Weekend Sale Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 2493360325

Good News !!! CISA Certified Information Systems Auditor is now Stable and With Pass Result

CISA Practice Exam Questions and Answers

Certified Information Systems Auditor

Last Update 3 days ago
Total Questions : 928

Certified Information Systems Auditor is stable now with all latest exam questions are added 3 days ago. Incorporating CISA practice exam questions into your study plan is more than just a preparation strategy.

By familiarizing yourself with the Certified Information Systems Auditor exam format, identifying knowledge gaps, applying theoretical knowledge in Isaca practical scenarios, you are setting yourself up for success. CISA exam dumps provide a realistic preview, helping you to adapt your preparation strategy accordingly.

CISA exam questions often include scenarios and problem-solving exercises that mirror real-world challenges. Working through CISA dumps allows you to practice pacing yourself, ensuring that you can complete all Certified Information Systems Auditor exam questions within the allotted time frame without sacrificing accuracy.

CISA PDF

$79.6
$199

CISA Testing Engine

$90
$225

CISA PDF + Testing Engine

$99.6
$249
Question # 1

Which of the following would be of GREATEST concern to an IS auditor reviewing an IT strategy document?

Options:

A.  

Target architecture is defined at a technical level.

B.  

The previous year's IT strategic goals were not achieved.

C.  

Strategic IT goals are derived solely from the latest market trends.

D.  

Financial estimates of new initiatives are disclosed within the document.

Discussion 0
Question # 2

An organization's security policy mandates that all new employees must receive appropriate security awareness training. Which of the following metrics would BEST assure compliance with this policy?

Options:

A.  

Percentage of new hires that have completed the training.

B.  

Number of new hires who have violated enterprise security policies.

C.  

Number of reported incidents by new hires.

D.  

Percentage of new hires who report incidents

Discussion 0
Question # 3

Which of the following is the BEST method to safeguard data on an organization's laptop computers?

Options:

A.  

Disabled USB ports

B.  

Full disk encryption

C.  

Biometric access control

D.  

Two-factor authentication

Discussion 0
Question # 4

An IT balanced scorecard is the MOST effective means of monitoring:

Options:

A.  

governance of enterprise IT.

B.  

control effectiveness.

C.  

return on investment (ROI).

D.  

change management effectiveness.

Discussion 0
Question # 5

A proper audit trail of changes to server start-up procedures would include evidence of:

Options:

A.  

subsystem structure.

B.  

program execution.

C.  

security control options.

D.  

operator overrides.

Discussion 0
Question # 6

What is BEST for an IS auditor to review when assessing the effectiveness of changes recently made to processes and tools related to an organization's business continuity plan (BCP)?

Options:

A.  

Full test results

B.  

Completed test plans

C.  

Updated inventory of systems

D.  

Change management processes

Discussion 0
Question # 7

Which of the following security risks can be reduced by a property configured network firewall?

Options:

A.  

SQL injection attacks

B.  

Denial of service (DoS) attacks

C.  

Phishing attacks

D.  

Insider attacks

Discussion 0
Question # 8

An organization conducted an exercise to test the security awareness level of users by sending an email offering a cash reward 10 those who click on a link embedded in the body of the email. Which of the following metrics BEST indicates the effectiveness of awareness training?

Options:

A.  

The number of users deleting the email without reporting because it is a phishing email

B.  

The number of users clicking on the link to learn more about the sender of the email

C.  

The number of users forwarding the email to their business unit managers

D.  

The number of users reporting receipt of the email to the information security team

Discussion 0
Question # 9

Which of the following is the MOST effective way for an organization to project against data loss?

Options:

A.  

Limit employee internet access.

B.  

Implement data classification procedures.

C.  

Review firewall logs for anomalies.

D.  

Conduct periodic security awareness training.

Discussion 0
Question # 10

An organization has outsourced its data processing function to a service provider. Which of the following would BEST determine whether the service provider continues to meet the organization s objectives?

Options:

A.  

Assessment of the personnel training processes of the provider

B.  

Adequacy of the service provider's insurance

C.  

Review of performance against service level agreements (SLAs)

D.  

Periodic audits of controls by an independent auditor

Discussion 0
Question # 11

What should be the PRIMARY basis for selecting which IS audits to perform in the coming year?

Options:

A.  

Senior management's request

B.  

Prior year's audit findings

C.  

Organizational risk assessment

D.  

Previous audit coverage and scope

Discussion 0
Question # 12

When determining whether a project in the design phase will meet organizational objectives, what is BEST to compare against the business case?

Options:

A.  

Implementation plan

B.  

Project budget provisions

C.  

