Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

Pass the Isaca Isaca Certification CISA Questions and answers with CertsForce

Viewing page 1 out of 10 pages
Viewing questions 1-50 out of questions
Questions # 1:

Retention periods and conditions for the destruction of personal data should be determined by the.

Options:

A.

risk manager.


B.

database administrator (DBA).


C.

privacy manager.


D.

business owner.


Expert Solution
Questions # 2:

An organization that processes credit card information employs a remote workforce. Which of the following is the MOST effective way to mitigate risk associated with data exfiltration?

Options:

A.

Require employees to sign acknowledgment of the data security policy.


B.

Deploy a data loss prevention (DLP) system.


C.

Enable a web application firewall (WAF) along with an intrusion detection system (IDS).


D.

Implement a security information and event management (SIEM) solution.


Expert Solution
Questions # 3:

Which of the following is the BEST way to ensure that business continuity plans (BCPs) will work effectively in the event of a major disaster?

Options:

A.

Prepare detailed plans for each business function.


B.

Involve staff at all levels in periodic paper walk-through exercises.


C.

Regularly update business impact assessments.


D.

Make senior managers responsible for their plan sections.


Expert Solution
Questions # 4:

The use of control totals satisfies which of the following control objectives?

Options:

A.

Transaction integrity


B.

Processing integrity


C.

Distribution control


D.

System recoverability


Expert Solution
Questions # 5:

During an audit of payment services of a branch based in a foreign country, a large global bank ' s audit team identifies an opportunity to use data analytics techniques to identify abnormal payments. Which of the following is the team ' s MOST important course of action?

Options:

A.

Consult the legal department to understand the procedure for requesting data from a different jurisdiction.


B.

Conduct a walk through of the analytical strategy with stakeholders of the audited branch to obtain their buy-in.


C.

Request the data from the branch as the team audit charter covers the country where it is based.


D.

Agree on a data extraction and sharing strategy with the IT team of the audited branch.


Expert Solution
Questions # 6:

In which of the following system development life cycle (SDLC) phases would an IS auditor expect to find that controls have been incorporated into system specifications?

Options:

A.

Implementation


B.

Development


C.

Feasibility


D.

Design


Expert Solution
Questions # 7:

Which of the following would minimize the risk of losing transactions as a result of a disaster?

Options:

A.

Sending a copy of the transaction logs to offsite storage on a daily basis


B.

Storing a copy of the transaction logs onsite in a fireproof vault


C.

Encrypting a copy of the transaction logs and store on a local server


D.

Signing a copy of the transaction logs and store on a local server


Expert Solution
Questions # 8:

Which of the following is MOST helpful for measuring benefits realization for a new system?

Options:

A.

Function point analysis


B.

Balanced scorecard review


C.

Post-implementation review


D.

Business impact analysis (BIA)


Expert Solution
Questions # 9:

Which of the following is the BEST preventive control to protect the confidentiality of data on a corporate smartphone in the event it is lost?

Options:

A.

Biometric authentication for the device


B.

Remote data wipe program


C.

Encryption of the data stored on the device


D.

Password for device authentication


Expert Solution
Questions # 10:

Which of the following is the BEST metric to measure the alignment of IT and business strategy?

Options:

A.

Level of stakeholder satisfaction with the scope of planned IT projects


B.

Percentage of enterprise risk assessments that include IT-related risk


C.

Percentage of stat satisfied with their IT-related roles


D.

Frequency of business process capability maturity assessments


Expert Solution
Questions # 11:

Which of the following would provide the BEST evidence of an IT strategy corrections effectiveness?

Options:

A.

The minutes from the IT strategy committee meetings


B.

Synchronization of IT activities with corporate objectives


C.

The IT strategy committee charier


D.

Business unit satisfaction survey results


Expert Solution
Questions # 12:

An IS auditor is reviewing the release management process for an in-house software development solution. In which environment Is the software version MOST likely to be the same as production?

Options:

A.

Staging


B.

Testing


C.

Integration


D.

