Isaca CISA - Certified Information Systems Auditor
During an external review, an IS auditor observes an inconsistent approach in classifying system criticality within the organization. Which of the following should be recommended as the PRIMARY factor to determine system criticality?
Which of the following is MOST useful for determining whether the goals of IT are aligned with the organization's goals?
An incorrect version of the source code was amended by a development team. This MOST likely indicates a weakness in:
During an ongoing audit, management requests a briefing on the findings to date. Which of the following is the IS auditor's BEST course of action?
Which of the following tests would provide the BEST assurance that a health care organization is handling patient data appropriately?
An organization's enterprise architecture (EA) department decides to change a legacy system's components while maintaining its original functionality. Which of the following is MOST important for an IS auditor to understand when reviewing this decision?
Which of the following MOST effectively minimizes downtime during system conversions?
During a follow-up audit, an IS auditor learns that some key management personnel have been replaced since the original audit, and current management has decided not to implement some previously accepted recommendations. What is the auditor's BEST course of action?
Which of the following is MOST important to include in forensic data collection and preservation procedures?
During an audit of a reciprocal disaster recovery agreement between two companies, the IS auditor would be MOST concerned with the:
During a review of a production schedule, an IS auditor observes that a staff member is not complying with mandatory operational procedures. The auditor's NEXT step should be to:
An IS auditor is reviewing an organization's information asset management process. Which of the following would be of GREATEST concern to the auditor?
An IT balanced scorecard is the MOST effective means of monitoring:
An IS auditor has found that an organization is unable to add new servers on demand in a cost-efficient manner. Which of the following is the auditor's BEST recommendation?
During the design phase of a software development project, the PRIMARY responsibility of an IS auditor is to evaluate the:
Which of the following is the BEST way to determine whether a test of a disaster recovery plan (DRP) was successful?
A new regulation requires organizations to report significant security incidents to the regulator within 24 hours of identification. Which of the following is the IS auditor's BEST recommendation to facilitate compliance with the regulation?
Spreadsheets are used to calculate project cost estimates. Totals for each cost category are then keyed into the job-costing system. What is the BEST control to ensure that data is accurately entered into the system?
An organization conducted an exercise to test the security awareness level of users by sending an email offering a cash reward 10 those who click on a link embedded in the body of the email. Which of the following metrics BEST indicates the effectiveness of awareness training?
An IS auditor has been asked to assess the security of a recently migrated database system that contains personal and financial data for a bank's customers. Which of the following controls is MOST important for the auditor to confirm is in place?
Which of the following is MOST important with regard to an application development acceptance test?
Which of the following is the BEST way to address segregation of duties issues in an organization with budget constraints?
The PRIMARY benefit lo using a dry-pipe fire-suppression system rather than a wet-pipe system is that a dry-pipe system:
An IS auditor finds that a key Internet-facing system is vulnerable to attack and that patches are not available. What should the auditor recommend be done FIRST?
The implementation of an IT governance framework requires that the board of directors of an organization:
When reviewing an organization's information security policies, an IS auditor should verify that the policies have been defined PRIMARILY on the basis of:
Due to limited storage capacity, an organization has decided to reduce the actual retention period for media containing completed low-value transactions. Which of the following is MOST important for the organization to ensure?
Which of the following is the PRIMARY concern when negotiating a contract for a hot site?
Which of the following BEST minimizes performance degradation of servers used to authenticate users of an e-commerce website?
Which of the following is the MOST important reason to implement version control for an end-user computing (EUC) application?
Which of the following is the MOST effective control to mitigate unintentional misuse of authorized access?
An IS auditor is evaluating an organization's IT strategy and plans. Which of the following would be of GREATEST concern?
Cross-site scripting (XSS) attacks are BEST prevented through:
During an incident management audit, an IS auditor finds that several similar incidents were logged during the audit period. Which of the following is the auditor's MOST important course of action?
Which of the following should be the MOST important consideration when conducting a review of IT portfolio management?
When auditing the security architecture of an online application, an IS auditor should FIRST review the:
To confirm integrity for a hashed message, the receiver should use:
Which of the following provides the MOST reliable audit evidence on the validity of transactions in a financial application?
Which of the following is the BEST method to prevent wire transfer fraud by bank employees?
Which of the following data would be used when performing a business impact analysis (BIA)?
Which of the following should be the PRIMARY basis for prioritizing follow-up audits?
During a new system implementation, an IS auditor has been assigned to review risk management at each milestone. The auditor finds that several risks to project benefits have not been addressed. Who should be accountable for managing these risks?
If enabled within firewall rules, which of the following services would present the GREATEST risk?
During the planning phase of a data loss prevention (DLP) audit, management expresses a concern about mobile computing. Which of the following should the IS auditor identity as the associated risk?
What should an IS auditor do FIRST when management responses
to an in-person internal control questionnaire indicate a key internal
control is no longer effective?
During audit framework. an IS auditor teams that employees are allowed to connect their personal devices to company-owned computers. How can the auditor BEST validate that appropriate security controls are in place to prevent data loss?
The PRIMARY role of a control self-assessment (CSA) facilitator is to:
An IS auditor discovers that an IT organization serving several business units assigns equal priority to all initiatives, creating a risk of delays in securing project funding Which of the following would be MOST helpful in matching demand for projects and services with available resources in a way that supports business objectives?
Which of the following is the BEST way to ensure that business continuity plans (BCPs) will work effectively in the event of a major disaster?
Which of the following is MOST important to ensure that electronic evidence collected during a forensic investigation will be admissible in future legal proceedings?