• support@dumpspool.com

SPECIAL LIMITED TIME DISCOUNT OFFER. USE DISCOUNT CODE TO GET 20% OFF DP2021

PDF Only

Dumpspool PDF book

$35.00 Free Updates Upto 90 Days

  • CISA Dumps PDF
  • 1404 Questions
  • Updated On March 24, 2025

PDF + Test Engine

Dumpspool PDF and Test Engine book

$60.00 Free Updates Upto 90 Days

  • CISA Question Answers
  • 1404 Questions
  • Updated On March 24, 2025

Test Engine

Dumpspool Test Engine book

$50.00 Free Updates Upto 90 Days

  • CISA Practice Questions
  • 1404 Questions
  • Updated On March 24, 2025
Check Our Free Isaca CISA Online Test Engine Demo.

How to pass Isaca CISA exam with the help of dumps?

DumpsPool provides you the finest quality resources you’ve been looking for to no avail. So, it's due time you stop stressing and get ready for the exam. Our Online Test Engine provides you with the guidance you need to pass the certification exam. We guarantee top-grade results because we know we’ve covered each topic in a precise and understandable manner. Our expert team prepared the latest Isaca CISA Dumps to satisfy your need for training. Plus, they are in two different formats: Dumps PDF and Online Test Engine.

How Do I Know Isaca CISA Dumps are Worth it?

Did we mention our latest CISA Dumps PDF is also available as Online Test Engine? And that’s just the point where things start to take root. Of all the amazing features you are offered here at DumpsPool, the money-back guarantee has to be the best one. Now that you know you don’t have to worry about the payments. Let us explore all other reasons you would want to buy from us. Other than affordable Real Exam Dumps, you are offered three-month free updates.

You can easily scroll through our large catalog of certification exams. And, pick any exam to start your training. That’s right, DumpsPool isn’t limited to just Isaca Exams. We trust our customers need the support of an authentic and reliable resource. So, we made sure there is never any outdated content in our study resources. Our expert team makes sure everything is up to the mark by keeping an eye on every single update. Our main concern and focus are that you understand the real exam format. So, you can pass the exam in an easier way!

IT Students Are Using our Certified Information Systems Auditor Dumps Worldwide!

It is a well-established fact that certification exams can’t be conquered without some help from experts. The point of using Certified Information Systems Auditor Practice Question Answers is exactly that. You are constantly surrounded by IT experts who’ve been through you are about to and know better. The 24/7 customer service of DumpsPool ensures you are in touch with these experts whenever needed. Our 100% success rate and validity around the world, make us the most trusted resource candidates use. The updated Dumps PDF helps you pass the exam on the first attempt. And, with the money-back guarantee, you feel safe buying from us. You can claim your return on not passing the exam.

How to Get CISA Real Exam Dumps?

Getting access to the real exam dumps is as easy as pressing a button, literally! There are various resources available online, but the majority of them sell scams or copied content. So, if you are going to attempt the CISA exam, you need to be sure you are buying the right kind of Dumps. All the Dumps PDF available on DumpsPool are as unique and the latest as they can be. Plus, our Practice Question Answers are tested and approved by professionals. Making it the top authentic resource available on the internet. Our expert has made sure the Online Test Engine is free from outdated & fake content, repeated questions, and false plus indefinite information, etc. We make every penny count, and you leave our platform fully satisfied!

ISACA CISA Exam Overview:

Aspect Details
Exam Name CISA (Certified Information Systems Auditor)
Exam Cost $575 (for ISACA members)
Total Time 4 hours
Available Languages English
Passing Marks Scaled score of 450 or higher out of 800
Prerequisites A minimum of five years of professional information systems auditing, control, or security work experience

ISACA Certified Information Systems Auditor (CISA) Exam Topics Breakdown

Domain Percentage Description
Domain 1 - Information System Auditing Process 21% Covers IS audit standards, guidelines, and best practices, and the audit process
Domain 2 - Governance and Management of IT 17% Focuses on IT governance and management principles and practices, including IT strategy, policies, and organizational structure
Domain 3 - Information Systems Acquisition, Development, and Implementation 12% Examines the process of acquiring, developing, testing, and implementing information systems and infrastructure
Domain 4 - Information Systems Operations and Business Resilience 23% Covers IT operations, support, and service management, as well as business continuity and disaster recovery
Domain 5 - Protection of Information Assets 27% Focuses on information asset security and control, including data privacy, confidentiality, integrity, and availability

Isaca CISA Frequently Asked Questions

Isaca CISA Sample Question Answers

Question # 1

Which of the following provides the MOST reliable method of preventing unauthonzed logon?

A. issuing authentication tokens
B. Reinforcing current security policies
C. Limiting after-hours usage
D. Installing an automatic password generator

Question # 2

Which of the following is the BEST control to minimize the risk of unauthorized access to lost company-owned mobile devices?

A. Password/PIN protection
B. Device tracking software
C. Device encryption
D. Periodic backup

Question # 3

Afire alarm system has been installed in the computer room The MOST effective location for the fire alarm control panel would be inside the

A. computer room closest to the uninterruptible power supply (UPS) module
B. computer room closest to the server computers
C. system administrators’ office
D. booth used by the building security personnel

Question # 4

Which of the following is MOST important to consider when developing a service level agreement (SLAP)?

A. Description of the services from the viewpoint of the provider
B. Detailed identification of work to be completed
C. Provisions for regulatory requirements that impact the end users' businesses
D. Description of the services from the viewpoint of the client organization

Question # 5

Which of the following is MOST important during software license audits?

A. Judgmental sampling
B. Substantive testing
C. Compliance testing
D. Stop-or-go sampling

Question # 6

Transaction records from a business database were inadvertently deleted, and system operators decided to restore from a snapshot copy. Which of the following provides assurance that the BEST transactions were recovered successfully?

A. Review transaction recovery logs to ensure no errors were recorded.
B. Recount the transaction records to ensure no records are missing.
C. Rerun the process on a backup machine to verify the results are the same.
D. Compare transaction values against external statements to verify accuracy.

Question # 7

Which of the following should be an IS auditor's PRIMARY focus when evaluating the response process for cybercrimes?

A. Communication with law enforcement
B. Notification to regulators
C. Root cause analysis
D. Evidence collection

Question # 8

When reviewing the functionality of an intrusion detection system (IDS), the IS auditor should be MOST concerned if:

A. legitimate packets blocked by the system have increased
B. actual attacks have not been identified
C. detected events have increased
D. false positives have been reported

Question # 9

What is the MOST effective way to detect installation of unauthorized software packages by employees?

A. Regular scanning of hard drives
B. Communicating the policy to employees
C. Logging of activity on the network
D. Maintaining current antivirus software

Question # 10

An organization has replaced all of the storage devices at its primary data center with new higher-capacity units The replaced devices have been installed at the disaster recovery site to replace older units An IS auditor s PRIMARY concern would be whether

A. the recovery site devices can handle the storage requirements
B. hardware maintenance contract is in place for both old and new storage devices
C. the procurement was in accordance with corporate policies and procedures
D. the relocation plan has been communicated to all concerned parties

Question # 11

An organization's IT risk assessment should include the identification of:

A. vulnerabilities
B. compensating controls
C. business needs
D. business process owners

Question # 12

Which of the following should be of GREATEST concern to an |$ auditor reviewing data conversion and migration during the implementation of a newapplication system?

A. The change management process was not formally documented
B. Backups of the old system and data are not available online
C. Unauthorized data modifications occurred during conversion,
D. Data conversion was performed using manual processes

Question # 13

An organization has recently moved to an agile model for deploying custom code to its inhouse accounting software system. When reviewing the procedures in place for production code deployment, which of the following is the MOST significant security concern to address?

A. Software vulnerability scanning is done on an ad hoc basis.
B. Change control does not include testing and approval from quality assurance (QA).
C. Production code deployment is not automated.
D. Current DevSecOps processes have not been independently verified.

Question # 14

Which of the following are used in a firewall to protect the entity's internal resources?

A. Remote access servers
B. Secure Sockets Layers (SSLs
C. Internet Protocol (IP) address restrictions
D. Failover services

Question # 15

Which of the following should be the PRIMARY role of an internal audit function in the management of identified business risks?

A. Establishing a risk appetite
B. Establishing a risk management framework
C. Validating enterprise risk management (ERM)
D. Operating the risk management framework

Question # 16

Which of the following should be the FIRST step m managing the impact of a recently discovered zero-day attack?

A. Evaluating the likelihood of attack
B. Estimating potential damage
C. Identifying vulnerable assets
D. Assessing the Impact of vulnerabilities

Question # 17

Which of the following provides the BEST audit evidence that a firewall is configured in compliance with the organization's security policy?

A. Analyzing how the configuration changes are performed
B. Analyzing log files
C. Reviewing the rule base
D. Performing penetration testing

Question # 18

Which of the following should an IS auditor recommend be done FIRST when an organization is made aware of a new regulation that is likely to impact IT security requirements?

A. Update security policies based on the new regulation.
B. Determine which systems and IT-related processes may be impacted.
C. Evaluate how security awareness and training content may be impacted.
D. Review the design and effectiveness of existing IT controls.

Question # 19

The FIRST step in auditing a data communication system is to determine:

A. traffic volumes and response-time criteria
B. physical security for network equipment
C. the level of redundancy in the various communication paths
D. business use and types of messages to be transmitted

Question # 20

Which of the following be of GREATEST concern to an IS auditor reviewing on-site preventive maintenance for an organization’s business-critical server hardware?

A. Preventive maintenance costs exceed the business allocated budget.
B. Preventive maintenance has not been approved by the information system
C. Preventive maintenance is outsourced to multiple vendors without requiring nondisclosure agreements (NDAs)
D. The preventive maintenance schedule is based on mean time between failures (MTBF) parameters

Question # 21

Audit frameworks cart assist the IS audit function by:

A. defining the authority and responsibility of the IS audit function.
B. providing details on how to execute the audit program.
C. providing direction and information regarding the performance of audits.
D. outlining the specific steps needed to complete audits

Question # 22

Which type of device sits on the perimeter of a corporate of home network, where it obtains a public IP address and then generates private IP addresses internally?

