Pass the Isaca Isaca Certification CISA Questions and answers with CertsForce

Viewing page 6 out of 9 pages
Viewing questions 251-300 out of questions
Questions # 251:

Due to limited storage capacity, an organization has decided to reduce the actual retention period for media containing completed low-value transactions. Which of the following is MOST important for the organization to ensure?

Options:

A.

The policy includes a strong risk-based approach.


B.

The retention period allows for review during the year-end audit.


C.

The retention period complies with data owner responsibilities.


D.

The total transaction amount has no impact on financial reporting


Expert Solution
Questions # 252:

An IS auditor is reviewing an organization's primary router access control list. Which of the following should result in a finding?

Options:

A.

There are conflicting permit and deny rules for the IT group.


B.

The network security group can change network address translation (NAT).


C.

Individual permissions are overriding group permissions.


D.

There is only one rule per group with access privileges.


Expert Solution
Questions # 253:

An IS auditor is conducting a review of a data center. Which of the following observations could indicate an access control Issue?

Options:

A.

Security cameras deployed outside main entrance


B.

Antistatic mats deployed at the computer room entrance


C.

Muddy footprints directly inside the emergency exit


D.

Fencing around facility is two meters high


Expert Solution
Questions # 254:

Which of the following is MOST important to verify when determining the completeness of the vulnerability scanning process?

Options:

A.

The organization's systems inventory is kept up to date.


B.

Vulnerability scanning results are reported to the CISO.


C.

The organization is using a cloud-hosted scanning tool for Identification of vulnerabilities


D.

Access to the vulnerability scanning tool is periodically reviewed


Expert Solution
Questions # 255:

Which of the following MUST be completed as part of the annual audit planning process?

Options:

A.

Business impact analysis (BIA)


B.

Fieldwork


C.

Risk assessment


D.

Risk control matrix


Expert Solution
Questions # 256:

Which of the following conditions would be of MOST concern to an IS auditor assessing the risk of a successful brute force attack against encrypted data at test?

Options:

A.

Short key length


B.

Random key generation


C.

Use of symmetric encryption


D.

Use of asymmetric encryption


Expert Solution
Questions # 257:

An organization is considering allowing users to connect personal devices to the corporate network. Which of the following should be done FIRST?

Options:

A.

Conduct security awareness training.


B.

Implement an acceptable use policy


C.

Create inventory records of personal devices


D.

Configure users on the mobile device management (MDM) solution


Expert Solution
Questions # 258:

A now regulation requires organizations to report significant security incidents to the regulator within 24 hours of identification. Which of the following is the IS auditor’s BEST recommendation to facilitate compliance with the regulation?

Options:

A.

Establish key performance indicators (KPls) for timely identification of security incidents.


B.

Engage an external security incident response expert for incident handling.


C.

Enhance the alert functionality of the intrusion detection system (IDS).


D.

Include the requirement in the incident management response plan.


Expert Solution
Questions # 259:

An IS auditor concludes that an organization has a quality security policy. Which of the following is MOST important to determine next? The policy must be:

Options:

A.

well understood by all employees.


B.

based on industry standards.


C.

developed by process owners.


D.

updated frequently.


Expert Solution
Questions # 260:

The PRIMARY reason for an IS auditor to use data analytics techniques is to reduce which type of audit risk?

Options:

A.

Technology risk


B.

Detection risk


C.

Control risk


D.

Inherent risk


Expert Solution
Questions # 261:

What is the MAIN reason to use incremental backups?

Options:

A.

To improve key availability metrics


B.

To reduce costs associates with backups


C.

To increase backup resiliency and redundancy


D.

To minimize the backup time and resources


Expert Solution
Questions # 262:

An IS auditor learns the organization has experienced several server failures in its distributed environment. Which of the following is the BEST recommendation to limit the potential impact of server failures in the future?

Options:

A.

Redundant pathways


B.

Clustering


C.

Failover power


D.

Parallel testing


Expert Solution
Questions # 263:

Which of the following is an example of a preventative control in an accounts payable system?

Options:

A.

The system only allows payments to vendors who are included In the system's master vendor list.


B.

Backups of the system and its data are performed on a nightly basis and tested periodically.


C.

The system produces daily payment summary reports that staff use to compare against invoice totals.


D.

Policies and procedures are clearly communicated to all members of the accounts payable department


Expert Solution
Questions # 264:

What is the Most critical finding when reviewing an organization’s information security management?

Options:

A.

No dedicated security officer


B.

No official charier for the information security management system


C.

No periodic assessments to identify threats and vulnerabilities


D.

No employee awareness training and education program


Expert Solution
Questions # 265:

An information systems security officer's PRIMARY responsibility for business process applications is to:

Options:

A.

authorize secured emergency access


B.

approve the organization's security policy


C.

ensure access rules agree with policies


D.

create role-based rules for each business process


Expert Solution
Questions # 266:

The GREATEST benefit of using a polo typing approach in software development is that it helps to:

Options:

A.

minimize scope changes to the system.


B.

decrease the time allocated for user testing and review.


C.

conceptualize and clarify requirements.


D.

Improve efficiency of quality assurance (QA) testing


Expert Solution
Questions # 267:

An IS auditor is reviewing the release management process for an in-house software development solution. In which environment Is the software version MOST likely to be the same as production?

Options:

A.

Staging


B.

Testing


C.

Integration


D.

Development


Expert Solution
Questions # 268:

During an audit of a multinational bank's disposal process, an IS auditor notes several findings. Which of the following should be the auditor's GREATEST concern?

Options:

A.

Backup media are not reviewed before disposal.


B.

Degaussing is used instead of physical shredding.


C.

Backup media are disposed before the end of the retention period


D.

Hardware is not destroyed by a certified vendor.


Expert Solution
Questions # 269:

An IS auditor is reviewing an industrial control system (ICS) that uses older unsupported technology in the scope of an upcoming audit. What should the auditor consider the MOST significant concern?

Options:

A.

Attack vectors are evolving for industrial control systems.


B.

There is a greater risk of system exploitation.


C.

Disaster recovery plans (DRPs) are not in place.


D.

Technical specifications are not documented.


Expert Solution
Questions # 270:

An IS auditor Is reviewing a recent security incident and is seeking information about me approval of a recent modification to a database system's security settings Where would the auditor MOST likely find this information?

Options:

A.

System event correlation report


B.

Database log


C.

Change log


D.

Security incident and event management (SIEM) report


Expert Solution
Questions # 271:

Which of the following BEST enables the timely identification of risk exposure?

Options:

A.

External audit review


B.

Internal audit review


C.

Control self-assessment (CSA)


D.

Stress testing


Expert Solution
Questions # 272:

Which of the following is the MOST important reason to classify a disaster recovery plan (DRP) as confidential?

Options:

A.

Ensure compliance with the data classification policy.


B.

Protect the plan from unauthorized alteration.


C.

Comply with business continuity best practice.


D.

Reduce the risk of data leakage that could lead to an attack.


Expert Solution
Questions # 273:

During an IT governance audit, an IS auditor notes that IT policies and procedures are not regularly reviewed and updated. The GREATEST concern to the IS auditor is that policies and procedures might not:

Options:

A.

reflect current practices.


B.

include new systems and corresponding process changes.


C.

incorporate changes to relevant laws.


D.

be subject to adequate quality assurance (QA).


Expert Solution
Questions # 274:

An IS auditor performs a follow-up audit and learns the approach taken by the auditee to fix the findings differs from the agreed-upon approach confirmed during the last audit. Which of the following should be the auditor's NEXT course of action?

Options:

A.

Evaluate the appropriateness of the remedial action taken.


B.

Conduct a risk analysis incorporating the change.


C.

Report results of the follow-up to the audit committee.


D.

Inform senior management of the change in approach.


Expert Solution
Questions # 275:

Which of the following would be of MOST concern for an IS auditor evaluating the design of an organization's incident management processes?

Options:

A.

Service management standards are not followed.


B.

Expected time to resolve incidents is not specified.


C.

Metrics are not reported to senior management.


D.

Prioritization criteria are not defined.


Expert Solution
Questions # 276:

Upon completion of audit work, an IS auditor should:

Options:

A.

provide a report to senior management prior to discussion with the auditee.


B.

distribute a summary of general findings to the members of the auditing team.


C.

provide a report to the auditee stating the initial findings.


D.

review the working papers with the auditee.


Expert Solution
Questions # 277:

In data warehouse (DW) management, what is the BEST way to prevent data quality issues caused by changes from a source system?

Options:

A.

Configure data quality alerts to check variances between the data warehouse and the source system


B.

Require approval for changes in the extract/Transfer/load (ETL) process between the two systems


C.

Include the data warehouse in the impact analysis (or any changes m the source system


D.

Restrict access to changes in the extract/transfer/load (ETL) process between the two systems


Expert Solution
Questions # 278:

Which of the following findings from an IT governance review should be of GREATEST concern?

Options:

A.

The IT budget is not monitored


B.

All IT services are provided by third parties.


C.

IT value analysis has not been completed.


D.

IT supports two different operating systems.


Expert Solution
Questions # 279:

During an audit of a financial application, it was determined that many terminated users' accounts were not disabled. Which of the following should be the IS auditor's NEXT step?

Options:

A.

Perform substantive testing of terminated users' access rights.


B.

Perform a review of terminated users' account activity


C.

Communicate risks to the application owner.


D.

Conclude that IT general controls ate ineffective.


Expert Solution
Questions # 280:

Following a security breach in which a hacker exploited a well-known vulnerability in the domain controller, an IS audit has been asked to conduct a control assessment. the auditor's BEST course of action would be to determine if:

Options:

A.

the patches were updated.


B.

The logs were monitored.


C.

The network traffic was being monitored.


D.

The domain controller was classified for high availability.


Expert Solution
Questions # 281:

Which of the following documents should specify roles and responsibilities within an IT audit organization?

Options:

A.

Organizational chart


B.

Audit charier


C.

Engagement letter


D.

Annual audit plan


Expert Solution
Questions # 282:

Which of the following is MOST important to consider when scheduling follow-up audits?

Options:

A.

The efforts required for independent verification with new auditors


B.

The impact if corrective actions are not taken


C.

The amount of time the auditee has agreed to spend with auditors


D.

Controls and detection risks related to the observations


Expert Solution
Questions # 283:

A manager Identifies active privileged accounts belonging to staff who have left the organization. Which of the following is the threat actor In this scenario?

Options:

A.

Terminated staff


B.

Unauthorized access


C.

Deleted log data


D.

Hacktivists


Expert Solution
Questions # 284:

Which of the following business continuity activities prioritizes the recovery of critical functions?

Options:

A.

Business continuity plan (BCP) testing


B.

Business impact analysis (BIA)


C.

Disaster recovery plan (DRP) testing


D.

Risk assessment


Expert Solution
Questions # 285:

Which of the following is a method to prevent disclosure of classified documents printed on a shared printer?

Options:

A.

Using passwords to allow authorized users to send documents to the printer


B.

Requiring a key code to be entered on the printer to produce hard copy


C.

Encrypting the data stream between the user's computer and the printer


D.

Producing a header page with classification level for printed documents


Expert Solution
Questions # 286:

Which of the following information security requirements BE ST enables the tracking of organizational data in a bring your own device (BYOD) environment?

Options:

A.

Employees must immediately report lost or stolen mobile devices containing organizational data


B.

Employees must sign acknowledgment of the organization's mobile device acceptable use policy


C.

Employees must enroll their personal devices in the organization's mobile device management program


Expert Solution
Questions # 287:

An IS auditor requests direct access to data required to perform audit procedures instead of asking management to provide the data Which of the following is the PRIMARY advantage of this approach?