Requirements analysis

D.  

Project plan

Discussion 0
Question # 13

Which of the following is the PRIMARY reason for an IS auditor to conduct post-implementation reviews?

Options:

A.  

To determine whether project objectives in the business case have been achieved

B.  

To ensure key stakeholder sign-off has been obtained

C.  

To align project objectives with business needs

D.  

To document lessons learned to improve future project delivery

Discussion 0
Question # 14

An organization's enterprise architecture (EA) department decides to change a legacy system's components while maintaining its original functionality. Which of the following is MOST important for an IS auditor to understand when reviewing this decision?

Options:

A.  

The current business capabilities delivered by the legacy system

B.  

The proposed network topology to be used by the redesigned system

C.  

The data flows between the components to be used by the redesigned system

D.  

The database entity relationships within the legacy system

Discussion 0
Question # 15

One benefit of return on investment (ROI) analysts in IT decision making is that it provides the:

Options:

A.  

basis for allocating indirect costs.

B.  

cost of replacing equipment.

C.  

estimated cost of ownership.

D.  

basis for allocating financial resources.

Discussion 0
Question # 16

An IS auditor has found that an organization is unable to add new servers on demand in a cost-efficient manner. Which of the following is the auditor's BEST recommendation?

Options:

A.  

Increase the capacity of existing systems.

B.  

Upgrade hardware to newer technology.

C.  

Hire temporary contract workers for the IT function.

D.  

Build a virtual environment.

Discussion 0
Question # 17

An organization's software developers need access to personally identifiable information (Pll) stored in a particular data format. Which of the following is the BEST way to protect this sensitive information while allowing the developers to use it in development and test environments?

Options:

A.  

Data masking

B.  

Data tokenization

C.  

Data encryption

D.  

Data abstraction

Discussion 0
Question # 18

Which of the following BEST guards against the risk of attack by hackers?

Options:

A.  

Tunneling

B.  

Encryption

C.  

Message validation

D.  

Firewalls

Discussion 0
Question # 19

Which of the following is the BEST justification for deferring remediation testing until the next audit?

Options:

A.  

The auditor who conducted the audit and agreed with the timeline has left the organization.

B.  

Management's planned actions are sufficient given the relative importance of the observations.

C.  

Auditee management has accepted all observations reported by the auditor.

D.  

The audit environment has changed significantly.

Discussion 0
Question # 20

Which of the following is the BEST control to prevent the transfer of files to external parties through instant messaging (IM) applications?

Options:

A.  

File level encryption

B.  

File Transfer Protocol (FTP)

C.  

Instant messaging policy

D.  

Application level firewalls

Discussion 0
Question # 21

An IS auditor is reviewing an organization's information asset management process. Which of the following would be of GREATEST concern to the auditor?

Options:

A.  

The process does not require specifying the physical locations of assets.

B.  

Process ownership has not been established.

C.  

The process does not include asset review.

D.  

Identification of asset value is not included in the process.

Discussion 0
Question # 22

An IS auditor is planning an audit of an organization's accounts payable processes. Which of the following controls is MOST important to assess in the audit?

Options:

A.  

Segregation of duties between issuing purchase orders and making payments.

B.  

Segregation of duties between receiving invoices and setting authorization limits

C.  

Management review and approval of authorization tiers

D.  

Management review and approval of purchase orders

Discussion 0
Question # 23

During the design phase of a software development project, the PRIMARY responsibility of an IS auditor is to evaluate the:

Options:

A.  

Future compatibility of the application.

B.  

Proposed functionality of the application.

C.  

Controls incorporated into the system specifications.

D.  

Development methodology employed.

Discussion 0
Question # 24

Which of the following is MOST important for an IS auditor to examine when reviewing an organization's privacy policy?

Options:

A.  

Whether there is explicit permission from regulators to collect personal data

B.  

The organization's legitimate purpose for collecting personal data

C.  

Whether sharing of personal information with third-party service providers is prohibited

D.  

The encryption mechanism selected by the organization for protecting personal data

Discussion 0
Question # 25

Which of the following would BEST facilitate the successful implementation of an IT-related framework?

Options:

A.  

Aligning the framework to industry best practices

B.  

Establishing committees to support and oversee framework activities

C.  

Involving appropriate business representation within the framework

D.  

Documenting IT-related policies and procedures

Discussion 0
Question # 26

Coding standards provide which of the following?

Options:

A.  

Program documentation

B.  

Access control tables

C.  

Data flow diagrams

D.  

Field naming conventions

Discussion 0
Question # 27

An IS auditor is reviewing logical access controls for an organization's financial business application Which of the following findings should be of GREATEST concern to the auditor?

