Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

Pass the Isaca Isaca Certification CISA Questions and answers with CertsForce

Viewing page 9 out of 10 pages
Viewing questions 401-450 out of questions
Questions # 401:

Which of the following should be the FIRST step in a data migration project?

Options:

A.

Reviewing decisions on how business processes should be conducted in the new system


B.

Completing data cleanup in the current database to eliminate inconsistencies


C.

Understanding the new system ' s data structure


D.

Creating data conversion scripts


Expert Solution
Questions # 402:

Which of the following is the BEST testing approach to facilitate rapid identification of application interface errors?

Options:

A.

Integration testing


B.

Regression testing


C.

Automated testing


D.

User acceptance testing (UAT)


Expert Solution
Questions # 403:

Which of the following is the GREATEST risk of using a reciprocal site for disaster recovery?

Options:

A.

Inability to utilize the site when required


B.

Inability to test the recovery plans onsite


C.

Equipment compatibility issues at the site


D.

Mismatched organizational security policies


Expert Solution
Questions # 404:

An organization ' s sensitive data is stored in a cloud computing environment and is encrypted. Which of the following findings should be of GREATEST concern to an IS auditor?

Options:

A.

The encryption keys are not kept under dual control.


B.

The cloud vendor does not have multi-regional presence.


C.

Symmetric keys are used for encryption.


D.

Data encryption keys are accessible to the service provider.


Expert Solution
Questions # 405:

A business has requested an audit to determine whether information stored in an application is adequately protected. Which of the following is the MOST important action before the audit work begins?

Options:

A.

Review remediation reports


B.

Establish control objectives.


C.

Assess the threat landscape.


D.

Perform penetration testing.


Expert Solution
Questions # 406:

Which of the following approaches BEST enables an IS auditor to detect security vulnerabilities within an application?

Options:

A.

Threat modeling


B.

Concept mapping


C.

Prototyping


D.

Threat intelligence


Expert Solution
Questions # 407:

A bank wants to outsource a system to a cloud provider residing in another country. Which of the following would be the MOST appropriate IS audit recommendation?

Options:

A.

Find an alternative provider in the bank ' s home country.


B.

Ensure the provider ' s internal control system meets bank requirements.


C.

Proceed as intended, as the provider has to observe all laws of the clients’ countries.


D.

Ensure the provider has disaster recovery capability.


Expert Solution
Questions # 408:

The MOST important objective of a post-implementation audit is to:

Options:

A.

Address lessons learned from the project.


B.

Determine whether the required objectives were met.


C.

Develop a process for continuous improvement.


D.

Seek approval for the next implementation phase.


Expert Solution
Questions # 409:

When designing metrics for information security, the MOST important consideration is that the metrics:

Options:

A.

conform to industry standards.


B.

apply to all business units.


C.

provide actionable data.


D.

are easy to understand.


Expert Solution
Questions # 410:

An IS auditor is conducting a post-implementation review of an enterprise resource planning (ERP) system. End users indicated concerns with the accuracy of critical automatic calculations made by the system. The auditor ' s FIRST course of action should be to:

Options:

A.

review recent changes to the system.


B.

verify completeness of user acceptance testing (UAT).


C.

verify results to determine validity of user concerns.


D.

review initial business requirements.


Expert Solution
Questions # 411:

An IS auditor has been asked to advise on measures to improve IT governance within the organization. Which at the following is the BEST recommendation?

Options:

A.

Implement key performance indicators (KPIs)


B.

Implement annual third-party audits.


C.

Benchmark organizational performance against industry peers.


D.

Require executive management to draft IT strategy


Expert Solution
Questions # 412:

Which of the following is an IS auditor ' s BEST recommendation to protect an organization from attacks when its file server needs to be accessible to external users?

Options:

A.

Enforce a secure tunnel connection.


B.

Enhance internal firewalls.


C.

Set up a demilitarized zone (DMZ).


D.

Implement a secure protocol.


Expert Solution
Questions # 413:

In order for a firewall to effectively protect a network against external attacks, what fundamental practice must be followed?

Options:

A.

The firewall must be placed in the demilitarized zone (DMZ).


B.

Only essential external services should be permitted.


C.

Filters for external information must be defined.


D.

