Pass the Isaca Isaca Certification CISA Questions and answers with CertsForce

Viewing page 1 out of 9 pages
Viewing questions 1-50 out of questions
Questions # 1:

Several unattended laptops containing sensitive customer data were stolen from personnel offices Which of the following would be an IS auditor's BEST recommendation to protect data in case of recurrence?

Options:

A.

Encrypt the disk drive.


B.

Require two-factor authentication


C.

Enhance physical security


D.

Require the use of cable locks


Expert Solution
Questions # 2:

Which of the following provides the MOST protection against emerging threats?

Options:

A.

Demilitarized zone (DMZ)


B.

Heuristic intrusion detection system (IDS)


C.

Real-time updating of antivirus software


D.

Signature-based intrusion detection system (IDS)


Expert Solution
Questions # 3:

Which of the following is the MOST important consideration for patching mission critical business application servers against known vulnerabilities?

Options:

A.

Patches are implemented in a test environment prior to rollout into production.


B.

Network vulnerability scans are conducted after patches are implemented.


C.

Vulnerability assessments are periodically conducted according to defined schedules.


D.

Roles and responsibilities for implementing patches are defined


Expert Solution
Questions # 4:

An IS audit reveals an IT application is experiencing poor performance including data inconsistency and integrity issues. What is the MOST likely cause?

Options:

A.

Database clustering


B.

Data caching


C.

Reindexing of the database table


D.

Load balancing


Expert Solution
Questions # 5:

Which of the following is the GREATEST risk when relying on reports generated by end-user computing (EUC)?

Options:

A.

Data may be inaccurate.


B.

Reports may not work efficiently.


C.

Reports may not be timely.


D.

Historical data may not be available.


Expert Solution
Questions # 6:

Stress testing should ideally be carried out under a:

Options:

A.

test environment with production workloads.


B.

test environment with test data.


C.

production environment with production workloads.


D.

production environment with test data.


Expert Solution
Questions # 7:

A small IT department has embraced DevOps, which allows members of this group to deploy code to production and maintain some development access to automate releases. Which of the following is the MOST effective control?

Options:

A.

Enforce approval prior to deployment by a member of the team who has not taken part in the development.


B.

The DevOps team provides an annual policy acknowledgment that they did not develop and deploy the same code.


C.

Annual training reinforces the need to maintain segregation between developers and deployers of code


D.

The IT compliance manager performs weekly reviews to ensure the same person did not develop and deploy code.


Expert Solution
Questions # 8:

Which of the following approaches would utilize data analytics to facilitate the testing of a new account creation process?

Options:

A.

Attempt to submit new account applications with invalid dates of birth.


B.

Review the business requirements document for date of birth field requirements.


C.

Review new account applications submitted in the past month for invalid dates of birth.


D.

Evaluate configuration settings for the date of birth field requirements


Expert Solution
Questions # 9:

Which of the following is the MOST important advantage of participating in beta testing of software products?

Options:

A.

It increases an organization's ability to retain staff who prefer to work with new technology.


B.

It improves vendor support and training.


C.

It enhances security and confidentiality.


D.

It enables an organization to gain familiarity with new products and their functionality.


Expert Solution
Questions # 10:

Which of the following is the BEST way for management to ensure the effectiveness of the cybersecurity incident response process?

Options:

A.

Periodic reporting of cybersecurity incidents to key stakeholders


B.

Periodic update of incident response process documentation


C.

Periodic cybersecurity training for staff involved in incident response


D.

Periodic tabletop exercises involving key stakeholders


Expert Solution
Questions # 11:

Which of the following should be the FIRST step when developing a data loss prevention (DLP) solution for a large organization?

Options:

A.

Conduct a data inventory and classification exercise.


B.

Identify approved data workflows across the enterprise_


C.

Conduct a threat analysis against sensitive data usage.


D.

Create the DLP policies and templates


Expert Solution
Questions # 12:

Which of the following physical controls provides the GREATEST assurance that only authorized individuals can access a data center?

Options:

A.

The data center is patrolled by a security guard.


B.

Access to the data center is monitored by video cameras.


C.

ID badges must be displayed before access is granted


D.

Access to the data center is controlled by a mantrap.


