Pass the Isaca Isaca Certification CISA Questions and answers with CertsForce

Viewing page 8 out of 9 pages
Viewing questions 351-400 out of questions
Questions # 351:

Which of the following is the BEST recommendation to include in an organization's bring your own device (BYOD)

policy to help prevent data leakage?

Options:

A.

Require employees to waive privacy rights related to data on BYOD devices.


B.

Require multi-factor authentication on BYOD devices,


C.

Specify employee responsibilities for reporting lost or stolen BYOD devices.


D.

Allow only registered BYOD devices to access the network.


Expert Solution
Questions # 352:

Which of the following is the BEST way to help ensure new IT implementations align with enterprise architecture (EA) principles and requirements?

Options:

A.

Document the security view as part of the EA


B.

Consider stakeholder concerns when defining the EA


C.

Perform mandatory post-implementation reviews of IT implementations


D.

Conduct EA reviews as part of the change advisory board


Expert Solution
Questions # 353:

Which of the following should be the FIRST step when planning an IS audit of a third-party service provider that monitors network activities?

Options:

A.

Review the third party's monitoring logs and incident handling


B.

Review the roles and responsibilities of the third-party provider


C.

Evaluate the organization's third-party monitoring process


D.

Determine if the organization has a secure connection to the provider


Expert Solution
Questions # 354:

When auditing the feasibility study of a system development project, the IS auditor should:

Options:

A.

review qualifications of key members of the project team.


B.

review the request for proposal (RFP) to ensure that it covers the scope of work.


C.

review cost-benefit documentation for reasonableness.


D.

ensure that vendor contracts are reviewed by legal counsel.


Expert Solution
Questions # 355:

Which of the following are used in a firewall to protect the entity's internal resources?

Options:

A.

Remote access servers


B.

Secure Sockets Layers (SSLs)


C.

Internet Protocol (IP) address restrictions


D.

Failover services


Expert Solution
Questions # 356:

An IS auditor is assessing backup performance and observes that the system administrator manually initiates backups during unexpected peak usage. Which of the following is the auditor's BEST course of action?

Options:

A.

Review separation of duties documentation.


B.

Verify the load balancer configuration.


C.

Recommend using cloud-based backups.


D.

Inspect logs to verify timely execution of backups.


Expert Solution
Questions # 357:

An organization offers an e-commerce platform that allows consumer-to-consumer transactions. The platform now uses blockchain technology to ensure the parties are unable to deny the transactions. Which of the following attributes BEST describes the risk element that this technology is addressing?

Options:

A.

Integrity


B.

Nonrepudiation


C.

Confidentiality


D.

Availability


Expert Solution
Questions # 358:

Which of the following would be of GREATEST concern to an IS auditor reviewing an IT strategy document?

Options:

A.

The previous year’s IT strategic goals were not achieved.


B.

Target architecture is defined at a technical level.


C.

Financial estimates of new initiatives are disclosed within the document.


D.

Strategic IT goals are derived solely from the latest market trends.


Expert Solution
Questions # 359:

Which of the following is the MOST important consideration of any disaster response plan?

Options:

A.

Lost revenue


B.

Personnel safety


C.

IT asset protection


D.

Adequate resource capacity


Expert Solution
Questions # 360:

An IS auditor is reviewing a network diagram. Which of the following would be the BEST location for placement of a firewall?

Options:

A.

Between each host and the local network switch/hub


B.

Between virtual local area networks (VLANs)


C.

Inside the demilitarized zone (DMZ)


D.

At borders of network segments with different security levels


Expert Solution
Questions # 361:

The PRIMARY advantage of using open-source-based solutions is that they:

Options:

A.

Have well-defined support levels.


B.

Are easily implemented.


C.

Reduce dependence on vendors.


D.

Offer better security features.


Expert Solution
Questions # 362:

Which of the following is the MAIN objective of enterprise architecture (EA) governance?

Options:

A.

To ensure new processes and technologies harmonize with existing processes


B.

To ensure the EA can adapt to emerging technology trends


C.

To ensure the EA is compliant with local laws and regulations


D.