A. Switch
B. Intrusion prevention system (IPS)
C. Gateway
D. Router

Question # 23

Which of the following is MOST important for an IS auditor to verify when reviewing the use of an outsourcer for disposal of storage media?

A. The vendor's process appropriately sanitizes the media before disposal
B. The contract includes issuance of a certificate of destruction by the vendor
C. The vendor has not experienced security incidents in the past.
D. The disposal transportation vehicle is fully secure

Question # 24

When assessing the overall effectiveness of an organization's disaster recovery planning process, which of the following is MOST important for the IS auditor to verify?

A. Management contracts with a third party for warm site services.
B. Management schedules an annual tabletop exercise.
C. Management documents and distributes a copy of the plan to all personnel.
D. Management reviews and updates the plan annually or as changes occur.

Question # 25

A company requires that all program change requests (PCRs) be approved and all modifications be automatically logged. Which of the following IS audit procedures will BEST determine whether unauthorized changes have been made to production programs?

A. Trace a sample of complete PCR forms to the log of all program changes
B. Use source code comparison software to determine whether any changes have been made to a sample of programs since the last audit date
C. Review a sample of PCRs for proper approval throughout the program change process
D. Trace a sample of program change from the log to completed PCR forms

Question # 26

What would be an IS auditor's BEST course of action when an auditee is unable to close all audit recommendations by the time of the follow-up audit?

A. Ensure the open issues are retained in the audit results.
B. Terminate the follow-up because open issues are not resolved
C. Recommend compensating controls for open issues.
D. Evaluate the residual risk due to open issues.

Question # 27

As part of the architecture of virtualized environments, in a bare metal or native visualization the hypervisor runs without:

A. a host operating system.
B. a guest operating system.
C. any applications on the guest operating system.
D. any applications on the host operating system.

Question # 28

Which of the following indicates that an internal audit organization is structured to support the independence and clarity of the reporting process?

A. Auditors are responsible for performing operational duties or activities.
B. The internal audit manager reports functionally to a senior management official.
C. The internal audit manager has a reporting line to the audit committee.
D. Auditors are responsible for assessing and operating a system of internal controls.

Question # 29

An internal audit team is deciding whether to use an audit management application hosted by a third party in a different country. What should be the MOST important consideration related to the uploading of payroll audit documentation in the hosted application?

A. Financial regulations affecting the organization
B. Data center physical access controls whore the application is hosted
C. Privacy regulations affecting the organization
D. Per-unit cost charged by the hosting services provider for storage

Question # 30

Which of following areas is MOST important for an IS auditor to focus on when reviewing the maturity model for a technology organization?

A. Standard operating procedures
B. Service level agreements (SLAs)
C. Roles and responsibility matrix
D. Business resiliency

Question # 31

An IS auditor is reviewing the perimeter security design of a network. Which of the following provides the GREATEST assurance outgoing Internet traffic is controlled?

A. Intrusion detection system (IDS)
B. Security information and event management (SIEM) system
C. Stateful firewall
D. Load balancer

Question # 32

Backup procedures for an organization's critical data are considered to be which type of control?

A. Directive
B. Corrective
C. Detective
D. Compensating

Question # 33

Which of the following methods will BEST reduce the risk associated with the transition to a new system using technologies that are not compatible with the old system?

A. Parallel changeover
B. Modular changeover
C. Phased operation
D. Pilot operation

Question # 34

Which of the following concerns is MOST effectively addressed by implementing an IT framework for alignment between IT and business objectives?

A. Inaccurate business impact analysis (BIA)
B. Inadequate IT change management practices
C. Lack of a benchmark analysis
D. Inadequate IT portfolio management

Question # 35

Which of the following is the BEST source of information to determine the required level of data protection on a file server?

A. Data classification policy and procedures
B. Access rights of similar file servers
C. Previous data breach incident reports
D. Acceptable use policy and privacy statements

Question # 36

An IS auditor has been tasked to review the processes that prevent fraud within a business expense claim system. Which of the following stakeholders is MOST important to involve in this review?

A. Information security manager
B. Quality assurance (QA) manager
C. Business department executive
D. Business process owner

Question # 37

Which of the following should be the GREATEST concern to an IS auditor reviewing an organization's method to transport sensitive data between offices?

A. The method relies exclusively on the use of asymmetric encryption algorithms.
B. The method relies exclusively on the use of 128-bit encryption.
C. The method relies exclusively on the use of digital signatures.
D. The method relies exclusively on the use of public key infrastructure (PKI).

Question # 38

Which of the following is the MAJOR advantage of automating internal controls?

A. To enable the review of large value transactions
B. To efficiently test large volumes of data
C. To help identity transactions with no segregation of duties
D. To assist in performing analytical reviews

Question # 39

Which of the following is the BEST methodology to use for estimating the complexity of developing a large business application?

A. Function point analysis
B. Work breakdown structure
C. Critical path analysts
D. Software cost estimation

Question # 40

An IS auditor learns a server administration team regularly applies workarounds to address repeated failures of critical data processing services Which of the following would BEST enable the organization to resolve this issue?

A. Problem management
B. Incident management
C. Service level management
D. Change management

Question # 41

Which of the following methods BEST enforces data leakage prevention in a multi-tenant cloud environment?

A. Monitoring tools are configured to alert in case of downtime
B. A comprehensive security review is performed every quarter.
C. Data for different tenants is segregated by database schema
D. Tenants are required to implement data classification polices

Question # 42

Which of the following provides the MOST useful information for performing a business impact analysis (B1A)?

A. inventory of relevant business processes
B. Policies for business procurement
C. Documentation of application configurations
D. Results of business resumption planning efforts

Question # 43

Which of the following is the PRIMARY reason for an IS audit manager to review the work performed by a senior IS auditor prior to presentation of a report?

A. To ensure the conclusions are adequately supported
B. To ensure adequate sampling methods were used during fieldwork
C. To ensure the work is properly documented and filed
D. To ensure the work is conducted according to industry standards

Question # 44

To mitigate the risk of exposing data through application programming interface (API) queries. which of the following design considerations is MOST important?

A. Data retention
B. Data minimization
C. Data quality
D. Data integrity

Question # 45

When planning an audit, it is acceptable for an IS auditor to rely on a third-party provider’s external audit report on service level management when the

A. scope and methodology meet audit requirements
B. service provider is independently certified and accredited
C. report confirms that service levels were not violated
D. report was released within the last 12 months

Question # 46

Which of the following is the PRIMARY advantage of using virtualization technology for corporate applications?

A. Stronger data security
B. Better utilization of resources
C. Increased application performance
D. Improved disaster recovery

Question # 47

Which of the following is the MOST important outcome of an information security program?

A. Operating system weaknesses are more easily identified.
B. Emerging security technologies are better understood and accepted.
C. The cost to mitigate information security risk is reduced.
D. Organizational awareness of security responsibilities is improved.

Question # 48

A programmer has made unauthorized changes lo key fields in a payroll system report. Which of the following control weaknesses would have contributed MOST to this problem?

A. The programmer did not involve the user in testing
B. The user requirements were not documented
C. The programmer has access to the production programs
D. Payroll files were not under the control of a librarian

Question # 49

Which of the following is the MOST appropriate control to ensure integrity of online orders?

A. Data Encryption Standard (DES)
B. Digital signature
C. Public key encryption
D. Multi-factor authentication

Question # 50

Which of the following provides an IS auditor assurance that the interface between a pointof-sale (POS) system and the general ledger is transferring sales data completely and accurately?

A. Electronic copies of customer sales receipts are maintained.
B. Monthly bank statements are reconciled without exception.
C. Nightly batch processing has been replaced with real-time processing.
D. The data transferred over the POS interface is encrypted.

Question # 51

As part of business continuity planning, which of the following is MOST important to assess when conducting a business impact analysis (B1A)?

A. Risk appetite
B. Critical applications m the cloud
C. Completeness of critical asset inventory
D. Recovery scenarios

Question # 52

The use of control totals satisfies which of the following control objectives? 

A. Transaction integrity
B. Processing integrity
C. Distribution control
D. System recoverability

Question # 53

An IS auditor identifies that a legacy application to be decommissioned in three months cannot meet the security requirements established by the current policy. What is the BEST way (or the auditor to address this issue?

A. Recommend the application be patched to meet requirements.
B. Inform the IT director of the policy noncompliance.
C. Verify management has approved a policy exception to accept the risk.
D. Take no action since the application will be decommissioned in three months.

Question # 54

An organization is shifting to a remote workforce In preparation the IT department is performing stress and capacity testing of remote access infrastructure and systems What type of control is being implemented?

A. Directive
B. Detective
C. Preventive
D. Compensating

Question # 55

An auditee disagrees with a recommendation for corrective action that appears in the draft engagement report. Which of the following is the IS auditor's BEST course of action when preparing the final report?

A. Come to an agreement prior to issuing the final report.
B. Include the position supported by senior management in the final engagement report
C. Ensure the auditee's comments are included in the working papers
D. Exclude the disputed recommendation from the final engagement report

Question # 56

Due to advancements in technology and electronic records, an IS auditor has completed an engagement by email only. Which of the following did the IS auditor potentially compromise?

A. Proficiency
B. Due professional care
C. Sufficient evidence
D. Reporting

Question # 57

The use of access control lists (ACLs) is the MOST effective method to mitigate security risk for routers because they: (Identify Correct answer and related explanation/references from CISA Certification - Information Systems Auditor official Manual or book)

A. are recommended by security standards.
B. can limit Telnet and traffic from the open Internet.
C. act as fitters between the world and the network.
D. can detect cyberattacks.

Question # 58

Users are complaining that a newly released enterprise resource planning (ERP) system is functioning too slowly. Which of the following tests during the quality assurance (QA) phase would have identified this concern?

A. Stress
B. Regression
C. Interface
D. Integration

Question # 59

Which of the following is MOST important to define within a disaster recovery plan (DRP)?

A. Business continuity plan (BCP)
B. Test results for backup data restoration
C. A comprehensive list of disaster recovery scenarios and priorities
D. Roles and responsibilities for recovery team members

Question # 60

An IS auditor Is renewing the deployment of a new automated system Which of the following findings presents the MOST significant risk?

