Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

Pass the Isaca Isaca Certification CISA Questions and answers with CertsForce

Viewing page 4 out of 10 pages
Viewing questions 151-200 out of questions
Questions # 151:

Which of the following findings would be of GREATEST concern to an IS auditor assessing an organization ' s patch management process?

Options:

A.

The organization ' s software inventory is not complete.


B.

Applications frequently need to be rebooted for patches to take effect.


C.

Software vendors are bundling patches.


D.

Testing patches takes significant time.


Expert Solution
Questions # 152:

IT disaster recovery time objectives (RTOs) should be based on the:

Options:

A.

maximum tolerable loss of data.


B.

nature of the outage


C.

maximum tolerable downtime (MTD).


D.

business-defined criticality of the systems.


Expert Solution
Questions # 153:

Which of the following is an example of a preventive control for physical access?

Options:

A.

Keeping log entries for all visitors to the building


B.

Implementing a fingerprint-based access control system for the building


C.

Installing closed-circuit television (CCTV) cameras for all ingress and egress points


D.

Implementing a centralized logging server to record instances of staff logging into workstations


Expert Solution
Questions # 154:

During a review of a production schedule, an IS auditor observes that a staff member is not complying with mandatory operational procedures. The auditor ' s NEXT step should be to:

Options:

A.

note the noncompliance in the audit working papers.


B.

issue an audit memorandum identifying the noncompliance.


C.

include the noncompliance in the audit report.


D.

determine why the procedures were not followed.


Expert Solution
Questions # 155:

Which of the following methods would MOST effectively provide positive authentication for physical access?

Options:

A.

Proximity card


B.

Retina scan


C.

Numeric keypads and surveillance camera


D.

A smart card and a security guard


Expert Solution
Questions # 156:

An IS audit reveals that an organization operating in business continuity mode during a pandemic situation has not performed a simulation test of the

business continuity plan (BCP). Which of the following is the auditor ' s BEST course of action?

Options:

A.

Confirm the BCP has been recently updated.


B.

Review the effectiveness of the business response.


C.

Raise an audit issue for the lack of simulated testing.


D.

Interview staff members to obtain commentary on the BCP ' s effectiveness.


Expert Solution
Questions # 157:

Which of the following is the MOST likely root cause of shadow IT in an organization?

Options:

A.

Lengthy approval for technology investment


B.

The opportunity to reduce software license fees


C.

Ease of use for cloud-based applications and services


D.

Approved software not meeting user requirements


Expert Solution
Questions # 158:

What is the PRIMARY purpose of performing a parallel run of a now system?

Options:

A.

To train the end users and supporting staff on the new system


B.

To verify the new system provides required business functionality


C.

To reduce the need for additional testing


D.

To validate the new system against its predecessor


Expert Solution
Questions # 159:

Which of the following is an advantage of using agile software development methodology over the waterfall methodology?

Options:

A.

Less funding required overall


B.

Quicker deliverables


C.

Quicker end user acceptance


D.

Clearly defined business expectations


Expert Solution
Questions # 160:

How is nonrepudiation supported within a public key infrastructure (PKI) environment?

Options:

A.

Through the use of elliptical curve cryptography on transmitted messages


B.

Through the use of a certificate issued by a certificate authority (CA)


C.

Through the use of private keys to decrypt data received by a user


D.

Through the use of enterprise key management systems


Expert Solution
Questions # 161:

An organization has established hiring policies and procedures designed specifically to ensure network administrators are well qualified Which type of control is in place?

Options:

A.

Detective


B.

Compensating


C.

Corrective


D.

Directive


Expert Solution
Questions # 162:

Which of the following is the MOST effective way to identify exfiltration of sensitive data by a malicious insider?

Options:

A.

Implement data loss prevention (DLP) software


B.

Review perimeter firewall logs


C.

Provide ongoing information security awareness training


D.

Establish behavioral analytics monitoring


Expert Solution
Questions # 163:

Which of the following is the BEST way to prevent social engineering incidents?

Options:

A.

Maintain an onboarding and annual security awareness program.


B.

Ensure user workstations are running the most recent version of antivirus software.


C.

Include security responsibilities in job descriptions and require signed acknowledgment.


D.

Enforce strict email security gateway controls


Expert Solution
Questions # 164:

Which of the following will BEST ensure that a proper cutoff has been established to reinstate transactions and records to their condition just prior to a computer system failure?

Options:

A.