Expert Solution
Questions # 13:

Which of the following is MOST important for the successful establishment of a security vulnerability management program?

Options:

A.

A robust tabletop exercise plan


B.

A comprehensive asset inventory


C.

A tested incident response plan


D.

An approved patching policy


Expert Solution
Questions # 14:

Which of the following observations should be of GREATEST concern to an IS auditor performing an audit of change and release management controls for a new complex system developed by a small in-house IT team?

Options:

A.

Access to change testing strategy and results is not restricted to staff outside the IT team.


B.

Some user acceptance testing (IJAT) was completed by members of the IT team.


C.

IT administrators have access to the production and development environment


D.

Post-implementation testing is not conducted for all system releases.


Expert Solution
Questions # 15:

Which of the following would be of GREATEST concern to an IS auditor reviewing an IT strategy document?

Options:

A.

Target architecture is defined at a technical level.


B.

The previous year's IT strategic goals were not achieved.


C.

Strategic IT goals are derived solely from the latest market trends.


D.

Financial estimates of new initiatives are disclosed within the document.


Expert Solution
Questions # 16:

A small business unit is implementing a control self-assessment (CSA) program and leveraging the internal

audit function to test its internal controls annually. Which of the following is the MOST significant benefit of

this approach?

Options:

A.

Compliance costs are reduced.


B.

Risks are detected earlier.


C.

Business owners can focus more on their core roles.


D.

Line management is more motivated to avoid control exceptions.


Expert Solution
Questions # 17:

In a large organization, IT deadlines on important projects have been missed because IT resources are not prioritized properly. Which of the following is the BEST recommendation to address this problem?

Options:

A.

Revisit the IT strategic plan.


B.

Implement project portfolio management.


C.

Implement an integrated resource management system.


D.

Implement a comprehensive project scorecard.


Expert Solution
Questions # 18:

Which of the following is the BEST indication of effective governance over IT infrastructure?

Options:

A.

The ability to deliver continuous, reliable performance


B.

A requirement for annual security awareness programs


C.

An increase in the number of IT infrastructure servers


D.

A decrease in the number of information security incidents


Expert Solution
Questions # 19:

Which of the following approaches will ensure recovery time objectives (RTOs) are met for an organization's disaster recovery plan (DRP)?

Options:

A.

Performing a cyber resilience test


B.

Performing a full interruption test


C.

Performing a tabletop test


D.

Performing a parallel test


Expert Solution
Questions # 20:

Which of the following is a PRIMARY responsibility of a quality assurance (QA) team?

Options:

A.

Creating test data to facilitate the user acceptance testing (IJAT) process


B.

Managing employee onboarding processes and background checks


C.

Advising the steering committee on quality management issues and remediation efforts


D.

Implementing procedures to facilitate adoption of quality management best practices


Expert Solution
Questions # 21:

Which of the following responsibilities of an organization's quality assurance (QA) function should raise concern for an IS auditor?

Options:

A.

Ensuring standards are adhered to within the development process


B.

Ensuring the test work supports observations


C.

Updating development methodology


D.

Implementing solutions to correct defects


Expert Solution
Questions # 22:

Which of the following BEST describes the role of a document owner when implementing a data classification policy in an organization?

Options:

A.

Classifies documents to correctly reflect the level of sensitivity of information they contain


B.

Defines the conditions under which documents containing sensitive information may be transmitted


C.

Classifies documents in accordance with industry standards and best practices


D.

Ensures documents are handled in accordance With the sensitivity of information they contain


Expert Solution
Questions # 23:

An IS auditor should be MOST concerned if which of the following fire suppression systems is utilized to protect an asset storage closet?

Options:

A.

Deluge system


B.

Wet pipe system


C.

Preaction system


D.

CO2 system


Expert Solution
Questions # 24:

Which of the following is the GREATEST advantage of outsourcing the development of an e-banking solution when in-house technical expertise is not available?

Options:

A.

Lower start-up costs


B.

Reduced risk of system downtime


C.

Direct oversight of risks


D.

Increased ability to adapt the system


Expert Solution
Questions # 25:

An IS auditor is evaluating an enterprise resource planning (ERP) migration from local systems to the cloud. Who should be responsible for the data

classification in this project?