Options:

A.  

Users are not required to change their passwords on a regular basis

B.  

Management does not review application user activity logs

C.  

User accounts are shared between users

D.  

Password length is set to eight characters

Discussion 0
Question # 28

An IS auditor plans to review all access attempts to a video-monitored and proximity card-controlled communications room. Which of the following would be MOST useful to the auditor?

Options:

A.  

Manual sign-in and sign-out log

B.  

System electronic log

C.  

Alarm system with CCTV

D.  

Security incident log

Discussion 0
Question # 29

Which of the following is the BEST way to ensure that business continuity plans (BCPs) will work effectively in the event of a major disaster?

Options:

A.  

Prepare detailed plans for each business function.

B.  

Involve staff at all levels in periodic paper walk-through exercises.

C.  

Regularly update business impact assessments.

D.  

Make senior managers responsible for their plan sections.

Discussion 0
Question # 30

What would be an IS auditor's BEST recommendation upon finding that a third-party IT service provider hosts the organization's human resources (HR) system in a foreign country?

Options:

A.  

Perform background verification checks.

B.  

Review third-party audit reports.

C.  

Implement change management review.

D.  

Conduct a privacy impact analysis.

Discussion 0
Question # 31

Which of the following is the BEST reason to implement a data retention policy?

Options:

A.  

To limit the liability associated with storing and protecting information

B.  

To document business objectives for processing data within the organization

C.  

To assign responsibility and ownership for data protection outside IT

D.  

To establish a recovery point detective (RPO) for (toaster recovery procedures

Discussion 0
Question # 32

An organization is disposing of a system containing sensitive data and has deleted all files from the hard disk. An IS auditor should be concerned because:

Options:

A.  

deleted data cannot easily be retrieved.

B.  

deleting the files logically does not overwrite the files' physical data.

C.  

backup copies of files were not deleted as well.

D.  

deleting all files separately is not as efficient as formatting the hard disk.

Discussion 0
Question # 33

Which of the following would an IS auditor recommend as the MOST effective preventive control to reduce the risk of data leakage?

Options:

A.  

Ensure that paper documents arc disposed security.

B.  

Implement an intrusion detection system (IDS).

C.  

Verify that application logs capture any changes made.

D.  

Validate that all data files contain digital watermarks

Discussion 0
Question # 34

An organization has outsourced the development of a core application. However, the organization plans to bring the support and future maintenance of the application back in-house. Which of the following findings should be the IS auditor's GREATEST concern?

Options:

A.  

The cost of outsourcing is lower than in-house development.

B.  

The vendor development team is located overseas.

C.  

A training plan for business users has not been developed.

D.  

The data model is not clearly documented.

Discussion 0
Question # 35

Which of the following is the BEST evidence that an organization's IT strategy is aligned lo its business objectives?

Options:

A.  

The IT strategy is modified in response to organizational change.

B.  

The IT strategy is approved by executive management.

C.  

The IT strategy is based on IT operational best practices.

D.  

The IT strategy has significant impact on the business strategy

Discussion 0
Question # 36

Which of the following is the MOST important consideration for an IS auditor when assessing the adequacy of an organization's information security policy?

Options:

A.  

IT steering committee minutes

B.  

Business objectives

C.  

Alignment with the IT tactical plan

D.  

Compliance with industry best practice

Discussion 0
Question # 37

In response to an audit finding regarding a payroll application, management implemented a new automated control. Which of the following would be MOST helpful to the IS auditor when evaluating the effectiveness of the new control?

Options:

A.  

Approved test scripts and results prior to implementation

B.  

Written procedures defining processes and controls

C.  

Approved project scope document

D.  

A review of tabletop exercise results

Discussion 0
Question # 38

Which of the following is the BEST way to mitigate the risk associated with unintentional modifications of complex calculations in end-user computing (EUC)?

Options:

A.  

Have an independent party review the source calculations

B.  

Execute copies of EUC programs out of a secure library

C.  

implement complex password controls

D.  

Verify EUC results through manual calculations

Discussion 0
Question # 39

An IS auditor finds that the process for removing access for terminated employees is not documented What is the MOST significant risk from this observation?

Options:

A.  

Procedures may not align with best practices

B.  

Human resources (HR) records may not match system access.

C.  

Unauthorized access cannot he identified.

D.  

Access rights may not be removed in a timely manner.

Discussion 0
Question # 40

Which of the following should be of GREATEST concern to an IS auditor reviewing a network printer disposal process?

Options:

A.  

Disposal policies and procedures are not consistently implemented

B.  

Evidence is not available to verify printer hard drives have been sanitized prior to disposal.

C.  

Business units are allowed to dispose printers directly to

D.  

Inoperable printers are stored in an unsecured area.

Discussion 0
Question # 41

An organization allows its employees lo use personal mobile devices for work. Which of the following would BEST maintain information security without compromising employee privacy?

Options:

A.  

Installing security software on the devices

B.  

Partitioning the work environment from personal space on devices

C.  

Preventing users from adding applications

D.  

Restricting the use of devices for personal purposes during working hours

Discussion 0
Question # 42

What is the GREATEST concern for an IS auditor reviewing contracts for licensed software that executes a critical business process?

Options:

A.  

The contract does not contain a right-to-audit clause.

B.  

An operational level agreement (OLA) was not negotiated.

C.  

Several vendor deliverables missed the commitment date.

D.  

Software escrow was not negotiated.

Discussion 0
Question # 43

Which of the following BEST facilitates the legal process in the event of an incident?

Options:

A.  

Right to perform e-discovery

B.  

Advice from legal counsel

C.  

Preserving the chain of custody

D.  

Results of a root cause analysis

Discussion 0
Question # 44

Which of the following is MOST critical for the effective implementation of IT governance?

Options:

A.  

Strong risk management practices

B.  

Internal auditor commitment

C.  

Supportive corporate culture

D.  

Documented policies

Discussion 0
Question # 45

Which of the following features of a library control software package would protect against unauthorized updating of source code?

Options:

A.  

Required approvals at each life cycle step

B.  

Date and time stamping of source and object code

C.  

Access controls for source libraries

D.  

Release-to-release comparison of source code

Discussion 0
Question # 46

Which of the following will BEST ensure that a proper cutoff has been established to reinstate transactions and records to their condition just prior to a computer system failure?

Options:

A.  

Rotating backup copies of transaction files offsite

B.  

Using a database management system (DBMS) to dynamically back-out partially processed transactions

C.  

Maintaining system console logs in electronic formal

D.  

Ensuring bisynchronous capabilities on all transmission lines

Discussion 0
Question # 47

During a follow-up audit, an IS auditor finds that some critical recommendations have the IS auditor's BEST course of action?

Options:

A.  

Require the auditee to address the recommendations in full.

B.  

Adjust the annual risk assessment accordingly.

C.  

Evaluate senior management's acceptance of the risk.

D.  

Update the audit program based on management's acceptance of risk.

Discussion 0
Question # 48

Which of the following is a challenge in developing a service level agreement (SLA) for network services?

Options:

A.  

Establishing a well-designed framework for network servirces.

B.  

Finding performance metrics that can be measured properly

C.  

Ensuring that network components are not modified by the client

D.  

Reducing the number of entry points into the network

Discussion 0
Question # 49

Which of the following issues associated with a data center's closed circuit television (CCTV) surveillance cameras should be of MOST concern to an IS auditor?

Options:

A.  

CCTV recordings are not regularly reviewed.

B.  

CCTV cameras are not installed in break rooms

C.  

CCTV records are deleted after one year.

D.  

CCTV footage is not recorded 24 x 7.

Discussion 0
Question # 50

Which of the following is MOST important for an IS auditor to look

for in a project feasibility study?

Options:

A.  

An assessment of whether requirements will be fully met

B.  

An assessment indicating security controls will operate

effectively

C.  

An assessment of whether the expected benefits can be

achieved

D.  

An assessment indicating the benefits will exceed the implement

Discussion 0
Question # 51

Which of the following types of environmental equipment will MOST likely be deployed below the floor tiles of a data center?

Options:

A.  

Temperature sensors

B.  

Humidity sensors

C.  

Water sensors

D.  

Air pressure sensors

Discussion 0
Question # 52

Which of the following should be the FIRST step in the incident response process for a suspected breach?

Options:

A.  

Inform potentially affected customers of the security breach

B.  

Notify business management of the security breach.

C.  

Research the validity of the alerted breach

D.  

Engage a third party to independently evaluate the alerted breach.

Discussion 0
Question # 53

To mitigate the risk of exposing data through application programming interface (API) queries. which of the following design considerations is MOST important?

Options:

A.  

Data retention

B.  

Data minimization

C.  

Data quality

D.  

Data integrity

Discussion 0
Question # 54

Which of the following is the MOST important Issue for an IS auditor to consider with regard to Voice-over IP (VoIP) communications?

Options:

A.  

Continuity of service

B.  

Identity management

C.  

Homogeneity of the network

D.  

