanation: The correct answer is A
Tuple. Record is called tuple. Choice B, C and D does not represent a record. Choice B is many rows and not a single row.
17 / 40
When evaluating the effectiveness and adequacy of a preventive computer maintenance program, which of the following would be considered to be MOST helpful to an IS Auditor?
Question explanation: The correct answer is A
A system downtime log provides information regarding the effectiveness and adequacy of computer preventive maintenance programs. The log is a detective control, but because it is validating the effectiveness of the maintenance program, it is validating a preventive control. Option B Vendor’s reliability figures are not an effective measure of a preventive maintenance program. Option C Reviewing the log is a good detective
control to ensure that maintenance is being done; however, only the system downtime will indicate whether the preventive maintenance is actually working well. Option D A schedule is a good control to ensure that maintenance is scheduled and that no items are missed in the maintenance schedule; however, it is not a guarantee that the work is actually being done.
18 / 40
Which of the following should be reviewed to provide assurance of the database referential integrity
Question explanation: The correct answer is D
Referential integrity in a relational database refers to consistency between linked tables. Referential integrity is usually enforced by the combination of a primary key and a foreign key. For referential integrity to hold, any field in a table that is declared a foreign key should contain only values from a parent table’s primary key. Option A Field definitions describe the layout of the table, but are not directly related to referential integrity. Option B Master table definition describes the structure of the database, but is not directly related to referential integrity. Option C Composite keys describe how the keys are created, but are not directly related to referential integrity.
19 / 40
Which of the following test would be carried out when, individual software modules are combined together as a group?
Question explanation: The correct answer is A
Integration testing is a level of software testing where individual units are combined and tested as a group. The purpose of this level of testing is to expose faults in the interaction between integrated units. Option B is module testing, while C is complete system testing and Option D is testing of internal logic as well.
20 / 40
The main focus of acceptance testing is
Question explanation: The correct answer is C
Acceptance testing is a testing technique performed to determine whether or not the software system has met the requirement specifications. The main purpose of this test is to evaluate the system's compliance with the business requirements and verify if it is has met the required criteria for delivery to end users. Choices A, B and D are not the focus of acceptance testing.
21 / 40
A transaction in a database management system should be atomic in nature. An Atomic Transaction is:
Question explanation: The correct answer is B
Atomicity is either a complete transaction or a failed transaction. It does not permit transient stage or partially complete transactions. Choice A, C and D are not correct.
22 / 40
Who of the following would approve or reject major changes in configuration?
Question explanation: The correct answer is B
Projects receive multiple change requests and these must be evaluated by the change control board. A change control board is a group of individuals responsible for reviewing and analyzing change requests and recommending or making decisions on requested changes to the baselined work. Poor change control can significantly impact the project in terms of scope, cost, time, risk, and benefits. Choice A, C and D do not have
authority to approve or reject major changes.
23 / 40
During development of a software system, which of the following will be used to maintain software integrity?
Question explanation: The correct answer is B
Version Control. Choice A and cCare steps before version control
24 / 40
Self-service assistance to users provided by help-desk such as resetting passwords etc. is considered which level of assistance?
Question explanation: The correct answer is B
Level 0, because it is self-service. Choice A, C and D are those, where help desk operator would help the user.
25 / 40
Which of the following is the top priority that, companies planning to implement an asset management system should examine?
Question explanation: The correct answer is C
Asset Management is a process used to keep track of the equipment and inventory vital to day-to-day operation of the business. Asset management requirements should be aligned with the business objectives. Choice A and B may assist in selection of an appropriate system based on the needs of the organization but are not top priority requirements.
26 / 40
Software Configuration management is the discipline for systematically controlling
Question explanation: The correct answer is D
Software Configuration Management is defined as a process to systematically manage, organize, and control the changes in the software programs, documents, codes, and other entities during the Software Development Life Cycle. Any change in the software configuration Items will affect the final product. Therefore, changes to configuration items need to be controlled and managed. Hence all the options are important.
27 / 40
Why does privilege creep pose a security risk?
Question explanation: The correct answer is C
Auditors certainly will question if they find that users have greater privileges than they need to perform their jobs, but the real risk is that a disgruntled user could abuse their elevated privileges, so C is the right answer and not A, B and D.