All external communication must be via the firewall.


Expert Solution
Questions # 414:

Which of the following is MOST important to consider when developing a service level agreement (SLAP)?

Options:

A.

Description of the services from the viewpoint of the provider


B.

Detailed identification of work to be completed


C.

Provisions for regulatory requirements that impact the end users ' businesses


D.

Description of the services from the viewpoint of the client organization


Expert Solution
Questions # 415:

Which of the following network topologies will provide the GREATEST fault tolerance?

Options:

A.

Star configuration


B.

Ring configuration


C.

Bus configuration


D.

Mesh configuration


Expert Solution
Questions # 416:

Which of the following BEST minimizes performance degradation of servers used to authenticate users of an e-commerce website?

Options:

A.

Configure a single server as a primary authentication server and a second server as a secondary authentication server.


B.

Configure each authentication server as belonging to a cluster of authentication servers.


C.

Configure each authentication server and ensure that each disk of its RAID is attached to the primary controller.


D.

Configure each authentication server and ensure that the disks of each server form part of a duplex.


Expert Solution
Questions # 417:

An IS auditor finds a high-risk vulnerability in a public-facing web server used to process online customer payments. The IS auditor should FIRST

Options:

A.

document the exception in an audit report.


B.

review security incident reports.


C.

identify compensating controls.


D.

notify the audit committee.


Expert Solution
Questions # 418:

When an IS audit reveals that a firewall was unable to recognize a number of attack attempts, the auditor ' s BEST recommendation is to place an intrusion detection system (IDS) between the firewall and:

Options:

A.

the organization ' s web server.


B.

the demilitarized zone (DMZ).


C.

the organization ' s network.


D.

the Internet


Expert Solution
Questions # 419:

An organization ' s strategy to source certain IT functions from a Software as a Service (SaaS) provider should be approved by the:

Options:

A.

chief financial officer (CFO).


B.

chief risk officer (CRO).


C.

IT steering committee.


D.

IT operations manager.


Expert Solution
Questions # 420:

Data from a system of sensors located outside of a network is received by the open ports on a server. Which of the following is the BEST way to ensure the integrity of the data being collected from the sensor system?

Options:

A.

Route the traffic from the sensor system through a proxy server.


B.

Hash the data that is transmitted from the sensor system.


C.

Implement network address translation on the sensor system.


D.

Transmit the sensor data via a virtual private network (VPN) to the server.


Expert Solution
Questions # 421:

Which of the following is MOST important for an IS auditor to verify when evaluating tne upgrade of an organization ' s enterprise resource planning (ERP) application?

Options:

A.

Application related documentation was updated to reflect the changes in the new version


B.

Security configurations were appropriately applied to the new version


C.

Users were provided security training on the new version


D.

Lessons teamed analysis was documented after the upgrade


Expert Solution
Questions # 422:

Which of the following security risks can be reduced by a property configured network firewall?

Options:

A.

SQL injection attacks


B.

Denial of service (DoS) attacks


C.

Phishing attacks


D.

Insider attacks


Expert Solution
Questions # 423:

Which of the following is the PRIMARY reason for an IS auditor to conduct post-implementation reviews?

Options:

A.

To determine whether project objectives in the business case have been achieved


B.

To ensure key stakeholder sign-off has been obtained


C.

To align project objectives with business needs


D.

To document lessons learned to improve future project delivery


Expert Solution
Questions # 424:

During a review, an IS auditor discovers that corporate users are able to access cloud-based applications and data from any Internet-connected web browser. Which of the following is the

auditor ' s BEST recommendation to help prevent unauthorized access?

Options:

A.

Utilize strong anti-malware controls on all computing devices.


B.

Update security policies and procedures.


C.

Implement an intrusion detection system (IDS).


D.

Implement multi-factor authentication.


Expert Solution
Questions # 425:

Which of the following is the PRIMARY reason that asset classification is vital to an information security program?

Options:

A.

To ensure the appropriate level of protection to assets


B.

To ensure asset protection efforts are in line with industry standards


C.

To ensure risk mitigation efforts are adequate


D.

To ensure sufficient resources are allocated for information security


Expert Solution
Questions # 426:

Which of the following is the BEST disposal method for flash drives that previously stored confidential data?

