Isaca CISA - Certified Information Systems Auditor
Which of the following would BEST detect that a distributed denial of service (DDoS) attack is occurring?
Which of the following should an IS auditor ensure is classified at the HIGHEST level of sensitivity?
Which of the following BEST facilitates the legal process in the event of an incident?
An audit identified that a computer system is not assigning sequential purchase order numbers to order requests. The IS auditor is conducting an audit follow-up to determine if management has reserved this finding. Which of two following is the MOST reliable follow-up procedure?
Which of the following application input controls would MOST likely detect data input errors in the customer account number field during the processing of an accounts receivable transaction?
During a follow-up audit, an IS auditor finds that some critical recommendations have the IS auditor's BEST course of action?
What is the GREATEST concern for an IS auditor reviewing contracts for licensed software that executes a critical business process?
An IS auditor finds that application servers had inconsistent security settings leading to potential vulnerabilities. Which of the following is the BEST recommendation by the IS auditor?
Which of the following issues associated with a data center's closed-circuit television (CCTV) surveillance cameras should be of MOST concern to an IS auditor?
Which of the following would be MOST useful when analyzing computer performance?
What should an IS auditor do FIRST upon discovering that a service provider did not notify its customers of a security breach?
During an audit of an organization's risk management practices, an IS auditor finds several documented IT risk acceptances have not been renewed in a timely manner after the assigned expiration date When assessing the seventy of this finding, which mitigating factor would MOST significantly minimize the associated impact?
Which of the following is MOST important to determine during the planning phase of a cloud-based messaging and collaboration platform acquisition?
During an exit meeting, an IS auditor highlights that backup cycles
are being missed due to operator error and that these exceptions
are not being managed. Which of the following is the BEST way to
help management understand the associated risk?
Which of the following BEST helps to ensure data integrity across system interfaces?
Which of the following should be of GREATEST concern for an IS auditor reviewing an organization's disaster recovery plan (DRP)?
Which of the following is MOST important when planning a network audit?
Which of the following is MOST important when implementing a data classification program?
Which of the following would be an appropriate role of internal audit in helping to establish an organization’s privacy program?
Which of the following would be the MOST useful metric for management to consider when reviewing a project portfolio?
Which of the following is the BEST metric to measure the alignment of IT and business strategy?
An organization allows its employees lo use personal mobile devices for work. Which of the following would BEST maintain information security without compromising employee privacy?
A credit card company has decided to outsource the printing of customer statements It Is MOST important for the company to verify whether:
An IS auditor plans to review all access attempts to a video-monitored and proximity card-controlled communications room. Which of the following would be MOST useful to the auditor?
An IS auditor reviewing the threat assessment tor a data center would be MOST concerned if:
Which of the following is the BEST way to ensure that an application is performing according to its specifications?
Which of the following is the BEST way to enforce the principle of least privilege on a server containing data with different security classifications?
Which of the following is the BEST evidence that an organization's IT strategy is aligned lo its business objectives?
What would be an IS auditor's BEST recommendation upon finding that a third-party IT service provider hosts the organization's human resources (HR) system in a foreign country?
Which of the following provides the BEST providence that outsourced provider services are being properly managed?
An IS auditor has been asked to advise on measures to improve IT governance within the organization. Which at the following is the BEST recommendation?
Which of the following is the MOST significant risk that IS auditors are required to consider for each engagement?
During an IT general controls audit of a high-risk area where both internal and external audit teams are reviewing the same approach to optimize resources?
A review of Internet security disclosed that users have individual user accounts with Internet service providers (ISPs) and use these accounts for downloading business data. The organization wants to ensure that only the corporate network is used. The organization should FIRST:
Which of the following would be MOST effective to protect information assets in a data center from theft by a vendor?
Which of the following audit procedures would be MOST conclusive in evaluating the effectiveness of an e-commerce application system's edit routine?
An IS auditor finds that one employee has unauthorized access to confidential data. The IS auditor's BEST recommendation should be to:
Which of the following would BEST enable an organization to address the security risks associated with a recently implemented bring your own device (BYOD) strategy?
Which of the following security measures will reduce the risk of propagation when a cyberattack occurs?
Which of the following is the BEST way to mitigate the risk associated with unintentional modifications of complex calculations in end-user computing (EUC)?
Which of the following should be of GREATEST concern to an IS auditor reviewing an organization's business continuity plan (BCP)?
An IS auditor is reviewing logical access controls for an organization's financial business application Which of the following findings should be of GREATEST concern to the auditor?
An IS auditor finds that capacity management for a key system is being performed by IT with no input from the business The auditor's PRIMARY concern would be:
An organization has virtualized its server environment without making any other changes to the network or security infrastructure. Which of the following is the MOST significant risk?
An IS auditor has completed the fieldwork phase of a network security review and is preparing the initial following findings should be ranked as the HIGHEST risk?
Which of the following BEST enables the effectiveness of an agile project for the rapid development of a new software application?
Which of the following is a corrective control?
Which of the following would MOST effectively help to reduce the number of repealed incidents in an organization?
An organization is disposing of a system containing sensitive data and has deleted all files from the hard disk. An IS auditor should be concerned because:
An IS auditor is reviewing the installation of a new server. The IS auditor's PRIMARY objective is to ensure that