ISACA인증 CISA시험을 준비하기 위해 잠도 설쳐가면서 많이 힘들죠? ITExamDump덤프가 고객님의 곁을 지켜드립니다. ITExamDump에서 제공해드리는ISACA인증 CISA덤프는 실제ISACA인증 CISA시험문제를 연구하여 만든 공부자료이기에 최고의 품질을 자랑합니다. ITExamDump덤프를 열심히 공부하여 멋진 IT전문가의 꿈을 이루세요.
ISACA인증사에서 주췌하는 CISA시험은 IT업계에 종사하는 분이시라면 모두 패스하여 자격증을 취득하고 싶으리라 믿습니다. ITExamDump에서는 여러분이 IT인증자격증을 편하게 취득할수 있게 도와드리는 IT자격증시험대비시험자료를 제공해드리는 전문 사이트입니다. ITExamDump덤프로 자격증취득의 꿈을 이루세요.
ITExamDump는 여러분이ISACA 인증CISA인증시험 패스와 추후사업에 모두 도움이 되겠습니다. ITExamDump제품을 선택함으로 여러분은 시간도 절약하고 돈도 절약하는 일석이조의 득을 얻을수 있습니다. 또한 구매후 일년무료 업데이트 버전을 받을수 있는 기회를 얻을수 있습니다. ISACA 인증CISA 인증시험패스는 아주 어렵습니다. 자기에 맞는 현명한 학습자료 선택은 성공의 지름길을 내딛는 첫발입니다. 퍼펙트한 자료만이 시험에서 성공할수 있습니다. ITExamDump시험문제와 답이야 말로 퍼펙트한 자료이죠. ITExamDump ISACA 인증CISA인증시험자료는 100% 패스보장을 드립니다.
ITExamDump는 많은 분들이ISACA인증CISA시험을 응시하여 성공하도록 도와주는 사이트입니다ITExamDump의 ISACA인증CISA 학습가이드는 시험의 예상문제로 만들어진 아주 퍼펙트한 시험자료입니다. ISACA인증CISA시험은 최근 가장 인기있는 시험으로 IT인사들의 사랑을 독차지하고 있으며 국제적으로 인정해주는 시험이라 어느 나라에서 근무하나 제한이 없습니다. ITExamDump로 여러분은 소유하고 싶은 인증서를 빠른 시일내에 얻게 될것입니다.
IT인증자격증은 여느때보다 강렬한 경쟁율을 보이고 있습니다. ISACA 인증CISA시험을 통과하시면 취직 혹은 승진이나 연봉협상에 많은 도움이 되어드릴수 있습니다. ISACA 인증CISA시험이 어려워서 통과할 자신이 없다구요? ITExamDump덤프만 있으면 이런 고민은 이제 그만 하지않으셔도 됩니다. ITExamDump에서 출시한 ISACA 인증CISA덤프는 시장에서 가장 최신버전입니다.
만약 아직도ISACA CISA시험패스를 위하여 고군분투하고 있다면 바로 우리 ITExamDump를 선택함으로 여러분의 고민을 날려버릴 수 잇습니다, 우리 ITExamDump에서는 최고의 최신의 덤프자료를 제공 합으로 여러분을 도와ISACA CISA인증자격증을 쉽게 취득할 수 있게 해드립니다. 만약ISACA CISA인증시험으로 한층 업그레이드된 자신을 만나고 싶다면 우리ITExamDump선택을 후회하지 않을 것입니다, 우리ITExamDump과의 만남으로 여러분은 한번에 아주 간편하게ISACA CISA시험을 패스하실 수 있으며,ISACA CISA자격증으로 완벽한 스펙을 쌓으실 수 있습니다,
시험 번호/코드: CISA
시험 이름: ISACA (Isaca CISA )
당신이 구입하기 전에 시도
일년동안 무료 업데이트
100% 환불보장약속
100% 합격율 보장
Q&A: 1180 문항
업데이트: 2014-02-20
ITExamDump 는 전문적으로 it전문인사들에게 도움을 드리는 사이트입니다.많은 분들의 반응과 리뷰를 보면 우리ITExamDump의 제품이 제일 안전하고 최신이라고 합니다. ITExamDump의 학습가이드는 아주 믿음이 가는 문제집들만 있으니까요. ITExamDump 덤프의 문제와 답은 모두 제일 정확합니다. 왜냐면 우리의 전문가들은 매일 최신버전을 갱신하고 있기 때문입니다.