Nonrepudiation

Discussion 0
Question # 55

An IS auditor should look for which of the following to ensure the risk associated with scope creep has been mitigated during software development?

Options:

A.  

Source code version control

B.  

Project change management controls

C.  

Existence of an architecture review board

D.  

Configuration management

Discussion 0
Question # 56

in a post-implantation Nation review of a recently purchased system it is MOST important for the iS auditor to determine whether the:

Options:

A.  

stakeholder expectations were identified

B.  

vendor product offered a viable solution.

C.  

user requirements were met.

D.  

test scenarios reflected operating activities.

Discussion 0
Question # 57

Which of the following is the GREATEST risk if two users have concurrent access to the same database record?

Options:

A.  

Availability integrity

B.  

Data integrity

C.  

Entity integrity

D.  

Referential integrity

Discussion 0
Question # 58

During a routine internal software licensing review, an IS auditor discovers instances where employees shared license keys to critical pieces of business software. Which of the following would be the auditor's BEST course of action?

Options:

A.  

Recommend the utilization of software licensing monitoring tools

B.  

Recommend the purchase of additional software license keys

C.  

Validate user need for shared software licenses

D.  

Verify whether the licensing agreement allows shared use

Discussion 0
Question # 59

An organization has implemented a distributed security administration system to replace the previous centralized one. Which of the following presents the GREATEST potential concern?

Options:

A.  

Security procedures may be inadequate to support the change

B.  

A distributed security system is inherently a weak security system

C.  

End-user acceptance of the new system may be difficult to obtain

D.  

The new system will require additional resources

Discussion 0
Question # 60

Which of the following is the BEST source of information to determine the required level of data protection on a file server?

Options:

A.  

Data classification policy and procedures

B.  

Access rights of similar file servers

C.  

Previous data breach incident reports

D.  

Acceptable use policy and privacy statements

Discussion 0
Question # 61

A financial group recently implemented new technologies and processes, Which type of IS audit would provide the GREATEST level of assurance that the department's objectives have been met?

Options:

A.  

Performance audit

B.  

Integrated audit

C.  

Cyber audit

D.  

Financial audit

Discussion 0
Question # 62

Which of the following should be of GREATEST concern to an |$ auditor reviewing data conversion and migration during the implementation of a new application system?

Options:

A.  

The change management process was not formally documented

B.  

Backups of the old system and data are not available online

C.  

Unauthorized data modifications occurred during conversion,

D.  

Data conversion was performed using manual processes

Discussion 0
Question # 63

An IS auditor finds that while an organization's IT strategy is heavily focused on research and development, the majority of protects n the IT portfolio focus on operations and maintenance. Which of the Mowing is the BEST recommendation?

Options:

A.  

Align the IT strategy will business objectives

B.  

Review priorities in the IT portfolio

C.  

Change the IT strategy to focus on operational excellence.

D.  

Align the IT portfolio with the IT strategy.

Discussion 0
Question # 64

Which of the following should an IS auditor review when evaluating information systems governance for a large organization?

Options:

A.  

Approval processes for new system implementations

B.  

Procedures for adding a new user to the invoice processing system

C.  

Approval processes for updating the corporate website

D.  

Procedures for regression testing system changes

Discussion 0
Question # 65

When auditing the closing stages of a system development protect which of the following should be the MOST important consideration?

Options:

A.  

Control requirements

B.  

Rollback procedures

C.  

Functional requirements documentation

D.  

User acceptance lest (UAT) results

Discussion 0
Question # 66

An IS auditor is analyzing a sample of accounts payable transactions for a specific vendor and identifies one transaction with a value five times as high as the average transaction. Which of the following should the auditor do NEXT?

Options:

A.  

Report the variance immediately to the audit committee

B.  

Request an explanation of the variance from the auditee

C.  

Increase the sample size to 100% of the population

D.  

Exclude the transaction from the sample population

Discussion 0
Question # 67

Which of the following indicates that an internal audit organization is structured to support the independence and clarity of the reporting process?

Options:

A.  

Auditors are responsible for performing operational duties or activities.

B.  

The internal audit manager reports functionally to a senior management official.

C.  

The internal audit manager has a reporting line to the audit committee.

D.  

Auditors are responsible for assessing and operating a system of internal controls.

Discussion 0
Question # 68

Controls related to authorized modifications to production programs are BEST tested by:

Options:

A.  

tracing modifications from the original request for change forward to the executable program.

B.  

tracing modifications from the executable program back to the original request for change.

C.  

testing only the authorizations to implement the new program.

D.  

reviewing only the actual lines of source code changed in the program.

