0% found this document useful (0 votes)
1K views29 pages

ISACA CISA v2022-10-07 q117

This document contains 24 questions from the Certified Information Systems Auditor (CISA) exam from ISACA. It provides the question text and asks the user to select the best answer. The questions cover topics like data quality, risk assessment, controls testing, security policies, and vendor management. The document also includes an advertisement for CISA exam preparation materials.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1K views29 pages

ISACA CISA v2022-10-07 q117

This document contains 24 questions from the Certified Information Systems Auditor (CISA) exam from ISACA. It provides the question text and asks the user to select the best answer. The questions cover topics like data quality, risk assessment, controls testing, security policies, and vendor management. The document also includes an advertisement for CISA exam preparation materials.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

[Link].v2022-10-07.

q117

Exam Code: CISA


Exam Name: Certified Information Systems Auditor
Certification Provider: ISACA
Free Question Number: 117
Version: v2022-10-07
# of views: 122
# of Questions views: 1514
[Link]

NEW QUESTION: 1
An organization plans to receive an automated data feed into its enterprise data warehouse from
a third-party service provider. Which of the following would be the BEST way to prevent accepting
bad data?
A. Implement business rules to reject invalid data.
B. Purchase data cleansing tools from a reputable vendor.
C. Obtain error codes indicating failed data feeds.
D. Appoint data quality champions across the organization.
Answer: (SHOW ANSWER)

NEW QUESTION: 2
Which of the following documents would be MOST useful in detecting a weakness in segregation
of duties?
A. Process flowchart
B. System flowchart
C. Data flow diagram
D. Entity-relationship diagram
Answer: (SHOW ANSWER)

NEW QUESTION: 3
During a review of a production schedule, an IS auditor observes that a staff member is not
complying with mandatory operational procedures. The auditor's NEXT step should be to:
A. include the noncompliance in the audit report.
B. note the noncompliance in the audit working papers.
C. determine why the procedures were not followed.
D. issue an audit memorandum identifying the noncompliance.
Answer: (SHOW ANSWER)
NEW QUESTION: 4
Which of the following components of a risk assessment is MOST helpful to management in
determining the level of risk mitigation to apply?
A. Risk classification
B. Control self-assessment (CSA)
C. Impact assessment
D. Risk identification
Answer: (SHOW ANSWER)

NEW QUESTION: 5
In response to an audit finding regarding a payroll application, management implemented a new
automated control. Which of the following would be MOST helpful to the IS auditor when
evaluating the effectiveness of the new control?
A. A review of tabletop exercise results
B. Approved test scripts and results prior to implementation
C. Written procedures defining processes and controls
D. Approved project scope document
Answer: (SHOW ANSWER)

NEW QUESTION: 6
In data warehouse (DW) management, what is the BEST way to prevent data quality issues
caused by changes from a source system?
A. Restrict access to changes in the extract/transfer/load (ETL) process between the two systems
B. Configure data quality alerts to check variances between the data warehouse and the source
system
C. Require approval for changes in the extract/Transfer/load (ETL) process between the two
systems
D. Include the data warehouse in the impact analysis (or any changes m the source system
Answer: (SHOW ANSWER)

NEW QUESTION: 7
A manager identifies active privileged accounts belonging to staff who have left the organization.
Which of the following is the threat actor in this scenario?
A. Terminated staff
B. Deleted log data
C. Unauthorized access
D. Hacktivists
Answer: C (LEAVE A REPLY)

NEW QUESTION: 8
In a 24/7 processing environment, a database contains several privileged application accounts
with passwords set to never expire. Which of the following recommendations would BEST
address the risk with minimal disruption to the business?
A. Modify applications to no longer require direct access to the database.
B. Modify the access management policy to make allowances for application accounts.
C. Schedule downtime to implement password changes.
D. Introduce database access monitoring into the environment
Answer: (SHOW ANSWER)

NEW QUESTION: 9
Which of the following BEST protects an organization's proprietary code during a joint-
development activity involving a third party?
A. Privacy agreement
B. Nondisclosure agreement (NDA)
C. Statement of work (SOW)
D. Service level agreement (SLA)
Answer: (SHOW ANSWER)