CISA 덤프무료샘플다운로드하기: http://www.itexamdump.com/CISA.html
NO.1 IS management has decided to rewrite a legacy customer relations system using fourth generation
languages (4GLs). Which of the following risks is MOST often associated with system development using
4GLs?
A. Inadequate screen/report design facilities
B. Complex programming language subsets
C. Lack of portability across operating systems
D. Inability to perform data intensive operations
Answer: D
ISACA인증 CISA CISA기출문제 CISA덤프
Explanation:
4.Ls are usually not suitable for data intensive operations. Instead, they are used mainly for graphic user
interface (GUI) design or as simple query/report generators.
Incorrect answers:
A, B. Screen/report design facilities are one of the main advantages of 4GLs, and 4GLs have simple
programming language subsets.
C. Portability is also one of the main advantages of 4GLs.
NO.2 Which of the following would be the BEST method for ensuring that critical fields in a master record
have been updated properly?
A. Field checks
B. Control totals
C. Reasonableness checks
D. A before-and-after maintenance report
Answer: D
ISACA기출문제 CISA CISA CISA최신덤프 CISA dumps
Explanation:
A before-and-after maintenance report is the best answer because a visual review would provide the most
positive verification that updating was proper.
NO.3 Which of the following systems-based approaches would a financial processing company employ to
monitor spending patterns to identify abnormal patterns and report them?
A. A neural network
B. Database management software
C. Management information systems
D. Computer assisted audit techniques
Answer: A Explanation:
A neural network will monitor and learn patterns, reporting exceptions for investigation. Incorrect answers:
B. Database management software is a method of storing and retrieving data.
C. Management information systems provide management statistics but do not normally have a
monitoring and detection function.
D. Computer-assisted audit techniques detect specific situations, but are not intended to learn patterns
and detect abnormalities.
NO.4 Which of the following BEST describes the necessary documentation for an enterprise product
reengineering (EPR) software installation?
A. Specific developments only
B. Business requirements only
C. All phases of the installation must be documented
D. No need to develop a customer specific documentation
Answer: C
ISACA CISA CISA CISA기출문제 CISA
Explanation:
A global enterprise product reengineering (EPR) software package can be applied to a business to
replace, simplify and improve the quality of IS processing. Documentation is intended to help understand
how, why and which solutions that have been selected and implemented, and therefore must be specific
to the project. Documentation is also intended to support quality assurance and must be comprehensive.
NO.5 An offsite information processing facility having electrical wiring, air conditioning and flooring, but no
computer or communications equipment is a:
A. cold site.
B. warm site.
C. dial-up site.
D. duplicate processing facility.
Answer: A
ISACA자료 CISA CISA자격증 CISA CISA CISA pdf
Explanation:
A cold site is ready to receive equipment but does not offer any components at the site in advance of the
need.
Incorrect answers:
B. A warm site is an offsite backup facility that is configured partially with network connections and
selected peripheral equipment, such as disk and tape units, controllers and CPUs, to operate an
information processing facility.
D. A duplicate information processing facility is a dedicated, self-developed recovery site that can back up
critical applications.
NO.6 A call-back system requires that a user with an id and password call a remote server through a dial-up
line, then the server disconnects and: A. dials back to the user machine based on the user id and
password using a telephone number from its database.
B. dials back to the user machine based on the user id and password using a telephone number provided
by the user during this connection.
C. waits for a redial back from the user machine for reconfirmation and then verifies the user id and
password using its database.
D. waits for a redial back from the user machine for reconfirmation and then verifies the user id and
password using the sender's database.
