ICAI ISA 3.0 Question Bank 2024: Comprehensive Guide to Success

ICAI ISA 3.0 Question Bank 2024: Comprehensive Guide to Success

ICAI ISA 3.0 QUESTION BANK: D I S A (Diploma in Information Systems Audit) is a post-qualification certification course offered by the Institute of Chartered Accountants of India (I C A I). This course equips Chartered Accountants with specialized knowledge and skills in Information Systems Audit. Upon completing the course and passing the final examination, participants receive the DISA certification, which is recognized by numerous organizations and employers in the industry.

In addition to D I S A, I C A I offers the ISA 3.0 (Information Systems Audit) Professional Qualification Course (PQC). This comprehensive program is designed for Chartered Accountants aiming to build a career in Information Systems Audit. The latest version of this course, ISA 3.0, includes topics such as Cybersecurity, Data Analytics, and Artificial Intelligence.

Overall, D ISA and ISA 3.0 PQC offered by I C A I are valuable certification programs for Chartered Accountants seeking to specialize in Information Systems Audit. These certifications enhance knowledge and skills in the field, boost career prospects, and demonstrate proficiency and credibility in the industry.

ICAI ISA 3.0 QUESTION BANK – STUDY MATERIAL BASED

Module-1 :

ICAI DISA 3.0 QUESTION BANK : MODULE 1 :- STUDY MATERIAL BASED

1 / 65

1. disa3.0 QUESTIN BANK

Question: While planning an audit M/s InfoTech Solutions should have FIRST identified:

2 / 65

2.

disa3.0 QUESTIN BANK

Questions:: M/s InfoTech Solutions has decided to Skip Risk Assessment Process. What is the Primary Risk involved here?

 

3 / 65

3. Reviewing management's long-term strategic plans helps the IS auditor:

4 / 65

4. When developing a risk-based audit strategy, an IS auditor should conduct a risk assessment to ensure that:

5 / 65

5. After you enter a purchase order in an on-line system, you get the message, “The request could not be processed due to lack of funds in your budget”. This is an example of error?

6 / 65

6. Which of the following cannot be classified as Audit Risk?

7 / 65

7. What means the rate at which opinion of the IS Auditor would change if he selects a larger sample size?

8 / 65

8. The rate of change in technology increases the importance of:

9 / 65

9. Which of the following are most commonly used to mitigate risks discovered by organizations?

10 / 65

10. To conduct a system audit, the IS auditor should

11 / 65

11. Which of the following control classifications identify the cause of a problem and minimize the impact of threat?

12 / 65

12. The primary purpose and existence of an audit charter is to:

13 / 65

13.

disa3.0 QUESTIN BANK

Question: The decisions and actions of Senior Auditor of M/s InfoTech Solutions are MOST likely to affect which of the following risks?

14 / 65

14.

DISA ICAI Case-2

Question: What should an IS Auditor do FIRST, when he observed that two users are constantly trying to access some external sources?

15 / 65

15.

DISA ICAI Case-2

Question: An IS Auditor found one security loophole in the System. However, when the IT Management got to know about it, immediately corrected it. The IS Auditor should:

16 / 65

16.

DISA ICAI Case-2

Question: IS Auditor rightly found one weakness in the Firewall implementation and he recommended the name of sister concern to address the weakness. The IS Auditor has
failed to maintain:

17 / 65

17.

Which of the following forms of evidence would be considered to be the most reliable when assisting an IS Auditor develop audit conclusion?

18 / 65

18.

During a review of the controls over the process of defining IT service levels, an IS auditor would most likely interview the:

19 / 65

19.

Which of the following procedures would an IS Auditor not perform during pre-audit planning to gain an understanding of the overall environment under review?

20 / 65

20.

The purpose of compliance tests is to provide reasonable assurance that:

21 / 65

21. IS Auditors being most likely to perform tests of internal controls if, after their evaluation of such controls, they conclude that:

22 / 65

22. Which of the following is the least important factor in determining the need for an IS Auditor to be involved in a new system development project?

23 / 65

23. Each of the following is a general control concern EXCEPT:

24 / 65

24. Which of the following types of audits requires the highest degree of data processing expertise?

25 / 65

25. A manufacturing company has implemented a new client/server system enterprise resource planning (ERP) system. Local branches transmit customer orders to a
central manufacturing facility. Which of the following controls would BEST ensure that the orders are accurately entered and the corresponding products produced?

