Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: clap70

CISA Certified Information Systems Auditor Questions and Answers

Questions 4

A web proxy server for corporate connections to external resources reduces organizational risk by:

Options:

A.

anonymizing users through changed IP addresses.

B.

providing multi-factor authentication for additional security.

C.

providing faster response than direct access.

D.

load balancing traffic to optimize data pathways.

Buy Now
Questions 5

An IS audit review identifies inconsistencies in privacy requirements across third-party service provider contracts. Which of the following is the BEST

recommendation to address this situation?

Options:

A.

Suspend contracts with third-party providers that handle sensitive data.

B.

Prioritize contract amendments for third-party providers.

C.

Review privacy requirements when contracts come up for renewal.

D.

Require third-party providers to sign nondisclosure agreements (NDAs).

Buy Now
Questions 6

An IS auditor concludes that an organization has a quality security policy. Which of the following is MOST important to determine next? The policy must be:

Options:

A.

well understood by all employees.

B.

based on industry standards.

C.

developed by process owners.

D.

updated frequently.

Buy Now
Questions 7

An IS auditor has been asked to advise on measures to improve IT governance within the organization. Which at the following is the BEST recommendation?

Options:

A.

Implement key performance indicators (KPIs)

B.

Implement annual third-party audits.

C.

Benchmark organizational performance against industry peers.

D.

Require executive management to draft IT strategy

Buy Now
Questions 8

Which of the following should be the IS auditor ' s PRIMARY focus, when evaluating an organization ' s offsite storage facility?

Options:

A.

Shared facilities

B.

Adequacy of physical and environmental controls

C.

Results of business continuity plan (BCP) test

D.

Retention policy and period

Buy Now
Questions 9

In an annual audit cycle, the audit of an organization ' s IT department resulted in many findings. Which of the following would be the MOST important consideration when planning the next audit?

Options:

A.

Postponing the review until all of the findings have been rectified

B.

Limiting the review to the deficient areas

C.

Verifying that all recommendations have been implemented

D.

Following up on the status of all recommendations

Buy Now
Questions 10

Which of the following would BEST ensure that a backup copy is available for restoration of mission critical data after a disaster ' '

Options:

A.

Use an electronic vault for incremental backups

B.

Deploy a fully automated backup maintenance system.

C.

Periodically test backups stored in a remote location

D.

Use both tape and disk backup systems

Buy Now
Questions 11

A transaction processing system interfaces with the general ledger. Data analytics has identified that some transactions are being recorded twice in the general ledger. While management states a system fix has been implemented, what should the IS auditor recommend to validate the interface is working in the future?

Options:

A.

Perform periodic reconciliations.

B.

Ensure system owner sign-off for the system fix.

C.

Conduct functional testing.

D.

Improve user acceptance testing (UAT).

Buy Now
Questions 12

Which of the following is MOST important to include when developing a business continuity plan (BCP)?

Options:

A.

Criteria for triggering the plan

B.

Details of linked security policies

C.

Details of a comprehensive asset inventory

D.

Plans for addressing all types of threats

Buy Now
Questions 13

Data is being transferred from an application database to a data warehouse. Some fields were not picked up in the extraction process and therefore were not transferred to the data warehouse. Which of the following is the GREATEST risk associated with this situation?

Options:

A.

Management reporting could be delayed.

B.

Transaction errors may occur within the application.

C.

Management decisions may be based on incomplete data.

D.

Data that was transferred to the warehouse may not be accurate.

Buy Now
Questions 14

Which of the following is the BEST way to address segregation of duties issues in an organization with budget constraints?

Options:

A.

Rotate job duties periodically.

B.

Perform an independent audit.

C.

Hire temporary staff.

D.

Implement compensating controls.

Buy Now
Questions 15

Data centers that want to prevent unauthorized personnel from entering during a power outage should ensure external access doors:

Options:

A.

Have physical key backup.

B.

Operate in fail-safe mode.

C.

Operate in fail-secure mode.

D.

Are alarmed and monitored.

Buy Now
Questions 16

Which of the following is the PRIMARY reason for an IS auditor to perform a risk assessment?

Options:

A.

It helps to identify areas with a relatively high probability of material problems.

B.

It provides a basis for the formulation of corrective action plans.

C.

It increases awareness of the types of management actions that may be inappropriate

D.

It helps to identify areas that are most sensitive to fraudulent or inaccurate practices

Buy Now
Questions 17

Following the sale of a business division, employees will be transferred to a new organization, but they will retain access to IT equipment from the previous employer. An IS auditor has recommended that both organizations agree to and document an acceptable use policy for the equipment. What type of control has been recommended?

Options:

A.

Detective control

B.

Preventive control

C.

Directive control

D.

Corrective control

Buy Now
Questions 18

Which of the following should be of GREATEST concern to an IS auditor reviewing an organization ' s business continuity plan (BCP)?

Options:

A.

The BCP ' s contact information needs to be updated

B.

The BCP is not version controlled.

C.

The BCP has not been approved by senior management.

D.

The BCP has not been tested since it was first issued.

Buy Now
Questions 19

Some control activities have been found to be only partially compliant with the design of the control. Which of the following is an IS auditor’s PRIMARY course of action?

Options:

A.

Recommend redesigning control activities to ensure acceptance by users.

B.

Evaluate the impact of the partial compliance.

C.

Discuss partial compliance with control owners.

D.

Include each instance of partial compliance as a finding in the final audit report.

Buy Now
Questions 20

Job scheduling impacts system availability and reliability by:

Options:

A.

Reducing system downtime.

B.

Ensuring flexibility and scalability.

C.

Optimizing resource utilization.

D.

Decreasing system complexity.

Buy Now
Questions 21

Which of the following non-audit activities may impair an IS auditor ' s independence and objectivity?

Options:

A.

Evaluating a third-party customer satisfaction survey

B.

Providing advice on an IT project management framework

C.

Designing security controls for a new cloud-based workforce management system

D.

Reviewing secure software development guidelines adopted by an organization

Buy Now
Questions 22

A hearth care organization utilizes Internet of Things (loT) devices to improve patient outcomes through real-time patient monitoring and advanced diagnostics. Which of the following would BEST assist in isolating these devices from corporate network traffic?

Options:

A.

Internal firewalls

B.

Blockchain technology

C.

Content filtering proxy

D.

Zero Trust architecture

Buy Now
Questions 23

Attribute sampling is BEST suited to estimate:

Options:

A.

the true monetary value of a population.

B.

the total error amount in the population.

C.

the degree of compliance with approved procedures

D.

standard deviation from the mean.

Buy Now
Questions 24

Which of the following is the BEST way to enforce the principle of least privilege on a server containing data with different security classifications?

Options:

A.

Limiting access to the data files based on frequency of use

B.

Obtaining formal agreement by users to comply with the data classification policy

C.

Applying access controls determined by the data owner

D.

Using scripted access control lists to prevent unauthorized access to the server

Buy Now
Questions 25

Which of the following backup methods is MOST appropriate when storage space is limited?

Options:

A.

Incremental backups

B.

Mirror backups

C.

Full backups

D.

Annual backups

Buy Now
Questions 26

Which of the following should be used to evaluate an IT development project before an investment is committed?

Options:

A.

Earned value analysis (EVA)

B.

Rapid application development

C.

Function point analysis

D.

Feasibility study

Buy Now
Questions 27

Which of the following is the PRIMARY reason for using a digital signature?

Options:

A.

Provide availability to the transmission

B.

Authenticate the sender of a message

C.

Provide confidentiality to the transmission

D.

Verify the integrity of the data and the identity of the recipient

Buy Now
Questions 28

Which of the following should be an IS auditor ' s GREATEST concern when assessing an IT service configuration database?

Options:

A.

The database is read-accessible for all users.

B.

The database is write-accessible for all users.

C.

The database is not encrypted at rest.

D.

The database is executable for all users.

Buy Now
Questions 29

Which of the following risks is BEST mitigated by implementing an automated three-way match?

Options:

A.

Inaccurate customer records

B.

Purchase order delays

C.

lnaccurate customer discounts

D.

Invalid payment processing

Buy Now
Questions 30

Which of the following BEST enables the effectiveness of an agile project for the rapid development of a new software application?

Options:

A.

Project segments are established.

B.

The work is separated into phases.

C.

The work is separated into sprints.

D.

Project milestones are created.

Buy Now
Questions 31

The process of applying a hash function to a message and obtaining and ciphering a digest refers to:

Options:

A.

digital certificates.

B.

digital signatures.

C.

public key infrastructure (PKI).

D.

authentication.

Buy Now
Questions 32

A new regulation has been enacted that mandates specific information security practices for the protection of customer data. Which of the following is MOST useful for an IS auditor to review when auditing against the regulation?

Options:

A.

Compliance gap analysis

B.

Customer data protection roles and responsibilities

C.

Customer data flow diagram

D.

Benchmarking studies of adaptation to the new regulation

Buy Now
Questions 33

A system administrator recently informed the IS auditor about the occurrence of several unsuccessful intrusion attempts from outside the organization. Which of the following is MOST effective in detecting such an intrusion?

Options:

A.

Periodically reviewing log files

B.

Configuring the router as a firewall

C.

Using smart cards with one-time passwords

D.

Installing biometrics-based authentication

Buy Now
Questions 34

Which of the following is the BEST justification for deferring remediation testing until the next audit?

Options:

A.

The auditor who conducted the audit and agreed with the timeline has left the organization.

B.

Management ' s planned actions are sufficient given the relative importance of the observations.

C.

Auditee management has accepted all observations reported by the auditor.

D.

The audit environment has changed significantly.

Buy Now
Questions 35

Which of the following is the BEST detective control for a job scheduling process involving data transmission?

Options:

A.

Metrics denoting the volume of monthly job failures are reported and reviewed by senior management.

B.

Jobs are scheduled to be completed daily and data is transmitted using a Secure File Transfer Protocol (SFTP).

C.

Jobs are scheduled and a log of this activity is retained for subsequent review.

D.

Job failure alerts are automatically generated and routed to support personnel.

Buy Now
Questions 36

When a data center is attempting to restore computing facilities at an alternative site following a disaster, which of the following should be restored FIRST?

Options:

A.

Data backups

B.

Decision support system

C.

Operating system

D.

Applications

Buy Now
Questions 37

Which of the following is MOST important for an IS auditor to confirm when reviewing an organization ' s incident response management program?

Options:

A.

All incidents have a severity level assigned.

B.

All identified incidents are escalated to the CEO and the CISO.

C.

Incident response is within defined service level agreements (SLAs).

D.

The alerting tools and incident response team can detect incidents.

Buy Now
Questions 38

Which of the following is the MOST important consideration when establishing operational log management?

Options:

A.

Types of data

B.

Log processing efficiency

C.

IT organizational structure

D.

Log retention period

Buy Now
Questions 39

Which of the following is MOST important to include in forensic data collection and preservation procedures?

Options:

A.

Assuring the physical security of devices

B.

Preserving data integrity

C.

Maintaining chain of custody

D.

Determining tools to be used

Buy Now
Questions 40

Which of the following performance management tools BEST helps an IS auditor evaluate the success of an organization’s IT strategy implementation and execution?

Options:

A.

IT benchmarking

B.

Capability maturity model

C.

Six Sigma

D.

IT metrics dashboard

Buy Now
Questions 41

Which of the following would BEST indicate the effectiveness of a security awareness training program?

Options:

A.

Results of third-party social engineering tests

B.

Employee satisfaction with training

C.

Increased number of employees completing training

D.

Reduced unintentional violations

Buy Now
Questions 42

An IS auditor is reviewing an organization ' s primary router access control list. Which of the following should result in a finding?

Options:

A.

There are conflicting permit and deny rules for the IT group.

B.

The network security group can change network address translation (NAT).

C.

Individual permissions are overriding group permissions.

D.

There is only one rule per group with access privileges.

Buy Now
Questions 43

Which of the following is the BEST way to address potential data privacy concerns associated with inadvertent disclosure of machine identifier information contained within security logs?

Options:

A.

Unit the use of logs to only those purposes for which they were collected

B.

Restrict the transfer of log files from host machine to online storage

C.

Only collect logs from servers classified as business critical

D.

Limit log collection to only periods of increased security activity

Buy Now
Questions 44

During the planning phase of a data loss prevention (DLP) audit, management expresses a concern about mobile computing. Which of the following should the IS auditor identify as the

associated risk?

Options:

A.

Increased vulnerability due to anytime, anywhere accessibility

B.

Increased need for user awareness training

C.

The use of the cloud negatively impacting IT availability

D.

Lack of governance and oversight for IT infrastructure and applications

Buy Now
Questions 45

The use of control totals satisfies which of the following control objectives?

Options:

A.

Transaction integrity

B.

Processing integrity

C.

Distribution control

D.

System recoverability

Buy Now
Questions 46

Which of the following is a PRIMARY purpose of a privacy notice?

Options:

A.

To indemnify the organization against litigation by users for the appropriation of personal information

B.

To establish the organization’s accountability for the use and protection of personal information

C.

To obtain approval for the sale of personal information to third-party organizations

D.

To ensure that the organization’s privacy controls comply with the privacy laws of the user’s region

Buy Now
Questions 47

When testing the adequacy of tape backup procedures, which step BEST verifies that regularly scheduled Backups are timely and run to completion?

Options:

A.

Observing the execution of a daily backup run

B.

Evaluating the backup policies and procedures

C.

Interviewing key personnel evolved In the backup process

D.

Reviewing a sample of system-generated backup logs

Buy Now
Questions 48

Which of the following would be an auditor ' s GREATEST concern when reviewing data inputs from spreadsheets into the core finance system?

Options:

A.

Undocumented code formats data and transmits directly to the database.

B.

There is not a complete inventory of spreadsheets, and file naming is inconsistent.

C.

The department data protection policy has not been reviewed or updated for two years.

D.

Spreadsheets are accessible by all members of the finance department.

Buy Now
Questions 49

which of the following is a core functionality of a configuration and release management system?

Options:

A.

Managing privileged access to databases servers and infrastructure

B.

Identifying vulnerabilities in configuration settings

C.

Deploying a configuration change to the sandbox environment

D.

Identifying other configuration items that will be impacted by a given change

Buy Now
Questions 50

A security administrator is called in the middle of the night by the on-call programmer A number of programs have failed, and the programmer has asked for access to the live system. What IS the BEST course of action?

Options:

A.

Require that a change request be completed and approved

B.

Give the programmer an emergency ID for temporary access and review the activity

C.

Give the programmer read-only access to investigate the problem

D.

Review activity logs the following day and investigate any suspicious activity

Buy Now
Questions 51

Which of the following is the BEST way to strengthen the security of smart devices to prevent data leakage?

Options:

A.

Enforce strong security settings on smart devices.

B.

Require employees to formally acknowledge security procedures.

C.

Review access logs to the organization ' s sensitive data in a timely manner.

D.

Include usage restrictions in bring your own device (BYOD) security procedures.

Buy Now
Questions 52

Which of the following is the BEST indicator that a third-party vendor adheres to the controls required by the organization?

Options:

A.

Review of monthly performance reports submitted by the vendor

B.

Certifications maintained by the vendor

C.

Regular independent assessment of the vendor

D.

Substantive log file review of the vendor ' s system

Buy Now
Questions 53

Which of the following is the MOST important privacy consideration for an organization that uses a cloud service provider to process customer data?

Options:

A.

Data privacy must be managed in accordance with the regulations applicable to the organization.

B.

Data privacy must be monitored in accordance with industry standards and best practices.

C.

No personal information may be transferred to the service provider without notifying the customer.

D.

Customer data transferred to the service provider must be reported to the regulatory authority.

Buy Now
Questions 54

Which of the following BEST Indicates that an incident management process is effective?

Options:

A.

Decreased time for incident resolution

B.

Increased number of incidents reviewed by IT management

C.

Decreased number of calls lo the help desk

D.

Increased number of reported critical incidents

Buy Now
Questions 55

Which of the following provides the MOST assurance of the integrity of a firewall log?

Options:

A.

The log is reviewed on a monthly basis.

B.

Authorized access is required to view the log.

C.

The log cannot be modified.

D.

The log is retained per policy.

Buy Now
Questions 56

During the development of a business case for a new application, the IS auditor should be PRIMARILY involved in the:

Options:

A.

System test.

B.

Transaction blueprint.

C.

User acceptance testing (UAT).

D.

Feasibility study.

Buy Now
Questions 57

Which of the following network topologies will provide the GREATEST fault tolerance?

Options:

A.

Star configuration

B.

Ring configuration

C.

Bus configuration

D.

Mesh configuration

Buy Now
Questions 58

In which data loss prevention (DLP) deployment model is data inspection and policy enforcement performed at the organization ' s perimeter or gateway?

Options:

A.

Hybrid DLP

B.

Cloud-based DLP

C.

Endpoint-based DLP

D.

Network-based DLP

Buy Now
Questions 59

At the conclusion of an audit, but before issuing the final report, the auditor should:

Options:

A.

Confirm results with the audit committee.

B.

Confirm factual findings with the auditee.

C.

Obtain evidence to support findings.

D.

Help management develop action plans.

Buy Now
Questions 60

When drafting a disaster recovery strategy, what should be the MOST important outcome of a business impact analysis (BIA)?