A. The new system has resulted m layoffs of key experienced personnel.
B. Users have not been trained on the new system.
C. Data from the legacy system is not migrated correctly to the new system.
D. The new system is not platform agnostic

Question # 61

During a database management evaluation an IS auditor discovers that some accounts with database administrator (DBA) privileges have been assigned a default password with an unlimited number of failed login attempts Which of the following is the auditor's BEST course of action?

A. Identify accounts that have had excessive failed login attempts and request they be disabled
B. Request the IT manager to change administrator security parameters and update the finding
C. Document the finding and explain the risk of having administrator accounts with inappropriate security settings

Question # 62

Which of the following should be of GREATEST concern to an IS auditor assessing the effectiveness of an organization's vulnerability scanning program''

A. Steps taken to address identified vulnerabilities are not formally documented
B. Results are not reported to individuals with authority to ensure resolution
C. Scans are performed less frequently than required by the organization's vulnerability scanning schedule
D. Results are not approved by senior management

Question # 63

Which of the following BEST addresses the availability of an online store?

A. RAID level 5 storage devices
B. Online backups
C. A mirrored site at another location
D. Clustered architecture

Question # 64

Which of the following would be the BEST process for continuous auditing to a large financial Institution?

A. Testing encryption standards on the disaster recovery system
B. Validating access controls for real-time data systems
C. Performing parallel testing between systems
D. Validating performance of help desk metrics

Question # 65

When testing the accuracy of transaction data, which of the following situations BEST justifies the use of a smaller sample size?

A. The IS audit staff has a high level of experience.
B. It is expected that the population is error-free.
C. Proper segregation of duties is in place.
D. The data can be directly changed by users.

Question # 66

During a routine internal software licensing review, an IS auditor discovers instances where employees shared license keys to critical pieces of business software. Which of the following would be the auditor's BEST course of action?

A. Recommend the utilization of software licensing monitoring tools
B. Recommend the purchase of additional software license keys
C. Validate user need for shared software licenses
D. Verify whether the licensing agreement allows shared use

Question # 67

Which of the following is the PRIMARY reason to perform a risk assessment?

A. To determine the current risk profile
B. To ensure alignment with the business impact analysis (BIA)
C. To achieve compliance with regulatory requirements
D. To help allocate budget for risk mitigation controls

Question # 68

Which of the following should be of GREATEST concern to an IS auditor who is assessing an organization's configuration and release management process?

A. The organization does not use an industry-recognized methodology
B. Changes and change approvals are not documented
C. All changes require middle and senior management approval
D. There is no centralized configuration management database (CMDB)

Question # 69

Which of the following is MOST useful to an IS auditor performing a review of access controls for a document management system?

A. Policies and procedures for managing documents provided by department heads
B. A system-generated list of staff and their project assignments. roles, and responsibilities
C. Previous audit reports related to other departments' use of the same system
D. Information provided by the audit team lead an the authentication systems used by the department

Question # 70

Which of the following is a PRIMARY responsibility of an IT steering committee?

A. Prioritizing IT projects in accordance with business requirements
B. Reviewing periodic IT risk assessments
C. Validating and monitoring the skill sets of IT department staff
D. Establishing IT budgets for the business

Question # 71

Which of the following is the BEST way to address potential data privacy concerns associated with inadvertent disclosure of machine identifier information contained within security logs?

A. Unit the use of logs to only those purposes for which they were collected
B. Restrict the transfer of log files from host machine to online storage
C. Only collect logs from servers classified as business critical
D. Limit log collection to only periods of increased security activity

Question # 72

Which of the following is the BEST way to help ensure new IT implementations align with enterprise architecture (EA) principles and requirements?

A. Document the security view as part of the EA
B. Consider stakeholder concerns when defining the EA
C. Perform mandatory post-implementation reviews of IT implementations
D. Conduct EA reviews as part of the change advisory board

Question # 73

Which of the following is the BEST indication to an IS auditor that management's postimplementation review was effective?

A. Lessons learned were documented and applied.
B. Business and IT stakeholders participated in the post-implementation review.
C. Post-implementation review is a formal phase in the system development life cycle (SDLC).
D. Internal audit follow-up was completed without any findings.

Question # 74

Which of the following provides the MOST useful information to an IS auditor when selecting projects for inclusion in an IT audit plan?

A. Project charter
B. Project plan
C. Project issue log
D. Project business case

Question # 75

An IS auditor learns that an in-house system development life cycle (SDLC) project has not met user specifications. The auditor should FIRST examine requirements from which of the following phases?

A. Configuration phase
B. User training phase
C. Quality assurance (QA) phase
D. Development phase

Question # 76

During the discussion of a draft audit report IT management provided suitable evidence that a process has been implemented for a control that had been concluded by the IS auditor as ineffective Which of the following is the auditor's BEST action?

A. Explain to IT management that the new control will be evaluated during follow-up
B. Add comments about the action taken by IT management in the report
C. Change the conclusion based on evidence provided by IT management
D. Re-perform the audit before changing the conclusion

Question # 77

Which of the following is the BEST source of information for examining the classification of new data?

A. Input by data custodians
B. Security policy requirements
C. Risk assessment results
D. Current level of protection

Question # 78

Which of the following is the MOST important Issue for an IS auditor to consider with regard to Voice-over IP (VoIP) communications?

A. Continuity of service
B. Identity management
C. Homogeneity of the network
D. Nonrepudiation

Question # 79

Which of the following should be the FIRST consideration when deciding whether data should be moved to a cloud provider for storage?

A. Data storage costs
B. Data classification
C. Vendor cloud certification
D. Service level agreements (SLAs)

Question # 80

An organization is migrating its HR application to an Infrastructure as a Service (laaS) model in a private cloud. Who is PRIMARILY responsible for the security configurations of the deployed application's operating system?

A. The cloud provider's external auditor
B. The cloud provider
C. The operating system vendor
D. The organization

Question # 81

Which of the following should be restricted from a network administrator's privileges in an adequately segregated IT environment?

A. Monitoring network traffic
B. Changing existing configurations for applications
C. Hardening network ports
D. Ensuring transmission protocols are functioning correctly

Question # 82

An organization has engaged a third party to implement an application to perform businesscritical calculations. Which of the following is the MOST important process to help ensure the application provides accurate calculations?

A. Key performance indicator (KPI) monitoring
B. Change management
C. Configuration management
D. Quality assurance (QA)

Question # 83

Which of the following would BEST help to ensure that an incident receives attention from appropriate personnel in a timely manner?

A. Completing the incident management log
B. Broadcasting an emergency message
C. Requiring a dedicated incident response team
D. Implementing incident escalation procedures

Question # 84

An IS auditor conducts a review of a third-party vendor's reporting of key performance indicators (KPIs) Which of the following findings should be of MOST concern to the auditor?

A. KPI data is not being analyzed
B. KPIs are not clearly defined
C. Some KPIs are not documented
D. KPIs have never been updated

Question # 85

A vendor requires privileged access to a key business application. Which of the following is the BEST recommendation to reduce the risk of data leakage?

A. Implement real-time activity monitoring for privileged roles
B. Include the right-to-audit in the vendor contract
C. Perform a review of privileged roles and responsibilities
D. Require the vendor to implement job rotation for privileged roles

Question # 86

Which of the following should an organization do to anticipate the effects of a disaster?

A. Define recovery point objectives (RPO)
B. Simulate a disaster recovery
C. Develop a business impact analysis (BIA)
D. Analyze capability maturity model gaps

Question # 87

Which of the following is the BEST indication of effective IT investment management?

A. IT investments are implemented and monitored following a system development life cycle (SDLC)
B. IT investments are mapped to specific business objective
C. Key performance indicators (KPIs) are defined for each business requiring IT Investment
D. The IT Investment budget is significantly below industry benchmarks

Question # 88

Which of the following BEST enables an organization to improve the visibility of end-user computing (EUC) applications that support regulatory reporting?

A. EUC inventory
B. EUC availability controls
C. EUC access control matrix
D. EUC tests of operational effectiveness

Question # 89

Which of the following findings should be of GREATEST concern to an IS auditor assessing the risk associated with end-user computing (EUC) in an organization?

A. Insufficient processes to track ownership of each EUC application?
B. Insufficient processes to lest for version control
C. Lack of awareness training for EUC users
D. Lack of defined criteria for EUC applications

Question # 90

Which of the following management decisions presents the GREATEST risk associated with data leakage?

A. There is no requirement for desktops to be encrypted
B. Staff are allowed to work remotely
C. Security awareness training is not provided to staff
D. Security policies have not been updated in the past year

Question # 91

When assessing a proposed project for the two-way replication of a customer database with a remote call center, the IS auditor should ensure that:

A. database conflicts are managed during replication.
B. end users are trained in the replication process.
C. the source database is backed up on both sites.
D. user rights are identical on both databases.

Question # 92

Which of following is MOST important to determine when conducting a post-implementation review?

A. Whether the solution architecture compiles with IT standards
B. Whether success criteria have been achieved
C. Whether the project has been delivered within the approved budget
D. Whether lessons teamed have been documented

Question # 93

Which of the following is the MOST effective control to mitigate against the risk of inappropriate activity by employees?

A. User activity monitoring
B. Two-factor authentication
C. Network segmentation
D. Access recertification  

Question # 94

The charging method that effectively encourages the MOST efficient use of IS resources is:

A. specific charges that can be tied back to specific usage.
B. total utilization to achieve full operating capacity.
C. residual income in excess of actual incurred costs.
D. allocations based on the ability to absorb charges.

Question # 95

Which of the following is an advantage of using agile software development methodology over the waterfall methodology? 

A. Less funding required overall
B. Quicker deliverables
C. Quicker end user acceptance
D. Clearly defined business expectations

Question # 96

During which phase of the software development life cycle is it BEST to initiate the discussion of application controls?

A. Business case development phase when stakeholders are identified
B. Application design phase process functionalities are finalized
C. User acceptance testing (UAT) phase when test scenarios are designed
D. Application coding phase when algorithms are developed to solve business problems

Question # 97

Which of the following would be the BEST criteria for monitoring an IT vendor's service levels?

