Pass the Isaca Isaca Certification CISA Questions and answers with CertsForce

Viewing page 4 out of 9 pages
Viewing questions 151-200 out of questions
Questions # 151:

Which of the following data would be used when performing a business impact analysis (BIA)?

Options:

A.

Projected impact of current business on future business


B.

Cost-benefit analysis of running the current business


C.

Cost of regulatory compliance


D.

Expected costs for recovering the business


Expert Solution
Questions # 152:

During an ongoing audit, management requests a briefing on the findings to date. Which of the following is the IS auditor's BEST course of action?

Options:

A.

Review working papers with the auditee.


B.

Request the auditee provide management responses.


C.

Request management wait until a final report is ready for discussion.


D.

Present observations for discussion only.


Expert Solution
Questions # 153:

Management has requested a post-implementation review of a newly implemented purchasing package to determine to what extent business requirements are being met. Which of the following is MOST likely to be assessed?

Options:

A.

Purchasing guidelines and policies


B.

Implementation methodology


C.

Results of line processing


D.

Test results


Expert Solution
Questions # 154:

An IS auditor finds that a key Internet-facing system is vulnerable to attack and that patches are not available. What should the auditor recommend be done FIRST?

Options:

A.

Implement a new system that can be patched.


B.

Implement additional firewalls to protect the system.


C.

Decommission the server.


D.

Evaluate the associated risk.


Expert Solution
Questions # 155:

Coding standards provide which of the following?

Options:

A.

Program documentation


B.

Access control tables


C.

Data flow diagrams


D.

Field naming conventions


Expert Solution
Questions # 156:

Which of the following will be the MOST effective method to verify that a service vendor keeps control levels as required by the client?

Options:

A.

Conduct periodic on-site assessments using agreed-upon criteria.


B.

Periodically review the service level agreement (SLA) with the vendor.


C.

Conduct an unannounced vulnerability assessment of vendor's IT systems.


D.

Obtain evidence of the vendor's control self-assessment (CSA).


Expert Solution
Questions # 157:

Which of the following should be GREATEST concern to an IS auditor reviewing data conversion and migration during the implementation of a new application system?

Options:

A.

Data conversion was performed using manual processes.


B.

Backups of the old system and data are not available online.


C.

Unauthorized data modifications occurred during conversion.


D.

The change management process was not formally documented


Expert Solution
Questions # 158:

Which of the following documents would be MOST useful in detecting a weakness in segregation of duties?

Options:

A.

System flowchart


B.

Data flow diagram


C.

Process flowchart


D.

Entity-relationship diagram


Expert Solution
Questions # 159:

The decision to accept an IT control risk related to data quality should be the responsibility of the:

Options:

A.

information security team.


B.

IS audit manager.


C.

chief information officer (CIO).


D.

business owner.


Expert Solution
Questions # 160:

Which of the following should be an IS auditor's PRIMARY focus when developing a risk-based IS audit program?

Options:

A.

Portfolio management


B.

Business plans


C.

Business processes


D.

IT strategic plans


Expert Solution
Questions # 161:

Which of the following is the BEST source of information for assessing the effectiveness of IT process monitoring?

Options:

A.

Real-time audit software


B.

Performance data


C.

Quality assurance (QA) reviews


D.

Participative management techniques


Expert Solution
Questions # 162:

An IS auditor notes that several employees are spending an excessive amount of time using social media sites for personal reasons. Which of the following should the auditor recommend be performed FIRST?

Options:

A.

Implement a process to actively monitor postings on social networking sites.


B.

Adjust budget for network usage to include social media usage.


C.

Use data loss prevention (DLP) tools on endpoints.


D.

implement policies addressing acceptable usage of social media during working hours.


Expert Solution
Questions # 163:

Which of the following is the BEST way to determine whether a test of a disaster recovery plan (DRP) was successful?

Options:

A.

Analyze whether predetermined test objectives were met.


B.

Perform testing at the backup data center.


C.

