Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

Pass the Isaca Isaca Certification CISA Questions and answers with CertsForce

Viewing page 2 out of 10 pages
Viewing questions 51-100 out of questions
Questions # 51:

An IS auditor reviewing the threat assessment tor a data center would be MOST concerned if:

Options:

A.

some of the identified throats are unlikely to occur.


B.

all identified throats relate to external entities.


C.

the exercise was completed by local management.


D.

neighboring organizations operations have been included.


Expert Solution
Questions # 52:

Which of the following is an IS auditor’s BEST recommendation after identifying that HR staff create new employees in the payroll system as well as process payroll due to limited staffing?

Options:

A.

Document roles and responsibilities of payroll staff.


B.

Implement a payroll system user awareness training program.


C.

Implement independent periodic review of payroll transactions.


D.

Rotate payroll responsibilities within HR.


Expert Solution
Questions # 53:

Which of the following should an IS auditor recommend be done FIRST when an organization is planning to implement an IT compliance program?

Options:

A.

Identify staff training needs related to compliance requirements.


B.

Analyze historical compliance-related audit findings.


C.

Research and purchase an industry-recognized IT compliance tool


D.

Identify applicable laws, regulations, and standards.


Expert Solution
Questions # 54:

An IS auditor has been asked to audit the proposed acquisition of new computer hardware. The auditor’s PRIMARY concern Is that:

Options:

A.

the implementation plan meets user requirements.


B.

a full, visible audit trail will be Included.


C.

a dear business case has been established.


D.

the new hardware meets established security standards


Expert Solution
Questions # 55:

Which of the following would be of GREATEST concern to an IS auditor reviewing an IT strategy document?

Options:

A.

The previous year’s IT strategic goals were not achieved.


B.

Target architecture is defined at a technical level.


C.

Financial estimates of new initiatives are disclosed within the document.


D.

Strategic IT goals are derived solely from the latest market trends.


Expert Solution
Questions # 56:

Which of the following BEST describes the role of the IS auditor in a control self-assessment (CSA)?

Options:

A.

Implementer


B.

Facilitator


C.

Approver


D.

Reviewer


Expert Solution
Questions # 57:

Which of the following should be the PRIMARY objective of conducting an audit follow-up of management action plans?

Options:

A.

To verify that risks listed in the audit report have been properly mitigated


B.

To identify new risks and controls for the organizationTo ensure senior management is aware of the audit findingsTo align the management action plans with business requirements


Expert Solution
Questions # 58:

Which of the following would BEST protect the confidentiality of sensitive data in transit between multiple offices?

Options:

A.

Hash algorithms


B.

Digital signatures


C.

Public key infrastructure (PKI)


D.

Kerberos


Expert Solution
Questions # 59:

Which of the following is the MOST important outcome of an information security program?

Options:

A.

Operating system weaknesses are more easily identified.


B.

Emerging security technologies are better understood and accepted.


C.

The cost to mitigate information security risk is reduced.


D.

Organizational awareness of security responsibilities is improved.


Expert Solution
Questions # 60:

Which of the following is the BEST reason to implement a data retention policy?

Options:

A.

To limit the liability associated with storing and protecting information


B.

To document business objectives for processing data within the organization


C.

To assign responsibility and ownership for data protection outside IT


D.

To establish a recovery point detective (RPO) for (toaster recovery procedures


Expert Solution
Questions # 61:

Which of the following tests would provide the BEST assurance that a health care organization is handling patient data appropriately?

Options:

A.

Compliance with action plans resulting from recent audits


B.

Compliance with local laws and regulations


C.

Compliance with industry standards and best practice


D.

Compliance with the organization ' s policies and procedures


Expert Solution
Questions # 62:

Which of the following should an IS auditor consider the MOST significant risk associated with a new health records system that replaces a legacy system?

Options:

A.

Staff were not involved in the procurement process, creating user resistance to the new system.


B.

Data is not converted correctly, resulting in inaccurate patient records.


C.

The deployment project experienced significant overruns, exceeding budget projections.


D.

The new system has capacity issues, leading to slow response times for users.


Expert Solution
Questions # 63:

An organization ' s information security policies should be developed PRIMARILY on the basis of:

Options:

A.

enterprise architecture (EA).


B.

industry best practices.