A. Service auditor's report
B. Performance metrics
C. Surprise visit to vendor
D. Interview with vendor

Question # 98

When classifying information, it is MOST important to align the classification to:

A. business risk
B. security policy
C. data retention requirements
D. industry standards

Question # 99

What is the BEST way to reduce the risk of inaccurate or misleading data proliferating through business intelligence systems?

A. Establish rules for converting data from one format to another
B. Implement data entry controls for new and existing applications
C. Implement a consistent database indexing strategy
D. Develop a metadata repository to store and access metadata

Question # 100

Which of the following is the PRIMARY purpose of obtaining a baseline image during an operating system audit?

A. To identify atypical running processes
B. To verify antivirus definitions
C. To identify local administrator account access
D. To verify the integrity of operating system backups

Question # 101

Which of the following can only be provided by asymmetric encryption?

A. Information privacy
B. 256-brt key length
C. Data availability
D. Nonrepudiation

Question # 102

An IT governance body wants to determine whether IT service delivery is based on consistently effective processes. Which of the following is the BEST approach?

A. implement a control self-assessment (CSA)
B. Conduct a gap analysis
C. Develop a maturity model
D. Evaluate key performance indicators (KPIs)

Question # 103

Which of the following is the MOST important factor when an organization is developing information security policies and procedures?

A. Consultation with security staff
B. Inclusion of mission and objectives
C. Compliance with relevant regulations
D. Alignment with an information security framework

Question # 104

Which of the following should an IS auditor review when evaluating information systems governance for a large organization?

A. Approval processes for new system implementations
B. Procedures for adding a new user to the invoice processing system
C. Approval processes for updating the corporate website
D. Procedures for regression testing system changes

Question # 105

An IS auditor is reviewing a data conversion project Which of the following is the auditor's BEST recommendation prior to go-live?

A. Review test procedures and scenarios
B. Conduct a mock conversion test
C. Establish a configuration baseline
D. Automate the test scripts

Question # 106

The BEST way to prevent fraudulent payments is to implement segregation of duties between the vendor setup and:

A. payment processing.
B. payroll processing.
C. procurement.
D. product registration.

Question # 107

The PRIMARY benefit of automating application testing is to:

A. provide test consistency.
B. provide more flexibility.
C. replace all manual test processes.
D. reduce the time to review code.

Question # 108

Which of the following is MOST helpful to an IS auditor when assessing the effectiveness of controls?

A. A control self-assessment (CSA)
B. Results of control testing
C. Interviews with management
D. A control matrix

Question # 109

Which of the following should be the FIRST step to successfully implement a corporate data classification program?

A. Approve a data classification policy.
B. Select a data loss prevention (DLP) product.
C. Confirm that adequate resources are available for the project.
D. Check for the required regulatory requirements.

Question # 110

An IS auditor concludes that logging and monitoring mechanisms within an organization are ineffective because critical servers are not included within the central log repository. Which of the following audit procedures would have MOST likely identified this exception?

A. Inspecting a sample of alerts generated from the central log repository
B. Comparing a list of all servers from the directory server against a list of all servers present in the central log repository
C. Inspecting a sample of alert settings configured in the central log repository
D. Comparing all servers included in the current central log repository with the listing used for the prior-year audit

Question # 111

Which of the following is the BEST way to sanitize a hard disk for reuse to ensure the organization's information cannot be accessed?

A. Re-partitioning
B. Degaussing
C. Formatting
D. Data wiping

Question # 112

Which of the following should be an IS auditor's GREATEST concern when a data owner assigns an incorrect classification level to data?

A. Controls to adequately safeguard the data may not be applied.
B. Data may not be encrypted by the system administrator.
C. Competitors may be able to view the data.
D. Control costs may exceed the intrinsic value of the IT asset.

Question # 113

An organization is planning to implement a work-from-home policy that allows users to work remotely as needed. Which of the following is the BEST solution for ensuring secure remote access to corporate resources?

A. Additional firewall rules
B. Multi-factor authentication
C. Virtual private network (VPN)
D. Virtual desktop

Question # 114

What is the PRIMARY purpose of performing a parallel run of a now system?

A. To train the end users and supporting staff on the new system
B. To verify the new system provides required business functionality
C. To reduce the need for additional testing
D. To validate the new system against its predecessor

Question # 115

Which of the following is the PRIMARY role of key performance indicators (KPIs) in supporting business process effectiveness?

A. To enable conclusions about me performance of the processes and target variances tor follow-up analysis
B. To analyze workflows in order to optimize business processes and eliminate tasks that do not provide value
C. To assess the functionality of a software deliverable based on business processes 

Question # 116

Which of the following is MOST important to consider when reviewing an organization's defined data backup and restoration procedures?

A. Business continuity plan (BCP)
B. Recovery point objective (RPO)
C. Mean time to restore (MTTR)
D. Mean time between failures (MTBF)

Question # 117

What is the PRIMARY benefit of using one-time passwords?

A. An intercepted password cannot be reused
B. Security for applications can be automated
C. Users do not have to memorize complex passwords
D. Users cannot be locked out of an account

Question # 118

What should an IS auditor do FIRST when a follow-up audit reveals some management action plans have not been initiated?

A. Confirm whether the identified risks are still valid.
B. Provide a report to the audit committee.
C. Escalate the lack of plan completion to executive management.
D. Request an additional action plan review to confirm the findings.

Question # 119

Which of the following poses the GREATEST risk to an organization when employees use public social networking sites?

A. Cross-site scripting (XSS)
B. Copyright violations
C. Social engineering
D. Adverse posts about the organization

Question # 120

During a project assessment, an IS auditor finds that business owners have been removed from the project initiation phase. Which of the following should be the auditor's GREATEST concern with this situation?

A. Unrealistic milestones
B. Inadequate deliverables
C. Unclear benefits
D. Incomplete requirements

Question # 121

An IS auditor is evaluating the progress of a web-based customer service application development project. Which of the following would be MOST helpful for this evaluation?

A. Backlog consumption reports
B. Critical path analysis reports
C. Developer status reports
D. Change management logs  

Question # 122

Which of the following is a concern associated with virtualization?

A. The physical footprint of servers could decrease within the data center.
B. Performance issues with the host could impact the guest operating systems.
C. Processing capacity may be shared across multiple operating systems.
D. One host may have multiple versions of the same operating system.

Question # 123

An IS auditor is performing a follow-up audit for findings identified in an organization's user provisioning process Which of the following is the MOST appropriate population to sample from when testing for remediation?

 A. All users provisioned after the finding was originally identified
B. All users provisioned after management resolved the audit issue
C. All users provisioned after the final audit report was issued
D. All users who have followed user provisioning processes provided by management

Question # 124

When reviewing a project to replace multiple manual data entry systems with an artificial intelligence (Al) system, the IS auditor should be MOST concerned with the impact Al will have on

A. employee retention
B. enterprise architecture (EA)
C. future task updates
D. task capacity output

Question # 125

An IS auditor requests direct access to data required to perform audit procedures instead of asking management to provide the data Which of the following is the PRIMARY advantage of this approach?

A. Audit transparency
B. Data confidentiality
C. Professionalism
D. Audit efficiency

Question # 126

Which of the following BEST enables alignment of IT with business objectives?

A. Benchmarking against peer organizations
B. Developing key performance indicators (KPIs)
C. Completing an IT risk assessment
D. Leveraging an IT governance framework

Question # 127

Which of the following is the BEST approach for determining the overall IT risk appetite of an organization when business units use different methods formanaging IT risks?

A. Average the business units’ IT risk levels
B. Identify the highest-rated IT risk level among the business units
C. Prioritize the organization's IT risk scenarios
D. Establish a global IT risk scoring criteria

Question # 128

A computer forensic audit is MOST relevant in which of the following situations?

A. Inadequate controls in the IT environment
B. Mismatches in transaction data
C. Missing server patches
D. Data loss due to hacking of servers

Question # 129

Which of the following is the BEST indication that there are potential problems within an organization's IT service desk function? 

A. Undocumented operating procedures
B. Lack of segregation of duties
C. An excessive backlog of user requests
D. Lack of key performance indicators (KPIs)

Question # 130

While evaluating the data classification process of an organization, an IS auditor's PRIMARY focus should be on whether:

A. data classifications are automated.
B. a data dictionary is maintained.
C. data retention requirements are clearly defined.
D. data is correctly classified.

Question # 131

Which of the following provides the MOST useful information regarding an organization's risk appetite and tolerance?

A. Gap analysis
B. Audit reports
C. Risk profile
D. Risk register

Question # 132

An IS auditor is concerned that unauthorized access to a highly sensitive data center might be gained by piggybacking or tailgating. Which of the following is the BEST recommendation? (Choose Correct answer and give explanation from CISA Certification - Information Systems Auditor official book)

A. Biometrics
B. Procedures for escorting visitors
C. Airlock entrance
D. Intruder alarms

Question # 133

In which phase of the internal audit process is contact established with the individuals responsible for the business processes in scope for review?

A. Planning phase
B. Execution phase
C. Follow-up phase
D. Selection phase

Question # 134

Which of the following provides the BEST evidence that a third-party service provider's information security controls are effective?

 A. An audit report of the controls by the service provider's external auditor
B. Documentation of the service provider's security configuration controls
C. An interview with the service provider's information security officer
D. A review of the service provider's policies and procedures

Question # 135

Which of the following analytical methods would be MOST useful when trying to identify groups with similar behavior or characteristics in a large population?

A. Deviation detection
B. Cluster sampling
C. Random sampling
D. Classification

Question # 136

Which of the following BEST protects evidence in a forensic investigation?

A. imaging the affected system
B. Powering down the affected system
C. Protecting the hardware of the affected system
D. Rebooting the affected system

Question # 137

One advantage of monetary unit sampling is the fact that

A. results are stated m terms of the frequency of items in error
B. it can easily be applied manually when computer resources are not available
C. large-value population items are segregated and audited separately
D. it increases the likelihood of selecting material items from the population

Question # 138

Which of the following is MOST important for an IS auditor to verify when evaluating an organization's data conversion andinfrastructure migration plan?

