Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

Pass the Isaca Isaca Certification CISA Questions and answers with CertsForce

Viewing page 5 out of 10 pages
Viewing questions 201-250 out of questions
Questions # 201:

The PRIMARY reason for an IS auditor to perform a functional walk-through of a business process during the preliminary phase of an audit assignment is to:

Options:

A.

identify control weaknesses in the business process.


B.

optimize the business process.


C.

understand the key areas.


D.

understand the resource requirements.


Expert Solution
Questions # 202:

Which of the following should be done FIRST following an incident that has caused internal servers to be inaccessible, disrupting normal business operations?

Options:

A.

Document the servers ' dates, times, and locations, as well as the individual who last used them


B.

Make a bit-level copy of the affected servers and calculate the hash value of the copy.


C.

Copy all key directories and files on the affected servers and generate the hash value of the copy.


D.

Unplug all power cables immediately to prevent further actions of the attacker on the servers.


Expert Solution
Questions # 203:

An organization plans to receive an automated data feed into its enterprise data warehouse from a third-party service provider. Which of the following would be the BEST way to prevent accepting bad data?

Options:

A.

Obtain error codes indicating failed data feeds.


B.

Purchase data cleansing tools from a reputable vendor.


C.

Appoint data quality champions across the organization.


D.

Implement business rules to reject invalid data.


Expert Solution
Questions # 204:

Which of the following should be of GREATEST concern to an IS auditor conducting an audit of an organization that recently experienced a ransomware attack?

Options:

A.

Antivirus software was unable to prevent the attack even though it was properly updated


B.

The most recent security patches were not tested prior to implementation


C.

Backups were only performed within the local network


D.

Employees were not trained on cybersecurity policies and procedures


Expert Solution
Questions # 205:

An IS auditor is reviewing a machine learning algorithm-based system for loan approvals and is preparing a data set to test the algorithm for bias. Which of the following is MOST important for the auditor’s test data set to include?

Options:

A.

Applicants of all ages


B.

Applicants from a range of geographic areas and income levels


C.

Incomplete records and incorrectly formatted data


D.

Duplicate records


Expert Solution
Questions # 206:

Which of the following would BEST prevent an arbitrary application of a patch?

Options:

A.

Database access control


B.

Established maintenance windows


C.

Network based access controls


D.

Change management


Expert Solution
Questions # 207:

Which of the following technologies is BEST suited to fulfill a business requirement for nonrepudiation of business-to-business transactions with external parties without the need for a mutually trusted entity?

Options:

A.

Public key infrastructure (PKI)


B.

Blockchain distributed ledger


C.

Artificial intelligence (Al)


D.

Centralized ledger technology


Expert Solution
Questions # 208:

Which of the following would be of MOST concern to an IS auditor reviewing a data loss prevention (DLP) solution implementation for endpoints?

Options:

A.

The DLP solution does not support all types of servers.


B.

The solution has been implemented in blocking mode prior to performing tuning.


C.

The organization has never finished tuning the solution.


D.

The solution does not prevent data leakage because it is still in the monitoring phase.


Expert Solution
Questions # 209:

During the audit of an enterprise resource planning (ERP) system, an IS auditor found an applicationpatch was applied to the production environment. It is MOST

important for the IS auditor to verify approval from the:

Options:

A.

information security officer.


B.

system administrator.


C.

information asset owner.


D.

project manager.


Expert Solution
Questions # 210:

Which of the following should an organization do FIRST when an employee is terminated for fraudulent activity?

Options:

A.

Review transactions approved by the employee.


B.

Escort the employee off the premises.


C.

Disable the employee’s logical access.


D.

Back up the employee’s hard drive.


Expert Solution
Questions # 211:

An organization implemented a cybersecurity policy last year Which of the following is the GREATE ST indicator that the policy may need to be revised?

Options:

A.

A significant increase in authorized connections to third parties


B.

A significant increase in cybersecurity audit findings


C.

A significant increase in approved exceptions


D.

A significant increase in external attack attempts


Expert Solution
Questions # 212:

Which of the following will invalidate the authenticity of digital evidence in a forensic investigation?

Options:

A.

The investigator installed forensic software on the original drive that contained the evidence.


B.

A software write blocker was used in the collection of the evidence.


C.

