Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

Pass the Isaca Isaca Certification CISA Questions and answers with CertsForce

Viewing page 8 out of 10 pages
Viewing questions 351-400 out of questions
Questions # 351:

A vendor requires privileged access to a key business application. Which of the following is the BEST recommendation to reduce the risk of data leakage?

Options:

A.

Implement real-time activity monitoring for privileged roles


B.

Include the right-to-audit in the vendor contract


C.

Perform a review of privileged roles and responsibilities


D.

Require the vendor to implement job rotation for privileged roles


Expert Solution
Questions # 352:

What is the MAIN purpose of an organization ' s internal IS audit function?

Options:

A.

Identify and initiate necessary changes in the control environment to help ensure sustainable improvement.


B.

Independently attest the organization’s compliance with applicable legal and regulatory requirements.


C.

Review the organization ' s policies and procedures against industry best practices and standards.


D.

Provide assurance to management about the effectiveness of the organization ' s risk management and internal controls.


Expert Solution
Questions # 353:

Which of the following BEST helps monitor and manage operational logs to create value for an organization?

Options:

A.

Using automated tools to collect logs and raise alerts based on use cases


B.

Reporting results of log analyses to senior management for review


C.

Selecting logs only from critical operational systems and devices for monitoring


D.

Encrypting logs processed before archiving for defined retention periods


Expert Solution
Questions # 354:

An IS auditor is reviewing a medical device that is attached to a patient’s body, which automatically takes and uploads measurements to a cloud server. Treatment may be updated based on the measurements. Which of the following should be the auditor ' s PRIMARY focus?

Options:

A.

Physical access controls on the device


B.

Security and quality certification of the device


C.

Device identification and authentication


D.

Confirmation that the device is regularly updated


Expert Solution
Questions # 355:

Which of the following is the MOST important regulatory consideration for an organization determining whether to use its customer data to train AI algorithms?

Options:

A.

Documentation of AI algorithm accuracy during the training process


B.

Ethical and optimal utilization of data computing resources


C.

Collection of data and obtaining data subject consent


D.

Continuous monitoring of AI algorithm performance


Expert Solution
Questions # 356:

Which of the following operational log management considerations is MOST important for an organization undergoing a digital transformation?

Options:

A.

Changes in operating costs for log management


B.

Centralization of current log management


C.

Tuning of log reviews to provide enhanced oversight


D.

IT resource capability to manage application uptime


Expert Solution
Questions # 357:

A third-party consultant is managing the replacement of an accounting system. Which of the following should be the IS auditor ' s GREATEST concern?

Options:

A.

Data migration is not part of the contracted activities.


B.

The replacement is occurring near year-end reporting


C.

The user department will manage access rights.


D.

Testing was performed by the third-party consultant


Expert Solution
Questions # 358:

A source code repository should be designed to:

Options:

A.

prevent changes from being incorporated into existing code.


B.

prevent developers from accessing secure source code.


C.

provide secure versioning and backup capabilities for existing code.


D.

provide automatic incorporation and distribution of modified code.


Expert Solution
Questions # 359:

Which of the following is the BEST way to ensure an organization ' s data classification policies are preserved during the process of data transformation?

Options:

A.

Map data classification controls to data sets.


B.

Control access to extract, transform, and load (ETL) tools.


C.

Conduct a data discovery exercise across all business applications.


D.

Implement classification labels in metadata during data creation.


Expert Solution
Questions # 360:

An incident response team has been notified of a virus outbreak in a network subnet. Which of the following should be the NEXT step?

Options:

A.

Verify that the compromised systems are fully functional


B.

Focus on limiting the damage


C.

Document the incident


D.

Remove and restore the affected systems


Expert Solution
Questions # 361:

Which of the following presents the GREATEST risk to an organization ' s ability to manage quality control (QC) processes?

Options:

A.

Lack of segregation of duties


B.

Lack of a dedicated QC function


C.

Lack of policies and procedures


D.

Lack of formal training and attestation


Expert Solution
Questions # 362:

Which of the following is the MOST efficient way to identify segregation of duties violations in a new system?

Options:

A.

Review a report of security rights in the system.


B.

Observe the performance of business processes.


C.

Develop a process to identify authorization conflicts.


D.