Discussion 0
Question # 69

Which of the following is an advantage of using agile software development methodology over the waterfall methodology?

Options:

A.  

Less funding required overall

B.  

Quicker deliverables

C.  

Quicker end user acceptance

D.  

Clearly defined business expectations

Discussion 0
Question # 70

A programmer has made unauthorized changes lo key fields in a payroll system report. Which of the following control weaknesses would have contributed MOST to this problem?

Options:

A.  

The programmer did not involve the user in testing

B.  

The user requirements were not documented

C.  

The programmer has access to the production programs

D.  

Payroll files were not under the control of a librarian

Discussion 0
Question # 71

Which of the following areas is MOST likely to be overlooked when implementing a new data classification process?

Options:

A.  

End-user computing (EUC) systems

B.  

Email attachments

C.  

Data sent to vendors

D.  

New system applications

Discussion 0
Question # 72

Which of the following provides the MOST useful information for performing a business impact analysis (B1A)?

Options:

A.  

inventory of relevant business processes

B.  

Policies for business procurement

C.  

Documentation of application configurations

D.  

Results of business resumption planning efforts

Discussion 0
Question # 73

An auditee disagrees with a recommendation for corrective action that appears in the draft engagement report. Which of the following is the IS auditor's BEST course of action when preparing the final report?

Options:

A.  

Come to an agreement prior to issuing the final report.

B.  

Include the position supported by senior management in the final engagement report

C.  

Ensure the auditee's comments are included in the working papers

D.  

Exclude the disputed recommendation from the final engagement report

Discussion 0
Question # 74

Which of the following is the MOST important outcome of an information security program?

Options:

A.  

Operating system weaknesses are more easily identified.

B.  

Emerging security technologies are better understood and accepted.

C.  

The cost to mitigate information security risk is reduced.

D.  

Organizational awareness of security responsibilities is improved.

Discussion 0
Question # 75

Following a security breach in which a hacker exploited a well-known vulnerability in the domain controller, an IS audit has been asked to conduct a control assessment. the auditor's BEST course of action would be to determine if:

Options:

A.  

the patches were updated.

B.  

The logs were monitored.

C.  

The network traffic was being monitored.

D.  

The domain controller was classified for high availability.

Discussion 0
Question # 76

For an organization that has plans to implement web-based trading, it would be MOST important for an IS auditor to verify the organization's information security plan includes:

Options:

A.  

attributes for system passwords.

B.  

security training prior to implementation.

C.  

security requirements for the new application.

D.  

the firewall configuration for the web server.

Discussion 0
Question # 77

Which of the following provides the MOST useful information regarding an organization's risk appetite and tolerance?

Options:

A.  

Gap analysis

B.  

Audit reports

C.  

Risk profile

D.  

Risk register

Discussion 0
Question # 78

Which of the following provides the MOST assurance of the integrity of a firewall log?

Options:

A.  

The log is reviewed on a monthly basis.

B.  

Authorized access is required to view the log.

C.  

The log cannot be modified.

D.  

The log is retained per policy.

Discussion 0
Question # 79

An IS auditor finds a segregation of duties issue in an enterprise resource planning (ERP) system. Which of the following is the BEST way to prevent the misconfiguration from recurring?

Options:

A.  

Monitoring access rights on a regular basis

B.  

Referencing a standard user-access matrix

C.  

Granting user access using a role-based model

D.  

Correcting the segregation of duties conflicts

Discussion 0
Question # 80

During the implementation of a new system, an IS auditor must assess whether certain automated calculations comply with the regulatory requirements Which of the following is the BEST way to obtain this assurance?

Options:

A.  

Review sign-off documentation

B.  

Review the source code related to the calculation

C.  

Re-perform the calculation with audit software

D.  

Inspect user acceptance lest (UAT) results

Discussion 0
Question # 81

During an IT governance audit, an IS auditor notes that IT policies and procedures are not regularly reviewed and updated. The GREATEST concern to the IS auditor is that policies and procedures might not:

Options:

A.  

reflect current practices.

B.  

include new systems and corresponding process changes.

C.  

incorporate changes to relevant laws.

D.  

be subject to adequate quality assurance (QA).

Discussion 0
Question # 82

An organization has recently implemented a Voice-over IP (VoIP) communication system. Which ot the following should be the IS auditor's PRIMARY concern?

Options:

A.  

A single point of failure for both voice and data communications

B.  

Inability to use virtual private networks (VPNs) for internal traffic

C.  

Lack of integration of voice and data communications

D.  

Voice quality degradation due to packet toss

Discussion 0
Question # 83

Which of the following is the MOST important activity in the data classification process?