28 / 40
The security principle of least privilege is:
Question explanation: The correct answer is A
The principle of least privilege is the practice of limiting access rights for users to the bare minimum permissions they need to perform their work. The users are granted permission to read, write or execute only the files or resources they need to do their jobs, or restricting access rights for applications, systems, processes and devices to only those permissions required to perform authorized activities. Enforcing least privilege plays a key role in limiting (containing) the damage that malicious users may cause. Choice B, C and D do not indicate the principle of least privilege.
29 / 40
When implementing a log management program, it's BEST to start with:
Question explanation: The correct answer is D
Without understanding what logging capabilities, the organization has (or doesn't have) and what information is needed from those logs, it's impossible to implement an effective log management program. Choice A, B and C may help in selection of the vendor but are not the starting points.
30 / 40
Why should organizations want to manage logs?
Question explanation: The correct answer is D
Log management systems provide insight into a variety of incidents / issues with systems and devices, as well as being a compliance requirement under many regulations. For all of the above reasons, log management is a necessity for enterprise security.
31 / 40
Which department is MOST LIKELY to store Personally identifiable information (PII) data?
Question explanation: The correct answer is D.
Personally, identifiable information (PII) is any information about an individual that can be used to distinguish or trace an individual's identity, such as name, PAN, Aadhaar Number, date and place of birth, mother's maiden name, or biometric records. The HRM System stores PII of all employee data. Choices A, B, C do not store or process employee personal information, they have operations or transaction data.
32 / 40
The decision-making environment of an operational level manager can be characterized as:
Question explanation : The correct answer is A.
Operational level manager is the lowest level of manager and engaged in day-to-day activities, which require detailed information. Hence the decision-making environment is required to be structured. For administrative and top management, the decision-making environment is semi structured and unstructured respectively.
33 / 40
Accountability for the maintenance of appropriate security measures over information assets resides with:
Question explanation: The correct answer is C
Management should ensure that all information assets (data and systems) have an appointed owner who makes decisions about classification and access rights. System owners typically delegate day-to-day custodianship to the systems delivery / operations group and security responsibilities to a security administrator. Owners, however, remain accountable for the maintenance of appropriate security measures.
34 / 40
Which one of the following combinations of roles should be of GREATEST concern for the IS auditor?
Question explanation: The correct answer is B
When individuals serve multiple roles, this represents a separation of duties problem and is associated with risk. Security administrators should not be system programmers, due to the associated rights of both functions. A person with both security and programming rights could do almost anything on a system. The other combinations of roles are valid from a separation of duties perspective. Ideally, network administrators should not be responsible for quality assurance because they could approve their own work. However, that is not as serious as the combination of security and programming, which would allow nearly unlimited abuse of privilege. In some distributed environments, especially with small staffing levels, users may also manage security. While a database administrator is a very privileged position and it would not be in conflict with the role of a systems analyst.
35 / 40
The GREATEST challenge in outsourcing data processing is
Question explanation : The correct answer is A
The main challenge while choosing outsourcing data processing is data confidentiality. Companies feel comfortable in sharing data, only with employees whom they trust or who are bounded by the contractual commitments to keep the data undisclosed. Majority of the outsourcing firms sign a strict non disclosure agreement with the companies which assures that the data would be kept confidential and any breach on
the agreement would be punishable under the law. Choices B and D are advantages of outsourcing. Data integrity is the overall completeness, accuracy and consistency of data. Data integrity although very important but does not pose a greater challenge than data confidentiality.
36 / 40
Who owns the data in a department?
Question explanation: The correct answer is D.
The data owner has the ability to create, edit, modify, share and restrict access to the data. Data ownership also defines the data owner’s ability to assign, share or surrender all of these privileges to a third party. The IT Department acts as the Data Custodian, responsible for the safe custody, transport, storage of the data and implementation of business rules. System Owner is a person or department having responsibility for the
development, procurement, integration, modification, operation and maintenance, and/or final disposition of an information system. Process Owner is a person, who is accountable for the performance of the process and manages the process on a daily basis.
37 / 40
For an unexpected and sudden changes in technology, organisations need to be
Question explanation: The correct answer is B.