A. Strategic: goals have been considered.
B. A rollback plan is included.
C. A code check review is included.
D. A migration steering committee has been formed.

Question # 139

Which of the following testing methods is MOST appropriate for assessing whether system integrity has been maintained after changes have been made?

A. Regression testing
B. Unit testing
C. Integration testing
D. Acceptance testing

Question # 140

Which of the following is the MOST effective method of destroying sensitive data stored on electronic media?

A. Degaussing
B. Random character overwrite
C. Physical destruction
D. Low-level formatting

Question # 141

Which of the following should be of GREATEST concern to an IS auditor when auditing an organization's IT strategy development process?

A. The IT strategy was developed before the business plan
B. A business impact analysis (BIA) was not performed to support the IT strategy
C. The IT strategy was developed based on the current IT capability
D. Information security was not included as a key objective m the IT strategic plan.

Question # 142

Which of the following is the BEST way to prevent social engineering incidents?

A. Maintain an onboarding and annual security awareness program.
B. Ensure user workstations are running the most recent version of antivirus software.
C. Include security responsibilities in job descriptions and require signed acknowledgment.
D. Enforce strict email security gateway controls

Question # 143

A characteristic of a digital signature is that it

A. is under control of the receiver
B. is unique to the message
C. is validated when data are changed
D. has a reproducible hashing algorithm

Question # 144

Management has learned the implementation of a new IT system will not be completed on time and has requested an audit. Which of the following audit findings should be of GREATEST concern?

A. The actual start times of some activities were later than originally scheduled.
B. Tasks defined on the critical path do not have resources allocated.
C. The project manager lacks formal certification.
D. Milestones have not been defined for all project products.

Question # 145

Which of the following is MOST important for an IS auditor to validate when auditing network device management?

A. Devices cannot be accessed through service accounts.
B. Backup policies include device configuration files.
C. All devices have current security patches assessed.
D. All devices are located within a protected network segment.

Question # 146

Which of the following is the GREATEST risk if two users have concurrent access to the same database record?

A. Availability integrity
B. Data integrity
C. Entity integrity
D. Referential integrity

Question # 147

Which of the following is the BEST performance indicator for the effectiveness of an incident management program?

A. Average time between incidents
B. Incident alert meantime
C. Number of incidents reported
D. Incident resolution meantime

Question # 148

The operations team of an organization has reported an IS security attack Which of the following should be the FIRST step for the security incident response team?

A. Report results to management
B. Document lessons learned
C. Perform a damage assessment
D. Prioritize resources for corrective action

Question # 149

Capacity management tools are PRIMARILY used to ensure that:

A. available resources are used efficiently and effectively
B. computer systems are used to their maximum capacity most of the time
C. concurrent use by a large number of users is enabled
D. proposed hardware acquisitions meet capacity requirements

Question # 150

Which of the following provides the MOST assurance of the integrity of a firewall log?

A. The log is reviewed on a monthly basis.
B. Authorized access is required to view the log.
C. The log cannot be modified.
D. The log is retained per policy.

Question # 151

In an IT organization where many responsibilities are shared which of the following is the BEST control for detecting unauthorized data changes?

A. Users are required to periodically rotate responsibilities 
B. Segregation of duties conflicts are periodically reviewed
C. Data changes are independently reviewed by another group
D. Data changes are logged in an outside application

Question # 152

An organization outsourced its IS functions to meet its responsibility for disaster recovery, the organization should:

A. discontinue maintenance of the disaster recovery plan (DRP>
B. coordinate disaster recovery administration with the outsourcing vendor
C. delegate evaluation of disaster recovery to a third party
D. delegate evaluation of disaster recovery to internal audit

Question # 153

In which of the following system development life cycle (SDLC) phases would an IS auditor expect to find that controls have been incorporated into system specifications?

A. Implementation
B. Development
C. Feasibility
D. Design

Question # 154

Which of the following should be of GREATEST concern to an IS auditor conducting an audit of an organization that recently experienced a ransomware attack?

A. Antivirus software was unable to prevent the attack even though it was properly updated
B. The most recent security patches were not tested prior to implementation
C. Backups were only performed within the local network
D. Employees were not trained on cybersecurity policies and procedures

Question # 155

Which of the following is the BEST indicator for measuring performance of IT help desk function?

A. Percentage of problems raised from incidents
B. Mean time to categorize tickets
C. Number 0t incidents reported
D. Number of reopened tickets

Question # 156

Which of the following is a method to prevent disclosure of classified documents printed on a shared printer?

A. Using passwords to allow authorized users to send documents to the printer
B. Requiring a key code to be entered on the printer to produce hard copy
C. Encrypting the data stream between the user's computer and the printer
D. Producing a header page with classification level for printed documents 

Question # 157

An IS auditor is evaluating the access controls for a shared customer relationship management (CRM) system. Which of the following would be the GREATEST concern?

A. Single sign-on is not enabled
B. Audit logging is not enabled
C. Security baseline is not consistently applied
D. Complex passwords are not required

Question # 158

An incident response team has been notified of a virus outbreak in a network subnet. Which of the following should be the NEXT step?

A. Verify that the compromised systems are fully functional
B. Focus on limiting the damage 
C. Document the incident
D. Remove and restore the affected systems

Question # 159

An organization is concerned with meeting new regulations for protecting data confidentiality and asks an IS auditor to evaluate their procedures for transporting data. Which of the following would BEST support the organization's objectives? 

A. Cryptographic hashes
B. Virtual local area network (VLAN)
C. Encryption
D. Dedicated lines

Question # 160

Which of the following is me GREATE ST impact as a result of the ongoing deterioration of a detective control?

A. Increased number of false negatives in security logs
B. Decreased effectiveness of roof cause analysis
C. Decreased overall recovery time
D. Increased demand for storage space for logs

Question # 161

Which of the following is the GREATEST advantage of vulnerability scanning over penetration testing?

A. The testing produces a lower number of false positive results
B. Network bandwidth is utilized more efficiently
C. Custom-developed applications can be tested more accurately
D. The testing process can be automated to cover large groups of assets

Question # 162

Which of the following findings should be of GREATEST concern to an IS auditor reviewing an organization s newly implemented online security awareness program'? 

A. Only new employees are required to attend the program
B. Metrics have not been established to assess training results
C. Employees do not receive immediate notification of results
D. The timing for program updates has not been determined

Question # 163

Which of the following is the BEST way to verify the effectiveness of a data restoration process?

A. Performing periodic reviews of physical access to backup media
B. Performing periodic complete data restorations
C. Validating off ne backups using software utilities
D. Reviewing and updating data restoration policies annually

Question # 164

Which of the following is MOST important to determine when conducting an audit Of an organization's data privacy practices?

A. Whether a disciplinary process is established for data privacy violations
B. Whether strong encryption algorithms are deployed for personal data protection
C. Whether privacy technologies are implemented for personal data protection
D. Whether the systems inventory containing personal data is maintained

Question # 165

Which of the following is the MOST important responsibility of user departments associated with program changes?

A. Providing unit test data
B. Analyzing change requests
C. Updating documentation lo reflect latest changes
D. Approving changes before implementation

Question # 166

A data center's physical access log system captures each visitor's identification document numbers along with the visitor's photo. Which of the following sampling methods would be MOST useful to an IS auditor conducting compliance testing for the effectiveness of the system?

A. Quota sampling
B. Haphazard sampling
C. Attribute sampling
D. Variable sampling

Question # 167

A database administrator (DBA) should be prevented from having end user responsibilities:

A. having end user responsibilities
B. accessing sensitive information
C. having access to production files
D. using an emergency user ID

Question # 168

Which of the following is the BEST reason for an IS auditor to emphasize to management the importance of using an IT governance framework?

A. Frameworks enable IT benchmarks against competitors
B. Frameworks can be tailored and optimized for different organizations
C. Frameworks help facilitate control self-assessments (CSAs)
D. Frameworks help organizations understand and manage IT risk

Question # 169

An organization has implemented a distributed security administration system to replace the previous centralized one. Which of the following presents the GREATEST potential concern?

A. Security procedures may be inadequate to support the change
B. A distributed security system is inherently a weak security system
C. End-user acceptance of the new system may be difficult to obtain
D. The new system will require additional resources

Question # 170

Demonstrated support from which of the following roles in an organization has the MOST influence over information security governance?

A. Chief information security officer (CISO)
B. Information security steering committee
C. Board of directors
D. Chief information officer (CIO)

Question # 171

After delivering an audit report, the audit manager discovers that evidence was overlooked during the audit This evidence indicates that a procedural control may have failed and could contradict a conclusion of the audit Which of the following risks is MOST affected by this oversight?

A. Inherent
B. Operational
C. Audit
D. Financial

Question # 172

When auditing the feasibility study of a system development project, the IS auditor should:

A. review qualifications of key members of the project team.
B. review the request for proposal (RFP) to ensure that it covers the scope of work.
C. review cost-benefit documentation for reasonableness.
D. ensure that vendor contracts are reviewed by legal counsel.

Question # 173

The use of which of the following is an inherent risk in the application container infrastructure?

A. Shared registries
B. Host operating system
C. Shared data
D. Shared kernel

Question # 174

A disaster recovery plan (DRP) should include steps for:

A. assessing and quantifying risk.
B. negotiating contracts with disaster planning consultants.
C. identifying application control requirements.
D. obtaining replacement supplies.

Question # 175

An IS auditor engaged in developing the annual internal audit plan learns that the chief information officer (CIO) has requested there be no IS audits in the upcoming year as more time is needed to address a large number of recommendations from the previous year. Which of the following should the auditor do FIRST

A. Escalate to audit management to discuss the audit plan
B. Notify the chief operating officer (COO) and discuss the audit plan risks
C. Exclude IS audits from the upcoming year's plan
D. Increase the number of IS audits in the clan

Question # 176

Which of the following is MOST important for an IS auditor to review when determining whether IT investments are providing value to tie business?

