Pass the Isaca Isaca Certification CISA Questions and answers with CertsForce

Viewing page 3 out of 9 pages
Viewing questions 101-150 out of questions
Questions # 101:

Which of the following should be the IS auditor's PRIMARY focus, when evaluating an organization's offsite storage facility?

Options:

A.

Shared facilities


B.

Adequacy of physical and environmental controls


C.

Results of business continuity plan (BCP) test


D.

Retention policy and period


Expert Solution
Questions # 102:

During a security audit, an IS auditor is tasked with reviewing log entries obtained from an enterprise intrusion prevention system (IPS). Which type of risk would be associated with the potential for the auditor to miss a sequence of logged events that could indicate an error in the IPS configuration?

Options:

A.

Sampling risk


B.

Detection risk


C.

Control risk


D.

Inherent risk


Expert Solution
Questions # 103:

The PRIMARY benefit of information asset classification is that it:

Options:

A.

prevents loss of assets.


B.

helps to align organizational objectives.


C.

facilitates budgeting accuracy.


D.

enables risk management decisions.


Expert Solution
Questions # 104:

Which task should an IS auditor complete FIRST during the preliminary planning phase of a database security review?

Options:

A.

Perform a business impact analysis (BIA).


B.

Determine which databases will be in scope.


C.

Identify the most critical database controls.


D.

Evaluate the types of databases being used


Expert Solution
Questions # 105:

Which of the following should be of GREATEST concern to an IS auditor reviewing a network printer disposal process?

Options:

A.

Disposal policies and procedures are not consistently implemented


B.

Evidence is not available to verify printer hard drives have been sanitized prior to disposal.


C.

Business units are allowed to dispose printers directly to


D.

Inoperable printers are stored in an unsecured area.


Expert Solution
Questions # 106:

Which of the following is MOST important for an IS auditor to look

for in a project feasibility study?

Options:

A.

An assessment of whether requirements will be fully met


B.

An assessment indicating security controls will operateeffectively


C.

An assessment of whether the expected benefits can beachieved


D.

An assessment indicating the benefits will exceed the implement


Expert Solution
Questions # 107:

Which of the following BEST facilitates the legal process in the event of an incident?

Options:

A.

Right to perform e-discovery


B.

Advice from legal counsel


C.

Preserving the chain of custody


D.

Results of a root cause analysis


Expert Solution
Questions # 108:

Which of the following issues associated with a data center's closed-circuit television (CCTV) surveillance cameras should be of MOST concern to an IS auditor?

Options:

A.

CCTV recordings are not regularly reviewed.


B.

CCTV cameras are not installed in break rooms


C.

CCTV records are deleted after one year.


D.

CCTV footage is not recorded 24 x 7.


Expert Solution
Questions # 109:

Which of the following is the BEST way to mitigate the risk associated with unintentional modifications of complex calculations in end-user computing (EUC)?

Options:

A.

Have an independent party review the source calculations


B.

Execute copies of EUC programs out of a secure library


C.

implement complex password controls


D.

Verify EUC results through manual calculations


Expert Solution
Questions # 110:

in a controlled application development environment, the MOST important segregation of duties should be between the person who implements changes into the production environment and the:

Options:

A.

application programmer


B.

systems programmer


C.

computer operator


D.

quality assurance (QA) personnel


Expert Solution
Questions # 111:

Which of the following features of a library control software package would protect against unauthorized updating of source code?

Options:

A.

Required approvals at each life cycle step


B.

Date and time stamping of source and object code


C.

Access controls for source libraries


D.

Release-to-release comparison of source code


Expert Solution
Questions # 112:

During an IT general controls audit of a high-risk area where both internal and external audit teams are reviewing the same approach to optimize resources?

Options:

A.

Leverage the work performed by external audit for the internal audit testing.


B.

Ensure both the internal and external auditors perform the work simultaneously.


C.

Request that the external audit team leverage the internal audit work.


D.

Roll forward the general controls audit to the subsequent audit year.


Expert Solution
Questions # 113:

An audit identified that a computer system is not assigning sequential purchase order numbers to order requests. The IS auditor is conducting an audit follow-up to determine if management has reserved this finding. Which of two following is the MOST reliable follow-up procedure?

Options:

A.

