Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Isaca CISA - Certified Information Systems Auditor

Page: 7 / 9
Total 1453 questions

Which of the following is the PRIMARY function of a data loss prevention (DLP) policy when implemented in an organization's DLP solution?

A.

To encrypt sensitive data at rest and in transit

B.

To define rules for monitoring and protecting sensitive data

C.

To define rules and baselines for network performance

D.

To detect and block incoming network traffic

Which of the following metrics is MOST helpful for evaluating the effectiveness of problem management practices?

A.

The number of recurring incidents that cause downtime

B.

The percentage of incidents resolved within a service level agreement (SLA)

C.

The number of incidents investigated and diagnosed

D.

The average time to detect and prioritize an incident

A post-implementation audit has been completed for the deployment of a sophisticated job scheduling tool Which of the following observations would be of GREATEST concern?

A.

The IT learn customized tool settings without seeking approval from the provider.

B.

The overall project took longer to complete than planned.

C.

The data encryption setting is not enabled in the scheduling tool.

D.

The IT team accesses the scheduler admin panel via a generic account.

What should be the PRIMARY focus during a review of a business process improvement project?

A.

Business project plan

B.

Continuous monitoring plans

C.

The cost of new controls

D.

Business impact

Which of the following is the BEST way to mitigate risk to an organization's network associated with devices permitted under a bring your own device (BYOD) policy?

A.

Require personal devices to be reviewed by IT staff.

B.

Enable port security on all network switches.

C.

Implement a network access control system.

D.

Ensure the policy requires antivirus software on devices.

Which of the following is the GREATEST benefit of an effective data classification process?

A.

Data custodians are identified.

B.

Data retention periods are well defined

C.

Data is protected according to its sensitivity

D.

Appropriate ownership over data is assigned

Which of the following is the BEST reason for software developers to use automated testing versus manual testing?

A.

CAATs are easily developed

B.

Improved regression testing

C.

Ease of maintaining automated test scripts

D.

Reduces the scope of acceptance testing

In reviewing the IT strategic plan, the IS auditor should consider whether it identifies the:

A.

allocation of IT staff.

B.

project management methodologies used.

C.

major IT initiatives.

D.

links to operational tactical plans.

Which of the following tasks would cause the GREATEST segregation of duties (SoD) concern if performed by the person who reconciles the organization's device inventory?

A.

Tracking devices used for spare parts

B.

Creating the device policy

C.

vIssuing devices to employees

D.

Approving the issuing of devices

Which of the following is the GREATEST risk associated with security patches being automatically downloaded and applied to production servers?

A.

Supporting documentation is not updated.

B.

Anti-malware is disabled during patch installation.

C.

Patches may be installed regardless of their criticality.

D.

Patches may result in major service failures.

When planning a review of IT governance, an IS auditor is MOST likely to:

A.

assess whether business process owner responsibilities are consistent.

B.

obtain information about the control framework adopted by management.

C.

examine audit committee minutes for IT-related controls.

D.

define key performance indicators (KPIs).

A new system development project is running late against a critical implementation deadline. Which of the following is the MOST important activity?

A.

Ensure that code has been reviewed.

B.

Perform user acceptance testing (UAT).

C.

Document last-minute enhancements.

D.

Perform a pre-implementation audit.

A job is scheduled to transfer data from a transactional system database to a data lake for reporting purposes. Which of the following would be of GREATEST concern to an IS auditor?

A.

The inventory of scheduled jobs is not periodically reviewed

B.

Automated support ticket creation has not been implemented for job failures and errors

C.

Access to scheduling changes is restricted to job operators

D.

Notification alerts are configured to be sent to a support distribution group

Which of the following findings would be of GREATEST concern when auditing an organization's end-user computing (EUC)?

A.

Errors flowed through to financial statements

B.

Reduced oversight by the IT department

C.

Inconsistency of patching processes being followed

D.

Inability to monitor EUC audit logs and activities

Which of the following would BEST prevent an arbitrary application of a patch?

A.

Database access control

B.

Established maintenance windows

C.

Network based access controls

D.

Change management

An organization allows programmers to change production systems in emergency situations without seeking prior approval. Which of the following controls should an IS auditor consider MOST

important?

A.

Programmers' subsequent reports

B.

Limited number of super users

C.

Operator logs

D.

Automated log of changes

An IS auditor reviewing an information processing environment decides to conduct external penetration testing. Which of the following is MOST appropriate to include in the audit scope for the organization to distinguish between the auditor's penetration attacks and actual attacks?

A.

Restricted host IP addresses of simulated attacks

B.