Options:

A.

Information security officer


B.

Database administrator (DBA)


C.

Information owner


D.

Data architect


Expert Solution
Questions # 26:

During the review of a system disruption incident, an IS auditor notes that IT support staff were put in a position to make decisions beyond their level of authority.

Which of the following is the BEST recommendation to help prevent this situation in the future?

Options:

A.

Introduce escalation protocols.


B.

Develop a competency matrix.


C.

Implement fallback options.


D.

Enable an emergency access ID.


Expert Solution
Questions # 27:

Which of the following is the MOST important consideration for a contingency facility?

Options:

A.

The contingency facility has the same badge access controls as the primary site.


B.

Both the contingency facility and the primary site have the same number of business assets in their inventory.


C.

The contingency facility is located a sufficient distance away from the primary site.


D.

Both the contingency facility and the primary site are easily identifiable.


Expert Solution
Questions # 28:

An IS auditor should look for which of the following to ensure the risk associated with scope creep has been mitigated during software development?

Options:

A.

Source code version control


B.

Project change management controls


C.

Existence of an architecture review board


D.

Configuration management


Expert Solution
Questions # 29:

During the walk-through procedures for an upcoming audit, an IS auditor notes that the key application in scope is part of a Software as a Service (SaaS)

agreement. What should the auditor do NEXT?

Options:

A.

Verify whether IT management monitors the effectiveness of the environment.


B.

Verify whether a right-to-audit clause exists.


C.

Verify whether a third-party security attestation exists.


D.

Verify whether service level agreements (SLAs) are defined and monitored.


Expert Solution
Questions # 30:

An organization's IT department and internal IS audit function all report to the chief information officer (CIO). Which of the following is the GREATEST concern associated with this reporting structure?

Options:

A.

Potential for inaccurate audit findings


B.

Compromise of IS audit independence


C.

IS audit resources being shared with other IT functions


D.

IS audit being isolated from other audit functions


Expert Solution
Questions # 31:

An IS auditor has learned that access privileges are not periodically reviewed or updated. Which of the following would provide the BEST evidence to determine whether transactions have been executed by authorized employees?

Options:

A.

Audit trails


B.

Control totals


C.

Reconciliations


D.

Change logs


Expert Solution
Questions # 32:

Which of the following methods would BEST help detect unauthorized disclosure of confidential documents sent over corporate email?

Options:

A.

Requiring all users to encrypt documents before sending


B.

Installing firewalls on the corporate network


C.

Reporting all outgoing emails that are marked as confidential


D.

Monitoring all emails based on pre-defined criteria


Expert Solution
Questions # 33:

Which of the following is MOST helpful for an IS auditor to review when evaluating an organizations business process that are supported by applications and IT systems?

Options:

A.

Configuration management database (CMDB)


B.

Enterprise architecture (EA)


C.

IT portfolio management


D.

IT service management


Expert Solution
Questions # 34:

Which of the following is the BEST security control to validate the integrity of data communicated between production databases and a big data analytics

system?

Options:

A.

Hashing in-scope data sets


B.

Encrypting in-scope data sets


C.

Running and comparing the count function within the in-scope data sets


D.

Hosting a digital certificate for in-scope data sets


Expert Solution
Questions # 35:

In an environment where data virtualization is used, which of the following provides the BEST disaster recovery solution?

Options:

A.

Onsite disk-based backup systems


B.

Tape-based backup systems


C.

Virtual tape library


D.

Redundant array of independent disks (RAID)


Expert Solution
Questions # 36:

Which of the following is the BEST compensating control against segregation of duties conflicts in new code development?

Options:

A.

Adding the developers to the change approval board


B.

A small number of people have access to deploy code


C.

Post-implementation change review


D.

Creation of staging environments


Expert Solution
Questions # 37:

When reviewing a business case for a proposed implementation of a third-party system, which of the following should be an IS auditor's GREATEST concern?

Options:

A.

Lack of ongoing maintenance costs


B.

Lack of training materials


C.

Lack of plan for pilot implementation


D.

Lack of detailed work breakdown structure


Expert Solution
Questions # 38:

Which of the following biometric access controls has the HIGHEST rate of false negatives?

Options:

A.

Iris recognition


B.