Answer: A
ISACA자격증 CISA CISA인증 CISA자격증 CISA
Explanation:
A call-back system in a net centric environment would mean that a user with an id and password calls a
remote server through a dial-up line first, and then the server disconnects and dials back to the user
machine based on the user id and password using a telephone number from its database. Although the
server can depend upon its own database, it cannot know the authenticity of the dialer when the user dials
again. The server cannot depend upon the sender's database to dial back as the same could be
manipulated.
NO.7 In an EDI process, the device which transmits and receives electronic documents is the:
A. communications handler.
B. EDI translator.
C. application interface.
D. EDI interface.
Answer: A
ISACA덤프 CISA CISA
Explanation:
A communications handler transmits and receives electronic documents between trading partners
and/or wide area networks (WANs).
Incorrect answers:
B. An EDI translator translates data between the standard format and a trading partner's proprietary
format.
C. An application interface moves electronic transactions to, or from, the application system and performs
data mapping.
D. An EDI interface manipulates and routes data between the application system and the communications
handler.
NO.8 The MOST significant level of effort for business continuity planning (BCP) generally is required during
the:
A. testing stage.
B. evaluation stage.
C. maintenance stage.
D. early stages of planning.
Answer: D
ISACA CISA CISA기출문제 CISA시험문제 CISA
Explanation:
Company.com in the early stages of a BCP will incur the most significant level of program development
effort, which will level out as the BCP moves into maintenance, testing and evaluation stages. It is during
the planning stage that an IS auditor will play an important role in obtaining senior management's
commitment to resources and assignment of BCP responsibilities.
NO.9 Which of the following is a benefit of using callback devices?
A. Provide an audit trail
B. Can be used in a switchboard environment
C. Permit unlimited user mobility
D. Allow call forwarding
Answer: A
ISACA CISA인증 CISA덤프 CISA pdf
Explanation:
A callback feature hooks into the access control software and logs all authorized and unauthorized access
attempts, permitting the follow-up and further review of potential breaches. Call forwarding (choice D) is a
means of potentially bypassing callback control. By dialing through an authorized phone number from an
unauthorized phone number, a perpetrator can gain computer access. This vulnerability can be controlled
through callback systems that are available.
NO.10 The use of a GANTT chart can:
A. aid in scheduling project tasks.
B. determine project checkpoints.
C. ensure documentation standards.
D. direct the post-implementation review.
Answer: A
ISACA dump CISA pdf CISA자격증 CISA시험문제
Explanation:
A GANTT chart is used in project control. It may aid in the identification of needed checkpoints but its
primary use is in scheduling. It will not ensure the completion of documentation nor will it provide direction
for the post-implementation review.
NO.11 A data administrator is responsible for: A. maintaining database system software.
B. defining data elements, data names and their relationship.
C. developing physical database structures.
D. developing data dictionary system software.
Answer: B
ISACA덤프 CISA CISA덤프 CISA
Explanation:
A data administrator is responsible for defining data elements, data names and their relationship. Choices
A, C and D are functions of a database administrator (DBA)
NO.12 A LAN administrator normally would be restricted from:
A. having end-user responsibilities.
B. reporting to the end-user manager.
C. having programming responsibilities.
D. being responsible for LAN security administration.
Answer: C
ISACA CISA CISA
Explanation:
A LAN administrator should not have programming responsibilities but may have end- user
responsibilities. The LAN administrator may report to the director of the IPF or, in a decentralized
operation, to the end-user manager. In small organizations, the LAN administrator also may be
responsible for security administration over the LAN.
NO.13 Which of the following tests is an IS auditor performing when a sample of programs is selected to
determine if the source and object versions are the same?
A. A substantive test of program library controls
B. A compliance test of program library controls
C. A compliance test of the program compiler controls
D. A substantive test of the program compiler controls
Answer: B
ISACA시험문제 CISA자료 CISA CISA dumps
Explanation:
A compliance test determines if controls are operating as designed and are being applied in a manner that
complies with management policies and procedures. For example, if the IS auditor is concerned whether
program library controls are working properly, the IS auditor might select a sample of programs to
determine if the source and object versions are the same. In other words, the broad objective of any
compliance test is to provide auditors with reasonable assurance that a particular control on which the
auditor plans to rely is operating as the auditor perceived it in the preliminary evaluation.