Examine recent system access rights violations.


Expert Solution
Questions # 363:

Which of the following responsibilities associated with a disaster recovery plan (DRP) can be outsourced to a Disaster Recovery as a Service (DRaaS) provider?

Options:

A.

System recovery procedures


B.

Stakeholder communications during a disaster


C.

Validation of recovered data


D.

Processes for maintaining currency of data


Expert Solution
Questions # 364:

Which of the following BEST demonstrates alignment of the IT department with the corporate mission?

Options:

A.

Analysis of IT department functionality


B.

Biweekly reporting to senior management


C.

Annual board meetings


D.

Quarterly steering committee meetings


Expert Solution
Questions # 365:

Which of the following should be the role of internal audit in an organization’s move to the cloud?

Options:

A.

Mitigating risk to an acceptable level.


B.

Assessing key controls that support the migration.


C.

Implementing security controls for data prior to migration.


D.

Identifying impacts to organizational budgets and resources.


Expert Solution
Questions # 366:

The PRIMARY reason to assign data ownership for protection of data is to establish:

Options:

A.

reliability.


B.

traceability.


C.

authority,


D.

accountability.


Expert Solution
Questions # 367:

Which of the following non-audit activities may impair an IS auditor ' s independence and objectivity?

Options:

A.

Evaluating a third-party customer satisfaction survey


B.

Providing advice on an IT project management framework


C.

Designing security controls for a new cloud-based workforce management system


D.

Reviewing secure software development guidelines adopted by an organization


Expert Solution
Questions # 368:

Which of the following should be the PRIMARY objective of a disaster recovery plan (DRP)?

Options:

A.

Minimizing loss of information


B.

Assessing the risk of key applications


C.

Identifying key business processes


D.

Documenting all IT assets


Expert Solution
Questions # 369:

An organization plans to replace its nightly batch processing backup to magnetic tape with real-time replication to a second data center. Which of the following is the GREATEST risk associated with this change?

Options:

A.

Version control issues


B.

Reduced system performance


C.

Inability to recover from cybersecurity attacks


D.

Increase in IT investment cost


Expert Solution
Questions # 370:

The purpose of a checksum on an amount field in an electronic data interchange (EDI) communication of financial transactions is to ensure:

Options:

A.

nonrepudiation.


B.

authorization,


C.

integrity,


D.

authenticity.


Expert Solution
Questions # 371:

Following an IT audit, management has decided to accept the risk highlighted in the audit report. Which of the following would provide the MOST assurance to the IS auditor that management

is adequately balancing the needs of the business with the need to manage risk?

Options:

A.

A communication plan exists for informing parties impacted by the risk.


B.

Potential impact and likelihood are adequately documented.


C.

Identified risk is reported into the organization ' s risk committee.


D.

Established criteria exist for accepting and approving risk.


Expert Solution
Questions # 372:

UESTION NO: 210

An accounting department uses a spreadsheet to calculate sensitive financial transactions. Which of the following is the MOST important control for maintaining the security of data in the spreadsheet?

Options:

A.

There Is a reconciliation process between the spreadsheet and the finance system


B.

A separate copy of the spreadsheet is routinely backed up


C.

The spreadsheet is locked down to avoid inadvertent changes


D.

Access to the spreadsheet is given only to those who require access


Expert Solution
Questions # 373:

An IS auditor follows up on a recent security incident and finds the incident response was not adequate. Which of the following findings should be considered MOST critical?

Options:

A.

The security weakness facilitating the attack was not identified.


B.

The attack was not automatically blocked by the intrusion detection system (IDS).


C.

The attack could not be traced back to the originating person.


D.

Appropriate response documentation was not maintained.


Expert Solution
Questions # 374:

Which of the following is the BEST control lo mitigate attacks that redirect Internet traffic to an unauthorized website?

Options:

A.

Utilize a network-based firewall.


B.

Conduct regular user security awareness training.


C.

Perform domain name system (DNS) server security hardening.


D.

Enforce a strong password policy meeting complexity requirement.


Expert Solution
Questions # 375:

Which of the following audit procedures would provide the BEST assurance that an application program is functioning as designed?

Options:

A.

Using a continuous auditing module


B.

Interviewing business management


C.

Confirming accounts


D.