Options:

A.  

Labeling the data appropriately

B.  

Identifying risk associated with the data

C.  

Determining accountability of data owners

D.  

Determining the adequacy of privacy controls

Discussion 0
Question # 84

Which of the following is MOST important to consider when scheduling follow-up audits?

Options:

A.  

The efforts required for independent verification with new auditors

B.  

The impact if corrective actions are not taken

C.  

The amount of time the auditee has agreed to spend with auditors

D.  

Controls and detection risks related to the observations

Discussion 0
Question # 85

An IS auditor finds that an organization's data loss prevention (DLP) system is configured to use vendor default settings to identify violations. The auditor's MAIN concern should be that:

Options:

A.  

violation reports may not be reviewed in a timely manner.

B.  

a significant number of false positive violations may be reported.

C.  

violations may not be categorized according to the organization's risk profile.

D.  

violation reports may not be retained according to the organization's risk profile.

Discussion 0
Question # 86

Which of the following should an IS auditor consider the MOST significant risk associated with a new health records system that replaces a legacy system?

Options:

A.  

Staff were not involved in the procurement process, creating user resistance to the new system.

B.  

Data is not converted correctly, resulting in inaccurate patient records.

C.  

The deployment project experienced significant overruns, exceeding budget projections.

D.  

The new system has capacity issues, leading to slow response times for users.

Discussion 0
Question # 87

During an audit of a reciprocal disaster recovery agreement between two companies, the IS auditor would be MOST concerned with the:

Options:

A.  

allocation of resources during an emergency.

B.  

frequency of system testing.

C.  

differences in IS policies and procedures.

D.  

maintenance of hardware and software compatibility.

Discussion 0
Question # 88

A new regulation in one country of a global organization has recently prohibited cross-border transfer of personal data. An IS auditor has been asked to determine the organization's level of exposure In the affected country. Which of the following would be MOST helpful in making this assessment?

Options:

A.  

Developing an inventory of all business entities that exchange personal data with the affected jurisdiction

B.  

Identifying data security threats in the affected jurisdiction

C.  

Reviewing data classification procedures associated with the affected jurisdiction

D.  

Identifying business processes associated with personal data exchange with the affected jurisdiction

Discussion 0
Question # 89

The performance, risks, and capabilities of an IT infrastructure are BEST measured using a:

Options:

A.  

risk management review

B.  

control self-assessment (CSA).

C.  

service level agreement (SLA).

D.  

balanced scorecard.

Discussion 0
Question # 90

An information systems security officer's PRIMARY responsibility for business process applications is to:

Options:

A.  

authorize secured emergency access

B.  

approve the organization's security policy

C.  

ensure access rules agree with policies

D.  

create role-based rules for each business process

Discussion 0
Question # 91

An IS auditor is reviewing an organization's primary router access control list. Which of the following should result in a finding?

Options:

A.  

There are conflicting permit and deny rules for the IT group.

B.  

The network security group can change network address translation (NAT).

C.  

Individual permissions are overriding group permissions.

D.  

There is only one rule per group with access privileges.

Discussion 0
Question # 92

An IS auditor concludes that an organization has a quality security policy. Which of the following is MOST important to determine next? The policy must be:

Options:

A.  

well understand by all employees.

B.  

based on industry standards.

C.  

developed by process owners.

D.  

updated frequently.

Discussion 0
Question # 93

Which of the following would be an appropriate rote of internal audit in helping to establish an organization's privacy program?

Options:

A.  

Analyzing risks posed by new regulations

B.  

Designing controls to protect personal data

C.  

Defining roles within the organization related to privacy

D.  

Developing procedures to monitor the use of personal data

Discussion 0
Question # 94

Which of the following is the BEST source of information for an IS auditor to use as a baseline to assess the adequacy of an organization's privacy policy?

Options:

A.  

Historical privacy breaches and related root causes

B.  

Globally accepted privacy best practices

C.  

Local privacy standards and regulations

D.  

Benchmark studies of similar organizations

Discussion 0
Question # 95

Which of the following is the MOST appropriate and effective fire suppression method for an unstaffed computer room?

Options:

A.  

Water sprinkler

B.  

Fire extinguishers

C.  

Carbon dioxide (CO2)

D.  

Dry pipe

Discussion 0
Question # 96

An IS audit learn is evaluating the documentation related to the most recent application user-access review performed by IT and business management It is determined that the user list was not system-generated. Which of the following should be the GREATEST concern?

Options:

A.  

Availability of the user list reviewed

B.  

Confidentiality of the user list reviewed

C.  

Source of the user list reviewed

D.  

