Pre-Summer Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dm70dm

CISA Certified Information Systems Auditor Questions and Answers

Questions 4

A vendor requires privileged access to a key business application. Which of the following is the BEST recommendation to reduce the risk of data leakage?

Options:

A.

Implement real-time activity monitoring for privileged roles

B.

Include the right-to-audit in the vendor contract

C.

Perform a review of privileged roles and responsibilities

D.

Require the vendor to implement job rotation for privileged roles

Buy Now
Questions 5

An IS auditor reviewing the database controls for a new e-commerce system discovers a security weakness in the database configuration. Which of the following should be the IS auditor ' s NEXT course of action?

Options:

A.

Identify existing mitigating controls.

B.

Disclose the findings to senior management.

C.

Assist in drafting corrective actions.

D.

Attempt to exploit the weakness.

Buy Now
Questions 6

During the implementation of an upgraded enterprise resource planning (ERP) system, which of the following is the MOST important consideration for a go-live decision?

Options:

A.

Rollback strategy

B.

Test cases

C.

Post-implementation review objectives

D.

Business case

Buy Now
Questions 7

An IS auditor finds the log management system is overwhelmed with false positive alerts. The auditor ' s BEST recommendation would be to:

Options:

A.

establish criteria for reviewing alerts.

B.

recruit more monitoring personnel.

C.

reduce the firewall rules.

D.

fine tune the intrusion detection system (IDS).

Buy Now
Questions 8

An IS auditor is conducting a review of a data center. Which of the following observations could indicate an access control Issue?

Options:

A.

Security cameras deployed outside main entrance

B.

Antistatic mats deployed at the computer room entrance

C.

Muddy footprints directly inside the emergency exit

D.

Fencing around facility is two meters high

Buy Now
Questions 9

An IS auditor is planning a review of an organizations cybersecurity incident response maturity Which of the following methodologies would provide the MOST reliable conclusions?

Options:

A.

Judgmental sampling

B.

Data analytics testing

C.

Variable sampling

D.

Compliance testing

Buy Now
Questions 10

An IS auditor has learned that access privileges are not periodically reviewed or updated. Which of the following would provide the BEST evidence to determine whether transactions have been executed by authorized employees?

Options:

A.

Audit trails

B.

Control totals

C.

Reconciliations

D.

Change logs

Buy Now
Questions 11

What is the PRIMARY reason to adopt a risk-based IS audit strategy?

Options:

A.

To achieve synergy between audit and other risk management functions

B.

To prioritize available resources and focus on areas with significant risk

C.

To reduce the time and effort needed to perform a full audit cycle

D.

To identify key threats, risks, and controls for the organization

Buy Now
Questions 12

What is the purpose of hashing a document?

Options:

A.

To prevent unauthorized disclosure of the contents

B.

To validate the integrity of the file contents

C.

To classify the file for internal use only

D.

To compress the size of the file

Buy Now
Questions 13

Which of the following BEST enables an organization to improve the effectiveness of its incident response team?

Options:

A.

Conducting periodic testing and incorporating lessons learned

B.

Increasing the mean resolution time and publishing key performance indicator (KPI) metrics

C.

Disseminating incident response procedures and requiring signed acknowledgment by team members

D.

Ensuring all team members understand information systems technology

Buy Now
Questions 14

During an audit of a financial application, it was determined that many terminated users ' accounts were not disabled. Which of the following should be the IS auditor ' s NEXT step?

Options:

A.

Perform substantive testing of terminated users ' access rights.

B.

Perform a review of terminated users ' account activity

C.

Communicate risks to the application owner.

D.

Conclude that IT general controls ate ineffective.

Buy Now
Questions 15

In a public key cryptographic system, which of the following is the PRIMARY requirement to address the risk of man-in-the-middle attacks through spoofing?

Options:

A.

Strong encryption algorithms

B.

Kerberos authentication

C.

Registration authority

D.

Certificate authority (CA)

Buy Now
Questions 16

Which of the following provides the BEST evidence of effective IT portfolio managements?

Options:

A.

IT portfolio updates are communicated when approved.

B.

Programs in the IT portfolio are prioritized by each business function.

C.

The IT portfolio is updated as business strategy changes.

D.

The IT portfolio is updated on the basis of current industry benchmarks.

Buy Now
Questions 17

Which of the following is MOST appropriate to review when determining if the work completed on an IT project is in alignment with budgeted costs?

Options:

A.

Return on investment (ROI) analysis

B.

Earned value analysis (EVA)

C.

Financial value analysis

D.

Business impact analysis (BIA)

Buy Now
Questions 18

Which of the following is the PRIMARY objective of a control self-assessment (CSA)?

Options:

A.

To shift some control monitoring responsibilities to functional areas

B.

To create cohesive teams through employee involvement

C.

To improve the audit rating process

D.

To reduce control costs associated with a specific function

Buy Now
Questions 19

Which of the following is the BEST reason to implement a configuration management database (CMDB)?

Options:

A.

To store licenses for software configuration items

B.

To provide real-time network monitoring of configuration items

C.

To track the physical location of configuration items

D.

To document relationships between configuration items

Buy Now
Questions 20

Which of the following BEST enables alignment of IT with business objectives?

Options:

A.

Benchmarking against peer organizations

B.

Developing key performance indicators (KPIs)

C.

Completing an IT risk assessment

D.

Leveraging an IT governance framework

Buy Now
Questions 21

Which of the following is the BEST approach for determining the overall IT risk appetite of an organization when business units use different methods formanaging IT risks?

Options:

A.

Average the business units’ IT risk levels

B.

Identify the highest-rated IT risk level among the business units

C.

Prioritize the organization ' s IT risk scenarios

D.

Establish a global IT risk scoring criteria

Buy Now
Questions 22

A new system development project is running late against a critical implementation deadline. Which of the following is the MOST important activity?

Options:

A.

Ensure that code has been reviewed.

B.

Perform user acceptance testing (UAT).

C.

Document last-minute enhancements.

D.

Perform a pre-implementation audit.

Buy Now
Questions 23

Which of the following groups is PRIMARILY accountable for establishing a culture that facilitates an effective and efficient internal control system?

Options:

A.

HR

B.

Senior management

C.

Line management

D.

Internal audit

Buy Now
Questions 24

Which of the following provides the MOST useful information regarding an organization ' s risk appetite and tolerance?

Options:

A.

Gap analysis

B.

Audit reports

C.

Risk profile

D.

Risk register

Buy Now
Questions 25

When auditing the closing stages of a system development protect which of the following should be the MOST important consideration?

Options:

A.

Control requirements

B.

Rollback procedures

C.

Functional requirements documentation

D.

User acceptance lest (UAT) results

Buy Now
Questions 26

An organization has developed mature risk management practices that are followed across all departments What is the MOST effective way for the audit team to leverage this risk management maturity?

Options:

A.

Implementing risk responses on management ' s behalf

B.

Integrating the risk register for audit planning purposes

C.

Providing assurances to management regarding risk

D.

Facilitating audit risk identification and evaluation workshops

Buy Now
Questions 27

An IS auditor is conducting a post-implementation review of an enterprise resource planning (ERP) system. End users indicated concerns with the accuracy of critical automatic calculations made by the system. The auditor ' s FIRST course of action should be to:

Options:

A.

review recent changes to the system.

B.

verify completeness of user acceptance testing (UAT).

C.

verify results to determine validity of user concerns.

D.

review initial business requirements.

Buy Now
Questions 28

Which of the following is the BEST way to detect unauthorized copies of licensed software on systems?

Options:

A.

Implement controls to prohibit downloads of unauthorized software.

B.

Conduct periodic software scanning.

C.

Perform periodic counting of licenses.

D.

Require senior management approval when installing licenses.

Buy Now
Questions 29

Which of the following testing methods is MOST appropriate for assessing whether system integrity has been maintained after changes have been made?

Options:

A.

Regression testing

B.

Unit testing

C.

Integration testing

D.

Acceptance testing

Buy Now
Questions 30

An IS auditor is reviewing a machine learning algorithm-based system for loan approvals and is preparing a data set to test the algorithm for bias. Which of the following is MOST important for the auditor’s test data set to include?

Options:

A.

Applicants of all ages

B.

Applicants from a range of geographic areas and income levels

C.

Incomplete records and incorrectly formatted data

D.

Duplicate records

Buy Now
Questions 31

Which of the following is a threat to IS auditor independence?

Options:

A.

Internal auditors share the audit plan and control test plans with management prior to audit commencement.

B.

Internal auditors design remediation plans to address control gaps identified by internal audit.

C.

Internal auditors attend IT steering committee meetings.

D.

Internal auditors recommend appropriate controls for systems in development.

Buy Now
Questions 32

An IS auditor has been tasked with analyzing an organization ' s capital expenditures against its repair and maintenance costs. Which of the following is the BEST reason to use a data analytics tool for this purpose?

Options:

A.

It reduces the error rate.

B.

It improves the reliability of the data.

C.

It enables the auditor to work with 100% of the transactions.

D.

It reduces the sample size required to perform the audit.

Buy Now
Questions 33

An IS auditor is evaluating an enterprise resource planning (ERP) migration from local systems to the cloud. Who should be responsible for the data

classification in this project?

Options:

A.

Information security officer

B.

Database administrator (DBA)

C.

Information owner

D.

Data architect

Buy Now
Questions 34

During an audit, the IS auditor finds that in many cases excessive rights were not removed from a system. Which of the following is the auditor ' s BEST recommendation?

Options:

A.

System administrators should ensure consistency of assigned rights.

B.

IT security should regularly revoke excessive system rights.

C.

Human resources (HR) should delete access rights of terminated employees.

D.

Line management should regularly review and request modification of access rights

Buy Now
Questions 35

Which of the following is the MOST appropriate control to ensure integrity of online orders?

Options:

A.

Data Encryption Standard (DES)

B.

Digital signature

C.

Public key encryption

D.

Multi-factor authentication

Buy Now
Questions 36

Which of the following is MOST important for an IS auditor to confirm when reviewing an organization ' s plans to implement robotic process automation (RPA > to automate routine business tasks?

Options:

A.

The end-to-end process is understood and documented.

B.

Roles and responsibilities are defined for the business processes in scope.

C.

A benchmarking exercise of industry peers who use RPA has been completed.

D.

A request for proposal (RFP) has been issued to qualified vendors.

Buy Now
Questions 37

An IS auditor should look for which of the following to ensure the risk associated with scope creep has been mitigated during software development?

Options:

A.

Source code version control

B.

Project change management controls

C.

Existence of an architecture review board

D.

Configuration management

Buy Now
Questions 38

Demonstrated support from which of the following roles in an organization has the MOST influence over information security governance?

Options:

A.

Chief information security officer (CISO)

B.

Information security steering committee

C.

Board of directors

D.

Chief information officer (CIO)

Buy Now
Questions 39

An auditee disagrees with a recommendation for corrective action that appears in the draft engagement report. Which of the following is the IS auditor ' s BEST course of action when preparing the final report?

Options:

A.

Come to an agreement prior to issuing the final report.

B.

Include the position supported by senior management in the final engagement report

C.

Ensure the auditee ' s comments are included in the working papers

D.

Exclude the disputed recommendation from the final engagement report

Buy Now
Questions 40

Which of the following provides the MOST useful information to an IS auditor when selecting projects for inclusion in an IT audit plan?

Options:

A.

Project charter

B.

Project plan

C.

Project issue log

D.

Project business case

Buy Now
Questions 41

Which of the following is the PRIMARY benefit of introducing business impact analyses (BIAs) to business resiliency strategies?

Options:

A.

It identifies legal obligations that may be incurred as a result of business service disruptions

B.

It provides updates on the risk level of disasters that may occur

C.

It delineates employee responsibilities that the organization must fulfill in a crisis

D.

It helps prioritize the restoration of systems and applications

Buy Now
Questions 42

Which of the following methods would MOST effectively provide positive authentication for physical access?

Options:

A.

Proximity card

B.

Retina scan

C.

Numeric keypads and surveillance camera

D.

A smart card and a security guard

Buy Now
Questions 43

Which of the following parameters reflects the risk threshold for an organization experiencing a service disruption?

Options:

A.

Maximum tolerable outage (MTO)

B.

Recovery point objective (RPO)

C.

Service delivery objective (SDO)

D.

Allowable interruption window (AIW)

Buy Now
Questions 44

During a follow-up audit, an IS auditor finds that some critical recommendations have the IS auditor ' s BEST course of action?

Options:

A.

Require the auditee to address the recommendations in full.

B.

Adjust the annual risk assessment accordingly.

C.

Evaluate senior management ' s acceptance of the risk.

D.

Update the audit program based on management ' s acceptance of risk.

Buy Now
Questions 45

An IS auditor performs a follow-up audit and learns the approach taken by the auditee to fix the findings differs from the agreed-upon approach confirmed during the last audit. Which of the following should be the auditor ' s NEXT course of action?

Options:

A.

Evaluate the appropriateness of the remedial action taken.

B.

Conduct a risk analysis incorporating the change.

C.

Report results of the follow-up to the audit committee.

D.

Inform senior management of the change in approach.

Buy Now
Questions 46

Which of the following is the BEST approach to help organizations address risks associated with shadow IT?

Options:

A.

Implementing policies that prohibit the use of unauthorized systems and solutions

B.

Training employees on information security and conducting routine follow-ups

C.

Providing employees with access to necessary systems and unlimited software licenses

D.

Conducting regular security assessments to identify unauthorized systems and solutions

Buy Now
Questions 47

Which of the following observations should be of GREATEST concern to an IS auditor reviewing an organization ' s enterprise architecture (EA) program?

Options:

A.

IT application owners have sole responsibility for architecture approval.

B.

The architecture review board is chaired by the CIO.

C.

Information security requirements are reviewed by the EA program.

D.

The EA program governs projects that are not IT-related.

Buy Now
Questions 48

An organization using a cloud provider for its online billing system requires the website to be accessible to customers at all times. What is the BEST way to verify the organization ' s business requirements are met?

Options:

A.

Invoke the right-to-audit clause.

B.

Require the vendor to report any outages longer than five minutes

C.

Monitor the service level agreement (SLA) with the vendor.

D.

Agree on periodic performance discussions with the vendor

Buy Now
Questions 49

Which of the following practices associated with capacity planning provides the GREATEST assurance that future incidents related to existing server performance will be prevented?

Options:

A.

Reviewing results from simulated high-demand stress test scenarios

B.

Performing a root cause analysis for past performance incidents

C.

Anticipating current service level agreements (SLAs) will remain unchanged

D.

Duplicating existing disk drive systems to improve redundancy and data storage

Buy Now
Questions 50

Which of the following is the BEST source of information for an IS auditor to use as a baseline to assess the adequacy of an organization ' s privacy policy?

Options:

A.

Historical privacy breaches and related root causes

B.

Globally accepted privacy best practices

C.

Local privacy standards and regulations

D.

Benchmark studies of similar organizations

Buy Now
Questions 51

The PRIMARY reason to perform internal quality assurance (QA) for an internal audit function is to ensure:

Options:

A.

Internal audit activity conforms with audit standards and methodology.

B.

The audit function is adequately governed and meets performance metrics.

C.

Inherent risk in audits is minimized.

D.

Audit resources are used most effectively.

Buy Now
Questions 52

Prior to a follow-up engagement, an IS auditor learns that management has decided to accept a level of residual risk related to an audit finding without remediation. The IS auditor is concerned about management ' s decision. Which of the following should be the IS auditor ' s NEXT course of action?

Options:

A.

Accept management ' s decision and continue the follow-up.

B.

Report the issue to IS audit management.

C.

Report the disagreement to the board.

D.

Present the issue to executive management.

Buy Now
Questions 53

An online retailer is receiving customer complaints about receiving different items from what they ordered on the organization ' s website. The root cause has been traced to poor data quality. Despite efforts to clean erroneous data from the system, multiple data quality issues continue to occur. Which of the following recommendations would be the BEST way to reduce the likelihood of future occurrences?

Options:

A.

Assign responsibility for improving data quality.

B.

Invest in additional employee training for data entry.

C.

Outsource data cleansing activities to reliable third parties.

D.

Implement business rules to validate employee data entry.

Buy Now
Questions 54

Which of the following is the MOST important privacy consideration for an organization that uses a cloud service provider to process customer data?

Options:

A.

Data privacy must be managed in accordance with the regulations applicable to the organization.

B.

Data privacy must be monitored in accordance with industry standards and best practices.

C.

No personal information may be transferred to the service provider without notifying the customer.

D.

Customer data transferred to the service provider must be reported to the regulatory authority.

Buy Now
Questions 55

Which of the following provides the MOST reliable method of preventing unauthonzed logon?

Options:

A.

issuing authentication tokens

B.

Reinforcing current security policies

C.

Limiting after-hours usage

D.

Installing an automatic password generator

Buy Now
Questions 56

Which of the following is the MOST significant risk when an application uses individual end-user accounts to access the underlying database?

Options:

A.

Multiple connects to the database are used and slow the process_

B.

User accounts may remain active after a termination.

C.

Users may be able to circumvent application controls.

D.

Application may not capture a complete audit trail.

Buy Now
Questions 57

Which of the following is the BEST method for converting system-generated log files into a format suitable for data analysis?

Options:

A.

Extraction

B.

Data acquisition

C.

Imaging

D.

Normalization

Buy Now
Questions 58

Which of the following findings from a database security audit presents the GREATEST risk of critical security exposures?