Evaluate participation by key personnel.


D.

Test offsite backup files.


Expert Solution
Questions # 164:

Which of the following BEST indicates the effectiveness of an organization's risk management program?

Options:

A.

Inherent risk is eliminated.


B.

Residual risk is minimized.


C.

Control risk is minimized.


D.

Overall risk is quantified.


Expert Solution
Questions # 165:

A new regulation requires organizations to report significant security incidents to the regulator within 24 hours of identification. Which of the following is the IS auditor's BEST recommendation to facilitate compliance with the regulation?

Options:

A.

Include the requirement in the incident management response plan.


B.

Establish key performance indicators (KPIs) for timely identification of security incidents.


C.

Enhance the alert functionality of the intrusion detection system (IDS).


D.

Engage an external security incident response expert for incident handling.


Expert Solution
Questions # 166:

The PRIMARY benefit lo using a dry-pipe fire-suppression system rather than a wet-pipe system is that a dry-pipe system:

Options:

A.

is more effective at suppressing flames.


B.

allows more time to abort release of the suppressant.


C.

has a decreased risk of leakage.


D.

disperses dry chemical suppressants exclusively.


Expert Solution
Questions # 167:

During a new system implementation, an IS auditor has been assigned to review risk management at each milestone. The auditor finds that several risks to project benefits have not been addressed. Who should be accountable for managing these risks?

Options:

A.

Enterprise risk manager


B.

Project sponsor


C.

Information security officer


D.

Project manager


Expert Solution
Questions # 168:

Which of the following fire suppression systems needs to be combined with an automatic switch to shut down the electricity supply in the event of activation?

Options:

A.

Carbon dioxide


B.

FM-200


C.

Dry pipe


D.

Halon


Expert Solution
Questions # 169:

An IS auditor has found that an organization is unable to add new servers on demand in a cost-efficient manner. Which of the following is the auditor's BEST recommendation?

Options:

A.

Increase the capacity of existing systems.


B.

Upgrade hardware to newer technology.


C.

Hire temporary contract workers for the IT function.


D.

Build a virtual environment.


Expert Solution
Questions # 170:

Which of the following is the MOST important prerequisite for the protection of physical information assets in a data center?

Options:

A.

Segregation of duties between staff ordering and staff receiving information assets


B.

Complete and accurate list of information assets that have been deployed


C.

Availability and testing of onsite backup generators


D.

Knowledge of the IT staff regarding data protection requirements


Expert Solution
Questions # 171:

A system administrator recently informed the IS auditor about the occurrence of several unsuccessful intrusion attempts from outside the organization. Which of the following is MOST effective in detecting such an intrusion?

Options:

A.

Periodically reviewing log files


B.

Configuring the router as a firewall


C.

Using smart cards with one-time passwords


D.

Installing biometrics-based authentication


Expert Solution
Questions # 172:

An IS auditor who was instrumental in designing an application is called upon to review the application. The auditor should:

Options:

A.

refuse the assignment to avoid conflict of interest.


B.

use the knowledge of the application to carry out the audit.


C.

inform audit management of the earlier involvement.


D.

modify the scope of the audit.


Expert Solution
Questions # 173:

Which of the following is the MOST important benefit of involving IS audit when implementing governance of enterprise IT?

Options:

A.

Identifying relevant roles for an enterprise IT governance framework


B.

Making decisions regarding risk response and monitoring of residual risk


C.

Verifying that legal, regulatory, and contractual requirements are being met


D.

Providing independent and objective feedback to facilitate improvement of IT processes


Expert Solution
Questions # 174:

Which of the following BEST guards against the risk of attack by hackers?

Options:

A.

Tunneling


B.

Encryption


C.

Message validation


D.

Firewalls


Expert Solution
Questions # 175:

During the evaluation of controls over a major application development project, the MOST effective use of an IS auditor's time would be to review and evaluate:

Options:

A.

application test cases.


B.

acceptance testing.


C.

cost-benefit analysis.