NO.14 To affix a digital signature to a message, the sender must first create a message digest by applying a
cryptographic hashing algorithm against:
A. the entire message and thereafter enciphering the message digest using the sender's private key.
B. any arbitrary part of the message and thereafter enciphering the message digest using the sender's
private key.
C. the entire message and thereafter enciphering the message using the sender's private key.
D. the entire message and thereafter enciphering the message along with the message digest using the
sender's private key.
Answer: A
ISACA자료 CISA CISA CISA
Explanation:
A digital signature is a cryptographic method that ensures data integrity, authentication of the message,
and non-repudiation. To ensure these, the sender first creates a message digest by applying a
cryptographic hashing algorithm against the entire message and thereafter enciphers the message digest
using the sender's private key. A message digest is created by applying a cryptographic hashing algorithm
against the entire message not on any arbitrary part of the message. After creating the message digest,
only the message digest is enciphered using the sender's private key, not the message.
NO.15 Which of the following is a telecommunication device that translates data from digital form to analog
form and back to digital?
A. Multiplexer
B. Modem
C. Protocol converter
D. Concentrator
Answer: B
ISACA dumps CISA기출문제 CISA최신덤프 CISA CISA
Explanation:
A modem is a device that translates data from digital to analog and back to digital.
NO.16 A sequence of bits appended to a digital document that is used to secure an e-mail sent through the
Internet is called a:
A. digest signature.
B. electronic signature.
C. digital signature.
D. hash signature.
Answer: C
ISACA CISA CISA dump CISA CISA
Explanation:
A digital signature through the private cryptographic key authenticates a transmission from a sender
through the private cryptographic key. It is a string of bits that uniquely represent another string of bits, a
digital document. An electronic signature refers to the string of bits that digitally represents a handwritten
signature captured by a computer system when a human applies it on an electronic pen pad, connected
to the system.
NO.17 Which of the following types of data validation editing checks is used to determine if a field contains
data, and not zeros or blanks?
A. Check digit
B. Existence check
C. Completeness check
D. Reasonableness check
Answer: C
ISACA CISA pdf CISA
Explanation:
A completeness check is used to determine if a field contains data and not zeros or blanks. Incorrect
answers:
A. A check digit is a digit calculated mathematically to ensure original data was not altered.
B. An existence check also checks entered data for agreement to predetermined criteria.
D. A reasonableness check matches input to predetermined reasonable limits or occurrence rates.
NO.18 Which of the following is a dynamic analysis tool for the purpose of testing software modules?
A. Blackbox test
B. Desk checking
C. Structured walk-through
D. Design and code
Answer: A
ISACA최신덤프 CISA CISA
Explanation:
A blackbox test is a dynamic analysis tool for testing software modules. During the testing of software
modules a blackbox test works first in a cohesive manner as one single unit/entity, consisting of numerous
modules and second, with the user data that flows across software modules. In some cases, this even
drives the software behavior.
Incorrect answers:
In choices B, C and D, the software (design or code) remains static and somebody simply closely
examines it by applying his/her mind, without actually activating the software. Hence, these cannot be
referred to as dynamic analysis tools.
NO.19 Which of the following network configuration options contains a direct link between any two host
machines?
A. Bus
B. Ring
C. Star
D. Completely connected (mesh)
Answer: D
ISACA덤프 CISA CISA CISA CISA자격증
Explanation:
A completely connected mesh configuration creates a direct link between any two host machines.