26 / 65

26.

An IS Auditor observed that users are occasionally granted the authority to change system data. The elevated system access is not consistent with company policy yet is required for smooth functioning of business operations. Which of the following controls would the IS Auditor most likely recommend for long term resolution?

27 / 65

27.

In a public sector bank while updating master data for advances given, the bank employee does not update “INSURANCE DATA”. This includes details of Insurance
Policy, Amount Insured, Expiry Date of Insurance and other related information. This defines which control lapse as per COBIT.

28 / 65

28.

As per Income Tax Act, 1961 and banking norms, all fixed deposit holders of banks need to submit their PAN or form 60/61(a form as per Income Tax Act/Rules). A bank in its account opening form, has not updated the need for form 60/61 in case PAN is not there. This defines which control lapse as per COBIT.

29 / 65

29.

Application controls shall include all except

30 / 65

30.

The most appropriate type of CAAT tool the auditor should use to test security configuration settings for the entire application systems of any organization is:

31 / 65

31.

Many automated tools are designed for testing and evaluating computer systems. Which one of the following such tools impact the systems performance with a greater load and
stress on the system? 

32 / 65

32.

An IS Auditor, concerned that application controls are not adequate to prevent duplicate payment of invoices, decided to review the data processing files for possible duplicate
payments. Which of the following techniques/tools would be useful to the IS Auditor? 

33 / 65

33.

Which is one of the most effective tools and techniques to combat fraud?

34 / 65

34.

What is one of the key tests which can be ideally carried out using Computer Assisted Audit Tools (CAATs)?

35 / 65

35.

What is one of the key tests which can be ideally carried out using Computer Assisted Audit Tools (CAATs)?

36 / 65

36.

What is one of the key tests which can be ideally carried out using Computer Assisted
Audit Tools (CAATs)?

37 / 65

37.

What can be ideally carried out using Computer Assisted Audit Tools (CAATs)?

38 / 65

38. Find out the best process carried out using Computer Assisted Audit Tools (CAATs)?

39 / 65

39.

What is one of the key tests which can be ideally carried out using Computer Assisted Audit Tools (CAATs)?

40 / 65

40.

After initial investigation, IS auditor has reasons to believe that there is possibility of fraud, the IS auditor has to:

41 / 65

41.

A holistic approach to deterrence & prevention of fraud would be:

42 / 65

42.

As a measure of IT General controls, an organization decides to separate those who can input data from those that can reconcile or approve data. Is this a good move? Why?

43 / 65

43.

Which of the following refers to imaging of original media in presence of an independent third party?

44 / 65

44. The FIRST step in managing the risk of a cyber-attack is to:

45 / 65

45.

Neural networks are effective in detecting fraud, because they can:

46 / 65

46.

Which of the following situations would increase the likelihood of fraud?

47 / 65

47.

An IS auditor discovers evidence of fraud perpetrated with a manager's user id. The manager had written the password, inside his/her desk drawer. The IS auditor should conclude that the:

48 / 65

48.

Which of the following is LEAST likely to be included in a review to assess the risk of fraud in application systems?

49 / 65

49.

Which of the following factors should not be considered in establishing the priority of audits included in an annual audit plan?

50 / 65

50. Which are the business activities which are strong contenders for conversion to ecommerce?

51 / 65

51.

In an inter school competition on Artificial Intelligence, four children develop software which performs the following different functions respectively. Which of them is a correct example of the use of basic Artificial Intelligence?

52 / 65

52. Neural Networks and Fuzzy Logics are classified under which category of Artificial intelligence?

53 / 65

53. As part of auditing Information Security of a multinational bank, an auditor wants to assess the security of information in ATM facilities. Under which privacy policy should he look for details pertaining to security guards and CCTV surveillance of ATM’s?

54 / 65

54. An employee has left the company. The first thing to do is to:

55 / 65

55. The cashier of a company has rights to create bank master in TALLY. This error is a reflection of poor definition for which type of control:

56 / 65

56. A retail company recently installed data warehousing client software in multiple, geographically diverse sites. Due to time zone differences between the sites, updates to the warehouse are not synchronized. This will affect which of the following most?