A. Return on investment (ROI)
B. Business strategy
C. Business cases
D. Total cost of ownership (TCO)

Question # 177

Which of the following should be the FIRST step when conducting an IT risk assessment?

A. Identify potential threats.
B. Assess vulnerabilities.
C. Identify assets to be protected.
D. Evaluate controls in place. 

Question # 178

An IS auditor is asked to review an organization's technology relationships, interfaces, and data. Which of the following enterprise architecture (EA) areas is MOST appropriate this review? (Choose Correct answer and give explanation from CISA Certification - Information Systems Auditor official book)

A. Reference architecture
B. Infrastructure architecture
C. Information security architecture
D. Application architecture

Question # 179

Which of the following provides the BEST assurance of data integrity after file transfers?

A. Check digits
B. Monetary unit sampling
C. Hash values
D. Reasonableness check

Question # 180

A CFO has requested an audit of IT capacity management due to a series of finance system slowdowns during month-end reporting. What would be MOST important to consider before including this audit in the program?

A. Whether system delays result in more frequent use of manual processing
B. Whether the system's performance poses a significant risk to the organization
C. Whether stakeholders are committed to assisting with the audit
D. Whether internal auditors have the required skills to perform the audit

Question # 181

in a post-implantation Nation review of a recently purchased system it is MOST important for the iS auditor to determine whether the:

A. stakeholder expectations were identified
B. vendor product offered a viable solution.
C. user requirements were met.
D. test scenarios reflected operating activities. 

Question # 182

A web proxy server for corporate connections to external resources reduces organizational risk by:

A. anonymizing users through changed IP addresses.
B. providing multi-factor authentication for additional security.
C. providing faster response than direct access.
D. load balancing traffic to optimize data pathways.

Question # 183

Which of the following BEST describes an audit risk?

A. The company is being sued for false accusations.
B. The financial report may contain undetected material errors.
C. Employees have been misappropriating funds.
D. Key employees have not taken vacation for 2 years.

Question # 184

Which of the following is MOST appropriate to prevent unauthorized retrieval of confidential information stored in a business application system?

A. Apply single sign-on for access control
B. Implement segregation of duties.
C. Enforce an internal data access policy.
D. Enforce the use of digital signatures.

Question # 185

A company has implemented an IT segregation of duties policy. In a role-based environment, which of the following roles may be assigned to an application developer?

A. IT operator
B. System administration
C. Emergency support
D. Database administration

Question # 186

Which of the following should be of GREATEST concern to an IS auditor reviewing an organization's business continuity plan (BCP)?

A. The BCP's contact information needs to be updated
B. The BCP is not version controlled.
C. The BCP has not been approved by senior management.
D. The BCP has not been tested since it was first issued.

Question # 187

Which of the following application input controls would MOST likely detect data input errors in the customer account number field during the processing of an accounts receivable transaction?

A. Limit check
B. Parity check
C. Reasonableness check
D. Validity check

Question # 188

An organization has virtualized its server environment without making any other changes to the network or security infrastructure. Which of the following is the MOST significant risk?

A. Inability of the network intrusion detection system (IDS) to monitor virtual server-lo-server communications
B. Vulnerability in the virtualization platform affecting multiple hosts
C. Data center environmental controls not aligning with new configuration
D. System documentation not being updated to reflect changes in the environment

Question # 189

Which of the following BEST enables the effectiveness of an agile project for the rapid development of a new software application?

A. Project segments are established.
B. The work is separated into phases.
C. The work is separated into sprints.
D. Project milestones are created.

Question # 190

What is the PRIMARY benefit of an audit approach which requires reported findings to be issued together with related action plans, owners, and target dates?

A. it facilitates easier audit follow-up
B. it enforces action plan consensus between auditors and auditees
C. it establishes accountability for the action plans
D. it helps to ensure factual accuracy of findings

Question # 191

Which of the following would be an appropriate role of internal audit in helping to establish an organization’s privacy program?

A. Analyzing risks posed by new regulations
B. Developing procedures to monitor the use of personal data
C. Defining roles within the organization related to privacy
D. Designing controls to protect personal data

Question # 192

An externally facing system containing sensitive data is configured such that users have either read-only or administrator rights. Most users of the system have administrator access. Which of the following is the GREATEST risk associated with this situation?

A. Users can export application logs.
B. Users can view sensitive data.
C. Users can make unauthorized changes.
D. Users can install open-licensed software.

Question # 193

An IS auditor notes that the previous year's disaster recovery test was not completed within the scheduled time frame due to insufficient hardware allocated by a third-party vendor. Which of the following provides the BEST evidence that adequate resources are now allocated to successfully recover the systems?

A. Service level agreement (SLA)
B. Hardware change management policy
C. Vendor memo indicating problem correction
D. An up-to-date RACI chart

Question # 194

Which task should an IS auditor complete FIRST during the preliminary planning phase of a database security review?

A. Perform a business impact analysis (BIA).
B. Determine which databases will be in scope.
C. Identify the most critical database controls.
D. Evaluate the types of databases being used

Question # 195

Which of the following is the GREATEST risk of using a reciprocal site for disaster recovery?

A. Inability to utilize the site when required
B. Inability to test the recovery plans onsite
C. Equipment compatibility issues at the site
D. Mismatched organizational security policies 

Question # 196

Which of the following would BEST enable an organization to address the security risks associated with a recently implemented bring your own device (BYOD) strategy?

A. Mobile device tracking program
B. Mobile device upgrade program
C. Mobile device testing program
D. Mobile device awareness program

Question # 197

Which of the following should an IS auditor expect to see in a network vulnerability assessment?

A. Misconfiguration and missing updates
B. Malicious software and spyware
C. Zero-day vulnerabilities
D. Security design flaws

Question # 198

An audit identified that a computer system is not assigning sequential purchase order numbers to order requests. The IS auditor is conducting an audit follow-up to determine if management has reserved this finding. Which of two following is the MOST reliable follow-up procedure?

A. Review the documentation of recant changes to implement sequential order numbering.
B. Inquire with management if the system has been configured and tested to generate sequential order numbers.
C. Inspect the system settings and transaction logs to determine if sequential order numbers are generated.
D. Examine a sample of system generated purchase orders obtained from management

Question # 199

Which of the following presents the GREATEST challenge to the alignment of business and IT?

A. Lack of chief information officer (CIO) involvement in board meetings
B. Insufficient IT budget to execute new business projects
C. Lack of information security involvement in business strategy development
D. An IT steering committee chaired by the chief information officer (CIO)

Question # 200

Management receives information indicating a high level of risk associated with potential flooding near the organization's data center within the next few years. As a result, a decision has been made to move data center operations to another facility on higher ground. Which approach has been adopted?

A. Risk avoidance
B. Risk transfer
C. Risk acceptance
D. Risk reduction

Question # 201

In response to an audit finding regarding a payroll application, management implemented a new automated control. Which of the following would be MOST helpful to the IS auditor when evaluating the effectiveness of the new control?

A. Approved test scripts and results prior to implementation
B. Written procedures defining processes and controls
C. Approved project scope document
D. A review of tabletop exercise results

Question # 202

What is the GREATEST concern for an IS auditor reviewing contracts for licensed software that executes a critical business process?

A. The contract does not contain a right-to-audit clause.
B. An operational level agreement (OLA) was not negotiated.
C. Several vendor deliverables missed the commitment date.
D. Software escrow was not negotiated.

Question # 203

Which of the following should be the FRST step when developing a data toes prevention (DIP) solution for a large organization?

A. Identify approved data workflows across the enterprise.
B. Conduct a threat analysis against sensitive data usage.
C. Create the DLP pcJc.es and templates
D. Conduct a data inventory and classification exercise

Question # 204

An IS auditor discovers that an IT organization serving several business units assigns equal priority to all initiatives, creating a risk of delays in securing project funding Which of the following would be MOST helpful in matching demand for projects and services with available resources in a way that supports business objectives?

A. Project management
B. Risk assessment results
C. IT governance framework
D. Portfolio management

Question # 205

An IS auditor assessing the controls within a newly implemented call center would First 

A. gather information from the customers regarding response times and quality of service.
B. review the manual and automated controls in the call center.
C. test the technical infrastructure at the call center.
D. evaluate the operational risk associated with the call center.

Question # 206

Which of the following would an IS auditor recommend as the MOST effective preventive control to reduce the risk of data leakage?

A. Ensure that paper documents arc disposed security.
B. Implement an intrusion detection system (IDS).
C. Verify that application logs capture any changes made.
D. Validate that all data files contain digital watermarks 

Question # 207

What Is the BEST method to determine if IT resource spending is aligned with planned project spending?

A. Earned value analysis (EVA)
B. Return on investment (ROI) analysis
C. Gantt chart
D. Critical path analysis

Question # 208

The PRIMARY role of a control self-assessment (CSA) facilitator is to:

 A. conduct interviews to gain background information.
B. focus the team on internal controls.
C. report on the internal control weaknesses.
D. provide solutions for control weaknesses.

Question # 209

Which of the following controls BEST ensures appropriate segregation of duties within an accounts payable department?

A. Restricting program functionality according to user security profiles
B. Restricting access to update programs to accounts payable staff only
C. Including the creator’s user ID as a field in every transaction record created
D. Ensuring that audit trails exist for transactions

Question # 210

Which of the following would MOST effectively help to reduce the number of repealed incidents in an organization?

A. Testing incident response plans with a wide range of scenarios
B. Prioritizing incidents after impact assessment.
C. Linking incidents to problem management activities
D. Training incident management teams on current incident trends

Question # 211

A system administrator recently informed the IS auditor about the occurrence of several unsuccessful intrusion attempts from outside the organization. Which of the following is MOST effective in detecting such an intrusion?

A. Using smart cards with one-time passwords
B. Periodically reviewing log files
C. Configuring the router as a firewall
D. Installing biometrics-based authentication

Question # 212

An audit has identified that business units have purchased cloud-based applications without IPs support. What is the GREATEST risk associated with this situation?

A. The applications are not included in business continuity plans (BCFs)
B. The applications may not reasonably protect data.
C. The application purchases did not follow procurement policy.
D. The applications could be modified without advanced notice.