Options:

A.

Establishing recovery point objectives (RPOs)

B.

Determining recovery priorities

C.

Establishing recovery time objectives (RTOs)

D.

Determining recovery costs

Buy Now
Questions 61

Which of the following is the GREATEST benefit of adopting an international IT governance framework rather than establishing a new framework based on the actual situation of a specific organization1?

Options:

A.

Readily available resources such as domains and risk and control methodologies

B.

Comprehensive coverage of fundamental and critical risk and control areas for IT governance

C.

Fewer resources expended on trial-and-error attempts to fine-tune implementation methodologies

D.

Wide acceptance by different business and support units with IT governance objectives

Buy Now
Questions 62

Which of the following poses the GREATEST risk to the use of active RFID tags?

Options:

A.

Session hijacking

B.

Eavesdropping

C.

Piggybacking

D.

Phishing attacks

Buy Now
Questions 63

After areas have been appropriately scoped, what is the IS auditor ' s NEXT step in the selection for sampling?

Options:

A.

Define the population for sampling.

B.

Determine the sampling method.

C.

Calculate the sample size.

D.

Pull the sample.

Buy Now
Questions 64

A PRIMARY objective of risk management is to keep the total cost of risks below the:

Options:

A.

amount of losses that would materially damage the firm.

B.

average cost of physical security measures.

C.

administrative cost of risk management.

D.

estimated amount of losses included in the firm ' s budget

Buy Now
Questions 65

Which of the following approaches BEST enables an IS auditor to detect security vulnerabilities within an application?

Options:

A.

Threat modeling

B.

Concept mapping

C.

Prototyping

D.

Threat intelligence

Buy Now
Questions 66

An IS audit reveals that an organization operating in business continuity mode during a pandemic situation has not performed a simulation test of the

business continuity plan (BCP). Which of the following is the auditor ' s BEST course of action?

Options:

A.

Confirm the BCP has been recently updated.

B.

Review the effectiveness of the business response.

C.

Raise an audit issue for the lack of simulated testing.

D.

Interview staff members to obtain commentary on the BCP ' s effectiveness.

Buy Now
Questions 67

Which of the following concerns is MOST effectively addressed by implementing an IT framework for alignment between IT and business objectives?

Options:

A.

Inaccurate business impact analysis (BIA)

B.

Inadequate IT change management practices

C.

Lack of a benchmark analysis

D.

Inadequate IT portfolio management

Buy Now
Questions 68

Which of the following presents the GREATEST risk of data leakage in the cloud environment?

Options:

A.

Lack of data retention policy

B.

Multi-tenancy within the same database

C.

Lack of role-based access

D.

Expiration of security certificate

Buy Now
Questions 69

Which of the following is the MOST important consideration when relying on the work of the prior auditor?

Options:

A.

Qualifications of the prior auditor

B.

Management agreement with recommendations

C.

Duration of the prior audit

D.

Number of findings identified by the prior auditor

Buy Now
Questions 70

An online retailer is receiving customer complaints about receiving different items from what they ordered on the organization ' s website. The root cause has been traced to poor data quality. Despite efforts to clean erroneous data from the system, multiple data quality issues continue to occur. Which of the following recommendations would be the BEST way to reduce the likelihood of future occurrences?

Options:

A.

Assign responsibility for improving data quality.

B.

Invest in additional employee training for data entry.

C.

Outsource data cleansing activities to reliable third parties.

D.

Implement business rules to validate employee data entry.

Buy Now
Questions 71

An employee loses a mobile device resulting in loss of sensitive corporate data. Which o( the following would have BEST prevented data leakage?

Options:

A.

Data encryption on the mobile device

B.

Complex password policy for mobile devices

C.

The triggering of remote data wipe capabilities

D.

Awareness training for mobile device users

Buy Now
Questions 72

An IS auditor is evaluating the log management system for an organization with devices and systems in multiple geographic locations. Which of the following is MOST important for the auditor to verify?

Options:

A.

Log files are reviewed in multiple locations.

B.

Log files are concurrently updated.

C.

Log files are encrypted and digitally signed.

D.

Log files of the servers are synchronized.

Buy Now
Questions 73

Before the release of a new application into an organization’s production environment, which of the following should be in place to ensure that proper testing has occurred and rollback plans are in place?

Options:

A.

Change approval board

B.

Standardized change requests

C.

Independent third-party approval

D.

Secure code review

Buy Now
Questions 74

An organization allows programmers to change production systems in emergency situations without seeking prior approval. Which of the following controls should an IS auditor consider MOST

important?

Options:

A.

Programmers ' subsequent reports

B.

Limited number of super users

C.

Operator logs

D.

Automated log of changes

Buy Now
Questions 75

During a pre-deployment assessment, what is the BEST indication that a business case will lead to the achievement of business objectives?

Options:

A.

The business case reflects stakeholder requirements.

B.

The business case is based on a proven methodology.

C.

The business case passed a quality review by an independent party.

D.

The business case identifies specific plans for cost allocation.

Buy Now
Questions 76

The operations team of an organization has reported an IS security attack Which of the following should be the FIRST step for the security incident response team?

Options:

A.

Report results to management

B.

Document lessons learned

C.

Perform a damage assessment

D.

Prioritize resources for corrective action

Buy Now
Questions 77

Which of the following Is the BEST way to ensure payment transaction data is restricted to the appropriate users?

Options:

A.

Implementing two-factor authentication

B.

Restricting access to transactions using network security software

C.

implementing role-based access at the application level

D.

Using a single menu tor sensitive application transactions

Buy Now
Questions 78

During the discussion of a draft audit report IT management provided suitable evidence that a process has been implemented for a control that had been concluded by the IS auditor as ineffective Which of the following is the auditor ' s BEST action?

Options:

A.

Explain to IT management that the new control will be evaluated during follow-up

B.

Add comments about the action taken by IT management in the report

C.

Change the conclusion based on evidence provided by IT management

D.

Re-perform the audit before changing the conclusion

Buy Now
Questions 79

Which of the following should an IS auditor recommend as a PRIMARY area of focus when an organization decides to outsource technical support for its external customers?

Options:

A.

Align service level agreements (SLAs) with current needs.

B.

Monitor customer satisfaction with the change.

C.

Minimize costs related to the third-party agreement.

D.

Ensure right to audit is included within the contract.

Buy Now
Questions 80

Which of the following is the BEST method for converting system-generated log files into a format suitable for data analysis?

Options:

A.

Extraction

B.

Data acquisition

C.

Imaging

D.

Normalization

Buy Now
Questions 81

During the implementation of an upgraded enterprise resource planning (ERP) system, which of the following is the MOST important consideration for a go-live decision?

Options:

A.

Rollback strategy

B.

Test cases

C.

Post-implementation review objectives

D.

Business case

Buy Now
Questions 82

Which of the following should be of GREATEST concern to an IS auditor reviewing a network printer disposal process?

Options:

A.

Disposal policies and procedures are not consistently implemented

B.

Evidence is not available to verify printer hard drives have been sanitized prior to disposal.

C.

Business units are allowed to dispose printers directly to

D.

Inoperable printers are stored in an unsecured area.

Buy Now
Questions 83

Which of the following should be the GREATEST concern to an IS auditor reviewing an organization ' s job scheduling practices?

Options:

A.

Most jobs are run manually.

B.

Jobs are executed during working hours.

C.

Job dependencies are undefined.

D.

Job processing procedures are missing.

Buy Now
Questions 84

Which of the following is MOST important to determine during the planning phase of a cloud-based messaging and collaboration platform acquisition?

Options:

A.

Role-based access control policies

B.

Types of data that can be uploaded to the platform

C.

Processes for on-boarding and off-boarding users to the platform

D.

Processes for reviewing administrator activity

Buy Now
Questions 85

Which of the following approaches would present the GREATEST concern for the implementation of a quality assurance (QA) function?

Options:

A.

Developers introducing the changes will review the work, as they are most familiar with them.

B.

Peer developers from the same development team who are unfamiliar with the changes will review them.

C.

Developers from a separate development team in the organization will review the submitted changes.

D.

Reviewers outside the development group who do not have development roles will review the changes.

Buy Now
Questions 86

Which of the following is the BEST indication to an IS auditor that management ' s post-implementation review was effective?

Options:

A.

Lessons learned were documented and applied.

B.

Business and IT stakeholders participated in the post-implementation review.

C.

Post-implementation review is a formal phase in the system development life cycle (SDLC).

D.

Internal audit follow-up was completed without any findings.

Buy Now
Questions 87

An organization has both an IT strategy committee and an IT steering committee. When reviewing the minutes of the IT steering committee, an IS auditor would expect to find that the

committee:

Options:

A.

assessed the contribution of IT to the business.

B.

acquired and assigned appropriate resources for projects.

C.

compared the risk and return of IT investments.

D.

reviewed the achievement of the strategic IT objective.

Buy Now
Questions 88

A third-party consultant is managing the replacement of an accounting system. Which of the following should be the IS auditor ' s GREATEST concern?

Options:

A.

Data migration is not part of the contracted activities.

B.

The replacement is occurring near year-end reporting

C.

The user department will manage access rights.

D.

Testing was performed by the third-party consultant

Buy Now
Questions 89

An IS auditor learns of a new regulation which imposes penalties based on the number of individuals whose personally identifiable information (PII) is exposed by a security breach. What would be the BEST recommendation to help the organization limit the liability associated with a breach to its customer information database?

Options:

A.

Database segmentation

B.

Database normalization

C.

Database harmonization

D.

Database optimization

Buy Now
Questions 90

Which of the following is the BEST way to sanitize a hard disk for reuse to ensure the organization ' s information cannot be accessed?

Options:

A.

Re-partitioning

B.

Degaussing

C.

Formatting

D.

Data wiping

Buy Now
Questions 91

When processing speed is the highest priority, which cryptographic algorithm should be used to verify the integrity of a bit-for-bit copy from digital evidence?

Options:

A.

MD5

B.

SHA-1

C.

AES

D.

SHA-2

Buy Now
Questions 92

Which of the following IT service management activities is MOST likely to help with identifying the root cause of repeated instances of network latency?

Options:

A.

Change management

B.

Problem management

C.

incident management

D.

Configuration management

Buy Now
Questions 93

Which of the following is necessary for effective risk management in IT governance?

Options:

A.

Local managers are solely responsible for risk evaluation.

B.

IT risk management is separate from corporate risk management.

C.

Risk management strategy is approved by the audit committee.

D.

Risk evaluation is embedded in management processes.

Buy Now
Questions 94

Which of the following BEST enables an organization to standardize its IT infrastructure to align with business goals?

Options:

A.

Enterprise architecture (EA)

B.

Operational technologies

C.

Data architecture

D.

Robotic process automation (RPA)

Buy Now
Questions 95

Which of the following will provide the GREATEST assurance to IT management that a quality management system (QMS) is effective?

Options:

A.

A high percentage of stakeholders satisfied with the quality of IT

B.

A high percentage of IT processes reviewed by quality assurance (QA)

C.

A high percentage of incidents being quickly resolved

D.

A high percentage of IT employees attending quality training

Buy Now
Questions 96

Which of the following would be of GREATEST concern to an IS auditor reviewing an IT-related customer service project?

Options:

A.

The project risk exceeds the organization ' s risk appetite.

B.

Executing the project will require additional investments.

C.

Expected business value is expressed in qualitative terms.

D.

The organization will be the first to offer the proposed services.

Buy Now
Questions 97

Which of the following tasks would cause the GREATEST segregation of duties (SoD) concern if performed by the person who reconciles the organization ' s device inventory?

Options:

A.

Tracking devices used for spare parts

B.

Creating the device policy

C.

vIssuing devices to employees

D.

Approving the issuing of devices

Buy Now
Questions 98

An organization is concerned with meeting new regulations for protecting data confidentiality and asks an IS auditor to evaluate their procedures for transporting data. Which of the

following would BEST support the organization ' s objectives?

Options:

A.

Cryptographic hashes

B.

Virtual local area network (VLAN)

C.

Encryption

D.

Dedicated lines

Buy Now
Questions 99

Which type of control has been established when an organization implements a security information and event management (SIEM) system?

Options:

A.

Preventive

B.

Detective

C.

Directive

D.

Corrective

Buy Now
Questions 100

An IS auditor is planning an audit of an organization ' s accounts payable processes. Which of the following controls is MOST important to assess in the audit?

Options:

A.

Segregation of duties between issuing purchase orders and making payments.

B.

Segregation of duties between receiving invoices and setting authorization limits

C.

Management review and approval of authorization tiers

D.

Management review and approval of purchase orders

Buy Now
Questions 101

Which of the following areas of responsibility would cause the GREATEST segregation of duties conflict if the individual who performs the related tasks also has approval authority?

Options:

A.

Purchase requisitions and purchase orders

B.

Invoices and reconciliations

C.

Vendor selection and statements of work

D.

Good receipts and payments

Buy Now
Questions 102

A proper audit trail of changes to server start-up procedures would include evidence of:

Options:

A.

subsystem structure.

B.

program execution.

C.

security control options.

D.

operator overrides.

Buy Now
Questions 103

An IS auditor is evaluating the access controls for a shared customer relationship management (CRM) system. Which of the following would be the GREATEST concern?

Options:

A.

Single sign-on is not enabled

B.

Audit logging is not enabled

C.

Security baseline is not consistently applied

D.

Complex passwords are not required

Buy Now
Questions 104

Which of the following is the MOST efficient way to identify segregation of duties violations in a new system?

Options:

A.

Review a report of security rights in the system.

B.

Observe the performance of business processes.

C.

Develop a process to identify authorization conflicts.

D.

Examine recent system access rights violations.

Buy Now
Questions 105

An organization used robotic process automation (RPA) technology to develop software bots that extract data from various sources for input into a legacy financial application. Which of the following should be of GREATEST concern to an IS auditor when reviewing the software bot job scheduling and production process automation?

Options:

A.

Minor overrides were not authorized by the business

B.

Software bots were incapable of learning from training data

C.

Software bots were programmed to record all user interactions, including mouse tracking

D.

Unauthorized modifications were made to the scripts to improve performance

Buy Now
Questions 106

When an IS auditor needs to confirm that an organization is encrypting sensitive information at a database level, which of the following would provide the BEST assurance?

Options:

A.

Reviewing the drive settings of the host server

B.

Checking network traffic for clear text transmissions

C.

Verifying a sample of critical fields

D.

Reviewing the organization’s encryption policy

Buy Now
Questions 107

Which of the following is MOST helpful in identifying system performance constraints?

Options:

A.

Security logs

B.

Directory service logs

C.

Proxy logs

D.

Operational logs

Buy Now
Questions 108

Which of the following technologies BEST assists in protection of digital evidence as part of forensic investigation acquisition?

Options:

A.

Hardware-based media write blocker

B.

Data encryption

C.

Differential backups

D.

Source media sanitization

Buy Now
Questions 109

Backup procedures for an organization ' s critical data are considered to be which type of control?

Options:

A.

Directive

B.

Corrective

C.

Detective

D.

Compensating

Buy Now
Questions 110

Which of the following should be done FIRST when planning a penetration test?

Options:

A.

Execute nondisclosure agreements (NDAs).

B.

Determine reporting requirements for vulnerabilities.

C.

Define the testing scope.

D.

Obtain management consent for the testing.

Buy Now
Questions 111

A secure server room has a badge reader system that records name, date, and time information whenever a staff member uses a badge to enter or exit. When reviewing the system logs, an IS auditor notices records for some employees entering, but not exiting, the room. Which of the following would be the MOST effective compensating control to recommend?

Options:

A.

Installing security cameras at the doors

B.

Changing to a biometric access control system

C.

Implementing a monitored mantrap at entrance and exit points

D.

Requiring two-factor authentication at entrance and exit points

Buy Now
Questions 112

An external IS auditor is reviewing the continuous monitoring system for a large bank and notes several potential issues. Which of the following would present the GREATEST concern regarding the reliability of the monitoring system?

Options:

A.

The system results are not reviewed by senior management.

B.

The alert threshold is updated periodically.

C.

The monitoring thresholds are not subject to change management.

D.

The monitoring system was configured by a third party.

Buy Now
Questions 113

Which of the following would MOST effectively help to reduce the number of repealed incidents in an organization?

Options:

A.

Testing incident response plans with a wide range of scenarios

B.

Prioritizing incidents after impact assessment.

C.

Linking incidents to problem management activities

D.

Training incident management teams on current incident trends

Buy Now
Questions 114

Which of the following should be of MOST concern to an IS auditor reviewing an organization ' s operational log management?

Options:

A.

Log file size has grown year over year.

B.

Critical events are being logged to immutable log files.

C.

Applications are logging events into multiple log files.

D.

Data formats have not been standardized across all logs.

Buy Now
Questions 115

Which of the following is the BEST preventive control to protect the confidentiality of data on a corporate smartphone in the event it is lost?

Options:

A.

Biometric authentication for the device

B.

Remote data wipe program

C.

Encryption of the data stored on the device

D.

Password for device authentication

Buy Now
Questions 116

Which of the following BEST facilitates strategic program management?

Options:

A.

Implementing stage gates

B.

Establishing a quality assurance (QA) process

C.

Aligning projects with business portfolios

D.