Options:

A.

Legacy data has not been purged.

B.

Admin account passwords are not set to expire.

C.

Default settings have not been changed.

D.

Database activity logging is not complete.

Buy Now
Questions 59

Which of the following is MOST important to ensure when developing an effective security awareness program?

Options:

A.

Training personnel are information security professionals.

B.

Outcome metrics for the program are established.

C.

Security threat scenarios are included in the program content.

D.

Phishing exercises are conducted post-training

Buy Now
Questions 60

Which of the following is MOST important for an IS auditor to look

for in a project feasibility study?

Options:

A.

An assessment of whether requirements will be fully met

B.

An assessment indicating security controls will operateeffectively

C.

An assessment of whether the expected benefits can beachieved

D.

An assessment indicating the benefits will exceed the implement

Buy Now
Questions 61

While reviewing transactions, an IS auditor discovers inconsistencies in a relational database. Which of the following would be the auditor ' s BEST recommendation?

Options:

A.

Update the data dictionary.

B.

Implement edit checks.

C.

Perform data modeling.

D.

Conduct data owner training.

Buy Now
Questions 62

A computer forensic audit is MOST relevant in which of the following situations?

Options:

A.

Inadequate controls in the IT environment

B.

Mismatches in transaction data

C.

Missing server patches

D.

Data loss due to hacking of servers

Buy Now
Questions 63

The PRIMARY purpose of a configuration management system is to:

Options:

A.

track software updates.

B.

define baselines for software.

C.

support the release procedure.

D.

standardize change approval.

Buy Now
Questions 64

An externally facing system containing sensitive data is configured such that users have either read-only or administrator rights. Most users of the system have administrator access. Which of the following is the GREATEST risk associated with this situation?

Options:

A.

Users can export application logs.

B.

Users can view sensitive data.

C.

Users can make unauthorized changes.

D.

Users can install open-licensed software.

Buy Now
Questions 65

Which of the following provides the MOST reliable audit evidence on the validity of transactions in a financial application?

Options:

A.

Walk-through reviews

B.

Substantive testing

C.

Compliance testing

D.

Design documentation reviews

Buy Now
Questions 66

Which of the following should be the GREATEST concern for an IS auditor performing a post-implementation review for a major system upgrade?

Options:

A.

Changes are promoted to production by the development group.

B.

Object code can be accessed by the development group.

C.

Developers have access to the testing environment.

D.

Change approvals are not formally documented.

Buy Now
Questions 67

Which of the following documents would be MOST useful in detecting a weakness in segregation of duties?

Options:

A.

System flowchart

B.

Data flow diagram

C.

Process flowchart

D.

Entity-relationship diagram

Buy Now
Questions 68

Which of the following is the GREATEST risk associated with storing customer data on a web server?

Options:

A.

Data availability

B.

Data confidentiality

C.

Data integrity

D.

Data redundancy

Buy Now
Questions 69

An IS auditor learns the organization has experienced several server failures in its distributed environment. Which of the following is the BEST recommendation to limit the potential impact of server failures in the future?

Options:

A.

Redundant pathways

B.

Clustering

C.

Failover power

D.

Parallel testing

Buy Now
Questions 70

Which of the following approaches BEST enables an IS auditor to detect security vulnerabilities within an application?

Options:

A.

Threat modeling

B.

Concept mapping

C.

Prototyping

D.

Threat intelligence

Buy Now
Questions 71

Which of the following is MOST important to determine during the planning phase of a cloud-based messaging and collaboration platform acquisition?

Options:

A.

Role-based access control policies

B.

Types of data that can be uploaded to the platform

C.

Processes for on-boarding and off-boarding users to the platform

D.

Processes for reviewing administrator activity

Buy Now
Questions 72

Which of the following would an IS auditor recommend as the MOST effective preventive control to reduce the risk of data leakage?

Options:

A.

Ensure that paper documents arc disposed security.

B.

Implement an intrusion detection system (IDS).

C.

Verify that application logs capture any changes made.

D.

Validate that all data files contain digital watermarks

Buy Now
Questions 73

As part of business continuity planning, which of the following is MOST important to assess when conducting a business impact analysis (B1A)?

Options:

A.

Risk appetite

B.

Critical applications m the cloud

C.

Completeness of critical asset inventory

D.

Recovery scenarios

Buy Now
Questions 74

Which of the following is the BEST evidence that an organization ' s IT strategy is aligned lo its business objectives?

Options:

A.

The IT strategy is modified in response to organizational change.

B.

The IT strategy is approved by executive management.

C.

The IT strategy is based on IT operational best practices.

D.

The IT strategy has significant impact on the business strategy

Buy Now
Questions 75

Which type of control has been established when an organization implements a security information and event management (SIEM) system?

Options:

A.

Preventive

B.

Detective

C.

Directive

D.

Corrective

Buy Now
Questions 76

An IS auditor is performing a follow-up audit and notes that some critical deficiencies have not been addressed. The auditor ' s BEST course of action is to:

Options:

A.

document management ' s reasons for not addressing deficiencies.

B.

postpone the audit until the deficiencies are addressed.

C.

assess the impact of not addressing deficiencies.

D.

provide new recommendations.

Buy Now
Questions 77

Which of the following should an IS auditor review when evaluating information systems governance for a large organization?

Options:

A.

Approval processes for new system implementations

B.

Procedures for adding a new user to the invoice processing system

C.

Approval processes for updating the corporate website

D.

Procedures for regression testing system changes

Buy Now
Questions 78

Which of the following occurs during the issues management process for a system development project?

Options:

A.

Contingency planning

B.

Configuration management

C.

Help desk management

D.

Impact assessment

Buy Now
Questions 79

An IS auditor suspects an organization ' s computer may have been used to commit a crime. Which of the following is the auditor ' s BEST course of action?

Options:

A.

Examine the computer to search for evidence supporting the suspicions.

B.

Advise management of the crime after the investigation.

C.

Contact the incident response team to conduct an investigation.

D.

Notify local law enforcement of the potential crime before further investigation.

Buy Now
Questions 80

Which of the following would BEST guide an IS auditor when determining an appropriate time to schedule the follow-up of agreed corrective actions for reported audit issues?

Options:

A.

Progress updates indicate that the implementation of agreed actions is on track.

B.

Sufficient time has elapsed since implementation to provide evidence of control operation.

C.

Business management has completed the implementation of agreed actions on schedule.

D.

Regulators have announced a timeline for an inspection visit.

Buy Now
Questions 81

A new regulation in one country of a global organization has recently prohibited cross-border transfer of personal data. An IS auditor has been asked to determine the organization ' s level of exposure In the affected country. Which of the following would be MOST helpful in making this assessment?

Options:

A.

Developing an inventory of all business entities that exchange personal data with the affected jurisdiction

B.

Identifying data security threats in the affected jurisdiction

C.

Reviewing data classification procedures associated with the affected jurisdiction

D.

Identifying business processes associated with personal data exchange with the affected jurisdiction

Buy Now
Questions 82

Management has learned the implementation of a new IT system will not be completed on time and has requested an audit. Which of the following audit findings should be of GREATEST concern?

Options:

A.

The actual start times of some activities were later than originally scheduled.

B.

Tasks defined on the critical path do not have resources allocated.

C.

The project manager lacks formal certification.

D.

Milestones have not been defined for all project products.

Buy Now
Questions 83

An IS auditor is examining a front-end subledger and a main ledger. Which of the following would be the GREATEST concern if there are flaws in the mapping of accounts between the two systems?

Options:

A.

Double-posting of a single journal entry

B.

Inability to support new business transactions

C.

Unauthorized alteration of account attributes

D.

Inaccuracy of financial reporting

Buy Now
Questions 84

Which of the following BEST addresses the availability of an online store?

Options:

A.

RAID level 5 storage devices

B.

Online backups

C.

A mirrored site at another location

D.

Clustered architecture

Buy Now
Questions 85

Which of the following is the PRIMARY purpose of obtaining a baseline image during an operating system audit?

Options:

A.

To identify atypical running processes

B.

To verify antivirus definitions

C.

To identify local administrator account access

D.

To verify the integrity of operating system backups

Buy Now
Questions 86

An IS auditor is reviewing a client ' s outsourced payroll system to assess whether the financial audit team can rely on the application. Which of the following findings would be the auditor ' s

GREATEST concern?

Options:

A.

User access rights have not been periodically reviewed by the client.

B.

Payroll processing costs have not been included in the IT budget.

C.

The third-party contract has not been reviewed by the legal department.

D.

The third-party contract does not comply with the vendor management policy.

Buy Now
Questions 87

The PRIMARY advantage of object-oriented technology is enhanced:

Options:

A.

efficiency due to the re-use of elements of logic.

B.

management of sequential program execution for data access.

C.

grouping of objects into methods for data access.

D.

management of a restricted variety of data types for a data object.

Buy Now
Questions 88

A post-implementation audit has been completed for the deployment of a sophisticated job scheduling tool Which of the following observations would be of GREATEST concern?

Options:

A.

The IT learn customized tool settings without seeking approval from the provider.

B.

The overall project took longer to complete than planned.

C.

The data encryption setting is not enabled in the scheduling tool.

D.

The IT team accesses the scheduler admin panel via a generic account.

Buy Now
Questions 89

The purpose of a checksum on an amount field in an electronic data interchange (EDI) communication of financial transactions is to ensure:

Options:

A.

nonrepudiation.

B.

authorization,

C.

integrity,

D.

authenticity.

Buy Now
Questions 90

An organization is establishing a steering committee for the implementation of a new enterprise resource planning (ERP) system that uses Agile project management methodology. What is the MOST important criterion for the makeup of this committee?

Options:

A.

Senior management representation

B.

Ability to meet the time commitment required

C.

Agile project management experience

D.

ERP implementation experience

Buy Now
Questions 91

Which of the following analytical methods would be MOST useful when trying to identify groups with similar behavior or characteristics in a large population?

Options:

A.

Deviation detection

B.

Cluster sampling

C.

Random sampling

D.

Classification

Buy Now
Questions 92

What is the PRIMARY purpose of documenting audit objectives when preparing for an engagement?

Options:

A.

To address the overall risk associated with the activity under review

B.

To identify areas with relatively high probability of material problems

C.

To help ensure maximum use of audit resources during the engagement

D.

To help prioritize and schedule auditee meetings

Buy Now
Questions 93

A hearth care organization utilizes Internet of Things (loT) devices to improve patient outcomes through real-time patient monitoring and advanced diagnostics. Which of the following would BEST assist in isolating these devices from corporate network traffic?

Options:

A.

Internal firewalls

B.

Blockchain technology

C.

Content filtering proxy

D.

Zero Trust architecture

Buy Now
Questions 94

Which of the following is the MOST effective control to mitigate unintentional misuse of authorized access?

Options:

A.

Annual sign-off of acceptable use policy

B.

Regular monitoring of user access logs

C.

Security awareness training

D.

Formalized disciplinary action

Buy Now
Questions 95

Which of the following should be the role of internal audit in an organization’s move to the cloud?

Options:

A.

Mitigating risk to an acceptable level.

B.

Assessing key controls that support the migration.

C.

Implementing security controls for data prior to migration.

D.

Identifying impacts to organizational budgets and resources.

Buy Now
Questions 96

Which of the following is the MOST effective way to maintain network integrity when using mobile devices?

Options:

A.

Implement network access control.

B.

Implement outbound firewall rules.

C.

Perform network reviews.

D.

Review access control lists.

Buy Now
Questions 97

Which of the following should be a concern to an IS auditor reviewing an organization’s use of a major cloud provider for Infrastructure as a Service (IaaS)?

Options:

A.

The IaaS service is connected to the organization’s network via a virtual private network (VPN).

B.

End users are able to create their own cloud server instances.

C.

The IaaS service relies on the organization’s active directory domain.

D.

The cloud governance policy was not reviewed within the last year by the IT department.

Buy Now
Questions 98

Which of the following should be of GREATEST concern to an IS auditor when using data analytics?

Options:

A.

The data source lacks integrity.

B.

The data analytics software is open source.

C.

The data set contains irrelevant fields.

D.

The data was not extracted by the auditor.

Buy Now
Questions 99

An IS auditor finds an IT manager recently changed a Software as a Service (SaaS) provider contract in an effort to cut costs. The new contract increases the time to resolve incidents. Which of the following should be the auditor’s GREATEST concern?

Options:

A.

The impact on business processes has not been evaluated.

B.

The new contract is not in compliance with IT security policy.

C.

The corresponding service level agreement (SLA) was not modified.

D.

Alternative cost-reduction methods were not considered.

Buy Now
Questions 100

Which of the following responses to risk associated with separation of duties would incur the LOWEST initial cost?

Options:

A.

Risk mitigation

B.

Risk acceptance

C.

Risk transference

D.

Risk reduction

Buy Now
Questions 101

An IS auditor is reviewing an organization ' s information asset management process. Which of the following would be of GREATEST concern to the auditor?

Options:

A.

The process does not require specifying the physical locations of assets.

B.

Process ownership has not been established.

C.

The process does not include asset review.

D.

Identification of asset value is not included in the process.

Buy Now
Questions 102

Which of the following would be MOST useful when analyzing computer performance?

Options:

A.

Statistical metrics measuring capacity utilization

B.

Operations report of user dissatisfaction with response time

C.

Tuning of system software to optimize resource usage

D.

Report of off-peak utilization and response time

Buy Now
Questions 103

A small business unit is implementing a control self-assessment (CSA) program and leveraging the internal

audit function to test its internal controls annually. Which of the following is the MOST significant benefit of

this approach?

Options:

A.

Compliance costs are reduced.

B.

Risks are detected earlier.

C.

Business owners can focus more on their core roles.

D.

Line management is more motivated to avoid control exceptions.

Buy Now
Questions 104

Which of the following BEST enables a governing body to monitor IT performance based on metrics?

Options:

A.

Metrics defined at the operational level are aligned with service delivery objectives (SDOs).

B.

IT asset metrics are defined based on manufacturers’ recommendations.

C.

Metrics are derived from quantitatively measurable data generated automatically by systems.

D.

Business goals have been properly aligned with IT performance metrics.

Buy Now
Questions 105

Which of the following is BEST supported by enforcing data definition standards within a database?

Options:

A.

Data disposal

B.

Data retention

C.

Data formatting

D.

Data confidentiality

Buy Now
Questions 106

Which of the following is the BEST security control to validate the integrity of data communicated between production databases and a big data analytics

system?

Options:

A.

Hashing in-scope data sets

B.

Encrypting in-scope data sets

C.

Running and comparing the count function within the in-scope data sets

D.

Hosting a digital certificate for in-scope data sets

Buy Now
Questions 107

An IS auditor reviewing the throat assessment for a data cantor would be MOST concerned if:

Options:

A.

some of the identified threats are unlikely to occur.

B.

all identified threats relate to external entities.

C.

the exercise was completed by local management.

D.

neighboring organizations ' operations have been included.

Buy Now
Questions 108

What is the MAIN reason to use incremental backups?

Options:

A.

To improve key availability metrics

B.

To reduce costs associates with backups

C.

To increase backup resiliency and redundancy

D.

To minimize the backup time and resources

Buy Now
Questions 109

An IS auditor found that a company executive is encouraging employee use of social networking sites for business purposes. Which of the following recommendations would BEST help to reduce the risk of data leakage?

Options:

A.

Requiring policy acknowledgment and nondisclosure agreements signed by employees

B.

Providing education and guidelines to employees on use of social networking sites

C.

Establishing strong access controls on confidential data

D.

Monitoring employees ' social networking usage

Buy Now
Questions 110

Which of the following should be the PRIMARY focus for any network design that deploys a Zero Trust architecture?

Options:

A.

Protecting network segments

B.

Protecting technology resources

C.

Maintaining network router operating system versions

D.

Ensuring a vendor-agnostic environment

Buy Now
Questions 111

Which of the following would be of GREATEST concern to an IS auditor reviewing an IT-related customer service project?

Options:

A.

The project risk exceeds the organization ' s risk appetite.

B.

Executing the project will require additional investments.

C.

Expected business value is expressed in qualitative terms.

D.

The organization will be the first to offer the proposed services.

Buy Now
Questions 112

Following a merger, a review of an international organization determines the IT steering committee ' s decisions do not extend to regional offices as required in the consolidated IT operating model. Which of the following is the IS auditor ' s BEST recommendation?

Options:

A.

Create regional centers of excellence.

B.

Engage an IT governance consultant.

C.

Create regional IT steering committees.

D.

Update the IT steering committee ' s formal charter.

Buy Now
Questions 113

An IT governance body wants to determine whether IT service delivery is based on consistently effective processes. Which of the following is the BEST approach?

Options:

A.

implement a control self-assessment (CSA)

B.

Conduct a gap analysis

C.

Develop a maturity model

D.

Evaluate key performance indicators (KPIs)

Buy Now
Questions 114

A white box testing method is applicable with which of the following testing processes?

Options:

A.

Integration testing

B.

Parallel testing

C.

Sociability testing

D.

User acceptance testing (UAT)

Buy Now
Questions 115

A new regulation requires organizations to report significant security incidents to the regulator within 24 hours of identification. Which of the following is the IS auditor ' s BEST recommendation to facilitate compliance with the regulation?

Options:

A.

Include the requirement in the incident management response plan.

B.

Establish key performance indicators (KPIs) for timely identification of security incidents.

C.

Enhance the alert functionality of the intrusion detection system (IDS).

