Pass the Isaca Isaca Certification CISA Questions and answers with CertsForce

Viewing page 5 out of 9 pages
Viewing questions 201-250 out of questions
Questions # 201:

Due to limited storage capacity, an organization has decided to reduce the actual retention period for media containing completed low-value transactions. Which of the following is MOST important for the organization to ensure?

Options:

A.

The policy includes a strong risk-based approach.


B.

The retention period allows for review during the year-end audit.


C.

The total transaction amount has no impact on financial reporting.


D.

The retention period complies with data owner responsibilities.


Expert Solution
Questions # 202:

Which of the following is the BEST method to safeguard data on an organization's laptop computers?

Options:

A.

Disabled USB ports


B.

Full disk encryption


C.

Biometric access control


D.

Two-factor authentication


Expert Solution
Questions # 203:

During a disaster recovery audit, an IS auditor finds that a business impact analysis (BIA) has not been performed. The auditor should FIRST

Options:

A.

perform a business impact analysis (BIA).


B.

issue an intermediate report to management.


C.

evaluate the impact on current disaster recovery capability.


D.

conduct additional compliance testing.


Expert Solution
Questions # 204:

Which of the following is the MOST effective control for protecting the confidentiality and integrity of data stored unencrypted on virtual machines?

Options:

A.

Monitor access to stored images and snapshots of virtual machines.


B.

Restrict access to images and snapshots of virtual machines.


C.

Limit creation of virtual machine images and snapshots.


D.

Review logical access controls on virtual machines regularly.


Expert Solution
Questions # 205:

Which of the following would be a result of utilizing a top-down maturity model process?

Options:

A.

A means of benchmarking the effectiveness of similar processes with peers


B.

A means of comparing the effectiveness of other processes within the enterprise


C.

Identification of older, more established processes to ensure timely review


D.

Identification of processes with the most improvement opportunities


Expert Solution
Questions # 206:

An IS auditor is evaluating an organization's IT strategy and plans. Which of the following would be of GREATEST concern?

Options:

A.

There is not a defined IT security policy.


B.

The business strategy meeting minutes are not distributed.


C.

IT is not engaged in business strategic planning.


D.

There is inadequate documentation of IT strategic planning.


Expert Solution
Questions # 207:

Which of the following is MOST important to include in forensic data collection and preservation procedures?

Options:

A.

Assuring the physical security of devices


B.

Preserving data integrity


C.

Maintaining chain of custody


D.

Determining tools to be used


Expert Solution
Questions # 208:

Which of the following demonstrates the use of data analytics for a loan origination process?

Options:

A.

Evaluating whether loan records are included in the batch file and are validated by the servicing system


B.

Comparing a population of loans input in the origination system to loans booked on the servicing system


C.

Validating whether reconciliations between the two systems are performed and discrepancies are investigated


D.

Reviewing error handling controls to notify appropriate personnel in the event of a transmission failure


Expert Solution
Questions # 209:

The implementation of an IT governance framework requires that the board of directors of an organization:

Options:

A.

Address technical IT issues.


B.

Be informed of all IT initiatives.


C.

Have an IT strategy committee.


D.

Approve the IT strategy.


Expert Solution
Questions # 210:

Which of the following is the BEST control to prevent the transfer of files to external parties through instant messaging (IM) applications?

Options:

A.

File level encryption


B.

File Transfer Protocol (FTP)


C.

Instant messaging policy


D.

Application-level firewalls


Expert Solution
Questions # 211:

Which of the following would BEST determine whether a post-implementation review (PIR) performed by the project management office (PMO) was effective?

Options:

A.

Lessons learned were implemented.


B.

Management approved the PIR report.


C.

The review was performed by an external provider.


D.

Project outcomes have been realized.


Expert Solution
Questions # 212:

Which of the following is the BEST recommendation to prevent fraudulent electronic funds transfers by accounts payable employees?

Options:

A.

Periodic vendor reviews


B.

Dual control


C.

Independent reconciliation


D.

Re-keying of monetary amounts


E.

Engage an external security incident response expert for incident handling.