Tracking key project milestones

Buy Now
Questions 117

Which of the following fire suppression systems needs to be combined with an automatic switch to shut down the electricity supply in the event of activation?

Options:

A.

Carbon dioxide

B.

FM-200

C.

Dry pipe

D.

Halon

Buy Now
Questions 118

Which of the following is the MOST likely root cause of shadow IT in an organization?

Options:

A.

Lengthy approval for technology investment

B.

The opportunity to reduce software license fees

C.

Ease of use for cloud-based applications and services

D.

Approved software not meeting user requirements

Buy Now
Questions 119

An IS auditor concludes that logging and monitoring mechanisms within an organization are ineffective because critical servers are not included within the central log repository. Which of the following audit procedures would have MOST likely identified this exception?

Options:

A.

Inspecting a sample of alerts generated from the central log repository

B.

Comparing a list of all servers from the directory server against a list of all servers present in the central log repository

C.

Inspecting a sample of alert settings configured in the central log repository

D.

Comparing all servers included in the current central log repository with the listing used for the prior-year audit

Buy Now
Questions 120

An organization ' s business continuity plan (BCP) should be:

Options:

A.

updated before an independent audit review.

B.

tested after an intrusion attempt into the organization ' s hot site.

C.

tested whenever new applications are implemented.

D.

updated based on changes to personnel and environments.

Buy Now
Questions 121

Which of the following is the PRIMARY reason to involve IS auditors in the software acquisition process?

Options:

A.

To help ensure hardware and operating system requirements are considered

B.

To help ensure proposed contracts and service level agreements (SLAs) address key elements

C.

To help ensure the project management process complies with policies and procedures

D.

To help ensure adequate controls to address common threats and risks are considered

Buy Now
Questions 122

An IS auditor has been tasked with analyzing an organization ' s capital expenditures against its repair and maintenance costs. Which of the following is the BEST reason to use a data analytics tool for this purpose?

Options:

A.

It reduces the error rate.

B.

It improves the reliability of the data.

C.

It enables the auditor to work with 100% of the transactions.

D.

It reduces the sample size required to perform the audit.

Buy Now
Questions 123

The PRIMARY purpose of a configuration management system is to:

Options:

A.

track software updates.

B.

define baselines for software.

C.

support the release procedure.

D.

standardize change approval.

Buy Now
Questions 124

Which of the following is the GREATEST risk related to the use of virtualized environments?

Options:

A.

The host may be a potential single point of failure within the system.

B.

There may be insufficient processing capacity to assign to guests.

C.

There may be increased potential for session hijacking.

D.

Ability to change operating systems may be limited.

Buy Now
Questions 125

Which of the following groups is PRIMARILY accountable for establishing a culture that facilitates an effective and efficient internal control system?

Options:

A.

HR

B.

Senior management

C.

Line management

D.

Internal audit

Buy Now
Questions 126

Which of the following is the MOST reliable way for an IS auditor to evaluate the operational effectiveness of an organization ' s data loss prevention (DLP) controls?

Options:

A.

Review data classification levels based on industry best practice

B.

Verify that current DLP software is installed on all computer systems.

C.

Conduct interviews to identify possible data protection vulnerabilities.

D.

Verify that confidential files cannot be transmitted to a personal USB device.

Buy Now
Questions 127

Which of the following findings should be of GREATEST concern to an IS auditor reviewing an organization s newly implemented online security awareness program ' ?

Options:

A.

Only new employees are required to attend the program

B.

Metrics have not been established to assess training results

C.

Employees do not receive immediate notification of results

D.

The timing for program updates has not been determined

Buy Now
Questions 128

What should an IS auditor recommend to management as the MOST important action before selecting a Software as a Service (SaaS) vendor?

Options:

A.

Determine service level requirements.

B.

Complete a risk assessment.

C.

Perform a business impact analysis (BIA)

D.

Conduct a vendor audit.

Buy Now
Questions 129

Which of the following procedures for testing a disaster recovery plan (DRP) is MOST effective?

Options:

A.

Testing at a secondary site using offsite data backups

B.

Performing a quarterly tabletop exercise

C.

Reviewing recovery time and recovery point objectives

D.

Reviewing documented backup and recovery procedures

Buy Now
Questions 130

Which of the following job scheduling schemes for operating system updates is MOST likely to adequately balance protection of workstations with user requirements?

Options:

A.

Automated patching jobs and immediate restart

B.

Automated patching jobs followed by a scheduled restart outside of business hours

C.

End users can initiate patching including subsequent system restarts

D.

Applying only those patches not requiring a system restart

Buy Now
Questions 131

Which of the following is the BEST control to mitigate the malware risk associated with an instant messaging (IM) system?

Options:

A.

Blocking attachments in IM

B.

Blocking external IM traffic

C.

Allowing only corporate IM solutions

D.

Encrypting IM traffic

Buy Now
Questions 132

An incident response team has been notified of a virus outbreak in a network subnet. Which of the following should be the NEXT step?

Options:

A.

Verify that the compromised systems are fully functional

B.

Focus on limiting the damage

C.

Document the incident

D.

Remove and restore the affected systems

Buy Now
Questions 133

An information systems security officer ' s PRIMARY responsibility for business process applications is to:

Options:

A.

authorize secured emergency access

B.

approve the organization ' s security policy

C.

ensure access rules agree with policies

D.

create role-based rules for each business process

Buy Now
Questions 134

Who is responsible for defining data access permissions?

Options:

A.

IT operations manager

B.

Data owner

C.

Database administrator (DBA)

D.

Information security manager

Buy Now
Questions 135

Which of the following should be an IS auditor ' s GREATEST consideration when scheduling follow-up activities for agreed-upon management responses to remediate audit observations?

Options:

A.

Business interruption due to remediation

B.

IT budgeting constraints

C.

Availability of responsible IT personnel

D.

Risk rating of original findings

Buy Now
Questions 136

Demonstrated support from which of the following roles in an organization has the MOST influence over information security governance?

Options:

A.

Chief information security officer (CISO)

B.

Information security steering committee

C.

Board of directors

D.

Chief information officer (CIO)

Buy Now
Questions 137

Which of the following approaches would utilize data analytics to facilitate the testing of a new account creation process?

Options:

A.

Attempt to submit new account applications with invalid dates of birth.

B.

Review the business requirements document for date of birth field requirements.

C.

Review new account applications submitted in the past month for invalid dates of birth.

D.

Evaluate configuration settings for the date of birth field requirements

Buy Now
Questions 138

An IS auditor finds that periodic reviews of read-only users for a reporting system are not being performed. Which of the following should be the IS auditor ' s NEXT course of action?

Options:

A.

Review the list of end users and evaluate for authorization.

B.

Report this control process weakness to senior management.

C.

Verify managements approval for this exemption

D.

Obtain a verbal confirmation from IT for this exemption.

Buy Now
Questions 139

Users are complaining that a newly released enterprise resource planning (ERP) system is functioning too slowly. Which of the following tests during the quality assurance (QA) phase would have identified this concern?

Options:

A.

Stress

B.

Parallel

C.

Regression

D.

Interface

Buy Now
Questions 140

Which of the following is the MOST important consideration when defining an operational log management strategy?

Options:

A.

Stakeholder requirements

B.

Audit recommendations

C.

Industry benchmarking

D.

Event response procedures

Buy Now
Questions 141

Following a security breach in which a hacker exploited a well-known vulnerability in the domain controller, an IS audit has been asked to conduct a control assessment. the auditor ' s BEST course of action would be to determine if:

Options:

A.

the patches were updated.

B.

The logs were monitored.

C.

The network traffic was being monitored.

D.

The domain controller was classified for high availability.

Buy Now
Questions 142

An audit has identified that business units have purchased cloud-based applications without IPs support. What is the GREATEST risk associated with this situation?

Options:

A.

The applications are not included in business continuity plans (BCFs)

B.

The applications may not reasonably protect data.

C.

The application purchases did not follow procurement policy.

D.

The applications could be modified without advanced notice.

Buy Now
Questions 143

During a follow-up audit, an IS auditor finds that some critical recommendations have the IS auditor ' s BEST course of action?

Options:

A.

Require the auditee to address the recommendations in full.

B.

Adjust the annual risk assessment accordingly.

C.

Evaluate senior management ' s acceptance of the risk.

D.

Update the audit program based on management ' s acceptance of risk.

Buy Now
Questions 144

Which of the following is the BEST way to determine whether a test of a disaster recovery plan (DRP) was successful?

Options:

A.

Analyze whether predetermined test objectives were met.

B.

Perform testing at the backup data center.

C.

Evaluate participation by key personnel.

D.

Test offsite backup files.

Buy Now
Questions 145

If a source code is not recompiled when program changes are implemented, which of the following is a compensating control to ensure synchronization of source and object?

Options:

A.

Comparison of object and executable code

B.

Review of audit trail of compile dates

C.

Comparison of date stamping of source and object code

D.

Review of developer comments in executable code

Buy Now
Questions 146

Which of the following is the BEST data integrity check?

Options:

A.

Counting the transactions processed per day

B.

Performing a sequence check

C.

Tracing data back to the point of origin

D.

Preparing and running test data

Buy Now
Questions 147

An organization relies on an external vendor that uses a cloud-based Software as a Service (SaaS) model to back up its data. Which of the following is the GREATEST risk to the organization related to data backup and retrieval?

Options:

A.

The organization may be locked into an unfavorable contract with the vendor.

B.

The vendor may be unable to restore critical data.

C.

The vendor may be unable to restore data by recovery time objective (RTO) requirements.

D.

The organization may not be allowed to inspect the vendor ' s data center.

Buy Now
Questions 148

An organization performs virtual machine (VM) replication instead of daily backups of its critical servers. Which of the following is MOST important to validate when evaluating the adequacy of recovery procedures?

Options:

A.

Replication servers are located offsite.

B.

Periodic testing of VM replication is completed.

C.

VM load balancing is configured.

D.

Internet access is restricted for VM backup administrators.

Buy Now
Questions 149

An organization that has decided to approve the use of end-user computing (EUC) should FIRST ensure:

Options:

A.

a business impact analysis (BIA) is conducted.

B.

EUC controls are reviewed.

C.

EUC use cases are assessed and documented.

D.

an EUC policy is developed.

Buy Now
Questions 150

As part of business continuity planning, which of the following is MOST important to assess when conducting a business impact analysis (B1A)?

Options:

A.

Risk appetite

B.

Critical applications m the cloud

C.

Completeness of critical asset inventory

D.

Recovery scenarios

Buy Now
Questions 151

An IS auditor finds that a number of key patches have not been applied in a timely manner due to re-source constraints. Which of the following is the GREATEST risk to the organization in this

situation?

Options:

A.

Systems may not be supported by the vendor.

B.

Known security vulnerabilities may not be mitigated.

C.

Different systems may not be compatible.

D.

The systems may not meet user requirements.

Buy Now
Questions 152

An IS auditor finds that an organization ' s data loss prevention (DLP) system is configured to use vendor default settings to identify violations. The auditor ' s MAIN concern should be that:

Options:

A.

violation reports may not be reviewed in a timely manner.

B.

a significant number of false positive violations may be reported.

C.

violations may not be categorized according to the organization ' s risk profile.

D.

violation reports may not be retained according to the organization ' s risk profile.

Buy Now
Questions 153

Which of the following MUST be performed by senior audit leadership prior to starting an IS audit project?

Options:

A.

Signoff on the audit scope.

B.

Attend planning walk-throughs.

C.

Review audit planning documents.

D.

Meet with auditee leadership.

Buy Now
Questions 154

Which of the following should be an IS auditor ' s GREATEST concern when a data owner assigns an incorrect classification level to data?

Options:

A.

Controls to adequately safeguard the data may not be applied.

B.

Data may not be encrypted by the system administrator.

C.

Competitors may be able to view the data.

D.

Control costs may exceed the intrinsic value of the IT asset.

Buy Now
Questions 155

Which of the following attack techniques will succeed because of an inherent security weakness in an Internet firewall?

Options:

A.

Phishing

B.

Using a dictionary attack of encrypted passwords

C.

Intercepting packets and viewing passwords

D.

Flooding the site with an excessive number of packets

Buy Now
Questions 156

Due to limited storage capacity, an organization has decided to reduce the actual retention period for media containing completed low-value transactions. Which of the following is MOST important for the organization to ensure?

Options:

A.

The policy includes a strong risk-based approach.

B.

The retention period allows for review during the year-end audit.

C.

The retention period complies with data owner responsibilities.

D.

The total transaction amount has no impact on financial reporting

Buy Now
Questions 157

An IS auditor discovers that due to resource constraints a database administrator (DBA) is responsible for developing and executing changes into the production environment Which ot the following should the auditor do FIRSTS

Options:

A.

Determine whether another DBA could make the changes

B.

Report a potential segregation of duties violation

C.

identify whether any compensating controls exist

D.

Ensure a change management process is followed prior to implementation

Buy Now
Questions 158

Which of the following is a social engineering attack method?

Options:

A.

An unauthorized person attempts to gam access to secure premises by following an authonzed person through a secure door.

B.

An employee is induced to reveal confidential IP addresses and passwords by answering questions over the phone.

C.

A hacker walks around an office building using scanning tools to search for a wireless network to gain access.

D.

An intruder eavesdrops and collects sensitive information flowing through the network and sells it to third parties.

Buy Now
Questions 159

Recovery facilities providing a redundant combination of Internet connections to the local communications loop is an example of which type of telecommunications continuity?

Options:

A.

Voice recovery

B.

Alternative routing

C.

Long-haul network diversity

D.

Last-mile circuit protection

Buy Now
Questions 160

During which IT project phase is it MOST appropriate to conduct a benefits realization analysis?

Options:

A.

Post-implementation review phase

B.

Final implementation phase

C.

User acceptance testing (UAT) phase

D.

Design review phase

Buy Now
Questions 161

An IT balanced scorecard is the MOST effective means of monitoring:

Options:

A.

governance of enterprise IT.

B.

control effectiveness.

C.

return on investment (ROI).

D.

change management effectiveness.

Buy Now
Questions 162

An organization has assigned two now IS auditors to audit a now system implementation. One of the auditors has an IT-related degree, and one has a business degree. Which ol the following is MOST important to meet the IS audit standard for proficiency?

Options:

A.

The standard is met as long as one member has a globally recognized audit certification.

B.

Technical co-sourcing must be used to help the new staff.

C.

Team member assignments must be based on individual competencies.

D.

The standard is met as long as a supervisor reviews the new auditors ' work.

Buy Now
Questions 163

An organization is planning to implement a control self-assessment (CSA) program for selected business processes. Which of the following should be the role of the internal audit team for this program?

Options:

A.

Perform testing to validate the accuracy of management ' s self-assessment.

B.

Advise management on the self-assessment process.

C.

Design testing procedures for management to assess process controls effectively.

D.

De-scope business processes to be covered by CSAs from future audit plans.

Buy Now
Questions 164

Which of the following is the GREATEST advantage of maintaining an internal IS audit function within an organization?

Options:

A.

Increased independence and impartiality of recommendations

B.

Better understanding of the business and processes

C.

Ability to negotiate recommendations with management

D.

Increased IS audit staff visibility and availability throughout the year

Buy Now
Questions 165

Which of the following would present the GREATEST risk within a release management process for a new application?

Options:

A.

Procedures are not updated to coincide with the production release schedule.

B.

Code is deployed to production without authorization.

C.

A newly added program may overwrite existing production files.

D.

An identified bug was not resolved.

Buy Now
Questions 166

Which of the following would a digital signature MOST likely prevent?

Options:

A.

Repudiation

B.

Unauthorized change

C.

Corruption

D.

Disclosure

Buy Now
Questions 167

In a data center audit, an IS auditor finds that the humidity level is very low. The IS auditor would be MOST concerned because of an expected increase in:

Options:

A.

risk of fire.

B.

backup tape failures.

C.

static electricity problems.

D.

employee discomfort.

Buy Now
Questions 168

Which of the following provides an IS auditor the BEST evidence that a third-party service provider ' s information security controls are effective?

Options:

A.

Documentation of the service provider’s security configuration controls

B.

A review of the service provider ' s policies and procedures

C.

An audit report of the controls by an external auditor

D.

An interview with the service provider ' s senior management

Buy Now
Questions 169

An organization has engaged a third party to implement an application to perform business-critical calculations. Which of the following is the MOST important process to help ensure the application provides accurate calculations?

Options:

A.

Key performance indicator (KPI) monitoring

B.

Change management

C.

Configuration management

D.

Quality assurance (QA)

Buy Now
Questions 170

Which of the following controls is the BEST recommendation to prevent the skimming of debit or credit card data in point of sale (POS) systems?

Options:

A.

Encryption

B.

Chip and PIN

C.

Hashing

D.

Biometric authentication

Buy Now
Questions 171

Which of the following controls helps to ensure that data extraction queries run by the database administrator (DBA) are monitored?

Options:

A.

Restricting access to DBA activities

B.

Performing periodic access reviews

C.

Storing logs of database access

D.

Reviewing activity logs of the DBA

Buy Now
Questions 172

Which of the following should be of MOST concern to an IS auditor reviewing an organization’s IT policies?

Options:

A.

The policies are reviewed and approved by an organizational IT committee.

B.

The policies are not regularly reviewed and updated.

