Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

Pass the Isaca Isaca Certification CISA Questions and answers with CertsForce

Viewing page 7 out of 10 pages
Viewing questions 301-350 out of questions
Questions # 301:

Which of the following would BEST detect that a distributed denial of service (DDoS) attack is occurring?

Options:

A.

Customer service complaints


B.

Automated monitoring of logs


C.

Server crashes


D.

Penetration testing


Expert Solution
Questions # 302:

When planning an audit to assess controls for an application in the cloud environment, it is MOST important for an IS auditor to understand:

Options:

A.

The noncompliance fee for violating a service level agreement (SLA).


B.

Availability reports from the cloud platform architecture.


C.

The shared responsibility model between cloud provider and organization.


D.

Business process reengineering that is supported by the cloud system.


Expert Solution
Questions # 303:

An organization ' s payroll department recently implemented a new Software as a Service (SaaS) tool for payment processing. Which of the following audits is MOST appropriate for an IS auditor to validate that the new tool is configured as expected to meet performance requirements?

Options:

A.

Financial audit


B.

Administrative audit


C.

Functional audit


D.

Compliance audit


Expert Solution
Questions # 304:

Which of the following responses to risk associated with separation of duties would incur the LOWEST initial cost?

Options:

A.

Risk mitigation


B.

Risk acceptance


C.

Risk transference


D.

Risk reduction


Expert Solution
Questions # 305:

From a risk management perspective, which of the following is the BEST approach when implementing a large and complex data center IT infrastructure?

Options:

A.

A big bang deployment with a successful proof of concept


B.

Simulating the new infrastructure before deployment


C.

Prototyping and a one-phase deployment


D.

A deployment plan based on sequenced phases


Expert Solution
Questions # 306:

Which of the following is the BEST way to foster continuous improvement of IS audit processes and practices?

Options:

A.

Invite external auditors and regulators to perform regular assessments of the IS audit function.


B.

Implement rigorous managerial review and sign-off of IS audit deliverables.


C.

Frequently review IS audit policies, procedures, and instruction manuals.


D.

Establish and embed quality assurance (QA) within the IS audit function.


Expert Solution
Questions # 307:

Which of the following approaches would present the GREATEST concern for the implementation of a quality assurance (QA) function?

Options:

A.

Developers introducing the changes will review the work, as they are most familiar with them.


B.

Peer developers from the same development team who are unfamiliar with the changes will review them.


C.

Developers from a separate development team in the organization will review the submitted changes.


D.

Reviewers outside the development group who do not have development roles will review the changes.


Expert Solution
Questions # 308:

An organization using a cloud provider for its online billing system requires the website to be accessible to customers at all times. What is the BEST way to verify the organization ' s business requirements are met?

Options:

A.

Invoke the right-to-audit clause.


B.

Require the vendor to report any outages longer than five minutes


C.

Monitor the service level agreement (SLA) with the vendor.


D.

Agree on periodic performance discussions with the vendor


Expert Solution
Questions # 309:

The following findings are the result of an IS auditor’s post-implementation review of a newly implemented system. Which of the following findings is of GREATEST significance?

Options:

A.

A lessons learned session was never conducted.


B.

Monthly dashboards did not always contain deliverables.


C.

The project’s 10% budget overrun was not reported to senior management.


D.

Measurable benefits were not defined.


Expert Solution
Questions # 310:

In order to be useful, a key performance indicator (KPI) MUST

Options:

A.

be approved by management.


B.

be measurable in percentages.


C.

be changed frequently to reflect organizational strategy.


D.

have a target value.


Expert Solution
Questions # 311:

An information systems security officer ' s PRIMARY responsibility for business process applications is to:

Options:

A.

authorize secured emergency access


B.

approve the organization ' s security policy


C.

ensure access rules agree with policies


D.

create role-based rules for each business process


Expert Solution
Questions # 312:

Which of the following is MOST important to include in forensic data collection and preservation procedures?

