Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

Pass the Isaca Isaca Certification CISA Questions and answers with CertsForce

Viewing page 3 out of 10 pages
Viewing questions 101-150 out of questions
Questions # 101:

Which of the following is the BEST control to help ensure the completeness of outbound transactions?

Options:

A.

Perform edit checks to identify erroneous, unusual, or invalid transactions.


B.

Verify transactions are sequentially numbered in the header record.


C.

Ensure the validity of the recipient ID and use auto-numbered reports.


D.

Maintain a log of the number of messages sent and validate periodically.


Expert Solution
Questions # 102:

Which of the following should be done FIRST to minimize the risk of unstructured data?

Options:

A.

Identify repositories of unstructured data.


B.

Purchase tools to analyze unstructured data.


C.

Implement strong encryption for unstructured data.


D.

Implement user access controls to unstructured data.


Expert Solution
Questions # 103:

Which of the following should be GREATEST concern to an IS auditor reviewing data conversion and migration during the implementation of a new application system?

Options:

A.

Data conversion was performed using manual processes.


B.

Backups of the old system and data are not available online.


C.

Unauthorized data modifications occurred during conversion.


D.

The change management process was not formally documented


Expert Solution
Questions # 104:

In a large organization, IT deadlines on important projects have been missed because IT resources are not prioritized properly. Which of the following is the BEST recommendation to address this problem?

Options:

A.

Revisit the IT strategic plan.


B.

Implement project portfolio management.


C.

Implement an integrated resource management system.


D.

Implement a comprehensive project scorecard.


Expert Solution
Questions # 105:

Compared to developing a system in-house, acquiring a software package means that the need for testing by end users is:

Options:

A.

eliminated


B.

unchanged


C.

increased


D.

reduced


Expert Solution
Questions # 106:

Which of the following MOST effectively minimizes downtime during system conversions?

Options:

A.

Phased approach


B.

Direct cutover


C.

Pilot study


D.

Parallel run


Expert Solution
Questions # 107:

When information processing has been outsourced to another organization, an IS auditor reviewing the contract should expect it to specify:

Options:

A.

Backup and recovery processes.


B.

Audit objectives.


C.

Compliance with legal requirements.


D.

Security administration processes.


Expert Solution
Questions # 108:

Which of the following is the BEST indication of effective IT investment management?

Options:

A.

IT investments are implemented and monitored following a system development life cycle (SDLC)


B.

IT investments are mapped to specific business objectives


C.

Key performance indicators (KPIs) are defined for each business requiring IT Investment


D.

The IT Investment budget is significantly below industry benchmarks


Expert Solution
Questions # 109:

Which of the following BEST indicates the effectiveness of an organization ' s risk management program?

Options:

A.

Inherent risk is eliminated.


B.

Residual risk is minimized.


C.

Control risk is minimized.


D.

Overall risk is quantified.


Expert Solution
Questions # 110:

When auditing IT organizational structure, which of the following findings presents the GREATEST risk to an organization?

Options:

A.

Significantly higher turnover


B.

Lack of customer satisfaction surveys


C.

Aging staff


D.

Increase in the frequency of software upgrades


Expert Solution
Questions # 111:

An IS auditor notes that several employees are spending an excessive amount of time using social media sites for personal reasons. Which of the following should the auditor recommend be performed FIRST?

Options:

A.

Implement a process to actively monitor postings on social networking sites.


B.

Adjust budget for network usage to include social media usage.


C.

Use data loss prevention (DLP) tools on endpoints.


D.

implement policies addressing acceptable usage of social media during working hours.


Expert Solution
Questions # 112:

Which of the following is the MOST significant risk to an organization migrating its onsite application servers to a public cloud service provider?

Options:

A.

Service provider access to organizational data


B.

Account hacking from other clients using the same provider


C.

Increased dependency on an external provider


D.

Service provider limiting the right to audit


Expert Solution
Questions # 113:

An IS auditor finds that some employees are using public cloud-based AI tools. Which of the following presents the GREATEST concern?

Options:

A.

Data reliability


B.

Cost overruns


C.