Options:

A.

Audit transparency


B.

Data confidentiality


C.

Professionalism


D.

Audit efficiency


Expert Solution
Questions # 288:

In the development of a new financial application, the IS auditor's FIRST involvement should be in the:

Options:

A.

control design.


B.

feasibility study.


C.

application design.


D.

system test.


Expert Solution
Questions # 289:

An IS auditor is preparing a plan for audits to be carried out over a specified period. Which of the following activities should the IS auditor perform FIRST?

Options:

A.

Allocate audit resources.


B.

Prioritize risks.


C.

Review prior audit reports.


D.

Determine the audit universe.


Expert Solution
Questions # 290:

Capacity management tools are PRIMARILY used to ensure that:

Options:

A.

available resources are used efficiently and effectively


B.

computer systems are used to their maximum capacity most of the time


C.

concurrent use by a large number of users is enabled


D.

proposed hardware acquisitions meet capacity requirements


Expert Solution
Questions # 291:

An organization is migrating its HR application to an Infrastructure as a Service (laaS) model in a private cloud. Who is PRIMARILY responsible for the security configurations of the deployed application's operating system?

Options:

A.

The cloud provider's external auditor


B.

The cloud provider


C.

The operating system vendor


D.

The organization


Expert Solution
Questions # 292:

Which of the following is the BEST control to minimize the risk of unauthorized access to lost company-owned mobile devices?

Options:

A.

Password/PIN protection


B.

Device tracking software


C.

Device encryption


D.

Periodic backup


Expert Solution
Questions # 293:

An IS auditor is reviewing the security of a web-based customer relationship management (CRM) system that is directly accessed by customers via the Internet, which of the following should be a concern for the auditor?

Options:

A.

The system is hosted on an external third-party service provider’s server.


B.

The system is hosted in a hybrid-cloud platform managed by a service provider.


C.

The system is hosted within a demilitarized zone (DMZ) of a corporate network.


D.

The system is hosted within an internal segment of a corporate network.


Expert Solution
Questions # 294:

An IS auditor learns a server administration team regularly applies workarounds to address repeated failures of critical data processing services Which of the following would BEST enable the organization to resolve this issue?

Options:

A.

Problem management


B.

Incident management


C.

Service level management


D.

Change management


Expert Solution
Questions # 295:

A new system development project is running late against a critical implementation deadline Which of the following is the MOST important activity?

Options:

A.

Document last-minute enhancements


B.

Perform a pre-implementation audit


C.

Perform user acceptance testing (UAT)


D.

Ensure that code has been reviewed


Expert Solution
Questions # 296:

Which of the following is the BEST source of information to determine the required level of data protection on a file server?

Options:

A.

Data classification policy and procedures


B.

Access rights of similar file servers


C.

Previous data breach incident reports


D.

Acceptable use policy and privacy statements


Expert Solution
Questions # 297:

A database administrator (DBA) should be prevented from having end user responsibilities:

Options:

A.

having end user responsibilities


B.

accessing sensitive information


C.

having access to production files


D.

using an emergency user ID


Expert Solution
Questions # 298:

A web proxy server for corporate connections to external resources reduces organizational risk by:

Options:

A.

anonymizing users through changed IP addresses.


B.

providing multi-factor authentication for additional security.


C.

providing faster response than direct access.


D.

load balancing traffic to optimize data pathways.


Expert Solution
Questions # 299:

The PRIMARY purpose of a configuration management system is to:

Options:

A.

track software updates.


B.

define baselines for software.


C.

support the release procedure.


D.

standardize change approval.


Expert Solution
Questions # 300:

Which of the following is MOST important to define within a disaster recovery plan (DRP)?

Options:

A.

Business continuity plan (BCP)


B.

Test results for backup data restoration


C.

A comprehensive list of disaster recovery scenarios and priorities


D.

Roles and responsibilities for recovery team members


Expert Solution
Viewing page 6 out of 9 pages
Viewing questions 251-300 out of questions