To ensure new initiatives produce an acceptable return on investment (ROI)


Expert Solution
Questions # 363:

Which of the following security measures is MOST important for protecting Internet of Things (IoT) devices from potential cyberattacks?

Options:

A.

Logging and monitoring network traffic


B.

Confirming firmware compliance to current security requirements


C.

Changing default passwords


D.

Reviewing and updating the network diagram on a regular basis


Expert Solution
Questions # 364:

Which of the following risk scenarios is BEST mitigated through the use of a data loss prevention (DLP) tool?

Options:

A.

An employee is sending company documents to an external email to increase productivity.


B.

A former employee retains access to an application that authenticates via single sign-on


C.

An employee uses production data in a test environment.


D.

An employee selects the incorrect data classification on documents.


Expert Solution
Questions # 365:

Which of the following should be the PRIMARY consideration when incorporating user training and awareness into a data loss prevention (DLP) strategy?

Options:

A.

Avoiding financial penalties and reputational risk


B.

Ensuring data availability


C.

Promoting secure data handling practices


D.

Adhering to data governance policies


Expert Solution
Questions # 366:

An IS auditor is reviewing the service management of an outsourced help desk. Which of the following is the BEST indicator of how effectively the service provider is performing this function?

Options:

A.

Average ticket age


B.

Number of calls worked


C.

Customer satisfaction ratings


D.

Call transcript reviews


Expert Solution
Questions # 367:

Which of the following is the PRIMARY purpose of conducting a control self-assessment (CSA)?

Options:

A.

To replace audit responsibilities


B.

To reduce control costs


C.

To promote control ownership


D.

To enable early detection of risks


Expert Solution
Questions # 368:

What should be an IS auditor's PRIMARY focus when reviewing a patch management procedure in an environment where availability is a top priority?

Options:

A.

Deployment automation to all servers


B.

Technical skills of the deployment team


C.

Comprehensive testing prior to deployment


D.

Validity certification prior to deployment


Expert Solution
Questions # 369:

An IS auditor is reviewing how password resets are performed for users working remotely. Which type of documentation should be requested to understand the detailed steps required for this activity?

Options:

A.

Standards


B.

Guidelines


C.

Policies


D.

Procedures


Expert Solution
Questions # 370:

Which of the following is the MOST important success factor for implementing a data loss prevention (DLP) tool?

Options:

A.

Implementing the tool in monitor mode to avoid unnecessary blocking of communication


B.

Defining and configuring policies and tool rule sets to monitor sensitive data movement


C.

Testing the tool in a test environment before moving to the production environment


D.

Assigning responsibilities for maintaining the tool to applicable data owners and stakeholders


Expert Solution
Questions # 371:

An IS auditor observes that an organization's systems are being used for cryptocurrency mining on a regular basis. Which of the following is the auditor's FIRST course of action?

Options:

A.

Report the incident immediately.


B.

Recommend changing the organization's firewall settings.


C.

Consult the organization's acceptable use policy.


D.

Require mining software to be uninstalled.


Expert Solution
Questions # 372:

After areas have been appropriately scoped, what is the IS auditor's NEXT step in the selection for sampling?

Options:

A.

Define the population for sampling.


B.

Determine the sampling method.


C.

Calculate the sample size.


D.

Pull the sample.


Expert Solution
Questions # 373:

Which of the following is the PRIMARY function of an internal IS auditor when the organization acquires a new IT system to support its business strategy?

Options:

A.

Identifying significant IT errors and fraud


B.

Assessing system development life cycle (SDLC) controls


C.

Implementing risk and control gap mitigation


D.

Evaluating IT risk and controls


Expert Solution
Questions # 374:

Which of the following is MOST likely to be reduced when implementing optimal risk management strategies?

Options:

A.

Sampling risk


B.

Residual risk


C.

Detection risk


D.

Inherent risk


Expert Solution
Questions # 375:

Which of the following is the GREATEST benefit of adopting an Agile audit methodology?

Options:

A.

Better ability to address key risks


B.

Less frequent client interaction


C.

Annual cost savings


D.

Reduced documentation requirements


Expert Solution
Questions # 376:

Which of the following is the BEST metric to measure the quality of software developed in an organization?

Options:

A.

Amount of successfully migrated software changes


B.

