Pass the Isaca Isaca Certification CISA Questions and answers with CertsForce

Viewing page 2 out of 9 pages
Viewing questions 51-100 out of questions
Questions # 51:

Which of the following is the MOST important reason for an IS auditor to examine the results of a post-incident review performed after a security incident?

Options:

A.

To evaluate the effectiveness of continuous improvement efforts


B.

To compare incident response metrics with industry benchmarks


C.

To re-analyze the incident to identify any hidden backdoors planted by the attacker


D.

To evaluate the effectiveness of the network firewall against future security breaches


Expert Solution
Questions # 52:

An IS auditor has been asked to advise on measures to improve IT governance within the organization. Which of the following IS the BEST recommendation?

Options:

A.

Benchmark organizational performance against industry peers


B.

Implement key performance indicators (KPIs).


C.

Require executive management to draft IT strategy


D.

Implement annual third-party audits.


Expert Solution
Questions # 53:

Which of the following is MOST critical to the success of an information security program?

Options:

A.

Management's commitment to information security


B.

User accountability for information security


C.

Alignment of information security with IT objectives


D.

Integration of business and information security


Expert Solution
Questions # 54:

An IT strategic plan that BEST leverages IT in achieving organizational goals will include:

Options:

A.

a comparison of future needs against current capabilities.


B.

a risk-based ranking of projects.


C.

enterprise architecture (EA) impacts.


D.

IT budgets linked to the organization's budget.


Expert Solution
Questions # 55:

Which of the following is the PRIMARY reason for an IS auditor to perform a risk assessment?

Options:

A.

It helps to identify areas with a relatively high probability of material problems.


B.

It provides a basis for the formulation of corrective action plans.


C.

It increases awareness of the types of management actions that may be inappropriate


D.

It helps to identify areas that are most sensitive to fraudulent or inaccurate practices


Expert Solution
Questions # 56:

Which of the following findings from a database security audit presents the GREATEST risk of critical security exposures?

Options:

A.

Legacy data has not been purged.


B.

Admin account passwords are not set to expire.


C.

Default settings have not been changed.


D.

Database activity logging is not complete.


Expert Solution
Questions # 57:

What should an IS auditor evaluate FIRST when reviewing an organization's response to new privacy legislation?

Options:

A.

Implementation plan for restricting the collection of personal information


B.

Privacy legislation in other countries that may contain similar requirements


C.

Operational plan for achieving compliance with the legislation


D.

Analysis of systems that contain privacy components


Expert Solution
Questions # 58:

In an organization's feasibility study to acquire hardware to support a new web server, omission of which of the following would be of MOST concern?

Options:

A.

Alternatives for financing the acquisition


B.

Financial stability of potential vendors


C.

Reputation of potential vendors


D.

Cost-benefit analysis of available products


Expert Solution
Questions # 59:

An organization has an acceptable use policy in place, but users do not formally acknowledge the policy. Which of the following is the MOST significant risk from this finding?

Options:

A.

Lack of data for measuring compliance


B.

Violation of industry standards


C.

Noncompliance with documentation requirements


D.

Lack of user accountability


Expert Solution
Questions # 60:

During an audit, the IS auditor finds that in many cases excessive rights were not removed from a system. Which of the following is the auditor's BEST recommendation?

Options:

A.

System administrators should ensure consistency of assigned rights.


B.

IT security should regularly revoke excessive system rights.


C.

Human resources (HR) should delete access rights of terminated employees.


D.

Line management should regularly review and request modification of access rights


Expert Solution
Questions # 61:

Which of the following is BEST used for detailed testing of a business application's data and configuration files?

Options:

A.

Version control software


B.

Audit hooks


C.

Utility software


D.

Audit analytics tool


Expert Solution
Questions # 62:

Which of the following is the MOST important area of focus for an IS auditor when developing a risk-based audit strategy?

Options:

A.

Critical business applications


B.

Business processes


C.

Existing IT controls


D.

Recent audit results


Expert Solution
Questions # 63:

Which of the following provides the GREATEST assurance that a middleware application compiling data from multiple sales transaction databases for forecasting is operating effectively?

Options:

A.

Continuous auditing


B.