Copyright infringements


D.

Data leakage


Expert Solution
Questions # 114:

Which of the following is the PRIMARY role of key performance indicators (KPIs) in supporting business process effectiveness?

Options:

A.

To analyze workflows in order to optimize business processes and eliminate tasks that do not provide value


B.

To evaluate the cost-benefit of tools implemented to monitor control performance


C.

To assess the functionality of a software deliverable based on business processes


D.

To enable conclusions about the performance of the processes and target variances for follow-up analysis


Expert Solution
Questions # 115:

An IS auditor finds that capacity management for a key system is being performed by IT with no input from the business The auditor ' s PRIMARY concern would be:

Options:

A.

failure to maximize the use of equipment


B.

unanticipated increase in business s capacity needs.


C.

cost of excessive data center storage capacity


D.

impact to future business project funding.


Expert Solution
Questions # 116:

Which of the following observations should be of GREATEST concern to an IS auditor performing an audit of change and release management controls for a new complex system developed by a small in-house IT team?

Options:

A.

Access to change testing strategy and results is not restricted to staff outside the IT team.


B.

Some user acceptance testing (IJAT) was completed by members of the IT team.


C.

IT administrators have access to the production and development environment


D.

Post-implementation testing is not conducted for all system releases.


Expert Solution
Questions # 117:

An IS auditor observes that an organization ' s systems are being used for cryptocurrency mining on a regular basis. Which of the following is the auditor ' s FIRST course of action?

Options:

A.

Report the incident immediately.


B.

Recommend changing the organization ' s firewall settings.


C.

Consult the organization ' s acceptable use policy.


D.

Require mining software to be uninstalled.


Expert Solution
Questions # 118:

Which of the following is PRIMARILY used in blockchain technology to create a distributed immutable ledger?

Options:

A.

Artificial intelligence (Al)


B.

Application hardening


C.

Edge computing


D.

Encryption


Expert Solution
Questions # 119:

Which of the following is the PRIMARY reason to perform a risk assessment?

Options:

A.

To determine the current risk profile


B.

To ensure alignment with the business impact analysis (BIA)


C.

To achieve compliance with regulatory requirements


D.

To help allocate budget for risk mitigation controls


Expert Solution
Questions # 120:

Which of the following is the BEST way to ensure a vendor complies with system security requirements?

Options:

A.

Require security training for vendor staff.


B.

Review past incidents reported by the vendor.


C.

Review past audits on the vendor ' s security compliance.


D.

Require a compliance clause in the vendor contract.


Expert Solution
Questions # 121:

An organization is permanently transitioning from onsite to fully remote business operations. When should the existing business impact analysis (BIA) be reviewed?

Options:

A.

During the next scheduled review


B.

At least one year after the transition


C.

As soon as the decision about the transition is announced


D.

As soon as the new operating model is in place


Expert Solution
Questions # 122:

As part of an audit response, an auditee has concerns with the recommendations and is hesitant to implement them. Which of the following is the BEST course of action for the IS auditor?

Options:

A.

Accept the auditee ' s response and perform additional testing.


B.

Suggest hiring a third-party consultant to perform a current state assessment.


C.

Conduct further discussions with the auditee to develop a mitigation plan.


D.

Issue a final report without including the opinion of the auditee.


Expert Solution
Questions # 123:

A telecommunications company has recently created a new fraud department with three employees and acquired a fraud detection system that uses artificial intelligence (AI) modules. Which of the following would be of GREATEST concern to an IS auditor reviewing the system?

Options:

A.

A very large number of true negatives


B.

A small number of false negatives


C.

A small number of true positives


D.

A large number of false positives


Expert Solution
Questions # 124:

An IS auditor is reviewing processes for importing market price data from external data providers. Which of the following findings should the auditor consider MOST critical?

Options:

A.

The transfer protocol does not require authentication.


B.

The quality of the data is not monitored.


C.

Imported data is not disposed of frequently.


D.

The transfer protocol is not encrypted.


Expert Solution
Questions # 125:

What is the FIRST step when creating a data classification program?