Agility is the organization's ability to quickly or proactively react to technological changes. Choices A, C, and D are based on the need of the organization and not necessarily due to change in technology or the environment in which the organization operates.
38 / 40
Which of the following training an employee can acquire while working on his/her desk in the office?
Question explanation: The correct answer is A.
E-learning is a learning environment which uses information and communication technologies (ICT's) as a platform for teaching and learning activities. Rest of the trainings require in person attendance and cannot be done from the office desk.
39 / 40
Which of the following is not an HRM function?
Question explanation: The correct answer is C
Approval of the Policy is responsibility of the Governing Board of the organization. All other options are the functions of the HRM.
40 / 40
Which of the following is a common feature for all the policies?
Question explanation: The correct answer is C
An Acceptable use policy is a set of rules applied by the owner, creator or administrator of a network, website, or service, that restrict the ways in which the network, website or system may be used and sets guidelines as to how it should be used. It must be abided by all employees of the organization. Choices A, B, and D are not common to all policies.
Your score is
The average score is 69%
Restart quiz
Module-5:
1 / 50
Which of the following is a type of malware that does not use system resources for execution of malicious codes?
Question explanation : D is correct answer. Worms are self-executable. Rest of the options use system resources for execution of malicious codes.
2 / 50
Social engineering attacks can best be prevented by:
Question explanation : D is correct answer. Social engineering attack is attack on human and hence no technology can prevent it. Awareness training best prevents it.
3 / 50
Most web based application attacks can be prevented by:
Question explanation : A is correct answer. Most web application attacks like SQL injection can be prevented by validating input, which can reject the attackers input that can exploit vulnerability. Encryption may or may not prevent an attack. Penetration test shall provide input on vulnerability that must be closed. Access controls may prevent some attacks.
4 / 50
Which of the following is most important while performing penetration testing?
Question explanation : B is correct answer. It is most essential to get consent from affected asset owners before performing test, so that they can ensure that operations are not affected. Maintaining secrecy shall depend upon type of test. Report must be kept confidential and accessed only by select few. Test generally is performed when it will have least impact, but is not most important.
5 / 50
The intrusion detection monitoring on a host for data integrity attack by malicious software is a:
Question explanation : C is correct answer. Intrusion detection detects the possible intrusion attempt. It does not prevent or corrects it. It is a control implemented using technology.
6 / 50
Primary function of Security operations center (SOC) is to:
Question explanation : C is correct answer. Primary function of SOC is to collect and monitor logs based on identified rules. It also defines correlation between various logs and identifies possible incidents, which are communicated to respective asset owners. A is role of security manager; B and D are roles of network team.
7 / 50
Cryptographic checksum is a network control that:
Question explanation : B is correct answer. Checksum is a type of hash that is used to check integrity of data after communication. It is different that parity bit that adds an extra bit for each byte and word.
8 / 50
While auditing organization’s network which of the following control IS auditor must verify first?
Question explanation : B is correct answer. Network segmentation or zoning is first control to implement network security. Other controls depend upon segmentation.
9 / 50
Message digest helps organization in getting assurance on:
Question explanation : C is correct answer. Message digest is a hash function that helps in confirming integrity
of data communicated over network.
10 / 50
Which of the following is a method used to gather information about the communication network?
Question explanation : A is correct answer. Other methods are active attacks on network after getting information about networks.
11 / 50
Which of the following is a primary objective of implementing logical access controls?
Question explanation : C is correct answer. Primary objective of implementing access controls is to restrict access to authorized people. Fixing accountability of actions is the primary objective of audit trail. Others are means to implement access controls not objectives.
12 / 50
Which of the following attack to break the user password is difficult to control?
Question explanation : D is correct answer. In Social engineering attacks, the weakest link is unsuspecting human user. Attacker uses techniques to compel users to reveal passwords and other confidential information. For example, in Phishing. Other options are technology-based attacks and can be detected or controlled.
13 / 50
One-time password is considered strong because they are:
Question explanation : A is correct answer. Strength of one-time password is that it is active for short time, if user does not login during that time the one-time password expires. One-time password is unique for each session and user; however, it is not a strength. It can be communicated by suitable means.
14 / 50
While auditing compliance with password policy, IS auditor observed that configuration of password parameters in system is as per information security policy. Which of the following the auditor should verify?
