Isaca CISA - Certified Information Systems Auditor
Which of the following presents the GREATEST challenge to the alignment of business and IT?
When verifying the accuracy and completeness of migrated data for a new application system replacing a legacy system. It is MOST effective for an IS auditor to review;
Which task should an IS auditor complete FIRST during the preliminary planning phase of a database security review?
Which of the following is MOST critical for the effective implementation of IT governance?
Which of the following is MOST appropriate to prevent unauthorized retrieval of confidential information stored in a business application system?
Which of the following is MOST important for an IS auditor to confirm when reviewing an organization's plans to implement robotic process automation (RPA> to automate routine business tasks?
Which of the following should be the IS auditor's PRIMARY focus, when evaluating an organization's offsite storage facility?
A company has implemented an IT segregation of duties policy. In a role-based environment, which of the following roles may be assigned to an application developer?
Which of the following would provide an IS auditor with the GREATEST assurance that data disposal controls support business strategic objectives?
An IS auditor finds that the process for removing access for terminated employees is not documented What is the MOST significant risk from this observation?
A post-implementation review was conducted by issuing a survey to users. Which of the following should be of GREATEST concern to an IS auditor?
During a security audit, an IS auditor is tasked with reviewing log entries obtained from an enterprise intrusion prevention system (IPS). Which type of risk would be associated with the potential for the auditor to miss a sequence of logged events that could indicate an error in the IPS configuration?
Which of the following should be of MOST concern to an IS auditor reviewing the public key infrastructure (PKI) for enterprise email?
An IS auditor has discovered that a software system still in regular use is years out of date and no longer supported the auditee has stated that it will take six months until the software is running on the current version. Which of the following is the BEST way to reduce the immediate risk associated with using an unsupported version of the software?
UESTION NO: 210
An accounting department uses a spreadsheet to calculate sensitive financial transactions. Which of the following is the MOST important control for maintaining the security of data in the spreadsheet?
When testing the adequacy of tape backup procedures, which step BEST verifies that regularly scheduled Backups are timely and run to completion?
An organization has developed mature risk management practices that are followed across all departments What is the MOST effective way for the audit team to leverage this risk management maturity?
Which of the following is MOST important for an IS auditor to consider when performing the risk assessment poor to an audit engagement?
Which of the following would lead an IS auditor to conclude that the evidence collected during a digital forensic investigation would not be admissible in court?
Which of the following observations would an IS auditor consider the GREATEST risk when conducting an audit of a virtual server farm tor potential software vulnerabilities?
Which of the following security risks can be reduced by a property configured network firewall?
The due date of an audit project is approaching, and the audit manager has determined that only 60% of the audit has been completed. Which of the following should the audit manager do FIRST?
Which of the following is the GREATEST risk associated with storing customer data on a web server?
An IS auditor concludes that an organization has a quality security policy. Which of the following is MOST important to determine next? The policy must be:
The BEST way to determine whether programmers have permission to alter data in the production environment is by reviewing:
An organization is considering allowing users to connect personal devices to the corporate network. Which of the following should be done FIRST?
Which of the following is the MAIN purpose of an information security management system?
Which of the following metrics would BEST measure the agility of an organization's IT function?
The PRIMARY reason for an IS auditor to use data analytics techniques is to reduce which type of audit risk?
An IS auditor is conducting a review of a data center. Which of the following observations could indicate an access control Issue?
Which of the following weaknesses would have the GREATEST impact on the effective operation of a perimeter firewall?
In an environment that automatically reports all program changes, which of the following is the MOST efficient way to detect unauthorized changes to production programs?
Which of the following represents the HIGHEST level of maturity of an information security program?
A new regulation in one country of a global organization has recently prohibited cross-border transfer of personal data. An IS auditor has been asked to determine the organization's level of exposure In the affected country. Which of the following would be MOST helpful in making this assessment?
To enable the alignment of IT staff development plans with IT strategy, which of the following should be done FIRST?
Which of the following MUST be completed as part of the annual audit planning process?
The waterfall life cycle model of software development is BEST suited for which of the following situations?
The PRIMARY focus of a post-implementation review is to verify that:
IT disaster recovery time objectives (RTOs) should be based on the:
To develop meaningful recommendations 'or findings, which of the following is MOST important 'or an IS auditor to determine and understand?
An organization has recently implemented a Voice-over IP (VoIP) communication system. Which ot the following should be the IS auditor's PRIMARY concern?
Which of the following is the BEST source of information tor an IS auditor to use when determining whether an organization's information security policy is adequate?
Which of the following conditions would be of MOST concern to an IS auditor assessing the risk of a successful brute force attack against encrypted data at test?
Which of the following would provide the MOST important input during the planning phase for an audit on the implementation of a bring your own device (BYOD) program?
Which of the following provides the MOST assurance over the completeness and accuracy ol loan application processing with respect to the implementation of a new system?
During an audit of a financial application, it was determined that many terminated users' accounts were not disabled. Which of the following should be the IS auditor's NEXT step?
Which of the following is the BEST indicator of the effectiveness of signature-based intrusion detection systems (lDS)?
An IS audit learn is evaluating the documentation related to the most recent application user-access review performed by IT and business management It is determined that the user list was not system-generated. Which of the following should be the GREATEST concern?
Which of the following would be an appropriate rote of internal audit in helping to establish an organization's privacy program?
A month after a company purchased and implemented system and performance monitoring software, reports were too large and therefore were not reviewed or acted upon The MOST effective plan of action would be to: