Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

Pass the Isaca Isaca Certification CISA Questions and answers with CertsForce

Viewing page 6 out of 10 pages
Viewing questions 251-300 out of questions
Questions # 251:

Which of the following is the MOST important responsibility of data owners when implementing a data classification process?

Options:

A.

Reviewing emergency changes to data


B.

Authorizing application code changes


C.

Determining appropriate user access levels


D.

Implementing access rules over database tables


Expert Solution
Questions # 252:

Which of the following provides the BEST assurance of data integrity after file transfers?

Options:

A.

Check digits


B.

Monetary unit sampling


C.

Hash values


D.

Reasonableness check


Expert Solution
Questions # 253:

Which of the following concerns is MOST effectively addressed by implementing an IT framework for alignment between IT and business objectives?

Options:

A.

Inaccurate business impact analysis (BIA)


B.

Inadequate IT change management practices


C.

Lack of a benchmark analysis


D.

Inadequate IT portfolio management


Expert Solution
Questions # 254:

An IS auditor will be testing accounts payable controls by performing data analytics on the entire population of transactions. Which of the following is MOST important for the auditor to confirm when sourcing the population data?

Options:

A.

The data is taken directly from the system.


B.

There is no privacy information in the data.


C.

The data can be obtained in a timely manner.


D.

The data analysis tools have been recently updated.


Expert Solution
Questions # 255:

An IS auditor is reviewing the service agreement with a technology company that provides IT help desk services to the organization. Which of the following monthly performance

metrics is the BEST indicator of service quality?

Options:

A.

The total number of users requesting help desk services


B.

The average call waiting time on each request


C.

The percent of issues resolved by the first contact


D.

The average turnaround time spent on each reported issue


Expert Solution
Questions # 256:

Which of the following findings would be of GREATEST concern to an IS auditor reviewing firewall security for an organization ' s corporate network?

Options:

A.

The production configuration does not conform to corporate policy.


B.

Responsibility for the firewall administration rests with two different divisions.


C.

Industry hardening guidance has not been considered.


D.

The firewall configuration file is extremely long and complex.


Expert Solution
Questions # 257:

Which of the following protocols should be used when transferring data via the internet?

Options:

A.

User Datagram Protocol (UDP)


B.

Hypertext Transfer Protocol (HTTP)


C.

Secure File Transfer Protocol (SFTP)


D.

Remote Desktop Protocol (RDP)


Expert Solution
Questions # 258:

Which of the following would the IS auditor MOST likely review to determine whether modifications to the operating system parameters were authorized?

Options:

A.

Documentation of exit routines


B.

System initialization logs


C.

Change control log


D.

Security system parameters


Expert Solution
Questions # 259:

An IS auditor has been tasked with auditing the inventory control process for a large organization that processes millions of data transactions. Which of the following is the BEST testing strategy to adopt?

Options:

A.

Continuous monitoring


B.

Control self-assessments (CSAs)


C.

Risk assessments


D.

Stop-or-go sampling


Expert Solution
Questions # 260:

Which of the following controls is MOST effective at preventing system failures when implementing a new web application?

Options:

A.

System recovery plan


B.

System testing


C.

Business continuity plan (BCP)


D.

Transaction monitoring


Expert Solution
Questions # 261:

Which of the following types of firewalls provides the GREATEST degree of control against hacker intrusion?

Options:

A.

Packet filtering router


B.

Circuit gateway


C.

Application-level gateway


D.

Screening router.


Expert Solution
Questions # 262:

In which phase of the audit life cycle process should an IS auditor initially discuss observations with management?

Options:

A.

Planning phase


B.

Reporting phase


C.

Follow-up phase


D.

Fieldwork phase


Expert Solution
Questions # 263:

Which of the following biometric access controls has the HIGHEST rate of false negatives?

Options:

A.

Iris recognition


B.

Fingerprint scanning


C.

Face recognition


D.

Retina scanning


Expert Solution
Questions # 264:

A small IT department has embraced DevOps, which allows members of this group to deploy code to production and maintain some development access to automate releases. Which of the following is the MOST effective control?

Options:

A.

Enforce approval prior to deployment by a member of the team who has not taken part in the development.


B.

The DevOps team provides an annual policy acknowledgment that they did not develop and deploy the same code.


C.

Annual training reinforces the need to maintain segregation between developers and deployers of code


D.

The IT compliance manager performs weekly reviews to ensure the same person did not develop and deploy code.


Expert Solution
Questions # 265:

When planning a review of IT governance, an IS auditor is MOST likely to:

Options:

A.

assess whether business process owner responsibilities are consistent.


B.

obtain information about the control framework adopted by management.


C.

examine audit committee minutes for IT-related controls.


D.

define key performance indicators (KPIs).


Expert Solution
Questions # 266:

An IS auditor is reviewing a data conversion project. Which of the following is the auditor ' s BEST recommendation prior to go-live?

Options:

A.

Conduct a mock conversion test.


B.

Review test procedures and scenarios.


C.

Automate the test scripts.


D.

Establish a configuration baseline.


Expert Solution
Questions # 267:

An IS audit manager was temporarily tasked with supervising a project manager assigned to the organization ' s payroll application upgrade. Upon returning to the audit department, the audit manager has been asked to perform an audit to validate the implementation of the payroll application. The audit manager is the only one in the audit department with IT project management

experience. What is the BEST course of action?

Options:

A.

Transfer the assignment to a different audit manager despite lack of IT project management experience.


B.

Outsource the audit to independent and qualified resources.


C.

Manage the audit since there is no one else with the appropriate experience.


D.

Have a senior IS auditor manage the project with the IS audit manager performing final review.


Expert Solution
Questions # 268:

Which of the following should be the PRIMARY consideration when incorporating user training and awareness into a data loss prevention (DLP) strategy?

Options:

A.

Avoiding financial penalties and reputational risk


B.

Ensuring data availability


C.

Promoting secure data handling practices


D.

Adhering to data governance policies


Expert Solution
Questions # 269:

During a new system implementation, an IS auditor has been assigned to review risk management at each milestone. The auditor finds that several risks to project benefits have not been addressed. Who should be accountable for managing these risks?

Options:

A.

Enterprise risk manager


B.

Project sponsor


C.

Information security officer


D.

Project manager


Expert Solution
Questions # 270:

Which of the following methods will BEST reduce the risk associated with the transition to a new system using technologies that are not compatible with the old system?

Options:

A.

Parallel changeover


B.

Modular changeover


C.

Phased operation


D.

Pilot operation


Expert Solution
Questions # 271:

An organization is implementing a new data loss prevention (DLP) tool. Which of the following will BEST enable the organization to reduce false positive alerts?

Options:

A.

Using the default policy and tool rule sets


B.

Configuring a limited set of rules


C.

Deploying the tool in monitor mode


D.

Reducing the number of detection points


Expert Solution
Questions # 272:

Which of the following is the PRIMARY reason for an airline ' s IT management to continuously monitor the controls for a critical integrated flight schedule and payment application?

Options:

A.

To detect and respond to possible attacks


B.

To ensure risks are effectively identified and mitigated


C.

To ensure payments for flight bookings are processed


D.

To ensure policies and procedures are followed


Expert Solution
Questions # 273:

An organization has made a strategic decision to split into separate operating entities to improve profitability. However, the IT infrastructure remains shared between the entities. Which of the following would BEST help to ensure that IS audit still covers key risk areas within the IT environment as part of its annual plan?

Options:

A.

Increasing the frequency of risk-based IS audits for each business entity


B.

Developing a risk-based plan considering each entity ' s business processes


C.

Conducting an audit of newly introduced IT policies and procedures


D.

Revising IS audit plans to focus on IT changes introduced after the split


Expert Solution
Questions # 274:

Which of the following practices associated with capacity planning provides the GREATEST assurance that future incidents related to existing server performance will be prevented?

Options:

A.

Reviewing results from simulated high-demand stress test scenarios


B.

Performing a root cause analysis for past performance incidents


C.

Anticipating current service level agreements (SLAs) will remain unchanged


D.

Duplicating existing disk drive systems to improve redundancy and data storage


Expert Solution
Questions # 275:

Which of the following is the GREATEST risk associated with lack of IT involvement in the organization ' s strategic planning initiatives?

Options:

A.

Business strategies may not align with IT capabilities.