D.

Engage an external security incident response expert for incident handling.

Buy Now
Questions 116

Which of the following is a PRIMARY benefit of using risk assessments to determine areas to be included in an audit plan?

Options:

A.

Timely audit execution

B.

Effective allocation of audit resources

C.

Reduced travel and expense costs

D.

Effective risk mitigation

Buy Now
Questions 117

Which of the following should be done FIRST when planning to conduct internal and external penetration testing for a client?

Options:

A.

Establish the timing of testing.

B.

Identify milestones.

C.

Determine the test reporting

D.

Establish the rules of engagement.

Buy Now
Questions 118

Management has agreed to move the organization ' s data center due to recent flood map changes in its current location. Which risk response has been adopted?

Options:

A.

Risk elimination

B.

Risk transfer

C.

Risk acceptance

D.

Risk avoidance

Buy Now
Questions 119

Which of the following should be of GREATEST concern to an IS auditor reviewing an organization ' s mobile device policies and controls in its corporate environment?

Options:

A.

The mobile authentication policy requires biometrics.

B.

The virtual private network (VPN) policy is not enabled for the internal corporate network.

C.

Not all active devices are enrolled in mobile device management (MDM).

D.

Remote wipe and lock features are only available with access to the internet.

Buy Now
Questions 120

What should an IS auditor do FIRST upon discovering that a service provider did not notify its customers of a security breach?

Options:

A.

Notify law enforcement of the finding.

B.

Require the third party to notify customers.

C.

The audit report with a significant finding.

D.

Notify audit management of the finding.

Buy Now
Questions 121

A global company has been using a publicly available AI tool to obtain information about global laws and regulations that could impact the business. Which of the following should be of MOST concern to an IS auditor?

Options:

A.

Accuracy and quality of the data provided by the AI tool

B.

Whether the organization is using a paid version of the AI tool

C.

Version and provider of the AI tool being utilized

D.

Whether the tool is utilized by competitors in the same industry

Buy Now
Questions 122

Which of the following should be the IS auditor ' s PRIMARY focus when evaluating an organizations offsite storage facility?

Options:

A.

Adequacy of physical and environmental controls

B.

Results of business continuity plan (BCP) tests

C.

Shared facilities

D.

Retention policy and period

Buy Now
Questions 123

Which of the following is the MOST important activity in the data classification process?

Options:

A.

Labeling the data appropriately

B.

Identifying risk associated with the data

C.

Determining accountability of data owners

D.

Determining the adequacy of privacy controls

Buy Now
Questions 124

Which of the following is the BEST method to delete sensitive information from storage media that will be reused?

Options:

A.

Crypto-shredding

B.

Multiple overwriting

C.

Reformatting

D.

Re-partitioning

Buy Now
Questions 125

An organization is planning an acquisition and has engaged an IS auditor lo evaluate the IT governance framework of the target company. Which of the following would be MOST helpful In determining the effectiveness of the framework?

Options:

A.

Sell-assessment reports of IT capability and maturity

B.

IT performance benchmarking reports with competitors

C.

Recent third-party IS audit reports

D.

Current and previous internal IS audit reports

Buy Now
Questions 126

Which of the following will provide the GREATEST assurance to IT management that a quality management system (QMS) is effective?

Options:

A.

A high percentage of stakeholders satisfied with the quality of IT

B.

A high percentage of IT processes reviewed by quality assurance (QA)

C.

A high percentage of incidents being quickly resolved

D.

A high percentage of IT employees attending quality training

Buy Now
Questions 127

Which of the following is the MOST efficient way to identify segregation of duties violations in a new system?

Options:

A.

Review a report of security rights in the system.

B.

Observe the performance of business processes.

C.

Develop a process to identify authorization conflicts.

D.

Examine recent system access rights violations.

Buy Now
Questions 128

Which of the following IT service management activities is MOST likely to help with identifying the root cause of repeated instances of network latency?

Options:

A.

Change management

B.

Problem management

C.

incident management

D.

Configuration management

Buy Now
Questions 129

Which of the following would BEST determine whether a post-implementation review (PIR) performed by the project management office (PMO) was effective?

Options:

A.

Lessons learned were implemented.

B.

Management approved the PIR report.

C.

The review was performed by an external provider.

D.

Project outcomes have been realized.

Buy Now
Questions 130

Which of the following is the MOST important regulatory consideration for an organization determining whether to use its customer data to train AI algorithms?

Options:

A.

Documentation of AI algorithm accuracy during the training process

B.

Ethical and optimal utilization of data computing resources

C.

Collection of data and obtaining data subject consent

D.

Continuous monitoring of AI algorithm performance

Buy Now
Questions 131

When assessing whether an organization ' s IT performance measures are comparable to other organizations in the same industry, which of the following would be MOST helpful to review?

Options:

A.

IT governance frameworks

B.

Benchmarking surveys

C.

Utilization reports

D.

Balanced scorecard

Buy Now
Questions 132

Which of the following should be considered when examining fire suppression systems as part of a data center environmental controls review?

Options:

A.

Installation manuals

B.

Onsite replacement availability

C.

Insurance coverage

D.

Maintenance procedures

Buy Now
Questions 133

An IS auditor has completed the fieldwork phase of a network security review and is preparing the initial following findings should be ranked as the HIGHEST risk?

Options:

A.

Network penetration tests are not performed

B.

The network firewall policy has not been approved by the information security officer.

C.

Network firewall rules have not been documented.

D.

The network device inventory is incomplete.

Buy Now
Questions 134

Which of the following is MOST helpful to an IS auditor reviewing the alignment of planned IT budget with the organization ' s goals and strategic objectives?

Options:

A.

Enterprise architecture (EA)

B.

Business impact analysis (BIA)

C.

Risk assessment report

D.

Audit recommendations

Buy Now
Questions 135

Which of the following is the PRIMARY reason an IS auditor should recommend that management create an IT risk register?

Options:

A.

To document root causes of IT-related risk events and lessons learned

B.

To ensure there is appropriate funding for IT risk mitigation efforts

C.

To ensure an inventory of potential IT risks is maintained and reported

D.

To facilitate internal audit ' s testing of IT-risk-related controls

Buy Now
Questions 136

Which of the following is the BEST way for an IS auditor to assess the design of an automated application control?

Options:

A.

Interview the application developer.

B.

Obtain management attestation and sign-off.

C.

Review the application implementation documents.

D.

Review system configuration parameters and output.

Buy Now
Questions 137

Which of the following controls helps to ensure that data extraction queries run by the database administrator (DBA) are monitored?

Options:

A.

Restricting access to DBA activities

B.

Performing periodic access reviews

C.

Storing logs of database access

D.

Reviewing activity logs of the DBA

Buy Now
Questions 138

Which of the following statements appearing in an organization ' s acceptable use policy BEST demonstrates alignment with data classification standards related to the protection of information assets?

Options:

A.

Any information assets transmitted over a public network must be approved by executive management.

B.

All information assets must be encrypted when stored on the organization ' s systems.

C.

Information assets should only be accessed by persons with a justified need.

D.

All information assets will be assigned a clearly defined level to facilitate proper employee handling.

Buy Now
Questions 139

Which of the following is an advantage of using agile software development methodology over the waterfall methodology?

Options:

A.

Less funding required overall

B.

Quicker deliverables

C.

Quicker end user acceptance

D.

Clearly defined business expectations

Buy Now
Questions 140

An IS auditor is reviewing the backup procedures in an organization that has high volumes of data with frequent changes to transactions. Which of the following is the BEST backup scheme to recommend given the need for a shorter restoration time in the event of a disruption?

Options:

A.

Differential backup

B.

Full backup

C.

Incremental backup

D.

Mirror backup

Buy Now
Questions 141

During a follow-up audit, an IS auditor learns that some key management personnel have been replaced since the original audit, and current management has decided not to implement some previously accepted recommendations. What is the auditor ' s BEST course of action?

Options:

A.

Notify the chair of the audit committee.

B.

Notify the audit manager.

C.

Retest the control.

D.

Close the audit finding.

Buy Now
Questions 142

Which of the following is the PRIMARY reason for an IS auditor to conduct post-implementation reviews?

Options:

A.

To determine whether project objectives in the business case have been achieved

B.

To ensure key stakeholder sign-off has been obtained

C.

To align project objectives with business needs

D.

To document lessons learned to improve future project delivery

Buy Now
Questions 143

Which of the following is MOST important for an IS auditor to review when determining whether IT investments are providing value to tie business?

Options:

A.

Return on investment (ROI)

B.

Business strategy

C.

Business cases

D.

Total cost of ownership (TCO)

Buy Now
Questions 144

When auditing IT organizational structure, which of the following findings presents the GREATEST risk to an organization?

Options:

A.

Significantly higher turnover

B.

Lack of customer satisfaction surveys

C.

Aging staff

D.

Increase in the frequency of software upgrades

Buy Now
Questions 145

Which of the following should be done FIRST to ensure the secure configuration of new IT assets in an organization?

Options:

A.

Identify and remediate vulnerabilities before deploying new IT assets.

B.

Define and implement hardening standards.

C.

Scan new IT assets for security vulnerabilities.

D.

Purchase security tools to configure new IT assets.

Buy Now
Questions 146

Which of the following is the GREATEST risk if two users have concurrent access to the same database record?

Options:

A.

Availability integrity

B.

Data integrity

C.

Entity integrity

D.

Referential integrity

Buy Now
Questions 147

What is the MOST effective way to manage contractors ' access to a data center?

Options:

A.

Badge identification worn by visitors

B.

Escort requirement for visitor access

C.

Management approval of visitor access

D.

Verification of visitor identification

Buy Now
Questions 148

Which of the following concerns is BEST addressed by securing production source libraries?

Options:

A.

Programs are not approved before production source libraries are updated.

B.

Production source and object libraries may not be synchronized.

C.

Changes are applied to the wrong version of production source libraries.

D.

Unauthorized changes can be moved into production.

Buy Now
Questions 149

An IS auditor assessing the controls within a newly implemented call center would First

Options:

A.

gather information from the customers regarding response times and quality of service.

B.

review the manual and automated controls in the call center.

C.

test the technical infrastructure at the call center.

D.

evaluate the operational risk associated with the call center.

Buy Now
Questions 150

An IS auditor extracts data from a travel and expenses system to determine whether employees are using the organization’s car for personal use. What type of audit is being performed?

Options:

A.

Fraud audit

B.

Financial audit

C.

Functional audit

D.

Compliance audit

Buy Now
Questions 151

An external IS auditor is reviewing the continuous monitoring system for a large bank and notes several potential issues. Which of the following would present the GREATEST concern regarding the reliability of the monitoring system?

Options:

A.

The system results are not reviewed by senior management.

B.

The alert threshold is updated periodically.

C.

The monitoring thresholds are not subject to change management.

D.

The monitoring system was configured by a third party.

Buy Now
Questions 152

Which of the following MUST be performed by senior audit leadership prior to starting an IS audit project?

Options:

A.

Signoff on the audit scope.

B.

Attend planning walk-throughs.

C.

Review audit planning documents.

D.

Meet with auditee leadership.

Buy Now
Questions 153

Which of the following is the BEST way for an organization to mitigate the risk associated with third-party application performance?

Options:

A.

Ensure the third party allocates adequate resources to meet requirements.

B.

Use analytics within the internal audit function

C.

Conduct a capacity planning exercise

D.

Utilize performance monitoring tools to verify service level agreements (SLAs)

Buy Now
Questions 154

Which of the following is MOST important for an IS auditor to verify when evaluating an organization ' s firewall?

Options:

A.

Logs are being collected in a separate protected host

B.

Automated alerts are being sent when a risk is detected

C.

Insider attacks are being controlled

D.

Access to configuration files Is restricted.

Buy Now
Questions 155

Which of the following is the MOST important area of focus for an IS auditor when developing a risk-based audit strategy?

Options:

A.

Critical business applications

B.

Business processes

C.

Existing IT controls

D.

Recent audit results

Buy Now
Questions 156

An organization ' s IT department and internal IS audit function all report to the chief information officer (CIO). Which of the following is the GREATEST concern associated with this reporting structure?

Options:

A.

Potential for inaccurate audit findings

B.

Compromise of IS audit independence

C.

IS audit resources being shared with other IT functions

D.

IS audit being isolated from other audit functions

Buy Now
Questions 157

In continuous delivery, the critical connector between development and production is:

Options:

A.

Release management.

B.

Log management.

C.

DevOps.

D.

Data management.

Buy Now
Questions 158

Which of the following applications has the MOST inherent risk and should be prioritized during audit planning?

Options:

A.

A decommissioned legacy application

B.

An onsite application that is unsupported

C.

An outsourced accounting application

D.

An internally developed application

Buy Now
Questions 159

A database administrator (DBA) should be prevented from having end user responsibilities:

Options:

A.

having end user responsibilities

B.

accessing sensitive information

C.

having access to production files

D.

using an emergency user ID

Buy Now
Questions 160

Which of the following should be of GREATEST concern to an IS auditor reviewing a network printer disposal process?

Options:

A.

Disposal policies and procedures are not consistently implemented

B.

Evidence is not available to verify printer hard drives have been sanitized prior to disposal.

C.

Business units are allowed to dispose printers directly to

D.

Inoperable printers are stored in an unsecured area.

Buy Now
Questions 161

Which of the following BEST indicates the effectiveness of an organization ' s risk management program?

Options:

A.

Inherent risk is eliminated.

B.

Residual risk is minimized.

C.

Control risk is minimized.

D.

Overall risk is quantified.

Buy Now
Questions 162

When planning an internal penetration test, which of the following is the MOST important step prior to finalizing the scope of testing?

Options:

A.

Ensuring the scope of penetration testing is restricted to the test environment

B.

Obtaining management ' s consent to the testing scope in writing

C.

Notifying the IT security department regarding the testing scope

D.

Agreeing on systems to be excluded from the testing scope with the IT department

Buy Now
Questions 163

At the end of each business day, a business-critical application generates a report of financial transac-tions greater than a certain value, and an employee

then checks these transactions for errors. What type of control is in place?

Options:

A.

Detective

B.

Preventive

C.

Corrective

D.

Deterrent

Buy Now
Questions 164

An IS auditor is evaluating the log management system for an organization with devices and systems in multiple geographic locations. Which of the following is MOST important for the auditor to verify?

Options:

A.

Log files are reviewed in multiple locations.

B.

Log files are concurrently updated.

C.

Log files are encrypted and digitally signed.

D.

Log files of the servers are synchronized.

Buy Now
Questions 165

A company has implemented an IT segregation of duties policy. In a role-based environment, which of the following roles may be assigned to an application developer?

Options:

A.

IT operator

B.

System administration

C.

Emergency support

D.

Database administration

Buy Now
Questions 166

An IS auditor notes the transaction processing times in an order processing system have significantly increased after a major release. Which of the following should the IS auditor review FIRST?

Options:

A.

Capacity management plan

B.

Training plans

C.

Database conversion results

D.

Stress testing results

Buy Now
Questions 167

Which of the following is the PRIMARY purpose of conducting a control self-assessment (CSA)?

Options:

A.

To replace audit responsibilities

B.

To reduce control costs

C.

To promote control ownership

D.

To enable early detection of risks

Buy Now
Questions 168

When an IS audit reveals that a firewall was unable to recognize a number of attack attempts, the auditor ' s BEST recommendation is to place an intrusion detection system (IDS) between the firewall and:

Options:

A.

the Internet.

B.

the demilitarized zone (DMZ).

C.

the organization ' s web server.

D.

the organization ' s network.

Buy Now
Questions 169

Which of the following is the GREATEST concern related to an organization ' s data classification processes?

Options:

A.

Users responsible for managing records are unaware of the data classification processes.

B.

Systems used to manage the data classification processes are not synchronized.

C.

The data classification processes have not been updated in the last year.

D.

The data classification processes are not aligned with industry standards.

Buy Now
Questions 170

When planning an audit to assess application controls of a cloud-based system, it is MOST important tor the IS auditor to understand the.

Options:

A.

architecture and cloud environment of the system.

B.

business process supported by the system.

C.

policies and procedures of the business area being audited.

D.

availability reports associated with the cloud-based system.

Buy Now
Questions 171

Management has requested a post-implementation review of a newly implemented purchasing package to determine the extent that business requirements are being met. Which of the following

is MOST likely to be assessed?

Options:

A.

Acceptance testing results

B.

Results of live processing

C.

Implementation methodology

D.

Purchasing guidelines and policies

Buy Now
Questions 172

The PRIMARY reason for an IS auditor to use data analytics techniques is to reduce which type of audit risk?

Options:

A.

Technology risk

B.

Detection risk

C.

Control risk

D.

Inherent risk

Buy Now
Questions 173

What would be an IS auditor ' s BEST course of action when an auditee is unable to close all audit recommendations by the time of the follow-up audit?

Options:

A.

Ensure the open issues are retained in the audit results.

B.

Terminate the follow-up because open issues are not resolved

C.

Recommend compensating controls for open issues.

D.

Evaluate the residual risk due to open issues.

Buy Now
Questions 174

When testing the adequacy of tape backup procedures, which step BEST verifies that regularly scheduled Backups are timely and run to completion?

Options:

A.

Observing the execution of a daily backup run

B.

Evaluating the backup policies and procedures

C.

Interviewing key personnel evolved In the backup process

D.

Reviewing a sample of system-generated backup logs

Buy Now
Questions 175

Which of the following is the BEST indication that a software development project is on track to meet its completion deadline?