Options:

A.

Assuring the physical security of devices


B.

Preserving data integrity


C.

Maintaining chain of custody


D.

Determining tools to be used


Expert Solution
Questions # 313:

What is the PRIMARY purpose of documenting audit objectives when preparing for an engagement?

Options:

A.

To address the overall risk associated with the activity under review


B.

To identify areas with relatively high probability of material problems


C.

To help ensure maximum use of audit resources during the engagement


D.

To help prioritize and schedule auditee meetings


Expert Solution
Questions # 314:

Which of the following is the MOST significant risk when an application uses individual end-user accounts to access the underlying database?

Options:

A.

Multiple connects to the database are used and slow the process_


B.

User accounts may remain active after a termination.


C.

Users may be able to circumvent application controls.


D.

Application may not capture a complete audit trail.


Expert Solution
Questions # 315:

Which of the following is the BEST way to verify the effectiveness of a data restoration process?

Options:

A.

Performing periodic reviews of physical access to backup media


B.

Performing periodic complete data restorations


C.

Validating off ne backups using software utilities


D.

Reviewing and updating data restoration policies annually


Expert Solution
Questions # 316:

Following a merger, a review of an international organization determines the IT steering committee ' s decisions do not extend to regional offices as required in the consolidated IT operating model. Which of the following is the IS auditor ' s BEST recommendation?

Options:

A.

Create regional centers of excellence.


B.

Engage an IT governance consultant.


C.

Create regional IT steering committees.


D.

Update the IT steering committee ' s formal charter.


Expert Solution
Questions # 317:

Which of the following BEST mitigates the risk of SQL injection attacks against applications exposed to the internet?

Options:

A.

Web application firewall (WAF)


B.

SQL server hardening


C.

Patch management program


D.

SQL server physical controls


Expert Solution
Questions # 318:

Which of the following should be a concern to an IS auditor reviewing an organization’s use of a major cloud provider for Infrastructure as a Service (IaaS)?

Options:

A.

The IaaS service is connected to the organization’s network via a virtual private network (VPN).


B.

End users are able to create their own cloud server instances.


C.

The IaaS service relies on the organization’s active directory domain.


D.

The cloud governance policy was not reviewed within the last year by the IT department.


Expert Solution
Questions # 319:

Which of the following is the MOST important consideration when evaluating the data retention policy for a global organization with regional offices in multiple countries?

Options:

A.

The policy aligns with corporate policies and practices.


B.

The policy aligns with global best practices.


C.

The policy aligns with business goals and objectives.


D.

The policy aligns with local laws and regulations.


Expert Solution
Questions # 320:

Which of the following is the BEST indicator that a third-party vendor adheres to the controls required by the organization?

Options:

A.

Review of monthly performance reports submitted by the vendor


B.

Certifications maintained by the vendor


C.

Regular independent assessment of the vendor


D.

Substantive log file review of the vendor ' s system


Expert Solution
Questions # 321:

Which of the following is the BEST control to mitigate the risk of shadow IT?

Options:

A.

Intrusion detection system (IDS)


B.

Vendor management reviews


C.

Vulnerability scanning


D.

Security awareness training


Expert Solution
Questions # 322:

Which of the following provides the MOST protection against emerging threats?

Options:

A.

Demilitarized zone (DMZ)


B.

Heuristic intrusion detection system (IDS)


C.

Real-time updating of antivirus software


D.

Signature-based intrusion detection system (IDS)


Expert Solution
Questions # 323:

Which of the following controls helps to reduce fraud risk associated with robotic process automation (RPA)?

Options:

A.

Inclusion of robots in business impact assessments (BIAs)


B.

Password rotation


C.

Recertification process for robots


D.

Common RPA testing framework


Expert Solution
Questions # 324:

When an intrusion into an organization ' s network is detected, which of the following should be done FIRST?

Options:

A.

Notify senior management.


B.