The investigator collected the evidence while the machine was still powered on.


D.

The evidence was collected from analysis of a copy of the disk data.


Expert Solution
Questions # 213:

Which of the following should be the PRIMARY consideration when validating a data analytic algorithm that has never been used before?

Options:

A.

Enhancing the design of data visualization


B.

Increasing speed and efficiency of audit procedures


C.

Confirming completeness and accuracy


D.

Decreasing the time for data analytics execution


Expert Solution
Questions # 214:

Secure code reviews as part of a continuous deployment program are which type of control?

Options:

A.

Detective


B.

Logical


C.

Preventive


D.

Corrective


Expert Solution
Questions # 215:

Which of the following is the BEST indication that a software development project is on track to meet its completion deadline?

Options:

A.

Technical specifications and development requirements have been agreed upon and formally recorded.


B.

Project plan due dates have been documented for each phase of the software development life cycle.


C.

Issues identified during user acceptance testing (UAT) have been addressed prior to the original implementation date.


D.

The planned software go-live date has been communicated in advance to end users and stakeholders.


Expert Solution
Questions # 216:

During an audit of a financial application, it was determined that many terminated users ' accounts were not disabled. Which of the following should be the IS auditor ' s NEXT step?

Options:

A.

Perform substantive testing of terminated users ' access rights.


B.

Perform a review of terminated users ' account activity


C.

Communicate risks to the application owner.


D.

Conclude that IT general controls ate ineffective.


Expert Solution
Questions # 217:

Which of the following represents the HIGHEST level of maturity of an information security program?

Options:

A.

A training program is in place to promote information security awareness.


B.

A framework is in place to measure risks and track effectiveness.


C.

Information security policies and procedures are established.


D.

The program meets regulatory and compliance requirements.


Expert Solution
Questions # 218:

Which of the following would an IS auditor find to be the GREATEST risk associated with the server room in a remote office location?

Options:

A.

The server room is secured by a key lock instead of an electronic lock.


B.

The server room ' s location is known by people who work in the area.


C.

The server room does not have temperature controls.


D.

The server room does not have biometric controls.


Expert Solution
Questions # 219:

An audit has identified that business units have purchased cloud-based applications without IPs support. What is the GREATEST risk associated with this situation?

Options:

A.

The applications are not included in business continuity plans (BCFs)


B.

The applications may not reasonably protect data.


C.

The application purchases did not follow procurement policy.


D.

The applications could be modified without advanced notice.


Expert Solution
Questions # 220:

Which of the following would provide the MOST important input during the planning phase for an audit on the implementation of a bring your own device (BYOD) program?

Options:

A.

Findings from prior audits


B.

Results of a risk assessment


C.

An inventory of personal devices to be connected to the corporate network


D.

Policies including BYOD acceptable user statements


Expert Solution
Questions # 221:

Which of the following is the PRIMARY reason for using a digital signature?

Options:

A.

Provide availability to the transmission


B.

Authenticate the sender of a message


C.

Provide confidentiality to the transmission


D.

Verify the integrity of the data and the identity of the recipient


Expert Solution
Questions # 222:

What would be an IS auditor ' s BEST course of action when an auditee is unable to close all audit recommendations by the time of the follow-up audit?

Options:

A.

Ensure the open issues are retained in the audit results.


B.

Terminate the follow-up because open issues are not resolved


C.

Recommend compensating controls for open issues.


D.

Evaluate the residual risk due to open issues.


Expert Solution
Questions # 223:

Users are complaining that a newly released enterprise resource planning (ERP) system is functioning too slowly. Which of the following tests during the quality assurance (QA) phase would have identified this concern?

Options:

A.

Stress


B.

Regression


C.

Interface


D.

Integration


Expert Solution
Questions # 224:

In which data loss prevention (DLP) deployment model is data inspection and policy enforcement performed at the organization ' s perimeter or gateway?

Options:

A.

Hybrid DLP


B.

Cloud-based DLP


C.

Endpoint-based DLP


D.

Network-based DLP


Expert Solution
Questions # 225:

An IS auditor engaged in developing the annual internal audit plan learns that the chief information officer (CIO) has requested there be no IS audits in the upcoming year as more time is needed to address a large number of recommendations from the previous year. Which of the following should the auditor do FIRST

Options:

A.