Fingerprint scanning


C.

Face recognition


D.

Retina scanning


Expert Solution
Questions # 39:

The PRIMARY purpose of an incident response plan is to:

Options:

A.

reduce the impact of an adverse event on information assets.


B.

increase the effectiveness of preventive controls.


C.

reduce the maximum tolerable downtime (MTD) of impacted systems.


D.

increase awareness of impacts from adverse events to IT systems.


Expert Solution
Questions # 40:

A core system fails a week after a scheduled update, causing an outage that impacts service. Which of the following is MOST important for incident management to focus on when addressing the issue?

Options:

A.

Analyzing the root cause of the outage to ensure the incident will not reoccur


B.

Restoring the system to operational state as quickly as possible


C.

Ensuring all resolution steps are fully documented prior to returning thesystem to service


D.

Rolling back the unsuccessful change to the previous state


Expert Solution
Questions # 41:

The record-locking option of a database management system (DBMS) serves to.

Options:

A.

eliminate the risk of concurrent updates to a record


B.

allow database administrators (DBAs) to record the activities of users.


C.

restrict users from changing certain values within records.


D.

allow users to lock others out of their files.


Expert Solution
Questions # 42:

During an external review, an IS auditor observes an inconsistent approach in classifying system criticality

within the organization. Which of the following should be recommended as the PRIMARY factor to

determine system criticality?

Options:

A.

Recovery point objective (RPO)


B.

Maximum allowable downtime (MAD)


C.

Mean time to restore (MTTR)


D.

Key performance indicators (KPls)


Expert Solution
Questions # 43:

During planning for a cloud service audit, audit management becomes aware that the assigned IS auditor is unfamiliar with the technologies in use and their associated risks to the business. To ensure audit quality, which of the following actions should audit management consider FIRST?

Options:

A.

Conduct a follow-up audit after a suitable period has elapsed.


B.

Reschedule the audit assignment for the next financial year.


C.

Reassign the audit to an internal audit subject matter expert.


D.

Extend the duration of the audit to give the auditor more time.


Expert Solution
Questions # 44:

When planning an internal penetration test, which of the following is the MOST important step prior to finalizing the scope of testing?

Options:

A.

Ensuring the scope of penetration testing is restricted to the test environment


B.

Obtaining management's consent to the testing scope in writing


C.

Notifying the IT security department regarding the testing scope


D.

Agreeing on systems to be excluded from the testing scope with the IT department


Expert Solution
Questions # 45:

Which type of attack poses the GREATEST risk to an organization's most sensitive data?

Options:

A.

Password attack


B.

Eavesdropping attack


C.

Insider attack


D.

Spear phishing attack


Expert Solution
Questions # 46:

A business has requested an audit to determine whether information stored in an application is adequately protected. Which of the following is the MOST important action before the audit work begins?

Options:

A.

Review remediation reports


B.

Establish control objectives.


C.

Assess the threat landscape.


D.

Perform penetration testing.


Expert Solution
Questions # 47:

Which of the following is the BEST reason to implement a data retention policy?

Options:

A.

To establish a recovery point objective (RPO) for disaster recovery procedures


B.

To limit the liability associated with storing and protecting information


C.

To document business objectives for processing data within the organization


D.

To assign responsibility and ownership for data protection outside IT


Expert Solution
Questions # 48:

The use of which of the following would BEST enhance a process improvement program?

Options:

A.

Model-based design notations


B.

Balanced scorecard


C.

Capability maturity models


D.

Project management methodologies


Expert Solution
Questions # 49:

An organization considering the outsourcing of a business application should FIRST:

Options:

A.

define service level requirements.


B.

perform a vulnerability assessment.


C.

conduct a cost-benefit analysis.


D.

issue a request for proposal (RFP).


Expert Solution
Questions # 50:

Which of the following BEST supports the effectiveness of a compliance program?

Options:

A.

Implementing an awareness plan regarding compliance regulation requirements


B.

Implementing a governance, risk, and compliance (GRC) tool to track compliance to regulations


C.

Assessing and tracking all compliance audit findings


D.

Monitoring which compliance regulations apply to the organization


Expert Solution
Viewing page 1 out of 9 pages
Viewing questions 1-50 out of questions