Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Isaca CISA - Certified Information Systems Auditor

Page: 6 / 9
Total 1453 questions

The BEST way to provide assurance that a project is adhering to the project plan is to:

A.

require design reviews at appropriate points in the life cycle.

B.

have an IS auditor participate on the steering committee.

C.

have an IS auditor participate on the quality assurance (QA) team.

D.

conduct compliance audits at major system milestones.

An organization has partnered with a third party to transport backup drives to an offsite storage facility. Which of the following is MOST important before sending the drives?

A.

Creating a chain of custody to accompany the drive in transit

B.

Ensuring data protection is aligned with the data classification policy

C.

Encrypting the drive with strong protection standards

D.

Ensuring the drive is placed in a tamper-evident mechanism

The record-locking option of a database management system (DBMS) serves to.

A.

eliminate the risk of concurrent updates to a record

B.

allow database administrators (DBAs) to record the activities of users.

C.

restrict users from changing certain values within records.

D.

allow users to lock others out of their files.

An IS auditor should be MOST concerned if which of the following fire suppression systems is utilized to protect an asset storage closet?

A.

Deluge system

B.

Wet pipe system

C.

Preaction system

D.

CO2 system

An IS audit manager is reviewing workpapers for a recently completed audit of the corporate disaster recovery test. Which of the following should the IS audit manager specifically review to substantiate the conclusions?

A.

Overviews of interviews between data center personnel and the auditor

B.

Prior audit reports involving other corporate disaster recovery audits

C.

Summary memos reflecting audit opinions regarding noted weaknesses

D.

Detailed evidence of the successes and weaknesses of all contingency testing

To reduce operational costs, IT management plans to reduce the number of servers currently used to run business applications. Which of the following is MOST helpful to review when identifying which servers are no longer required?

A.

Performance feedback from the user community

B.

Contract with the server vendor

C.

Server CPU usage trends

D.

Mean time between failure (MTBF) of each server

Which of the following helps to ensure the integrity of data for a system interface?

A.

System interface testing

B.

user acceptance testing (IJAT)

C.

Validation checks

D.

Audit logs

An IS auditor is providing input to an RFP to acquire a financial application system. Which of the following is MOST important for the auditor to recommend?

A.

The application should meet the organization's requirements.

B.

Audit trails should be included in the design.

C.

Potential suppliers should have experience in the relevant area.

D.

Vendor employee background checks should be conducted regularly.

Which of the following would the IS auditor MOST likely review to determine whether modifications to the operating system parameters were authorized?

A.

Documentation of exit routines

B.

System initialization logs

C.

Change control log

D.

Security system parameters

Which of the following is the BEST way for management to ensure the effectiveness of the cybersecurity incident response process?

A.

Periodic reporting of cybersecurity incidents to key stakeholders

B.

Periodic update of incident response process documentation

C.

Periodic cybersecurity training for staff involved in incident response

D.

Periodic tabletop exercises involving key stakeholders

Stress testing should ideally be carried out under a:

A.

test environment with production workloads.

B.

test environment with test data.

C.

production environment with production workloads.

D.

production environment with test data.

Which of the following is the BEST reason to implement a data retention policy?

A.

To establish a recovery point objective (RPO) for disaster recovery procedures

B.

To limit the liability associated with storing and protecting information

C.

To document business objectives for processing data within the organization

D.

To assign responsibility and ownership for data protection outside IT

An IT strategic plan that BEST leverages IT in achieving organizational goals will include:

A.

a comparison of future needs against current capabilities.

B.

a risk-based ranking of projects.

C.

enterprise architecture (EA) impacts.

D.

IT budgets linked to the organization's budget.

An IS auditor is reviewing an organization's business intelligence infrastructure. The BEST recommendation to help the organization achieve a reasonable level of data quality would be to:

A.

review data against data classification standards.

B.

outsource data cleansing to skilled service providers.

C.

consolidate data stored across separate databases into a warehouse.

D.

analyze the data against predefined specifications.

An organization's senior management thinks current security controls may be excessive and requests an IS auditor's advice on how to assess the adequacy of current measures. What is the auditor's BEST recommendation to management?

A.

Perform correlation analysis between incidents and investments.

B.

Downgrade security controls on low-risk systems.

C.

Introduce automated security monitoring tools.

D.

Re-evaluate the organization's risk and control framework.

An IS auditor is conducting a physical security audit of a healthcare facility and finds closed-circuit television (CCTV) systems located in a patient care area. Which of the following is the GREATEST concern?

A.

Cameras are not monitored 24/7.

B.

There are no notices indicating recording IS in progress.

C.

The retention period for video recordings is undefined

D.

There are no backups of the videos.