Development


Expert Solution
Questions # 13:

A cloud access security broker (CASB) administers the user access of a Software as a Service {SaaS) on behalf of the customer organization. When conducting an audit of the service, which of the following is MOST important for the IS auditor to confirm?

Options:

A.

The CASB logs the access request as a service record that is reviewed after granting access.


B.

The CASB verifies the access request from a named customer contact before granting access.


C.

The CASB manages secure access to the federated directory service used by the SaaS application.


D.

The CASB conducts periodic audits of access requests to ensure compliance with customer policy.


Expert Solution
Questions # 14:

Which of the following should be of GREATEST concern to an IS auditor assessing the effectiveness of an organization ' s information security governance?

Options:

A.

Risk assessments of information assets are not periodically performed.


B.

All Control Panel Items


C.

The information security policy does not extend to service providers.


D.

There is no process to measure information security performance.


E.

The information security policy is not reviewed by executive management.


Expert Solution
Questions # 15:

An IT balanced scorecard is PRIMARILY used for:

Options:

A.

evaluating the IT project portfolio


B.

measuring IT strategic performance


C.

allocating IT budget and resources


D.

monitoring risk in lT-related processes


Expert Solution
Questions # 16:

Which of the following is MOST likely to be reduced when implementing optimal risk management strategies?

Options:

A.

Sampling risk


B.

Residual risk


C.

Inherent risk


D.

Detection risk


Expert Solution
Questions # 17:

An IS auditor finds that the cost of developing an application is now projected to significantly exceed the budget. Which of the following is the GREATEST risk to communicate to senior management?

Options:

A.

Noncompliance with project methodology


B.

Inability to achieve expected benefits


C.

Increased staff turnover


D.

Project abandonment


Expert Solution
Questions # 18:

Which of the following is the BEST justification for deferring remediation testing until the next audit?

Options:

A.

The auditor who conducted the audit and agreed with the timeline has left the organization.


B.

Management ' s planned actions are sufficient given the relative importance of the observations.


C.

Auditee management has accepted all observations reported by the auditor.


D.

The audit environment has changed significantly.


Expert Solution
Questions # 19:

What should an IS auditor evaluate FIRST when reviewing an organization ' s response to new privacy legislation?

Options:

A.

Implementation plan for restricting the collection of personal information


B.

Privacy legislation in other countries that may contain similar requirements


C.

Operational plan for achieving compliance with the legislation


D.

Analysis of systems that contain privacy components


Expert Solution
Questions # 20:

An IS auditor is analyzing a sample of accounts payable transactions for a specific vendor and identifies one transaction with a value five times as high as the average transaction. Which of the following should the auditor do NEXT?

Options:

A.

Report the variance immediately to the audit committee


B.

Request an explanation of the variance from the auditee


C.

Increase the sample size to 100% of the population


D.

Exclude the transaction from the sample population


Expert Solution
Questions # 21:

An IS auditor determines that the vendor ' s deliverables do not include the source code for a newly acquired product. To address this issue, which of the following should the auditor recommend be included in the contract?

Options:

A.

Confidentiality and data protection clauses


B.

Service level agreement (SLA)


C.

Software escrow agreement


D.

Right-to-audit clause


Expert Solution
Questions # 22:

Backup procedures for an organization ' s critical data are considered to be which type of control?

Options:

A.

Directive


B.

Corrective


C.

Detective


D.

Compensating


Expert Solution
Questions # 23:

Which of the following is the PRIMARY role of the IS auditor m an organization ' s information classification process?

Options:

A.

Securing information assets in accordance with the classification assigned


B.

Validating that assets are protected according to assigned classification


C.

Ensuring classification levels align with regulatory guidelines


D.

Defining classification levels for information assets within the organization


Expert Solution
Questions # 24:

An organization is implementing a data loss prevention (DLP) system in response to a new regulatory requirement Reviewing. which of the following would be MOST helpful in evaluating the system ' s design?

Options:

A.

System manuals


B.

Enterprise architecture (EA)


C.

Historical record of data breaches


D.

Industry trends


Expert Solution
Questions # 25:

Which of the following is MOST important to review during the project initiation phase of developing and deploying a new application?

Options:

A.