Block all compromised network nodes.


C.

Identify nodes that have been compromised.


D.

Contact law enforcement.


Expert Solution
Questions # 325:

Effective separation of duties in an online environment can BEST be achieved by utilizing:

Options:

A.

appropriate supervision.


B.

transaction logging.


C.

written procedure manuals.


D.

access authorization tables.


Expert Solution
Questions # 326:

Which of the following technology trends can lead to more robust data loss prevention (DLP) tools?

Options:

A.

Cloud computing


B.

Robotic process automation (RPA)


C.

Internet of Things (IoT)


D.

Machine learning algorithms


Expert Solution
Questions # 327:

Which of the following security measures is MOST important for protecting Internet of Things (IoT) devices from potential cyberattacks?

Options:

A.

Logging and monitoring network traffic


B.

Confirming firmware compliance to current security requirements


C.

Changing default passwords


D.

Reviewing and updating the network diagram on a regular basis


Expert Solution
Questions # 328:

Which of the following is the BEST way to help ensure new IT implementations align with enterprise architecture (EA) principles and requirements?

Options:

A.

Document the security view as part of the EA


B.

Consider stakeholder concerns when defining the EA


C.

Perform mandatory post-implementation reviews of IT implementations


D.

Conduct EA reviews as part of the change advisory board


Expert Solution
Questions # 329:

An IS auditor can BEST evaluate the business impact of system failures by:

Options:

A.

assessing user satisfaction levels.


B.

interviewing the security administrator.


C.

analyzing equipment maintenance logs.


D.

reviewing system-generated logs.


Expert Solution
Questions # 330:

Which of the following is the MOST appropriate control to ensure integrity of online orders?

Options:

A.

Data Encryption Standard (DES)


B.

Digital signature


C.

Public key encryption


D.

Multi-factor authentication


Expert Solution
Questions # 331:

Which of the following application input controls would MOST likely detect data input errors in the customer account number field during the processing of an accounts receivable transaction?

Options:

A.

Limit check


B.

Parity check


C.

Reasonableness check


D.

Validity check


Expert Solution
Questions # 332:

An IS auditor is reviewing the backup procedures in an organization that has high volumes of data with frequent changes to transactions. Which of the following is the BEST backup scheme to recommend given the need for a shorter restoration time in the event of a disruption?

Options:

A.

Differential backup


B.

Full backup


C.

Incremental backup


D.

Mirror backup


Expert Solution
Questions # 333:

Which of the following findings related to segregation of duties should be of GREATEST concern to an IS auditor?

Options:

A.

The person who tests source code also approves changes.


B.

The person who administers servers is also part of the infrastructure management team.


C.

The person who creates new user accounts also modifies user access levels.


D.

The person who edits source code also has write access to production.


Expert Solution
Questions # 334:

Which of the following BEST indicates that an incident management process is effective?

Options:

A.

Decreased number of calls to the help desk


B.

Decreased time for incident resolution


C.

Increased number of incidents reviewed by IT management


D.

Increased number of reported critical incidents


Expert Solution
Questions # 335:

Which of the following is the MAJOR advantage of automating internal controls?

Options:

A.

To enable the review of large value transactions


B.

To efficiently test large volumes of data


C.

To help identity transactions with no segregation of duties


D.

To assist in performing analytical reviews


Expert Solution
Questions # 336:

A current project to develop IT-based solutions will need additional funding to meet changes in business requirements. Who is BEST suited to obtain this additional funding?

Options:

A.

Project sponsor


B.

Project manager


C.

IT strategy committee


D.

Board of directors


Expert Solution
Questions # 337:

Which of the following is the GREATEST concern associated with a high number of IT policy exceptions approved by management?

Options:

A.

The exceptions are likely to continue indefinitely.


B.

The exceptions may result in noncompliance.


C.

The exceptions may elevate the level of operational risk.


D.

The exceptions may negatively impact process efficiency.