Reduction in the help desk budget


C.

Number of defects discovered in production


D.

Increase in quality assurance (QA) activities


Expert Solution
Questions # 377:

In reviewing the IT strategic plan, the IS auditor should consider whether it identifies the:

Options:

A.

allocation of IT staff.


B.

project management methodologies used.


C.

major IT initiatives.


D.

links to operational tactical plans.


Expert Solution
Questions # 378:

Management has decided to accept a risk in response to a draft audit recommendation. Which of the following should be the IS auditor’s NEXT course of action?

Options:

A.

Document management's acceptance in the audit report.


B.

Escalate the acceptance to the board.


C.

Ensure a follow-up audit is on next year's plan.


D.

Escalate acceptance to the audit committee.


Expert Solution
Questions # 379:

An IS auditor finds ad hoc vulnerability scanning is in place with no clear alignment to the organization's wider security threat and vulnerability management program.

Which of the following would BEST enable the organization to work toward improvement in this area?

Options:

A.

Implementing security logging to enhance threat and vulnerability management


B.

Maintaining a catalog of vulnerabilities that may impact mission-critical systems


C.

Using a capability maturity model to identify a path to an optimized program


D.

Outsourcing the threat and vulnerability management function to a third party


Expert Solution
Questions # 380:

The PRIMARY objective of a follow-up audit is to:

Options:

A.

assess the appropriateness of recommendations.


B.

verify compliance with policies.


C.

evaluate whether the risk profile has changed.


D.

determine adequacy of actions taken on recommendations.


Expert Solution
Questions # 381:

Management has agreed to move the organization's data center due to recent flood map changes in its current location. Which risk response has been adopted?

Options:

A.

Risk elimination


B.

Risk transfer


C.

Risk acceptance


D.

Risk avoidance


Expert Solution
Questions # 382:

Which of the following should be done FIRST when creating a data protection program?

Options:

A.

Implement data loss prevention (DLP) controls.


B.

Perform classification based on standards.


C.

Deploy intrusion detection systems (IDS).


D.

Test logical access controls for effectiveness.


Expert Solution
Questions # 383:

Which of the following provides the BEST assurance that vendor-supported software remains up to date?

Options:

A.

Release and patch management


B.

Licensing agreement and escrow


C.

Software asset management


D.

Version management


Expert Solution
Questions # 384:

An external audit firm was engaged to perform a validation and verification review for a systems implementation project. The IS auditor identifies that regression testing is not part of the project plan and was not performed by the systems implementation team. According to the team, the parallel testing being performed is sufficient, making regression testing unnecessary. What should be the auditor’s NEXT step?

Options:

A.

Evaluate the extent of the parallel testing being performed


B.

Recommend integration and stress testing be conducted by the systems implementation team


C.

Conclude that parallel testing is sufficient and regression testing is not needed


D.

Recommend regression testing be conducted by the systems implementation team


Expert Solution
Questions # 385:

An organization used robotic process automation (RPA) technology to develop software bots that extract data from various sources for input into a legacy financial application. Which of the following should be of GREATEST concern to an IS auditor when reviewing the software bot job scheduling and production process automation?

Options:

A.

Minor overrides were not authorized by the business


B.

Software bots were incapable of learning from training data


C.

Software bots were programmed to record all user interactions, including mouse tracking


D.

Unauthorized modifications were made to the scripts to improve performance


Expert Solution
Questions # 386:

Which of the following should be the GREATEST concern for an IS auditor assessing an organization's disaster recovery plan (DRP)?

Options:

A.

The DRP was developed by the IT department.


B.

The DRP has not been tested during the past three years.


C.

The DRP has not been updated for two years.


D.

The DRP does not include the recovery the time objective (RTO) for a key system.


Expert Solution
Questions # 387:

Which of the following procedures for testing a disaster recovery plan (DRP) is MOST effective?

Options:

A.

Testing at a secondary site using offsite data backups


B.

Performing a quarterly tabletop exercise


C.

Reviewing recovery time and recovery point objectives


D.

Reviewing documented backup and recovery procedures


Expert Solution
Questions # 388:

Which of the following technologies BEST assists in protection of digital evidence as part of forensic investigation acquisition?