Rotating backup copies of transaction files offsite


B.

Using a database management system (DBMS) to dynamically back-out partially processed transactions


C.

Maintaining system console logs in electronic formal


D.

Ensuring bisynchronous capabilities on all transmission lines


Expert Solution
Questions # 165:

Which of the following demonstrates the use of data analytics for a loan origination process?

Options:

A.

Evaluating whether loan records are included in the batch file and are validated by the servicing system


B.

Comparing a population of loans input in the origination system to loans booked on the servicing system


C.

Validating whether reconciliations between the two systems are performed and discrepancies are investigated


D.

Reviewing error handling controls to notify appropriate personnel in the event of a transmission failure


Expert Solution
Questions # 166:

An IS auditor is reviewing the system development practices of an organization that is about to move from a Waterfall to an Agile approach. Which of the following is MOST important for the auditor to focus on as a result of this move?

Options:

A.

Secure code review


B.

Release management


C.

Capacity planning


D.

Code documentation


Expert Solution
Questions # 167:

An IS auditor should look for which of the following to ensure the risk associated with scope creep has been mitigated during software development?

Options:

A.

Source code version control


B.

Project change management controls


C.

Existence of an architecture review board


D.

Configuration management


Expert Solution
Questions # 168:

Which of the following BEST indicates to an IS auditor that an organization handles emergency changes appropriately and transparently?

Options:

A.

The application operations manual contains procedures to ensure emergency fixes do not compromise system integrity.


B.

Special logon IDs are used to grant programmers permanent access to the production environment.


C.

Change management controls are retroactively applied.


D.

Emergency changes are applied to production libraries immediately.


Expert Solution
Questions # 169:

Which of the following is the BEST control to mitigate the malware risk associated with an instant messaging (IM) system?

Options:

A.

Blocking attachments in IM


B.

Blocking external IM traffic


C.

Allowing only corporate IM solutions


D.

Encrypting IM traffic


Expert Solution
Questions # 170:

An organization is ready to implement a new IT solution consisting of multiple modules. The last module updates the processed data into the database. Which of the following findings should be of MOST concern to the IS auditor?

Options:

A.

Absence of a formal change approval process


B.

Lack of input validation


C.

Use of weak encryption


D.

Lack of a data dictionary


Expert Solution
Questions # 171:

Controls related to authorized modifications to production programs are BEST tested by:

Options:

A.

tracing modifications from the original request for change forward to the executable program.


B.

tracing modifications from the executable program back to the original request for change.


C.

testing only the authorizations to implement the new program.


D.

reviewing only the actual lines of source code changed in the program.


Expert Solution
Questions # 172:

Which of the following poses the GREATEST risk to an organization related to system interfaces?

Options:

A.

There is no process documentation for some system interfaces.


B.

Notifications of data transfers through the interfaces are not retained.


C.

Parts of the data transfer process are performed manually.


D.

There is no reliable inventory of system interfaces.


Expert Solution
Questions # 173:

To confirm integrity for a hashed message, the receiver should use:

Options:

A.

the same hashing algorithm as the sender ' s to create a binary image of the file.


B.

a different hashing algorithm from the sender ' s to create a binary image of the file.


C.

the same hashing algorithm as the sender ' s to create a numerical representation of the file.


D.

a different hashing algorithm from the sender ' s to create a numerical representation of the file.


Expert Solution
Questions # 174:

During a disaster recovery audit, an IS auditor finds that a business impact analysis (BIA) has not been performed. The auditor should FIRST

Options:

A.

perform a business impact analysis (BIA).


B.

issue an intermediate report to management.


C.

evaluate the impact on current disaster recovery capability.


D.

conduct additional compliance testing.


Expert Solution
Questions # 175:

A system performance dashboard indicates several application servers are reaching the defined threshold for maximum CPU allocation. Which of the following would be the IS auditor ' s BEST recommendation for the IT department?

Options:

A.

Increase the defined processing threshold to reflect capacity consumption during normal operations.


B.

Notify end users of potential disruptions caused by degradation of servers.


C.

Terminate both ingress and egress connections of these servers to avoid overload.


D.

Validate the processing capacity of these servers is adequate to complete computing tasks.


Expert Solution
Questions # 176:

Which of the following BEST guards against the risk of attack by hackers?

Options:

A.

Tunneling


B.

Encryption


C.

Message validation


D.