Question # 213

During the planning phase of a data loss prevention (DLP) audit, management expresses a concern about mobile computing. Which of the following should the IS auditor identity as the associated risk?

A. The use of the cloud negatively impacting IT availably
B. Increased need for user awareness training
C. Increased vulnerability due to anytime, anywhere accessibility
D. Lack of governance and oversight for IT infrastructure and applications

Question # 214

Which of the following is the BEST reason to implement a data retention policy?

A. To limit the liability associated with storing and protecting information
B. To document business objectives for processing data within the organization
C. To assign responsibility and ownership for data protection outside IT
D. To establish a recovery point detective (RPO) for (toaster recovery procedures

Question # 215

An organization has made a strategic decision to split into separate operating entities to improve profitability. However, the IT infrastructure remains shared between the entities. Which of the following would BEST help to ensure that IS audit still covers key risk areas within the IT environment as part of its annual plan?

A. Increasing the frequency of risk-based IS audits for each business entity
B. Developing a risk-based plan considering each entity's business processes
C. Conducting an audit of newly introduced IT policies and procedures
D. Revising IS audit plans to focus on IT changes introduced after the split

Question # 216

An IS auditor reviewing the threat assessment tor a data center would be MOST concerned if:

A. some of the identified throats are unlikely to occur.
B. all identified throats relate to external entities.
C. the exercise was completed by local management.
D. neighboring organizations operations have been included.

Question # 217

Which of the following is MOST important for an IS auditor to confirm when reviewing an organization's plans to implement robotic process automation (RPA> to automate routine business tasks?

A. The end-to-end process is understood and documented.
B. Roles and responsibilities are defined for the business processes in scope.
C. A benchmarking exercise of industry peers who use RPA has been completed.
D. A request for proposal (RFP) has been issued to qualified vendors.

Question # 218

Which of the following is the MOST important consideration for an IS auditor when assessing the adequacy of an organization's information security policy?

A. IT steering committee minutes
B. Business objectives
C. Alignment with the IT tactical plan
D. Compliance with industry best practice

Question # 219

During an exit meeting, an IS auditor highlights that backup cycles are being missed due to operator error and that these exceptions are not being managed. Which of the following is the BEST way to help management understand the associated risk?

A. Explain the impact to disaster recovery.
B. Explain the impact to resource requirements.
C. Explain the impact to incident management.
D. Explain the impact to backup scheduling.

Question # 220

An IS auditor is reviewing the installation of a new server. The IS auditor's PRIMARY objective is to ensure that

A. security parameters are set in accordance with the manufacturer s standards.
B. a detailed business case was formally approved prior to the purchase.
C. security parameters are set in accordance with the organization's policies.
D. the procurement project invited lenders from at least three different suppliers.

Question # 221

What should an IS auditor do FIRST when management responses to an in-person internal control questionnaire indicate a key internal control is no longer effective?

A. Determine the resources required to make the controleffective.
B. Validate the overall effectiveness of the internal control.
C. Verify the impact of the control no longer being effective.
D. Ascertain the existence of other compensating controls.

Question # 222

Which of the following is a challenge in developing a service level agreement (SLA) for network services?

A. Establishing a well-designed framework for network servirces.
B. Finding performance metrics that can be measured properly
C. Ensuring that network components are not modified by the client
D. Reducing the number of entry points into the network

Question # 223

An organization has outsourced the development of a core application. However, the organization plans to bring the support and future maintenance of the application back in-house. Which of the following findings should be the IS auditor's GREATEST concern?

A. The cost of outsourcing is lower than in-house development.
B. The vendor development team is located overseas.
C. A training plan for business users has not been developed.
D. The data model is not clearly documented.

Question # 224

Which of the following would BEST help to ensure that potential security issues are considered by the development team as part of incremental changes to agile-developed software?

A. Assign the security risk analysis to a specially trained member of the project management office.
B. Deploy changes in a controlled environment and observe for security defects.
C. Include a mandatory step to analyze the security impact when making changes.
D. Mandate that the change analyses are documented in a standard format.

Question # 225

An IS auditor finds that capacity management for a key system is being performed by IT with no input from the business The auditor's PRIMARY concern would be:

A. failure to maximize the use of equipment
B. unanticipated increase in business s capacity needs.
C. cost of excessive data center storage capacity
D. impact to future business project funding.

Question # 226

An IS auditor plans to review all access attempts to a video-monitored and proximity card-controlled communications room. Which of the following would be MOST useful to the auditor?

A. Alarm system with CCTV
B. Access control log 
C. Security incident log
D. Access card allocation records

Question # 227

What is the PRIMARY purpose of documenting audit objectives when preparing for an engagement?

A. To address the overall risk associated with the activity under review
B. To identify areas with relatively high probability of material problems
C. To help ensure maximum use of audit resources during the engagement
D. To help prioritize and schedule auditee meetings

Question # 228

A review of Internet security disclosed that users have individual user accounts with Internet service providers (ISPs) and use these accounts for downloading business data. The organization wants to ensure that only the corporate network is used. The organization should FIRST:

A. use a proxy server to filter out Internet sites that should not be accessed.
B. keep a manual log of Internet access.
C. monitor remote access activities.
D. include a statement in its security policy about Internet use.

Question # 229

Which of the following is the BEST way to mitigate the risk associated with unintentional modifications of complex calculations in end-user computing (EUC)?

A. Have an independent party review the source calculations
B. Execute copies of EUC programs out of a secure library
C. implement complex password controls
D. Verify EUC results through manual calculations

Question # 230

Which of the following is the BEST way to enforce the principle of least privilege on a server containing data with different security classifications?

A. Limiting access to the data files based on frequency of use
B. Obtaining formal agreement by users to comply with the data classification policy
C. Applying access controls determined by the data owner
D. Using scripted access control lists to prevent unauthorized access to the server

Question # 231

An IS auditor has completed the fieldwork phase of a network security review and is preparing the initial following findings should be ranked as the HIGHEST risk?

A. Network penetration tests are not performed
B. The network firewall policy has not been approved by the information security officer.
C. Network firewall rules have not been documented.
D. The network device inventory is incomplete.

Question # 232

Which of the following BEST helps to ensure data integrity across system interfaces?

A. Environment segregation
B. Reconciliation
C. System backups
D. Access controls

Question # 233

Which of the following is MOST important when implementing a data classification program?

A. Understanding the data classification levels
B. Formalizing data ownership
C. Developing a privacy policy
D. Planning for secure storage capacity

Question # 234

Which of the following is the MOST effective way for an organization to help ensure agreed-upon action plans from an IS audit will be implemented?

A. Ensure sufficient audit resources are allocated,
B. Communicate audit results organization-wide.
C. Ensure ownership is assigned.
D. Test corrective actions upon completion.

Question # 235

An IS auditor has found that a vendor has gone out of business and the escrow has an older version of the source code. What is the auditor's BEST recommendation for the organization?

A. Analyze a new application that moots the current re
B. Perform an analysis to determine the business risk
C. Bring the escrow version up to date.
D. Develop a maintenance plan to support the application using the existing code

Question # 236

An organization allows its employees lo use personal mobile devices for work. Which of the following would BEST maintain information security without compromising employee privacy?

A. Installing security software on the devices
B. Partitioning the work environment from personal space on devices
C. Preventing users from adding applications
D. Restricting the use of devices for personal purposes during working hours

Question # 237

Which of the following should be performed FIRST before key performance indicators (KPIs) can be implemented?

A. Analysis of industry benchmarks
B. Identification of organizational goals
C. Analysis of quantitative benefits
D. Implementation of a balanced scorecard

Question # 238

in a controlled application development environment, the MOST important segregation of duties should be between the person who implements changes into the production environment and the:

A. application programmer
B. systems programmer
C. computer operator
D. quality assurance (QA) personnel

Question # 239

Which of the following IT service management activities is MOST likely to help with identifying the root cause of repeated instances of network latency?

A. Change management
B. Problem management
C. incident management
D. Configuration management

Question # 240

Which of the following would provide an IS auditor with the GREATEST assurance that data disposal controls support business strategic objectives?

A. Media recycling policy
B. Media sanitization policy
C. Media labeling policy
D. Media shredding policy

Question # 241

Which of the following is the BEST control lo mitigate attacks that redirect Internet traffic to an unauthorized website?

A. Utilize a network-based firewall.
B. Conduct regular user security awareness training
C. Perform domain name system (DNS) server security hardening.
D. Enforce a strong password policy meeting complexity requirement.

Question # 242

An organization is disposing of a system containing sensitive data and has deleted all files from the hard disk. An IS auditor should be concerned because: 

A. deleted data cannot easily be retrieved.
B. deleting the files logically does not overwrite the files' physical data.
C. backup copies of files were not deleted as well.
D. deleting all files separately is not as efficient as formatting the hard disk.

Question # 243

An IS auditor is reviewing logical access controls for an organization's financial business application Which of the following findings should be of GREATEST concern to the auditor?

A. Users are not required to change their passwords on a regular basis
B. Management does not review application user activity logs
C. User accounts are shared between users
D. Password length is set to eight characters

Question # 244

Which of the following is the MOST efficient way to identify segregation of duties violations in a new system?

A. Review a report of security rights in the system.
B. Observe the performance of business processes.
C. Develop a process to identify authorization conflicts.
D. Examine recent system access rights violations.

Question # 245

Which of the following issues associated with a data center's closed-circuit television (CCTV) surveillance cameras should be of MOST concern to an IS auditor?

A. CCTV recordings are not regularly reviewed.
B. CCTV cameras are not installed in break rooms
C. CCTV records are deleted after one year.
D. CCTV footage is not recorded 24 x 7.

Question # 246

Which of the following should be the IS auditor's PRIMARY focus, when evaluating an organization's offsite storage facility?

A. Shared facilities
B. Adequacy of physical and environmental controls
C. Results of business continuity plan (BCP) test
D. Retention policy and period

Question # 247

During an IT general controls audit of a high-risk area where both internal and external audit teams are reviewing the same approach to optimize resources?

A. Leverage the work performed by external audit for the internal audit testing. 
B. Ensure both the internal and external auditors perform the work simultaneously.
C. Request that the external audit team leverage the internal audit work.
D. Roll forward the general controls audit to the subsequent audit year.