B.

Business strategies may not consider emerging technologies.


C.

IT strategies may not align with business strategies.


D.

IT strategic goals may not be considered by the business.


Expert Solution
Questions # 276:

For security awareness training to be MOST effective, management should ensure the training:

Options:

A.

covers all aspects of the IT environment.


B.

is conducted by IT personnel.


C.

is tailored to specific groups.


D.

occurs annually.


Expert Solution
Questions # 277:

To protect the organization from malware transmitted by physical media, IT administrators have disabled USB access for storage devices. Which of the following BEST describes this type of control?

Options:

A.

Corrective


B.

Administrative


C.

Preventive


D.

Physical


Expert Solution
Questions # 278:

An IS auditor wants to gain a better understanding of an organization’s selected IT operating system software. Which of the following would be MOST helpful to review?

Options:

A.

Service level agreements (SLAs)


B.

Project steering committee charter


C.

IT audit reports


D.

Enterprise architecture (EA)


Expert Solution
Questions # 279:

An IS auditor evaluating the change management process must select a sample from the change log. What is the BEST way to the auditor to confirm the change log is complete?

Options:

A.

Interview change management personnel about completeness.


B.

Take an item from the log and trace it back to the system.


C.

Obtain management attestation of completeness.


D.

Take the last change from the system and trace it back to the log.


Expert Solution
Questions # 280:

Which of the following should an IS auditor recommend be done FIRST when an organization is made aware of a new regulation that is likely to impact IT security requirements?

Options:

A.

Update security policies based on the new regulation.


B.

Determine which systems and IT-related processes may be impacted.


C.

Evaluate how security awareness and training content may be impacted.


D.

Review the design and effectiveness of existing IT controls.


Expert Solution
Questions # 281:

Which of the following is the BEST way to mitigate risk to an organization ' s network associated with devices permitted under a bring your own device (BYOD) policy?

Options:

A.

Require personal devices to be reviewed by IT staff.


B.

Enable port security on all network switches.


C.

Implement a network access control system.


D.

Ensure the policy requires antivirus software on devices.


Expert Solution
Questions # 282:

During a closing meeting, the IT manager disagrees with a valid audit finding presented by the IS auditor and requests the finding be excluded from the final report. Which of the following is the auditor ' s BEST course of action?

Options:

A.

Request that the IT manager be removed from the remaining meetings and future audits.


B.

Modify the finding to include the IT manager ' s comments and inform the audit manager of the changes.


C.

Remove the finding from the report and continue presenting the remaining findings.


D.

Provide the evidence which supports the finding and keep the finding in the report.


Expert Solution
Questions # 283:

Which of the following should be restricted from a network administrator ' s privileges in an adequately segregated IT environment?

Options:

A.

Monitoring network traffic


B.

Changing existing configurations for applications


C.

Hardening network ports


D.

Ensuring transmission protocols are functioning correctly


Expert Solution
Questions # 284:

In a high-volume, real-time system, the MOST effective technique by which to continuously monitor and analyze transaction processing is:

Options:

A.

integrated test facility (ITF).


B.

parallel simulation.


C.

transaction tagging.


D.

embedded audit modules.


Expert Solution
Questions # 285:

An IS auditor discovers that an IT organization serving several business units assigns equal priority to all initiatives, creating a risk of delays in securing project funding Which of the following would be MOST helpful in matching demand for projects and services with available resources in a way that supports business objectives?

Options:

A.

Project management


B.

Risk assessment results


C.

IT governance framework


D.

Portfolio management


Expert Solution
Questions # 286:

Which of the following BEST supports an organization ' s objective of restricting the use of removable storage devices by users?

Options:

A.

Data management policy


B.

Updated anti-malware solutions


C.

Data loss prevention (DLP)


D.

Online monitoring


Expert Solution
Questions # 287:

An organization ' s software developers need access to personally identifiable information (Pll) stored in a particular data format. Which of the following is the BEST way to protect this sensitive information while allowing the developers to use it in development and test environments?

Options:

A.

Data masking


B.

Data tokenization


C.

Data encryption


D.

Data abstraction


Expert Solution
Questions # 288:

An IS auditor would MOST likely recommend that IT management use a balanced scorecard to:

Options:

A.

indicate whether the organization meets quality standards.