Several unattended laptops containing sensitive customer data were stolen from personnel offices Which of the following would be an IS auditor's BEST recommendation to protect data in case of recurrence?

A.

Encrypt the disk drive.

B.

Require two-factor authentication

C.

Enhance physical security

D.

Require the use of cable locks

When reviewing the disaster recovery strategy, IT management identified an application that requires a short recovery point objective (RPO). Which of the following data restoration strategies would BEST enable the organization to meet this objective?

A.

Snapshots

B.

Mirroring

C.

Log shipping

D.

Data backups

Which of the following security testing techniques is MOST effective for confirming that inputs to a web application have been properly sanitized?

A.

SQL injection

B.

Fuzzing

C.

Brute force

D.

Password spraying

The business case for an information system investment should be available for review until the:

A.

information system investment is retired.

B.

information system has reached end of life.

C.

formal investment decision is approved.

D.

benefits have been fully realized.

An IS auditor observes that an organization's systems are being used for cryptocurrency mining on a regular basis. Which of the following is the auditor's FIRST course of action?

A.

Report the incident immediately.

B.

Recommend changing the organization's firewall settings.

C.

Consult the organization's acceptable use policy.

D.

Require mining software to be uninstalled.

Data is being transferred from an application database to a data warehouse. Some fields were not picked up in the extraction process and therefore were not transferred to the data warehouse. Which of the following is the GREATEST risk associated with this situation?

A.

Management reporting could be delayed.

B.

Transaction errors may occur within the application.

C.

Management decisions may be based on incomplete data.

D.

Data that was transferred to the warehouse may not be accurate.

An organization offers an e-commerce platform that allows consumer-to-consumer transactions. The platform now uses blockchain technology to ensure the parties are unable to deny the transactions. Which of the following attributes BEST describes the risk element that this technology is addressing?

A.

Integrity

B.

Nonrepudiation

C.

Confidentiality

D.

Availability

Which of the following provides the BEST assurance that vendor-supported software remains up to date?

A.

Release and patch management

B.

Licensing agreement and escrow

C.

Software asset management

D.

Version management

Which of the following is MOST helpful for understanding an organization’s key driver to modernize application platforms?

A.

Vendor software inventories

B.

Network architecture diagrams

C.

System-wide incident reports

D.

Inventory of end-of-life software

Which of the following controls is BEST implemented through system configuration?

    Network user accounts for temporary workers expire after 90 days.

    Application user access is reviewed every 180 days for appropriateness.

    Financial data in key reports is traced to source systems for completeness and accuracy.

A.

Computer operations personnel initiate batch processing jobs daily.

While reviewing transactions, an IS auditor discovers inconsistencies in a relational database. Which of the following would be the auditor's BEST recommendation?

A.

Update the data dictionary.

B.

Implement edit checks.

C.

Perform data modeling.

D.

Conduct data owner training.

Which of the following is the BEST disposal method for flash drives that previously stored confidential data?

A.

Destruction

B.

Degaussing

C.

Cryptographic erasure

D.

Overwriting

Which of the following is the MOST effective way to detect as many abnormalities as possible during an IS audit?

A.

Conduct a walk-through of the process.

B.

Perform substantive testing on sampled records.

C.

Perform judgmental sampling of key processes.

D.

Use a data analytics tool to identify trends.

Who should be the FIRST to evaluate an audit report prior to issuing it to the project steering committee?

A.

IS audit manager

B.

Audit committee

C.

Business owner

D.

Project sponsor

A review of IT interface controls finds an organization does not have a process to identify and correct records that do not get transferred to the receiving system. Which of the following is the IS

auditor's BEST recommendation?

A.

Enable automatic encryption, decryption, and electronic signing of data files.

B.

Automate the transfer of data between systems as much as is feasible.

C.

Have coders perform manual reconciliation of data between systems.D

D.

Implement software to perform automatic reconciliations of data between systems.

Which of the following is the MOST important course of action to ensure a cloud access security broker (CASB) effectively detects and responds to threats?

A.

Monitoring data movement

B.

Implementing a long-term CASB contract

C.

Reviewing the information security policy

D.

Evaluating firewall effectiveness

Which of the following BEST supports an organization's objective of restricting the use of removable storage devices by users?

A.

Data management policy

B.

Updated anti-malware solutions

C.

Data loss prevention (DLP)

D.

Online monitoring

Which of the following should be of GREATEST concern to an IS auditor reviewing data conversion and migration during the implementation of a new application system?

A.

Backups of the old system and data are not available online

B.

The change management process was not formally documented

C.

Data conversion was performed using manual processes

D.

Unauthorized data modifications occurred during conversion

An organization that has decided to approve the use of end-user computing (EUC) should FIRST ensure:

A.

a business impact analysis (BIA) is conducted.