Options:

A.

Categorize and prioritize data.


B.

Develop data process maps.


C.

Categorize information by owner.


D.

Develop a policy.


Expert Solution
Questions # 126:

The waterfall life cycle model of software development is BEST suited for which of the following situations?

Options:

A.

The protect requirements are wall understood.


B.

The project is subject to time pressures.


C.

The project intends to apply an object-oriented design approach.


D.

The project will involve the use of new technology.


Expert Solution
Questions # 127:

A steering committee established to oversee an organization ' s digital transformation program is MOSTlikely to be involved with which of the following activities?

Options:

A.

Preparing project status reports


B.

Designing interface controls


C.

Reviewing escalated project issues


D.

Documenting requirements


Expert Solution
Questions # 128:

Which of the following is the BEST indicator of the effectiveness of an organization ' s incident response program?

Options:

A.

Number of successful penetration tests


B.

Percentage of protected business applications


C.

Financial impact per security event


D.

Number of security vulnerability patches


Expert Solution
Questions # 129:

What is the MOST effective way to manage contractors ' access to a data center?

Options:

A.

Badge identification worn by visitors


B.

Escort requirement for visitor access


C.

Management approval of visitor access


D.

Verification of visitor identification


Expert Solution
Questions # 130:

Which of the following is the BEST method to delete sensitive information from storage media that will be reused?

Options:

A.

Crypto-shredding


B.

Multiple overwriting


C.

Reformatting


D.

Re-partitioning


Expert Solution
Questions # 131:

Which of the following is the GREATEST risk when relying on reports generated by end-user computing (EUC)?

Options:

A.

Data may be inaccurate.


B.

Reports may not work efficiently.


C.

Reports may not be timely.


D.

Historical data may not be available.


Expert Solution
Questions # 132:

Which of the following is the MOST effective method for ensuring the integrity of log data?

Options:

A.

Implementing a timestamping mechanism


B.

Implementing cryptographic hash functions


C.

Limiting access to log data


D.

Regularly archiving log data


Expert Solution
Questions # 133:

Which of the following is the BEST way for an IS auditor to assess the design of an automated application control?

Options:

A.

Interview the application developer.


B.

Obtain management attestation and sign-off.


C.

Review the application implementation documents.


D.

Review system configuration parameters and output.


Expert Solution
Questions # 134:

Which of the following is a method to prevent disclosure of classified documents printed on a shared printer?

Options:

A.

Using passwords to allow authorized users to send documents to the printer


B.

Requiring a key code to be entered on the printer to produce hard copy


C.

Encrypting the data stream between the user ' s computer and the printer


D.

Producing a header page with classification level for printed documents


Expert Solution
Questions # 135:

Which of the following is an IS auditor ' s BEST course of action when the auditee indicates that a corrective action plan for a high-risk finding will take longer than expected?

Options:

A.

Accept the longer target date and document it in the audit system.


B.

Determine if an interim compensating control has been implemented.


C.

Escalate the overdue finding to the audit committee.


D.

Require that remediation is completed in the agreed timeframe.


Expert Solution
Questions # 136:

Which of the following findings would be of GREATEST concern to an IS auditor reviewing the security architecture of an organization that has just implemented a Zero Trust solution?

Options:

A.

An increase in security-related costs


B.

User complaints about the new mode of working


C.

An increase in user identification errors


D.

A noticeable drop in the performance of IT systems


Expert Solution
Questions # 137:

An organization has engaged a third party to implement an application to perform business-critical calculations. Which of the following is the MOST important process to help ensure the application provides accurate calculations?

Options:

A.

Key performance indicator (KPI) monitoring


B.

Change management


C.

Configuration management


D.

Quality assurance (QA)


Expert Solution
Questions # 138:

Which of the following is the PRIMARY objective of cyber resiliency?

Options:

A.

To resume normal operations after service disruptions


B.

To prevent potential attacks or disruptions in operations


C.

To efficiently and effectively recover from an incident with limited operational impact


D.