Question explanation : C is correct answer. Review of log for password configuration may disclose the compliance of policy because policy is configured in the system through password configuration. This may also detect unwarranted changes made by a malicious user (who obtains administrative access) in the password configuration. However, option A and D may provide assurance for compliance of password policy configurations in the system, not the policy itself. Option D is not relevant.
15 / 50
Which of following processes in user access management is most essential to detect errors and omissions resulting in unauthorized or excess accesses to users?
Question explanation : D is correct answer. Periodic user access review helps in ensuring that all users have appropriate level of accesses. This happens due to changes in internal environment like role, emergency, resignation and retiring of employees. In such situations sometimes revocation of accesses is missed out, which can be corrected during review.
16 / 50
Which of the following non-compliance with information security policy is most difficult to detect or get evidence for?
Question explanation : B is correct answer. Password sharing by user is most difficult to get evidence for or detect. Others can be monitored or enforced using technology.
17 / 50
Which of the following is a major concern associated with Single-Sign-on?
Question explanation : C is correct answer. Single point of failure is a major concern. One password if compromised, all accesses for that user are available to perpetrator.
18 / 50
Mandatory access controls are those controls that are:
Question explanation : B is correct answer. Mandatory accesses are those controls that are to be applied uniformly across organization and are defined by information security policy. D is discretionary access controls. B and C generally do not specify such requirements.
19 / 50
Which of the following is primary requirement of granting user access to information asset?
Question explanation : A is correct answer. Identification of user is first and primary requirement of granting access. Next will be authentication method to be established and finally finding authorization levels based on role that also addresses need to know.
20 / 50
Which of the following pair of authentications can be considered as two factors?
Question explanation : D is correct answer. The three factors are what a user knows (PIN, Password, and Passphrase), what user possesses (Access card, Token) and what unique characteristics of user (Biometric). Use of any two factors for authentication is called two factors. Option A, B and C use only one factor.
21 / 50
Which of the following is main reason for not allowing mobile devices into data center?
Question explanation : A is the correct answer. Mobile devices can be connected to servers, resulting in unauthorized changes. Other concerns are secondary.
22 / 50
While selecting site for a data center which of the site is best to be selected?
Question explanation: D is the correct answer. Top floor and basement have risk of seepage and flooding. Ground floor has risk of easy attack.
23 / 50
Automated access controls open doors based on access cards, pins, and/or biometric devices and are powered by electricity. Which of the following is the best policy in case of power failure?
Question explanation: B is the correct answer. Best policy is to keep door open and appoint guard temporarily for monitoring accesses. Keeping doors locked shall be a problem in evacuation in case of emergency. Finding root cause can be done independently. Arranging Battery backup after power failure is not right policy.
24 / 50
What are the problems that may be caused by humidity in an area with electrical devices?
Question explanation: C is the correct answer. High humidity can cause corrosion, and low humidity can cause excessive static electricity. Static electricity can short out devices or cause loss of information.
25 / 50
Which of the following evidence is best to provide assurance on automated environmental controls?
Question explanation: D is the correct answer. Automated environmental controls must be tested periodically by expert and provide report on effective performance of equipment. Simulated tests may not be possible for all controls. AMC is a contract; periodic testing is performance of contract.
26 / 50
Which of the following is a major concern associated with biometric physical access control?
Question explanation: B is the correct answer. False positive is a concern in biometric access security as it results in unauthorized access. Other option does not result in unauthorized access.
27 / 50
Which of the following is the main reason for appointing human guards at main entrance of facilities?
Question explanation: A is the correct answer. Human guard makes decisions and can address visitor’s requirement and direct them appropriately. Others are supplementary functions.
28 / 50
Primary purpose of access controlled dead man door, turnstile, mantrap is to:
Question explanation: A is the correct answer. Primary purpose of all types of physical access control is to prevent unauthorized entry. Other objectives are secondary.
29 / 50
Which of the following are most important controls for unmanned data center?
Question explanation: A is the correct answer. Unmanned data center requires strong physical access controls and environmental access controls too. However most essential are strong access controls. B, C and D are inappropriate controls. Halon is environmentally hazardous gas.
30 / 50
Which of the following is first action when a fire detection system raises the alarm?