NEW QUESTION: 10

A. Administrative security can be provided for the client.


B. Desktop application software will never have to be upgraded.
C. System administration can be better managed
D. The security of the desktop PC is enhanced.
Answer: (SHOW ANSWER)

NEW QUESTION: 11
An IS auditor notes that IT and the business have different opinions on the availability of their
application servers. Which of the following should the IS auditor review FIRST in order to
understand the problem?
A. The exact definition of the service levels and their measurement
B. The alerting and measurement process on the application servers
C. The regular performance-reporting documentation
D. The actual availability of the servers as part of a substantive test
Answer: A (LEAVE A REPLY)

NEW QUESTION: 12
During a follow-up audit, an IS auditor finds that some critical recommendations have the IS
auditor's BEST course of action?
A. Evaluate senior management's acceptance of the risk.
B. Require the auditee to address the recommendations in full.
C. Adjust the annual risk assessment accordingly.
D. Update the audit program based on management's acceptance of risk.
Answer: (SHOW ANSWER)

NEW QUESTION: 13
An IS auditor finds the log management system is overwhelmed with false positive alerts. The
auditor's BEST recommendation would be to:
A. fine tune the intrusion detection system (IDS).
B. recruit more monitoring personnel.
C. establish criteria for reviewing alerts.
D. reduce the firewall rules.
Answer: (SHOW ANSWER)

NEW QUESTION: 14
An IS auditor concludes that an organization has a quality security policy. Which of the following
is MOST important to determine next? The policy must be:
A. based on industry standards.
B. developed by process owners.
C. well understand by all employees.
D. updated frequently.
Answer: (SHOW ANSWER)

NEW QUESTION: 15
An organization that has suffered a cyber attack is performing a forensic analysis of the affected
users' computers. Which of the following should be of GREATEST concern for the IS auditor
reviewing this process?
A. The legal department has not been engaged.
B. The chain of custody has not been documented.
C. An imaging process was used to obtain a copy of the data from each computer.
D. Audit was only involved during extraction of the Information
Answer: (SHOW ANSWER)

NEW QUESTION: 16
An IS auditor wants to determine who has oversight of staff performing a specific task and is
referencing the organization's RACI chart. Which of the following roles within the chart would
provide this information?
A. Informed
B. Consulted
C. Responsible
D. Accountable
Answer: (SHOW ANSWER)

Valid CISA Dumps shared by [Link] for Helping Passing CISA Exam! [Link]
now offer the newest CISA exam dumps, the [Link] CISA exam questions have
been updated and answers have been corrected get the newest [Link] CISA
dumps with Test Engine here: [Link] (500 Q&As
Dumps, 30%OFF Special Discount: freecram)

NEW QUESTION: 17
Which of the following is necessary for effective risk management in IT governance?
A. Risk management strategy is approved by the audit committee.
B. Risk evaluation is embedded in management processes.
C. IT risk management is separate from corporate risk management.
D. Local managers are solely responsible for risk evaluation.
Answer: (SHOW ANSWER)

NEW QUESTION: 18
Management has requested a post-implementation review of a newly implemented purchasing
package to determine to what extent business requirements are being met. Which of the following
is MOST likely to be assessed?
A. Results of line processing
B. Implementation methodology
C. Test results
D. Purchasing guidelines and policies
Answer: (SHOW ANSWER)

NEW QUESTION: 19
During a follow-up audit, an IS auditor learns that some key management personnel have been
replaced since the original audit, and current management has decided not to implement some
previously accepted recommendations. What is the auditor's BEST course of action?
A. Retest the control.
B. Close the audit finding.
C. Notify the chair of the audit committee.
D. Notify the audit manager.
Answer: (SHOW ANSWER)

NEW QUESTION: 20
A. Users are not required to sign updated acceptable use agreements.
B. The business continuity plan (BCP) was not updated.
C. Mobile devices are not encrypted.
D. Users have not been trained on the new system.
Answer: (SHOW ANSWER)

NEW QUESTION: 21
An information systems security officer's PRIMARY responsibility for business process
applications is to:
A. ensure access rules agree with policies
B. authorize secured emergency access
C. create role-based rules for each business process
D. approve the organization's security policy
Answer: C (LEAVE A REPLY)

