Isaca CISA - Certified Information Systems Auditor
Which of the following BEST enables an organization to improve the visibility of end-user computing (EUC) applications that support regulatory reporting?
Which of the following areas is MOST likely to be overlooked when implementing a new data classification process?
An IS auditor has discovered that a software system still in regular use is years out of date and no longer supported. The auditee has stated that it will take six months until the software is running on the current version. Which of the following is the BEST way to reduce the immediate risk associated with using an unsupported version of the software?
A programmer has made unauthorized changes lo key fields in a payroll system report. Which of the following control weaknesses would have contributed MOST to this problem?
When auditing the closing stages of a system development protect which of the following should be the MOST important consideration?
Which of the following is the BEST methodology to use for estimating the complexity of developing a large business application?
Which of the following should be considered when examining fire suppression systems as part of a data center environmental controls review?
A finance department has a multi-year project to upgrade the enterprise resource planning (ERP) system hosting the general ledger. and in year one, the system version upgrade will be applied. Which of the following should be the PRIMARY focus of the IS auditor reviewing the first year of the project?
An organization outsourced its IS functions to meet its responsibility for disaster recovery, the organization should:
Which of the following is the MOST important factor when an organization is developing information security policies and procedures?
Demonstrated support from which of the following roles in an organization has the MOST influence over information security governance?
Management has learned the implementation of a new IT system will not be completed on time and has requested an audit. Which of the following audit findings should be of GREATEST concern?
Which of the following is the PRIMARY role of key performance indicators (KPIs) in supporting business process effectiveness?
Which of the following should be of GREATEST concern to an |$ auditor reviewing data conversion and migration during the implementation of a newapplication system?
Which of the following is MOST important for an IS auditor to verify when reviewing the use of an outsourcer for disposal of storage media?
Which of the following is the BEST performance indicator for the effectiveness of an incident management program?
A data center's physical access log system captures each visitor's identification document numbers along with the visitor's photo. Which of the following sampling methods would be MOST useful to an IS auditor conducting compliance testing for the effectiveness of the system?
An IS auditor reviewing the throat assessment for a data cantor would be MOST concerned if:
Which of the following provides a new IS auditor with the MOST useful information to evaluate overall IT performance?
Which of the following findings should be of GREATEST concern to an IS auditor assessing the risk associated with end-user computing (EUC) in an organization?
Which of the following is MOST important to determine when conducting an audit Of an organization's data privacy practices?
Which of the following provides the MOST assurance of the integrity of a firewall log?
Backup procedures for an organization's critical data are considered to be which type of control?
Which of the following would be the BEST criteria for monitoring an IT vendor's service levels?
An IS auditor learns a server administration team regularly applies workarounds to address repeated failures of critical data processing services Which of the following would BEST enable the organization to resolve this issue?
Controls related to authorized modifications to production programs are BEST tested by:
Which of the following technologies has the SMALLEST maximum range for data transmission between devices?
Which of the following is the MOST effective control to mitigate against the risk of inappropriate activity by employees?
Which of the following is the BEST way to sanitize a hard disk for reuse to ensure the organization's information cannot be accessed?
A senior auditor is reviewing work papers prepared by a junior auditor indicating that a finding was removed after the auditee said they corrected the problem. Which of the following is the senior auditor s MOST appropriate course of action?
Which of the following is the MOST effective method of destroying sensitive data stored on electronic media?
An organization has established hiring policies and procedures designed specifically to ensure network administrators are well qualified Which type of control is in place?
During a project assessment, an IS auditor finds that business owners have been removed from the project initiation phase. Which of the following should be the auditor's GREATEST concern with this situation?
The PRIMARY purpose of requiring source code escrow in a contractual agreement is to:
An IS auditor is planning an audit of an organization's accounts payable processes. Which of the following controls is MOST important to assess in the audit?
Which audit approach is MOST helpful in optimizing the use of IS audit resources?
When evaluating the design of controls related to network monitoring, which of the following is MOST important for an IS auditor to review?
An IS auditor who was instrumental in designing an application is called upon to review the application. The auditor should:
An IS audit reveals that an organization is not proactively addressing known vulnerabilities. Which of the following should the IS auditor recommend the organization do FIRST?
An IS auditor found that a company executive is encouraging employee use of social networking sites for business purposes. Which of the following recommendations would BEST help to reduce the risk of data leakage?
Which of the following demonstrates the use of data analytics for a loan origination process?
During an incident management audit, an IS auditor finds that several similar incidents were logged during the audit period. Which of the following is the auditor's MOST important course of action?
Which of the following is the MOST effective control for protecting the confidentiality and integrity of data stored unencrypted on virtual machines?
During the discussion of a draft audit report. IT management provided suitable evidence fiat a process has been implemented for a control that had been concluded by the IS auditor as Ineffective. Which of the following is the auditor's BEST action?
Which of the following is the MOST effective control to mitigate unintentional misuse of authorized access?
An IS auditor notes the transaction processing times in an order processing system have significantly increased after a major release. Which of the following should the IS auditor review FIRST?
Which of the following is the MOST effective way to maintain network integrity when using mobile devices?
Documentation of workaround processes to keep a business function operational during recovery of IT systems is a core part of a:
Which of the following is the MOST important reason to implement version control for an end-user computing (EUC) application?
Which of the following is MOST important to ensure when planning a black box penetration test?