Testing techniques of simulated attacks

C.

Source IP addresses of simulated attacks

D.

Timing of simulated attacks

Having knowledge in which of the following areas is MOST relevant for an IS auditor reviewing public key infrastructure (PKI)?

A.

Design and application of key controls in public audit

B.

Security strategy in public cloud Infrastructure as a Service (IaaS)

C.

Modern encoding methods for digital communications

D.

Technology and process life cycle for digital certificates and key pairs

The PRIMARY reason to assign data ownership for protection of data is to establish:

A.

reliability.

B.

traceability.

C.

authority,

D.

accountability.

Which of the following should an IS auditor recommend be done FIRST when an organization is planning to implement an IT compliance program?

A.

Identify staff training needs related to compliance requirements.

B.

Analyze historical compliance-related audit findings.

C.

Research and purchase an industry-recognized IT compliance tool

D.

Identify applicable laws, regulations, and standards.

An incident response team has been notified of a virus outbreak in a network subnet. Which of the following should be the NEXT step?

A.

Focus on limiting the damage.

B.

Remove and restore the affected systems.

C.

Verify that the compromised systems are fully functional.

D.

Document the incident.

Which of the following is the MOST likely root cause of shadow IT in an organization?

A.

Lengthy approval for technology investment

B.

The opportunity to reduce software license fees

C.

Ease of use for cloud-based applications and services

D.

Approved software not meeting user requirements

A sample for testing must include the 80 largest client balances and a random sample of the rest. What should the IS auditor recommend?

A.

Query the database.

B.

Develop an integrated test facility (ITF).

C.

Use generalized audit software.

D.

Leverage a random number generator.

An IS auditor is reviewing an organization's incident management processes. Which of the following observations should be the auditor's GREATEST concern?

A.

Ineffective incident detection

B.

Ineffective incident dashboard

C.

Ineffective incident classification

D.

Ineffective post-incident review

During a pre-implementation review, an IS auditor notes that some scenarios have not been tested. Management has indicated that the project is critical and cannot be postponed. Which of the following is the auditor's BEST course of action?

A.

Determine whether the tested scenarios covered the most significant project risks.

B.

Help management complete remaining scenario testing before implementation.

C.

Recommend project implementation be postponed until all scenarios have been tested.

D.

Perform remaining scenario testing in the production environment post implementation.

Which of the following should be of MOST concern to an IS auditor reviewing an organization’s business impact analysis (BIA)?

A.

A risk assessment was not conducted prior to completing the BIA.

B.

System criticality information was only provided by the IT manager.

C.

A questionnaire was used to gather information as opposed to in-person interviews.

D.

The BIA was not signed off by executive management.

What type of control has been implemented when secure code reviews are conducted as part of a deployment program?

A.

Monitoring

B.

Deterrent

C.

Detective

D.

Corrective

Which of the following is found in an audit charter?

A.

The process of developing the annual audit plan

B.

The authority given to the audit function

C.

Required training for audit staff

D.

Audit objectives and scope

Which of the following parameters reflects the risk threshold for an organization experiencing a service disruption?

A.

Maximum tolerable outage (MTO)

B.

Recovery point objective (RPO)

C.

Service delivery objective (SDO)

D.

Allowable interruption window (AIW)

Which of the following is the MAIN objective of enterprise architecture (EA) governance?

A.

To ensure new processes and technologies harmonize with existing processes

B.

To ensure the EA can adapt to emerging technology trends

C.

To ensure the EA is compliant with local laws and regulations

D.

To ensure new initiatives produce an acceptable return on investment (ROI)

Which of the following BEST facilitates the successful implementation of IT performance monitoring?

A.

Determining goals for IT resources and processes

B.

Identifying tools to automate performance measurement

C.

Establishing templates for periodic reporting to management

D.

Adopting global standards and measurement norms

Which of the following BEST demonstrates alignment of the IT department with the corporate mission?

A.

Analysis of IT department functionality

B.

Biweekly reporting to senior management

C.

Annual board meetings

D.

Quarterly steering committee meetings

An IS auditor has been asked to review an event log aggregation system to ensure risk management practices have been applied. Which of the following should be of MOST concern to the auditor?

A.

Log feeds are uploaded via batch process.

B.

Completeness testing has not been performed on the log data.

C.

The log data is not normalized.

D.

Data encryption standards have not been considered.

Which of the following is the BEST preventive control to protect the confidentiality of data on a corporate smartphone in the event it is lost?

A.

Biometric authentication for the device

B.

Remote data wipe program

C.

Encryption of the data stored on the device

D.

