Isaca CISA - Certified Information Systems Auditor
The FIRST step in an incident response plan is to:
An IS audit reveals that an organization operating in business continuity mode during a pandemic situation has not performed a simulation test of the
business continuity plan (BCP). Which of the following is the auditor's BEST course of action?
An IS auditor has identified deficiencies within the organization's software development life cycle policies. Which of the following should be done NEXT?
Which of the following provides the BE ST method for maintaining the security of corporate applications pushed to employee-owned mobile devices?
An IS auditor discovers a box of hard drives in a secured location that are overdue for physical destruction. The vendor responsible for this task was never made aware of these hard drives.
Which of the following is the BEST course of action to address this issue?
An IS auditor reviewing the database controls for a new e-commerce system discovers a security weakness in the database configuration. Which of the following should be the IS auditor's NEXT course of action?
Which of the following would be of GREATEST concern to an IS auditor reviewing an IT strategy document?
When planning a follow-up, the IS auditor is informed by operational management that recent organizational changes have addressed the previously identified risk and implementing the action plan is no longer necessary. What should the auditor do NEXT?
Which of the following metrics is the BEST indicator of the performance of a web application
During the review of a system disruption incident, an IS auditor notes that IT support staff were put in a position to make decisions beyond their level of authority.
Which of the following is the BEST recommendation to help prevent this situation in the future?
During a project audit, an IS auditor notes that project reporting does not accurately reflect current progress. Which of the following is the GREATEST resulting impact?
Which of the following BEST facilitates strategic program management?
An organization's senior management thinks current security controls may be excessive and requests an IS auditor's advice on how to assess the adequacy of current measures. What is the auditor's BEST recommendation to management?
Which of the following should be identified FIRST during the risk assessment process?
Which of the following is MOST critical to the success of an information security program?
Which of the following is the BEST way to identify whether the IT help desk is meeting service level agreements (SLAS)?
Which of the following is the MAIN risk associated with adding a new system functionality during the development phase without following a project change
management process?
Which of the following is the BEST way to ensure an organization's data classification policies are preserved during the process of data transformation?
An organization considering the outsourcing of a business application should FIRST:
Which of the following is the BEST point in time to conduct a post-implementation review?
Which type of control is being implemented when a biometric access device is installed at the entrance to a facility?
The record-locking option of a database management system (DBMS) serves to.
Which of the following should be the FIRST step in a data migration project?
An IS auditor found that a company executive is encouraging employee use of social networking sites for business purposes. Which of the following recommendations would BEST help to reduce the risk of data leakage?
An IS auditor has learned that access privileges are not periodically reviewed or updated. Which of the following would provide the BEST evidence to determine whether transactions have been executed by authorized employees?
What would be the PRIMARY reason an IS auditor would recommend replacing universal PIN codes with an RFID access card system at a data center?
In which of the following sampling methods is the entire sample considered to be irregular if a single error is found?
Which of the following is the GREATEST risk when relying on reports generated by end-user computing (EUC)?
Which of the following is the MOST significant impact to an organization that does not use an IT governance framework?
During an audit, the IS auditor finds that in many cases excessive rights were not removed from a system. Which of the following is the auditor's BEST recommendation?
Which of the following provides the GREATEST assurance that a middleware application compiling data from multiple sales transaction databases for forecasting is operating effectively?
Which of the following controls is MOST important for ensuring the integrity of system interfaces?
Which of the following is BEST used for detailed testing of a business application's data and configuration files?
If a source code is not recompiled when program changes are implemented, which of the following is a compensating control to ensure synchronization of source and object?
Which of the following is MOST helpful to an IS auditor reviewing the alignment of planned IT budget with the organization's goals and strategic objectives?
Which of the following observations should be of GREATEST concern to an IS auditor performing an audit of change and release management controls for a new complex system developed by a small in-house IT team?
An organization has recently become aware of a pervasive chip-level security vulnerability that affects all of its processors. Which of the following is the BEST way to prevent this vulnerability from being exploited?
Which of the following responses to risk associated with segregation of duties would incur the LOWEST initial cost?
An IT strategic plan that BEST leverages IT in achieving organizational goals will include:
Which of the following responsibilities of an organization's quality assurance (QA) function should raise concern for an IS auditor?
An IS auditor has been tasked with auditing the inventory control process for a large organization that processes millions of data transactions. Which of the following is the BEST testing strategy to adopt?
An IS auditor finds that periodic reviews of read-only users for a reporting system are not being performed. Which of the following should be the IS auditor's NEXT course of action?
During an operational audit on the procurement department, the audit team encounters a key system that uses an artificial intelligence (Al) algorithm. The audit team does not have the necessary knowledge to proceed with the audit. Which of the following is the BEST way to handle this situation?
During an audit, an IT finding is agreed upon by all IT teams involved, but no team wants to be responsible for remediation or considers the finding within Its area of responsibility Which of the following is the IS auditor's BEST course of action?
Which of the following is the MOST effective control over visitor access to highly secured areas?
The PRIMARY responsibility of a project steering committee is to:
When reviewing an IT strategic plan, the GREATEST concern would be that
During a review of system access, an IS auditor notes that an employee who has recently changed roles within the organization still has previous access rights. The auditor's NEXT step should be to:
Which type of attack targets security vulnerabilities in web applications to gain access to data sets?
Which of the following provides the MOST protection against emerging threats?