C.

The policies are not mapped to industry best practices.

D.

The policies are primarily targeted toward IT staff.

Buy Now
Questions 173

Which of the following should be of MOST concern to an IS auditor reviewing the public key infrastructure (PKI) for enterprise email?

Options:

A.

The certificate revocation list has not been updated.

B.

The PKI policy has not been updated within the last year.

C.

The private key certificate has not been updated.

D.

The certificate practice statement has not been published

Buy Now
Questions 174

An IS auditor is assigned to review the IS department s quality procedures. Upon contacting the IS manager, the auditor finds that there is an informal unwritten set of standards Which of the following should be the auditor ' s NEXT action1?

Options:

A.

Make recommendations to IS management as to appropriate quality standards

B.

Postpone the audit until IS management implements written standards

C.

Document and lest compliance with the informal standards

D.

Finalize the audit and report the finding

Buy Now
Questions 175

During the audit of an enterprise resource planning (ERP) system, an IS auditor found an applicationpatch was applied to the production environment. It is MOST

important for the IS auditor to verify approval from the:

Options:

A.

information security officer.

B.

system administrator.

C.

information asset owner.

D.

project manager.

Buy Now
Questions 176

An IS auditor is preparing for a review of controls associated with a manufacturing plant ' s implementation of industrial Internet of Things (loT) infrastructure Which of the following vulnerabilities would present the GREATEST security risk to the organization?

Options:

A.

Insufficient physical security around the lo I devices for theft prevention

B.

Use of open-source software components within the loT devices

C.

Constraints in loT device firmware storage space for code upgrades

D.

loT devices that are not using wireless network connectivity

Buy Now
Questions 177

Which of the following would be the MOST useful metric for management to consider when reviewing a project portfolio?

Options:

A.

Cost of projects divided by total IT cost

B.

Expected return divided by total project cost

C.

Net present value (NPV) of the portfolio

D.

Total cost of each project

Buy Now
Questions 178

Which of the following is the PRIMARY objective of cyber resiliency?

Options:

A.

To resume normal operations after service disruptions

B.

To prevent potential attacks or disruptions in operations

C.

To efficiently and effectively recover from an incident with limited operational impact

D.

To limit the severity of security breaches and maintain continuous operations

Buy Now
Questions 179

A bank performed minor changes to the interest calculation computer program. Which of the following techniques would provide the STRONGEST evidence to determine whether the interest calculations are correct?

Options:

A.

Source code review

B.

Parallel simulation using audit software

C.

Manual verification of a sample of the results

D.

Review of the quality assurance (QA) test results

Buy Now
Questions 180

An IS auditor discovers that backups of critical systems are not being performed in accordance with the recovery point objective (RPO) established in the business continuity plan (BCP). What should the auditor do NEXT?

Options:

A.

Request an immediate backup be performed.

B.

Expand the audit scope.

C.

Identify the root cause.

D.

Include the observation in the report.

Buy Now
Questions 181

Which of the following should be of GREATEST concern to an IS auditor performing a review of information security controls?

Options:

A.

The information security policy has not been approved by the chief audit executive (CAE).

B.

The information security policy does not include mobile device provisions

C.

The information security policy is not frequently reviewed

D.

The information security policy has not been approved by the policy owner

Buy Now
Questions 182

An IS auditor finds that some employees are using public cloud-based AI tools. Which of the following presents the GREATEST concern?

Options:

A.

Data reliability

B.

Cost overruns

C.

Copyright infringements

D.

Data leakage

Buy Now
Questions 183

An IS auditor is analyzing a sample of accesses recorded on the system log of an application. The auditor intends to launch an intensive investigation if one exception is found Which sampling method would be appropriate?

Options:

A.

Discovery sampling

B.

Judgmental sampling

C.

Variable sampling

D.

Stratified sampling

Buy Now
Questions 184

IS management has recently disabled certain referential integrity controls in the database management system (DBMS) software to provide users increased query performance. Which of the following controls will MOST effectively compensate for the lack of referential integrity?

Options:

A.

More frequent data backups

B.

Periodic table link checks

C.

Concurrent access controls

D.

Performance monitoring tools

Buy Now
Questions 185

Which of the following is the BEST control to help ensure the completeness of outbound transactions?

Options:

A.

Perform edit checks to identify erroneous, unusual, or invalid transactions.

B.

Verify transactions are sequentially numbered in the header record.

C.

Ensure the validity of the recipient ID and use auto-numbered reports.

D.

Maintain a log of the number of messages sent and validate periodically.

Buy Now
Questions 186

An IS auditor is performing a follow-up audit for findings identified in an organization ' s user provisioning process Which of the following is the MOST appropriate population to sample from when testing for remediation?

Options:

A.

All users provisioned after the finding was originally identified

B.

All users provisioned after management resolved the audit issue

C.

All users provisioned after the final audit report was issued

D.

All users who have followed user provisioning processes provided by management

Buy Now
Questions 187

Which of the following is the MOST effective method for ensuring the integrity of log data?

Options:

A.

Implementing a timestamping mechanism

B.

Implementing cryptographic hash functions

C.

Limiting access to log data

D.

Regularly archiving log data

Buy Now
Questions 188

What type of control has been implemented when secure code reviews are conducted as part of a deployment program?

Options:

A.

Detective

B.

Corrective

C.

Monitoring

D.

Deterrent

Buy Now
Questions 189

Which of the following MOST effectively reduces the probability of a brute force attack being successful?

Options:

A.

Establishing account activity timeouts

B.

Establishing an account lockout policy

C.

Increasing password change frequency

D.

Requiring minimum password length

Buy Now
Questions 190

Which of the following should an IS auditor use when verifying a three-way match has occurred in an enterprise resource planning (ERR) system?

Options:

A.

Bank confirmation

B.

Goods delivery notification

C.

Purchase requisition

D.

Purchase order

Buy Now
Questions 191

Which of the following presents the GREATEST challenge to the alignment of business and IT?

Options:

A.

Lack of chief information officer (CIO) involvement in board meetings

B.

Insufficient IT budget to execute new business projects

C.

Lack of information security involvement in business strategy development

D.

An IT steering committee chaired by the chief information officer (CIO)

Buy Now
Questions 192

An IS auditor notes that not all security tests were completed for an online sales system recently promoted to production. Which of the following is the auditor ' s BEST course of action?

Options:

A.

Determine exposure to the business

B.

Adjust future testing activities accordingly

C.

Increase monitoring for security incidents

D.

Hire a third party to perform security testing

Buy Now
Questions 193

Which of the following presents the GREATEST risk to an organization ' s ability to manage quality control (QC) processes?

Options:

A.

Lack of segregation of duties

B.

Lack of a dedicated QC function

C.

Lack of policies and procedures

D.

Lack of formal training and attestation

Buy Now
Questions 194

What is the PRIMARY purpose of documenting audit objectives when preparing for an engagement?

Options:

A.

To address the overall risk associated with the activity under review

B.

To identify areas with relatively high probability of material problems

C.

To help ensure maximum use of audit resources during the engagement

D.

To help prioritize and schedule auditee meetings

Buy Now
Questions 195

In an environment where data virtualization is used, which of the following provides the BEST disaster recovery solution?

Options:

A.

Onsite disk-based backup systems

B.

Tape-based backup systems

C.

Virtual tape library

D.

Redundant array of independent disks (RAID)

Buy Now
Questions 196

Which of the following findings should be of GREATEST concern to an IS auditor performing a review of IT operations?

Options:

A.

The job scheduler application has not been designed to display pop-up error messages.

B.

Access to the job scheduler application has not been restricted to a maximum of two staff members

C.

Operations shift turnover logs are not utilized to coordinate and control the processing environment

D.

Changes to the job scheduler application ' s parameters are not approved and reviewed by an operations supervisor

Buy Now
Questions 197

Which of the following should be of GREATEST concern to an |$ auditor reviewing data conversion and migration during the implementation of a newapplication system?

Options:

A.

The change management process was not formally documented

B.

Backups of the old system and data are not available online

C.

Unauthorized data modifications occurred during conversion,

D.

Data conversion was performed using manual processes

Buy Now
Questions 198

Which of the following BEST protects an organization ' s proprietary code during a joint-development activity involving a third party?

Options:

A.

Statement of work (SOW)

B.

Nondisclosure agreement (NDA)

C.

Service level agreement (SLA)

D.

Privacy agreement

Buy Now
Questions 199

Which of the following is the MOST cost-effective way to determine the effectiveness of a business continuity plan (BCP)?

Options:

A.

Stress test

B.

Tabletop exercise

C.

Full operational test

D.

Post-implementation review

Buy Now
Questions 200

Which of the following would BEST facilitate the successful implementation of an IT-related framework?

Options:

A.

Aligning the framework to industry best practices

B.

Establishing committees to support and oversee framework activities

C.

Involving appropriate business representation within the framework

D.

Documenting IT-related policies and procedures

Buy Now
Questions 201

During a routine internal software licensing review, an IS auditor discovers instances where employees shared license keys to critical pieces of business software. Which of the following would be the auditor ' s BEST course of action?

Options:

A.

Recommend the utilization of software licensing monitoring tools

B.

Recommend the purchase of additional software license keys

C.

Validate user need for shared software licenses

D.

Verify whether the licensing agreement allows shared use

Buy Now
Questions 202

In a high-volume, real-time system, the MOST effective technique by which to continuously monitor and analyze transaction processing is:

Options:

A.

integrated test facility (ITF).

B.

parallel simulation.

C.

transaction tagging.

D.

embedded audit modules.

Buy Now
Questions 203

Which of the following BEST demonstrates to senior management and the board that an audit function is compliant with standards and the code of ethics?

Options:

A.

Audit staff interviews

B.

Quality control reviews

C.

Control self-assessments (CSAs)

D.

Corrective action plans

Buy Now
Questions 204

Which of the following is the BEST indication that there are potential problems within an organization ' s IT service desk function?

Options:

A.

Undocumented operating procedures

B.

Lack of segregation of duties

C.

An excessive backlog of user requests

D.

Lack of key performance indicators (KPIs)

Buy Now
Questions 205

Which of the following controls is MOST important for ensuring the integrity of system interfaces?

Options:

A.

Periodic audits

B.

File counts

C.

File checksums

D.

IT operator monitoring

Buy Now
Questions 206

When protecting the confidentiality of information assets, the MOST effective control practice is the:

Options:

A.

Awareness training of personnel on regulatory requirements

B.

Utilization of a dual-factor authentication mechanism

C.

Configuration of read-only access to all users

D.

Enforcement of a need-to-know access control philosophy

Buy Now
Questions 207

Which of the following is MOST important to determine when conducting an audit Of an organization ' s data privacy practices?

Options:

A.

Whether a disciplinary process is established for data privacy violations

B.

Whether strong encryption algorithms are deployed for personal data protection

C.

Whether privacy technologies are implemented for personal data protection

D.

Whether the systems inventory containing personal data is maintained

Buy Now
Questions 208

Which of the following practices associated with capacity planning provides the GREATEST assurance that future incidents related to existing server performance will be prevented?

Options:

A.

Reviewing results from simulated high-demand stress test scenarios

B.

Performing a root cause analysis for past performance incidents

C.

Anticipating current service level agreements (SLAs) will remain unchanged

D.

Duplicating existing disk drive systems to improve redundancy and data storage

Buy Now
Questions 209

Which of the following is the BEST point in time to conduct a post-implementation review?

Options:

A.

After a full processing cycle

B.

Immediately after deployment

C.

After the warranty period

D.

Prior to the annual performance review

Buy Now
Questions 210

When determining whether a project in the design phase will meet organizational objectives, what is BEST to compare against the business case?

Options:

A.

Implementation plan

B.

Project budget provisions

C.

Requirements analysis

D.

Project plan

Buy Now
Questions 211

Based on best practices, which types of accounts should be disabled for interactive login?

Options:

A.

Local accounts

B.

Administrator accounts

C.

Console accounts

D.

Service accounts

Buy Now
Questions 212

Which of the following is the BEST way to mitigate risk to an organization ' s network associated with devices permitted under a bring your own device (BYOD) policy?

Options:

A.

Require personal devices to be reviewed by IT staff.

B.

Enable port security on all network switches.

C.

Implement a network access control system.

D.

Ensure the policy requires antivirus software on devices.

Buy Now
Questions 213

Which of the following would be MOST effective in detecting the presence of an unauthorized wireless access point on an internal network?

Options:

A.

Continuous network monitoring

B.

Periodic network vulnerability assessments

C.

Review of electronic access logs

D.

Physical security reviews

Buy Now
Questions 214

In a 24/7 processing environment, a database contains several privileged application accounts with passwords set to never expire. Which of the following recommendations would BEST address the risk with minimal disruption to the business?

Options:

A.

Modify applications to no longer require direct access to the database.

B.

Introduce database access monitoring into the environment

C.

Modify the access management policy to make allowances for application accounts.

D.

Schedule downtime to implement password changes.

Buy Now
Questions 215

An IS auditor is providing input to an RFP to acquire a financial application system. Which of the following is MOST important for the auditor to recommend?

Options:

A.

The application should meet the organization ' s requirements.

B.

Audit trails should be included in the design.

C.

Potential suppliers should have experience in the relevant area.

D.

Vendor employee background checks should be conducted regularly.

Buy Now
Questions 216

An IS auditor has found that a vendor has gone out of business and the escrow has an older version of the source code. What is the auditor ' s BEST recommendation for the organization?

Options:

A.

Analyze a new application that moots the current re

B.

Perform an analysis to determine the business risk

C.

Bring the escrow version up to date.

D.

Develop a maintenance plan to support the application using the existing code

Buy Now
Questions 217

An emergency power-off switch should:

Options:

A.

Be remotely accessible.

B.

Not be identified.

C.

Be protected.

D.

Be under dual control.

Buy Now
Questions 218

An IS auditor is reviewing an organization ' s business continuity plan (BCP) following a change in organizational structure with significant impact to business processes. Which of the following findings should be the auditor ' s GREATEST concern?

Options:

A.

Key business process end users did not participate in the business impact " analysis (BIA)

B.

Copies of the BCP have not been distributed to new business unit end users sjnce the reorganization

C.

A test plan for the BCP has not been completed during the last two years

Buy Now
Questions 219

An IS auditor discovers an option in a database that allows the administrator to directly modify any table. This option is necessary to overcome bugs in the software, but is rarely used. Changes to tables are automatically logged. The IS auditor ' s FIRST action should be to:

Options:

A.

recommend that the option to directly modify the database be removed immediately.

B.

recommend that the system require two persons to be involved in modifying the database.

C.

determine whether the log of changes to the tables is backed up.

D.

determine whether the audit trail is secured and reviewed.

Buy Now
Questions 220

Which of the following threats is mitigated by a firewall?

Options:

A.

Intrusion attack

B.

Asynchronous attack

C.

Passive assault

D.

Trojan horse

Buy Now
Questions 221

Which of the following is MOST useful when planning to audit an organization ' s compliance with cybersecurity regulations in foreign countries?

Options:

A.

Prioritize the audit to focus on the country presenting the greatest amount of operational risk.

B.

Follow the cybersecurity regulations of the country with the most stringent requirements.

C.

Develop a template that standardizes the reporting of findings from each country ' s audit team

D.

Map the different regulatory requirements to the organization ' s IT governance framework

Buy Now
Questions 222

Which of the following BEST describes the process of creating a digital envelope?

Options:

A.

The encryption key is compressed within a folder after a message is encoded using symmetric encryption.

B.

A message is encoded using symmetric encryption, and then the encryption key is secured using public key encryption.

C.

The message is hashed, and the hash total is sent using symmetric encryption.

D.

A message digest is encrypted using asymmetric encryption, and the encryption key is sent using asymmetric encryption.

Buy Now
Questions 223

Which of the following BEST addresses the availability of an online store?

Options:

A.

RAID level 5 storage devices

B.

Online backups

C.

A mirrored site at another location

D.

Clustered architecture

Buy Now
Questions 224

When reviewing an organization’s enterprise architecture (EA), which of the following is an IS auditor MOST likely to find within the EA documentation?

Options:

A.

Contact information for key resources within the IT department

B.

Detailed encryption standards

C.

Roadmaps showing the evolution from current state to future state

D.

Protocols used to communicate between systems

Buy Now
Questions 225

An IS auditor has identified deficiencies within the organization ' s software development life cycle policies. Which of the following should be done NEXT?

Options:

A.

Document the findings in the audit report.

B.

Identify who approved the policies.

C.

Escalate the situation to the lead auditor.

D.

Communicate the observation to the auditee.

Buy Now
Questions 226

Which of the following metrics is the BEST indicator of the performance of a web application

Options:

A.

HTTP server error rate

B.

Server thread count

C.

Average response time

D.

Server uptime

Buy Now
Questions 227

A web application is developed in-house by an organization. Which of the following would provide the BEST evidence to an IS auditor that the application is secure from external attack?

Options:

A.

Web application firewall (WAF) implementation

B.

Penetration test results

C.

Code review by a third party

D.

Database application monitoring logs

Buy Now
Questions 228

Which of the following is the PRIMARY advantage of using visualization technology for corporate applications?

Options:

A.

Improved disaster recovery

B.

Better utilization of resources

C.

Stronger data security

D.