Manual checks


C.

Exception reporting


D.

Automated reconciliations


Expert Solution
Questions # 64:

Which of the following is the PRIMARY benefit of a tabletop exercise for an incident response plan?

Options:

A.

It demonstrates the maturity of the incident response program.


B.

It reduces the likelihood of an incident occurring.


C.

It identifies deficiencies in the operating environment.


D.

It increases confidence in the team's response readiness.


Expert Solution
Questions # 65:

Which of the following BEST facilitates strategic program management?

Options:

A.

Implementing stage gates


B.

Establishing a quality assurance (QA) process


C.

Aligning projects with business portfolios


D.

Tracking key project milestones


Expert Solution
Questions # 66:

An IS auditor is conducting a physical security audit of a healthcare facility and finds closed-circuit television (CCTV) systems located in a patient care area. Which of the following is the GREATEST concern?

Options:

A.

Cameras are not monitored 24/7.


B.

There are no notices indicating recording IS in progress.


C.

The retention period for video recordings is undefined


D.

There are no backups of the videos.


Expert Solution
Questions # 67:

Which of the following is MOST critical to the success of an information security program?

Options:

A.

Alignment of information security with IT objectives


B.

Management’s commitment to information security


C.

Integration of business and information security


D.

User accountability for information security


Expert Solution
Questions # 68:

Which of the following is MOST helpful to an IS auditor reviewing the alignment of planned IT budget with the organization's goals and strategic objectives?

Options:

A.

Enterprise architecture (EA)


B.

Business impact analysis (BIA)


C.

Risk assessment report


D.

Audit recommendations


Expert Solution
Questions # 69:

To reduce operational costs, IT management plans to reduce the number of servers currently used to run business applications. Which of the following is MOST helpful to review when identifying which servers are no longer required?

Options:

A.

Performance feedback from the user community


B.

Contract with the server vendor


C.

Server CPU usage trends


D.

Mean time between failure (MTBF) of each server


Expert Solution
Questions # 70:

Which of the following would the IS auditor MOST likely review to determine whether modifications to the operating system parameters were authorized?

Options:

A.

Documentation of exit routines


B.

System initialization logs


C.

Change control log


D.

Security system parameters


Expert Solution
Questions # 71:

Which of the following provides the BE ST method for maintaining the security of corporate applications pushed to employee-owned mobile devices?

Options:

A.

Enabling remote data destruction capabilities


B.

Implementing mobile device management (MDM)


C.

Disabling unnecessary network connectivity options


D.

Requiring security awareness training for mobile users


Expert Solution
Questions # 72:

Which of the following is necessary for effective risk management in IT governance?

Options:

A.

Local managers are solely responsible for risk evaluation.


B.

IT risk management is separate from corporate risk management.


C.

Risk management strategy is approved by the audit committee.


D.

Risk evaluation is embedded in management processes.


Expert Solution
Questions # 73:

What Is the BEST method to determine if IT resource spending is aligned with planned project spending?

Options:

A.

Earned value analysis (EVA)


B.

Return on investment (ROI) analysis


C.

Gantt chart


D.

Critical path analysis


Expert Solution
Questions # 74:

Which of the following is the BEST way to ensure that business continuity plans (BCPs) will work effectively in the event of a major disaster?

Options:

A.

Prepare detailed plans for each business function.


B.

Involve staff at all levels in periodic paper walk-through exercises.


C.

Regularly update business impact assessments.


D.

Make senior managers responsible for their plan sections.


Expert Solution
Questions # 75:

An organization has outsourced the development of a core application. However, the organization plans to bring the support and future maintenance of the application back in-house. Which of the following findings should be the IS auditor's GREATEST concern?

Options:

A.

The cost of outsourcing is lower than in-house development.


B.

The vendor development team is located overseas.


C.

A training plan for business users has not been developed.


D.

The data model is not clearly documented.


Expert Solution
Questions # 76:

Which of the following would an IS auditor recommend as the MOST effective preventive control to reduce the risk of data leakage?

Options:

A.

Ensure that paper documents arc disposed security.


B.

Implement an intrusion detection system (IDS).


C.

Verify that application logs capture any changes made.


D.