57 / 65

57. Which of the following audit tools is MOST useful to an IS auditor when an audit trail is required?

58 / 65

58. Which of the following is a characteristic of a decision support system (DSS)?

59 / 65

59. Which of the following business purposes can be met by implementing Data warehouse in an organisation?

60 / 65

60. While posting message on FACEBOOK, if user posts the same message again, FACEBOOK gives a warning. The warning indicates which control.

61 / 65

61. Company’s billing system does not allow billing to those dealers who have not paid advance amount against proforma invoice. This check is best called as:

62 / 65

62. A central antivirus system determines whether each personal computer has the latest signature files and installs the latest signature file before allowing a PC to connect to the network. This is an example of a:

63 / 65

63.

RBI instructed banks to stop cash retraction in all ATMs across India from April 1, 2013. This was result of few ATM frauds detected. This action by RBI can be best classified as:

64 / 65

64.

An IS Auditor is performing a post implementation review of an organisation’s system and identified output errors within an accounting application. The IS Auditor determined that this was caused by input errors. Which of the following controls should the IS Auditor recommend to management?

65 / 65

65.

An IS Auditor, processes a dummy transaction to check whether the system is allowing cash payments in excess of Rs.20,000/-. This check by auditor represents which of the following evidence collection technique?

Your score is

The average score is 58%

0%

ICAI ISA 3.0 Question Bank 2024

Module-2:

ICAI DISA 3.0 QUESTION BANK : MODULE 2 :- STUDY MATERIAL BASED

1 / 34

1.

Who among the following is responsible for ongoing facilitation of a SDLC project?

2 / 34

2. An integrated test facility is considered a useful audit tool because it:

3 / 34

3. Which of the following ensures completeness and accuracy of accumulated data?

4 / 34

4. Which of the following are not Application Controls?

5 / 34

5. A customer inadvertently orders part number 1234-8 instead of 1243-8. Which of the following controls would detect this error during processing?

6 / 34

6.

A company’s labour distribution report requires extensive corrections each month because of labour hours charged to inactive jobs. Which of the following data processing input controls appears to be missing?

7 / 34

7. Boundary value analysis belongs to?

8 / 34

8. If a company decides to migrate from Windows XP to Windows 7, which type of testing is done to ensure whether your software works on new platform?

9 / 34

9. Which technique is applied for usability testing?

10 / 34

10.

Verifying that whether software components are functioning correctly and identifying the defects in them is objective of which level of testing?

11 / 34

11.

Which testing is concerned with behavior of whole product as per specified requirements?

12 / 34

12. What is the order in which test levels are performed?

13 / 34

13.

A tester is executing a test to evaluate that it complies with the user requirement that a certain field be populated by using a dropdown box containing a list of values. Tester is performing __________

14 / 34

14. A major concern associated with using sanitized old production data for testing new application is that:

15 / 34

15.

An organization has developed a web-based application for the use of internal users to be hosted on intranet. Before finalizing and making it live it was decided to make it available to users for providing feedback. This is an example of:

16 / 34

16.

Which of the following is main reason to perform User Acceptance Test (UAT)?

17 / 34

17. Which of the following is not an indicator to assess benefit realization for internal application software developed in-house?

18 / 34

18.

Which of the following is an example of addressing social feasibility issue in SDLC project?

19 / 34

19.

Which of the following is the primary reason for organization to outsource the SDLC project? Non-availability of:

20 / 34

20. A “Go or No Go” decision for SDLC project is primarily based on:

21 / 34

21.

An organization has implemented an IT based solution to support business function. Which of the following situation shall indicate the need to initiate SDLC project?

22 / 34

22.

IS Auditor has been part of SDLC project team. Which of the following situation does not prevent IS Auditor from performing post implementation review? The IS Auditor has:

23 / 34

23. In which of the following phases of SDLC, controls for security must be considered FIRST?

24 / 34

24.

An organization decided to purchase a configurable application product instead of developing in-house. Outcome of which of the following SDLC phase helped organization in this decision?

25 / 34

25.

Organizations should adopt programming/coding standards mainly because, it:

26 / 34

26. SDLC primarily refers to the process of:

27 / 34

27.

The most successful Project Manager usually:

28 / 34

28.

The Project Manager should be able to fulfill the role of:

29 / 34

29.