NEW QUESTION: 22
A new system is being developed by a vendor for a consumer service organization. The vendor
will provide its proprietary software once system development is completed Which of the following
is the MOST important requirement to include In the vendor contract to ensure continuity?
A. Continuous 24/7 support must be available.
B. The vendor must train the organization's staff to manage the new software
C. Source code for the software must be placed in escrow.
D. The vendor must have a documented disaster recovery plan (DRP) in place.
Answer: (SHOW ANSWER)

NEW QUESTION: 23
Which of the following would be an appropriate rote of internal audit in helping to establish an
organization's privacy program?
A. Defining roles within the organization related to privacy
B. Designing controls to protect personal data
C. Analyzing risks posed by new regulations
D. Developing procedures to monitor the use of personal data
Answer: (SHOW ANSWER)

NEW QUESTION: 24
When implementing Internet Protocol security (IPsec) architecture, the servers involved in
application delivery:
A. communicate via Transport Layer Security (TLS),
B. channel access only through the public-facing firewall.
C. channel access through authentication.
D. block authorized users from unauthorized activities.
Answer: (SHOW ANSWER)

NEW QUESTION: 25
An IS auditor is following up on prior period items and finds management did not address an audit
finding. Which of the following should be the IS auditor's NEXT course of action?
A. Recommend alternative solutions to address the repeat finding.
B. Conduct a risk assessment of the repeat finding.
C. Note the exception in a new report as the item was not addressed by management.
D. Interview management to determine why the finding was not addressed.
Answer: (SHOW ANSWER)

NEW QUESTION: 26
An IS auditor is planning an audit of an organization's accounts payable processes. Which of the
following controls is MOST important to assess in the audit?
A. Management review and approval of purchase orders
B. Segregation of duties between receiving invoices and setting authorization limits
C. Segregation of duties between issuing purchase orders and making payments.
D. Management review and approval of authorization tiers
Answer: (SHOW ANSWER)

NEW QUESTION: 27
What is MOST important to verify during an external assessment of network vulnerability?
A. Update of security information event management (SIEM) rules
B. Completeness of network asset inventory
C. Regular review of the network security policy
D. Location of intrusion detection systems (IDS)
Answer: (SHOW ANSWER)

NEW QUESTION: 28
A new regulation in one country of a global organization has recently prohibited cross-border
transfer of personal dat a. An IS auditor has been asked to determine the organization's level of
exposure In the affected country. Which of the following would be MOST helpful in making this
assessment?
A. Identifying data security threats in the affected jurisdiction
B. Developing an inventory of all business entities that exchange personal data with the affected
jurisdiction
C. Identifying business processes associated with personal data exchange with the affected
jurisdiction
D. Reviewing data classification procedures associated with the affected jurisdiction
Answer: (SHOW ANSWER)

NEW QUESTION: 29
During a security audit, an IS auditor is tasked with reviewing log entries obtained from an
enterprise intrusion prevention system (IPS). Which type of risk would be associated with the
potential for the auditor to miss a sequence of logged events that could indicate an error in the
IPS configuration?
A. Sampling risk
B. Detection risk
C. Control risk
D. Inherent risk
Answer: (SHOW ANSWER)

NEW QUESTION: 30

A. IT steering committee minutes


B. Alignment with the IT tactical plan
C. Compliance with industry best practice
D. Business objectives
Answer: (SHOW ANSWER)

NEW QUESTION: 31
The PRIMARY benefit of information asset classification is that it:
A. enables risk management decisions.
B. facilitates budgeting accuracy.
C. helps to align organizational objectives.
D. prevents loss of assets.
Answer: (SHOW ANSWER)

Valid CISA Dumps shared by [Link] for Helping Passing CISA Exam! [Link]
now offer the newest CISA exam dumps, the [Link] CISA exam questions have
been updated and answers have been corrected get the newest [Link] CISA
dumps with Test Engine here: [Link] (500 Q&As
Dumps, 30%OFF Special Discount: freecram)

NEW QUESTION: 32
Which of the following observations would an IS auditor consider the GREATEST risk when
conducting an audit of a virtual server farm tor potential software vulnerabilities?
A. A variety of guest operating systems operate on one virtual server
B. Antivirus software has been implemented on the guest operating system only.
C. Guest operating systems are updated monthly
D. The hypervisor is updated quarterly.
Answer: (SHOW ANSWER)

