Inspirational journeys

Follow the stories of academics and their research expeditions

CISA—Certified Information Systems Auditor - Part 149

Mary Smith

Sat, 12 Jul 2025

CISA—Certified Information Systems Auditor - Part 149

1. Who is ultimately responsible and accountable for reviewing user access to systems?

A) Systems security administrators
B) Data custodians
C) Data owners
D) Information systems auditors



2. Establishing data ownership is an important first step for which of the following processes?

A) Assigning user access privileges
B) Developing organizational security policies
C) Creating roles and responsibilities
D) Classifying data



3. Which of the following is MOST is critical during the business impact assessment phase of business continuity planning?

A) End-user involvement
B) Senior management involvement
C) Security administration involvement
D) IS auditing involvement



4. What type of BCP test uses actual resources to simulate a system crash and validate the plan's effectiveness?

A) Paper
B) Preparedness
C) Walk-through
D) Parallel



5. Which of the following typically focuses on making alternative processes and resources available for transaction processing?

A) Cold-site facilities
B) Disaster recovery for networks
C) Diverse processing
D) Disaster recovery for systems



1. Right Answer: C
Explanation: Data owners are ultimately responsible and accountable for reviewing user access to systems.

2. Right Answer: D
Explanation: To properly implement data classification, establishing data ownership is an important first step.

3. Right Answer: A
Explanation: End-user involvement is critical during the business impact assessment phase of business continuity planning.

4. Right Answer: B
Explanation: Of the three major types of BCP tests (paper, walk-through, and preparedness), only the preparedness test uses actual resources to simulate a system crash and validate the plan's effectiveness.

5. Right Answer: D
Explanation: Disaster recovery for systems typically focuses on making alternative processes and resources available for transaction processing.

0 Comments

Leave a comment