A Project Manager's main responsibility in a project meant to create a product is:

30 / 34

30. While performing mid-term review of SDLC project, the IS Auditor primarily focuses on:

31 / 34

31.

Which of the following tools and techniques primarily help in improving productivity of SDLC project team members?

32 / 34

32.

Monitoring which of the following aspect of SDLC project shall help organization in benefit realization over sustained period of time?

33 / 34

33.

Which of the following primarily helps Project Manager in mitigating the risk associated with change in scope of software development project?

34 / 34

34.

A Multi-National organization has decided to implement an ERP solution across all geographical locations. The organization shall initiate a:

Your score is

The average score is 63%

0%

Module-3:

ICAI DISA 3.0 QUESTION BANK : MODULE 3 :- STUDY MATERIAL BASED

1 / 34

An integrated test facility is considered a useful audit tool because it:

2 / 34

Which of the following ensures completeness and accuracy of accumulated data?

3 / 34

Which of the following are not Application Controls?

4 / 34

A customer inadvertently orders part number 1234-8 instead of 1243-8. Which of the following controls would detect this error during processing?

5 / 34

A company’s labour distribution report requires extensive corrections each month because of labour hours charged to inactive jobs. Which of the following data processing input controls appears to be missing?

6 / 34

Boundary value analysis belongs to?

7 / 34

If a company decides to migrate from Windows XP to Windows 7, which type of testing is done to ensure whether your software works on new platform?

8 / 34

Which technique is applied for usability testing?

9 / 34

Verifying that whether software components are functioning correctly and identifying the defects in them is objective of which level of testing?

10 / 34

Which testing is concerned with behavior of whole product as per specified requirements?

11 / 34

What is the order in which test levels are performed?

12 / 34

A tester is executing a test to evaluate that it complies with the user requirement that a certain field be populated by using a dropdown box containing a list of values. Tester is performing __________

13 / 34

A major concern associated with using sanitized old production data for testing new application is that:

14 / 34

An organization has developed a web-based application for the use of internal users to be hosted on intranet. Before finalizing and making it live it was decided
to make it available to users for providing feedback. This is an example of:

15 / 34

Which of the following is main reason to perform User Acceptance Test (UAT)?

16 / 34

Which of the following is not an indicator to assess benefit realization for internal application software developed in-house?

17 / 34

Which of the following is an example of addressing social feasibility issue in SDLC project?

18 / 34

Which of the following is the primary reason for organization to outsource the SDLC project? Non-availability of:

19 / 34

A “Go or No Go” decision for SDLC project is primarily based on:

20 / 34

An organization has implemented an IT based solution to support business function. Which of the following situation shall indicate the need to initiate SDLC project?

21 / 34

IS Auditor has been part of SDLC project team. Which of the following situation does not prevent IS Auditor from performing post implementation review? The IS Auditor has:

22 / 34

In which of the following phases of SDLC, controls for security must be considered FIRST?

23 / 34

An organization decided to purchase a configurable application product instead of developing in-house. Outcome of which of the following SDLC phase helped organization in this decision?

24 / 34

Organizations should adopt programming/coding standards mainly because, it:

25 / 34

SDLC primarily refers to the process of:

26 / 34

The most successful Project Manager usually:

27 / 34

The Project Manager should be able to fulfill the role of:

28 / 34

A Project Manager's main responsibility in a project meant to create a product is:

29 / 34

While performing mid-term review of SDLC project, the IS Auditor primarily focuses on:

30 / 34

Which of the following tools and techniques primarily help in improving productivity of SDLC project team members?

31 / 34

Monitoring which of the following aspect of SDLC project shall help organization in benefit realization over sustained period of time?

32 / 34

A Multi-National organization has decided to implement an ERP solution across all geographical locations. The organization shall initiate a:

33 / 34

Which of the following primarily helps Project Manager in mitigating the risk associated with change in scope of software development project?

34 / 34

Who among the following is responsible for ongoing facilitation of a SDLC project?

Your score is

The average score is 71%

0%

Module-4:

ICAI DISA 3.0 QUESTION BANK : MODULE 4 :- STUDY MATERIAL BASED

1 / 40

Within an Incident Response Management program, the Containment phase aims to

2 / 40

Phases of an incident management program

3 / 40

SOC shall be ineffective without the support of –

4 / 40

What is the primary purpose of an incident management program?