Expert Solution
Questions # 213:

Secure code reviews as part of a continuous deployment program are which type of control?

Options:

A.

Detective


B.

Logical


C.

Preventive


D.

Corrective


Expert Solution
Questions # 214:

The BEST way to determine whether programmers have permission to alter data in the production environment is by reviewing:

Options:

A.

the access control system's log settings.


B.

how the latest system changes were implemented.


C.

the access control system's configuration.


D.

the access rights that have been granted.


Expert Solution
Questions # 215:

An organization has assigned two now IS auditors to audit a now system implementation. One of the auditors has an IT-related degree, and one has a business degree. Which ol the following is MOST important to meet the IS audit standard for proficiency?

Options:

A.

The standard is met as long as one member has a globally recognized audit certification.


B.

Technical co-sourcing must be used to help the new staff.


C.

Team member assignments must be based on individual competencies.


D.

The standard is met as long as a supervisor reviews the new auditors' work.


Expert Solution
Questions # 216:

Which of the following is the MOST important determining factor when establishing appropriate timeframes for follow-up activities related to audit findings?

Options:

A.

Availability of IS audit resources


B.

Remediation dates included in management responses


C.

Peak activity periods for the business


D.

Complexity of business processes identified in the audit


Expert Solution
Questions # 217:

Which of the following is a detective control?

Options:

A.

Programmed edit checks for data entry


B.

Backup procedures


C.

Use of pass cards to gain access to physical facilities


D.

Verification of hash totals


Expert Solution
Questions # 218:

Which of the following occurs during the issues management process for a system development project?

Options:

A.

Contingency planning


B.

Configuration management


C.

Help desk management


D.

Impact assessment


Expert Solution
Questions # 219:

Which of the following is MOST important for an IS auditor to do during an exit meeting with an auditee?

Options:

A.

Ensure that the facts presented in the report are correct


B.

Communicate the recommendations lo senior management


C.

Specify implementation dates for the recommendations.


D.

Request input in determining corrective action.


Expert Solution
Questions # 220:

Which of the following is MOST helpful for measuring benefits realization for a new system?

Options:

A.

Function point analysis


B.

Balanced scorecard review


C.

Post-implementation review


D.

Business impact analysis (BIA)


Expert Solution
Questions # 221:

When testing the adequacy of tape backup procedures, which step BEST verifies that regularly scheduled Backups are timely and run to completion?

Options:

A.

Observing the execution of a daily backup run


B.

Evaluating the backup policies and procedures


C.

Interviewing key personnel evolved In the backup process


D.

Reviewing a sample of system-generated backup logs


Expert Solution
Questions # 222:

Which of the following is the BEST indicator of the effectiveness of an organization's incident response program?

Options:

A.

Number of successful penetration tests


B.

Percentage of protected business applications


C.

Financial impact per security event


D.

Number of security vulnerability patches


Expert Solution
Questions # 223:

Which of the following findings should be of GREATEST concern to an IS auditor performing a review of IT operations?

Options:

A.

The job scheduler application has not been designed to display pop-up error messages.


B.

Access to the job scheduler application has not been restricted to a maximum of two staff members


C.

Operations shift turnover logs are not utilized to coordinate and control the processing environment


D.

Changes to the job scheduler application's parameters are not approved and reviewed by an operations supervisor


Expert Solution
Questions # 224:

Which of the following would provide the MOST important input during the planning phase for an audit on the implementation of a bring your own device (BYOD) program?

Options:

A.

Findings from prior audits


B.

Results of a risk assessment


C.

An inventory of personal devices to be connected to the corporate network


D.

Policies including BYOD acceptable user statements


Expert Solution
Questions # 225:

A new system is being developed by a vendor for a consumer service organization. The vendor will provide its proprietary software once system development is completed Which of the following is the MOST important requirement to include In the vendor contract to ensure continuity?

Options:

A.

Continuous 24/7 support must be available.


B.

The vendor must have a documented disaster recovery plan (DRP) in place.


C.

Source code for the software must be placed in escrow.


