Isaca CISA - Certified Information Systems Auditor
Which of the following is the PRIMARY function of a data loss prevention (DLP) policy when implemented in an organization's DLP solution?
Which of the following metrics is MOST helpful for evaluating the effectiveness of problem management practices?
A post-implementation audit has been completed for the deployment of a sophisticated job scheduling tool Which of the following observations would be of GREATEST concern?
What should be the PRIMARY focus during a review of a business process improvement project?
Which of the following is the BEST way to mitigate risk to an organization's network associated with devices permitted under a bring your own device (BYOD) policy?
Which of the following is the GREATEST benefit of an effective data classification process?
Which of the following is the BEST reason for software developers to use automated testing versus manual testing?
In reviewing the IT strategic plan, the IS auditor should consider whether it identifies the:
Which of the following tasks would cause the GREATEST segregation of duties (SoD) concern if performed by the person who reconciles the organization's device inventory?
Which of the following is the GREATEST risk associated with security patches being automatically downloaded and applied to production servers?
When planning a review of IT governance, an IS auditor is MOST likely to:
A new system development project is running late against a critical implementation deadline. Which of the following is the MOST important activity?
A job is scheduled to transfer data from a transactional system database to a data lake for reporting purposes. Which of the following would be of GREATEST concern to an IS auditor?
Which of the following findings would be of GREATEST concern when auditing an organization's end-user computing (EUC)?
Which of the following would BEST prevent an arbitrary application of a patch?
An organization allows programmers to change production systems in emergency situations without seeking prior approval. Which of the following controls should an IS auditor consider MOST
important?
An IS auditor reviewing an information processing environment decides to conduct external penetration testing. Which of the following is MOST appropriate to include in the audit scope for the organization to distinguish between the auditor's penetration attacks and actual attacks?
Having knowledge in which of the following areas is MOST relevant for an IS auditor reviewing public key infrastructure (PKI)?
The PRIMARY reason to assign data ownership for protection of data is to establish:
Which of the following should an IS auditor recommend be done FIRST when an organization is planning to implement an IT compliance program?
An incident response team has been notified of a virus outbreak in a network subnet. Which of the following should be the NEXT step?
Which of the following is the MOST likely root cause of shadow IT in an organization?
A sample for testing must include the 80 largest client balances and a random sample of the rest. What should the IS auditor recommend?
An IS auditor is reviewing an organization's incident management processes. Which of the following observations should be the auditor's GREATEST concern?
During a pre-implementation review, an IS auditor notes that some scenarios have not been tested. Management has indicated that the project is critical and cannot be postponed. Which of the following is the auditor's BEST course of action?
Which of the following should be of MOST concern to an IS auditor reviewing an organization’s business impact analysis (BIA)?
What type of control has been implemented when secure code reviews are conducted as part of a deployment program?
Which of the following is found in an audit charter?
Which of the following parameters reflects the risk threshold for an organization experiencing a service disruption?
Which of the following is the MAIN objective of enterprise architecture (EA) governance?
Which of the following BEST facilitates the successful implementation of IT performance monitoring?
Which of the following BEST demonstrates alignment of the IT department with the corporate mission?
An IS auditor has been asked to review an event log aggregation system to ensure risk management practices have been applied. Which of the following should be of MOST concern to the auditor?
Which of the following is the BEST preventive control to protect the confidentiality of data on a corporate smartphone in the event it is lost?
Which of the following provides the BEST evidence that all elements of a business continuity plan (BCP) are operating effectively?
During an IS audit of a data center, it was found that programmers are allowed to make emergency fixes to operational programs. Which of the following should be the IS auditor's PRIMARY recommendation?
An organization is implementing a new data loss prevention (DLP) tool. Which of the following will BEST enable the organization to reduce false positive alerts?
Which of the following observations should be of GREATEST concern to an IS auditor reviewing an organization's enterprise architecture (EA) program?
An IS auditor has been tasked to review the processes that prevent fraud within a business expense claim system. Which of the following stakeholders is MOST important to involve in this review?
A data center's physical access log system captures each visitor's identification document numbers along with the visitor's photo. Which of the following sampling methods would be MOST useful to an IS auditor conducting compliance testing for the effectiveness of the system?
Afire alarm system has been installed in the computer room The MOST effective location for the fire alarm control panel would be inside the
Which of the following is a method to prevent disclosure of classified documents printed on a shared printer?
Which of the following is the BEST way to address potential data privacy concerns associated with inadvertent disclosure of machine identifier information contained within security logs?
Backup procedures for an organization's critical data are considered to be which type of control?
An organization is planning to implement a work-from-home policy that allows users to work remotely as needed. Which of the following is the BEST solution for ensuring secure remote access to corporate resources?
As part of the architecture of virtualized environments, in a bare metal or native visualization the hypervisor runs without:
One advantage of monetary unit sampling is the fact that
Which of the following should be of GREATEST concern to an IS auditor conducting an audit of an organization that recently experienced a ransomware attack?
Which of the following should be of GREATEST concern to an IS auditor assessing the effectiveness of an organization's vulnerability scanning program''
An organization is concerned with meeting new regulations for protecting data confidentiality and asks an IS auditor to evaluate their procedures for transporting data. Which of the
following would BEST support the organization's objectives?