Options:

A.

Technical specifications and development requirements have been agreed upon and formally recorded.

B.

Project plan due dates have been documented for each phase of the software development life cycle.

C.

Issues identified during user acceptance testing (UAT) have been addressed prior to the original implementation date.

D.

The planned software go-live date has been communicated in advance to end users and stakeholders.

Buy Now
Questions 176

Capacity management enables organizations to:

Options:

A.

forecast technology trends

B.

establish the capacity of network communication links

C.

identify the extent to which components need to be upgraded

D.

determine business transaction volumes.

Buy Now
Questions 177

Which of the following would BEST facilitate the successful implementation of an IT-related framework?

Options:

A.

Aligning the framework to industry best practices

B.

Establishing committees to support and oversee framework activities

C.

Involving appropriate business representation within the framework

D.

Documenting IT-related policies and procedures

Buy Now
Questions 178

During the audit of an enterprise resource planning (ERP) system, an IS auditor found an applicationpatch was applied to the production environment. It is MOST

important for the IS auditor to verify approval from the:

Options:

A.

information security officer.

B.

system administrator.

C.

information asset owner.

D.

project manager.

Buy Now
Questions 179

An IS auditor follows up on a recent security incident and finds the incident response was not adequate. Which of the following findings should be considered MOST critical?

Options:

A.

The security weakness facilitating the attack was not identified.

B.

The attack was not automatically blocked by the intrusion detection system (IDS).

C.

The attack could not be traced back to the originating person.

D.

Appropriate response documentation was not maintained.

Buy Now
Questions 180

The PRIMARY benefit of information asset classification is that it:

Options:

A.

prevents loss of assets.

B.

helps to align organizational objectives.

C.

facilitates budgeting accuracy.

D.

enables risk management decisions.

Buy Now
Questions 181

An IS auditor is assigned to perform a post-implementation review of an application system. Which of the following would impair the auditor ' s independence?

Options:

A.

The auditor implemented a specific control during the development of the system.

B.

The auditor provided advice concerning best practices.

C.

The auditor participated as a member of the project team without operational responsibilities

D.

The auditor designed an embedded audit module exclusively for audit

Buy Now
Questions 182

What should an IS auditor recommend to management as the MOST important action before selecting a Software as a Service (SaaS) vendor?

Options:

A.

Determine service level requirements.

B.

Complete a risk assessment.

C.

Perform a business impact analysis (BIA)

D.

Conduct a vendor audit.

Buy Now
Questions 183

A source code repository should be designed to:

Options:

A.

prevent changes from being incorporated into existing code.

B.

prevent developers from accessing secure source code.

C.

provide secure versioning and backup capabilities for existing code.

D.

provide automatic incorporation and distribution of modified code.

Buy Now
Questions 184

Which of the following is an IS auditor’s BEST approach when low-risk anomalies have been identified?

Options:

A.

Reprioritize further testing of the anomalies and refocus on issues with higher risk

B.

Update the audit plan to include the information collected during the audit

C.

Ask auditees to promptly remediate the anomalies

D.

Document the anomalies in audit workpapers

Buy Now
Questions 185

To help determine whether a controls-reliant approach to auditing financial systems in a company should be used, which sequence of IS audit work is MOST appropriate?

Options:

A.

Review of the general IS controls followed by a review of the application controls

B.

Detailed examination of financial transactions followed by review of the general ledger

C.

Review of major financial applications followed by a review of IT governance processes

D.

Review of application controls followed by a test of key business process controls

Buy Now
Questions 186

Which of the following would be the GREATEST concern for an IS auditor conducting a pre-implementation review of a data loss prevention (DLP > tool?

Options:

A.

The tool is implemented in monitor mode rather than block mode.

B.

Crawlers are used to discover sensitive data.

C.

Deep packet inspection opens data packets in transit.

D.

Encryption keys are not centrally managed.

Buy Now
Questions 187

Which of the following BEST describes the role of the IS auditor in a control self-assessment (CSA)?

Options:

A.

Implementer

B.

Facilitator

C.

Approver

D.

Reviewer

Buy Now
Questions 188

An organization is permanently transitioning from onsite to fully remote business operations. When should the existing business impact analysis (BIA) be reviewed?

Options:

A.

During the next scheduled review

B.

At least one year after the transition

C.

As soon as the decision about the transition is announced

D.

As soon as the new operating model is in place

Buy Now
Questions 189

Which of the following BEST enables an organization to improve the visibility of end-user computing (EUC) applications that support regulatory reporting?

Options:

A.

EUC inventory

B.

EUC availability controls

C.

EUC access control matrix

D.

EUC tests of operational effectiveness

Buy Now
Questions 190

During an IS audit of a data center, it was found that programmers are allowed to make emergency fixes to operational programs. Which of the following should be the IS auditor ' s PRIMARY recommendation?

Options:

A.

Programmers should be allowed to implement emergency fixes only after obtaining verbal agreement from the application owner.

B.

Emergency program changes should be subject to program migration and testing procedures before they are applied to operational systems.

C.

Bypass user ID procedures should be put in place to ensure that the changes are subject to after-the-event approval and testing.

Buy Now
Questions 191

Which of the following BEST describes the role of a document owner when implementing a data classification policy in an organization?

Options:

A.

Classifies documents to correctly reflect the level of sensitivity of information they contain

B.

Defines the conditions under which documents containing sensitive information may be transmitted

C.

Classifies documents in accordance with industry standards and best practices

D.

Ensures documents are handled in accordance With the sensitivity of information they contain

Buy Now
Questions 192

In an organization ' s feasibility study to acquire hardware to support a new web server, omission of which of the following would be of MOST concern?

Options:

A.

Alternatives for financing the acquisition

B.

Financial stability of potential vendors

C.

Reputation of potential vendors

D.

Cost-benefit analysis of available products

Buy Now
Questions 193

Which of the following is the MOST important consideration when determining how frequently to review a data protection policy?

Options:

A.

Industry best practices

B.

Business objectives

C.

Local laws and regulations

D.

Known international standards

Buy Now
Questions 194

An organization has implemented a new data classification scheme and asks the IS auditor to evaluate its effectiveness. Which of the following would be of

GREATEST concern to the auditor?

Options:

A.

End-user managers determine who should access what information.

B.

The organization has created a dozen different classification categories.

C.

The compliance manager decides how the information should be classified.

D.

The organization classifies most of its information as confidential.

Buy Now
Questions 195

An IS auditor can BEST evaluate the business impact of system failures by:

Options:

A.

assessing user satisfaction levels.

B.

interviewing the security administrator.

C.

analyzing equipment maintenance logs.

D.

reviewing system-generated logs.

Buy Now
Questions 196

Visitors to a data center are required to present an ID and pre-approved documents. Which type of control has been implemented?

Options:

A.

Administrative control

B.

Preventive control

C.

Corrective control

D.

Detective control

Buy Now
Questions 197

Which of the following risks is BEST mitigated by implementing an automated three-way match?

Options:

A.

Inaccurate customer records

B.

Purchase order delays

C.

lnaccurate customer discounts

D.

Invalid payment processing

Buy Now
Questions 198

Which of the following is the PRIMARY function of a data loss prevention (DLP) policy when implemented in an organization ' s DLP solution?

Options:

A.

To encrypt sensitive data at rest and in transit

B.

To define rules for monitoring and protecting sensitive data

C.

To define rules and baselines for network performance

D.

To detect and block incoming network traffic

Buy Now
Questions 199

The BEST way for an IS auditor to validate that separation of duties has been implemented is to perform:

Options:

A.

A review of personnel files.

B.

An analysis of documented job descriptions.

C.

A review of the organizational chart.

D.

A walk-through of job functions.

Buy Now
Questions 200

An organization has assigned two now IS auditors to audit a now system implementation. One of the auditors has an IT-related degree, and one has a business degree. Which ol the following is MOST important to meet the IS audit standard for proficiency?

Options:

A.

The standard is met as long as one member has a globally recognized audit certification.

B.

Technical co-sourcing must be used to help the new staff.

C.

Team member assignments must be based on individual competencies.

D.

The standard is met as long as a supervisor reviews the new auditors ' work.

Buy Now
Questions 201

Which of the following is an example of a passive attack method?

Options:

A.

Keystroke logging

B.

Piggybacking

C.

Eavesdropping

D.

Phishing

Buy Now
Questions 202

An information systems security officer ' s PRIMARY responsibility for business process applications is to:

Options:

A.

authorize secured emergency access

B.

approve the organization ' s security policy

C.

ensure access rules agree with policies

D.

create role-based rules for each business process

Buy Now
Questions 203

Which of the following backup schemes is the BEST option when storage media is limited?

Options:

A.

Real-time backup

B.

Virtual backup

C.

Differential backup

D.

Full backup

Buy Now
Questions 204

An IS auditor has been asked to review the quality of data in a general ledger system. Which of the following would provide the auditor with the MOST meaningful results?

Options:

A.

Discussion of the largest account values with business owners

B.

Integrity checks against source documentation

C.

System vulnerability assessment

D.

Interviews with system owners and operators

Buy Now
Questions 205

An organization has moved all of its infrastructure to the cloud. Which of the following would be an IS auditor’s GREATEST concern related to the organization’s ability to continue operations in case of a disaster?

Options:

A.

There is no evidence that disaster recovery plan (DRP) testing was performed after the migration.

B.

Only business-critical servers were configured with redundancy services on the cloud service provider.

C.

The previous infrastructure was not retained to support business operations in case of a disaster.

D.

The step-by-step recovery process was not updated in the disaster recovery plan (DRP) after the migration.

Buy Now
Questions 206

Which of the following findings should be an IS auditor’s GREATEST concern when reviewing a project to migrate confidential data backups to a cloud-based solution?

Options:

A.

Lack of chain of custody for retired backup media

B.

Insufficient scalability

C.

Insufficient due diligence performed on the vendor

D.

Increased storage cost

Buy Now
Questions 207

An IS auditor is reviewing a network diagram. Which of the following would be the BEST location for placement of a firewall?

Options:

A.

Between each host and the local network switch/hub

B.

Between virtual local area networks (VLANs)

C.

Inside the demilitarized zone (DMZ)

D.

At borders of network segments with different security levels

Buy Now
Questions 208

Which of the following activities would allow an IS auditor to maintain independence while facilitating a control sell-assessment (CSA)?

Options:

A.

Implementing the remediation plan

B.

Partially completing the CSA

C.

Developing the remediation plan

D.

Developing the CSA questionnaire

Buy Now
Questions 209

Which of the following is the MOST significant risk that IS auditors are required to consider for each engagement?

Options:

A.

Process and resource inefficiencies

B.

Irregularities and illegal acts

C.

Noncompliance with organizational policies

D.

Misalignment with business objectives

Buy Now
Questions 210

A review of an organization’s IT portfolio revealed several applications that are not in use. The BEST way to prevent this situation from recurring would be to implement.

Options:

A.

A formal request for proposal (RFP) process

B.

Business case development procedures

C.

An information asset acquisition policy

D.

Asset life cycle management.

Buy Now
Questions 211

Which of the following is MOST critical to the success of an information security program?

Options:

A.

Management ' s commitment to information security

B.

User accountability for information security

C.

Alignment of information security with IT objectives

D.

Integration of business and information security

Buy Now
Questions 212

When reviewing the disaster recovery strategy, IT management identified an application that requires a short recovery point objective (RPO). Which of the following data restoration strategies would BEST enable the organization to meet this objective?

Options:

A.

Snapshots

B.

Mirroring

C.

Log shipping

D.

Data backups

Buy Now
Questions 213

An organization has developed processes to recover critical files in the event of a ransomware attack. Which type of control do these processes represent?

Options:

A.

Compensating

B.

Preventive

C.

Detective

D.

Corrective

Buy Now
Questions 214

When determining whether a project in the design phase will meet organizational objectives, what is BEST to compare against the business case?

Options:

A.

Implementation plan

B.

Project budget provisions

C.

Requirements analysis

D.

Project plan

Buy Now
Questions 215

Due to a recent business divestiture, an organization has limited IT resources to deliver critical projects Reviewing the IT staffing plan against which of the following would BEST guide IT management when estimating resource requirements for future projects?

Options:

A.

Human resources (HR) sourcing strategy

B.

Records of actual time spent on projects

C.

Peer organization staffing benchmarks

D.

Budgeted forecast for the next financial year

Buy Now
Questions 216

A global organization ' s policy states that all workstations must be scanned for malware each day. Which of the following would provide an IS auditor with the BEST evidence of continuous compliance with this policy?

Options:

A.

Penetration testing results

B.

Management attestation

C.

Anti-malware tool audit logs

D.

Recent malware scan reports

Buy Now
Questions 217

During the design phase of a software development project, the PRIMARY responsibility of an IS auditor is to evaluate the:

Options:

A.

Future compatibility of the application.

B.

Proposed functionality of the application.

C.

Controls incorporated into the system specifications.

D.

Development methodology employed.

Buy Now
Questions 218

Which of the following is the MOST important consideration when implementing a Zero Trust strategy for mobile, wireless, and Internet of Things (IoT) devices?

Options:

A.

Ensuring the latest firmware updates are applied regularly to all devices

B.

Validating the identity of all devices and users before granting access to resources

C.

Focusing on user training and awareness to prevent phishing attacks

D.

Implementing strong encryption protocols for data in transit and at rest

Buy Now
Questions 219

Retention periods and conditions for the destruction of personal data should be determined by the.

Options:

A.

risk manager.

B.

database administrator (DBA).

C.

privacy manager.

D.

business owner.

Buy Now
Questions 220

A finance department has a two-year project to upgrade the enterprise resource planning (ERP) system hosting the general ledger in year one the system version upgrade will be applied and in year two business processes will be updated to implement new system functionality. Which of the following should be the PRIMARY focus of an IS auditor reviewing the second year of the implementation ' ?

Options:

A.

Data migration

B.

Sociability testing

C.

User acceptance testing (UAT)

D.

Initial user access provisioning

Buy Now
Questions 221

Which of the following findings should be of GREATEST concern to an IS auditor reviewing an organization s newly implemented online security awareness program ' ?

Options:

A.

Only new employees are required to attend the program

B.

Metrics have not been established to assess training results

C.

Employees do not receive immediate notification of results

D.

The timing for program updates has not been determined

Buy Now
Questions 222

In a Zero Trust architecture, which element is MOST important for an IS auditor to evaluate to ensure that resources are accessed securely?

Options:

A.

The strength and frequency of perimeter firewall testing

B.

The alignment of access control policies with industry standards

C.

The frequency of user access reviews

D.

The protocols in place for remote access and data encryption

Buy Now
Questions 223

Which of the following BEST enables a benefits realization process for a system development project?

Options:

A.

Metrics for the project have been selected before the project begins.

B.

Project budget includes costs to execute the project and costs associated with the solution.

C.

Estimates of business benefits are backed by similar previously completed projects.

D.

Metrics are evaluated immediately after the project has been implemented.

Buy Now
Questions 224

Which type of control is being implemented when a biometric access device is installed at the entrance to a facility?

Options:

A.

Preventive

B.

Deterrent

C.

Corrective

D.

Detective

Buy Now
Questions 225

An IS auditor finds that some employees are using public cloud-based AI tools. Which of the following presents the GREATEST concern?

Options:

A.

Data reliability

B.

Cost overruns

C.

Copyright infringements

D.

Data leakage

Buy Now
Questions 226

During an IT governance audit, an IS auditor notes that IT policies and procedures are not regularly reviewed and updated. The GREATEST concern to the IS auditor is that policies and procedures might not:

Options:

A.

reflect current practices.

B.

include new systems and corresponding process changes.

C.

incorporate changes to relevant laws.

D.

be subject to adequate quality assurance (QA).

Buy Now
Questions 227

An incorrect version of the source code was amended by a development team. This MOST likely indicates a weakness in:

Options:

A.

incident management.

B.

quality assurance (QA).

C.

change management.

D.

project management.

Buy Now
Questions 228

Which of the following provides the MOST assurance of the integrity of a firewall log?

Options:

A.

The log is reviewed on a monthly basis.

B.

Authorized access is required to view the log.

C.

The log cannot be modified.

D.

The log is retained per policy.

Buy Now
Questions 229

Of the following who should be responsible for cataloging and inventorying robotic process automation (RPA) processes?

Options:

A.

IT personnel

B.

Business owner

C.

Information security personnel

D.

Data steward

Buy Now
Questions 230

An IS auditor evaluating the change management process must select a sample from the change log. What is the BEST way to the auditor to confirm the change log is complete?

Options:

A.

Interview change management personnel about completeness.

B.

Take an item from the log and trace it back to the system.

C.

Obtain management attestation of completeness.

D.

Take the last change from the system and trace it back to the log.

Buy Now
Questions 231

A business has requested an audit to determine whether information stored in an application is adequately protected. Which of the following is the MOST important action before the audit work begins?

Options:

A.

Review remediation reports

B.

Establish control objectives.

C.

Assess the threat landscape.

D.

Perform penetration testing.

Buy Now
Questions 232

An IS audit review identifies inconsistencies in privacy requirements across third-party service provider contracts. Which of the following is the BEST

recommendation to address this situation?

Options:

A.

Suspend contracts with third-party providers that handle sensitive data.

B.

Prioritize contract amendments for third-party providers.

C.

Review privacy requirements when contracts come up for renewal.

D.