Reviewing program documentation


Expert Solution
Questions # 376:

Which of the following should be the PRIMARY focus for any network design that deploys a Zero Trust architecture?

Options:

A.

Protecting network segments


B.

Protecting technology resources


C.

Maintaining network router operating system versions


D.

Ensuring a vendor-agnostic environment


Expert Solution
Questions # 377:

Having knowledge in which of the following areas is MOST relevant for an IS auditor reviewing public key infrastructure (PKI)?

Options:

A.

Design and application of key controls in public audit


B.

Security strategy in public cloud Infrastructure as a Service (IaaS)


C.

Modern encoding methods for digital communications


D.

Technology and process life cycle for digital certificates and key pairs


Expert Solution
Questions # 378:

Which of the following is MOST likely to be a project deliverable of an agile software development methodology?

Options:

A.

Strictly managed software requirements baselines


B.

Extensive project documentation


C.

Automated software programming routines


D.

Rapidly created working prototypes


Expert Solution
Questions # 379:

Which of the following provides the MOST useful information to an IS auditor when selecting projects for inclusion in an IT audit plan?

Options:

A.

Project charter


B.

Project plan


C.

Project issue log


D.

Project business case


Expert Solution
Questions # 380:

An IS auditor reviewing the system development life cycle (SDLC) finds there is no requirement for business cases. Which of the following should be offGREATEST concern to the organization?

Options:

A.

Vendor selection criteria are not sufficiently evaluated.


B.

Business resources have not been optimally assigned.


C.

Business impacts of projects are not adequately analyzed.


D.

Project costs exceed established budgets.


Expert Solution
Questions # 381:

Which of the following is the GREATEST risk associated with utilizing spreadsheets for financial reporting in end-user computing (EUC)?

Options:

A.

Lack of password protection


B.

Lack of processing integrity


C.

Increase in regulatory violations


D.

Increase in operational incidents


Expert Solution
Questions # 382:

Which of the following provides the MOST reliable audit evidence on the validity of transactions in a financial application?

Options:

A.

Walk-through reviews


B.

Substantive testing


C.

Compliance testing


D.

Design documentation reviews


Expert Solution
Questions # 383:

During the planning phase of a data loss prevention (DLP) audit, management expresses a concern about mobile computing. Which of the following should the IS auditor identify as the

associated risk?

Options:

A.

Increased vulnerability due to anytime, anywhere accessibility


B.

Increased need for user awareness training


C.

The use of the cloud negatively impacting IT availability


D.

Lack of governance and oversight for IT infrastructure and applications


Expert Solution
Questions # 384:

Which of the following should an IS auditor do FIRST when auditing a robotics process automation (RPA) implementation?

Options:

A.

Evaluate the overall solution architecture.


B.

Analyze the sequence of activities performed by the robot.


C.

Understand the business processes automated by the robot.


D.

Identity the credentials used by the robot and where they are stored.


Expert Solution
Questions # 385:

During which phase of the software development life cycle is it BEST to initiate the discussion of application controls?

Options:

A.

Business case development phase when stakeholders are identified


B.

Application design phase process functionalities are finalized


C.

User acceptance testing (UAT) phase when test scenarios are designed


D.

Application coding phase when algorithms are developed to solve business problems


Expert Solution
Questions # 386:

Upon completion of audit work, an IS auditor should:

Options:

A.

provide a report to senior management prior to discussion with the auditee.


B.

distribute a summary of general findings to the members of the auditing team.


C.

provide a report to the auditee stating the initial findings.


D.

review the working papers with the auditee.


Expert Solution
Questions # 387:

Which of the following security measures will reduce the risk of propagation when a cyberattack occurs?

Options:

A.

Perimeter firewall


B.

Data loss prevention (DLP) system


C.

Network segmentation


D.

Web application firewall (WAF)


Expert Solution
Questions # 388:

Which of the following BEST enables the effectiveness of an agile project for the rapid development of a new software application?

Options:

A.

Project segments are established.


B.

The work is separated into phases.


C.

The work is separated into sprints.


D.

Project milestones are created.


Expert Solution
Questions # 389:

When assessing a proposed project for the two-way replication of a customer database with a remote call center, the IS auditor should ensure that:

Options:

A.

database conflicts are managed during replication.