Options:

A.

Destruction


B.

Degaussing


C.

Cryptographic erasure


D.

Overwriting


Expert Solution
Questions # 427:

An IS auditor is conducting a review of a data center. Which of the following observations could indicate an access control Issue?

Options:

A.

Security cameras deployed outside main entrance


B.

Antistatic mats deployed at the computer room entrance


C.

Muddy footprints directly inside the emergency exit


D.

Fencing around facility is two meters high


Expert Solution
Questions # 428:

Which of the following should an IS auditor expect to see in a network vulnerability assessment?

Options:

A.

Misconfiguration and missing updates


B.

Malicious software and spyware


C.

Zero-day vulnerabilities


D.

Security design flaws


Expert Solution
Questions # 429:

Which of the following would a digital signature MOST likely prevent?

Options:

A.

Repudiation


B.

Unauthorized change


C.

Corruption


D.

Disclosure


Expert Solution
Questions # 430:

Which of the following BEST describes the process of creating a digital envelope?

Options:

A.

The encryption key is compressed within a folder after a message is encoded using symmetric encryption.


B.

A message is encoded using symmetric encryption, and then the encryption key is secured using public key encryption.


C.

The message is hashed, and the hash total is sent using symmetric encryption.


D.

A message digest is encrypted using asymmetric encryption, and the encryption key is sent using asymmetric encryption.


Expert Solution
Questions # 431:

An IS auditor is reviewing an IT project and finds that an earned value analysis (EVA) is not regularly performed as part of project status reporting. Which of the following is the GREATEST risk resulting from this situation?

Options:

A.

Resources might not be assigned and prioritized in a timely manner.


B.

Time and budget overruns might not be identified in a timely manner.


C.

The project might not be compliant with project management standards.


D.

Business requirements may not be properly benchmarked.


Expert Solution
Questions # 432:

Which of the following would be a result of utilizing a top-down maturity model process?

Options:

A.

A means of benchmarking the effectiveness of similar processes with peers


B.

A means of comparing the effectiveness of other processes within the enterprise


C.

Identification of older, more established processes to ensure timely review


D.

Identification of processes with the most improvement opportunities


Expert Solution
Questions # 433:

During audit framework. an IS auditor teams that employees are allowed to connect their personal devices to company-owned computers. How can the auditor BEST validate that appropriate security controls are in place to prevent data loss?

Options:

A.

Conduct a walk-through to view results of an employee plugging in a device to transfer confidential data.


B.

Review compliance with data loss and applicable mobile device user acceptance policies.


C.

Verify the data loss prevention (DLP) tool is properly configured by the organization.


D.

Verify employees have received appropriate mobile device security awareness training.


Expert Solution
Questions # 434:

Which of the following is the GREATEST benefit of an effective data classification process?

Options:

A.

Data custodians are identified.


B.

Data retention periods are well defined


C.

Data is protected according to its sensitivity


D.

Appropriate ownership over data is assigned


Expert Solution
Questions # 435:

Which of the following metrics is MOST helpful for evaluating the effectiveness of problem management practices?

Options:

A.

The number of recurring incidents that cause downtime


B.

The percentage of incidents resolved within a service level agreement (SLA)


C.

The number of incidents investigated and diagnosed


D.

The average time to detect and prioritize an incident


Expert Solution
Questions # 436:

Which of the following is the PRIMARY reason an IS auditor should discuss observations with management before delivering a final report?

Options:

A.

Validate the audit observations_


B.

Identify business risks associated with the observations.


C.

Assist the management with control enhancements.


D.

Record the proposed course of corrective action.


Expert Solution
Questions # 437:

Which of the following is an IS auditor ' s BEST recommendation to mitigate the risk of eavesdropping

associated with an application programming interface (API) integration implementation?

Options:

A.

Encrypt the extensible markup language (XML) file.


B.

Implement Transport Layer Security (TLS).


C.

Implement Simple Object Access Protocol (SOAP).


D.

Mask the API endpoints.


Expert Solution
Questions # 438:

Which of the following is MOST important to the effectiveness of smoke detectors installed in a data processing facility?

Options:

A.

Detectors trigger audible alarms when activated.


B.

Detectors have the correct industry certification.


C.