Question explanation: C is the correct answer. Life safety takes precedence. Although other answers are important steps human life always is a priority.
31 / 50
Which of the following best helps in classifying the information within organizations?
Question explanation: B is the correct answer. Training users on how to classify information as per definition provided in classification schema shall best help users in classifying the information. A. Number of classes shall depend upon organization’s objectives. C and D are performed after classification of information.
32 / 50
Classification of information is primarily based on:
Question explanation: C is the correct answer. It helps in assessing the risks associated and determine the protection level i.e. class of information. A, B and C are determined based on classification.
33 / 50
Which of the following is Primary purpose of Information classification?
Question explanation: C is the correct answer. Primary purpose of information classification is to provide appropriate level of protection to information assets. Options A, B and D are the secondary with respect to information classification.
34 / 50
Which of the following is a concern for compliance with information security policy?
Question explanation: B is the correct answer. Policy exceptions are temporary and must be reviewed and closed as per defined plan. Increased number of exceptions indicates that the policy provisions may not be appropriate and hence need to be reviewed. Other options are not concerning.
35 / 50
Which of the following is best evidence indicting support and commitment of senior management for information security initiatives?
Question explanation: D is the correct answer. Without senior management’s support, information security cannot have a success. Senior management is involved many activities in effective information security initiative. Reviewing progress of information security in monthly meeting is one of them. Other options may or may not indicate unless there is more evidence to conclude.
36 / 50
Which of the following is primary reason for periodic review of security policy?
Question explanation: C is the correct answer. Changes in environment introduce new risks. In order to address them it is necessary to review the information security policy based on assessment of new risks. Other options are secondary reasons.
37 / 50
Protecting integrity of data primarily focuses on
Question explanation: C is the correct answer. Integrity primarily refers to reliability that is achieved by implementing controls to ensure accuracy and completeness of data.
38 / 50
Information security policies are set of various policies addressing different information systems areas based on the IT infrastructure of organization. Which of the following policy is most common in all organizations?
Question explanation: C is the correct answer. Acceptable use policy that address the use of information assets by users is most common in all organizations that depends upon IT. Policies in other option depend upon organization’s use of BYOD or Encryption or Biometric.
39 / 50
Which of the following is primary function of information security policies?
Question explanation: B is the correct answer. Policies are vehicle to communicate management’s intent to all stakeholders. Information security practices are aligned with business objectives and not with the strategy. Information security policies are defined as outcome of risk assessment. Compliance with standard is not primary function of policies.
40 / 50
The Primary objective of implementing Information security management is to:
Question explanation: A is the correct answer. The primary objective of information security management is to provide adequate level of protection to information security assets.
41 / 50
Which of the following shall best help in aligning IT risk with enterprise risk?
Question explanation: A is the correct answer. Expressing IT risk in business terms i.e. as impact on business will help business in understating relevance of IT risks. Business impact analysis may be useful however, it may or may not help depending upon scope of project. Making chief risk officer accountable may help but best is A. Aligning IT strategy with business strategy shall help in defining better IT plan, but it is at higher level.
42 / 50
The quantum of risk after enterprise has implemented controls based on risk mitigation plan is:
Question explanation: B is the correct answer. Accepted risk is where controls are not implemented is part of residual risk; Inherent risk is total risk before implementing controls. Current risk is residual risk at a point in time during control implementation.
43 / 50
While auditing risk monitoring process which of the following IS auditor should review FIRST?
Question explanation: D is the correct answer. Risk monitoring refers to review of identified and assed risks based on changes, incidents, and periodically. Other options are part of risk management framework.
44 / 50
Which of the following is a risk factor that may have impact on organization?
Question explanation: C is the correct answer. Vendor decides to stop supporting existing software changes the market situation that will affect organization, since it has to take decision on replacing application. Release of new application though changes market; it may not affect the organization immediately as the organization may not need to take action. Options A and D are internal decisions and will be done after risk assessment and hence these are not risk factors.
45 / 50
Of the following, who is accountable for deciding and implementing controls based on risk mitigation plan?
Question explanation: B is the correct answer. Risk owner is primarily accountable for deciding and implementing on nature of controls. Generally, risk owner is process owner. Chief risk office guides risk owner, IT head is responsible for responding to risk owned by IT head. Although board of directors is ultimately accountable, for specific risk, risk owners are responsible.