Require third-party providers to sign nondisclosure agreements (NDAs).

Buy Now
Questions 233

Which of the following is the MOST important responsibility of data owners when implementing a data classification process?

Options:

A.

Reviewing emergency changes to data

B.

Authorizing application code changes

C.

Determining appropriate user access levels

D.

Implementing access rules over database tables

Buy Now
Questions 234

Which of the following is MOST important for an IS auditor to confirm when reviewing an organization ' s incident response management program?

Options:

A.

All incidents have a severity level assigned.

B.

All identified incidents are escalated to the CEO and the CISO.

C.

Incident response is within defined service level agreements (SLAs).

D.

The alerting tools and incident response team can detect incidents.

Buy Now
Questions 235

An IS audit manager was temporarily tasked with supervising a project manager assigned to the organization ' s payroll application upgrade. Upon returning to the audit department, the audit manager has been asked to perform an audit to validate the implementation of the payroll application. The audit manager is the only one in the audit department with IT project management

experience. What is the BEST course of action?

Options:

A.

Transfer the assignment to a different audit manager despite lack of IT project management experience.

B.

Outsource the audit to independent and qualified resources.

C.

Manage the audit since there is no one else with the appropriate experience.

D.

Have a senior IS auditor manage the project with the IS audit manager performing final review.

Buy Now
Questions 236

Which of the following poses the GREATEST risk to an organization when employees use public social networking sites?

Options:

A.

Cross-site scripting (XSS)

B.

Copyright violations

C.

Social engineering

D.

Adverse posts about the organization

Buy Now
Questions 237

Which of the following should be done FIRST following an incident that has caused internal servers to be inaccessible, disrupting normal business operations?

Options:

A.

Document the servers ' dates, times, and locations, as well as the individual who last used them

B.

Make a bit-level copy of the affected servers and calculate the hash value of the copy.

C.

Copy all key directories and files on the affected servers and generate the hash value of the copy.

D.

Unplug all power cables immediately to prevent further actions of the attacker on the servers.

Buy Now
Questions 238

When reviewing a project to replace multiple manual data entry systems with an artificial intelligence (Al) system, the IS auditor should be MOST concerned with the impact Al will have on

Options:

A.

employee retention

B.

enterprise architecture (EA)

C.

future task updates

D.

task capacity output

Buy Now
Questions 239

Which of the following is MOST likely to be reduced when implementing optimal risk management strategies?

Options:

A.

Sampling risk

B.

Residual risk

C.

Inherent risk

D.

Detection risk

Buy Now
Questions 240

A security administrator is called in the middle of the night by the on-call programmer A number of programs have failed, and the programmer has asked for access to the live system. What IS the BEST course of action?

Options:

A.

Require that a change request be completed and approved

B.

Give the programmer an emergency ID for temporary access and review the activity

C.

Give the programmer read-only access to investigate the problem

D.

Review activity logs the following day and investigate any suspicious activity

Buy Now
Questions 241

Which of the following should be of MOST concern to an IS auditor reviewing an organization ' s operational log management?

Options:

A.

Log file size has grown year over year.

B.

Critical events are being logged to immutable log files.

C.

Applications are logging events into multiple log files.

D.

Data formats have not been standardized across all logs.

Buy Now
Questions 242

Which of the following is the BEST way to address potential data privacy concerns associated with inadvertent disclosure of machine identifier information contained within security logs?

Options:

A.

Unit the use of logs to only those purposes for which they were collected

B.

Restrict the transfer of log files from host machine to online storage

C.

Only collect logs from servers classified as business critical

D.

Limit log collection to only periods of increased security activity

Buy Now
Questions 243

Which of the following MOST effectively enables consistency across high-volume software changes ' ?

Options:

A.

The use of continuous integration and deployment pipelines

B.

Management reviews of detailed exception reports for released code

C.

Publication of a refreshed policy on development and release management

D.

An ongoing awareness campaign for software deployment best practices

Buy Now
Questions 244

Which of the following methods BEST enforces data leakage prevention in a multi-tenant cloud environment?

Options:

A.

Monitoring tools are configured to alert in case of downtime

B.

A comprehensive security review is performed every quarter.

C.

Data for different tenants is segregated by database schema

D.

Tenants are required to implement data classification polices

Buy Now
Questions 245

During an incident management audit, an IS auditor finds that several similar incidents were logged during the audit period. Which of the following is the auditor ' s MOST important course of action?

Options:

A.

Document the finding and present it to management.

B.

Determine if a root cause analysis was conducted.

C.

Confirm the resolution time of the incidents.

D.

Validate whether all incidents have been actioned.

Buy Now
Questions 246

Which of the following is MOST effective for controlling visitor access to a data center?

Options:

A.

Visitors are escorted by an authorized employee

B.

Pre-approval of entry requests

C.

Visitors sign in at the front desk upon arrival

D.

Closed-circuit television (CCTV) is used to monitor the facilities

Buy Now
Questions 247

An organization is enhancing the security of a client-facing web application following a proposal to acquire personal information for a business purpose. Which of the following is MOST important to review before implementing this initiative?

Options:

A.

Regulatory compliance requirements

B.

Data ownership assignments

C.

Encryption capabilities

D.

Customer notification procedures

Buy Now
Questions 248

Which of the following should be an IS auditor ' s GREATEST concern when reviewing an organization ' s security controls for policy compliance?

Options:

A.

The security policy has not been reviewed within the past year.

B.

Security policy documents are available on a public domain website.

C.

Security policies are not applicable across all business units.

D.

End users are not required to acknowledge security policy training.

Buy Now
Questions 249

Due to advancements in technology and electronic records, an IS auditor has completed an engagement by email only. Which of the following did the IS auditor potentially compromise?

Options:

A.

Proficiency

B.

Due professional care

C.

Sufficient evidence

D.

Reporting

Buy Now
Questions 250

Which of the following types of firewalls provide the GREATEST degree of control against hacker intrusion?

Options:

A.

Circuit gateway

B.

Application level gateway

C.

Packet filtering router

D.

Screening router

Buy Now
Questions 251

An IT balanced scorecard is the MOST effective means of monitoring:

Options:

A.

governance of enterprise IT.

B.

control effectiveness.

C.

return on investment (ROI).

D.

change management effectiveness.

Buy Now
Questions 252

An IS auditor found that a company executive is encouraging employee use of social networking sites for business purposes. Which of the following recommendations would BEST help to reduce the risk of data leakage?

Options:

A.

Requiring policy acknowledgment and nondisclosure agreements (NDAs) signed by employees

B.

Establishing strong access controls on confidential data

C.

Providing education and guidelines to employees on use of social networking sites

D.

Monitoring employees ' social networking usage

Buy Now
Questions 253

Which of the following would BEST assist an IS auditor in understanding the inputs and outputs of a microservice-oriented application?

Options:

A.

Data flow diagrams

B.

Network architecture diagrams

C.

Business requirements documentation

D.

Entity-relationship diagrams

Buy Now
Questions 254

The business case for an information system investment should be available for review until the:

Options:

A.

information system investment is retired.

B.

information system has reached end of life.

C.

formal investment decision is approved.

D.

benefits have been fully realized.

Buy Now
Questions 255

Which of the following provides the BEST assurance that vendor-supported software remains up to date?

Options:

A.

Release and patch management

B.

Licensing agreement and escrow

C.

Software asset management

D.

Version management

Buy Now
Questions 256

Which of the following should be of GREATEST concern to an IS auditor reviewing an organization ' s IT process performance reports over the last quarter?

Options:

A.

Metrics are not aligned with industry benchmarks

B.

Performance reporting includes too many technical terms

C.

Key performance indicators (KPIs) were met in only one month

D.

Metrics were defined without stakeholder review

Buy Now
Questions 257

When reviewing an organization ' s finalized risk assessment process, what would be the MAIN reason for an IS auditor to compare acceptable risk level with residual risk?

Options:

A.

To identify omissions made in the completed risk assessment

B.

To identify new risks the organization may have to address

C.

To recommend control enhancements for further risk reduction

D.

To advise management on risk appetite levels

Buy Now
Questions 258

An organization has an acceptable use policy in place, but users do not formally acknowledge the policy. Which of the following is the MOST significant risk from this finding?

Options:

A.

Lack of data for measuring compliance

B.

Violation of industry standards

C.

Noncompliance with documentation requirements

D.

Lack of user accountability

Buy Now
Questions 259

When processing speed is the highest priority, which cryptographic algorithm should be used to verify the integrity of a bit-for-bit copy from digital evidence?

Options:

A.

MD5

B.

SHA-1

C.

AES

D.

SHA-2

Buy Now
Questions 260

The MOST important objective of a post-implementation audit is to:

Options:

A.

Address lessons learned from the project.

B.

Determine whether the required objectives were met.

C.

Develop a process for continuous improvement.

D.

Seek approval for the next implementation phase.

Buy Now
Questions 261

An internal audit department recently established a quality assurance (QA) program. Which of the following activities Is MOST important to include as part of the QA program requirements?

Options:

A.

Long-term Internal audit resource planning

B.

Ongoing monitoring of the audit activities

C.

Analysis of user satisfaction reports from business lines

D.

Feedback from Internal audit staff

Buy Now
Questions 262

Which of the following BEST enables an IS auditor to combine and compare access control lists from various applications and devices?

Options:

A.

Integrated test facility (ITF)

B.

Snapshots

C.

Data analytics

D.

Audit hooks

Buy Now
Questions 263

Which of the following is the BEST methodology to use for estimating the complexity of developing a large business application?

Options:

A.

Function point analysis

B.

Work breakdown structure

C.

Critical path analysts

D.

Software cost estimation

Buy Now
Questions 264

While conducting a follow-up on an asset management audit, the IS auditor finds paid invoices for IT devices not recorded in the organization ' s inventory. Which of the following is the auditor ' s BEST course of action?

Options:

A.

Ask the asset management staff where the devices are.

B.

Alert both audit and operations management about the discrepancy.

C.

Ignore the invoices since they are not part of the follow-up.

D.

Make a note of the evidence to include it in the scope of a future audit.

Buy Now
Questions 265

In order to be useful, a key performance indicator (KPI) MUST

Options:

A.

be approved by management.

B.

be measurable in percentages.

C.

be changed frequently to reflect organizational strategy.

D.

have a target value.

Buy Now
Questions 266

An IS auditor discovers that an IT organization serving several business units assigns equal priority to all initiatives, creating a risk of delays in securing project funding Which of the following would be MOST helpful in matching demand for projects and services with available resources in a way that supports business objectives?

Options:

A.

Project management

B.

Risk assessment results

C.

IT governance framework

D.

Portfolio management

Buy Now
Questions 267

Which of the following is the BEST review for an IS auditor to conduct when a vulnerability has been exploited by an employee?

Options:

A.

Compliance audit

B.

Application security testing

C.

Forensic audit

D.

Penetration testing

Buy Now
Questions 268

Which of the following protocols should be used when transferring data via the internet?

Options:

A.

User Datagram Protocol (UDP)

B.

Hypertext Transfer Protocol (HTTP)

C.

Secure File Transfer Protocol (SFTP)

D.

Remote Desktop Protocol (RDP)

Buy Now
Questions 269

Which of the following should be used as the PRIMARY basis for prioritizing IT projects and initiatives?

Options:

A.

Estimated cost and time

B.

Level of risk reduction

C.

Expected business value

D.

Available resources

Buy Now
Questions 270

Which of the following BEST enables an IS auditor to confirm the batch processing to post transactions from an input source is successful?

Options:

A.

Error log review

B.

Total number of items

C.

Hash totals

D.

Aggregate monetary amount

Buy Now
Questions 271

Which of the following would be MOST impacted if an IS auditor were to assist with the implementation of recommended control enhancements?

Options:

A.

Independence

B.

Integrity

C.

Materiality

D.

Accountability

Buy Now
Questions 272

An IS auditor is reviewing a bank ' s service level agreement (SLA) with a third-party provider that hosts the bank ' s secondary data center, which of the following findings should be of GREATEST concern to the auditor?

Options:

A.

The recovery time objective (RTO) has a longer duration than documented in the disaster recovery plan (ORP).

B.

The SLA has not been reviewed in more than a year.

C.

Backup data is hosted online only.

D.

The recovery point objective (RPO) has a shorter duration than documented in the disaster recovery plan (DRP).

Buy Now
Questions 273

Which of the following would MOST effectively ensure the integrity of data transmitted over a network?

Options:

A.

Message encryption

B.

Certificate authority (CA)

C.

Steganography

D.

Message digest

Buy Now
Questions 274

In a review of the organization standards and guidelines for IT management, which of the following should be included in an IS development methodology?

Options:

A.

Value-added activity analysis

B.

Risk management techniques

C.

Access control rules

D.

Incident management techniques

Buy Now
Questions 275

The PRIMARY objective of a privacy protection policy is to increase awareness of:

Options:

A.

Cybercrimes that target an organization’s computer network.

B.

The benefits of using encryption for personal data protection.

C.

The legal requirements for protecting personal information.

D.

System configuration procedures to protect privacy.

Buy Now
Questions 276

Which of the following features of a library control software package would protect against unauthorized updating of source code?

Options:

A.

Required approvals at each life cycle step

B.

Date and time stamping of source and object code

C.

Access controls for source libraries

D.

Release-to-release comparison of source code

Buy Now
Questions 277

Job scheduling impacts system availability and reliability by:

Options:

A.

Reducing system downtime.

B.

Ensuring flexibility and scalability.

C.

Optimizing resource utilization.

D.

Decreasing system complexity.

Buy Now
Questions 278

An IS auditor finds that irregularities have occurred and that auditee management has chosen to ignore them. If reporting to external authorities is required which of the following is the BEST action for the IS auditor to take?

Options:

A.

Submit the report to appropriate regulators immediately.

B.

Obtain approval from audit management to submit the report.

C.

Obtain approval from auditee management to release the report.

D.

Obtain approval from both audit and auditee management to release the report.

Buy Now
Questions 279

Which of the following is a PRIMARY objective of incident management?

Options:

A.

Restoring services based on criticality

B.

Reporting individual incidents to management

C.

Determining the root cause of the incident

D.

Repairing the program that caused the incident

Buy Now
Questions 280

Which of the following is the GREATEST risk related to the use of virtualized environments?

Options:

A.

The host may be a potential single point of failure within the system.

B.

There may be insufficient processing capacity to assign to guests.

C.

There may be increased potential for session hijacking.

D.

Ability to change operating systems may be limited.

Buy Now
Questions 281

Which of the following is the BEST control to help ensure the completeness of outbound transactions?

Options:

A.

Perform edit checks to identify erroneous, unusual, or invalid transactions.

B.

Verify transactions are sequentially numbered in the header record.

C.

Ensure the validity of the recipient ID and use auto-numbered reports.

D.

Maintain a log of the number of messages sent and validate periodically.

Buy Now
Questions 282

Which of the following is the PRIMARY role of key performance indicators (KPIs) in supporting business process effectiveness?

Options:

A.

To analyze workflows in order to optimize business processes and eliminate tasks that do not provide value

B.

To evaluate the cost-benefit of tools implemented to monitor control performance

C.

To assess the functionality of a software deliverable based on business processes

D.

To enable conclusions about the performance of the processes and target variances for follow-up analysis

Buy Now
Questions 283

An organization allows employees to retain confidential data on personal mobile devices. Which of the following is the BEST recommendation to mitigate the risk of data leakage from lost or stolen devices?

Options:

A.

Require employees to attend security awareness training.

B.

Password protect critical data files.

C.

Configure to auto-wipe after multiple failed access attempts.

D.

Enable device auto-lock function.

Buy Now
Questions 284

An IS auditor has been asked to assess the security of a recently migrated database system that contains personal and financial data for a bank ' s customers. Which of the following controls is MOST important for the auditor to confirm is in place?

Options:

A.

The default configurations have been changed.

B.

All tables in the database are normalized.

C.

The service port used by the database server has been changed.

D.

The default administration account is used after changing the account password.

Buy Now
Questions 285

Which of the following provides the BEST evidence that all elements of a business continuity plan (BCP) are operating effectively?

Options:

A.

Walk-through test results

B.

Full operational test results

C.

Tabletop test results

D.

Simulation test results

Buy Now
Questions 286

Which of the following is the PRIMARY reason for an organization to implement a configuration management database (CMDB)?

Options:

A.

To track configuration incidents and service requests

B.

To record and monitor performance metrics for configuration items

C.

To provide an organized view of configuration items and their relationships

D.

To store backup copies of software applications

Buy Now
Questions 287

Which of the following controls is the BEST recommendation to prevent the skimming of debit or credit card data in point of sale (POS) systems?

Options:

A.

Encryption

B.

Chip and PIN

C.

Hashing

D.

Biometric authentication

Buy Now
Questions 288

Which of the following activities is MOST likely to increase internal audit quality?

Options:

A.

Increasing audit staff training

B.

Outsourcing the internal audit function

C.

Increasing the number of planned audits

D.

Conducting client surveys

Buy Now
Questions 289

What is the PRIMARY purpose of performing a parallel run of a now system?

Options:

A.

To train the end users and supporting staff on the new system

B.

To verify the new system provides required business functionality

C.

To reduce the need for additional testing

D.

To validate the new system against its predecessor

Buy Now
Questions 290

An IS auditor is reviewing an organization ' s primary router access control list. Which of the following should result in a finding?

Options:

A.

There are conflicting permit and deny rules for the IT group.

B.