Review the documentation of recant changes to implement sequential order numbering.


B.

Inquire with management if the system has been configured and tested to generate sequential order numbers.


C.

Inspect the system settings and transaction logs to determine if sequential order numbers are generated.


D.

Examine a sample of system generated purchase orders obtained from management


Expert Solution
Questions # 114:

An IS auditor assessing the controls within a newly implemented call center would First

Options:

A.

gather information from the customers regarding response times and quality of service.


B.

review the manual and automated controls in the call center.


C.

test the technical infrastructure at the call center.


D.

evaluate the operational risk associated with the call center.


Expert Solution
Questions # 115:

Which of the following should be the FIRST step in the incident response process for a suspected breach?

Options:

A.

Inform potentially affected customers of the security breach


B.

Notify business management of the security breach.


C.

Research the validity of the alerted breach


D.

Engage a third party to independently evaluate the alerted breach.


Expert Solution
Questions # 116:

Which of the following is MOST important for an IS auditor to determine during the detailed design phase of a system development project?

Options:

A.

Program coding standards have been followed


B.

Acceptance test criteria have been developed


C.

Data conversion procedures have been established.


D.

The design has been approved by senior management.


Expert Solution
Questions # 117:

During an exit meeting, an IS auditor highlights that backup cycles

are being missed due to operator error and that these exceptions

are not being managed. Which of the following is the BEST way to

help management understand the associated risk?

Options:

A.

Explain the impact to disaster recovery.


B.

Explain the impact to resource requirements.


C.

Explain the impact to incident management.


D.

Explain the impact to backup scheduling.


Expert Solution
Questions # 118:

Which of the following is MOST important for an IS auditor to confirm when reviewing an organization's plans to implement robotic process automation (RPA> to automate routine business tasks?

Options:

A.

The end-to-end process is understood and documented.


B.

Roles and responsibilities are defined for the business processes in scope.


C.

A benchmarking exercise of industry peers who use RPA has been completed.


D.

A request for proposal (RFP) has been issued to qualified vendors.


Expert Solution
Questions # 119:

An IS auditor discovers that an IT organization serving several business units assigns equal priority to all initiatives, creating a risk of delays in securing project funding Which of the following would be MOST helpful in matching demand for projects and services with available resources in a way that supports business objectives?

Options:

A.

Project management


B.

Risk assessment results


C.

IT governance framework


D.

Portfolio management


Expert Solution
Questions # 120:

When verifying the accuracy and completeness of migrated data for a new application system replacing a legacy system. It is MOST effective for an IS auditor to review;

Options:

A.

data analytics findings.


B.

audit trails


C.

acceptance lasting results


D.

rollback plans


Expert Solution
Questions # 121:

Which of the following is the MOST effective way for an organization to help ensure agreed-upon action plans from an IS audit will be implemented?

Options:

A.

Ensure sufficient audit resources are allocated,


B.

Communicate audit results organization-wide.


C.

Ensure ownership is assigned.


D.

Test corrective actions upon completion.


Expert Solution
Questions # 122:

Which of the following is a challenge in developing a service level agreement (SLA) for network services?

Options:

A.

Establishing a well-designed framework for network servirces.


B.

Finding performance metrics that can be measured properly


C.

Ensuring that network components are not modified by the client


D.

Reducing the number of entry points into the network


Expert Solution
Questions # 123:

Which of the following is the MOST important consideration for an IS auditor when assessing the adequacy of an organization's information security policy?

Options:

A.

IT steering committee minutes


B.

Business objectives


C.

Alignment with the IT tactical plan


D.

Compliance with industry best practice


Expert Solution
Questions # 124:

An organization has made a strategic decision to split into separate operating entities to improve profitability. However, the IT infrastructure remains shared between the entities. Which of the following would BEST help to ensure that IS audit still covers key risk areas within the IT environment as part of its annual plan?

Options:

A.

Increasing the frequency of risk-based IS audits for each business entity


B.

Developing a risk-based plan considering each entity's business processes


C.

Conducting an audit of newly introduced IT policies and procedures


D.

Revising IS audit plans to focus on IT changes introduced after the split


Expert Solution
Questions # 125:

What should an IS auditor do FIRST when management responses

to an in-person internal control questionnaire indicate a key internal

control is no longer effective?