C.

a risk management process.


D.

past information security incidents.


Expert Solution
Questions # 64:

Which of the following is a PRIMARY benefit of an integrated audit?

Options:

A.

It enhances audit quality assurance (QA).


B.

It optimizes audit efforts across various functions.


C.

It ensures the improvement of auditor skills and competencies.


D.

It is suited for different business areas within organizations of any size.


Expert Solution
Questions # 65:

Which of the following is the BEST indication that an information security awareness program is effective?

Options:

A.

A reduction in the number of reported information security incidents


B.

A reduction in the success rate of social engineering attacks


C.

A reduction in the cost of maintaining the information security program


D.

A reduction in the number of information security attacks


Expert Solution
Questions # 66:

An organization performs virtual machine (VM) replication instead of daily backups of its critical servers. Which of the following is MOST important to validate when evaluating the adequacy of recovery procedures?

Options:

A.

Replication servers are located offsite.


B.

Periodic testing of VM replication is completed.


C.

VM load balancing is configured.


D.

Internet access is restricted for VM backup administrators.


Expert Solution
Questions # 67:

An IS auditor noted a recent production incident in which a teller transaction system incorrectly charged fees to customers due to a defect from a recent release. Which of the following should be the auditor ' s NEXT step?

Options:

A.

Evaluate developer training.


B.

Evaluate the incident management process.


C.

Evaluate the change management process.


D.

Evaluate secure code practices.


Expert Solution
Questions # 68:

Which of the following is the BEST way to mitigate the risk associated with unintentional modifications of complex calculations in end-user computing (EUC)?

Options:

A.

Have an independent party review the source calculations


B.

Execute copies of EUC programs out of a secure library


C.

implement complex password controls


D.

Verify EUC results through manual calculations


Expert Solution
Questions # 69:

An IS auditor discovers an option in a database that allows the administrator to directly modify any table. This option is necessary to overcome bugs in the software, but is rarely used. Changes to tables are automatically logged. The IS auditor ' s FIRST action should be to:

Options:

A.

recommend that the option to directly modify the database be removed immediately.


B.

recommend that the system require two persons to be involved in modifying the database.


C.

determine whether the log of changes to the tables is backed up.


D.

determine whether the audit trail is secured and reviewed.


Expert Solution
Questions # 70:

When planning an audit to assess application controls of a cloud-based system, it is MOST important tor the IS auditor to understand the.

Options:

A.

architecture and cloud environment of the system.


B.

business process supported by the system.


C.

policies and procedures of the business area being audited.


D.

availability reports associated with the cloud-based system.


Expert Solution
Questions # 71:

Transaction records from a business database were inadvertently deleted, and system operators decided to restore from a snapshot copy. Which of the following provides assurance that the BEST transactions were recovered successfully?

Options:

A.

Review transaction recovery logs to ensure no errors were recorded.


B.

Recount the transaction records to ensure no records are missing.


C.

Rerun the process on a backup machine to verify the results are the same.


D.

Compare transaction values against external statements to verify accuracy.


Expert Solution
Questions # 72:

Which of the following features of a library control software package would protect against unauthorized updating of source code?

Options:

A.

Required approvals at each life cycle step


B.

Date and time stamping of source and object code


C.

Access controls for source libraries


D.

Release-to-release comparison of source code


Expert Solution
Questions # 73:

An IS auditor is performing a follow-up audit and notes that some critical deficiencies have not been addressed. The auditor ' s BEST course of action is to:

Options:

A.

document management ' s reasons for not addressing deficiencies.


B.

postpone the audit until the deficiencies are addressed.


C.

assess the impact of not addressing deficiencies.


D.

provide new recommendations.


Expert Solution
Questions # 74:

Which of the following is a concern associated with virtualization?

Options:

A.

The physical footprint of servers could decrease within the data center.


B.

Performance issues with the host could impact the guest operating systems.


C.

Processing capacity may be shared across multiple operating systems.


D.

One host may have multiple versions of the same operating system.


Expert Solution
Questions # 75:

In a Zero Trust architecture, which element is MOST important for an IS auditor to evaluate to ensure that resources are accessed securely?

Options:

A.

The strength and frequency of perimeter firewall testing


B.

The alignment of access control policies with industry standards


C.