Escalate to audit management to discuss the audit plan


B.

Notify the chief operating officer (COO) and discuss the audit plan risks


C.

Exclude IS audits from the upcoming year ' s plan


D.

Increase the number of IS audits in the clan


Expert Solution
Questions # 226:

When an intrusion into an organization network is deleted, which of the following should be done FIRST?

Options:

A.

Block all compromised network nodes.


B.

Contact law enforcement.


C.

Notify senior management.


D.

Identity nodes that have been compromised.


Expert Solution
Questions # 227:

An organization that has suffered a cyber-attack is performing a forensic analysis of the affected users ' computers. Which of the following should be of GREATEST concern for the IS auditor reviewing this process?

Options:

A.

An imaging process was used to obtain a copy of the data from each computer.


B.

The legal department has not been engaged.


C.

The chain of custody has not been documented.


D.

Audit was only involved during extraction of the Information


Expert Solution
Questions # 228:

A post-implementation review was conducted by issuing a survey to users. Which of the following should be of GREATEST concern to an IS auditor?

Options:

A.

The survey results were not presented in detail lo management.


B.

The survey questions did not address the scope of the business case.


C.

The survey form template did not allow additional feedback to be provided.


D.

The survey was issued to employees a month after implementation.


Expert Solution
Questions # 229:

Which of the following provides the MOST useful information for performing a business impact analysis (B1A)?

Options:

A.

inventory of relevant business processes


B.

Policies for business procurement


C.

Documentation of application configurations


D.

Results of business resumption planning efforts


Expert Solution
Questions # 230:

Which of the following should be of MOST concern to an IS auditor reviewing the information systems acquisition, development, and implementation process?

Options:

A.

Data owners are not trained on the use of data conversion tools.


B.

A post-implementation lessons-learned exercise was not conducted.


C.

There is no system documentation available for review.


D.

System deployment is routinely performed by contractors.


Expert Solution
Questions # 231:

A senior IS auditor suspects that a PC may have been used to perpetrate fraud in a finance department. The auditor should FIRST report this suspicion to:

Options:

A.

audit management.


B.

the police.


C.

the audit committee.


D.

auditee line management.


Expert Solution
Questions # 232:

In a public key cryptographic system, which of the following is the PRIMARY requirement to address the risk of man-in-the-middle attacks through spoofing?

Options:

A.

Strong encryption algorithms


B.

Kerberos authentication


C.

Registration authority


D.

Certificate authority (CA)


Expert Solution
Questions # 233:

Which of the following is MOST important to ensure when planning a black box penetration test?

Options:

A.

The management of the client organization is aware of the testing.


B.

The test results will be documented and communicated to management.


C.

The environment and penetration test scope have been determined.


D.

Diagrams of the organization ' s network architecture are available.


Expert Solution
Questions # 234:

Which of the following information security requirements BE ST enables the tracking of organizational data in a bring your own device (BYOD) environment?

Options:

A.

Employees must immediately report lost or stolen mobile devices containing organizational data


B.

Employees must sign acknowledgment of the organization ' s mobile device acceptable use policy


C.

Employees must enroll their personal devices in the organization ' s mobile device management program


Expert Solution
Questions # 235:

The PRIMARY advantage of using open-source-based solutions is that they:

Options:

A.

Have well-defined support levels.


B.

Are easily implemented.


C.

Reduce dependence on vendors.


D.

Offer better security features.


Expert Solution
Questions # 236:

Which of the following is the BEST way for an organization to mitigate the risk associated with third-party application performance?

Options:

A.

Ensure the third party allocates adequate resources to meet requirements.


B.

Use analytics within the internal audit function


C.

Conduct a capacity planning exercise


D.

Utilize performance monitoring tools to verify service level agreements (SLAs)


Expert Solution
Questions # 237:

An organization has virtualized its server environment without making any other changes to the network or security infrastructure. Which of the following is the MOST significant risk?

Options:

A.

Inability of the network intrusion detection system (IDS) to monitor virtual server-lo-server communications


B.

Vulnerability in the virtualization platform affecting multiple hosts


C.

Data center environmental controls not aligning with new configuration


D.

System documentation not being updated to reflect changes in the environment


Expert Solution
Questions # 238:

Which of the following is the BEST detective control for a job scheduling process involving data transmission?