Incorrect answers:
A. A bus configuration links all stations along one transmission line.
B. A ring configuration forms a circle, and all stations are attached to a point on the transmission circle.
D. In a star configuration each station is linked directly to a main hub.
NO.20 A critical function of a firewall is to act as a:
A. special router that connects the Internet to a LAN.
B. device for preventing authorized users from accessing the LAN.
C. server used to connect authorized users to private trusted network resources.
D. proxy server to increase the speed of access to authorized users.
Answer: B
ISACA CISA시험문제 CISA dumps CISA시험문제 CISA
Explanation:
A firewall is a set of related programs, located at a network gateway server, that protects the resources of
a private network from users of other networks. An enterprise with an intranet that allows its workers
access to the wider Internet installs a firewall to prevent outsiders from accessing its own private data
resources and for controlling the outside resources to which its own users have access. Basically, a
firewall, working closely with a router program, filters all network packets to determine whether or not to
forward them toward their destination. A firewall includes or works with a proxy server that makes network
requests on behalf of workstation users. A firewall is often installed in a specially designated computer
separate from the rest of the network so no incoming request can get directed to private network
resources.
NO.21 A number of system failures are occurring when corrections to previously detected errors are
resubmitted for acceptance testing. This would indicate that the maintenance team is probably not
adequately performing which of the following types of testing?
A. Unit testing
B. Integration testing
C. Design walk-throughs
D. Configuration management
Answer: B
ISACA자격증 CISA CISA dump CISA CISA
Explanation:
A common system maintenance problem is that errors are often corrected quickly (especially when
deadlines are tight) , units are tested by the programmer, and then transferred to the acceptance test area.
This often results in system problems that should have been detected during integration or system testing.
Integration testing aims at ensuring that the major components of the system interface correctly.
NO.22 Which of the following is MOST likely to result from a business process reengineering (BPR) project?
A. An increased number of people using technology
B. Significant cost savings, through a reduction in the complexity of information technology
C. A weaker organizational structures and less accountability
D. Increased information protection (IP) risk will increase
Answer: A
ISACA CISA CISA최신덤프
Explanation:
A BPR project more often leads to an increased number of people using technology, and this would be a
cause for concern. Incorrect answers:
B. As BPR is often technology oriented, and this technology is usually more complex and volatile than in
the past, cost savings do not often materialize in this area.
D. There is no reason for IP to conflict with a BPR project, unless the project is not run properly.
NO.23 Which of the following data validation edits is effective in detecting transposition and transcription
errors?
A. Range check
B. Check digit
C. Validity check
D. Duplicate check
Answer: B
ISACA기출문제 CISA최신덤프 CISA CISA dumps
Explanation:
A check digit is a numeric value that is calculated mathematically and is appended to data to
ensure that the original data have not been altered or an incorrect, but valid, value substituted.
This control is effective in detecting transposition and transcription errors.
Incorrect answers:
A. A range check is checking data that matches a predetermined range of values.
C. A validity check is programmed checking of the data validity in accordance with predetermined criteria.
D. In a duplicate check, new or fresh transactions are matched to those previously entered to ensure that
they are not already in the system.
NO.24 Structured programming is BEST described as a technique that:
A. provides knowledge of program functions to other programmers via peer reviews.
B. reduces the maintenance time of programs by the use of small-scale program modules.
C. makes the readable coding reflect as closely as possible the dynamic execution of the program.
D. controls the coding and testing of the high-level functions of the program in the development process.
Answer: B
ISACA CISA기출문제 CISA dumps
Explanation:
A characteristic of structured programming is smaller, workable units. Structured programming has
evolved because smaller, workable units are easier to maintain. Structured programming is a style of
programming which restricts the kinds of control structures. This limitation is not crippling. Any program
can be written with allowed control structures. Structured programming is sometimes referred to as
go-to-less programming, since a go-to statement is not allowed. This is perhaps the most well known
restriction of the style, since go-to statements were common at the time structured programming was
becoming more popular. Statement labels also become unnecessary, except in languages where
subroutines are identified by labels.
NO.25 A hub is a device that connects:
A. two LANs using different protocols.
B. a LAN with a WAN.
C. a LAN with a metropolitan area network (MAN).
D. two segments of a single LAN.
Answer: D
ISACA기출문제 CISA CISA
Explanation:
A hub is a device that connects two segments of a single LAN. A hub is a repeater. It provides transparent
connectivity to users on all segments of the same LAN. It is a level 1 device. Incorrect answers:
A. A bridge operates at level 2 of the OSI layer and is used to connect two LANs using different protocols
(e.g., joining an ethernet and token network) to form a logical network.