Validate that all data files contain digital watermarks


Expert Solution
Questions # 77:

An IS auditor has been asked to advise on measures to improve IT governance within the organization. Which at the following is the BEST recommendation?

Options:

A.

Implement key performance indicators (KPIs)


B.

Implement annual third-party audits.


C.

Benchmark organizational performance against industry peers.


D.

Require executive management to draft IT strategy


Expert Solution
Questions # 78:

An IS auditor finds that one employee has unauthorized access to confidential data. The IS auditor's BEST recommendation should be to:

Options:

A.

reclassify the data to a lower level of confidentiality


B.

require the business owner to conduct regular access reviews.


C.

implement a strong password schema for users.


D.

recommend corrective actions to be taken by the security administrator.


Expert Solution
Questions # 79:

Which of the following is the MOST efficient way to identify segregation of duties violations in a new system?

Options:

A.

Review a report of security rights in the system.


B.

Observe the performance of business processes.


C.

Develop a process to identify authorization conflicts.


D.

Examine recent system access rights violations.


Expert Solution
Questions # 80:

Which of the following would be MOST useful when analyzing computer performance?

Options:

A.

Statistical metrics measuring capacity utilization


B.

Operations report of user dissatisfaction with response time


C.

Tuning of system software to optimize resource usage


D.

Report of off-peak utilization and response time


Expert Solution
Questions # 81:

Which of the following is the BEST evidence that an organization's IT strategy is aligned lo its business objectives?

Options:

A.

The IT strategy is modified in response to organizational change.


B.

The IT strategy is approved by executive management.


C.

The IT strategy is based on IT operational best practices.


D.

The IT strategy has significant impact on the business strategy


Expert Solution
Questions # 82:

Which of the following provides the BEST providence that outsourced provider services are being properly managed?

Options:

A.

The service level agreement (SLA) includes penalties for non-performance.


B.

Adequate action is taken for noncompliance with the service level agreement (SLA).


C.

The vendor provides historical data to demonstrate its performance.


D.

Internal performance standards align with corporate strategy.


Expert Solution
Questions # 83:

Which of the following should be of GREATEST concern to an IS auditor reviewing an organization's business continuity plan (BCP)?

Options:

A.

The BCP's contact information needs to be updated


B.

The BCP is not version controlled.


C.

The BCP has not been approved by senior management.


D.

The BCP has not been tested since it was first issued.


Expert Solution
Questions # 84:

Which of the following will BEST ensure that a proper cutoff has been established to reinstate transactions and records to their condition just prior to a computer system failure?

Options:

A.

Rotating backup copies of transaction files offsite


B.

Using a database management system (DBMS) to dynamically back-out partially processed transactions


C.

Maintaining system console logs in electronic formal


D.

Ensuring bisynchronous capabilities on all transmission lines


Expert Solution
Questions # 85:

During the planning phase of a data loss prevention (DLP) audit, management expresses a concern about mobile computing. Which of the following should the IS auditor identity as the associated risk?

Options:

A.

The use of the cloud negatively impacting IT availably


B.

Increased need for user awareness training


C.

Increased vulnerability due to anytime, anywhere accessibility


D.

Lack of governance and oversight for IT infrastructure and applications


Expert Solution
Questions # 86:

Which of the following would BEST enable an organization to address the security risks associated with a recently implemented bring your own device (BYOD) strategy?

Options:

A.

Mobile device tracking program


B.

Mobile device upgrade program


C.

Mobile device testing program


D.

Mobile device awareness program


Expert Solution
Questions # 87:

Which of the following is MOST important to ensure that electronic evidence collected during a forensic investigation will be admissible in future legal proceedings?

Options:

A.

Restricting evidence access to professionally certified forensic investigators


B.

Documenting evidence handling by personnel throughout the forensic investigation


C.

Performing investigative procedures on the original hard drives rather than images of the hard drives


D.

Engaging an independent third party to perform the forensic investigation


Expert Solution
Questions # 88:

An IS auditor has discovered that a software system still in regular use is years out of date and no longer supported the auditee has stated that it will take six months until the software is running on the current version. Which of the following is the BEST way to reduce the immediate risk associated with using an unsupported version of the software?