Increased application performance

Buy Now
Questions 229

An IS auditor is analyzing a sample of accounts payable transactions for a specific vendor and identifies one transaction with a value five times as high as the average transaction. Which of the following should the auditor do NEXT?

Options:

A.

Report the variance immediately to the audit committee

B.

Request an explanation of the variance from the auditee

C.

Increase the sample size to 100% of the population

D.

Exclude the transaction from the sample population

Buy Now
Questions 230

Which of the following BEST indicates an effective internal audit quality assurance and improvement program?

Options:

A.

Oversight of the improvement program by senior management

B.

An improved internal audit charter

C.

A scope that focuses on high-risk audit engagements

D.

Identification of opportunities for continuous improvement

Buy Now
Questions 231

An IS auditor is reviewing the disaster recovery plan (DRP) of an organization with offices across multiple regions. Which of the following should be the auditor ' s PRIMARY focus?

Options:

A.

Recovery point objective (RPO) monitoring

B.

Processes and system dependencies

C.

Disaster recovery training

D.

Data backup and storage changes

Buy Now
Questions 232

The IS auditor has recommended that management test a new system before using it in production mode. The BEST approach for management in developing a test plan is to use processing parameters that are:

Options:

A.

randomly selected by a test generator.

B.

provided by the vendor of the application.

C.

randomly selected by the user.

D.

simulated by production entities and customers.

Buy Now
Questions 233

Which of the following is an example of a preventative control in an accounts payable system?

Options:

A.

The system only allows payments to vendors who are included In the system ' s master vendor list.

B.

Backups of the system and its data are performed on a nightly basis and tested periodically.

C.

The system produces daily payment summary reports that staff use to compare against invoice totals.

D.

Policies and procedures are clearly communicated to all members of the accounts payable department

Buy Now
Questions 234

Which of the following is a detective control?

Options:

A.

Programmed edit checks for data entry

B.

Backup procedures

C.

Use of pass cards to gain access to physical facilities

D.

Verification of hash totals

Buy Now
Questions 235

Which of the following is the MOST important outcome of an information security program?

Options:

A.

Operating system weaknesses are more easily identified.

B.

Emerging security technologies are better understood and accepted.

C.

The cost to mitigate information security risk is reduced.

D.

Organizational awareness of security responsibilities is improved.

Buy Now
Questions 236

The PRIMARY focus of a post-implementation review is to verify that:

Options:

A.

enterprise architecture (EA) has been complied with.

B.

user requirements have been met.

C.

acceptance testing has been properly executed.

D.

user access controls have been adequately designed.

Buy Now
Questions 237

Which of the following is the BEST control to mitigate the risk of shadow IT?

Options:

A.

Intrusion detection system (IDS)

B.

Vendor management reviews

C.

Vulnerability scanning

D.

Security awareness training

Buy Now
Questions 238

An IS auditor should ensure that an application ' s audit trail:

Options:

A.

has adequate security.

B.

logs ail database records.

C.

Is accessible online

D.

does not impact operational efficiency

Buy Now
Questions 239

Which of the following is a corrective control?

Options:

A.

Separating equipment development testing and production

B.

Verifying duplicate calculations in data processing

C.

Reviewing user access rights for segregation

D.

Executing emergency response plans

Buy Now
Questions 240

Which of the following is the MOST important reason for an organization to automate data purging?

Options:

A.

Protection against privacy breaches

B.

Storage cost reduction

C.

Disaster recovery planning

D.

Ransomware protection

Buy Now
Questions 241

An IS auditor determines that the vendor ' s deliverables do not include the source code for a newly acquired product. To address this issue, which of the following should the auditor recommend be included in the contract?

Options:

A.

Confidentiality and data protection clauses

B.

Service level agreement (SLA)

C.

Software escrow agreement

D.

Right-to-audit clause

Buy Now
Questions 242

A company requires that all program change requests (PCRs) be approved and all modifications be automatically logged. Which of the following IS audit procedures will BEST determine whether unauthorized changes have been made to production programs?

Options:

A.

Trace a sample of complete PCR forms to the log of all program changes

B.

Use source code comparison software to determine whether any changes have been made to a sample of programs since the last audit date

C.

Review a sample of PCRs for proper approval throughout the program change process

D.

Trace a sample of program change from the log to completed PCR forms

Buy Now
Questions 243

An organization ' s security team created a simulated production environment with multiple vulnerable applications. What would be the PRIMARY purpose of creating such an environment?

Options:

A.

To collect digital evidence of cyberattacks

B.

To attract attackers in order to study their behavior

C.

To provide training to security managers

D.

To test the intrusion detection system (IDS)

Buy Now
Questions 244

Which of the following is the BEST control to minimize the risk of unauthorized access to lost company-owned mobile devices?

Options:

A.

Password/PIN protection

B.

Device tracking software

C.

Device encryption

D.

Periodic backup

Buy Now
Questions 245

If a recent release of a program has to be backed out of production, the corresponding changes within the delta version of the code should be:

Options:

A.

filed in production for future reference in researching the problem.

B.

applied to the source code that reflects the version in production.

C.

eliminated from the source code that reflects the version in production.

D.

reinstalled when replacing the version back into production.

Buy Now
Questions 246

A vendor requires privileged access to a key business application. Which of the following is the BEST recommendation to reduce the risk of data leakage?

Options:

A.

Implement real-time activity monitoring for privileged roles

B.

Include the right-to-audit in the vendor contract

C.

Perform a review of privileged roles and responsibilities

D.

Require the vendor to implement job rotation for privileged roles

Buy Now
Questions 247

Which of the following is the PRIMARY purpose of a business impact analysts (BIA) in an organization ' s overall risk management strategy?

Options:

A.

Evaluating business investment opportunities for the organization

B.

Identifying critical business processes to effectively prioritize recovery efforts

C.

Ensuring compliance with regulations through regular audits

D.

Conducting vulnerability assessments to enhance network security measures

Buy Now
Questions 248

Which of the following findings from a database security audit presents the GREATEST risk of critical security exposures?

Options:

A.

Legacy data has not been purged.

B.

Admin account passwords are not set to expire.

C.

Default settings have not been changed.

D.

Database activity logging is not complete.

Buy Now
Questions 249

A core system fails a week after a scheduled update, causing an outage that impacts service. Which of the following is MOST important for incident management to focus on when addressing the issue?

Options:

A.

Analyzing the root cause of the outage to ensure the incident will not reoccur

B.

Restoring the system to operational state as quickly as possible

C.

Ensuring all resolution steps are fully documented prior to returning thesystem to service

D.

Rolling back the unsuccessful change to the previous state

Buy Now
Questions 250

Which type of threat can utilize a large group of automated social media accounts to steal data, send spam, or launch distributed denial of service (DDoS) attacks?

Options:

A.

Botnet attack

B.

Data mining

C.

Phishing attempt

D.

Malware sharing

Buy Now
Questions 251

Which of the following would be the BEST process for continuous auditing to a large financial Institution?

Options:

A.

Testing encryption standards on the disaster recovery system

B.

Validating access controls for real-time data systems

C.

Performing parallel testing between systems

D.

Validating performance of help desk metrics

Buy Now
Questions 252

An external audit firm was engaged to perform a validation and verification review for a systems implementation project. The IS auditor identifies that regression testing is not part of the project plan and was not performed by the systems implementation team. According to the team, the parallel testing being performed is sufficient, making regression testing unnecessary. What should be the auditor’s NEXT step?

Options:

A.

Evaluate the extent of the parallel testing being performed

B.

Recommend integration and stress testing be conducted by the systems implementation team

C.

Conclude that parallel testing is sufficient and regression testing is not needed

D.

Recommend regression testing be conducted by the systems implementation team

Buy Now
Questions 253

During a review, an IS auditor discovers that corporate users are able to access cloud-based applications and data any Internet-connected web browser. Which Of the following

is the auditor’s BEST recommendation to prevent unauthorized access?

Options:

A.

Implement an intrusion detection system (IDS),

B.

Update security policies and procedures.

C.

Implement multi-factor authentication.

D.

Utilize strong anti-malware controls on all computing devices.

Buy Now
Questions 254

An IS auditor is reviewing the security of a web-based customer relationship management (CRM) system that is directly accessed by customers via the Internet, which of the following should be a concern for the auditor?

Options:

A.

The system is hosted on an external third-party service provider’s server.

B.

The system is hosted in a hybrid-cloud platform managed by a service provider.

C.

The system is hosted within a demilitarized zone (DMZ) of a corporate network.

D.

The system is hosted within an internal segment of a corporate network.

Buy Now
Questions 255

Which of the following is MOST useful for determining whether the goals of IT are aligned with the organization ' s goals?

Options:

A.

Balanced scorecard

B.

Enterprise dashboard

C.

Enterprise architecture (EA)

D.

Key performance indicators (KPIs)

Buy Now
Questions 256

During a review of system access, an IS auditor notes that an employee who has recently changed roles within the organization still has previous access rights. The auditor ' s NEXT step should be to:

Options:

A.

recommend a control to automatically update access rights.

B.

determine the reason why access rights have not been revoked.

C.

direct management to revoke current access rights.

D.

determine if access rights are in violation of software licenses.

Buy Now
Questions 257

Which of the following is the BEST reason for an organization to use clustering?

Options:

A.

To decrease system response time

B.

To Improve the recovery lime objective (RTO)

C.

To facilitate faster backups

D.

To improve system resiliency

Buy Now
Questions 258

For security awareness training to be MOST effective, management should ensure the training:

Options:

A.

covers all aspects of the IT environment.

B.

is conducted by IT personnel.

C.

is tailored to specific groups.

D.

occurs annually.

Buy Now
Questions 259

An IS auditor is verifying the adequacy of an organization ' s internal controls and is concerned about potential circumvention of regulations. Which of the following is the BEST sampling method to use?

Options:

A.

Variable sampling

B.

Random sampling

C.

Cluster sampling

D.

Attribute sampling

Buy Now
Questions 260

Which of the following should be GREATEST concern to an IS auditor reviewing data conversion and migration during the implementation of a new application system?

Options:

A.

Data conversion was performed using manual processes.

B.

Backups of the old system and data are not available online.

C.

Unauthorized data modifications occurred during conversion.

D.

The change management process was not formally documented

Buy Now
Questions 261

Which type of risk would MOST influence the selection of a sampling methodology?

Options:

A.

Inherent

B.

Residual

C.

Control

D.

Detection

Buy Now
Questions 262

How does the emergence of quantum computing impact traditional data encryption methods?

Options:

A.

Quantum computing may render classical encryption algorithms obsolete due to its ability to decrypt data with unprecedented efficiency.

B.

Quantum computing introduces new encryption techniques that are immune to decryption by classical and quantum computers alike.

C.

Quantum computing enhances the security of classical encryption algorithms by providing faster computation speeds.

D.

Quantum computing will require more frequent training on the application of classical data encryption methods.

Buy Now
Questions 263

Which of the following findings from a network security review presents the GREATEST risk to the organization?

Options:

A.

There are shared administrator accounts on internet-facing routers.

B.

An internet server in the demilitarized zone (DMZ) hosts a test web page.

C.

Operating system patches released last week have not been applied.

D.

The intrusion detection system (IDS) has pending updates from within the last week.

Buy Now
Questions 264

To protect the organization from malware transmitted by physical media, IT administrators have disabled USB access for storage devices. Which of the following BEST describes this type of control?

Options:

A.

Corrective

B.

Administrative

C.

Preventive

D.

Physical

Buy Now
Questions 265

Which of the following provides the BEST assurance of data integrity after file transfers?

Options:

A.

Check digits

B.

Monetary unit sampling

C.

Hash values

D.

Reasonableness check

Buy Now
Questions 266

Which of the following would be a result of utilizing a top-down maturity model process?

Options:

A.

A means of benchmarking the effectiveness of similar processes with peers

B.

A means of comparing the effectiveness of other processes within the enterprise

C.

Identification of older, more established processes to ensure timely review

D.

Identification of processes with the most improvement opportunities

Buy Now
Questions 267

Which of the following should be of GREATEST concern to an IS auditor assessing an organization ' s patch management program?

Options:

A.

Patches are deployed from multiple deployment servers.

B.

There is no process in place to scan the network to identify missing patches.

C.

Patches for medium- and low-risk vulnerabilities are omitted.

D.

There is no process in place to quarantine servers that have not been patched.

Buy Now
Questions 268

An organization ' s senior management thinks current security controls may be excessive and requests an IS auditor ' s advice on how to assess the adequacy of current measures. What is the auditor ' s BEST recommendation to management?

Options:

A.

Perform correlation analysis between incidents and investments.

B.

Downgrade security controls on low-risk systems.

C.

Introduce automated security monitoring tools.

D.

Re-evaluate the organization ' s risk and control framework.

Buy Now
Questions 269

In a public key cryptographic system, which of the following is the PRIMARY requirement to address the risk of man-in-the-middle attacks through spoofing?

Options:

A.

Strong encryption algorithms

B.

Kerberos authentication

C.

Registration authority

D.

Certificate authority (CA)

Buy Now
Questions 270

Which of the following is the MOST effective control for protecting the confidentiality and integrity of data stored unencrypted on virtual machines?

Options:

A.

Monitor access to stored images and snapshots of virtual machines.

B.

Restrict access to images and snapshots of virtual machines.

C.

Limit creation of virtual machine images and snapshots.

D.

Review logical access controls on virtual machines regularly.

Buy Now
Questions 271

Which of the following technologies is BEST suited to fulfill a business requirement for nonrepudiation of business-to-business transactions with external parties without the need for a mutually trusted entity?

Options:

A.

Public key infrastructure (PKI)

B.

Blockchain distributed ledger

C.

Artificial intelligence (Al)

D.

Centralized ledger technology

Buy Now
Questions 272

Which of the following protocols should be used when transferring data via the internet?

Options:

A.

User Datagram Protocol (UDP)

B.

Hypertext Transfer Protocol (HTTP)

C.

Secure File Transfer Protocol (SFTP)

D.

Remote Desktop Protocol (RDP)

Buy Now
Questions 273

Visitors to a data center are required to present an ID and pre-approved documents. Which type of control has been implemented?

Options:

A.

Administrative control

B.

Preventive control

C.

Corrective control

D.

Detective control

Buy Now
Questions 274

Which of the following provides the BEST evidence that system requirements are met when evaluating a project before implementation?

Options:

A.

Integration testing results

B.

Sign-off from senior management

C.

User acceptance testing (UAT) results

D.

Regression testing results

Buy Now
Questions 275

Which of the following is the PRIMARY benefit of benchmarking an organization ' s software development lifecycle practices against a capability maturity model?

Options:

A.

Reliable products are guaranteed.

B.

Repeatable software development procedures are established.

C.

Programmers ' efficiency is improved.

D.

Security requirements are added to software development processes.

Buy Now
Questions 276

Which of the following is MOST important to review during the project initiation phase of developing and deploying a new application?

Options:

A.

User requirements

B.

User acceptance testing (UAT) plans

C.

Deployment plans

D.

Architectural design

Buy Now
Questions 277

Which of the following is MOST important to consider when defining disaster recovery strategies?

Options:

A.

Maximum tolerable downtime (MTD)

B.

Mean time to restore (MTTR)

C.

Mean time to acknowledge

D.

Maximum time between failures (MTBF)

Buy Now
Questions 278

Which of the following should an IS auditor be MOST concerned with when a system uses RFID?

Options:

A.

privacy

B.

Maintainability

C.

Scalability

D.

Nonrepudiation

Buy Now
Questions 279

An IS auditor finds that a new network connection allows communication between the Internet and the internal enterprise resource planning (ERP) system. Which of the following is the PRIMARY business impact to include when presenting this observation to management?

Options:

A.

An increase to the threat landscape

B.

A decrease in data quality in the ERP system

C.

A decrease in network performance

D.

An increase in potential fines from regulators

Buy Now
Questions 280

An IS auditor is reviewing the system development practices of an organization that is about to move from a Waterfall to an Agile approach. Which of the following is MOST important for the auditor to focus on as a result of this move?

Options:

A.

Secure code review

B.

Release management

C.

Capacity planning

D.

Code documentation

Buy Now
Questions 281

Which of the following is the MOST important advantage of participating in beta testing of software products?

Options:

A.

It increases an organization ' s ability to retain staff who prefer to work with new technology.

B.

It improves vendor support and training.

C.

It enhances security and confidentiality.

D.

It enables an organization to gain familiarity with new products and their functionality.

Buy Now
Questions 282

Which of the following BEST indicates that the effectiveness of an organization ' s security awareness program has improved?

Options:

A.

A decrease in the number of information security audit findings

B.

An increase in the number of staff who complete awareness training

C.

An increase in the number of phishing emails reported by employees

D.

A decrease in the number of malware outbreaks

Buy Now
Questions 283

Spreadsheets are used to calculate project cost estimates. Totals for each cost category are then keyed into the job-costing system. What is the BEST control to ensure that data is accurately entered into the system?

Options:

A.

Reconciliation of total amounts by project

B.

Validity checks, preventing entry of character data

C.

Reasonableness checks for each cost type

D.

Display the back of the project detail after the entry

Buy Now
Questions 284

The use of access control lists (ACLs) is the MOST effective method to mitigate security risk for routers because they: (Identify Correct answer and related explanation/references from CISA Certification - Information Systems Auditor official Manual or book)

Options:

A.

are recommended by security standards.