The network security group can change network address translation (NAT).

C.

Individual permissions are overriding group permissions.

D.

There is only one rule per group with access privileges.

Buy Now
Questions 291

Which of the following is the MOST important prerequisite for implementing a data loss prevention (DLP) tool?

Options:

A.

Requiring users to save files in secured folders instead of a company-wide shared drive

B.

Reviewing data transfer logs to determine historical patterns of data flow

C.

Developing a DLP policy and requiring signed acknowledgment by users

D.

Identifying where existing data resides and establishing a data classification matrix

Buy Now
Questions 292

An emergency power-off switch should:

Options:

A.

Be remotely accessible.

B.

Not be identified.

C.

Be protected.

D.

Be under dual control.

Buy Now
Questions 293

Which of the following would be a result of utilizing a top-down maturity model process?

Options:

A.

A means of benchmarking the effectiveness of similar processes with peers

B.

A means of comparing the effectiveness of other processes within the enterprise

C.

Identification of older, more established processes to ensure timely review

D.

Identification of processes with the most improvement opportunities

Buy Now
Questions 294

Controls related to authorized modifications to production programs are BEST tested by:

Options:

A.

tracing modifications from the original request for change forward to the executable program.

B.

tracing modifications from the executable program back to the original request for change.

C.

testing only the authorizations to implement the new program.

D.

reviewing only the actual lines of source code changed in the program.

Buy Now
Questions 295

An IS auditor reviewing database security should be MOST concerned if the database administrator (DBA):

Options:

A.

approves access roles.

B.

resolves database locks.

C.

executes recovery procedures.

D.

assesses database performance.

Buy Now
Questions 296

Which type of attack poses the GREATEST risk to an organization ' s most sensitive data?

Options:

A.

Password attack

B.

Eavesdropping attack

C.

Insider attack

D.

Spear phishing attack

Buy Now
Questions 297

Which of the following is MOST helpful for understanding an organization’s key driver to modernize application platforms?

Options:

A.

Vendor software inventories

B.

Network architecture diagrams

C.

System-wide incident reports

D.

Inventory of end-of-life software

Buy Now
Questions 298

An IS auditor has traced the source of a transaction fraud to the desktop system of an e-business staff member who is on leave. Which of the following is the BEST way for the auditor to ensure the success of the investigation?

Options:

A.

Create an image of the attacked system and dump the memory to a file for review.

B.

Immediately seal off the attacked system and block all access until after the investigation.

C.

Reboot the attacked system and promptly review log files and file timestamps.

D.

Interview the business staff and ask them to provide details of recent system activities.

Buy Now
Questions 299

Which of the following be of GREATEST concern to an IS auditor reviewing on-site preventive maintenance for an organization’s business-critical server hardware?

Options:

A.

Preventive maintenance costs exceed the business allocated budget.

B.

Preventive maintenance has not been approved by the information system

C.

Preventive maintenance is outsourced to multiple vendors without requiring nondisclosure agreements (NDAs)

D.

The preventive maintenance schedule is based on mean time between failures (MTBF) parameters.

Buy Now
Questions 300

Which of the following would be the BEST criteria for monitoring an IT vendor ' s service levels?

Options:

A.

Service auditor ' s report

B.

Performance metrics

C.

Surprise visit to vendor

D.

Interview with vendor

Buy Now
Questions 301

To reduce operational costs, IT management plans to reduce the number of servers currently used to run business applications. Which of the following is MOST helpful to review when identifying which servers are no longer required?

Options:

A.

Performance feedback from the user community

B.

Contract with the server vendor

C.

Server CPU usage trends

D.

Mean time between failure (MTBF) of each server

Buy Now
Questions 302

Which of the following should be of GREATEST concern for an IS auditor when reviewing user account policies?

Options:

A.

There is no policy to revoke an employee ' s system access upon termination.

B.

There is no policy in place for ongoing security awareness training.

C.

There is no policy requiring employees to sign nondisclosure agreements (NDAs).

D.

There is no policy to revoke previous access rights when employees change roles.

Buy Now
Questions 303

When designing a data analytics process, which of the following should be the stakeholder ' s role in automating data extraction and validation?

Options:

A.

Indicating which data elements are necessary to make informed decisions

B.

Allocating the resources necessary to purchase the appropriate software packages

C.

Performing the business case analysis for the data analytics initiative

D.

Designing the workflow necessary for the data analytics tool to evaluate the appropriate data

Buy Now
Questions 304

During an audit, an IT finding is agreed upon by all IT teams involved, but no team wants to be responsible for remediation or considers the finding within Its area of responsibility Which of the following is the IS auditor ' s BEST course of action?

Options:

A.

Escalate to IT management for resolution.

B.

Issue the finding without identifying an owner

C.

Assign shared responsibility to all IT teams.

D.

Determine the most appropriate team and assign accordingly.

Buy Now
Questions 305

How is nonrepudiation supported within a public key infrastructure (PKI) environment?

Options:

A.

Through the use of elliptical curve cryptography on transmitted messages

B.

Through the use of a certificate issued by a certificate authority (CA)

C.

Through the use of private keys to decrypt data received by a user

D.

Through the use of enterprise key management systems

Buy Now
Questions 306

Which of the following is the MOST effective way to identify exfiltration of sensitive data by a malicious insider?

Options:

A.

Implement data loss prevention (DLP) software

B.

Review perimeter firewall logs

C.

Provide ongoing information security awareness training

D.

Establish behavioral analytics monitoring

Buy Now
Questions 307

When testing the accuracy of transaction data, which of the following situations BEST justifies the use of a smaller sample size?

Options:

A.

The IS audit staff has a high level of experience.

B.

It is expected that the population is error-free.

C.

Proper segregation of duties is in place.

D.

The data can be directly changed by users.

Buy Now
Questions 308

Which of the following metrics is MOST helpful for evaluating the effectiveness of problem management practices?

Options:

A.

The number of recurring incidents that cause downtime

B.

The percentage of incidents resolved within a service level agreement (SLA)

C.

The number of incidents investigated and diagnosed

D.

The average time to detect and prioritize an incident

Buy Now
Questions 309

Which of the following observations should be of GREATEST concern to an IS auditor assessing access controls for the accounts payable module of a finance system?

Options:

A.

Payment files are stored on a shared drive in a writable format prior to processing.

B.

Accounts payable staff have access to update vendor bank account details.

C.

The IS auditor was granted access to create purchase orders.

D.

Configured delegation limits do not align to the organization ' s delegation’s policy.

Buy Now
Questions 310

An outsourced recruitment vendor processes personally identifiable information (PII) related to an organization’s new hires. Which of the following would be the GREATEST concern to an IS auditor reviewing the third-party risk management process?

Options:

A.

The vendor collects data using an external-facing web service.

B.

The vendor lacks a team of dedicated privacy professionals.

C.

The vendor uses a fourth party to host client data.

D.

The vendor is excluded from the third-party due diligence process.

Buy Now
Questions 311

To ensure confidentiality through the use of asymmetric encryption, a message is encrypted with which of the following?

Options:

A.

Recipient ' s public key

B.

Sender ' s private key

C.

Sender ' s public key

D.

Recipient ' s private key

Buy Now
Questions 312

Which of the following security measures will reduce the risk of propagation when a cyberattack occurs?

Options:

A.

Perimeter firewall

B.

Data loss prevention (DLP) system

C.

Web application firewall

D.

Network segmentation

Buy Now
Questions 313

Which of the following is the MOST effective accuracy control for entry of a valid numeric part number?

Options:

A.

Hash totals

B.

Online review of description

C.

Comparison to historical order pattern

D.

Self-checking digit

Buy Now
Questions 314

Which of the following is the BEST source of organizational direction on when to use cloud services?

Options:

A.

Enterprise architecture (EA)

B.

Business continuity plans (BCPs)

C.

Availability requirements

D.

Cloud regulations

Buy Now
Questions 315

Which of the following is the MOST important prerequisite for the protection of physical information assets in a data center?

Options:

A.

Segregation of duties between staff ordering and staff receiving information assets

B.

Complete and accurate list of information assets that have been deployed

C.

Availability and testing of onsite backup generators

D.

Knowledge of the IT staff regarding data protection requirements

Buy Now
Questions 316

During a follow-up engagement, an IS auditor confirms evidence of a problem that was not an issue in the original audit. Which of the following is the auditor ' s BEST course of action?

Options:

A.

Include the evidence as part of a future audit.

B.

Report only on the areas within the scope of the follow-up.

C.

Report the risk to management in the follow-up report.

D.

Expand the follow-up scope to include examining the evidence.

Buy Now
Questions 317

Which of the following is MOST important to include in a business case for an IT-enabled investment?

Options:

A.

Business impact analysis (BIA)

B.

Cost-benefit analysis

C.

Security requirements

D.

Risk assessment

Buy Now
Questions 318

Which of the following is the MOST important benefit of involving IS audit when implementing governance of enterprise IT?

Options:

A.

Identifying relevant roles for an enterprise IT governance framework

B.

Making decisions regarding risk response and monitoring of residual risk

C.

Verifying that legal, regulatory, and contractual requirements are being met

D.

Providing independent and objective feedback to facilitate improvement of IT processes

Buy Now
Questions 319

An IS auditor is analyzing a sample of accounts payable transactions for a specific vendor and identifies one transaction with a value five times as high as the average transaction. Which of the following should the auditor do NEXT?

Options:

A.

Report the variance immediately to the audit committee

B.

Request an explanation of the variance from the auditee

C.

Increase the sample size to 100% of the population

D.

Exclude the transaction from the sample population

Buy Now
Questions 320

A financial group recently implemented new technologies and processes, Which type of IS audit would provide the GREATEST level of assurance that the department ' s objectives have been met?

Options:

A.

Performance audit

B.

Integrated audit

C.

Cyber audit

D.

Financial audit

Buy Now
Questions 321

An organization plans to replace its nightly batch processing backup to magnetic tape with real-time replication to a second data center. Which of the following is the GREATEST risk associated with this change?

Options:

A.

Version control issues

B.

Reduced system performance

C.

Inability to recover from cybersecurity attacks

D.

Increase in IT investment cost

Buy Now
Questions 322

Which of the following approaches would utilize data analytics to facilitate the testing of a new account creation process?

Options:

A.

Attempt to submit new account applications with invalid dates of birth.

B.

Review the business requirements document for date of birth field requirements.

C.

Review new account applications submitted in the past month for invalid dates of birth.

D.

Evaluate configuration settings for the date of birth field requirements

Buy Now
Questions 323

An organization implemented a cybersecurity policy last year Which of the following is the GREATE ST indicator that the policy may need to be revised?

Options:

A.

A significant increase in authorized connections to third parties

B.

A significant increase in cybersecurity audit findings

C.

A significant increase in approved exceptions

D.

A significant increase in external attack attempts

Buy Now
Questions 324

Which of the following is the BEST source of information for assessing the effectiveness of IT process monitoring?

Options:

A.

Real-time audit software

B.

Performance data

C.

Quality assurance (QA) reviews

D.

Participative management techniques

Buy Now
Questions 325

An IS auditor has been asked to provide support to the control self-assessment (CSA) program. Which of the following BEST represents the scope of the auditor’s role in the program?

Options:

A.

The auditor should act as a program facilitator.

B.

The auditor should focus on improving process productivity

C.

The auditor should perform detailed audit procedures

D.

The auditor ' s presence replaces the audit responsibilities of other team members.

Buy Now
Questions 326

Which of the following is the PRIMARY advantage of parallel processing for a new system implementation?

Options:

A.

Assurance that the new system meets functional requirements

B.

More time for users to complete training for the new system

C.

Significant cost savings over other system implemental or approaches

D.

Assurance that the new system meets performance requirements

Buy Now
Questions 327

Which of the following is the BEST reason to implement a data retention policy?

Options:

A.

To limit the liability associated with storing and protecting information

B.

To document business objectives for processing data within the organization

C.

To assign responsibility and ownership for data protection outside IT

D.

To establish a recovery point detective (RPO) for (toaster recovery procedures

Buy Now
Questions 328

Which of the following control measures is the MOST effective against unauthorized access of confidential information on stolen or lost laptops?

Options:

A.

Remote wipe capabilities

B.

Disk encryption

C.

User awareness

D.

Password-protected files

Buy Now
Questions 329

A system development project is experiencing delays due to ongoing staff shortages. Which of the following strategies would provide the GREATEST assurance of system quality at implementation?

Options:

A.

Implement overtime pay and bonuses for all development staff.

B.

Utilize new system development tools to improve productivity.

C.

Recruit IS staff to expedite system development.

D.

Deliver only the core functionality on the initial target date.

Buy Now
Questions 330

Which of the following technology trends can lead to more robust data loss prevention (DLP) tools?

Options:

A.

Cloud computing

B.

Robotic process automation (RPA)

C.

Internet of Things (IoT)

D.

Machine learning algorithms

Buy Now
Questions 331

In response to an audit finding regarding a payroll application, management implemented a new automated control. Which of the following would be MOST helpful to the IS auditor when evaluating the effectiveness of the new control?

Options:

A.

Approved test scripts and results prior to implementation

B.

Written procedures defining processes and controls

C.

Approved project scope document

D.

A review of tabletop exercise results

Buy Now
Questions 332

Which of the following BEST helps data loss prevention (DLP) tools detect movement of sensitive data m transit?

Options:

A.

Network traffic logs

B.

Deep packet inspection

C.

Data inventory

D.

Proprietary encryption

Buy Now
Questions 333

Which of the following is a method to prevent disclosure of classified documents printed on a shared printer?

Options:

A.

Using passwords to allow authorized users to send documents to the printer

B.

Requiring a key code to be entered on the printer to produce hard copy

C.

Encrypting the data stream between the user ' s computer and the printer

D.

Producing a header page with classification level for printed documents

Buy Now
Questions 334

Which of the following BEST mitigates the risk of SQL injection attacks against applications exposed to the internet?

Options:

A.

Web application firewall (WAF)

B.

SQL server hardening

C.

Patch management program

D.

SQL server physical controls

Buy Now
Questions 335

A core system fails a week after a scheduled update, causing an outage that impacts service. Which of the following is MOST important for incident management to focus on when addressing the issue?

Options:

A.

Analyzing the root cause of the outage to ensure the incident will not reoccur

B.

Restoring the system to operational state as quickly as possible

C.

Ensuring all resolution steps are fully documented prior to returning thesystem to service

D.

Rolling back the unsuccessful change to the previous state

Buy Now
Questions 336

Which of the following BEST protects an organization ' s proprietary code during a joint-development activity involving a third party?

Options:

A.

Statement of work (SOW)

B.

Nondisclosure agreement (NDA)

C.

Service level agreement (SLA)

D.

Privacy agreement

Buy Now
Questions 337

IT management has accepted the risk associated with an IS auditor ' s finding due to the cost and complexity of the corrective actions. Which of the following should be the auditor ' s NEXT course of action?

Options:

A.

Perform a cost-benefit analysis.

B.

Document and inform the audit committee.

C.

Report the finding to external regulators.

D.

Notify senior management.

Buy Now
Questions 338

Which of the following is a PRIMARY purpose of a privacy notice?

Options:

A.

To indemnify the organization against litigation by users for the appropriation of personal information

B.

To establish the organization’s accountability for the use and protection of personal information

C.

To obtain approval for the sale of personal information to third-party organizations

D.

To ensure that the organization’s privacy controls comply with the privacy laws of the user’s region

Buy Now
Questions 339

An IS auditor notes that several employees are spending an excessive amount of time using social media sites for personal reasons. Which of the following should the auditor recommend be performed FIRST?

Options:

A.

Implement a process to actively monitor postings on social networking sites.

B.

Adjust budget for network usage to include social media usage.

C.

Use data loss prevention (DLP) tools on endpoints.

D.

implement policies addressing acceptable usage of social media during working hours.

Buy Now
Questions 340

An IS auditor is reviewing an organization ' s system development life cycle (SDLC) Which of the following MUST be included in the review?

Options:

A.

Ownership of the system quality management plan

B.

Utilization of standards in the system development processes and procedures

C.

Validation that system development processes adhere to quality standards

D.

Definition of quality attributes to be associated with the system

Buy Now
Questions 341

Management receives information indicating a high level of risk associated with potential flooding near the organization ' s data center within the next few years. As a result, a decision has been made to move data center operations to another facility on higher ground. Which approach has been adopted?

Options:

A.

Risk avoidance

B.

Risk transfer

C.

Risk acceptance

D.

Risk reduction

Buy Now
Questions 342

The use of access control lists (ACLs) is the MOST effective method to mitigate security risk for routers because they: (Identify Correct answer and related explanation/references from CISA Certification - Information Systems Auditor official Manual or book)

Options:

A.

are recommended by security standards.

B.

can limit Telnet and traffic from the open Internet.

C.

act as fitters between the world and the network.

D.

can detect cyberattacks.

Buy Now
Questions 343

Which of the following is an IS auditor’s BEST recommendation after identifying that HR staff create new employees in the payroll system as well as process payroll due to limited staffing?

Options:

A.

Document roles and responsibilities of payroll staff.

B.

Implement a payroll system user awareness training program.

C.

Implement independent periodic review of payroll transactions.

D.

Rotate payroll responsibilities within HR.

Buy Now
Questions 344

The implementation of an IT governance framework requires that the board of directors of an organization:

Options:

A.

Address technical IT issues.

B.

Be informed of all IT initiatives.

C.