Expert Solution
Questions # 338:

Which of the following is the GREATEST advantage of outsourcing the development of an e-banking solution when in-house technical expertise is not available?

Options:

A.

Lower start-up costs


B.

Reduced risk of system downtime


C.

Direct oversight of risks


D.

Increased ability to adapt the system


Expert Solution
Questions # 339:

The PRIMARY benefit of information asset classification is that it:

Options:

A.

prevents loss of assets.


B.

helps to align organizational objectives.


C.

facilitates budgeting accuracy.


D.

enables risk management decisions.


Expert Solution
Questions # 340:

Which of the following BEST demonstrates that IT strategy Is aligned with organizational goals and objectives?

Options:

A.

IT strategies are communicated to all Business stakeholders


B.

Organizational strategies are communicated to the chief information officer (CIO).


C.

Business stakeholders are Involved In approving the IT strategy.


D.

The chief information officer (CIO) is involved In approving the organizational strategies


Expert Solution
Questions # 341:

Which of the following is a detective control?

Options:

A.

Programmed edit checks for data entry


B.

Backup procedures


C.

Use of pass cards to gain access to physical facilities


D.

Verification of hash totals


Expert Solution
Questions # 342:

Which of the following BEST enables an organization to improve the effectiveness of its incident response team?

Options:

A.

Conducting periodic testing and incorporating lessons learned


B.

Increasing the mean resolution time and publishing key performance indicator (KPI) metrics


C.

Disseminating incident response procedures and requiring signed acknowledgment by team members


D.

Ensuring all team members understand information systems technology


Expert Solution
Questions # 343:

Which of the following should be the PRIMARY role of an internal audit function in the management of identified business risks?

Options:

A.

Establishing a risk appetite


B.

Establishing a risk management framework


C.

Validating enterprise risk management (ERM)


D.

Operating the risk management framework


Expert Solution
Questions # 344:

When classifying information, it is MOST important to align the classification to:

Options:

A.

Business risk.


B.

Industry standards.


C.

Security policy.


D.

Data retention requirements.


Expert Solution
Questions # 345:

Which of the following should be done FIRST when creating a data protection program?

Options:

A.

Implement data loss prevention (DLP) controls.


B.

Perform classification based on standards.


C.

Deploy intrusion detection systems (IDS).


D.

Test logical access controls for effectiveness.


Expert Solution
Questions # 346:

Which of the following is MOST important for an IS auditor to look

for in a project feasibility study?

Options:

A.

An assessment of whether requirements will be fully met


B.

An assessment indicating security controls will operateeffectively


C.

An assessment of whether the expected benefits can beachieved


D.

An assessment indicating the benefits will exceed the implement


Expert Solution
Questions # 347:

When testing the accuracy of transaction data, which of the following situations BEST justifies the use of a smaller sample size?

Options:

A.

The IS audit staff has a high level of experience.


B.

It is expected that the population is error-free.


C.

Proper segregation of duties is in place.


D.

The data can be directly changed by users.


Expert Solution
Questions # 348:

Which of the following is the MOST important consideration for an IS auditor when assessing the adequacy of an organization ' s information security policy?

Options:

A.

IT steering committee minutes


B.

Business objectives


C.

Alignment with the IT tactical plan


D.

Compliance with industry best practice


Expert Solution
Questions # 349:

Which of the following is MOST important to consider when defining disaster recovery strategies?

Options:

A.

Maximum tolerable downtime (MTD)


B.

Mean time to restore (MTTR)


C.

Mean time to acknowledge


D.

Maximum time between failures (MTBF)


Expert Solution
Questions # 350:

Which of the following activities is MOST likely to increase internal audit quality?

Options:

A.

Increasing audit staff training


B.

Outsourcing the internal audit function


C.

Increasing the number of planned audits


D.

Conducting client surveys


Expert Solution
Viewing page 7 out of 10 pages
Viewing questions 301-350 out of questions