User requirements


B.

User acceptance testing (UAT) plans


C.

Deployment plans


D.

Architectural design


Expert Solution
Questions # 26:

An IS auditor finds an IT manager recently changed a Software as a Service (SaaS) provider contract in an effort to cut costs. The new contract increases the time to resolve incidents. Which of the following should be the auditor’s GREATEST concern?

Options:

A.

The impact on business processes has not been evaluated.


B.

The new contract is not in compliance with IT security policy.


C.

The corresponding service level agreement (SLA) was not modified.


D.

Alternative cost-reduction methods were not considered.


Expert Solution
Questions # 27:

During the implementation of an upgraded enterprise resource planning (ERP) system, which of the following is the MOST important consideration for a go-live decision?

Options:

A.

Rollback strategy


B.

Test cases


C.

Post-implementation review objectives


D.

Business case


Expert Solution
Questions # 28:

Which of the following is the MAIN responsibility of the IT steering committee?

Options:

A.

Reviewing and assisting with IT strategy integration efforts


B.

Developing and assessing the IT security strategy


C.

Implementing processes to integrate security with business objectives


D.

Developing and implementing the secure system development framework


Expert Solution
Questions # 29:

Which of the following BEST addresses the availability of an online store?

Options:

A.

RAID level 5 storage devices


B.

Online backups


C.

A mirrored site at another location


D.

Clustered architecture


Expert Solution
Questions # 30:

An IS auditor is reviewing an industrial control system (ICS) that uses older unsupported technology in the scope of an upcoming audit. What should the auditor consider the MOST significant concern?

Options:

A.

Attack vectors are evolving for industrial control systems.


B.

There is a greater risk of system exploitation.


C.

Disaster recovery plans (DRPs) are not in place.


D.

Technical specifications are not documented.


Expert Solution
Questions # 31:

Which of the following is the BEST way for management to ensure the effectiveness of the cybersecurity incident response process?

Options:

A.

Periodic reporting of cybersecurity incidents to key stakeholders


B.

Periodic update of incident response process documentation


C.

Periodic cybersecurity training for staff involved in incident response


D.

Periodic tabletop exercises involving key stakeholders


Expert Solution
Questions # 32:

An organization is disposing of removable onsite media which contains sensitive information. Which of the following is the MOST effective method to prevent disclosure of sensitive data?

Options:

A.

Encrypting and destroying keys


B.

Machine shredding


C.

Software formatting


D.

Wiping and rewriting three times


Expert Solution
Questions # 33:

Which of the following occurs during the issues management process for a system development project?

Options:

A.

Contingency planning


B.

Configuration management


C.

Help desk management


D.

Impact assessment


Expert Solution
Questions # 34:

An IS auditor has been asked to review an event log aggregation system to ensure risk management practices have been applied. Which of the following should be of MOST concern to the auditor?

Options:

A.

Log feeds are uploaded via batch process.


B.

Completeness testing has not been performed on the log data.


C.

The log data is not normalized.


D.

Data encryption standards have not been considered.


Expert Solution
Questions # 35:

Which of the following activities provides an IS auditor with the MOST insight regarding potential single person dependencies that might exist within the organization?

Options:

A.

Reviewing vacation patterns


B.

Reviewing user activity logs


C.

Interviewing senior IT management


D.

Mapping IT processes to roles


Expert Solution
Questions # 36:

Which type of control has been established when an organization implements a security information and event management (SIEM) system?

Options:

A.

Preventive


B.

Detective


C.

Directive


D.

Corrective


Expert Solution
Questions # 37:

In the case of a disaster where the data center is no longer available, which of the following tasks should be done FIRST?

Options:

A.

Perform data recovery.


B.

Arrange for a secondary site.


C.

Analyze risk.


D.

Activate the call tree.


Expert Solution
Questions # 38:

Which of the following provides the BEST evidence that all elements of a business continuity plan (BCP) are operating effectively?

Options:

A.

Walk-through test results


B.

Full operational test results


C.

Tabletop test results


D.