Have an IT strategy committee.

D.

Approve the IT strategy.

Buy Now
Questions 345

Which of the following would be to MOST concern when determine if information assets are adequately safequately safeguarded during transport and disposal?

Options:

A.

Lack of appropriate labelling

B.

Lack of recent awareness training.

C.

Lack of password protection

D.

Lack of appropriate data classification

Buy Now
Questions 346

Which of the following is an organization ' s BEST defense against malware?

Options:

A.

Documented security procedures

B.

Intrusion prevention system (IPS)

C.

Security awareness training

D.

Intrusion detection system (IDS)

Buy Now
Questions 347

Which of the following is the BEST sampling method to use when relatively few errors are expected to be found in a population?

Options:

A.

Variable sampling

B.

Judgmental sampling

C.

Stop-or-go sampling

D.

Discovery sampling

Buy Now
Questions 348

What would be an IS auditor ' s BEST recommendation upon finding that a third-party IT service provider hosts the organization ' s human resources (HR) system in a foreign country?

Options:

A.

Perform background verification checks.

B.

Review third-party audit reports.

C.

Implement change management review.

D.

Conduct a privacy impact analysis.

Buy Now
Questions 349

Which of the following is MOST useful for determining the strategy for IT portfolio management?

Options:

A.

IT metrics dashboards

B.

IT roadmap

C.

Capability maturity model

D.

Life cycle cost-benefit analysis

Buy Now
Questions 350

Which of the following is the BEST preventive control to protect the confidentiality of data on a corporate smartphone in the event it is lost?

Options:

A.

Biometric authentication for the device

B.

Remote data wipe program

C.

Encryption of the data stored on the device

D.

Password for device authentication

Buy Now
Questions 351

Which of the following risk scenarios is BEST addressed by implementing policies and procedures related to full disk encryption?

Options:

A.

Data leakage as a result of employees leaving to work for competitors

B.

Noncompliance fines related to storage of regulated information

C.

Unauthorized logical access to information through an application interface

D.

Physical theft of media on which information is stored

Buy Now
Questions 352

An internal audit team is deciding whether to use an audit management application hosted by a third party in a different country.

What should be the MOST important consideration related to the uploading of payroll audit documentation in the hosted

application?

Options:

A.

Financial regulations affecting the organization

B.

Data center physical access controls whore the application is hosted

C.

Privacy regulations affecting the organization

D.

Per-unit cost charged by the hosting services provider for storage

Buy Now
Questions 353

Which of the following environments is BEST used for copying data and transformation into a compatible data warehouse format?

Options:

A.

Testing

B.

Replication

C.

Staging

D.

Development

Buy Now
Questions 354

Due to limited storage capacity, an organization has decided to reduce the actual retention period for media containing completed low-value transactions. Which of the following is MOST important for the organization to ensure?

Options:

A.

The policy includes a strong risk-based approach.

B.

The retention period allows for review during the year-end audit.

C.

The total transaction amount has no impact on financial reporting.

D.

The retention period complies with data owner responsibilities.

Buy Now
Questions 355

To confirm integrity for a hashed message, the receiver should use:

Options:

A.

the same hashing algorithm as the sender ' s to create a binary image of the file.

B.

a different hashing algorithm from the sender ' s to create a binary image of the file.

C.

the same hashing algorithm as the sender ' s to create a numerical representation of the file.

D.

a different hashing algorithm from the sender ' s to create a numerical representation of the file.

Buy Now
Questions 356

Which of the following is the BEST testing approach to facilitate rapid identification of application interface errors?

Options:

A.

Integration testing

B.

Regression testing

C.

Automated testing

D.

User acceptance testing (UAT)

Buy Now
Questions 357

Which of the following is an IS auditor ' s BEST recommendation to mitigate the risk of eavesdropping

associated with an application programming interface (API) integration implementation?

Options:

A.

Encrypt the extensible markup language (XML) file.

B.

Implement Transport Layer Security (TLS).

C.

Implement Simple Object Access Protocol (SOAP).

D.

Mask the API endpoints.

Buy Now
Questions 358

Upon completion of a penetration test with findings for an IT system, the NEXT step should be:

Options:

A.

Vulnerability scanning and reconfirmation.

B.

Analyzing all changes made to the system.

C.

Remediation and retesting.

D.

Maintaining the confidentiality of the testing report.

Buy Now
Questions 359

A senior auditor is reviewing work papers prepared by a junior auditor indicating that a finding was removed after the auditee said they corrected the problem. Which of the following is the senior auditor s MOST appropriate course of action?

Options:

A.

Ask the auditee to retest

B.

Approve the work papers as written

C.

Have the finding reinstated

D.

Refer the issue to the audit director

Buy Now
Questions 360

Which of the following is the MOST significant impact to an organization that does not use an IT governance framework?

Options:

A.

adequate measurement of key risk indicators (KRIS)

B.

Inadequate alignment of IT plans and business objectives

C.

Inadequate business impact analysis (BIA) results and predictions

D.

Inadequate measurement of key performance indicators (KPls)

Buy Now
Questions 361

When determining the quality of evidence collected during an audit, it is MOST important to ensure the evidence is:

Options:

A.

Valid, complete, and accurate.

B.

Timely, reliable, and reasonable.

C.

Sufficient and comes from the source of the information.

D.

Persuasive and applicable.

Buy Now
Questions 362

An IS auditor engaged in developing the annual internal audit plan learns that the chief information officer (CIO) has requested there be no IS audits in the upcoming year as more time is needed to address a large number of recommendations from the previous year. Which of the following should the auditor do FIRST

Options:

A.

Escalate to audit management to discuss the audit plan

B.

Notify the chief operating officer (COO) and discuss the audit plan risks

C.

Exclude IS audits from the upcoming year ' s plan

D.

Increase the number of IS audits in the clan

Buy Now
Questions 363

When a data center is attempting to restore computing facilities at an alternative site following a disaster, which of the following should be restored FIRST?

Options:

A.

Data backups

B.

Decision support system

C.

Operating system

D.

Applications

Buy Now
Questions 364

Which of the following represents the HIGHEST level of maturity of an information security program?

Options:

A.

A training program is in place to promote information security awareness.

B.

A framework is in place to measure risks and track effectiveness.

C.

Information security policies and procedures are established.

D.

The program meets regulatory and compliance requirements.

Buy Now
Questions 365

Which of the following is the PRIMARY benefit of effective implementation of appropriate data classification?

Options:

A.

Ability to meet business requirements

B.

Assurance that sensitive data is encrypted

C.

Increased accuracy of sensitive data

D.

Management of business risk to sensitive data

Buy Now
Questions 366

Which of the following should be an IS auditor ' s PRIMARY focus when auditing the implementation of a new IT operations performance monitoring system?

Options:

A.

Reviewing whether all changes have been implemented

B.

Validating whether baselines have been established

C.

Confirming whether multi-factor authentication (MFA) is deployed as part of the operational enhancements

D.

Determining whether there is a process for annual review of the maintenance manual

Buy Now
Questions 367

A financial organization has learned that one of its business partners utilizes a cloud solution extending servers to several foreign countries. Which of the following should be of GREATEST concern to the organization?

Options:

A.

Data process outsourcing under the current scheme may violate regulations.

B.

Data integrity may be harmed as the result of distributed server deployment.

C.

Data classification may become invalid once data is stored in overseas servers.

D.

Data ownership between the bank and business partner may become unclear.

Buy Now
Questions 368

Which of the following would be of GREATEST concern to an IS auditor reviewing an IT strategy document?

Options:

A.

Target architecture is defined at a technical level.

B.

The previous year ' s IT strategic goals were not achieved.

C.

Strategic IT goals are derived solely from the latest market trends.

D.

Financial estimates of new initiatives are disclosed within the document.

Buy Now
Questions 369

An IS department is evaluated monthly on its cost-revenue ratio user satisfaction rate, and computer downtime This is BEST zed as an application of.

Options:

A.

risk framework

B.

balanced scorecard

C.

value chain analysis

D.

control self-assessment (CSA)

Buy Now
Questions 370

Which of the following is the MOST important outcome of an information security program?

Options:

A.

Operating system weaknesses are more easily identified.

B.

Emerging security technologies are better understood and accepted.

C.

The cost to mitigate information security risk is reduced.

D.

Organizational awareness of security responsibilities is improved.

Buy Now
Questions 371

An IS auditor discovers that validation controls in a web application have been moved from the server side into the browser to boost performance. This would MOST likely increase the risk of a successful attack by:

Options:

A.

structured query language (SQL) injection

B.

buffer overflow.

C.

denial of service (DoS).

D.

phishing.

Buy Now
Questions 372

Which of the following represents the GREATEST risk to virtualized environments?

Options:

A.

Virtual servers may not have the latest security updates.

B.

Servers may only be accessed remotely.

C.

Hypervisors may be a single point of failure.

D.

Account reviews may not be performed for guest operating systems.

Buy Now
Questions 373

Which of the following BEST enables an organization to standardize its IT infrastructure to align with business goals?

Options:

A.

Enterprise architecture (EA)

B.

Operational technologies

C.

Data architecture

D.

Robotic process automation (RPA)

Buy Now
Questions 374

Which of the following poses the GREATEST risk to the use of active RFID tags?

Options:

A.

Session hijacking

B.

Eavesdropping

C.

Piggybacking

D.

Phishing attacks

Buy Now
Questions 375

The PRIMARY reason for an IS auditor to perform a functional walk-through of a business process during the preliminary phase of an audit assignment is to:

Options:

A.

identify control weaknesses in the business process.

B.

optimize the business process.

C.

understand the key areas.

D.

understand the resource requirements.

Buy Now
Questions 376

An IS auditor is planning a review of an organizations robotic process automation (RPA) technology. Which of the following MUST be included in the audit work plan?

Options:

A.

Integration architecture

B.

Change management

C.

Cost-benefit analysis

D.

Employee training content

Buy Now
Questions 377

Which of the following BEST demonstrates alignment of the IT department with the corporate mission?

Options:

A.

Analysis of IT department functionality

B.

Biweekly reporting to senior management

C.

Annual board meetings

D.

Quarterly steering committee meetings

Buy Now
Questions 378

What should an IS auditor do FIRST when a follow-up audit reveals some management action plans have not been initiated?

Options:

A.

Confirm whether the identified risks are still valid.

B.

Provide a report to the audit committee.

C.

Escalate the lack of plan completion to executive management.

D.

Request an additional action plan review to confirm the findings.

Buy Now
Questions 379

Which of the following BEST facilitates the legal process in the event of an incident?

Options:

A.

Right to perform e-discovery

B.

Advice from legal counsel

C.

Preserving the chain of custody

D.

Results of a root cause analysis

Buy Now
Questions 380

A review of Internet security disclosed that users have individual user accounts with Internet service providers (ISPs) and use these accounts for downloading business data. The organization wants to ensure that only the corporate network is used. The organization should FIRST:

Options:

A.

use a proxy server to filter out Internet sites that should not be accessed.

B.

keep a manual log of Internet access.

C.

monitor remote access activities.

D.

include a statement in its security policy about Internet use.

Buy Now
Questions 381

Which of the following BEST describes the concept of fault tolerance in system resiliency?

Options:

A.

It enables switching to redundant systems in case of faults.

B.

It minimizes downtime and ensures continuous operations.

C.

It allows systems to continue operating in the presence of faults.

D.

It distributes workloads across multiple servers to prevent overload.

Buy Now
Questions 382

Which of the following helps to ensure the integrity of data for a system interface?

Options:

A.

System interface testing

B.

user acceptance testing (IJAT)

C.

Validation checks

D.

Audit logs

Buy Now
Questions 383

An IS auditor is evaluating the progress of a web-based customer service application development project. Which of the following would be MOST helpful for this evaluation?

Options:

A.

Backlog consumption reports

B.

Critical path analysis reports

C.

Developer status reports

D.

Change management logs

Buy Now
Questions 384

An organization has decided to purchase a web-based email service from a third-party vendor and eliminate its own email server infrastructure. What type of cloud computing environment would BEST meet the organization ' s objective?

Options:

A.

Platform as a Service (PaaS)

B.

Software as a Service (SaaS)

C.

Database as a Service (DBaaS)

D.

Infrastructure as a Service (laaS)

Buy Now
Questions 385

When evaluating whether the expected benefits of a project have been achieved, it is MOST important for an IS auditor to review:

Options:

A.

The business case.

B.

The project schedule.

C.

Proposed enhancements.

D.

Quality assurance (QA) results.

Buy Now
Questions 386

Which of the following findings would be of GREATEST concern to an IS auditor assessing an organization ' s patch management process?

Options:

A.

The organization ' s software inventory is not complete.

B.

Applications frequently need to be rebooted for patches to take effect.

C.

Software vendors are bundling patches.

D.

Testing patches takes significant time.

Buy Now
Questions 387

Which of the following would be MOST effective in detecting the presence of an unauthorized wireless access point on an internal network?

Options:

A.

Continuous network monitoring

B.

Periodic network vulnerability assessments

C.

Review of electronic access logs

D.

Physical security reviews

Buy Now
Questions 388

Which of the following performance management tools BEST helps an IS auditor evaluate the success of an organization’s IT strategy implementation and execution?

Options:

A.

IT benchmarking

B.

Capability maturity model

C.

Six Sigma

D.

IT metrics dashboard

Buy Now
Questions 389

Which of the following should be the IS auditor ' s PRIMARY focus, when evaluating an organization ' s offsite storage facility?

Options:

A.

Shared facilities

B.

Adequacy of physical and environmental controls

C.

Results of business continuity plan (BCP) test

D.

Retention policy and period

Buy Now
Questions 390

An organization is disposing of a system containing sensitive data and has deleted all files from the hard disk. An IS auditor should be concerned because:

Options:

A.

deleted data cannot easily be retrieved.

B.

deleting the files logically does not overwrite the files ' physical data.

C.

backup copies of files were not deleted as well.

D.

deleting all files separately is not as efficient as formatting the hard disk.

Buy Now
Questions 391

Which of the following is the PRIMARY concern when negotiating a contract for a hot site?

Options:

A.

Availability of the site in the event of multiple disaster declarations

B.

Coordination with the site staff in the event of multiple disaster declarations

C.

Reciprocal agreements with other organizations

D.

Complete testing of the recovery plan

Buy Now
Questions 392

Which of the following is the MOST important consideration to facilitate prosecution of a perpetrator after a cybercrime?

Options:

A.

An active intrusion detection system (IDS)

B.

Professional collection of unaltered evidence

C.

Reporting to the internal legal department

D.

Immediate law enforcement involvement

Buy Now
Questions 393

Which of the following key performance indicators (KPIs) provides stakeholders with the MOST useful information about whether information security risk is being managed?

Options:

A.

Time from identifying security threats to implementing solutions

B.

The number of security controls audited

C.

Time from security log capture to log analysis

D.

The number of entries in the security risk register

Buy Now
Questions 394

The waterfall life cycle model of software development is BEST suited for which of the following situations?

Options:

A.

The protect requirements are wall understood.

B.

The project is subject to time pressures.

C.

The project intends to apply an object-oriented design approach.

D.

The project will involve the use of new technology.

Buy Now
Questions 395

Which of the following should an IS auditor be MOST concerned with when a system uses RFID?

Options:

A.

Scalability

B.

Maintainability

C.

Nonrepudiation

D.

Privacy

Buy Now
Questions 396

Which of the following is the BEST method to safeguard data on an organization ' s laptop computers?

Options:

A.

Disabled USB ports

B.

Full disk encryption

C.

Biometric access control

D.

Two-factor authentication

Buy Now
Questions 397

Internal audit is evaluating an organization’s IT portfolio management. Which of the following would be the BEST recommendation for prioritizing the funding of IT projects?

Options:

A.

Group projects with common themes into portfolios and assess them against strategic objectives.

B.

Direct funds toward projects that increase the availability of the organization’s technology infrastructure.

C.

Direct funds toward projects that reduce the organization’s technology risk exposure.

D.

Group projects into portfolios based on their potential to increase market share and reduce costs.

Buy Now
Questions 398

A startup organization wants to develop a data loss prevention (DLP) program. The FIRST step should be to implement:

Options:

A.

Security awareness training

B.

Data encryption

C.

Data classification

D.

Access controls

Buy Now
Questions 399

Which of the following is the PRIMARY function of an internal IS auditor when the organization acquires a new IT system to support its business strategy?

Options:

A.

Identifying significant IT errors and fraud

B.

Assessing system development life cycle (SDLC) controls

C.

Implementing risk and control gap mitigation

D.

Evaluating IT risk and controls

Buy Now
Questions 400

Management is concerned about sensitive information being intentionally or unintentionally emailed as attachments outside the organization by employees. What is the MOST important task before implementing any associated email controls?

Options:

A.

Require all employees to sign nondisclosure agreements (NDAs).

B.

Develop an acceptable use policy for end-user computing (EUC).

C.

Develop an information classification scheme.

D.

Provide notification to employees about possible email monitoring.

Buy Now
Questions 401

Which of the following should be of GREATEST concern to an |$ auditor reviewing data conversion and migration during the implementation of a newapplication system?

Options:

A.

The change management process was not formally documented

B.

Backups of the old system and data are not available online

C.

Unauthorized data modifications occurred during conversion,

D.

Data conversion was performed using manual processes

Buy Now
Questions 402

Several unattended laptops containing sensitive customer data were stolen from personnel offices Which of the following would be an IS auditor ' s BEST recommendation to protect data in case of recurrence?