The frequency of user access reviews


D.

The protocols in place for remote access and data encryption


Expert Solution
Questions # 76:

Which of the following is MOST critical to the success of an information security program?

Options:

A.

Management ' s commitment to information security


B.

User accountability for information security


C.

Alignment of information security with IT objectives


D.

Integration of business and information security


Expert Solution
Questions # 77:

Which of the following is MOST helpful for an IS auditor to review when evaluating an organizations business process that are supported by applications and IT systems?

Options:

A.

Configuration management database (CMDB)


B.

Enterprise architecture (EA)


C.

IT portfolio management


D.

IT service management


Expert Solution
Questions # 78:

When an IS audit reveals that a firewall was unable to recognize a number of attack attempts, the auditor ' s BEST recommendation is to place an intrusion detection system (IDS) between the firewall and:

Options:

A.

the Internet.


B.

the demilitarized zone (DMZ).


C.

the organization ' s web server.


D.

the organization ' s network.


Expert Solution
Questions # 79:

Which of the following is MOST important for the successful establishment of a security vulnerability management program?

Options:

A.

A robust tabletop exercise plan


B.

A comprehensive asset inventory


C.

A tested incident response plan


D.

An approved patching policy


Expert Solution
Questions # 80:

An organization ' s business continuity plan (BCP) should be:

Options:

A.

updated before an independent audit review.


B.

tested after an intrusion attempt into the organization ' s hot site.


C.

tested whenever new applications are implemented.


D.

updated based on changes to personnel and environments.


Expert Solution
Questions # 81:

Which of the following is the BEST control to mitigate attacks that redirect internet traffic to an unauthorized website?

Options:

A.

Conduct regular user security awareness training.


B.

Enforce strong web browser security controls.


C.

Perform domain name system (DNS) server security hardening.


D.

Implement a web application firewall (WAF).


Expert Solution
Questions # 82:

An IS auditor finds that a recently deployed application has a number of developers with inappropriate update access left over from the testing environment. Which of the following would have BEST prevented the update access from being migrated?

Options:

A.

Establishing a role-based matrix for provisioning users


B.

Re-assigning user access rights in the quality assurance (QA) environment


C.

Holding the application owner accountable for application security


D.

Including a step within the system development life cycle (SDLC) to clean up access prior to go-live


Expert Solution
Questions # 83:

Which of the following is the MOST reliable way for an IS auditor to evaluate the operational effectiveness of an organization ' s data loss prevention (DLP) controls?

Options:

A.

Review data classification levels based on industry best practice


B.

Verify that current DLP software is installed on all computer systems.


C.

Conduct interviews to identify possible data protection vulnerabilities.


D.

Verify that confidential files cannot be transmitted to a personal USB device.


Expert Solution
Questions # 84:

Which of the following is the BEST source of organizational direction on when to use cloud services?

Options:

A.

Enterprise architecture (EA)


B.

Business continuity plans (BCPs)


C.

Availability requirements


D.

Cloud regulations


Expert Solution
Questions # 85:

Malicious program code was found in an application and corrected prior to release into production. After the release, the same issue was reported. Which of the following is the IS auditor ' s BEST recommendation?

Options:

A.

Ensure corrected program code is compiled in a dedicated server.


B.

Ensure change management reports are independently reviewed.


C.

Ensure programmers cannot access code after the completion of program edits.


D.

Ensure the business signs off on end-to-end user acceptance test (UAT) results.


Expert Solution
Questions # 86:

During which IT project phase is it MOST appropriate to conduct a benefits realization analysis?

Options:

A.

Post-implementation review phase


B.

Final implementation phase


C.

User acceptance testing (UAT) phase


D.

Design review phase


Expert Solution
Questions # 87:

In continuous delivery, the critical connector between development and production is:

Options:

A.

Release management.


B.

Log management.


C.

DevOps.


D.

Data management.


Expert Solution
Questions # 88:

In an IT organization where many responsibilities are shared which of the following is the BEST control for detecting unauthorized data changes?

Options:

A.

Users are required to periodically rotate responsibilities


B.

Segregation of duties conflicts are periodically reviewed


C.

Data changes are independently reviewed by another group


D.

Data changes are logged in an outside application


Expert Solution
Questions # 89:

Which of the following is MOST important when defining the IS audit scope?