Password for device authentication

Which of the following provides the BEST evidence that all elements of a business continuity plan (BCP) are operating effectively?

A.

Walk-through test results

B.

Full operational test results

C.

Tabletop test results

D.

Simulation test results

During an IS audit of a data center, it was found that programmers are allowed to make emergency fixes to operational programs. Which of the following should be the IS auditor's PRIMARY recommendation?

A.

Programmers should be allowed to implement emergency fixes only after obtaining verbal agreement from the application owner.

B.

Emergency program changes should be subject to program migration and testing procedures before they are applied to operational systems.

C.

Bypass user ID procedures should be put in place to ensure that the changes are subject to after-the-event approval and testing.

An organization is implementing a new data loss prevention (DLP) tool. Which of the following will BEST enable the organization to reduce false positive alerts?

A.

Using the default policy and tool rule sets

B.

Configuring a limited set of rules

C.

Deploying the tool in monitor mode

D.

Reducing the number of detection points

Which of the following observations should be of GREATEST concern to an IS auditor reviewing an organization's enterprise architecture (EA) program?

A.

IT application owners have sole responsibility for architecture approval.

B.

The architecture review board is chaired by the CIO.

C.

Information security requirements are reviewed by the EA program.

D.

The EA program governs projects that are not IT-related.

An IS auditor has been tasked to review the processes that prevent fraud within a business expense claim system. Which of the following stakeholders is MOST important to involve in this review?

A.

Information security manager

B.

Quality assurance (QA) manager

C.

Business department executive

D.

Business process owner

A data center's physical access log system captures each visitor's identification document numbers along with the visitor's photo. Which of the following sampling methods would be MOST useful to an IS auditor conducting compliance testing for the effectiveness of the system?

A.

Quota sampling

B.

Haphazard sampling

C.

Attribute sampling

D.

Variable sampling

Afire alarm system has been installed in the computer room The MOST effective location for the fire alarm control panel would be inside the

A.

computer room closest to the uninterruptible power supply (UPS) module

B.

computer room closest to the server computers

C.

system administrators’ office

D.

booth used by the building security personnel

Which of the following is a method to prevent disclosure of classified documents printed on a shared printer?

A.

Using passwords to allow authorized users to send documents to the printer

B.

Requiring a key code to be entered on the printer to produce hard copy

C.

Encrypting the data stream between the user's computer and the printer

D.

Producing a header page with classification level for printed documents

Which of the following is the BEST way to address potential data privacy concerns associated with inadvertent disclosure of machine identifier information contained within security logs?

A.

Unit the use of logs to only those purposes for which they were collected

B.

Restrict the transfer of log files from host machine to online storage

C.

Only collect logs from servers classified as business critical

D.

Limit log collection to only periods of increased security activity

Backup procedures for an organization's critical data are considered to be which type of control?

A.

Directive

B.

Corrective

C.

Detective

D.

Compensating

An organization is planning to implement a work-from-home policy that allows users to work remotely as needed. Which of the following is the BEST solution for ensuring secure remote access to corporate resources?

A.

Additional firewall rules

B.

Multi-factor authentication

C.

Virtual private network (VPN)

D.

Virtual desktop

As part of the architecture of virtualized environments, in a bare metal or native visualization the hypervisor runs without:

A.

a host operating system.

B.

a guest operating system.

C.

any applications on the guest operating system.

D.

any applications on the host operating system.

One advantage of monetary unit sampling is the fact that

A.

results are stated m terms of the frequency of items in error

B.

it can easily be applied manually when computer resources are not available

C.

large-value population items are segregated and audited separately

D.

it increases the likelihood of selecting material items from the population

Which of the following should be of GREATEST concern to an IS auditor conducting an audit of an organization that recently experienced a ransomware attack?

A.

Antivirus software was unable to prevent the attack even though it was properly updated

B.

The most recent security patches were not tested prior to implementation

C.

Backups were only performed within the local network

D.

Employees were not trained on cybersecurity policies and procedures

Which of the following should be of GREATEST concern to an IS auditor assessing the effectiveness of an organization's vulnerability scanning program''

A.

Steps taken to address identified vulnerabilities are not formally documented

B.

Results are not reported to individuals with authority to ensure resolution

C.

Scans are performed less frequently than required by the organization's vulnerability scanning schedule

D.

Results are not approved by senior management

An organization is concerned with meeting new regulations for protecting data confidentiality and asks an IS auditor to evaluate their procedures for transporting data. Which of the

following would BEST support the organization's objectives?

A.

Cryptographic hashes

B.

Virtual local area network (VLAN)

C.

Encryption

D.

Dedicated lines