Options:

A.

Metrics denoting the volume of monthly job failures are reported and reviewed by senior management.


B.

Jobs are scheduled to be completed daily and data is transmitted using a Secure File Transfer Protocol (SFTP).


C.

Jobs are scheduled and a log of this activity is retained for subsequent review.


D.

Job failure alerts are automatically generated and routed to support personnel.


Expert Solution
Questions # 239:

The FIRST step in auditing a data communication system is to determine:

Options:

A.

traffic volumes and response-time criteria


B.

physical security for network equipment


C.

the level of redundancy in the various communication paths


D.

business use and types of messages to be transmitted


Expert Solution
Questions # 240:

How would an IS auditor BEST determine the effectiveness of a security awareness program?

Options:

A.

Review the results of social engineering tests.


B.

Evaluate management survey results.


C.

Interview employees to assess their security awareness.


D.

Review security awareness training quiz results.


Expert Solution
Questions # 241:

Which of the following findings should be of GREATEST concern for an IS auditor when auditing the effectiveness of a phishing simu-lation test administered for staff members?

Options:

A.

Staff members who failed the test did not receive follow-up education


B.

Test results were not communicated to staff members.


C.

Staff members were not notified about the test beforehand.


D.

Security awareness training was not provided prior to the test.


Expert Solution
Questions # 242:

Which of the following weaknesses would have the GREATEST impact on the effective operation of a perimeter firewall?

Options:

A.

Use of stateful firewalls with default configuration


B.

Ad hoc monitoring of firewall activity


C.

Misconfiguration of the firewall rules


D.

Potential back doors to the firewall software


Expert Solution
Questions # 243:

If a recent release of a program has to be backed out of production, the corresponding changes within the delta version of the code should be:

Options:

A.

filed in production for future reference in researching the problem.


B.

applied to the source code that reflects the version in production.


C.

eliminated from the source code that reflects the version in production.


D.

reinstalled when replacing the version back into production.


Expert Solution
Questions # 244:

Which of the following would be MOST effective in detecting the presence of an unauthorized wireless access point on an internal network?

Options:

A.

Continuous network monitoring


B.

Periodic network vulnerability assessments


C.

Review of electronic access logs


D.

Physical security reviews


Expert Solution
Questions # 245:

Which of the following is MOST important to ensure that electronic evidence collected during a forensic investigation will be admissible in future legal proceedings?

Options:

A.

Restricting evidence access to professionally certified forensic investigators


B.

Documenting evidence handling by personnel throughout the forensic investigation


C.

Performing investigative procedures on the original hard drives rather than images of the hard drives


D.

Engaging an independent third party to perform the forensic investigation


Expert Solution
Questions # 246:

Which type of control is being implemented when a biometric access device is installed at the entrance to a facility?

Options:

A.

Preventive


B.

Deterrent


C.

Corrective


D.

Detective


Expert Solution
Questions # 247:

During an external review, an IS auditor observes an inconsistent approach in classifying system criticality within the organization. Which of the following should be recommended as the PRIMARY factor to determine system criticality?

Options:

A.

Key performance indicators (KPIs)


B.

Maximum allowable downtime (MAD)


C.

Recovery point objective (RPO)


D.

Mean time to restore (MTTR)


Expert Solution
Questions # 248:

An IS auditor reviewing the database controls for a new e-commerce system discovers a security weakness in the database configuration. Which of the following should be the IS auditor ' s NEXT course of action?

Options:

A.

Identify existing mitigating controls.


B.

Disclose the findings to senior management.


C.

Assist in drafting corrective actions.


D.

Attempt to exploit the weakness.


Expert Solution
Questions # 249:

Which of the following is the MOST important consideration when relying on the work of the prior auditor?

Options:

A.

Qualifications of the prior auditor


B.

Management agreement with recommendations


C.

Duration of the prior audit


D.

Number of findings identified by the prior auditor


Expert Solution
Questions # 250:

Which of the following activities should be separated in an organization’s incident management processes?

Options:

A.

Initiating and closing error logs


B.

Collecting and analyzing logs from devices


C.

Identifying root causes and recommending workarounds


D.

Recording and classifying incidents


Expert Solution
Viewing page 5 out of 10 pages
Viewing questions 201-250 out of questions