NEW QUESTION: 33
Which of the following is the BEST indicator of the effectiveness of signature-based intrusion
detection systems (lDS)?
A. An increase in the number of identified false positives
B. An increase in the number of detected Incidents not previously identified
C. An increase in the number of internally reported critical incidents
D. An increase in the number of unfamiliar sources of intruders
Answer: (SHOW ANSWER)

NEW QUESTION: 34
Which of the following is MOST important to ensure that electronic evidence collected during a
forensic investigation will be admissible in future legal proceedings?
A. Documenting evidence handling by personnel throughout the forensic investigation
B. Engaging an independent third party to perform the forensic investigation
C. Restricting evidence access to professionally certified forensic investigators
D. Performing investigative procedures on the original hard drives rather than images of the hard
drives
Answer: (SHOW ANSWER)

NEW QUESTION: 35
Which of the following features of a library control software package would protect against
unauthorized updating of source code?
A. Access controls for source libraries
B. Required approvals at each life cycle step
C. Date and time stamping of source and object code
D. Release-to-release comparison of source code
Answer: (SHOW ANSWER)

NEW QUESTION: 36
A new regulation requires organizations to report significant security incidents to the regulator
within 24 hours of identification. Which of the following is the IS auditor's BEST recommendation
to facilitate compliance with the regulation?
A. Establish key performance indicators (KPIs) for timely identification of security incidents.
B. Enhance the alert functionality of the intrusion detection system (IDS).
C. Engage an external security incident response expert for incident handling.
D. Include the requirement in the incident management response plan.
Answer: (SHOW ANSWER)

NEW QUESTION: 37
Which of the following is MOST important for an IS auditor to examine when reviewing an
organization's privacy policy?
A. Whether there is explicit permission from regulators to collect personal data
B. The organization's legitimate purpose for collecting personal data
C. Whether sharing of personal information with third-party service providers is prohibited
D. The encryption mechanism selected by the organization for protecting personal data
Answer: (SHOW ANSWER)

NEW QUESTION: 38
Which of the following is a social engineering attack method?
A. An employee is induced to reveal confidential IP addresses and passwords by answering
questions over the phone.
B. An unauthorized person attempts to gam access to secure premises by following an
authonzed person through a secure door.
C. An intruder eavesdrops and collects sensitive information flowing through the network and
sells it to third parties.
D. A hacker walks around an office building using scanning tools to search for a wireless network
to gain access.
Answer: (SHOW ANSWER)

NEW QUESTION: 39
Which of the following is MOST important to determine during the planning phase of a cloud-
based messaging and collaboration platform acquisition?
A. Role-based access control policies
B. Types of data that can be uploaded to the platform
C. Processes for on-boarding and off-boarding users to the platform
D. Processes for reviewing administrator activity
Answer: (SHOW ANSWER)

NEW QUESTION: 40

A. Enable device auto-lock function.


B. Require employees to attend security awareness training.
C. Password protect critical data files.
D. Configure to auto-wipe after multiple failed access attempts.
Answer: (SHOW ANSWER)

NEW QUESTION: 41
Which of the following BEST enables the timely identification of risk exposure?
A. External audit review
B. Control self-assessment (CSA)
C. Stress testing
D. Internal audit review
Answer: (SHOW ANSWER)

NEW QUESTION: 42
When planning an audit to assess application controls of a cloud-based system, it is MOST
important tor the IS auditor to understand the.
A. architecture and cloud environment of the system.
B. policies and procedures of the business area being audited.
C. availability reports associated with the cloud-based system.
D. business process supported by the system.
Answer: (SHOW ANSWER)

NEW QUESTION: 43
Which of the following would BEST enable an organization to address the security risks
associated with a recently implemented bring your own device (BYOD) strategy?
A. Mobile device awareness program
B. Mobile device testing program
C. Mobile device upgrade program
D. Mobile device tracking program
Answer: (SHOW ANSWER)

NEW QUESTION: 44
Cross-site scripting (XSS) attacks are BEST prevented through:
A. a three-tier web architecture.
B. use of common industry frameworks.
C. application firewall policy settings.
D. secure coding practices.
Answer: D (LEAVE A REPLY)

