Isaca CISA - Certified Information Systems Auditor
The BEST way to provide assurance that a project is adhering to the project plan is to:
An organization has partnered with a third party to transport backup drives to an offsite storage facility. Which of the following is MOST important before sending the drives?
The record-locking option of a database management system (DBMS) serves to.
An IS auditor should be MOST concerned if which of the following fire suppression systems is utilized to protect an asset storage closet?
An IS audit manager is reviewing workpapers for a recently completed audit of the corporate disaster recovery test. Which of the following should the IS audit manager specifically review to substantiate the conclusions?
To reduce operational costs, IT management plans to reduce the number of servers currently used to run business applications. Which of the following is MOST helpful to review when identifying which servers are no longer required?
Which of the following helps to ensure the integrity of data for a system interface?
An IS auditor is providing input to an RFP to acquire a financial application system. Which of the following is MOST important for the auditor to recommend?
Which of the following would the IS auditor MOST likely review to determine whether modifications to the operating system parameters were authorized?
Which of the following is the BEST way for management to ensure the effectiveness of the cybersecurity incident response process?
Stress testing should ideally be carried out under a:
Which of the following is the BEST reason to implement a data retention policy?
An IT strategic plan that BEST leverages IT in achieving organizational goals will include:
An IS auditor is reviewing an organization's business intelligence infrastructure. The BEST recommendation to help the organization achieve a reasonable level of data quality would be to:
An organization's senior management thinks current security controls may be excessive and requests an IS auditor's advice on how to assess the adequacy of current measures. What is the auditor's BEST recommendation to management?
An IS auditor is conducting a physical security audit of a healthcare facility and finds closed-circuit television (CCTV) systems located in a patient care area. Which of the following is the GREATEST concern?
Several unattended laptops containing sensitive customer data were stolen from personnel offices Which of the following would be an IS auditor's BEST recommendation to protect data in case of recurrence?
When reviewing the disaster recovery strategy, IT management identified an application that requires a short recovery point objective (RPO). Which of the following data restoration strategies would BEST enable the organization to meet this objective?
Which of the following security testing techniques is MOST effective for confirming that inputs to a web application have been properly sanitized?
The business case for an information system investment should be available for review until the:
An IS auditor observes that an organization's systems are being used for cryptocurrency mining on a regular basis. Which of the following is the auditor's FIRST course of action?
Data is being transferred from an application database to a data warehouse. Some fields were not picked up in the extraction process and therefore were not transferred to the data warehouse. Which of the following is the GREATEST risk associated with this situation?
An organization offers an e-commerce platform that allows consumer-to-consumer transactions. The platform now uses blockchain technology to ensure the parties are unable to deny the transactions. Which of the following attributes BEST describes the risk element that this technology is addressing?
Which of the following provides the BEST assurance that vendor-supported software remains up to date?
Which of the following is MOST helpful for understanding an organization’s key driver to modernize application platforms?
Which of the following controls is BEST implemented through system configuration?
Network user accounts for temporary workers expire after 90 days.
Application user access is reviewed every 180 days for appropriateness.
Financial data in key reports is traced to source systems for completeness and accuracy.
While reviewing transactions, an IS auditor discovers inconsistencies in a relational database. Which of the following would be the auditor's BEST recommendation?
Which of the following is the BEST disposal method for flash drives that previously stored confidential data?
Which of the following is the MOST effective way to detect as many abnormalities as possible during an IS audit?
Who should be the FIRST to evaluate an audit report prior to issuing it to the project steering committee?
A review of IT interface controls finds an organization does not have a process to identify and correct records that do not get transferred to the receiving system. Which of the following is the IS
auditor's BEST recommendation?
Which of the following is the MOST important course of action to ensure a cloud access security broker (CASB) effectively detects and responds to threats?
Which of the following BEST supports an organization's objective of restricting the use of removable storage devices by users?
Which of the following should be of GREATEST concern to an IS auditor reviewing data conversion and migration during the implementation of a new application system?
An organization that has decided to approve the use of end-user computing (EUC) should FIRST ensure:
Which of the following should be the PRIMARY consideration when validating a data analytic algorithm that has never been used before?
Which of the following is the PRIMARY benefit of operational log management?
The MOST important measure of the effectiveness of an organization's security program is the:
An organization has moved all of its infrastructure to the cloud. Which of the following would be an IS auditor’s GREATEST concern related to the organization’s ability to continue operations in case of a disaster?
If a recent release of a program has to be backed out of production, the corresponding changes within the delta version of the code should be:
An organization plans to centrally decommission end-of-life databases and migrate the data to the latest model of hardware. Which of the following BEST ensures data integrity is preserved during the migration?
When reviewing an organization’s enterprise architecture (EA), which of the following is an IS auditor MOST likely to find within the EA documentation?
What should be an IS auditor's PRIMARY focus when reviewing a patch management procedure in an environment where availability is a top priority?
Which of the following will BEST ensure that archived electronic information of permanent importance remains accessible over time?
Which of the following is the MOST important privacy consideration for an organization that uses a cloud service provider to process customer data?
An IS auditor has been asked to review the quality of data in a general ledger system. Which of the following would provide the auditor with the MOST meaningful results?
Which of the following should be the GREATEST concern for an IS auditor assessing an organization's disaster recovery plan (DRP)?
which of the following is a core functionality of a configuration and release management system?
Which of the following poses the GREATEST risk to an organization related to system interfaces?
An organization has decided to reengineer business processes to improve the performance of overall IT service delivery. Which of the following recommendations from the project team should be the GREATEST concern to the IS auditor?