Options:

A.

Hardware-based media write blocker


B.

Data encryption


C.

Differential backups


D.

Source media sanitization


Expert Solution
Questions # 389:

Which of the following is the MOST important privacy consideration for an organization that uses a cloud service provider to process customer data?

Options:

A.

Data privacy must be managed in accordance with the regulations applicable to the organization.


B.

Data privacy must be monitored in accordance with industry standards and best practices.


C.

No personal information may be transferred to the service provider without notifying the customer.


D.

Customer data transferred to the service provider must be reported to the regulatory authority.


Expert Solution
Questions # 390:

Which of the following tests is MOST likely to detect an error in one subroutine resulting from a recent change in another subroutine?

Options:

A.

User acceptance testing (UAT)


B.

Black-box testing


C.

Regression testing


D.

Stress testing


Expert Solution
Questions # 391:

Which of the following measures BEST mitigates the risk of data exfiltration during a cyberattack?

Options:

A.

Data loss prevention (DLP) system


B.

Network access controls (NAC)


C.

Perimeter firewall


D.

Hashing of sensitive data


Expert Solution
Questions # 392:

An IS auditor is reviewing an organizations release management practices and observes inconsistent and inaccurate estimation of the size and complexity of business application development projects. Which of the following should the auditor recommend to address this issue?

Options:

A.

Critical path methodology


B.

Agile development approach


C.

Function point analysis


D.

Rapid application development


Expert Solution
Questions # 393:

Who is accountable for an organization's enterprise risk management (ERM) program?

Options:

A.

Board of directors


B.

Steering committee


C.

Chief risk officer (CRO)


D.

Executive management


Expert Solution
Questions # 394:

An IS audit team is evaluating documentation of the most recent application user access review. It is determined that the user list was not system generated. Which of the following should be of

MOST concern?

Options:

A.

Confidentiality of the user list


B.

Timeliness of the user list review


C.

Completeness of the user list


D.

Availability of the user list


Expert Solution
Questions # 395:

Which of the following should be the PRIMARY consideration when validating a data analytic algorithm that has never been used before?

Options:

A.

Enhancing the design of data visualization


B.

Increasing speed and efficiency of audit procedures


C.

Confirming completeness and accuracy


D.

Decreasing the time for data analytics execution


Expert Solution
Questions # 396:

An IS auditor is reviewing documentation from a change that was applied to an application. Which of the following findings would be the GREATEST concern?

Options:

A.

Testing documentation does not show manager approval.


B.

Testing documentation is dated three weeks before the system implementation date.


C.

Testing documentation is approved prior to completion of user acceptance testing (UAT).


D.

Testing documentation is kept in hard copy format.


Expert Solution
Questions # 397:

Which of the following BEST enables an organization to verify whether an encrypted message sent by a client has been altered?

Options:

A.

The digital signature


B.

The message header


C.

The date and time stamp of the received message


D.

The sender's private key


Expert Solution
Questions # 398:

Which of the following is the PRIMARY reason an IS auditor should recommend that management create an IT risk register?

Options:

A.

To document root causes of IT-related risk events and lessons learned


B.

To ensure there is appropriate funding for IT risk mitigation efforts


C.

To ensure an inventory of potential IT risks is maintained and reported


D.

To facilitate internal audit's testing of IT-risk-related controls


Expert Solution
Questions # 399:

Which of the following is the GREATEST advantage of maintaining an internal IS audit function within an organization?

Options:

A.

Increased independence and impartiality of recommendations


B.

Better understanding of the business and processes


C.

Ability to negotiate recommendations with management


D.

Increased IS audit staff visibility and availability throughout the year


Expert Solution
Questions # 400:

A post-implementation audit has been completed for the deployment of a sophisticated job scheduling tool Which of the following observations would be of GREATEST concern?

Options:

A.

The IT learn customized tool settings without seeking approval from the provider.


B.

The overall project took longer to complete than planned.


C.

The data encryption setting is not enabled in the scheduling tool.


D.

The IT team accesses the scheduler admin panel via a generic account.


Expert Solution
Viewing page 8 out of 9 pages
Viewing questions 351-400 out of questions