Detectors are linked to dry pipe fire suppression systems.


D.

Detectors are linked to wet pipe fire suppression systems.


Expert Solution
Questions # 439:

During an audit which of the following would be MOST helpful in establishing a baseline for measuring data quality?

Options:

A.

Input from customers


B.

Industry standard business definitions


C.

Validation of rules by the business


D.

Built-in data error prevention application controls


Expert Solution
Questions # 440:

An IS auditor determines elevated administrator accounts for servers that are not properly checked out and then back in after each use. Which of the following is the MOST appropriate sampling technique to determine the scope of the problem?

Options:

A.

Haphazard sampling


B.

Random sampling


C.

Statistical sampling


D.

Stratified sampling


Expert Solution
Questions # 441:

Which of the following is the BEST source of information for an IS auditor to use as a baseline to assess the adequacy of an organization ' s privacy policy?

Options:

A.

Historical privacy breaches and related root causes


B.

Globally accepted privacy best practices


C.

Local privacy standards and regulations


D.

Benchmark studies of similar organizations


Expert Solution
Questions # 442:

At the conclusion of an audit, but before issuing the final report, the auditor should:

Options:

A.

Confirm results with the audit committee.


B.

Confirm factual findings with the auditee.


C.

Obtain evidence to support findings.


D.

Help management develop action plans.


Expert Solution
Questions # 443:

Which of the following is the BEST way to enforce the principle of least privilege on a server containing data with different security classifications?

Options:

A.

Limiting access to the data files based on frequency of use


B.

Obtaining formal agreement by users to comply with the data classification policy


C.

Applying access controls determined by the data owner


D.

Using scripted access control lists to prevent unauthorized access to the server


Expert Solution
Questions # 444:

Which of the following is the PRIMARY role of the release plan?

Options:

A.

It identifies all configuration items within an IT environment.


B.

It provides a timeline and schedule for deploying new releases into production.


C.

It outlines the steps for database integration.


D.

It evaluates the impact of proposed changes and updates to IT systems.


Expert Solution
Questions # 445:

When drafting a disaster recovery strategy, what should be the MOST important outcome of a business impact analysis (BIA)?

Options:

A.

Establishing recovery point objectives (RPOs)


B.

Determining recovery priorities


C.

Establishing recovery time objectives (RTOs)


D.

Determining recovery costs


Expert Solution
Questions # 446:

An organization has recently moved to an agile model for deploying custom code to its in-house accounting software system. When reviewing the procedures in place for production code deployment, which of the following is the MOST significant security concern to address?

Options:

A.

Software vulnerability scanning is done on an ad hoc basis.


B.

Change control does not include testing and approval from quality assurance (QA).


C.

Production code deployment is not automated.


D.

Current DevSecOps processes have not been independently verified.


Expert Solution
Questions # 447:

Which of the following is the PRIMARY reason for an organization to implement a configuration management database (CMDB)?

Options:

A.

To track configuration incidents and service requests


B.

To record and monitor performance metrics for configuration items


C.

To provide an organized view of configuration items and their relationships


D.

To store backup copies of software applications


Expert Solution
Questions # 448:

An organization used robotic process automation (RPA) technology to develop software bots that extract data from various sources for input into a legacy financial application. Which of the following should be of GREATEST concern to an IS auditor when reviewing the software bot job scheduling and production process automation?

Options:

A.

Minor overrides were not authorized by the business


B.

Software bots were incapable of learning from training data


C.

Software bots were programmed to record all user interactions, including mouse tracking


D.

Unauthorized modifications were made to the scripts to improve performance


Expert Solution
Questions # 449:

When verifying the accuracy and completeness of migrated data for a new application system replacing a legacy system. It is MOST effective for an IS auditor to review;

Options:

A.

data analytics findings.


B.

audit trails


C.

acceptance lasting results


D.

rollback plans


Expert Solution
Questions # 450:

Audit frameworks cart assist the IS audit function by:

Options:

A.

defining the authority and responsibility of the IS audit function.


B.

providing details on how to execute the audit program.


C.

providing direction and information regarding the performance of audits.


D.

outlining the specific steps needed to complete audits


Expert Solution
Viewing page 9 out of 10 pages
Viewing questions 401-450 out of questions