D.

project plans.


Expert Solution
Questions # 176:

An organization has outsourced its data processing function to a service provider. Which of the following would BEST determine whether the service provider continues to meet the organization s objectives?

Options:

A.

Assessment of the personnel training processes of the provider


B.

Adequacy of the service provider's insurance


C.

Review of performance against service level agreements (SLAs)


D.

Periodic audits of controls by an independent auditor


Expert Solution
Questions # 177:

Which of the following access rights presents the GREATEST risk when granted to a new member of the system development staff?

Options:

A.

Write access to production program libraries


B.

Write access to development data libraries


C.

Execute access to production program libraries


D.

Execute access to development program libraries


Expert Solution
Questions # 178:

When an IS audit reveals that a firewall was unable to recognize a number of attack attempts, the auditor's BEST recommendation is to place an intrusion detection system (IDS) between the firewall and:

Options:

A.

the Internet.


B.

the demilitarized zone (DMZ).


C.

the organization's web server.


D.

the organization's network.


Expert Solution
Questions # 179:

In a small IT web development company where developers must have write access to production, the BEST recommendation of an IS auditor would be to:

Options:

A.

hire another person to perform migration to production.


B.

implement continuous monitoring controls.


C.

remove production access from the developers.


D.

perform a user access review for the development team


Expert Solution
Questions # 180:

Which of the following is the MOST effective way for an organization to project against data loss?

Options:

A.

Limit employee internet access.


B.

Implement data classification procedures.


C.

Review firewall logs for anomalies.


D.

Conduct periodic security awareness training.


Expert Solution
Questions # 181:

Which of the following is the BEST method to prevent wire transfer fraud by bank employees?

Options:

A.

Independent reconciliation


B.

Re-keying of wire dollar amounts


C.

Two-factor authentication control


D.

System-enforced dual control


Expert Solution
Questions # 182:

Which of the following tests would provide the BEST assurance that a health care organization is handling patient data appropriately?

Options:

A.

Compliance with action plans resulting from recent audits


B.

Compliance with local laws and regulations


C.

Compliance with industry standards and best practice


D.

Compliance with the organization's policies and procedures


Expert Solution
Questions # 183:

The PRIMARY advantage of object-oriented technology is enhanced:

Options:

A.

efficiency due to the re-use of elements of logic.


B.

management of sequential program execution for data access.


C.

grouping of objects into methods for data access.


D.

management of a restricted variety of data types for a data object.


Expert Solution
Questions # 184:

Which of the following is an executive management concern that could be addressed by the implementation of a security metrics dashboard?

Options:

A.

Effectiveness of the security program


B.

Security incidents vs. industry benchmarks


C.

Total number of hours budgeted to security


D.

Total number of false positives


Expert Solution
Questions # 185:

To confirm integrity for a hashed message, the receiver should use:

Options:

A.

the same hashing algorithm as the sender's to create a binary image of the file.


B.

a different hashing algorithm from the sender's to create a binary image of the file.


C.

the same hashing algorithm as the sender's to create a numerical representation of the file.


D.

a different hashing algorithm from the sender's to create a numerical representation of the file.


Expert Solution
Questions # 186:

An IT balanced scorecard is the MOST effective means of monitoring:

Options:

A.

governance of enterprise IT.


B.

control effectiveness.


C.

return on investment (ROI).


D.

change management effectiveness.


Expert Solution
Questions # 187:

An IS auditor wants to determine who has oversight of staff performing a specific task and is referencing the organization's RACI chart. Which of the following roles within the chart would provide this information?

Options:

A.

Consulted


B.

Informed


C.

Responsible


D.

Accountable


Expert Solution
Questions # 188:

An IS auditor suspects an organization's computer may have been used to commit a crime. Which of the following is the auditor's BEST course of action?

Options:

A.

Examine the computer to search for evidence supporting the suspicions.


B.

Advise management of the crime after the investigation.


C.

Contact the incident response team to conduct an investigation.


D.