B.

can limit Telnet and traffic from the open Internet.

C.

act as fitters between the world and the network.

D.

can detect cyberattacks.

Buy Now
Questions 285

An IS auditor has been asked to audit the proposed acquisition of new computer hardware. The auditor’s PRIMARY concern Is that:

Options:

A.

the implementation plan meets user requirements.

B.

a full, visible audit trail will be Included.

C.

a dear business case has been established.

D.

the new hardware meets established security standards

Buy Now
Questions 286

Which of the following IT service monitoring tools is MOST effective in identifying abnormal system events?

Options:

A.

System network and administrative logs

B.

System exception and deviation reports

C.

Operator problem reports

D.

Operator work schedules

Buy Now
Questions 287

Which of the following should be the FRST step when developing a data toes prevention (DIP) solution for a large organization?

Options:

A.

Identify approved data workflows across the enterprise.

B.

Conduct a threat analysis against sensitive data usage.

C.

Create the DLP pcJc.es and templates

D.

Conduct a data inventory and classification exercise

Buy Now
Questions 288

Which of the following is the PRIMARY reason an IS auditor should discuss observations with management before delivering a final report?

Options:

A.

Validate the audit observations_

B.

Identify business risks associated with the observations.

C.

Assist the management with control enhancements.

D.

Record the proposed course of corrective action.

Buy Now
Questions 289

An IS auditor wants to determine who has oversight of staff performing a specific task and is referencing the organization ' s RACI chart. Which of the following roles within the chart would provide this information?

Options:

A.

Consulted

B.

Informed

C.

Responsible

D.

Accountable

Buy Now
Questions 290

Which of the following recommendations would BEST prevent the implementation of IT projects without collaborating with the business?

Options:

A.

Partner with the business units to evaluate IT projects.

B.

Review the projects to identify similarities and eliminate duplication.

C.

Periodically review the projects ' return on investment (ROI).

D.

Prioritize protects based on business and IT resource availability.

Buy Now
Questions 291

Which of the following is a concern associated with virtualization?

Options:

A.

The physical footprint of servers could decrease within the data center.

B.

Performance issues with the host could impact the guest operating systems.

C.

Processing capacity may be shared across multiple operating systems.

D.

One host may have multiple versions of the same operating system.

Buy Now
Questions 292

Which of the following is the MOST important Issue for an IS auditor to consider with regard to Voice-over IP (VoIP) communications?

Options:

A.

Continuity of service

B.

Identity management

C.

Homogeneity of the network

D.

Nonrepudiation

Buy Now
Questions 293

A sample for testing must include the 80 largest client balances and a random sample of the rest. What should the IS auditor recommend?

Options:

A.

Query the database.

B.

Develop an integrated test facility (ITF).

C.

Use generalized audit software.

D.

Leverage a random number generator.

Buy Now
Questions 294

Which of the following is the PRIMARY benefit of monitoring IT operational logs?

Options:

A.

Detecting processing errors in a timely manner

B.

Identifying configuration flaws in operating systems

C.

Managing the usability and capacity of IT resources

D.

Generating exception reports to assess security compliance

Buy Now
Questions 295

Which of the following is the PRIMARY advantage of using virtualization technology for corporate applications?

Options:

A.

Stronger data security

B.

Better utilization of resources

C.

Increased application performance

D.

Improved disaster recovery

Buy Now
Questions 296

The purpose of a checksum on an amount field in an electronic data interchange (EDI) communication of financial transactions is to ensure:

Options:

A.

nonrepudiation.

B.

authorization,

C.

integrity,

D.

authenticity.

Buy Now
Questions 297

Which of the following provides the BEST providence that outsourced provider services are being properly managed?

Options:

A.

The service level agreement (SLA) includes penalties for non-performance.

B.

Adequate action is taken for noncompliance with the service level agreement (SLA).

C.

The vendor provides historical data to demonstrate its performance.

D.

Internal performance standards align with corporate strategy.

Buy Now
Questions 298

Which of the following is the BEST indicator of the effectiveness of an organization ' s incident response program?

Options:

A.

Number of successful penetration tests

B.

Percentage of protected business applications

C.

Financial impact per security event

D.

Number of security vulnerability patches

Buy Now
Questions 299

Which of the following is the MOST effective way to ensure adequate system resources are available for high-priority activities?

Options:

A.

System virtualization

B.

Job scheduling

C.

Zero Trust

D.

Code optimization

Buy Now
Questions 300

A review of an organization’s IT portfolio revealed several applications that are not in use. The BEST way to prevent this situation from recurring would be to implement.

Options:

A.

A formal request for proposal (RFP) process

B.

Business case development procedures

C.

An information asset acquisition policy

D.

Asset life cycle management.

Buy Now
Questions 301

What is the PRIMARY benefit of an audit approach which requires reported findings to be issued together with related action plans, owners, and target dates?

Options:

A.

it facilitates easier audit follow-up

B.

it enforces action plan consensus between auditors and auditees

C.

it establishes accountability for the action plans

D.

it helps to ensure factual accuracy of findings

Buy Now
Questions 302

Which of the following is the PRIMARY benefit of introducing business impact analyses (BIAs) to business resiliency strategies?

Options:

A.

It identifies legal obligations that may be incurred as a result of business service disruptions

B.

It provides updates on the risk level of disasters that may occur

C.

It delineates employee responsibilities that the organization must fulfill in a crisis

D.

It helps prioritize the restoration of systems and applications

Buy Now
Questions 303

Which of the following should be the PRIMARY focus for any network design that deploys a Zero Trust architecture?

Options:

A.

Protecting network segments

B.

Protecting technology resources

C.

Maintaining network router operating system versions

D.

Ensuring a vendor-agnostic environment

Buy Now
Questions 304

The PRIMARY purpose of a vulnerability assessment in a cybersecurity program is to:

Options:

A.

Enhance the security awareness of employees and other internal stakeholders.

B.

Identify known security exposures before attackers find them.

C.

Improve the overall security posture of the organization.

D.

Protect the organization’s IT assets against external cyberthreats.

Buy Now
Questions 305

An IS auditor is asked to review an organization ' s technology relationships, interfaces, and data. Which of the following enterprise architecture (EA) areas is MOST appropriate this review? (Choose Correct answer and give explanation from CISA Certification - Information Systems Auditor official book)

Options:

A.

Reference architecture

B.

Infrastructure architecture

C.

Information security architecture

D.

Application architecture

Buy Now
Questions 306

Which of the following is a PRIMARY benefit of an integrated audit?

Options:

A.

It enhances audit quality assurance (QA).

B.

It optimizes audit efforts across various functions.

C.

It ensures the improvement of auditor skills and competencies.

D.

It is suited for different business areas within organizations of any size.

Buy Now
Questions 307

A review of IT interface controls finds an organization does not have a process to identify and correct records that do not get transferred to the receiving system. Which of the following is the IS

auditor ' s BEST recommendation?

Options:

A.

Enable automatic encryption, decryption, and electronic signing of data files.

B.

Automate the transfer of data between systems as much as is feasible.

C.

Have coders perform manual reconciliation of data between systems.D

D.

Implement software to perform automatic reconciliations of data between systems.

Buy Now
Questions 308

Which of the following is the BEST way to verify the effectiveness of a data restoration process?

Options:

A.

Performing periodic reviews of physical access to backup media

B.

Performing periodic complete data restorations

C.

Validating off ne backups using software utilities

D.

Reviewing and updating data restoration policies annually

Buy Now
Questions 309

When reviewing an organization ' s information security policies, an IS auditor should verify that the policies have been defined PRIMARILY on the basis of:

Options:

A.

a risk management process.

B.

an information security framework.

C.

past information security incidents.

D.

industry best practices.

Buy Now
Questions 310

Which of the following should be an IS auditor ' s PRIMARY focus when developing a risk-based IS audit program?

Options:

A.

Portfolio management

B.

Business plans

C.

Business processes

D.

IT strategic plans

Buy Now
Questions 311

Which of the following is the BEST source of information to determine the required level of data protection on a file server?

Options:

A.

Data classification policy and procedures

B.

Access rights of similar file servers

C.

Previous data breach incident reports

D.

Acceptable use policy and privacy statements

Buy Now
Questions 312

Which of the following is MOST important to consider when assessing the scope of privacy concerns for an IT project?

Options:

A.

Data ownership

B.

Applicable laws and regulations

C.

Business requirements and data flows

D.

End-user access rights

Buy Now
Questions 313

Management has requested a post-implementation review of a newly implemented purchasing package to determine the extent that business requirements are being met. Which of the following

is MOST likely to be assessed?

Options:

A.

Acceptance testing results

B.

Results of live processing

C.

Implementation methodology

D.

Purchasing guidelines and policies

Buy Now
Questions 314

Which of the following are BEST suited for continuous auditing?

Options:

A.

Low-value transactions

B.

Real-lime transactions

C.

Irregular transactions

D.

Manual transactions

Buy Now
Questions 315

Which of the following provides the BEST evidence that all elements of a business continuity plan (BCP) are operating effectively?

Options:

A.

Walk-through test results

B.

Full operational test results

C.

Tabletop test results

D.

Simulation test results

Buy Now
Questions 316

Which of the following is MOST useful for determining the strategy for IT portfolio management?

Options:

A.

IT metrics dashboards

B.

IT roadmap

C.

Capability maturity model

D.

Life cycle cost-benefit analysis

Buy Now
Questions 317

An IT balanced scorecard is PRIMARILY used for:

Options:

A.

evaluating the IT project portfolio

B.

measuring IT strategic performance

C.

allocating IT budget and resources

D.

monitoring risk in lT-related processes

Buy Now
Questions 318

The BEST way to evaluate the effectiveness of a newly developed application is to:

Options:

A.

perform a post-implementation review-

B.

analyze load testing results.

C.

perform a secure code review.

D.

review acceptance testing results.

Buy Now
Questions 319

Which of the following is a PRIMARY benefit of using risk assessments to determine areas to be included in an audit plan?

Options:

A.

Timely audit execution

B.

Effective allocation of audit resources

C.

Reduced travel and expense costs

D.

Effective risk mitigation

Buy Now
Questions 320

Which of the following is the MOST important course of action to ensure a cloud access security broker (CASB) effectively detects and responds to threats?

Options:

A.

Monitoring data movement

B.

Implementing a long-term CASB contract

C.

Reviewing the information security policy

D.

Evaluating firewall effectiveness

Buy Now
Questions 321

An IS auditor is reviewing the perimeter security design of a network. Which of the following provides the GREATEST assurance outgoing Internet traffic is controlled?

Options:

A.

Intrusion detection system (IDS)

B.

Security information and event management (SIEM) system

C.

Stateful firewall

D.

Load balancer

Buy Now
Questions 322

An IS auditor will be testing accounts payable controls by performing data analytics on the entire population of transactions. Which of the following is MOST important for the auditor to confirm when sourcing the population data?

Options:

A.

The data is taken directly from the system.

B.

There is no privacy information in the data.

C.

The data can be obtained in a timely manner.

D.

The data analysis tools have been recently updated.

Buy Now
Questions 323

Which of the following is the BEST indicator for measuring performance of IT help desk function?

Options:

A.

Percentage of problems raised from incidents

B.

Mean time to categorize tickets

C.

Number 0t incidents reported

D.

Number of reopened tickets

Buy Now
Questions 324

An IS auditor is reviewing a machine learning algorithm-based system for loan approvals and is preparing a data set to test the algorithm for bias. Which of the following is MOST important for the auditor’s test data set to include?

Options:

A.

Applicants of all ages

B.

Applicants from a range of geographic areas and income levels

C.

Incomplete records and incorrectly formatted data

D.

Duplicate records

Buy Now
Questions 325

Which of the following should an IS auditor review FIRST when planning a customer data privacy audit?

Options:

A.

Legal and compliance requirements

B.

Customer agreements

C.

Data classification

D.

Organizational policies and procedures

Buy Now
Questions 326

Which of the following MOST effectively enables consistency across high-volume software changes ' ?

Options:

A.

The use of continuous integration and deployment pipelines

B.

Management reviews of detailed exception reports for released code

C.

Publication of a refreshed policy on development and release management

D.

An ongoing awareness campaign for software deployment best practices

Buy Now
Questions 327

Which of the following is MOST important to consider when determining the usefulness of audit evidence?

Options:

A.

Timing of the evidence

B.

Nature of evidence gathered

C.

Overall objectives of the review

D.

Competence of the IS auditor

Buy Now
Questions 328

Which of the following is MOST important when implementing a data classification program?

Options:

A.

Understanding the data classification levels

B.

Formalizing data ownership

C.

Developing a privacy policy

D.

Planning for secure storage capacity

Buy Now
Questions 329

Which of the following would BEST assist an IS auditor in understanding the inputs and outputs of a microservice-oriented application?

Options:

A.

Data flow diagrams

B.

Network architecture diagrams

C.

Business requirements documentation

D.

Entity-relationship diagrams

Buy Now
Questions 330

Due to limited storage capacity, an organization has decided to reduce the actual retention period for media containing completed low-value transactions. Which of the following is MOST important for the organization to ensure?

Options:

A.

The policy includes a strong risk-based approach.

B.

The retention period allows for review during the year-end audit.

C.

The total transaction amount has no impact on financial reporting.

D.

The retention period complies with data owner responsibilities.

Buy Now
Questions 331

Which of the following is the PRIMARY reason for an IS audit manager to review the work performed by a senior IS auditor prior to presentation of a report?

Options:

A.

To ensure the conclusions are adequately supported

B.

To ensure adequate sampling methods were used during fieldwork

C.

To ensure the work is properly documented and filed

D.

To ensure the work is conducted according to industry standards

Buy Now
Questions 332

A source code repository should be designed to:

Options:

A.

prevent changes from being incorporated into existing code.

B.

prevent developers from accessing secure source code.

C.

provide secure versioning and backup capabilities for existing code.

D.

provide automatic incorporation and distribution of modified code.

Buy Now
Questions 333

Which of the following should an IS auditor expect to see in a network vulnerability assessment?

Options:

A.

Misconfiguration and missing updates

B.

Malicious software and spyware

C.

Zero-day vulnerabilities

D.

Security design flaws

Buy Now
Questions 334

The MOST important objective of a post-implementation audit is to:

Options:

A.

Address lessons learned from the project.

B.

Determine whether the required objectives were met.

C.

Develop a process for continuous improvement.

D.

Seek approval for the next implementation phase.

Buy Now
Questions 335

Which of the following key performance indicators (KPIs) provides stakeholders with the MOST useful information about whether information security risk is being managed?

Options:

A.

Time from identifying security threats to implementing solutions

B.

The number of security controls audited

C.

Time from security log capture to log analysis

D.

The number of entries in the security risk register

Buy Now
Questions 336

An IS auditor is assigned to perform a post-implementation review of an application system. Which of the following would impair the auditor’s independence?

Options:

A.

The auditor implemented a specific control during the development of the system.

B.

The auditor participated as a member of the project team without operational responsibilities.

C.

The auditor provided advice concerning best practices.

D.

The auditor designed an embedded audit module exclusively for audit.

Buy Now
Questions 337

Which of the following BEST enables an organization to determine the effectiveness of its information security awareness program?

Options:

A.

Measuring user satisfaction with the quality of the training

B.

Evaluating the results of a social engineering exercise

C.

Reviewing security staff performance evaluations

D.

Performing an analysis of the number of help desk calls

Buy Now
Questions 338

Which of the following methods would MOST effectively provide positive authentication for physical access?

Options:

A.

Proximity card

B.

Retina scan

C.

Numeric keypads and surveillance camera

D.

A smart card and a security guard

Buy Now
Questions 339

Which of the following should an IS auditor recommend be done FIRST when an organization is made aware of a new regulation that is likely to impact IT security requirements?

Options:

A.

Update security policies based on the new regulation.

B.

Determine which systems and IT-related processes may be impacted.

C.

Evaluate how security awareness and training content may be impacted.

D.

Review the design and effectiveness of existing IT controls.

Buy Now
Questions 340

An organization plans to receive an automated data feed into its enterprise data warehouse from a third-party service provider. Which of the following would be the BEST way to prevent accepting bad data?

Options:

A.

Obtain error codes indicating failed data feeds.

B.

Purchase data cleansing tools from a reputable vendor.

C.

Appoint data quality champions across the organization.

D.

Implement business rules to reject invalid data.

Buy Now
Questions 341

A checksum is classified as which type of control?

Options:

A.

Detective control

B.

Preventive control

C.

Corrective control

D.

Administrative control

Buy Now
Questions 342

Secure code reviews as part of a continuous deployment program are which type of control?

Options:

A.

Detective

B.

Logical

C.

Preventive

D.

Corrective

Buy Now
Questions 343

Which of the following would MOST likely impair the independence of the IS auditor when performing a post-implementation review of an application system?

Options:

A.

The IS auditor provided consulting advice concerning application system best practices.

B.

The IS auditor participated as a member of the application system project team, but did not have operational responsibilities.

C.

The IS auditor designed an embedded audit module exclusively for auditing the application system.

D.

The IS auditor implemented a specific control during the development of the application system.