B.

EUC controls are reviewed.

C.

EUC use cases are assessed and documented.

D.

an EUC policy is developed.

Which of the following should be the PRIMARY consideration when validating a data analytic algorithm that has never been used before?

A.

Enhancing the design of data visualization

B.

Increasing speed and efficiency of audit procedures

C.

Confirming completeness and accuracy

D.

Decreasing the time for data analytics execution

Which of the following is the PRIMARY benefit of operational log management?

A.

It enhances user experience via predictive analysis.

B.

It improves security with real-time monitoring of network data.

C.

It organizes data to identify performance issues.

D.

It supports data aggregation using unified storage.

The MOST important measure of the effectiveness of an organization's security program is the:

A.

comparison with critical incidents experienced by competitors.

B.

number of vulnerability alerts escalated to senior management.

C.

number of new vulnerabilities reported.

D.

adverse impact of incidents on critical business activities.

An organization has moved all of its infrastructure to the cloud. Which of the following would be an IS auditor’s GREATEST concern related to the organization’s ability to continue operations in case of a disaster?

A.

There is no evidence that disaster recovery plan (DRP) testing was performed after the migration.

B.

Only business-critical servers were configured with redundancy services on the cloud service provider.

C.

The previous infrastructure was not retained to support business operations in case of a disaster.

D.

The step-by-step recovery process was not updated in the disaster recovery plan (DRP) after the migration.

If a recent release of a program has to be backed out of production, the corresponding changes within the delta version of the code should be:

A.

filed in production for future reference in researching the problem.

B.

applied to the source code that reflects the version in production.

C.

eliminated from the source code that reflects the version in production.

D.

reinstalled when replacing the version back into production.

An organization plans to centrally decommission end-of-life databases and migrate the data to the latest model of hardware. Which of the following BEST ensures data integrity is preserved during the migration?

A.

Reconciling sample data to most recent backups

B.

Obfuscating confidential data

C.

Encrypting the data

D.

Comparing checksums

When reviewing an organization’s enterprise architecture (EA), which of the following is an IS auditor MOST likely to find within the EA documentation?

A.

Contact information for key resources within the IT department

B.

Detailed encryption standards

C.

Roadmaps showing the evolution from current state to future state

D.

Protocols used to communicate between systems

What should be an IS auditor's PRIMARY focus when reviewing a patch management procedure in an environment where availability is a top priority?

A.

Deployment automation to all servers

B.

Technical skills of the deployment team

C.

Comprehensive testing prior to deployment

D.

Validity certification prior to deployment

Which of the following will BEST ensure that archived electronic information of permanent importance remains accessible over time?

A.

Performing preventive maintenance on old hardware

B.

Acquiring applications that emulate old software

C.

Regularly migrating data to current technology

D.

Periodically backing up archived data

Which of the following is the MOST important privacy consideration for an organization that uses a cloud service provider to process customer data?

A.

Data privacy must be managed in accordance with the regulations applicable to the organization.

B.

Data privacy must be monitored in accordance with industry standards and best practices.

C.

No personal information may be transferred to the service provider without notifying the customer.

D.

Customer data transferred to the service provider must be reported to the regulatory authority.

An IS auditor has been asked to review the quality of data in a general ledger system. Which of the following would provide the auditor with the MOST meaningful results?

A.

Discussion of the largest account values with business owners

B.

Integrity checks against source documentation

C.

System vulnerability assessment

D.

Interviews with system owners and operators

Which of the following should be the GREATEST concern for an IS auditor assessing an organization's disaster recovery plan (DRP)?

A.

The DRP was developed by the IT department.

B.

The DRP has not been tested during the past three years.

C.

The DRP has not been updated for two years.

D.

The DRP does not include the recovery the time objective (RTO) for a key system.

which of the following is a core functionality of a configuration and release management system?

A.

Managing privileged access to databases servers and infrastructure

B.

Identifying vulnerabilities in configuration settings

C.

Deploying a configuration change to the sandbox environment

D.

Identifying other configuration items that will be impacted by a given change

Which of the following poses the GREATEST risk to an organization related to system interfaces?

A.

There is no process documentation for some system interfaces.

B.

Notifications of data transfers through the interfaces are not retained.

C.

Parts of the data transfer process are performed manually.

D.

There is no reliable inventory of system interfaces.

An organization has decided to reengineer business processes to improve the performance of overall IT service delivery. Which of the following recommendations from the project team should be the GREATEST concern to the IS auditor?

A.

Disable operational logging to enhance the processing speed and save storage.

B.

Adopt a service delivery model based on insights from peer organizations.

C.

Delegate business decisions to the chief risk officer (CRO).

D.

Eliminate certain reports and key performance indicators (KPIs)