Notify local law enforcement of the potential crime before further investigation.


Expert Solution
Questions # 189:

An IS auditor found that a company executive is encouraging employee use of social networking sites for business purposes. Which of the following recommendations would BEST help to reduce the risk of data leakage?

Options:

A.

Requiring policy acknowledgment and nondisclosure agreements (NDAs) signed by employees


B.

Establishing strong access controls on confidential data


C.

Providing education and guidelines to employees on use of social networking sites


D.

Monitoring employees' social networking usage


Expert Solution
Questions # 190:

Which of the following is MOST important for an effective control self-assessment (CSA) program?

Options:

A.

Determining the scope of the assessment


B.

Performing detailed test procedures


C.

Evaluating changes to the risk environment


D.

Understanding the business process


Expert Solution
Questions # 191:

Which of the following attack techniques will succeed because of an inherent security weakness in an Internet firewall?

Options:

A.

Phishing


B.

Using a dictionary attack of encrypted passwords


C.

Intercepting packets and viewing passwords


D.

Flooding the site with an excessive number of packets


Expert Solution
Questions # 192:

An IS audit reveals that an organization is not proactively addressing known vulnerabilities. Which of the following should the IS auditor recommend the organization do FIRST?

Options:

A.

Verify the disaster recovery plan (DRP) has been tested.


B.

Ensure the intrusion prevention system (IPS) is effective.


C.

Assess the security risks to the business.


D.

Confirm the incident response team understands the issue.


Expert Solution
Questions # 193:

What is BEST for an IS auditor to review when assessing the effectiveness of changes recently made to processes and tools related to an organization's business continuity plan (BCP)?

Options:

A.

Full test results


B.

Completed test plans


C.

Updated inventory of systems


D.

Change management processes


Expert Solution
Questions # 194:

Which of the following is the BEST justification for deferring remediation testing until the next audit?

Options:

A.

The auditor who conducted the audit and agreed with the timeline has left the organization.


B.

Management's planned actions are sufficient given the relative importance of the observations.


C.

Auditee management has accepted all observations reported by the auditor.


D.

The audit environment has changed significantly.


Expert Solution
Questions # 195:

An IS auditor will be testing accounts payable controls by performing data analytics on the entire population of transactions. Which of the following is MOST important for the auditor to confirm when sourcing the population data?

Options:

A.

The data is taken directly from the system.


B.

There is no privacy information in the data.


C.

The data can be obtained in a timely manner.


D.

The data analysis tools have been recently updated.


Expert Solution
Questions # 196:

Which of the following is MOST important with regard to an application development acceptance test?

Options:

A.

The programming team is involved in the testing process.


B.

All data files are tested for valid information before conversion.


C.

User management approves the test design before the test is started.


D.

The quality assurance (QA) team is in charge of the testing process.


Expert Solution
Questions # 197:

An IS auditor notes the transaction processing times in an order processing system have significantly increased after a major release. Which of the following should the IS auditor review FIRST?

Options:

A.

Capacity management plan


B.

Training plans


C.

Database conversion results


D.

Stress testing results


Expert Solution
Questions # 198:

When evaluating the design of controls related to network monitoring, which of the following is MOST important for an IS auditor to review?

Options:

A.

Incident monitoring togs


B.

The ISP service level agreement


C.

Reports of network traffic analysis


D.

Network topology diagrams


Expert Solution
Questions # 199:

Which of the following is the BEST way to address segregation of duties issues in an organization with budget constraints?

Options:

A.

Rotate job duties periodically.


B.

Perform an independent audit.


C.

Hire temporary staff.


D.

Implement compensating controls.


Expert Solution
Questions # 200:

Cross-site scripting (XSS) attacks are BEST prevented through:

Options:

A.

application firewall policy settings.


B.

a three-tier web architecture.


C.

secure coding practices.


D.

use of common industry frameworks.


Expert Solution
Viewing page 4 out of 9 pages
Viewing questions 151-200 out of questions