Isaca CISA - Certified Information Systems Auditor
To ensure confidentiality through the use of asymmetric encryption, a message is encrypted with which of the following?
Which of the following would be an IS auditor's GREATEST concern when reviewing the organization's business continuity plan (BCP)?
An IS auditor is verifying the adequacy of an organization's internal controls and is concerned about potential circumvention of regulations. Which of the following is the BEST sampling method to use?
IT governance should be driven by:
In the case of a disaster where the data center is no longer available, which of the following tasks should be done FIRST?
What should an IS auditor recommend to management as the MOST important action before selecting a Software as a Service (SaaS) vendor?
During an external review, an IS auditor observes an inconsistent approach in classifying system criticality
within the organization. Which of the following should be recommended as the PRIMARY factor to
determine system criticality?
A transaction processing system interfaces with the general ledger. Data analytics has identified that some transactions are being recorded twice in the general ledger. While management states a system fixhas been implemented, what should the IS auditor recommend to validate the interface is working in the future?
When developing customer-facing IT applications, in which stage of the system development life cycle (SDLC) is it MOST beneficial to consider data privacy principles?
An IS auditor discovers that validation controls in a web application have been moved from the server side into the browser to boost performance. This would MOST likely increase the risk of a successful attack by:
A national tax administration agency with a distributed network experiences service disruptions due to a large influx of traffic to a regional office near the end of each year. Which of the following would BEST enable the agency to improve the performance of its servers during the busy period?
An IS auditor is reviewing a contract for the outsourcing of IT facilities. If missing, which of the following should present the GREATEST concern to the auditor?
Which of the following is the MOST important consideration when establishing vulnerability scanning on critical IT infrastructure?
Which of the following is the BEST indication of effective governance over IT infrastructure?
Which of the following statements appearing in an organization's acceptable use policy BEST demonstrates alignment with data classification standards related to the protection of information assets?
An IS auditor has been asked to advise on measures to improve IT governance within the organization. Which of the following IS the BEST recommendation?
An IS auditor should be MOST concerned if which of the following fire suppression systems is utilized to protect an asset storage closet?
Which of the following is MOST helpful for an IS auditor to review when evaluating an organizations business process that are supported by applications and IT systems?
Which of the following is MOST likely to be a project deliverable of an agile software development methodology?
Which of the following is the MOST important prerequisite for implementing a data loss prevention (DLP) tool?
Which of the following is the MOST important control for virtualized environments?
An IS auditor is tasked to review an organization's plan-do-check-act (PDCA) method for improving IT-related processes and wants to determine the accuracy of defined targets to be achieved. Which of the following steps in the PDCA process should the auditor PRIMARILY focus on in this situation?
Which of the following is an IS auditor's BEST recommendation for mitigating risk associated with inadvertent disclosure of sensitive information by employees?
Which of the following observations should be of GREATEST concern to an IS auditor reviewing an organization's enterprise architecture (EA) program?
An IT governance body wants to determine whether IT service delivery is based on consistently effective processes. Which of the following is the BEST approach?
Which of the following MOST effectively detects transposition and transcription errors?
Who should be the FIRST to evaluate an audit report prior to issuing it to the project steering committee?
Which of the following is a PRIMARY function of an intrusion detection system (IDS)?
A cloud access security broker (CASB) administers the user access of a Software as a Service {SaaS) on behalf of the customer organization. When conducting an audit of the service, which of the following is MOST important for the IS auditor to confirm?
During a review, an IS auditor discovers that corporate users are able to access cloud-based applications and data from any Internet-connected web browser. Which of the following is the
auditor's BEST recommendation to help prevent unauthorized access?
Which of the following is the MOST important consideration of any disaster response plan?
An IS auditor has been asked to review the integrity of data transfer between two business-critical systems that have not been tested since implementation. Which of the following would provide the MOST useful information to plan an audit?
Which of the following is the MOST important consideration when developing tabletop exercises within a cybersecurity incident response plan?
Audit frameworks can assist the IS audit function by:
When reviewing an organization’s enterprise architecture (EA), which of the following is an IS auditor MOST likely to find within the EA documentation?
An IS auditor is reviewing an organization's cloud access security broker (CASB) solution. Which ofthe following is MOST important for the auditor to verify?
An IS auditor is reviewing a network diagram. Which of the following would be the BEST location for placement of a firewall?
How would an IS auditor BEST determine the effectiveness of a security awareness program?
When designing a data analytics process, which of the following should be the stakeholder's role in automating data extraction and validation?
Which of the following would BEST reduce the risk of application programming interface (API) unavailability?
Which of the following BEST indicates a need to review an organization's information security policy?
Which of the following is the MOST important success factor for implementing a data loss prevention (DLP) tool?
Which of the following is MOST helpful for evaluating benefits realized by IT projects?
Which type of threat can utilize a large group of automated social media accounts to steal data, send spam, or launch distributed denial of service (DDoS) attacks?
An external attacker spoofing an internal Internet Protocol (IP) address can BEST be detected by which of the following?
Which of the following job scheduling schemes for operating system updates is MOST likely to adequately balance protection of workstations with user requirements?
A security review focused on data loss prevention (DLP) revealed the organization has no visibility to data stored in the cloud. What is the IS auditor's BEST recommendation to address this
issue?
Which of the following is an organization's BEST defense against malware?
An IS auditor would MOST likely recommend that IT management use a balanced scorecard to:
Which of the following should be the PRIMARY consideration when validating a data analytic algorithm that has never been used before?