Isaca CISA - Certified Information Systems Auditor
What would be the PRIMARY reason an IS auditor would recommend replacing universal PIN codes with an RFID access card system at a data center?
During the review of a system disruption incident, an IS auditor notes that IT support staff were put in a position to make decisions beyond their level of authority.
Which of the following is the BEST recommendation to help prevent this situation in the future?
Which of the following is the MOST important consideration for a contingency facility?
An organization considering the outsourcing of a business application should FIRST:
In an environment where data virtualization is used, which of the following provides the BEST disaster recovery solution?
Which of the following is the MOST reliable way for an IS auditor to evaluate the operational effectiveness of an organization's data loss prevention (DLP) controls?
The following findings are the result of an IS auditor's post-implementation review of a newly implemented system. Which of the following findings is of GREATEST significance?
Which of the following methods would BEST help detect unauthorized disclosure of confidential documents sent over corporate email?
Which of the following controls is MOST important for ensuring the integrity of system interfaces?
An organization is concerned about duplicate vendor payments on a complex system with a high volume of transactions. Which of the following would be MOST helpful to an IS auditor to determine whether duplicate vendor payments exist?
When reviewing an IT strategic plan, the GREATEST concern would be that
During a database management evaluation an IS auditor discovers that some accounts with database administrator (DBA) privileges have been assigned a default password with an unlimited number of failed login attempts Which of the following is the auditor's BEST course of action?
Which of the following testing methods is MOST appropriate for assessing whether system integrity has been maintained after changes have been made?
Which of the following is the PRIMARY reason for an IS audit manager to review the work performed by a senior IS auditor prior to presentation of a report?
Which of the following risk scenarios is BEST addressed by implementing policies and procedures related to full disk encryption?
When auditing the feasibility study of a system development project, the IS auditor should:
A bank has a combination of corporate customer accounts (higher monetary value) and small business accounts (lower monetary value) as part of online banking. Which of the following is the BEST sampling approach for an IS auditor to use for these accounts?
Which of the following is the GREATEST advantage of vulnerability scanning over penetration testing?
A web proxy server for corporate connections to external resources reduces organizational risk by:
When auditing the closing stages of a system development protect which of the following should be the MOST important consideration?
A financial group recently implemented new technologies and processes, Which type of IS audit would provide the GREATEST level of assurance that the department's objectives have been met?
The PRIMARY responsibility of a project steering committee is to:
To ensure confidentiality through the use of asymmetric encryption, a message is encrypted with which of the following?
Which of the following would present the GREATEST concern during a review of internal audit quality assurance (QA) and continuous improvement processes?
During an external review, an IS auditor observes an inconsistent approach in classifying system criticality
within the organization. Which of the following should be recommended as the PRIMARY factor to
determine system criticality?
Audit observations should be FIRST communicated with the auditee:
An IS auditor is reviewing the service agreement with a technology company that provides IT help desk services to the organization. Which of the following monthly performance
metrics is the BEST indicator of service quality?
What is the PRIMARY reason for an organization to classify the data stored on its internal networks?
Which of the following is the GREATEST advantage of outsourcing the development of an e-banking solution when in-house technical expertise is not available?
A business has requested an audit to determine whether information stored in an application is adequately protected. Which of the following is the MOST important action before the audit work begins?
Which of the following findings would be of GREATEST concern to an IS auditor assessing an organization's patch management process?
Which of the following should be done FIRST when planning to conduct internal and external penetration testing for a client?
An IS auditor has been tasked with auditing the inventory control process for a large organization that processes millions of data transactions. Which of the following is the BEST testing strategy to adopt?
Which of the following is the PRIMARY reason for an IS auditor to perform a risk assessment?
Secure code reviews as part of a continuous deployment program are which type of control?
Which of the following is the BEST control to prevent the transfer of files to external parties through instant messaging (IM) applications?
An organization has outsourced its data processing function to a service provider. Which of the following would BEST determine whether the service provider continues to meet the organization s objectives?
Management has requested a post-implementation review of a newly implemented purchasing package to determine to what extent business requirements are being met. Which of the following is MOST likely to be assessed?
An organizations audit charier PRIMARILY:
Prior to a follow-up engagement, an IS auditor learns that management has decided to accept a level of residual risk related to an audit finding without remediation. The IS auditor is concerned about management's decision. Which of the following should be the IS auditor's NEXT course of action?
Which of the following is the BEST way to mitigate the impact of ransomware attacks?
An IS auditor finds that firewalls are outdated and not supported by vendors. Which of the following should be the auditor's NEXT course of action?
Which of the following is the MOST effective control for protecting the confidentiality and integrity of data stored unencrypted on virtual machines?
An IS auditor is conducting a post-implementation review of an enterprise resource planning (ERP) system. End users indicated concerns with the accuracy of critical automatic calculations made by the system. The auditor's FIRST course of action should be to:
Which of the following would MOST likely impair the independence of the IS auditor when performing a post-implementation review of an application system?
What is MOST important to verify during an external assessment of network vulnerability?
Coding standards provide which of the following?
IS management has recently disabled certain referential integrity controls in the database management system (DBMS) software to provide users increased query performance. Which of the following controls will MOST effectively compensate for the lack of referential integrity?
Which of the following would BEST facilitate the successful implementation of an IT-related framework?
When determining whether a project in the design phase will meet organizational objectives, what is BEST to compare against the business case?