Buy Now
Questions 344

What should be the PRIMARY focus during a review of a business process improvement project?

Options:

A.

Business project plan

B.

Continuous monitoring plans

C.

The cost of new controls

D.

Business impact

Buy Now
Questions 345

Who should be the FIRST to evaluate an audit report prior to issuing it to the project steering committee?

Options:

A.

IS audit manager

B.

Audit committee

C.

Business owner

D.

Project sponsor

Buy Now
Questions 346

Which of the following should an organization do to anticipate the effects of a disaster?

Options:

A.

Define recovery point objectives (RPO)

B.

Simulate a disaster recovery

C.

Develop a business impact analysis (BIA)

D.

Analyze capability maturity model gaps

Buy Now
Questions 347

A national tax administration agency with a distributed network experiences service disruptions due to a large influx of traffic to a regional office near the end of each year. Which of the following would BEST enable the agency to improve the performance of its servers during the busy period?

Options:

A.

Virtual firewall

B.

Proxy server

C.

Load balancer

D.

Virtual private network (VPN)

Buy Now
Questions 348

Which of the following is the PRIMARY function of an internal IS auditor when the organization acquires a new IT system to support its business strategy?

Options:

A.

Identifying significant IT errors and fraud

B.

Assessing system development life cycle (SDLC) controls

C.

Implementing risk and control gap mitigation

D.

Evaluating IT risk and controls

Buy Now
Questions 349

Providing security certification for a new system should include which of the following prior to the system ' s implementation?

Options:

A.

End-user authorization to use the system in production

B.

External audit sign-off on financial controls

C.

Testing of the system within the production environment

D.

An evaluation of the configuration management practices

Buy Now
Questions 350

During a security audit, an IS auditor is tasked with reviewing log entries obtained from an enterprise intrusion prevention system (IPS). Which type of risk would be associated with the potential for the auditor to miss a sequence of logged events that could indicate an error in the IPS configuration?

Options:

A.

Sampling risk

B.

Detection risk

C.

Control risk

D.

Inherent risk

Buy Now
Questions 351

Which of the following is the PRIMARY purpose of conducting a control self-assessment (CSA)?

Options:

A.

To replace audit responsibilities

B.

To reduce control costs

C.

To promote control ownership

D.

To enable early detection of risks

Buy Now
Questions 352

A startup organization wants to develop a data loss prevention (DLP) program. The FIRST step should be to implement:

Options:

A.

Security awareness training

B.

Data encryption

C.

Data classification

D.

Access controls

Buy Now
Questions 353

Which of the following is the PRIMARY objective of enterprise architecture (EA)?

Options:

A.

Maintaining detailed system documentation

B.

Managing and planning for IT investments

C.

Executing customized development and delivery of projects

D.

Enforcing the IT policy across the organization

Buy Now
Questions 354

Which of the following is MOST important for an IS auditor to examine when reviewing an organization ' s privacy policy?

Options:

A.

Whether there is explicit permission from regulators to collect personal data

B.

The organization ' s legitimate purpose for collecting personal data

C.

Whether sharing of personal information with third-party service providers is prohibited

D.

The encryption mechanism selected by the organization for protecting personal data

Buy Now
Questions 355

Which of the following findings should be an IS auditor’s GREATEST concern when reviewing a project to migrate confidential data backups to a cloud-based solution?

Options:

A.

Lack of chain of custody for retired backup media

B.

Insufficient scalability

C.

Insufficient due diligence performed on the vendor

D.

Increased storage cost

Buy Now
Questions 356

An IS auditor has completed the fieldwork phase of a network security review and is preparing the initial following findings should be ranked as the HIGHEST risk?

Options:

A.

Network penetration tests are not performed

B.

The network firewall policy has not been approved by the information security officer.

C.

Network firewall rules have not been documented.

D.

The network device inventory is incomplete.

Buy Now
Questions 357

An organization is implementing a new data loss prevention (DLP) tool. Which of the following will BEST enable the organization to reduce false positive alerts?

Options:

A.

Using the default policy and tool rule sets

B.

Configuring a limited set of rules

C.

Deploying the tool in monitor mode

D.

Reducing the number of detection points

Buy Now
Questions 358

Which of the following is the BEST reason to implement a data retention policy?

Options:

A.

To limit the liability associated with storing and protecting information

B.

To document business objectives for processing data within the organization

C.

To assign responsibility and ownership for data protection outside IT

D.

To establish a recovery point detective (RPO) for (toaster recovery procedures

Buy Now
Questions 359

Which of the following is MOST important during software license audits?

Options:

A.

Judgmental sampling

B.

Substantive testing

C.

Compliance testing

D.

Stop-or-go sampling

Buy Now
Questions 360

An IS auditor notes that the previous year ' s disaster recovery test was not completed within the scheduled time frame due to insufficient hardware allocated by a third-party vendor. Which of the following provides the BEST evidence that adequate resources are now allocated to successfully recover the systems?

Options:

A.

Service level agreement (SLA)

B.

Hardware change management policy

C.

Vendor memo indicating problem correction

D.

An up-to-date RACI chart

Buy Now
Questions 361

An organization is implementing a new system that supports a month-end business process. Which of the following implementation strategies would be MOST efficient to decrease business downtime?

Options:

A.

Big bang

B.

Phased

C.

Cutover

D.

Parallel

Buy Now
Questions 362

Which of the following audit procedures would be MOST conclusive in evaluating the effectiveness of an e-commerce application system ' s edit routine?

Options:

A.

Review of program documentation

B.

Use of test transactions

C.

Interviews with knowledgeable users

D.

Review of source code

Buy Now
Questions 363

Capacity management tools are PRIMARILY used to ensure that:

Options:

A.

available resources are used efficiently and effectively

B.

computer systems are used to their maximum capacity most of the time

C.

concurrent use by a large number of users is enabled

D.

proposed hardware acquisitions meet capacity requirements

Buy Now
Questions 364

Which of the following is the PRIMARY reason an IS auditor should recommend that management create an IT risk register?

Options:

A.

To document root causes of IT-related risk events and lessons learned

B.

To ensure there is appropriate funding for IT risk mitigation efforts

C.

To ensure an inventory of potential IT risks is maintained and reported

D.

To facilitate internal audit ' s testing of IT-risk-related controls

Buy Now
Questions 365

When an intrusion into an organization network is deleted, which of the following should be done FIRST?

Options:

A.

Block all compromised network nodes.

B.

Contact law enforcement.

C.

Notify senior management.

D.

Identity nodes that have been compromised.

Buy Now
Questions 366

A business application ' s database is copied to a replication server within minutes. Which of the following processes taking place during business hours will MOST benefit from this architecture?

Options:

A.

Rolling forward of transactions when a production server fails

B.

Ad hoc batch reporting jobs from the replication server

C.

Analysis of application performance degradation

D.

Hardware replacement work involving databases

Buy Now
Questions 367

Which of the following is MOST important to consider when developing a service level agreement (SLAP)?

Options:

A.

Description of the services from the viewpoint of the provider

B.

Detailed identification of work to be completed

C.

Provisions for regulatory requirements that impact the end users ' businesses

D.

Description of the services from the viewpoint of the client organization

Buy Now
Questions 368

Which of the following is MOST important for an IS auditor to verify when evaluating an organization ' s data conversion andinfrastructure migration plan?

Options:

A.

Strategic: goals have been considered.

B.

A rollback plan is included.

C.

A code check review is included.

D.

A migration steering committee has been formed.

Buy Now
Questions 369

Retention periods and conditions for the destruction of personal data should be determined by the.

Options:

A.

risk manager.

B.

database administrator (DBA).

C.

privacy manager.

D.

business owner.

Buy Now
Questions 370

Which of the following would be an IS auditor ' s GREATEST concern when reviewing the organization ' s business continuity plan (BCP)?

Options:

A.

The recovery plan does not contain the process and application dependencies.

B.

The duration of tabletop exercises is longer than the recovery point objective (RPO).

C.

The duration of tabletop exercises is longer than the recovery time objective (RTO).

D.

The recovery point objective (RPO) and recovery time objective (R TO) are not the same.

Buy Now
Questions 371

Which of the following security risks can be reduced by a property configured network firewall?

Options:

A.

SQL injection attacks

B.

Denial of service (DoS) attacks

C.

Phishing attacks

D.

Insider attacks

Buy Now
Questions 372

Which of the following should be identified FIRST during the risk assessment process?

Options:

A.

Vulnerability to threats

B.

Existing controls

C.

Information assets

D.

Legal requirements

Buy Now
Questions 373

Which of the following should be the GREATEST concern for an IS auditor performing a post-implementation review for a major system upgrade?

Options:

A.

Changes are promoted to production by the development group.

B.

Object code can be accessed by the development group.

C.

Developers have access to the testing environment.

D.

Change approvals are not formally documented.

Buy Now
Questions 374

An IS auditor learns that an organization ' s business continuity plan (BCP) has not been updated in the last 18 months and that the organization recently closed a production plant. Which of the following is the auditor ' s BEST course of action?

Options:

A.

Determine whether the business impact analysis (BIA) is current with the organization ' s structure and context.

B.

Determine the types of technologies used at the plant and how they may affect the BCP.

C.

Perform testing to determine the impact to the recovery time objective (R TO).

D.

Assess the risk to operations from the closing of the plant.

Buy Now
Questions 375

Which of the following is the BEST way to ensure that business continuity plans (BCPs) will work effectively in the event of a major disaster?

Options:

A.

Prepare detailed plans for each business function.

B.

Involve staff at all levels in periodic paper walk-through exercises.

C.

Regularly update business impact assessments.

D.

Make senior managers responsible for their plan sections.

Buy Now
Questions 376

Which of the following would lead an IS auditor to conclude that the evidence collected during a digital forensic investigation would not be admissible in court?

Options:

A.

The person who collected the evidence is not qualified to represent the case.

B.

The logs failed to identify the person handling the evidence.

C.

The evidence was collected by the internal forensics team.

D.

The evidence was not fully backed up using a cloud-based solution prior to the trial.

Buy Now
Questions 377

An IS auditor has been asked to review the integrity of data transfer between two business-critical systems that have not been tested since implementation. Which of the following would provide the MOST useful information to plan an audit?

Options:

A.

Quality assurance (QA) testing

B.

System change logs

C.

IT testing policies and procedures

D.

Previous system interface testing records

Buy Now
Questions 378

An IS auditor can BEST evaluate the business impact of system failures by:

Options:

A.

assessing user satisfaction levels.

B.

interviewing the security administrator.

C.

analyzing equipment maintenance logs.

D.

reviewing system-generated logs.

Buy Now
Questions 379

Which of the following conditions would be of MOST concern to an IS auditor assessing the risk of a successful brute force attack against encrypted data at test?

Options:

A.

Short key length

B.

Random key generation

C.

Use of symmetric encryption

D.

Use of asymmetric encryption

Buy Now
Questions 380

When assessing the overall effectiveness of an organization ' s disaster recovery planning process, which of the following is MOST important for the IS auditor to verify?

Options:

A.

Management contracts with a third party for warm site services.

B.

Management schedules an annual tabletop exercise.

C.

Management documents and distributes a copy of the plan to all personnel.

D.

Management reviews and updates the plan annually or as changes occur.

Buy Now
Questions 381

Documentation of workaround processes to keep a business function operational during recovery of IT systems is a core part of a:

Options:

A.

business impact analysis (BIA).

B.

threat and risk assessment.

C.

business continuity plan (BCP).

D.

disaster recovery plan (DRP).

Buy Now
Questions 382

An IS auditor notes that several employees are spending an excessive amount of time using social media sites for personal reasons. Which of the following should the auditor recommend be performed FIRST?

Options:

A.

Implement a process to actively monitor postings on social networking sites.

B.

Adjust budget for network usage to include social media usage.

C.

Use data loss prevention (DLP) tools on endpoints.

D.

implement policies addressing acceptable usage of social media during working hours.

Buy Now
Questions 383

Which of the following provides re BEST evidence that outsourced provider services are being properly managed?

Options:

A.

Adequate action is taken for noncompilance with the service level agreement (SLA).

B.

The service level agreement (SLA) includes penalties tor non-performance.

C.

Internal performance standards align with corporate strategy.

D.

The vendor provides historical data to demonstrate its performance.

Buy Now
Questions 384

When auditing the alignment of IT to the business strategy, it is MOST Important for the IS auditor to:

Options:

A.

compare the organization ' s strategic plan against industry best practice.

B.

interview senior managers for their opinion of the IT function.

C.

ensure an IT steering committee is appointed to monitor new IT projects.

D.

evaluate deliverables of new IT initiatives against planned business services.

Buy Now
Questions 385

Which of the following is the BEST performance indicator for the effectiveness of an incident management program?

Options:

A.

Average time between incidents

B.

Incident alert meantime

C.

Number of incidents reported

D.

Incident resolution meantime

Buy Now
Questions 386

Which of the following is the PRIMARY objective of implementing privacy-related controls within an organization?

Options:

A.

To prevent confidential data loss

B.

To comply with legal and regulatory requirements

C.

To identify data at rest and data in transit for encryption

D.

To provide options to individuals regarding use of their data

Buy Now
Questions 387

Which of the following activities should be separated in an organization’s incident management processes?

Options:

A.

Initiating and closing error logs

B.

Collecting and analyzing logs from devices

C.

Identifying root causes and recommending workarounds

D.

Recording and classifying incidents

Buy Now
Questions 388

Which of the following should an IS auditor be MOST concerned with during a post-implementation review?

Options:

A.

The system does not have a maintenance plan.

B.

The system contains several minor defects.

C.

The system deployment was delayed by three weeks.

D.

The system was over budget by 15%.

Buy Now
Questions 389

Which of the following is the MOST appropriate testing approach when auditing a daily data flow between two systems via an automated interface to confirm that it is complete and accurate?

Options:

A.

Confirm that the encryption standard applied to the interface is in line with best practice.

B.

Inspect interface configurations and an example output of the systems.

C.

Perform data reconciliation between the two systems for a sample of 25 days.

D.

Conduct code review for both systems and inspect design documentation.

Buy Now
Questions 390

How would an IS auditor BEST determine the effectiveness of a security awareness program?

Options:

A.

Review the results of social engineering tests.

B.

Evaluate management survey results.

C.

Interview employees to assess their security awareness.

D.

Review security awareness training quiz results.

Buy Now
Questions 391

Which of the following is MOST likely to be a project deliverable of an agile software development methodology?

Options:

A.

Strictly managed software requirements baselines

B.

Extensive project documentation

C.

Automated software programming routines

D.

Rapidly created working prototypes

Buy Now
Questions 392

During an IS audit of a data center, it was found that programmers are allowed to make emergency fixes to operational programs. Which of the following should be the IS auditor ' s PRIMARY recommendation?

Options:

A.

Programmers should be allowed to implement emergency fixes only after obtaining verbal agreement from the application owner.

B.

Emergency program changes should be subject to program migration and testing procedures before they are applied to operational systems.

C.

Bypass user ID procedures should be put in place to ensure that the changes are subject to after-the-event approval and testing.

Buy Now
Questions 393

During which phase of the software development life cycle is it BEST to initiate the discussion of application controls?

Options:

A.

Business case development phase when stakeholders are identified

B.

Application design phase process functionalities are finalized

C.

User acceptance testing (UAT) phase when test scenarios are designed

D.

Application coding phase when algorithms are developed to solve business problems

Buy Now
Questions 394

An organization ' s IT department and internal IS audit function all report to the chief information officer (CIO). Which of the following is the GREATEST concern associated with this reporting structure?

Options:

A.

Potential for inaccurate audit findings

B.

Compromise of IS audit independence

C.

IS audit resources being shared with other IT functions

D.

IS audit being isolated from other audit functions

Buy Now
Questions 395

Which of the following is the BEST evidence that an organization ' s IT strategy is aligned lo its business objectives?

Options:

A.

The IT strategy is modified in response to organizational change.

B.

The IT strategy is approved by executive management.

C.

The IT strategy is based on IT operational best practices.

D.

The IT strategy has significant impact on the business strategy

Buy Now
Questions 396

Which of the following would provide the MOST important input during the planning phase for an audit on the implementation of a bring your own device (BYOD) program?

Options:

A.

Findings from prior audits

B.

Results of a risk assessment

C.

An inventory of personal devices to be connected to the corporate network

D.

Policies including BYOD acceptable user statements

Buy Now
Questions 397

Which of the following provides the MOST useful information for performing a business impact analysis (B1A)?

Options:

A.

inventory of relevant business processes

B.

Policies for business procurement

C.

Documentation of application configurations

D.

Results of business resumption planning efforts

Buy Now
Questions 398

While reviewing transactions, an IS auditor discovers inconsistencies in a relational database. Which of the following would be the auditor ' s BEST recommendation?

Options:

A.

Update the data dictionary.

B.

Implement edit checks.

C.

Perform data modeling.

D.

Conduct data owner training.

Buy Now
Questions 399

Which of the following is the MOST effective way to maintain network integrity when using mobile devices?

Options:

A.

Implement network access control.

B.

Implement outbound firewall rules.

C.

Perform network reviews.

D.

Review access control lists.

Buy Now
Questions 400

Reviewing which of the following would provide the BEST indication that a project is progressing as planned?

Options:

A.