Simulation test results


Expert Solution
Questions # 39:

In an annual audit cycle, the audit of an organization ' s IT department resulted in many findings. Which of the following would be the MOST important consideration when planning the next audit?

Options:

A.

Postponing the review until all of the findings have been rectified


B.

Limiting the review to the deficient areas


C.

Verifying that all recommendations have been implemented


D.

Following up on the status of all recommendations


Expert Solution
Questions # 40:

An organization allows its employees lo use personal mobile devices for work. Which of the following would BEST maintain information security without compromising employee privacy?

Options:

A.

Installing security software on the devices


B.

Partitioning the work environment from personal space on devices


C.

Preventing users from adding applications


D.

Restricting the use of devices for personal purposes during working hours


Expert Solution
Questions # 41:

Which of the following is the MOST effective control to mitigate unintentional misuse of authorized access?

Options:

A.

Annual sign-off of acceptable use policy


B.

Regular monitoring of user access logs


C.

Security awareness training


D.

Formalized disciplinary action


Expert Solution
Questions # 42:

Which of the following is MOST useful to an IS auditor performing a review of access controls for a document management system?

Options:

A.

Policies and procedures for managing documents provided by department heads


B.

A system-generated list of staff and their project assignments. roles, and responsibilities


C.

Previous audit reports related to other departments ' use of the same system


D.

Information provided by the audit team lead an the authentication systems used by the department


Expert Solution
Questions # 43:

Which of the following is MOST important to define within a disaster recovery plan (DRP)?

Options:

A.

Business continuity plan (BCP)


B.

Test results for backup data restoration


C.

A comprehensive list of disaster recovery scenarios and priorities


D.

Roles and responsibilities for recovery team members


Expert Solution
Questions # 44:

An IS auditor is conducting an IT governance audit and notices many initiatives are managed informally by isolated project managers. Which of the following recommendations would have the GREATEST impact on improving the maturity of the IT team?

Options:

A.

Schedule a follow-up audit in the next year to confirm whether IT processes have matured.


B.

Create an interdisciplinary IT steering committee to oversee IT prioritization and spending.


C.

Document and track all IT decisions in a project management tool.


D.

Discontinue all current IT projects until formal approval is obtained and documented.


Expert Solution
Questions # 45:

Which of the following is an IS auditor’s BEST approach when low-risk anomalies have been identified?

Options:

A.

Reprioritize further testing of the anomalies and refocus on issues with higher risk


B.

Update the audit plan to include the information collected during the audit


C.

Ask auditees to promptly remediate the anomalies


D.

Document the anomalies in audit workpapers


Expert Solution
Questions # 46:

Which of the following should be of GREATEST concern to an IS auditor reviewing an organization ' s business continuity plan (BCP)?

Options:

A.

The BCP ' s contact information needs to be updated


B.

The BCP is not version controlled.


C.

The BCP has not been approved by senior management.


D.

The BCP has not been tested since it was first issued.


Expert Solution
Questions # 47:

An IS auditor is assessing the adequacy of management ' s remediation action plan. Which of the following should be the MOST important consideration?

Options:

A.

Plan approval by the audit committee


B.

Impacts on future audit work


C.

Criticality of audit findings


D.

Potential cost savings


Expert Solution
Questions # 48:

Data Loss Prevention (DLP) tools provide the MOST protection against:

Options:

A.

The installation of unknown malware.


B.

Malicious programs running on organizational systems.


C.

The downloading of sensitive information to devices by employees.


D.

The sending of corrupt data files to external parties via email.


Expert Solution
Questions # 49:

An IS audit reveals an IT application is experiencing poor performance including data inconsistency and integrity issues. What is the MOST likely cause?

Options:

A.

Database clustering


B.

Data caching


C.

Reindexing of the database table


D.

Load balancing


Expert Solution
Questions # 50:

An IS auditor is planning a review of an organizations robotic process automation (RPA) technology. Which of the following MUST be included in the audit work plan?

Options:

A.

Integration architecture


B.

Change management


C.

Cost-benefit analysis


D.

Employee training content


Expert Solution
Viewing page 1 out of 10 pages
Viewing questions 1-50 out of questions