Firewalls


Expert Solution
Questions # 177:

Which of the following BEST enables an IS auditor to prioritize financial reporting spreadsheets for an end-user computing (EUC) audit?

Options:

A.

Understanding the purpose of each spreadsheet


B.

Identifying the spreadsheets with built-in macros


C.

Reviewing spreadsheets based on file size


D.

Ascertaining which spreadsheets are most frequently used


Expert Solution
Questions # 178:

A staff accountant regularly uploads spreadsheets with inventory levels to the organization ' s financial reporting system. The transfers are executed through a customized interface created by an in-house developer. Which of the following is MOST important for the IS auditor to confirm during a review of the interface?

Options:

A.

The data in the spreadsheet is correctly recorded in the financial system.


B.

The financial system transfers are performed by the accountant at predefined intervals.


C.

The spreadsheets do not contain malware or malicious macros.


D.

The data transfer connection does not support full duplex communication.


Expert Solution
Questions # 179:

Which of the following BEST enables an organization to standardize its IT infrastructure to align with business goals?

Options:

A.

Enterprise architecture (EA)


B.

Operational technologies


C.

Data architecture


D.

Robotic process automation (RPA)


Expert Solution
Questions # 180:

Which of the following BEST enables alignment of IT with business objectives?

Options:

A.

Benchmarking against peer organizations


B.

Developing key performance indicators (KPIs)


C.

Completing an IT risk assessment


D.

Leveraging an IT governance framework


Expert Solution
Questions # 181:

Which of the following controls BEST ensures appropriate segregation of duties within an accounts payable department?

Options:

A.

Restricting program functionality according to user security profiles


B.

Restricting access to update programs to accounts payable staff only


C.

Including the creator’s user ID as a field in every transaction record created


D.

Ensuring that audit trails exist for transactions


Expert Solution
Questions # 182:

Which of the following job scheduling schemes for operating system updates is MOST likely to adequately balance protection of workstations with user requirements?

Options:

A.

Automated patching jobs and immediate restart


B.

Automated patching jobs followed by a scheduled restart outside of business hours


C.

End users can initiate patching including subsequent system restarts


D.

Applying only those patches not requiring a system restart


Expert Solution
Questions # 183:

A security administrator is called in the middle of the night by the on-call programmer A number of programs have failed, and the programmer has asked for access to the live system. What IS the BEST course of action?

Options:

A.

Require that a change request be completed and approved


B.

Give the programmer an emergency ID for temporary access and review the activity


C.

Give the programmer read-only access to investigate the problem


D.

Review activity logs the following day and investigate any suspicious activity


Expert Solution
Questions # 184:

An IS auditor is assigned to review the IS department s quality procedures. Upon contacting the IS manager, the auditor finds that there is an informal unwritten set of standards Which of the following should be the auditor ' s NEXT action1?

Options:

A.

Make recommendations to IS management as to appropriate quality standards


B.

Postpone the audit until IS management implements written standards


C.

Document and lest compliance with the informal standards


D.

Finalize the audit and report the finding


Expert Solution
Questions # 185:

An IS audit team is evaluating documentation of the most recent application user access review. It is determined that the user list was not system generated. Which of the following should be of

MOST concern?

Options:

A.

Confidentiality of the user list


B.

Timeliness of the user list review


C.

Completeness of the user list


D.

Availability of the user list


Expert Solution
Questions # 186:

The PRIMARY objective of a privacy protection policy is to increase awareness of:

Options:

A.

Cybercrimes that target an organization’s computer network.


B.

The benefits of using encryption for personal data protection.


C.

The legal requirements for protecting personal information.


D.

System configuration procedures to protect privacy.


Expert Solution
Questions # 187:

Which of the following criteria is MOST important for the successful delivery of benefits from an IT project?

Options:

A.

Assessing the impact of changes to individuals and business units within the organization


B.

Involving key stakeholders during the development and execution phases of the project


C.

Ensuring that IT project managers have sign-off authority on the business case


D.

Quantifying the size of the software development effort required by the project


Expert Solution
Questions # 188:

Which of the following is the GREATEST benefit of adopting an international IT governance framework rather than establishing a new framework based on the actual situation of a specific organization1?

Options:

A.

Readily available resources such as domains and risk and control methodologies


B.

Comprehensive coverage of fundamental and critical risk and control areas for IT governance


C.

Fewer resources expended on trial-and-error attempts to fine-tune implementation methodologies


D.