5 / 40

The main goal of Security Operation Centre (SOC) is

6 / 40

The computer security incident response team (CSIRT) of an organization publishes detailed descriptions of recent threats. An IS auditor's GREATEST concern should be that the users may:

7 / 40

How does a SIEM tool handle the issue of Completeness of log?

8 / 40

Which one is not the part of SIEM application?

9 / 40

Which of the following is not a part of SIEM tools?

10 / 40

Basic operation of the SIEM tools, on the logs collected from the devices is

11 / 40

An organization has recently installed a security patch, which crashed the production server. To minimize the probability of this occurring again, an IS auditor should:

12 / 40

After discovering a security vulnerability in a third-party application that interfaces with several external systems, a patch is applied to a significant number of modules. Which of the following tests should an IS auditor recommend?

13 / 40

Which of the following is NOT a property of database transactions?

14 / 40

Database normalization is

15 / 40

Which of the following will ensure that a column in one table will have a valid value or shall be “null” in another table’s column?

16 / 40

In a relational DBMS a record refers to which of the following

17 / 40

When evaluating the effectiveness and adequacy of a preventive computer maintenance program, which of the following would be considered to be MOST helpful to an IS Auditor?

18 / 40

Which of the following should be reviewed to provide assurance of the database referential integrity

19 / 40

Which of the following test would be carried out when, individual software modules are combined together as a group?

20 / 40

The main focus of acceptance testing is

21 / 40

A transaction in a database management system should be atomic in nature. An Atomic Transaction is:

22 / 40

Who of the following would approve or reject major changes in configuration?

23 / 40

During development of a software system, which of the following will be used to maintain software integrity?

24 / 40

Self-service assistance to users provided by help-desk such as resetting passwords etc. is considered which level of assistance?

25 / 40

Which of the following is the top priority that, companies planning to implement an asset management system should examine?

26 / 40

Software Configuration management is the discipline for systematically controlling

27 / 40

Why does privilege creep pose a security risk?

28 / 40

The security principle of least privilege is:

29 / 40

When implementing a log management program, it's BEST to start with:

30 / 40

Why should organizations want to manage logs?

31 / 40

Which department is MOST LIKELY to store Personally identifiable information (PII) data?

32 / 40

The decision-making environment of an operational level manager can be characterized as:

33 / 40

Accountability for the maintenance of appropriate security measures over information assets resides with:

34 / 40

Which one of the following combinations of roles should be of GREATEST concern for the IS auditor?

35 / 40

The GREATEST challenge in outsourcing data processing is

36 / 40

Who owns the data in a department?

37 / 40

For an unexpected and sudden changes in technology, organisations need to be

38 / 40

Which of the following training an employee can acquire while working on his/her desk in the office?

39 / 40

Which of the following is not an HRM function?

40 / 40

Which of the following is a common feature for all the policies?

Your score is

The average score is 69%

0%

Module-5:

ICAI DISA 3.0 QUESTION BANK : MODULE 5 :- STUDY MATERIAL BASED

1 / 50

Which of the following is a type of malware that does not use system resources for execution of malicious codes?

2 / 50

Social engineering attacks can best be prevented by:

3 / 50

Most web based application attacks can be prevented by:

4 / 50

Which of the following is most important while performing penetration testing?

5 / 50

The intrusion detection monitoring on a host for data integrity attack by malicious software is a:

6 / 50

Primary function of Security operations center (SOC) is to:

7 / 50

Cryptographic checksum is a network control that:

8 / 50

While auditing organization’s network which of the following control IS auditor must verify first?

9 / 50

Message digest helps organization in getting assurance on:

10 / 50

Which of the following is a method used to gather information about the communication network?

11 / 50

Which of the following is a primary objective of implementing logical access controls?

12 / 50

Which of the following attack to break the user password is difficult to control?

13 / 50

One-time password is considered strong because they are:

14 / 50

While auditing compliance with password policy, IS auditor observed that configuration of password parameters in system is as per information security policy. Which of the following the auditor should verify?

15 / 50

Which of following processes in user access management is most essential to detect errors and omissions resulting in unauthorized or excess accesses to users?