Question # 248

Which of the following would BEST ensure that a backup copy is available for restoration of mission critical data after a disaster'' 

A. Use an electronic vault for incremental backups
B. Deploy a fully automated backup maintenance system.
C. Periodically test backups stored in a remote location
D. Use both tape and disk backup systems

Question # 249

If enabled within firewall rules, which of the following services would present the GREATEST risk? 

A. Simple mail transfer protocol (SMTP)
B. Simple object access protocol (SOAP)
C. Hypertext transfer protocol (HTTP)
D. File transfer protocol (FTP)

Question # 250

A post-implementation review was conducted by issuing a survey to users. Which of the following should be of GREATEST concern to an IS auditor?

A. The survey results were not presented in detail lo management.
B. The survey questions did not address the scope of the business case.
C. The survey form template did not allow additional feedback to be provided.
D. The survey was issued to employees a month after implementation.

Question # 251

Which of the following is MOST important to ensure that electronic evidence collected during a forensic investigation will be admissible in future legal proceedings?

A. Restricting evidence access to professionally certified forensic investigators
B. Documenting evidence handling by personnel throughout the forensic investigation
C. Performing investigative procedures on the original hard drives rather than images of the hard drives 
D. Engaging an independent third party to perform the forensic investigation

Question # 252

What would be an IS auditor's BEST recommendation upon finding that a third-party IT service provider hosts the organization's human resources (HR) system in a foreign country?

A. Perform background verification checks.
B. Review third-party audit reports.
C. Implement change management review.
D. Conduct a privacy impact analysis.

Question # 253

Which of the following is MOST critical for the effective implementation of IT governance?

A. Strong risk management practices 
B. Internal auditor commitment
C. Supportive corporate culture 
D. Documented policies

Question # 254

During a security audit, an IS auditor is tasked with reviewing log entries obtained from an enterprise intrusion prevention system (IPS). Which type of risk would be associated with the potential for the auditor to miss a sequence of logged events that could indicate an error in the IPS configuration?

A. Sampling risk
B. Detection risk
C. Control risk
D. Inherent risk

Question # 255

Which of the following is the MOST significant risk that IS auditors are required to consider for each engagement?

A. Process and resource inefficiencies
B. Irregularities and illegal acts
C. Noncompliance with organizational policies
D. Misalignment with business objectives

Question # 256

Which of the following is the BEST evidence that an organization's IT strategy is aligned lo its business objectives?

A. The IT strategy is modified in response to organizational change.
B. The IT strategy is approved by executive management.
C. The IT strategy is based on IT operational best practices.
D. The IT strategy has significant impact on the business strategy

Question # 257

An IS auditor has been asked to advise on measures to improve IT governance within the organization. Which at the following is the BEST recommendation?

A. Implement key performance indicators (KPIs)
B. Implement annual third-party audits.
C. Benchmark organizational performance against industry peers.
D. Require executive management to draft IT strategy 

Question # 258

A review of an organization’s IT portfolio revealed several applications that are not in use. The BEST way to prevent this situation from recurring would be to implement.

A. A formal request for proposal (RFP) process
B. Business case development procedures
C. An information asset acquisition policy
D. Asset life cycle management.

Question # 259

Which of the following should be of GREATEST concern to an IS auditor reviewing a network printer disposal process?

A. Disposal policies and procedures are not consistently implemented
B. Evidence is not available to verify printer hard drives have been sanitized prior to disposal.
C. Business units are allowed to dispose printers directly to
D. Inoperable printers are stored in an unsecured area. 

Question # 260

Which of the following should an IS auditor ensure is classified at the HIGHEST level of sensitivity?

A. Server room access history
B. Emergency change records
C. IT security incidents
D. Penetration test results 

Question # 261

An IS auditor reviewing security incident processes realizes incidents are resolved and closed, but root causes are not investigated. Which of the following should be the MAJOR concern with this situation?

A. Abuses by employees have not been reported.
B. Lessons learned have not been properly documented
C. vulnerabilities have not been properly addressed
D. Security incident policies are out of date.

Question # 262

During a follow-up audit, an IS auditor finds that some critical recommendations have the IS auditor's BEST course of action? 

A. Require the auditee to address the recommendations in full.
B. Adjust the annual risk assessment accordingly.
C. Evaluate senior management's acceptance of the risk.
D. Update the audit program based on management's acceptance of risk.

Question # 263

Which of the following provides the BEST providence that outsourced provider services are being properly managed?

A. The service level agreement (SLA) includes penalties for non-performance.
B. Adequate action is taken for noncompliance with the service level agreement (SLA).
C. The vendor provides historical data to demonstrate its performance.
D. Internal performance standards align with corporate strategy. 

Question # 264

What should an IS auditor do FIRST upon discovering that a service provider did not notify its customers of a security breach?

A. Notify law enforcement of the finding.
B. Require the third party to notify customers.
C. The audit report with a significant finding.
D. Notify audit management of the finding. 

Question # 265

A credit card company has decided to outsource the printing of customer statements It Is MOST important for the company to verify whether:

A. the provider has alternate service locations.
B. the contract includes compensation for deficient service levels.
C. the provider's information security controls are aligned with the company's.
D. the provider adheres to the company's data retention policies.

Question # 266

Which of the following features of a library control software package would protect against unauthorized updating of source code?

A. Required approvals at each life cycle step
B. Date and time stamping of source and object code
C. Access controls for source libraries
D. Release-to-release comparison of source code

Question # 267

An IS auditor is reviewing documentation of application systems change control and identifies several patches that were not tested before being put into production. Which of the following is the MOST significant risk from this situation?

A. Loss of application support
B. Lack of system integrity
C. Outdated system documentation
D. Developer access 1o production

Question # 268

Which of the following is necessary for effective risk management in IT governance?

A. Local managers are solely responsible for risk evaluation.
B. IT risk management is separate from corporate risk management.
C. Risk management strategy is approved by the audit committee.
D. Risk evaluation is embedded in management processes.

Question # 269

Which of the following is a corrective control?

A. Separating equipment development testing and production
B. Verifying duplicate calculations in data processing
C. Reviewing user access rights for segregation
D. Executing emergency response plans

Question # 270

Which of the following should be of GREATEST concern for an IS auditor reviewing an organization's disaster recovery plan (DRP)?

A. The DRP has not been formally approved by senior management.
B. The DRP has not been distributed to end users.
C. The DRP has not been updated since an IT infrastructure upgrade.
D. The DRP contains recovery procedures for critical servers only.

Question # 271

Which of the following should be the FIRST step in the incident response process for a suspected breach?

A. Inform potentially affected customers of the security breach
B. Notify business management of the security breach.
C. Research the validity of the alerted breach
D. Engage a third party to independently evaluate the alerted breach.

Question # 272

An IS auditor finds that one employee has unauthorized access to confidential data. The IS auditor's BEST recommendation should be to:

A. reclassify the data to a lower level of confidentiality
B. require the business owner to conduct regular access reviews.
C. implement a strong password schema for users.
D. recommend corrective actions to be taken by the security administrator.

Question # 273

An IS auditor has discovered that a software system still in regular use is years out of date and no longer supported the auditee has stated that it will take six months until the software is running on the current version. Which of the following is the BEST way to reduce the immediate risk associated with using an unsupported version of the software?

A. Verify all patches have been applied to the software system's outdated version
B. Close all unused ports on the outdated software system.
C. Segregate the outdated software system from the main network.
D. Monitor network traffic attempting to reach the outdated software system. 

Question # 274

An IS auditor finds that application servers had inconsistent security settings leading to potential vulnerabilities. Which of the following is the BEST recommendation by the IS auditor?

A. Improve the change management process
B. Establish security metrics.
C. Perform a penetration test
D. Perform a configuration review

Question # 275

During audit framework. an IS auditor teams that employees are allowed to connect their personal devices to company-owned computers. How can the auditor BEST validate that appropriate security controls are in place to prevent data loss?

A. Conduct a walk-through to view results of an employee plugging in a device to transfer confidential data.
B. Review compliance with data loss and applicable mobile device user acceptance policies.
C. Verify the data loss prevention (DLP) tool is properly configured by the organization.
D. Verify employees have received appropriate mobile device security awareness training. 

Question # 276

Which of the following would be the MOST useful metric for management to consider when reviewing a project portfolio?

A. Cost of projects divided by total IT cost
B. Expected return divided by total project cost
C. Net present value (NPV) of the portfolio
D. Total cost of each project 

Question # 277

During an audit of an organization's risk management practices, an IS auditor finds several documented IT risk acceptances have not been renewed in a timely manner after the assigned expiration date When assessing the seventy of this finding, which mitigating factor would MOST significantly minimize the associated impact?

A. There are documented compensating controls over the business processes.
B. The risk acceptances were previously reviewed and approved by appropriate senior management
C. The business environment has not significantly changed since the risk acceptances were approved.
D. The risk acceptances with issues reflect a small percentage of the total population

Question # 278

Which of the following is the BEST way to ensure that an application is performing according to its specifications?

A. Unit testing
B. Pilot testing
C. System testing
D. Integration testing

Question # 279

Which of the following is MOST important for an IS auditor to determine during the detailed design phase of a system development project?

A. Program coding standards have been followed
B. Acceptance test criteria have been developed
C. Data conversion procedures have been established.
D. The design has been approved by senior management. 

Question # 280

A warehouse employee of a retail company has been able to conceal the theft of inventory items by entering adjustments of either damaged or lost stock items lo the inventory system. Which control would have BEST prevented this type of fraud in a retail environment?

A. Separate authorization for input of transactions
B. Statistical sampling of adjustment transactions
C. Unscheduled audits of lost stock lines
D. An edit check for the validity of the inventory transaction 

Question # 281

Which of the following is the PRIMARY advantage of using visualization technology for corporate applications?

A. Improved disaster recovery
B. Better utilization of resources
C. Stronger data security
D. Increased application performance 

What our clients say about CISA Dumps

Leave a comment

Your email address will not be published. Required fields are marked *

Rating / Feedback About This Exam