Completeness of the user list reviewed

Discussion 0
Question # 97

Which of the following is MOST helpful for measuring benefits realization for a new system?

Options:

A.  

Function point analysis

B.  

Balanced scorecard review

C.  

Post-implementation review

D.  

Business impact analysis (BIA)

Discussion 0
Question # 98

Which of the following is a social engineering attack method?

Options:

A.  

An employee is induced to reveal confidential IP addresses and passwords by answering questions over the phone.

B.  

A hacker walks around an office building using scanning tools to search for a wireless network to gain access.

C.  

An intruder eavesdrops and collects sensitive information flowing through the network and sells it to third parties.

D.  

An unauthorized person attempts to gain access to secure premises by following an authorized person through a secure door.

Discussion 0
Question # 99

An IS auditor should ensure that an application's audit trail:

Options:

A.  

has adequate security.

B.  

logs ail database records.

C.  

Is accessible online

D.  

does not impact operational efficiency

Discussion 0
Question # 100

Which of the following should an IS auditor consider FIRST when evaluating firewall rules?

Options:

A.  

The organization's security policy

B.  

The number of remote nodes

C.  

The firewalls' default settings

D.  

The physical location of the firewalls

Discussion 0
Question # 101

Which of the following is MOST important for an IS auditor to consider when performing the risk assessment poor to an audit engagement?

Options:

A.  

The design of controls

B.  

Industry standards and best practices

C.  

The results of the previous audit

D.  

The amount of time since the previous audit

Discussion 0
Question # 102

An IS auditor is evaluating the risk associated with moving from one database management system (DBMS) to another. Which of the following would be MOST helpful to ensure the integrity of the system throughout the change?

Options:

A.  

Preserving the same data classifications

B.  

Preserving the same data inputs

C.  

Preserving the same data structure

D.  

Preserving the same data interfaces

Discussion 0
Question # 103

An employee loses a mobile device resulting in loss of sensitive corporate data. Which o( the following would have BEST prevented data leakage?

Options:

A.  

Data encryption on the mobile device

B.  

Complex password policy for mobile devices

C.  

The triggering of remote data wipe capabilities

D.  

Awareness training for mobile device users

Discussion 0
Get CISA dumps and pass your exam in 24 hours!

Free Exams Sample Questions

sale-70-410-exam    | Exam-200-125-pdf    | we-sale-70-410-exam    | hot-sale-70-410-exam    | Latest-exam-700-603-Dumps    | Dumps-98-363-exams-date    | Certs-200-125-date    | Dumps-300-075-exams-date    | hot-sale-book-C8010-726-book    | Hot-Sale-200-310-Exam    | Exam-Description-200-310-dumps?    | hot-sale-book-200-125-book    | Latest-Updated-300-209-Exam    | Dumps-210-260-exams-date    | Download-200-125-Exam-PDF    | Exam-Description-300-101-dumps    | Certs-300-101-date    | Hot-Sale-300-075-Exam    | Latest-exam-200-125-Dumps    | Exam-Description-200-125-dumps    | Latest-Updated-300-075-Exam    | hot-sale-book-210-260-book    | Dumps-200-901-exams-date    | Certs-200-901-date    | Latest-exam-1Z0-062-Dumps    | Hot-Sale-1Z0-062-Exam    | Certs-CSSLP-date    | 100%-Pass-70-383-Exams    | Latest-JN0-360-real-exam-questions    | 100%-Pass-4A0-100-Real-Exam-Questions    | Dumps-300-135-exams-date    | Passed-200-105-Tech-Exams    | Latest-Updated-200-310-Exam    | Download-300-070-Exam-PDF    | Hot-Sale-JN0-360-Exam    | 100%-Pass-JN0-360-Exams    | 100%-Pass-JN0-360-Real-Exam-Questions    | Dumps-JN0-360-exams-date    | Exam-Description-1Z0-876-dumps    | Latest-exam-1Z0-876-Dumps    | Dumps-HPE0-Y53-exams-date    | 2017-Latest-HPE0-Y53-Exam    | 100%-Pass-HPE0-Y53-Real-Exam-Questions    | Pass-4A0-100-Exam    | Latest-4A0-100-Questions    | Dumps-98-365-exams-date    | 2017-Latest-98-365-Exam    | 100%-Pass-VCS-254-Exams    | 2017-Latest-VCS-273-Exam    | Dumps-200-355-exams-date    | 2017-Latest-300-320-Exam    | Pass-300-101-Exam    | 100%-Pass-300-115-Exams    |
http://www.portvapes.co.uk/    | http://www.portvapes.co.uk/    |