D.

The vendor must train the organization's staff to manage the new software


Expert Solution
Questions # 226:

Providing security certification for a new system should include which of the following prior to the system's implementation?

Options:

A.

End-user authorization to use the system in production


B.

External audit sign-off on financial controls


C.

Testing of the system within the production environment


D.

An evaluation of the configuration management practices


Expert Solution
Questions # 227:

Which of the following would BEST help lo support an auditor’s conclusion about the effectiveness of an implemented data classification program?

Options:

A.

Purchase of information management tools


B.

Business use cases and scenarios


C.

Access rights provisioned according to scheme


D.

Detailed data classification scheme


Expert Solution
Questions # 228:

An IS auditor finds a high-risk vulnerability in a public-facing web server used to process online customer payments. The IS auditor should FIRST

Options:

A.

document the exception in an audit report.


B.

review security incident reports.


C.

identify compensating controls.


D.

notify the audit committee.


Expert Solution
Questions # 229:

Which of the following activities would allow an IS auditor to maintain independence while facilitating a control sell-assessment (CSA)?

Options:

A.

Implementing the remediation plan


B.

Partially completing the CSA


C.

Developing the remediation plan


D.

Developing the CSA questionnaire


Expert Solution
Questions # 230:

An organization has recently implemented a Voice-over IP (VoIP) communication system. Which ot the following should be the IS auditor's PRIMARY concern?

Options:

A.

A single point of failure for both voice and data communications


B.

Inability to use virtual private networks (VPNs) for internal traffic


C.

Lack of integration of voice and data communications


D.

Voice quality degradation due to packet toss


Expert Solution
Questions # 231:

An organization was recently notified by its regulatory body of significant discrepancies in its reporting data. A preliminary investigation revealed that the discrepancies were caused by problems with the organization's data quality Management has directed the data quality team to enhance their program. The audit committee has asked internal audit to be advisors to the process. To ensure that management concerns are addressed, which data set should internal audit recommend be reviewed FIRST?

Options:

A.

Data with customer personal information


B.

Data reported to the regulatory body


C.

Data supporting financial statements


D.

Data impacting business objectives


Expert Solution
Questions # 232:

Which of the following is a social engineering attack method?

Options:

A.

An employee is induced to reveal confidential IP addresses and passwords by answering questions over the phone.


B.

A hacker walks around an office building using scanning tools to search for a wireless network to gain access.


C.

An intruder eavesdrops and collects sensitive information flowing through the network and sells it to third parties.


D.

An unauthorized person attempts to gain access to secure premises by following an authorized person through a secure door.


Expert Solution
Questions # 233:

Which of the following environments is BEST used for copying data and transformation into a compatible data warehouse format?

Options:

A.

Testing


B.

Replication


C.

Staging


D.

Development


Expert Solution
Questions # 234:

Which of the following should an IS auditor consider FIRST when evaluating firewall rules?

Options:

A.

The organization's security policy


B.

The number of remote nodes


C.

The firewalls' default settings


D.

The physical location of the firewalls


Expert Solution
Questions # 235:

During an exit interview, senior management disagrees with some of me facts presented m the draft audit report and wants them removed from the report. Which of the following would be the auditor's BEST course of action?

Options:

A.

Revise the assessment based on senior management's objections.


B.

Escalate the issue to audit management.


C.

Finalize the draft audit report without changes.


D.

Gather evidence to analyze senior management's objections


Expert Solution
Questions # 236:

Which of the following represents the HIGHEST level of maturity of an information security program?

Options:

A.

A training program is in place to promote information security awareness.


B.

A framework is in place to measure risks and track effectiveness.


C.

Information security policies and procedures are established.


D.

The program meets regulatory and compliance requirements.


Expert Solution
Questions # 237:

To develop meaningful recommendations 'or findings, which of the following is MOST important 'or an IS auditor to determine and understand?

Options:

A.

Root cause


B.

Responsible party


C.

impact


D.

Criteria


Expert Solution
Questions # 238:

Which of the following would be an appropriate rote of internal audit in helping to establish an organization's privacy program?