Options:

A.

Determine the resources required to make the controleffective.


B.

Validate the overall effectiveness of the internal control.


C.

Verify the impact of the control no longer being effective.


D.

Ascertain the existence of other compensating controls.


Expert Solution
Questions # 126:

Which of the following backup schemes is the BEST option when storage media is limited?

Options:

A.

Real-time backup


B.

Virtual backup


C.

Differential backup


D.

Full backup


Expert Solution
Questions # 127:

Which of the following is MOST critical for the effective implementation of IT governance?

Options:

A.

Strong risk management practices


B.

Internal auditor commitment


C.

Supportive corporate culture


D.

Documented policies


Expert Solution
Questions # 128:

A review of Internet security disclosed that users have individual user accounts with Internet service providers (ISPs) and use these accounts for downloading business data. The organization wants to ensure that only the corporate network is used. The organization should FIRST:

Options:

A.

use a proxy server to filter out Internet sites that should not be accessed.


B.

keep a manual log of Internet access.


C.

monitor remote access activities.


D.

include a statement in its security policy about Internet use.


Expert Solution
Questions # 129:

Which of the following application input controls would MOST likely detect data input errors in the customer account number field during the processing of an accounts receivable transaction?

Options:

A.

Limit check


B.

Parity check


C.

Reasonableness check


D.

Validity check


Expert Solution
Questions # 130:

An audit has identified that business units have purchased cloud-based applications without IPs support. What is the GREATEST risk associated with this situation?

Options:

A.

The applications are not included in business continuity plans (BCFs)


B.

The applications may not reasonably protect data.


C.

The application purchases did not follow procurement policy.


D.

The applications could be modified without advanced notice.


Expert Solution
Questions # 131:

An IS auditor plans to review all access attempts to a video-monitored and proximity card-controlled communications room. Which of the following would be MOST useful to the auditor?

Options:

A.

Alarm system with CCTV


B.

Access control log


C.

Security incident log


D.

Access card allocation records


Expert Solution
Questions # 132:

An IS auditor is reviewing the installation of a new server. The IS auditor's PRIMARY objective is to ensure that

Options:

A.

security parameters are set in accordance with the manufacturer s standards.


B.

a detailed business case was formally approved prior to the purchase.


C.

security parameters are set in accordance with the organization's policies.


D.

the procurement project invited lenders from at least three different suppliers.


Expert Solution
Questions # 133:

Which of the following would be the MOST useful metric for management to consider when reviewing a project portfolio?

Options:

A.

Cost of projects divided by total IT cost


B.

Expected return divided by total project cost


C.

Net present value (NPV) of the portfolio


D.

Total cost of each project


Expert Solution
Questions # 134:

During an audit of an organization's risk management practices, an IS auditor finds several documented IT risk acceptances have not been renewed in a timely manner after the assigned expiration date When assessing the seventy of this finding, which mitigating factor would MOST significantly minimize the associated impact?

Options:

A.

There are documented compensating controls over the business processes.


B.

The risk acceptances were previously reviewed and approved by appropriate senior management


C.

The business environment has not significantly changed since the risk acceptances were approved.


D.

The risk acceptances with issues reflect a small percentage of the total population


Expert Solution
Questions # 135:

During a follow-up audit, an IS auditor finds that some critical recommendations have the IS auditor's BEST course of action?

Options:

A.

Require the auditee to address the recommendations in full.


B.

Adjust the annual risk assessment accordingly.


C.

Evaluate senior management's acceptance of the risk.


D.

Update the audit program based on management's acceptance of risk.


Expert Solution
Questions # 136:

Which of the following types of environmental equipment will MOST likely be deployed below the floor tiles of a data center?

Options:

A.

Temperature sensors


B.

Humidity sensors


C.

Water sensors


D.

Air pressure sensors


Expert Solution
Questions # 137:

An externally facing system containing sensitive data is configured such that users have either read-only or administrator rights. Most users of the system have administrator access. Which of the following is the GREATEST risk associated with this situation?

Options:

A.

Users can export application logs.


B.

Users can view sensitive data.


C.

Users can make unauthorized changes.


D.

Users can install open-licensed software.