B.

end users are trained in the replication process.


C.

the source database is backed up on both sites.


D.

user rights are identical on both databases.


Expert Solution
Questions # 390:

If enabled within firewall rules, which of the following services would present the GREATEST risk?

Options:

A.

Simple mail transfer protocol (SMTP)


B.

Simple object access protocol (SOAP)


C.

Hypertext transfer protocol (HTTP)


D.

File transfer protocol (FTP)


Expert Solution
Questions # 391:

An IS auditor has discovered that a software system still in regular use is years out of date and no longer supported. The auditee has stated that it will take six months until the software is running on the current version. Which of the following is the BEST way to reduce the immediate risk associated with using an unsupported version of the software?

Options:

A.

Verify all patches have been applied to the software system ' s outdated version.


B.

Close all unused ports on the outdated software system.


C.

Monitor network traffic attempting to reach the outdated software system.


D.

Segregate the outdated software system from the main network.


Expert Solution
Questions # 392:

Which of the following is BEST supported by enforcing data definition standards within a database?

Options:

A.

Data disposal


B.

Data retention


C.

Data formatting


D.

Data confidentiality


Expert Solution
Questions # 393:

An organization has moved all of its infrastructure to the cloud. Which of the following would be an IS auditor’s GREATEST concern related to the organization’s ability to continue operations in case of a disaster?

Options:

A.

There is no evidence that disaster recovery plan (DRP) testing was performed after the migration.


B.

Only business-critical servers were configured with redundancy services on the cloud service provider.


C.

The previous infrastructure was not retained to support business operations in case of a disaster.


D.

The step-by-step recovery process was not updated in the disaster recovery plan (DRP) after the migration.


Expert Solution
Questions # 394:

What is the PRIMARY reason for an organization to classify the data stored on its internal networks?

Options:

A.

To determine data retention policy


B.

To implement data protection requirements


C.

To comply with the organization ' s data policies


D.

To follow industry best practices


Expert Solution
Questions # 395:

The PRIMARY advantage of object-oriented technology is enhanced:

Options:

A.

efficiency due to the re-use of elements of logic.


B.

management of sequential program execution for data access.


C.

grouping of objects into methods for data access.


D.

management of a restricted variety of data types for a data object.


Expert Solution
Questions # 396:

During a review of system access, an IS auditor notes that an employee who has recently changed roles within the organization still has previous access rights. The auditor ' s NEXT step should be to:

Options:

A.

recommend a control to automatically update access rights.


B.

determine the reason why access rights have not been revoked.


C.

direct management to revoke current access rights.


D.

determine if access rights are in violation of software licenses.


Expert Solution
Questions # 397:

An IS auditor is reviewing an organization ' s business intelligence infrastructure. The BEST recommendation to help the organization achieve a reasonable level of data quality would be to:

Options:

A.

review data against data classification standards.


B.

outsource data cleansing to skilled service providers.


C.

consolidate data stored across separate databases into a warehouse.


D.

analyze the data against predefined specifications.


Expert Solution
Questions # 398:

A disaster recovery plan (DRP) should include steps for:

Options:

A.

assessing and quantifying risk.


B.

negotiating contracts with disaster planning consultants.


C.

identifying application control requirements.


D.

obtaining replacement supplies.


Expert Solution
Questions # 399:

An IS auditor has traced the source of a transaction fraud to the desktop system of an e-business staff member who is on leave. Which of the following is the BEST way for the auditor to ensure the success of the investigation?

Options:

A.

Create an image of the attacked system and dump the memory to a file for review.


B.

Immediately seal off the attacked system and block all access until after the investigation.


C.

Reboot the attacked system and promptly review log files and file timestamps.


D.

Interview the business staff and ask them to provide details of recent system activities.


Expert Solution
Questions # 400:

Which of the following observations should be of GREATEST concern to an IS auditor reviewing an organization ' s enterprise architecture (EA) program?

Options:

A.

IT application owners have sole responsibility for architecture approval.


B.

The architecture review board is chaired by the CIO.


C.

Information security requirements are reviewed by the EA program.


D.

The EA program governs projects that are not IT-related.


Expert Solution
Viewing page 8 out of 10 pages
Viewing questions 351-400 out of questions