Options:

A.

Analyzing risks posed by new regulations


B.

Designing controls to protect personal data


C.

Defining roles within the organization related to privacy


D.

Developing procedures to monitor the use of personal data


Expert Solution
Questions # 239:

Which of the following is the MAIN purpose of an information security management system?

Options:

A.

To identify and eliminate the root causes of information security incidents


B.

To enhance the impact of reports used to monitor information security incidents


C.

To keep information security policies and procedures up-to-date


D.

To reduce the frequency and impact of information security incidents


Expert Solution
Questions # 240:

Which of the following concerns is BEST addressed by securing production source libraries?

Options:

A.

Programs are not approved before production source libraries are updated.


B.

Production source and object libraries may not be synchronized.


C.

Changes are applied to the wrong version of production source libraries.


D.

Unauthorized changes can be moved into production.


Expert Solution
Questions # 241:

Which of the following findings should be of GREATEST concern for an IS auditor when auditing the effectiveness of a phishing simu-lation test administered for staff members?

Options:

A.

Staff members who failed the test did not receive follow-up education


B.

Test results were not communicated to staff members.


C.

Staff members were not notified about the test beforehand.


D.

Security awareness training was not provided prior to the test.


Expert Solution
Questions # 242:

Which of the following is the GREATEST risk associated with storing customer data on a web server?

Options:

A.

Data availability


B.

Data confidentiality


C.

Data integrity


D.

Data redundancy


Expert Solution
Questions # 243:

Which of the following would BEST manage the risk of changes in requirements after the analysis phase of a business application development project?

Options:

A.

Expected deliverables meeting project deadlines


B.

Sign-off from the IT team


C.

Ongoing participation by relevant stakeholders


D.

Quality assurance (OA) review


Expert Solution
Questions # 244:

For an organization that has plans to implement web-based trading, it would be MOST important for an IS auditor to verify the organization's information security plan includes:

Options:

A.

attributes for system passwords.


B.

security training prior to implementation.


C.

security requirements for the new application.


D.

the firewall configuration for the web server.


Expert Solution
Questions # 245:

Which of the following security risks can be reduced by a property configured network firewall?

Options:

A.

SQL injection attacks


B.

Denial of service (DoS) attacks


C.

Phishing attacks


D.

Insider attacks


Expert Solution
Questions # 246:

Which of the following BEST protects an organization's proprietary code during a joint-development activity involving a third party?

Options:

A.

Statement of work (SOW)


B.

Nondisclosure agreement (NDA)


C.

Service level agreement (SLA)


D.

Privacy agreement


Expert Solution
Questions # 247:

The IS auditor has recommended that management test a new system before using it in production mode. The BEST approach for management in developing a test plan is to use processing parameters that are:

Options:

A.

randomly selected by a test generator.


B.

provided by the vendor of the application.


C.

randomly selected by the user.


D.

simulated by production entities and customers.


Expert Solution
Questions # 248:

Which of the following is the PRIMARY reason to follow a configuration management process to maintain application?

Options:

A.

To optimize system resources


B.

To follow system hardening standards


C.

To optimize asset management workflows


D.

To ensure proper change control


Expert Solution
Questions # 249:

Which of the following BEST demonstrates that IT strategy Is aligned with organizational goals and objectives?

Options:

A.

IT strategies are communicated to all Business stakeholders


B.

Organizational strategies are communicated to the chief information officer (CIO).


C.

Business stakeholders are Involved In approving the IT strategy.


D.

The chief information officer (CIO) is involved In approving the organizational strategies


Expert Solution
Questions # 250:

Which of the following observations would an IS auditor consider the GREATEST risk when conducting an audit of a virtual server farm tor potential software vulnerabilities?

Options:

A.

Guest operating systems are updated monthly


B.

The hypervisor is updated quarterly.


C.

A variety of guest operating systems operate on one virtual server


D.

Antivirus software has been implemented on the guest operating system only.


Expert Solution
Viewing page 5 out of 9 pages
Viewing questions 201-250 out of questions