B.

ensure that IT staff meet performance requirements.


C.

train and educate IT staff.


D.

assess IT functions and processes.


Expert Solution
Questions # 289:

Due to limited storage capacity, an organization has decided to reduce the actual retention period for media containing completed low-value transactions. Which of the following is MOST important for the organization to ensure?

Options:

A.

The policy includes a strong risk-based approach.


B.

The retention period allows for review during the year-end audit.


C.

The total transaction amount has no impact on financial reporting.


D.

The retention period complies with data owner responsibilities.


Expert Solution
Questions # 290:

During an audit of an organization ' s risk management practices, an IS auditor finds several documented IT risk acceptances have not been renewed in a timely manner after the assigned expiration date When assessing the seventy of this finding, which mitigating factor would MOST significantly minimize the associated impact?

Options:

A.

There are documented compensating controls over the business processes.


B.

The risk acceptances were previously reviewed and approved by appropriate senior management


C.

The business environment has not significantly changed since the risk acceptances were approved.


D.

The risk acceptances with issues reflect a small percentage of the total population


Expert Solution
Questions # 291:

Which of the following is the MOST important consideration when establishing operational log management?

Options:

A.

Types of data


B.

Log processing efficiency


C.

IT organizational structure


D.

Log retention period


Expert Solution
Questions # 292:

Which of the following BEST mitigates the risk associated with the deployment of a new production system?

Options:

A.

Problem management


B.

Incident management


C.

Configuration management


D.

Release management


Expert Solution
Questions # 293:

Which of the following is the PRIMARY concern when negotiating a contract for a hot site?

Options:

A.

Availability of the site in the event of multiple disaster declarations


B.

Coordination with the site staff in the event of multiple disaster declarations


C.

Reciprocal agreements with other organizations


D.

Complete testing of the recovery plan


Expert Solution
Questions # 294:

Which of the following tasks would cause the GREATEST segregation of duties (SoD) concern if performed by the person who reconciles the organization ' s device inventory?

Options:

A.

Tracking devices used for spare parts


B.

Creating the device policy


C.

vIssuing devices to employees


D.

Approving the issuing of devices


Expert Solution
Questions # 295:

Visitors to a data center are required to present an ID and pre-approved documents. Which type of control has been implemented?

Options:

A.

Administrative control


B.

Preventive control


C.

Corrective control


D.

Detective control


Expert Solution
Questions # 296:

An IS auditor is reviewing an organization ' s system development life cycle (SDLC) Which of the following MUST be included in the review?

Options:

A.

Ownership of the system quality management plan


B.

Utilization of standards in the system development processes and procedures


C.

Validation that system development processes adhere to quality standards


D.

Definition of quality attributes to be associated with the system


Expert Solution
Questions # 297:

Which of the following should an IS auditor perform FIRST when auditing an outsourced human resource application?

Options:

A.

Verify that fees billed for the service are appropriate to the work performed.


B.

Review the terms and provisions in the contract.


C.

Implement data access rights consistent with the organization’s security policy.


D.

Verify that security incident reports are issued in a timely manner.


Expert Solution
Questions # 298:

Which of the following applications should an IS auditor consider to be the HIGHEST priority when reviewing disaster recovery planning (DRP) tests for an commerce company?

Options:

A.

An application for IT performance monitoring


B.

An application for HR management


C.

An application for financial management


D.

An application for traffic load balancing


Expert Solution
Questions # 299:

Which of the following is a social engineering attack method?

Options:

A.

An unauthorized person attempts to gam access to secure premises by following an authonzed person through a secure door.


B.

An employee is induced to reveal confidential IP addresses and passwords by answering questions over the phone.


C.

A hacker walks around an office building using scanning tools to search for a wireless network to gain access.


D.

An intruder eavesdrops and collects sensitive information flowing through the network and sells it to third parties.


Expert Solution
Questions # 300:

Which of the following is an organization ' s BEST defense against malware?

Options:

A.

Documented security procedures


B.

Intrusion prevention system (IPS)


C.

Security awareness training


D.

Intrusion detection system (IDS)


Expert Solution
Viewing page 6 out of 10 pages
Viewing questions 251-300 out of questions