Isaca CISA - Certified Information Systems Auditor
Which of the following is the BEST indicator of the effectiveness of an organization's incident response program?
Following a security breach in which a hacker exploited a well-known vulnerability in the domain controller, an IS audit has been asked to conduct a control assessment. the auditor's BEST course of action would be to determine if:
The performance, risks, and capabilities of an IT infrastructure are BEST measured using a:
An IS auditor has been asked to audit the proposed acquisition of new computer hardware. The auditor’s PRIMARY concern Is that:
Which of the following BEST enables the timely identification of risk exposure?
An IS auditor is reviewing security controls related to collaboration tools for a business unit responsible for intellectual property and patents. Which of the following observations should be of MOST concern to the auditor?
A now regulation requires organizations to report significant security incidents to the regulator within 24 hours of identification. Which of the following is the IS auditor’s BEST recommendation to facilitate compliance with the regulation?
Providing security certification for a new system should include which of the following prior to the system's implementation?
The GREATEST benefit of using a polo typing approach in software development is that it helps to:
Which of the following is the GREATEST security risk associated with data migration from a legacy human resources (HR) system to a cloud-based system?
For an organization that has plans to implement web-based trading, it would be MOST important for an IS auditor to verify the organization's information security plan includes:
Which of the following should an IS auditor review FIRST when planning a customer data privacy audit?
Which of the following is the MOST important determining factor when establishing appropriate timeframes for follow-up activities related to audit findings?
Which of the following environments is BEST used for copying data and transformation into a compatible data warehouse format?
An organization was recently notified by its regulatory body of significant discrepancies in its reporting data. A preliminary investigation revealed that the discrepancies were caused by problems with the organization's data quality Management has directed the data quality team to enhance their program. The audit committee has asked internal audit to be advisors to the process. To ensure that management concerns are addressed, which data set should internal audit recommend be reviewed FIRST?
When an IS audit reveals that a firewall was unable to recognize a number of attack attempts, the auditor's BEST recommendation is to place an intrusion detection system (IDS) between the firewall and:
A project team has decided to switch to an agile approach to develop a replacement for an existing business application. Which of the following should an IS auditor do FIRST to ensure the effectiveness of the protect audit?
Which of the following is a detective control?
Which of the following findings should be of GREATEST concern for an IS auditor when auditing the effectiveness of a phishing simu-lation test administered for staff members?
A new system is being developed by a vendor for a consumer service organization. The vendor will provide its proprietary software once system development is completed Which of the following is the MOST important requirement to include In the vendor contract to ensure continuity?
A manager Identifies active privileged accounts belonging to staff who have left the organization. Which of the following is the threat actor In this scenario?
Stress testing should ideally be earned out under a:
Which of the following is an example of a preventative control in an accounts payable system?
Which of the following business continuity activities prioritizes the recovery of critical functions?
Which of the following is the BEST reason for an organization to use clustering?
Which of the following provides IS audit professionals with the BEST source of direction for performing audit functions?
Which of the following must be in place before an IS auditor initiates audit follow-up activities?
An IS auditor is reviewing an organization's primary router access control list. Which of the following should result in a finding?
Which of the following is the PRIMARY reason to follow a configuration management process to maintain application?
The IS quality assurance (OA) group is responsible for:
An IS auditor is reviewing the release management process for an in-house software development solution. In which environment Is the software version MOST likely to be the same as production?
An organization with many desktop PCs is considering moving to a thin client architecture. Which of the following is the MAJOR advantage?
During the implementation of a new system, an IS auditor must assess whether certain automated calculations comply with the regulatory requirements Which of the following is the BEST way to obtain this assurance?
Which of the following would BEST manage the risk of changes in requirements after the analysis phase of a business application development project?
Which of the following is the PRIMARY reason an IS auditor should discuss observations with management before delivering a final report?
Which of the following is the MAIN responsibility of the IT steering committee?
Which of the following should be the FIRST step when developing a data loss prevention (DLP) solution for a large organization?
Which of the following physical controls provides the GREATEST assurance that only authorized individuals can access a data center?
Which of the following approaches will ensure recovery time objectives (RTOs) are met for an organization's disaster recovery plan (DRP)?
An IS auditor determines that the vendor's deliverables do not include the source code for a newly acquired product. To address this issue, which of the following should the auditor recommend be included in the contract?
Which of the following should be the FIRST step in a data migration project?
Which of the following provides the BEST evidence of the validity and integrity of logs in an organization's security information and event management (SIEM) system?
Which of the following is the BEST method to maintain an audit trail of changes made to the source code of a program?
An IS audit reveals an IT application is experiencing poor performance including data inconsistency and integrity issues. What is the MOST likely cause?
An IS auditor is evaluating an enterprise resource planning (ERP) migration from local systems to the cloud. Who should be responsible for the data
classification in this project?
In an organization's feasibility study to acquire hardware to support a new web server, omission of which of the following would be of MOST concern?
An IS auditor learns that an organization's business continuity plan (BCP) has not been updated in the last 18 months and that the organization recently closed a production plant. Which of the following is the auditor's BEST course of action?
Which type of control is being implemented when a biometric access device is installed at the entrance to a facility?
An organization has an acceptable use policy in place, but users do not formally acknowledge the policy. Which of the following is the MOST significant risk from this finding?
Which of the following is the BEST way to identify whether the IT help desk is meeting service level agreements (SLAS)?