16 / 50

Which of the following non-compliance with information security policy is most difficult to detect or get evidence for?

17 / 50

Which of the following is a major concern associated with Single-Sign-on?

18 / 50

Mandatory access controls are those controls that are:

19 / 50

Which of the following is primary requirement of granting user access to information asset?

20 / 50

Which of the following pair of authentications can be considered as two factors?

21 / 50

Which of the following is main reason for not allowing mobile devices into data center?

22 / 50

While selecting site for a data center which of the site is best to be selected?

23 / 50

Automated access controls open doors based on access cards, pins, and/or biometric devices and are powered by electricity. Which of the following is the best policy in case of power failure?

24 / 50

What are the problems that may be caused by humidity in an area with electrical devices?

25 / 50

Which of the following evidence is best to provide assurance on automated environmental controls?

26 / 50

Which of the following is a major concern associated with biometric physical access control?

27 / 50

Which of the following is the main reason for appointing human guards at main entrance of facilities?

28 / 50

Primary purpose of access controlled dead man door, turnstile, mantrap is to:

29 / 50

Which of the following are most important controls for unmanned data center?

30 / 50

Which of the following is first action when a fire detection system raises the alarm?

31 / 50

Which of the following best helps in classifying the information within organizations?

32 / 50

Classification of information is primarily based on:

33 / 50

Which of the following is Primary purpose of Information classification?

34 / 50

Which of the following is a concern for compliance with information security policy?

35 / 50

Which of the following is best evidence indicting support and commitment of senior management for information security initiatives?

36 / 50

Which of the following is primary reason for periodic review of security policy?

37 / 50

Protecting integrity of data primarily focuses on

38 / 50

Information security policies are set of various policies addressing different information systems areas based on the IT infrastructure of organization. Which of the following policy is most common in all organizations?

39 / 50

Which of the following is primary function of information security policies?

40 / 50

The Primary objective of implementing Information security management is to:

41 / 50

Which of the following shall best help in aligning IT risk with enterprise risk?

42 / 50

The quantum of risk after enterprise has implemented controls based on risk mitigation plan is:

43 / 50

While auditing risk monitoring process which of the following IS auditor should review FIRST?

44 / 50

Which of the following is a risk factor that may have impact on organization?

45 / 50

Of the following, who is accountable for deciding and implementing controls based on risk mitigation plan?

46 / 50

Main use of maintaining and updating risk register is to:

47 / 50

Organizations capacity to sustain loss due to uncertainty and expressed in monetary terms is best known as:

48 / 50

After a Tsunami, a business decides to shift the location of data centre from coastal area to mid land. Which type of risk response option it has exercised?

49 / 50

Which of the following is a risk response option?

50 / 50

Which of the following shall BEST help in deciding upon the protection level for information asset?

Your score is

The average score is 66%

0%

Module-6:

ICAI DISA 3.0 QUESTION BANK : MODULE 6 :- STUDY MATERIAL BASED

1 / 12

Which of the following is not an example for AI Platform?

2 / 12

Which of the following is not a stream of AI?

3 / 12

Which of the following is not a cloud deployment model?

4 / 12

Which of the following tools best describe Predictive Analytics?

5 / 12

Which of the following is a central storage for all kinds of structured, semi structured or unstructured raw data collected from multiple sources even outside of company’s operational systems ?

 

6 / 12

The method by which companies analyze customer data or other types of information in an effort to identify patterns and discover relationships between different data elements is often referred to as:

7 / 12

Which one is simplest form of analytics?

8 / 12

Which of the following is a system of inter-connected and inter-related computing devices which have ability to transfer the data over network:

9 / 12

Which of the following statements about RPA is false?

10 / 12

Which of the following is not a step involved in RPA?

11 / 12

What is Blockchain?

12 / 12

What does P2P technology stand for?

Your score is

The average score is 70%

0%

ICAI DISA 3.0 PRACTICE OTHER QUESTIONS

Our Latest Posts

LATEST UPDATES IN YOUR INBOX

Don't worry we don't spam

Tags:

admin
We will be happy to hear your thoughts

Leave a Reply

YouTaxClub
Logo
Compare items
  • Total (0)
Compare
0

Discover more from YouTaxClub

Subscribe now to keep reading and get access to the full archive.

Continue reading

Shopping cart