Options:

A.

Encrypt the disk drive.

B.

Require two-factor authentication

C.

Enhance physical security

D.

Require the use of cable locks

Buy Now
Questions 403

An IS auditor is preparing for a review of controls associated with a manufacturing plant ' s implementation of industrial Internet of Things (loT) infrastructure Which of the following vulnerabilities would present the GREATEST security risk to the organization?

Options:

A.

Insufficient physical security around the lo I devices for theft prevention

B.

Use of open-source software components within the loT devices

C.

Constraints in loT device firmware storage space for code upgrades

D.

loT devices that are not using wireless network connectivity

Buy Now
Questions 404

Which of the following is the PRIMARY reason to perform a risk assessment?

Options:

A.

To determine the current risk profile

B.

To ensure alignment with the business impact analysis (BIA)

C.

To achieve compliance with regulatory requirements

D.

To help allocate budget for risk mitigation controls

Buy Now
Questions 405

Which of the following is the MOST important success factor for implementing a data loss prevention (DLP) tool?

Options:

A.

Implementing the tool in monitor mode to avoid unnecessary blocking of communication

B.

Defining and configuring policies and tool rule sets to monitor sensitive data movement

C.

Testing the tool in a test environment before moving to the production environment

D.

Assigning responsibilities for maintaining the tool to applicable data owners and stakeholders

Buy Now
Questions 406

Data centers that want to prevent unauthorized personnel from entering during a power outage should ensure external access doors:

Options:

A.

Have physical key backup.

B.

Operate in fail-safe mode.

C.

Operate in fail-secure mode.

D.

Are alarmed and monitored.

Buy Now
Questions 407

Which of the following is a detective control?

Options:

A.

Programmed edit checks for data entry

B.

Backup procedures

C.

Use of pass cards to gain access to physical facilities

D.

Verification of hash totals

Buy Now
Questions 408

When verifying the accuracy and completeness of migrated data for a new application system replacing a legacy system. It is MOST effective for an IS auditor to review;

Options:

A.

data analytics findings.

B.

audit trails

C.

acceptance lasting results

D.

rollback plans

Buy Now
Questions 409

Which of the following provides the BE ST method for maintaining the security of corporate applications pushed to employee-owned mobile devices?

Options:

A.

Enabling remote data destruction capabilities

B.

Implementing mobile device management (MDM)

C.

Disabling unnecessary network connectivity options

D.

Requiring security awareness training for mobile users

Buy Now
Questions 410

An IS auditor reviewing incident response management processes notices that resolution times for reoccurring incidents have not shown improvement. Which of the following is the auditor ' s BEST recommendation?

Options:

A.

Harden IT system and application components based on best practices.

B.

Incorporate a security information and event management (SIEM) system into incident response

C.

Implement a survey to determine future incident response training needs.

D.

Introduce problem management into incident response.

Buy Now
Questions 411

An IS auditor is reviewing a medical device that is attached to a patient’s body, which automatically takes and uploads measurements to a cloud server. Treatment may be updated based on the measurements. Which of the following should be the auditor ' s PRIMARY focus?

Options:

A.

Physical access controls on the device

B.

Security and quality certification of the device

C.

Device identification and authentication

D.

Confirmation that the device is regularly updated

Buy Now
Questions 412

From a risk management perspective, which of the following is the BEST approach when implementing a large and complex data center IT infrastructure?

Options:

A.

A big bang deployment with a successful proof of concept

B.

Simulating the new infrastructure before deployment

C.

Prototyping and a one-phase deployment

D.

A deployment plan based on sequenced phases

Buy Now
Questions 413

An IS auditor finds that a new network connection allows communication between the Internet and the internal enterprise resource planning (ERP) system. Which of the following is the PRIMARY business impact to include when presenting this observation to management?

Options:

A.

An increase to the threat landscape

B.

A decrease in data quality in the ERP system

C.

A decrease in network performance

D.

An increase in potential fines from regulators

Buy Now
Questions 414

An IS auditor reviewing an information processing environment decides to conduct external penetration testing. Which of the following is MOST appropriate to include in the audit scope for the organization to distinguish between the auditor ' s penetration attacks and actual attacks?

Options:

A.

Restricted host IP addresses of simulated attacks

B.

Testing techniques of simulated attacks

C.

Source IP addresses of simulated attacks

D.

Timing of simulated attacks

Buy Now
Questions 415

After areas have been appropriately scoped, what is the IS auditor ' s NEXT step in the selection for sampling?

Options:

A.

Define the population for sampling.

B.

Determine the sampling method.

C.

Calculate the sample size.

D.

Pull the sample.

Buy Now
Questions 416

Which of the following should be of GREATEST concern to an IS auditor performing a review of information security controls?

Options:

A.

The information security policy has not been approved by the chief audit executive (CAE).

B.

The information security policy does not include mobile device provisions

C.

The information security policy is not frequently reviewed

D.

The information security policy has not been approved by the policy owner

Buy Now
Questions 417

Which of the following should be of MOST concern to an IS auditor reviewing the information systems acquisition, development, and implementation process?

Options:

A.

Data owners are not trained on the use of data conversion tools.

B.

A post-implementation lessons-learned exercise was not conducted.

C.

There is no system documentation available for review.

D.

System deployment is routinely performed by contractors.

Buy Now
Questions 418

Which of the following is the MAIN responsibility of the IT steering committee?

Options:

A.

Reviewing and assisting with IT strategy integration efforts

B.

Developing and assessing the IT security strategy

C.

Implementing processes to integrate security with business objectives

D.

Developing and implementing the secure system development framework

Buy Now
Questions 419

Which of the following would be MOST helpful to an IS auditor performing a risk assessment of an application programming interface (API) that feeds credit scores from a well-known commercial credit agency into an organizational system?

Options:

A.

A data dictionary of the transferred data

B.

A technical design document for the interface configuration

C.

The most recent audit report from the credit agency

D.

The approved business case for the API

Buy Now
Questions 420

An IS auditor is tasked to review an organization ' s plan-do-check-act (PDCA) method for improving IT-related processes and wants to determine the accuracy of defined targets to be achieved. Which of the following steps in the PDCA process should the auditor PRIMARILY focus on in this situation?

Options:

A.

Check

B.

Plan

C.

Do

D.

Act

Buy Now
Questions 421

An IS auditor is assessing the adequacy of management ' s remediation action plan. Which of the following should be the MOST important consideration?

Options:

A.

Plan approval by the audit committee

B.

Impacts on future audit work

C.

Criticality of audit findings

D.

Potential cost savings

Buy Now
Questions 422

An IS auditor observes that a business-critical application does not currently have any level of fault tolerance. Which of the following is the GREATEST concern with this situation?

Options:

A.

Degradation of services

B.

Limited tolerance for damage

C.

Decreased mean time between failures (MTBF)

D.

Single point of failure

Buy Now
Questions 423

Which of the following is MOST important to consider when scheduling follow-up audits?

Options:

A.

The efforts required for independent verification with new auditors

B.

The impact if corrective actions are not taken

C.

The amount of time the auditee has agreed to spend with auditors

D.

Controls and detection risks related to the observations

Buy Now
Questions 424

The charging method that effectively encourages the MOST efficient use of IS resources is:

Options:

A.

specific charges that can be tied back to specific usage.

B.

total utilization to achieve full operating capacity.

C.

residual income in excess of actual incurred costs.

D.

allocations based on the ability to absorb charges.

Buy Now
Questions 425

Which of the following BEST supports the effectiveness of a compliance program?

Options:

A.

Implementing an awareness plan regarding compliance regulation requirements

B.

Implementing a governance, risk, and compliance (GRC) tool to track compliance to regulations

C.

Assessing and tracking all compliance audit findings

D.

Monitoring which compliance regulations apply to the organization

Buy Now
Questions 426

The use of control totals satisfies which of the following control objectives?

Options:

A.

Transaction integrity

B.

Processing integrity

C.

Distribution control

D.

System recoverability

Buy Now
Questions 427

During the evaluation of controls over a major application development project, the MOST effective use of an IS auditor ' s time would be to review and evaluate:

Options:

A.

application test cases.

B.

acceptance testing.

C.

cost-benefit analysis.

D.

project plans.

Buy Now
Questions 428

Which of the following would an IS auditor find to be the GREATEST risk associated with the server room in a remote office location?

Options:

A.

The server room is secured by a key lock instead of an electronic lock.

B.

The server room ' s location is known by people who work in the area.

C.

The server room does not have temperature controls.

D.

The server room does not have biometric controls.

Buy Now
Questions 429

Which of the following responses to risk associated with segregation of duties would incur the LOWEST initial cost?

Options:

A.

Risk acceptance

B.

Risk mitigation

C.

Risk transference

D.

Risk reduction

Buy Now
Questions 430

When an intrusion into an organization network is deleted, which of the following should be done FIRST?

Options:

A.

Block all compromised network nodes.

B.

Contact law enforcement.

C.

Notify senior management.

D.

Identity nodes that have been compromised.

Buy Now
Questions 431

Which of the following is MOST important to ensure successful implementation when an organization decides to purchase software from available products on the market?

Options:

A.

Requirements definition

B.

Post-implementation review

C.

Support and maintenance contract

D.

Software escrow

Buy Now
Questions 432

Which of the following audit procedures would be MOST conclusive in evaluating the effectiveness of an e-commerce application system ' s edit routine?

Options:

A.

Review of program documentation

B.

Use of test transactions

C.

Interviews with knowledgeable users

D.

Review of source code

Buy Now
Questions 433

Which of the following should be performed FIRST before key performance indicators (KPIs) can be implemented?

Options:

A.

Analysis of industry benchmarks

B.

Identification of organizational goals

C.

Analysis of quantitative benefits

D.

Implementation of a balanced scorecard

Buy Now
Questions 434

An IS auditor concludes that an organization has a quality security policy. Which of the following is MOST important to determine next? The policy must be:

Options:

A.

well understood by all employees.

B.

based on industry standards.

C.

developed by process owners.

D.

updated frequently.

Buy Now
Questions 435

Which of the following is the BEST reason to implement a data retention policy?

Options:

A.

To establish a recovery point objective (RPO) for disaster recovery procedures

B.

To limit the liability associated with storing and protecting information

C.

To document business objectives for processing data within the organization

D.

To assign responsibility and ownership for data protection outside IT

Buy Now
Questions 436

Which of the following is the BEST data integrity check?

Options:

A.

Counting the transactions processed per day

B.

Performing a sequence check

C.

Tracing data back to the point of origin

D.

Preparing and running test data

Buy Now
Questions 437

An organization offers an e-commerce platform that allows consumer-to-consumer transactions. The platform now uses blockchain technology to ensure the parties are unable to deny the transactions. Which of the following attributes BEST describes the risk element that this technology is addressing?

Options:

A.

Integrity

B.

Nonrepudiation

C.

Confidentiality

D.

Availability

Buy Now
Questions 438

Which of the following poses the GREATEST potential concern for an organization that decides to consolidate mission-critical applications on a large server as part of IT capacity management?

Options:

A.

More applications may be negatively affected by outages on the server.

B.

Continuous monitoring efforts for server capacity may be costly.

C.

Network bandwidth may be degraded during peak hours.

D.

Accurate server capacity forecasting may be more difficult.

Buy Now
Questions 439

At the conclusion of an audit, but before issuing the final report, the auditor should:

Options:

A.

Confirm results with the audit committee.

B.

Confirm factual findings with the auditee.

C.

Obtain evidence to support findings.

D.

Help management develop action plans.

Buy Now
Questions 440

Which of the following is the PRIMARY reason an IS auditor should discuss observations with management before delivering a final report?

Options:

A.

Validate the audit observations_

B.

Identify business risks associated with the observations.

C.

Assist the management with control enhancements.

D.

Record the proposed course of corrective action.

Buy Now
Questions 441

A KEY benefit of integrated auditing is that it:

Options:

A.

Facilitates the business in reviewing its control environment.

B.

Enables continuous auditing and monitoring.

C.

Improves the review of audit work by team leaders.

D.

Combines skill sets from operational, functional, and IS auditors.

Buy Now
Questions 442

Which of the following is the BEST control to mitigate the risk of shadow IT?

Options:

A.

Intrusion detection system (IDS)

B.

Vendor management reviews

C.

Vulnerability scanning

D.

Security awareness training

Buy Now
Questions 443

Which of the following is the BEST source of information to determine the required level of data protection on a file server?

Options:

A.

Data classification policy and procedures

B.

Access rights of similar file servers

C.

Previous data breach incident reports

D.

Acceptable use policy and privacy statements

Buy Now
Questions 444

Which of the following is the MOST appropriate and effective fire suppression method for an unstaffed computer room?

Options:

A.

Water sprinkler

B.

Fire extinguishers

C.

Carbon dioxide (CO2)

D.

Dry pipe

Buy Now
Questions 445

Which of the following methods would BEST help detect unauthorized disclosure of confidential documents sent over corporate email?

Options:

A.

Requiring all users to encrypt documents before sending

B.

Installing firewalls on the corporate network

C.

Reporting all outgoing emails that are marked as confidential

D.

Monitoring all emails based on pre-defined criteria

Buy Now
Questions 446

Which of the following findings related to segregation of duties should be of GREATEST concern to an IS auditor?

Options:

A.

The person who tests source code also approves changes.

B.

The person who administers servers is also part of the infrastructure management team.

C.

The person who creates new user accounts also modifies user access levels.

D.

The person who edits source code also has write access to production.

Buy Now
Questions 447

An organization has replaced all of the storage devices at its primary data center with new higher-capacity units The replaced devices have been installed at the disaster recovery site to replace older units An IS auditor s PRIMARY concern would be whether

Options:

A.

the recovery site devices can handle the storage requirements

B.

hardware maintenance contract is in place for both old and new storage devices

C.

the procurement was in accordance with corporate policies and procedures

D.

the relocation plan has been communicated to all concerned parties

Buy Now
Questions 448

During the forensic investigation of a cyberattack involving credit card data, which of the following is MOST important to ensure?

Options:

A.

Adequate card security features are activated.

B.

The company’s payment platforms are blocked.

C.

Proper chain of custody is maintained.

D.

All staff in the payment card unit are interviewed.

Buy Now
Questions 449

Which of the following MUST be completed as part of the annual audit planning process?

Options:

A.

Business impact analysis (BIA)

B.

Fieldwork

C.

Risk assessment

D.

Risk control matrix

Buy Now
Questions 450

Which of the following is MOST important to consider when determining the usefulness of audit evidence?

Options:

A.

Timing of the evidence

B.

Nature of evidence gathered

C.

Overall objectives of the review

D.

Competence of the IS auditor

Buy Now
Questions 451

Which of the following is the BEST compensating control when segregation of duties is lacking in a small IS department?

Options:

A.

Background checks

B.

User awareness training

C.

Transaction log review

D.

Mandatory holidays

Buy Now
Questions 452

The PRIMARY advantage of using open-source-based solutions is that they:

Options:

A.

Have well-defined support levels.

B.

Are easily implemented.

C.

Reduce dependence on vendors.

D.

Offer better security features.

Buy Now
Questions 453

An organization has made a strategic decision to split into separate operating entities to improve profitability. However, the IT infrastructure remains shared between the entities. Which of the following would BEST help to ensure that IS audit still covers key risk areas within the IT environment as part of its annual plan?

Options:

A.

Increasing the frequency of risk-based IS audits for each business entity

B.

Developing a risk-based plan considering each entity ' s business processes

C.

Conducting an audit of newly introduced IT policies and procedures

D.

Revising IS audit plans to focus on IT changes introduced after the split

Buy Now
Questions 454

During a review of system access, an IS auditor notes that an employee who has recently changed roles within the organization still has previous access rights. The auditor ' s NEXT step should be to:

Options:

A.

recommend a control to automatically update access rights.

B.

determine the reason why access rights have not been revoked.

C.

direct management to revoke current access rights.

D.

determine if access rights are in violation of software licenses.

Buy Now
Questions 455

A secure server room has a badge reader system that records name, date, and time information whenever a staff member uses a badge to enter or exit. When reviewing the system logs, an IS auditor notices records for some employees entering, but not exiting, the room. Which of the following would be the MOST effective compensating control to recommend?

Options:

A.

Installing security cameras at the doors

B.

Changing to a biometric access control system

C.

Implementing a monitored mantrap at entrance and exit points

D.

Requiring two-factor authentication at entrance and exit points

Buy Now
Questions 456

Which of the following physical controls provides the GREATEST assurance that only authorized individuals can access a data center?

Options:

A.

The data center is patrolled by a security guard.

B.

Access to the data center is monitored by video cameras.

C.

ID badges must be displayed before access is granted

D.

Access to the data center is controlled by a mantrap.

Buy Now
Questions 457

When planning an audit, it is acceptable for an IS auditor to rely on a third-party provider’s external audit report on service level management when the

Options:

A.

scope and methodology meet audit requirements

B.

service provider is independently certified and accredited

C.

report confirms that service levels were not violated

D.

report was released within the last 12 months

Buy Now
Exam Code: CISA
Exam Name: Certified Information Systems Auditor
Last Update: Apr 16, 2026
Questions: 1524

PDF + Testing Engine

$74.7  $249

Testing Engine

$67.5  $225
buy now CISA testing engine

PDF (Q&A)

$59.7  $199
buy now CISA pdf
dumpsmate guaranteed to pass

24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 16 Apr 2026