46 / 50
Main use of maintaining and updating risk register is to:
Question explanation: C is the correct answer. Main use of risk register is to develop risk profile of the organization for management’s review and enable risk informed decisions.
47 / 50
Organizations capacity to sustain loss due to uncertainty and expressed in monetary terms is best known as:
Question explanation: A is the correct answer. It is the definition of risk appetite. Risk tolerance is capacity to tolerate down time due to risk materialization. Risk acceptance and risk mitigation are risk response decision based on risk appetite.
48 / 50
After a Tsunami, a business decides to shift the location of data centre from coastal area to mid land. Which type of risk response option it has exercised?
Question explanation: B is the correct answer. BY shifting location, the business has avoided the risk associated with Tsunami.
49 / 50
Which of the following is a risk response option?
Question explanation: C is the correct answer. Of the four main risk response options accept, avoid, mitigate and transfer, Insurance cover is a risk response option of risk transfer.
50 / 50
Which of the following shall BEST help in deciding upon the protection level for information asset?
Question explanation: B is the correct answer. Other options i.e. location of asset, existing vulnerabilities in asset shall be covered during risk assessments. Inventory of threats only will not help; impact due to threat must be assessed.
Your score is
The average score is 66%
Restart quiz
Module-6:
1 / 12
Which of the following is not an example for AI Platform?
Question explanation : Option d – Microsoft Power BI
Microsoft Power BI is a predominantly a Data Analytics Platform. Watson, Tensor Flow and AWS AI are AI Platforms.
2 / 12
Which of the following is not a stream of AI?
Question explanation : Option b – Big Data
Big Data refers to huge and voluminous data characterised by volume, variety and velocity. Machine Leaning, Speech recognition and NLP are streams in AI.
3 / 12
Which of the following is not a cloud deployment model?
Question explanation : Option c – IaaS
Private, Public and Hybrid are cloud deployment models. IaaS is a Cloud Service Model as per NIST categorisation.
4 / 12
Which of the following tools best describe Predictive Analytics?
Question explanation : Option a – Simulation
Predictive Analytics analyses the past behaviour and makes predictions about the future to identify the new trends. Simulation is one such technique used in predictive analytics. Graphical reports and statistical analysis are more commonly associated with historical / descriptive analytics. Machine Leaning is used in Cognitive analytics.
5 / 12
Which of the following is a central storage for all kinds of structured, semi structured or unstructured raw data collected from multiple sources even outside of company’s operational systems ?
Question explanation : Option b – Data Lake
Data Lake is a central storage for all kinds of structured, semi structured or unstructured raw data collected from multiple sources even outside of company’s operational systems.
6 / 12
The method by which companies analyze customer data or other types of information in an effort to identify patterns and discover relationships between different data elements is often referred to as:
Question explanation : Option b – Data Mining
Data mining refers to a method where companies analyze customer data or other types of information in an effort to identify patterns and discover relationships between different data elements.
7 / 12
Which one is simplest form of analytics?
Question explanation : Option b – Descriptive Analytics
Descriptive analytics is a preliminary stage of data processing that creates a summary of historical data to yield useful information and possibly prepare the data for further analysis.
8 / 12
Which of the following is a system of inter-connected and inter-related computing devices which have ability to transfer the data over network:
Question explanation : Option b - Internet of things
The internet of things, or IoT, is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers (UIDs) and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction.
9 / 12
Which of the following statements about RPA is false?
Question explanation : Option a - It is walking talking robot
RPA is not a walking talking robot. It is instead a computer coded software, that replace human repetitive tasks which can perform in cross functional platforms.
10 / 12
Which of the following is not a step involved in RPA?
Question explanation : Option d – Data Cleaning
Data Cleaning is not an activity within RPA. Preparation of project, Development of business cases and Implementation of RPA are steps within the RPA project.
12 / 12
What does P2P technology stand for?
Question explanation : Option b – Peer to Peer
P2P stands for Peer to Peer Technology where every participant acts as an individual peer in the network.
Your score is
The average score is 70%
Restart quiz
ICAI DISA 3.0 PRACTICE OTHER QUESTIONS
Like this: Like Loading...