NEW QUESTION: 45
An organization has recently acquired and implemented intelligent-agent software for granting
loans to customers. During the post-implementation review, which of the following is the MOST
important procedure for the IS auditor to perform?
A. Review system documentation to ensure completeness.
B. Review input and output control reports to verify the accuracy of the system decisions.
C. Review signed approvals to ensure responsibilities for decisions of the system are well
defined.
D. Review system and error logs to verify transaction accuracy.
Answer: (SHOW ANSWER)

NEW QUESTION: 46
Which of the following is the BEST reason for an organization to use clustering?
A. To facilitate faster backups
B. To decrease system response time
C. To Improve the recovery lime objective (RTO)
D. To improve system resiliency
Answer: (SHOW ANSWER)

Valid CISA Dumps shared by [Link] for Helping Passing CISA Exam! [Link]
now offer the newest CISA exam dumps, the [Link] CISA exam questions have
been updated and answers have been corrected get the newest [Link] CISA
dumps with Test Engine here: [Link] (500 Q&As
Dumps, 30%OFF Special Discount: freecram)

NEW QUESTION: 47
The IS quality assurance (OA) group is responsible for:
A. designing procedures to protect data against accidental disclosure.
B. ensuring that the output received from system processing is complete.
C. ensuring that program changes adhere to established standards.
D. monitoring the execution of computer processing tasks.
Answer: (SHOW ANSWER)

NEW QUESTION: 48
Which of the following will BEST ensure that a proper cutoff has been established to reinstate
transactions and records to their condition just prior to a computer system failure?
A. Using a database management system (DBMS) to dynamically back-out partially processed
transactions
B. Rotating backup copies of transaction files offsite
C. Maintaining system console logs in electronic formal
D. Ensuring bisynchronous capabilities on all transmission lines
Answer: (SHOW ANSWER)
NEW QUESTION: 49
An employee loses a mobile device resulting in loss of sensitive corporate dat a. Which o( the
following would have BEST prevented data leakage?
A. Awareness training for mobile device users
B. Data encryption on the mobile device
C. The triggering of remote data wipe capabilities
D. Complex password policy for mobile devices
Answer: (SHOW ANSWER)

NEW QUESTION: 50

A. documents the audit process and reporting standards.


B. formally records the annual and quarterly audit plans.
C. describes the auditors' authority to conduct audits.
D. defines the auditors' code of conduct.
Answer: (SHOW ANSWER)

NEW QUESTION: 51
Which of the following is the PRIMARY concern when negotiating a contract for a hot site?
A. Availability of the site in the event of multiple disaster declarations
B. Reciprocal agreements with other organizations
C. Complete testing of the recovery plan
D. Coordination with the site staff in the event of multiple disaster declarations
Answer: (SHOW ANSWER)

NEW QUESTION: 52
Following a security breach in which a hacker exploited a well-known vulnerability in the domain
controller, an IS audit has been asked to conduct a control assessment. the auditor's BEST
course of action would be to determine if:
A. The domain controller was classified for high availability.
B. The network traffic was being monitored.
C. the patches were updated.
D. The logs were monitored.
Answer: (SHOW ANSWER)

NEW QUESTION: 53
While executing follow-up activities, an IS auditor is concerned that management has
implemented corrective actions that are different from those originally discussed and agreed with
the audit function. In order to resolve the situation, the IS auditor's BEST course of action would
be to:
A. postpone follow-up activities and escalate the alternative controls to senior audit management.
B. determine whether the alternative controls sufficiently mitigate the risk.
C. schedule a follow-up audit in the next audit cycle.
D. re-prioritize the original issue as high risk and escalate to senior management.
Answer: (SHOW ANSWER)

NEW QUESTION: 54
A warehouse employee of a retail company has been able to conceal the theft of inventory items
by entering adjustments of either damaged or lost stock items lo the inventory system. Which
control would have BEST prevented this type of fraud in a retail environment?
A. Separate authorization for input of transactions
B. Statistical sampling of adjustment transactions
C. Unscheduled audits of lost stock lines
D. An edit check for the validity of the inventory transaction
Answer: (SHOW ANSWER)

NEW QUESTION: 55
Which of the following is the BEST method to prevent wire transfer fraud by bank employees?
A. Independent reconciliation
B. Two-factor authentication control
C. Re-keying of wire dollar amounts
D. System-enforced dual control
Answer: (SHOW ANSWER)