Options:

A.

Verify all patches have been applied to the software system's outdated version


B.

Close all unused ports on the outdated software system.


C.

Segregate the outdated software system from the main network.


D.

Monitor network traffic attempting to reach the outdated software system.


Expert Solution
Questions # 89:

An IS auditor reviewing the threat assessment tor a data center would be MOST concerned if:

Options:

A.

some of the identified throats are unlikely to occur.


B.

all identified throats relate to external entities.


C.

the exercise was completed by local management.


D.

neighboring organizations operations have been included.


Expert Solution
Questions # 90:

A post-implementation review was conducted by issuing a survey to users. Which of the following should be of GREATEST concern to an IS auditor?

Options:

A.

The survey results were not presented in detail lo management.


B.

The survey questions did not address the scope of the business case.


C.

The survey form template did not allow additional feedback to be provided.


D.

The survey was issued to employees a month after implementation.


Expert Solution
Questions # 91:

Which of the following presents the GREATEST challenge to the alignment of business and IT?

Options:

A.

Lack of chief information officer (CIO) involvement in board meetings


B.

Insufficient IT budget to execute new business projects


C.

Lack of information security involvement in business strategy development


D.

An IT steering committee chaired by the chief information officer (CIO)


Expert Solution
Questions # 92:

The PRIMARY objective of value delivery in reference to IT governance is to:

Options:

A.

promote best practices


B.

increase efficiency.


C.

optimize investments.


D.

ensure compliance.


Expert Solution
Questions # 93:

An IS auditor is reviewing processes for importing market price data from external data providers. Which of the following findings should the auditor consider MOST critical?

Options:

A.

The quality of the data is not monitored.


B.

Imported data is not disposed frequently.


C.

The transfer protocol is not encrypted.


D.

The transfer protocol does not require authentication.


Expert Solution
Questions # 94:

A review of an organization’s IT portfolio revealed several applications that are not in use. The BEST way to prevent this situation from recurring would be to implement.

Options:

A.

A formal request for proposal (RFP) process


B.

Business case development procedures


C.

An information asset acquisition policy


D.

Asset life cycle management.


Expert Solution
Questions # 95:

An IS auditor finds that application servers had inconsistent security settings leading to potential vulnerabilities. Which of the following is the BEST recommendation by the IS auditor?

Options:

A.

Improve the change management process


B.

Establish security metrics.


C.

Perform a penetration test


D.

Perform a configuration review


Expert Solution
Questions # 96:

Which of the following is MOST appropriate to prevent unauthorized retrieval of confidential information stored in a business application system?

Options:

A.

Apply single sign-on for access control


B.

Implement segregation of duties.


C.

Enforce an internal data access policy.


D.

Enforce the use of digital signatures.


Expert Solution
Questions # 97:

Which of the following BEST enables the effectiveness of an agile project for the rapid development of a new software application?

Options:

A.

Project segments are established.


B.

The work is separated into phases.


C.

The work is separated into sprints.


D.

Project milestones are created.


Expert Solution
Questions # 98:

Which of the following should be of GREATEST concern for an IS auditor reviewing an organization's disaster recovery plan (DRP)?

Options:

A.

The DRP has not been formally approved by senior management.


B.

The DRP has not been distributed to end users.


C.

The DRP has not been updated since an IT infrastructure upgrade.


D.

The DRP contains recovery procedures for critical servers only.


Expert Solution
Questions # 99:

What is the GREATEST concern for an IS auditor reviewing contracts for licensed software that executes a critical business process?

Options:

A.

The contract does not contain a right-to-audit clause.


B.

An operational level agreement (OLA) was not negotiated.


C.

Several vendor deliverables missed the commitment date.


D.

Software escrow was not negotiated.


Expert Solution
Questions # 100:

Which of the following is the BEST control lo mitigate attacks that redirect Internet traffic to an unauthorized website?

Options:

A.

Utilize a network-based firewall.


B.

Conduct regular user security awareness training.


C.

Perform domain name system (DNS) server security hardening.


D.

Enforce a strong password policy meeting complexity requirement.


Expert Solution
Viewing page 2 out of 9 pages
Viewing questions 51-100 out of questions