B. A gateway, which is a level 7 device, is used to connect a LAN to a WAN.
C. A LAN is connected with a MAN using a router, which operates in the network layer.
NO.26 Which of the following devices extends the network and has the capacity to store frames and act as a
storage and forward device?
A. Router
B. Bridge
C. Repeater
D. Gateway
Answer: B
ISACA덤프 CISA CISA자료 CISA
Explanation:
A bridge connects two separate networks to form a logical network (e.g., joining an ethernet and token
network) and has the storage capacity to store frames and act as a storage and forward device. Bridges
operate at the OSI data link layer by examining the media access control header of a data packet.
Incorrect answers:
A. Routers are switching devices that operate at the OSI network layer by examining network addresses
(i.e., routing information encoded in an IP packet). The router, by examining the IP address, can make
intelligent decisions in directing the packet to its destination.
C. Repeaters amplify transmission signals to reach remote devices by taking a signal from a LAN,
reconditioning and retiming it, and sending it to another. This functionality is hardware encoded and
occurs at the OSI physical layer.
D. Gateways provide access paths to foreign networks.
NO.27 A database administrator is responsible for:
A. defining data ownership.
B. establishing operational standards for the data dictionary.
C. creating the logical and physical database.
D. establishing ground rules for ensuring data integrity and security.
Answer: C
ISACA CISA CISA CISA CISA CISA
Explanation:
A database administrator is responsible for creating and controlling the logical and physical database.
Defining data ownership resides with the head of the user department or top management if the data is
common to the organization. IS management and the data administrator are responsible for establishing
operational standards for the data dictionary. Establishing ground rules for ensuring data integrity and
security in line with the corporate security policy is a function of the security administrator.
NO.28 Which of the following translates e-mail formats from one network to another so that the message can
travel through all the networks?
A. Gateway
B. Protocol converter
C. Front-end communication processor
D. Concentrator/multiplexor
Answer: A
ISACA CISA자료 CISA CISA기출문제 CISA
Explanation:
A gateway performs the job of translating e-mail formats from one network to another so messages can
make their way through all the networks.
Incorrect answers:
B. A protocol converter is a hardware device that converts between two different types of transmissions,
such as asynchronous and synchronous transmissions.
C. A front-end communication processor connects all network communication lines to a central computer
to relieve the central computer from performing network control, format conversion and message handling
tasks.
D. A concentrator/multiplexor is a device used for combining several lower-speed channels into a
higher-speed channel.
NO.29 Which of the following hardware devices relieves the central computer from performing network
control, format conversion and message handling tasks?
A. Spool
B. Cluster controller
C. Protocol converter
D. Front end processor
Answer: D
ISACA기출문제 CISA자료 CISA
Explanation:
A front-end processor is a hardware device that connects all communication lines to a central computer to
relieve the central computer.
NO.30 An IS auditor reviewing the key roles and responsibilities of the database administrator (DBA) is
LEAST likely to expect the job description of the DBA to include:
A. defining the conceptual schema.
B. defining security and integrity checks.
C. liaising with users in developing data model.
D. mapping data model with the internal schema.
Answer: D Explanation:
A DBA only in rare instances should be mapping data elements from the data model to the internal
schema (physical data storage definitions). To do so would eliminate data independence for application
systems. Mapping of the data model occurs with the conceptual schema since the conceptual schema
represents the enterprisewide view of data within an organization and is the basis for deriving an end-user
department data model.
ITexamdump의 덤프의 VCE테스트프로그램과 C_TBIT44_731덤프는 한방에 시험을 패스하도록 도와드립니다. ITexamdump 에서는 최신버전의 C_HANAIMP_1시험에 대비한 고품질 덤프와 JN0-696시험 최신버전덤프를 제공해드립니다. 최고품질 00M-503시험자료는 100% 간단하게 시험패스하도록 최선을 다하고 있습니다. IT인증시험패스는 이토록 간단합니다.
댓글 없음:
댓글 쓰기