Expert Solution
Questions # 138:

Management receives information indicating a high level of risk associated with potential flooding near the organization's data center within the next few years. As a result, a decision has been made to move data center operations to another facility on higher ground. Which approach has been adopted?

Options:

A.

Risk avoidance


B.

Risk transfer


C.

Risk acceptance


D.

Risk reduction


Expert Solution
Questions # 139:

Which of the following would be an appropriate role of internal audit in helping to establish an organization’s privacy program?

Options:

A.

Analyzing risks posed by new regulations


B.

Developing procedures to monitor the use of personal data


C.

Defining roles within the organization related to privacy


D.

Designing controls to protect personal data


Expert Solution
Questions # 140:

Which of the following controls BEST ensures appropriate segregation of duties within an accounts payable department?

Options:

A.

Restricting program functionality according to user security profiles


B.

Restricting access to update programs to accounts payable staff only


C.

Including the creator’s user ID as a field in every transaction record created


D.

Ensuring that audit trails exist for transactions


Expert Solution
Questions # 141:

Which of the following security measures will reduce the risk of propagation when a cyberattack occurs?

Options:

A.

Perimeter firewall


B.

Data loss prevention (DLP) system


C.

Web application firewall


D.

Network segmentation


Expert Solution
Questions # 142:

Which of the following BEST helps to ensure data integrity across system interfaces?

Options:

A.

Environment segregation


B.

Reconciliation


C.

System backups


D.

Access controls


Expert Solution
Questions # 143:

When determining whether a project in the design phase will meet organizational objectives, what is BEST to compare against the business case?

Options:

A.

Implementation plan


B.

Project budget provisions


C.

Requirements analysis


D.

Project plan


Expert Solution
Questions # 144:

During the discussion of a draft audit report. IT management provided suitable evidence fiat a process has been implemented for a control that had been concluded by the IS auditor as Ineffective. Which of the following is the auditor's BEST action?

Options:

A.

Explain to IT management that the new control will be evaluated during follow-up


B.

Re-perform the audit before changing the conclusion.


C.

Change the conclusion based on evidence provided by IT management.


D.

Add comments about the action taken by IT management in the report.


Expert Solution
Questions # 145:

When reviewing an organization's information security policies, an IS auditor should verify that the policies have been defined PRIMARILY on the basis of:

Options:

A.

a risk management process.


B.

an information security framework.


C.

past information security incidents.


D.

industry best practices.


Expert Solution
Questions # 146:

Which of the following is the MOST effective control to mitigate unintentional misuse of authorized access?

Options:

A.

Annual sign-off of acceptable use policy


B.

Regular monitoring of user access logs


C.

Security awareness training


D.

Formalized disciplinary action


Expert Solution
Questions # 147:

An IS auditor finds the log management system is overwhelmed with false positive alerts. The auditor's BEST recommendation would be to:

Options:

A.

establish criteria for reviewing alerts.


B.

recruit more monitoring personnel.


C.

reduce the firewall rules.


D.

fine tune the intrusion detection system (IDS).


Expert Solution
Questions # 148:

Malicious program code was found in an application and corrected prior to release into production. After the release, the same issue was reported. Which of the following is the IS auditor's BEST recommendation?

Options:

A.

Ensure corrected program code is compiled in a dedicated server.


B.

Ensure change management reports are independently reviewed.


C.

Ensure programmers cannot access code after the completion of program edits.


D.

Ensure the business signs off on end-to-end user acceptance test (UAT) results.


Expert Solution
Questions # 149:

Which of the following is MOST important for an IS auditor to review when evaluating the accuracy of a spreadsheet that contains several macros?

Options:

A.

Encryption of the spreadsheet


B.

Version history


C.

Formulas within macros


D.

Reconciliation of key calculations


Expert Solution
Questions # 150:

Which of the following would MOST likely impair the independence of the IS auditor when performing a post-implementation review of an application system?

Options:

A.

The IS auditor provided consulting advice concerning application system best practices.


B.

The IS auditor participated as a member of the application system project team, but did not have operational responsibilities.


C.

The IS auditor designed an embedded audit module exclusively for auditing the application system.


D.

The IS auditor implemented a specific control during the development of the application system.


Expert Solution
Viewing page 3 out of 9 pages
Viewing questions 101-150 out of questions