To limit the severity of security breaches and maintain continuous operations


Expert Solution
Questions # 139:

An organization is establishing a steering committee for the implementation of a new enterprise resource planning (ERP) system that uses Agile project management methodology. What is the MOST important criterion for the makeup of this committee?

Options:

A.

Senior management representation


B.

Ability to meet the time commitment required


C.

Agile project management experience


D.

ERP implementation experience


Expert Solution
Questions # 140:

Which of the following is the MOST important consideration when defining an operational log management strategy?

Options:

A.

Stakeholder requirements


B.

Audit recommendations


C.

Industry benchmarking


D.

Event response procedures


Expert Solution
Questions # 141:

When an organization conducts business process improvements, the IS auditor should be MOST concerned with the:

Options:

A.

metrics used to evaluate key operating segments.


B.

adequacy of the controls in the redesigned process.


C.

adequacy of reporting to senior management.


D.

lack of version control over process documentation.


Expert Solution
Questions # 142:

An organization has replaced all of the storage devices at its primary data center with new higher-capacity units The replaced devices have been installed at the disaster recovery site to replace older units An IS auditor s PRIMARY concern would be whether

Options:

A.

the recovery site devices can handle the storage requirements


B.

hardware maintenance contract is in place for both old and new storage devices


C.

the procurement was in accordance with corporate policies and procedures


D.

the relocation plan has been communicated to all concerned parties


Expert Solution
Questions # 143:

An organization saves confidential information in a file with password protection and the file is placed in a shared folder. An attacker has stolen this information by obtaining the password through social engineering. Implementing which of the following would BEST enable the organization to prevent this type of incident in the future?

Options:

A.

Multi-factor authentication (MFA)


B.

Security awareness programs for employees


C.

Access history log review by the business manager


D.

File encryption along with password protection


Expert Solution
Questions # 144:

An IS auditor notes that not all security tests were completed for an online sales system recently promoted to production. Which of the following is the auditor ' s BEST course of action?

Options:

A.

Determine exposure to the business


B.

Adjust future testing activities accordingly


C.

Increase monitoring for security incidents


D.

Hire a third party to perform security testing


Expert Solution
Questions # 145:

Which of the following should be of GREATEST concern to an IS auditor reviewing a network printer disposal process?

Options:

A.

Disposal policies and procedures are not consistently implemented


B.

Evidence is not available to verify printer hard drives have been sanitized prior to disposal.


C.

Business units are allowed to dispose printers directly to


D.

Inoperable printers are stored in an unsecured area.


Expert Solution
Questions # 146:

Which of the following should be of GREATEST concern to an IS auditor when using data analytics?

Options:

A.

The data source lacks integrity.


B.

The data analytics software is open source.


C.

The data set contains irrelevant fields.


D.

The data was not extracted by the auditor.


Expert Solution
Questions # 147:

An organization wants to classify database tables according to its data classification scheme From an IS auditor ' s perspective the tables should be classified based on the:

Options:

A.

specific functional contents of each single table.


B.

frequency of updates to the table.


C.

descriptions of column names in the table.


D.

number of end users with access to the table.


Expert Solution
Questions # 148:

Which of the following can BEST reduce the impact of a long-term power failure?

Options:

A.

Power conditioning unit


B.

Emergency power-off switches


C.

Battery bank


D.

Redundant power source


Expert Solution
Questions # 149:

Which of the following is a challenge in developing a service level agreement (SLA) for network services?

Options:

A.

Establishing a well-designed framework for network servirces.


B.

Finding performance metrics that can be measured properly


C.

Ensuring that network components are not modified by the client


D.

Reducing the number of entry points into the network


Expert Solution
Questions # 150:

An IS auditor identifies that a legacy application to be decommissioned in three months cannot meet the security requirements established by the current policy. What is the BEST way (or the auditor to address this issue?

Options:

A.

Recommend the application be patched to meet requirements.


B.

Inform the IT director of the policy noncompliance.


C.

Verify management has approved a policy exception to accept the risk.


D.

Take no action since the application will be decommissioned in three months.


Expert Solution
Viewing page 3 out of 10 pages
Viewing questions 101-150 out of questions