Wide acceptance by different business and support units with IT governance objectives


Expert Solution
Questions # 189:

An organization allows employees to retain confidential data on personal mobile devices. Which of the following is the BEST recommendation to mitigate the risk of data leakage from lost or stolen devices?

Options:

A.

Require employees to attend security awareness training.


B.

Password protect critical data files.


C.

Configure to auto-wipe after multiple failed access attempts.


D.

Enable device auto-lock function.


Expert Solution
Questions # 190:

An IS auditor is reviewing the security of a web-based customer relationship management (CRM) system that is directly accessed by customers via the Internet, which of the following should be a concern for the auditor?

Options:

A.

The system is hosted on an external third-party service provider’s server.


B.

The system is hosted in a hybrid-cloud platform managed by a service provider.


C.

The system is hosted within a demilitarized zone (DMZ) of a corporate network.


D.

The system is hosted within an internal segment of a corporate network.


Expert Solution
Questions # 191:

Which of the following can only be provided by asymmetric encryption?

Options:

A.

Information privacy


B.

256-brt key length


C.

Data availability


D.

Nonrepudiation


Expert Solution
Questions # 192:

While auditing a small organization ' s data classification processes and procedures, an IS auditor noticed that data is often classified at the incorrect level. What is the MOST effective way for the organization to improve this situation?

Options:

A.

Use automatic document classification based on content.


B.

Have IT security staff conduct targeted training for data owners.


C.

Publish the data classification policy on the corporate web portal.


D.

Conduct awareness presentations and seminars for information classification policies.


Expert Solution
Questions # 193:

Which of the following access rights presents the GREATEST risk when granted to a new member of the system development staff?

Options:

A.

Write access to production program libraries


B.

Write access to development data libraries


C.

Execute access to production program libraries


D.

Execute access to development program libraries


Expert Solution
Questions # 194:

During the review of a system disruption incident, an IS auditor notes that IT support staff were put in a position to make decisions beyond their level of authority.

Which of the following is the BEST recommendation to help prevent this situation in the future?

Options:

A.

Introduce escalation protocols.


B.

Develop a competency matrix.


C.

Implement fallback options.


D.

Enable an emergency access ID.


Expert Solution
Questions # 195:

An organization has outsourced its data processing function to a service provider. Which of the following would BEST determine whether the service provider continues to meet the organization s objectives?

Options:

A.

Assessment of the personnel training processes of the provider


B.

Adequacy of the service provider ' s insurance


C.

Review of performance against service level agreements (SLAs)


D.

Periodic audits of controls by an independent auditor


Expert Solution
Questions # 196:

Which of the following observations would an IS auditor consider the GREATEST risk when conducting an audit of a virtual server farm tor potential software vulnerabilities?

Options:

A.

Guest operating systems are updated monthly


B.

The hypervisor is updated quarterly.


C.

A variety of guest operating systems operate on one virtual server


D.

Antivirus software has been implemented on the guest operating system only.


Expert Solution
Questions # 197:

During the evaluation of controls over a major application development project, the MOST effective use of an IS auditor ' s time would be to review and evaluate:

Options:

A.

application test cases.


B.

acceptance testing.


C.

cost-benefit analysis.


D.

project plans.


Expert Solution
Questions # 198:

Which of the following should be of GREATEST concern to an IS auditor assessing the effectiveness of an organization ' s vulnerability scanning program ' '

Options:

A.

Steps taken to address identified vulnerabilities are not formally documented


B.

Results are not reported to individuals with authority to ensure resolution


C.

Scans are performed less frequently than required by the organization ' s vulnerability scanning schedule


D.

Results are not approved by senior management


Expert Solution
Questions # 199:

IT management has accepted the risk associated with an IS auditor ' s finding due to the cost and complexity of the corrective actions. Which of the following should be the auditor ' s NEXT course of action?

Options:

A.

Perform a cost-benefit analysis.


B.

Document and inform the audit committee.


C.

Report the finding to external regulators.


D.

Notify senior management.


Expert Solution
Questions # 200:

Which of the following approaches would utilize data analytics to facilitate the testing of a new account creation process?

Options:

A.

Attempt to submit new account applications with invalid dates of birth.


B.

Review the business requirements document for date of birth field requirements.


C.

Review new account applications submitted in the past month for invalid dates of birth.


D.

Evaluate configuration settings for the date of birth field requirements


Expert Solution
Viewing page 4 out of 10 pages
Viewing questions 151-200 out of questions