Options:

A.

Minimizing the time and cost to the organization of IS audit procedures


B.

Involving business in the formulation of the scope statement


C.

Aligning the IS audit procedures with IT management priorities


D.

Understanding the relationship between IT and business risks


Expert Solution
Questions # 90:

An incorrect version of the source code was amended by a development team. This MOST likely indicates a weakness in:

Options:

A.

incident management.


B.

quality assurance (QA).


C.

change management.


D.

project management.


Expert Solution
Questions # 91:

Which of the following would present the GREATEST concern during a review of internal audit quality assurance (QA) and continuous improvement processes?

Options:

A.

Improvement opportunities are not centrally tracked.


B.

The audit function is not subject to independent periodic external review.


C.

Substantive testing is not performed during the assessment phase of some audits.


D.

Quarterly reports are not distributed to the audit committee.


Expert Solution
Questions # 92:

Which of the following is MOST important to include in a business case for an IT-enabled investment?

Options:

A.

Business impact analysis (BIA)


B.

Cost-benefit analysis


C.

Security requirements


D.

Risk assessment


Expert Solution
Questions # 93:

An IS auditor discovers from patch logs that some in-scope systems are not compliant with the regular patching schedule. What should the auditor do NEXT?

Options:

A.

Interview IT management to clarify the current procedure.


B.

Report this finding to senior management.


C.

Review the organization ' s patch management policy.


D.

Request a plan of action to be established as a follow-up item.


Expert Solution
Questions # 94:

When is it MOST important for an IS auditor to apply the concept of materiality in an audit?

Options:

A.

When planning an audit engagement


B.

When gathering information for the fieldwork


C.

When a violation of a regulatory requirement has been identified


D.

When evaluating representations from the auditee


Expert Solution
Questions # 95:

When selecting a new data loss prevention (DLP) solution, the MOST important consideration is that the solution:

Options:

A.

is cost effective and meets proposed return on investment (ROI) criteria.


B.

provides comprehensive reporting and alerting features with detailed insights on data movements.


C.

is compatible with legacy IT infrastructure and integrates with other security tools.


D.

identifies and safeguards confidential information from unauthorized transmission.


Expert Solution
Questions # 96:

Which of the following would lead an IS auditor to conclude that the evidence collected during a digital forensic investigation would not be admissible in court?

Options:

A.

The person who collected the evidence is not qualified to represent the case.


B.

The logs failed to identify the person handling the evidence.


C.

The evidence was collected by the internal forensics team.


D.

The evidence was not fully backed up using a cloud-based solution prior to the trial.


Expert Solution
Questions # 97:

An IS auditor has found that a vendor has gone out of business and the escrow has an older version of the source code. What is the auditor ' s BEST recommendation for the organization?

Options:

A.

Analyze a new application that moots the current re


B.

Perform an analysis to determine the business risk


C.

Bring the escrow version up to date.


D.

Develop a maintenance plan to support the application using the existing code


Expert Solution
Questions # 98:

A warehouse employee of a retail company has been able to conceal the theft of inventory items by entering adjustments of either damaged or lost stock items lo the inventory system. Which control would have BEST prevented this type of fraud in a retail environment?

Options:

A.

Separate authorization for input of transactions


B.

Statistical sampling of adjustment transactions


C.

Unscheduled audits of lost stock lines


D.

An edit check for the validity of the inventory transaction


Expert Solution
Questions # 99:

Which of the following is the MOST effective control for protecting the confidentiality and integrity of data stored unencrypted on virtual machines?

Options:

A.

Monitor access to stored images and snapshots of virtual machines.


B.

Restrict access to images and snapshots of virtual machines.


C.

Limit creation of virtual machine images and snapshots.


D.

Review logical access controls on virtual machines regularly.


Expert Solution
Questions # 100:

Which of the following should be the GREATEST concern for an IS auditor assessing an organization ' s disaster recovery plan (DRP)?

Options:

A.

The DRP was developed by the IT department.


B.

The DRP has not been tested during the past three years.


C.

The DRP has not been updated for two years.


D.

The DRP does not include the recovery the time objective (RTO) for a key system.


Expert Solution
Viewing page 2 out of 10 pages
Viewing questions 51-100 out of questions