Identification of the critical path

B.

Earned value analysis (EVA) results

C.

Work breakdown structure

D.

Traceability matrix

Buy Now
Questions 401

Which type of testing is used to identify security vulnerabilities in source code in the development environment?

Options:

A.

Interactive application security testing (IAST)

B.

Runtime application self-protection (RASP)

C.

Dynamic analysis security testing (DAST)

D.

Static analysis security testing (SAST)

Buy Now
Questions 402

Which of the following public key infrastructure (PKI) elements provides detailed descriptions for dealing with a compromised private key?

Options:

A.

Certification practice statement

B.

Certificate policy

C.

PKI disclosure statement

D.

Certificate revocation list

Buy Now
Questions 403

Which of the following is the BEST security control to validate the integrity of data communicated between production databases and a big data analytics

system?

Options:

A.

Hashing in-scope data sets

B.

Encrypting in-scope data sets

C.

Running and comparing the count function within the in-scope data sets

D.

Hosting a digital certificate for in-scope data sets

Buy Now
Questions 404

During a review of an organization ' s IT capacity management process, an IS auditor should be MOST concerned if capacity planning:

Options:

A.

Was reviewed once during the previous six months.

B.

Omitted changes to key business systems.

C.

Lacked input from system administrators.

D.

Was based on input from IT service management only.

Buy Now
Questions 405

Which of the following findings should be of GREATEST concern to an IS auditor assessing the risk associated with end-user computing (EUC) in an organization?

Options:

A.

Insufficient processes to track ownership of each EUC application?

B.

Insufficient processes to lest for version control

C.

Lack of awareness training for EUC users

D.

Lack of defined criteria for EUC applications

Buy Now
Questions 406

Which of the following audit evidence collection procedures is MOST reliable?

Options:

A.

Inspecting paper documentation obtained from an independent third party

B.

Inspecting system-generated evidence provided by a control owner

C.

Examining critical data received from an auditee

D.

Performing manual procedures independently from a control owner

Buy Now
Questions 407

An audit identified that a computer system is not assigning sequential purchase order numbers to order requests. The IS auditor is conducting an audit follow-up to determine if management has reserved this finding. Which of two following is the MOST reliable follow-up procedure?

Options:

A.

Review the documentation of recant changes to implement sequential order numbering.

B.

Inquire with management if the system has been configured and tested to generate sequential order numbers.

C.

Inspect the system settings and transaction logs to determine if sequential order numbers are generated.

D.

Examine a sample of system generated purchase orders obtained from management

Buy Now
Questions 408

An IS auditor is performing a follow-up audit and notes that some critical deficiencies have not been addressed. The auditor ' s BEST course of action is to:

Options:

A.

document management ' s reasons for not addressing deficiencies.

B.

postpone the audit until the deficiencies are addressed.

C.

assess the impact of not addressing deficiencies.

D.

provide new recommendations.

Buy Now
Questions 409

Which of the following is MOST important to consider when reviewing an organization ' s defined data backup and restoration procedures?

Options:

A.

Business continuity plan (BCP)

B.

Recovery point objective (RPO)

C.

Mean time to restore (MTTR)

D.

Mean time between failures (MTBF)

Buy Now
Questions 410

In an organization ' s feasibility study to acquire hardware to support a new web server, omission of which of the following would be of MOST concern?

Options:

A.

Alternatives for financing the acquisition

B.

Financial stability of potential vendors

C.

Reputation of potential vendors

D.

Cost-benefit analysis of available products

Buy Now
Questions 411

Management receives information indicating a high level of risk associated with potential flooding near the organization ' s data center within the next few years. As a result, a decision has been made to move data center operations to another facility on higher ground. Which approach has been adopted?

Options:

A.

Risk avoidance

B.

Risk transfer

C.

Risk acceptance

D.

Risk reduction

Buy Now
Questions 412

What is the PRIMARY reason for an organization to classify the data stored on its internal networks?

Options:

A.

To determine data retention policy

B.

To implement data protection requirements

C.

To comply with the organization ' s data policies

D.

To follow industry best practices

Buy Now
Questions 413

Which of the following is MOST important for an IS auditor to verify when evaluating an organization ' s firewall?

Options:

A.

Logs are being collected in a separate protected host

B.

Automated alerts are being sent when a risk is detected

C.

Insider attacks are being controlled

D.

Access to configuration files Is restricted.

Buy Now
Questions 414

A new system development project is running late against a critical implementation deadline. Which of the following is the MOST important activity?

Options:

A.

Ensure that code has been reviewed.

B.

Perform user acceptance testing (UAT).

C.

Document last-minute enhancements.

D.

Perform a pre-implementation audit.

Buy Now
Questions 415

Which of the following is the BEST way to foster continuous improvement of IS audit processes and practices?

Options:

A.

Invite external auditors and regulators to perform regular assessments of the IS audit function.

B.

Implement rigorous managerial review and sign-off of IS audit deliverables.

C.

Frequently review IS audit policies, procedures, and instruction manuals.

D.

Establish and embed quality assurance (QA) within the IS audit function.

Buy Now
Questions 416

Which of the following controls BEST provides confidentiality and nonrepudiation for an online business looking for digital payment data security?

Options:

A.

Data Encryption Standard (DES)

B.

Advanced Encryption Standard (AES)

C.

Public Key Infrastructure (PKI)

D.

Virtual Private Network (VPN)

Buy Now
Questions 417

Which type of security testing is MOST efficient for finding hidden errors in software and facilitating source code optimization?

Options:

A.

User acceptance testing (UAT)

B.

Black box testing

C.

White box testing

D.

Penetration testing

Buy Now
Questions 418

An IS auditor plans to review all access attempts to a video-monitored and proximity card-controlled communications room. Which of the following would be MOST useful to the auditor?

Options:

A.

Alarm system with CCTV

B.

Access control log

C.

Security incident log

D.

Access card allocation records

Buy Now
Questions 419

Which of the following observations should be of GREATEST concern to an IS auditor reviewing an organization’s enterprise architecture (EA) program?

Options:

A.

The architecture review board is chaired by the CIO

B.

IT application owners have sole responsibility for architecture approval

C.

The EA program governs projects that are not IT-related

D.

Information security requirements are reviewed by the EA program

Buy Now
Questions 420

An IS auditor is reviewing a client ' s outsourced payroll system to assess whether the financial audit team can rely on the application. Which of the following findings would be the auditor ' s

GREATEST concern?

Options:

A.

User access rights have not been periodically reviewed by the client.

B.

Payroll processing costs have not been included in the IT budget.

C.

The third-party contract has not been reviewed by the legal department.

D.

The third-party contract does not comply with the vendor management policy.

Buy Now
Questions 421

When reviewing the functionality of an intrusion detection system (IDS), the IS auditor should be MOST concerned if:

Options:

A.

legitimate packets blocked by the system have increased

B.

actual attacks have not been identified

C.

detected events have increased

D.

false positives have been reported

Buy Now
Questions 422

An IS auditor finds that application servers had inconsistent security settings leading to potential vulnerabilities. Which of the following is the BEST recommendation by the IS auditor?

Options:

A.

Improve the change management process

B.

Establish security metrics.

C.

Perform a penetration test

D.

Perform a configuration review

Buy Now
Questions 423

Which of the following will invalidate the authenticity of digital evidence in a forensic investigation?

Options:

A.

The investigator installed forensic software on the original drive that contained the evidence.

B.

A software write blocker was used in the collection of the evidence.

C.

The investigator collected the evidence while the machine was still powered on.

D.

The evidence was collected from analysis of a copy of the disk data.

Buy Now
Questions 424

Which of the following is the PRIMARY role of the IT steering committee?

Options:

A.

Granting authorization for periodic IT audits

B.

Periodically reporting to business units about IT performance

C.

Facilitating collaboration between business and IT

D.

Ensuring business units are supporting IT objectives

Buy Now
Questions 425

Capacity management enables organizations to:

Options:

A.

forecast technology trends

B.

establish the capacity of network communication links

C.

identify the extent to which components need to be upgraded

D.

determine business transaction volumes.

Buy Now
Questions 426

Which of the following is the BEST reason for software developers to use automated testing versus manual testing?

Options:

A.

CAATs are easily developed

B.

Improved regression testing

C.

Ease of maintaining automated test scripts

D.

Reduces the scope of acceptance testing

Buy Now
Questions 427

Which audit approach is MOST helpful in optimizing the use of IS audit resources?

Options:

A.

Agile auditing

B.

Continuous auditing

C.

Outsourced auditing

D.

Risk-based auditing

Buy Now
Questions 428

Which of the following BEST helps data loss prevention (DLP) tools detect movement of sensitive data m transit?

Options:

A.

Network traffic logs

B.

Deep packet inspection

C.

Data inventory

D.

Proprietary encryption

Buy Now
Questions 429

Which of the following is the MOST appropriate indicator of change management effectiveness?

Options:

A.

Time lag between changes to the configuration and the update of records

B.

Number of system software changes

C.

Time lag between changes and updates of documentation materials

D.

Number of incidents resulting from changes

Buy Now
Questions 430

An IS auditor has been asked to review the quality of data in a general ledger system. Which of the following would provide the auditor with the MOST meaningful results?

Options:

A.

Discussion of the largest account values with business owners

B.

Integrity checks against source documentation

C.

System vulnerability assessment

D.

Interviews with system owners and operators

Buy Now
Questions 431

Which of the following is an example of a passive attack method?

Options:

A.

Keystroke logging

B.

Piggybacking

C.

Eavesdropping

D.

Phishing

Buy Now
Questions 432

An organization is shifting to a remote workforce In preparation the IT department is performing stress and capacity testing of remote access infrastructure and systems What type of control is being implemented?

Options:

A.

Directive

B.

Detective

C.

Preventive

D.

Compensating

Buy Now
Questions 433

Which of the following helps to ensure the integrity of data for a system interface?

Options:

A.

System interface testing

B.

user acceptance testing (IJAT)

C.

Validation checks

D.

Audit logs

Buy Now
Questions 434

Which of the following is the MOST effective way to identify exfiltration of sensitive data by a malicious insider?

Options:

A.

Implement data loss prevention (DLP) software

B.

Review perimeter firewall logs

C.

Provide ongoing information security awareness training

D.

Establish behavioral analytics monitoring

Buy Now
Questions 435

An IS auditor is evaluating the progress of a web-based customer service application development project. Which of the following would be MOST helpful for this evaluation?

Options:

A.

Backlog consumption reports

B.

Critical path analysis reports

C.

Developer status reports

D.

Change management logs

Buy Now
Questions 436

Which of the following security measures will reduce the risk of propagation when a cyberattack occurs?

Options:

A.

Perimeter firewall

B.

Data loss prevention (DLP) system

C.

Network segmentation

D.

Web application firewall (WAF)

Buy Now
Questions 437

What should an IS auditor do FIRST when a follow-up audit reveals some management action plans have not been initiated?

Options:

A.

Confirm whether the identified risks are still valid.

B.

Provide a report to the audit committee.

C.

Escalate the lack of plan completion to executive management.

D.

Request an additional action plan review to confirm the findings.

Buy Now
Questions 438

Which of the following network communication protocols is used by network devices such as routers to send error messages and operational information indicating success or failure when communicating with another IP address?

Options:

A.

Transmission Control Protocol/Internet Protocol (TCP/IP)

B.

Internet Control Message Protocol

C.

Multipurpose Transaction Protocol

D.

Point-to-Point Tunneling Protocol

Buy Now
Questions 439

An IS auditor is asked to provide feedback on the systems options analysis for a new project. The BEST course of action for the IS auditor would be to:

Options:

A.

Identify the best alternative.

B.

Retain comments as findings for the audit report.

C.

Comment on the criteria used to assess the alternatives.

D.

Request at least one other alternative.

Buy Now
Questions 440

Which of the following documents should define roles and responsibilities within an IT audit organization?

Options:

A.

Audit charter

B.

Annual audit plan

C.

Engagement letter

D.

Audit scope letter

Buy Now
Questions 441

During an audit of a reciprocal disaster recovery agreement between two companies, the IS auditor would be MOST concerned with the:

Options:

A.

allocation of resources during an emergency.

B.

frequency of system testing.

C.

differences in IS policies and procedures.

D.

maintenance of hardware and software compatibility.

Buy Now
Questions 442

What should an IS auditor do FIRST upon discovering that a service provider did not notify its customers of a security breach?

Options:

A.

Notify law enforcement of the finding.

B.

Require the third party to notify customers.

C.

The audit report with a significant finding.

D.

Notify audit management of the finding.

Buy Now
Questions 443

Which of the following is the PRIMARY reason that asset classification is vital to an information security program?

Options:

A.

To ensure the appropriate level of protection to assets

B.

To ensure asset protection efforts are in line with industry standards

C.

To ensure risk mitigation efforts are adequate

D.

To ensure sufficient resources are allocated for information security

Buy Now
Questions 444

Which of the following is the BEST method to maintain an audit trail of changes made to the source code of a program?

Options:

A.

Embed details within source code.

B.

Standardize file naming conventions.

C.

Utilize automated version control.

D.

Document details on a change register.

Buy Now
Questions 445

Which of the following should be an IS auditor ' s GREATEST concern when reviewing an organization ' s security controls for policy compliance?

Options:

A.

Security policies are not applicable across all business units

B.

End users are not required to acknowledge security policy training

C.

The security policy has not been reviewed within the past year

D.

Security policy documents are available on a public domain website

Buy Now
Questions 446

An IS auditor has been asked to assess the security of a recently migrated database system that contains personal and financial data for a bank ' s customers. Which of the following controls is MOST important for the auditor to confirm is in place?

Options:

A.

The default configurations have been changed.

B.

All tables in the database are normalized.

C.

The service port used by the database server has been changed.

D.

The default administration account is used after changing the account password.

Buy Now
Questions 447

A financial group recently implemented new technologies and processes, Which type of IS audit would provide the GREATEST level of assurance that the department ' s objectives have been met?

Options:

A.

Performance audit

B.

Integrated audit

C.

Cyber audit

D.

Financial audit

Buy Now
Questions 448

In a large organization, IT deadlines on important projects have been missed because IT resources are not prioritized properly. Which of the following is the BEST recommendation to address this problem?

Options:

A.

Revisit the IT strategic plan.

B.

Implement project portfolio management.

C.

Implement an integrated resource management system.

D.

Implement a comprehensive project scorecard.

Buy Now
Questions 449

Which of the following are examples of corrective controls?

Options:

A.

Implementing separation of duties and hash totals

B.

Performing internal audit reviews and remediation activities

C.

Applying rollback scripts and backup procedures

D.

Enforcing disciplinary action and termination procedures

Buy Now
Questions 450

Which of the following is the BEST control to mitigate attacks that redirect internet traffic to an unauthorized website?

Options:

A.

Conduct regular user security awareness training.

B.

Enforce strong web browser security controls.

C.

Perform domain name system (DNS) server security hardening.

D.

Implement a web application firewall (WAF).

Buy Now
Questions 451

Which of the following should be the FIRST step when developing a data loss prevention (DLP) solution for a large organization?

Options:

A.

Conduct a data inventory and classification exercise.

B.

Identify approved data workflows across the enterprise_

C.

Conduct a threat analysis against sensitive data usage.

D.

Create the DLP policies and templates

Buy Now
Questions 452

An organization that operates an e-commerce website wants to provide continuous service to its customers and is planning to invest in a hot site due to service criticality. Which of the following is the MOST important consideration when making this decision?

Options:

A.

Maximum tolerable downtime (MTD)

B.

Recovery time objective (RTO)

C.

Recovery point objective (RPO)

D.

Mean time to repair (MTTR)

Buy Now
Questions 453

Which of the following responsibilities associated with a disaster recovery plan (DRP) can be outsourced to a Disaster Recovery as a Service (DRaaS) provider?

Options:

A.

System recovery procedures

B.

Stakeholder communications during a disaster

C.

Validation of recovered data

D.

Processes for maintaining currency of data

Buy Now
Questions 454

An organization has established hiring policies and procedures designed specifically to ensure network administrators are well qualified Which type of control is in place?

Options:

A.

Detective

B.

Compensating

C.

Corrective

D.

Directive

Buy Now
Questions 455

Which of the following should be of GREATEST concern to an IS auditor when using data analytics?

Options:

A.

The data source lacks integrity.

B.

The data analytics software is open source.

C.

The data set contains irrelevant fields.

D.

The data was not extracted by the auditor.

Buy Now
Questions 456

Which of the following BEST helps to ensure data integrity across system interfaces?

Options:

A.

Environment segregation

B.

Reconciliation

C.

System backups

D.

Access controls

Buy Now
Questions 457

Which of the following should be the FIRST step in a data migration project?

Options:

A.

Reviewing decisions on how business processes should be conducted in the new system

B.

Completing data cleanup in the current database to eliminate inconsistencies

C.

Understanding the new system ' s data structure

D.

Creating data conversion scripts

Buy Now
Exam Code: CISA
Exam Name: Certified Information Systems Auditor
Last Update: Apr 5, 2026
Questions: 1524
CISA pdf

CISA PDF

$59.7  $199
CISA Engine

CISA Testing Engine

$67.5  $225
CISA PDF + Engine

CISA PDF + Testing Engine

$74.7  $249