NEW QUESTION: 56
Which of the following should an IS auditor be MOST concerned with during a post-
implementation review?
A. The system was over budget by 15%.
B. The system does not have a maintenance plan.
C. The system deployment was delayed by three weeks.
D. The system contains several minor defects.
Answer: (SHOW ANSWER)

NEW QUESTION: 57
Which of the following is the BEST way to ensure that business continuity plans (BCPs) will work
effectively in the event of a major disaster?
A. Involve staff at all levels in periodic paper walk-through exercises.
B. Prepare detailed plans for each business function.
C. Regularly update business impact assessments.
D. Make senior managers responsible for their plan sections.
Answer: (SHOW ANSWER)
NEW QUESTION: 58
For an organization that has plans to implement web-based trading, it would be MOST important
for an IS auditor to verify the organization's information security plan includes:
A. security requirements for the new application.
B. security training prior to implementation.
C. the firewall configuration for the web server.
D. attributes for system passwords.
Answer: (SHOW ANSWER)

NEW QUESTION: 59
An IS auditor has found that an organization is unable to add new servers on demand in a cost-
efficient manner. Which of the following is the auditor's BEST recommendation?
A. Build a virtual environment.
B. Upgrade hardware to newer technology.
C. Hire temporary contract workers for the IT function.
D. Increase the capacity of existing systems.
Answer: (SHOW ANSWER)

NEW QUESTION: 60

A. Formalized disciplinary action


B. Annual sign-off of acceptable use policy
C. Security awareness training
D. Regular monitoring of user access logs
Answer: (SHOW ANSWER)

NEW QUESTION: 61
An organization conducted an exercise to test the security awareness level of users by sending
an email offering a cash reward 10 those who click on a link embedded in the body of the email.
Which of the following metrics BEST indicates the effectiveness of awareness training?
A. The number of users forwarding the email to their business unit managers
B. The number of users clicking on the link to learn more about the sender of the email
C. The number of users deleting the email without reporting because it is a phishing email
D. The number of users reporting receipt of the email to the information security team
Answer: (SHOW ANSWER)

Valid CISA Dumps shared by [Link] for Helping Passing CISA Exam! [Link]
now offer the newest CISA exam dumps, the [Link] CISA exam questions have
been updated and answers have been corrected get the newest [Link] CISA
dumps with Test Engine here: [Link] (500 Q&As
Dumps, 30%OFF Special Discount: freecram)

NEW QUESTION: 62
Which of the following weaknesses would have the GREATEST impact on the effective operation
of a perimeter firewall?
A. Potential back doors to the firewall software
B. Use of stateful firewalls with default configuration
C. Ad hoc monitoring of firewall activity
D. Misconfiguration of the firewall rules
Answer: (SHOW ANSWER)

NEW QUESTION: 63
Which of the following IT service management activities is MOST likely to help with identifying the
root cause of repeated instances of network latency?
A. Change management
B. Configuration management
C. Problem management
D. incident management
Answer: (SHOW ANSWER)

NEW QUESTION: 64
An organization allows its employees lo use personal mobile devices for work. Which of the
following would BEST maintain information security without compromising employee privacy?
A. Restricting the use of devices for personal purposes during working hours
B. Preventing users from adding applications
C. Installing security software on the devices
D. Partitioning the work environment from personal space on devices
Answer: (SHOW ANSWER)

NEW QUESTION: 65
An IS auditor suspects an organization's computer may have been used to commit a crime.
Which of the following is the auditor's BEST course of action?
A. Contact the incident response team to conduct an investigation.
B. Examine the computer to search for evidence supporting the suspicions.
C. Notify local law enforcement of the potential crime before further investigation.
D. Advise management of the crime after the investigation.
Answer: (SHOW ANSWER)

NEW QUESTION: 66
Which of the following is the MAIN purpose of an information security management system?
A. To reduce the frequency and impact of information security incidents
B. To identify and eliminate the root causes of information security incidents
C. To enhance the impact of reports used to monitor information security incidents
D. To keep information security policies and procedures up-to-date
Answer: (SHOW ANSWER)

NEW QUESTION: 67
The due date of an audit project is approaching, and the audit manager has determined that only
60% of the audit has been completed. Which of the following should the audit manager do
FIRST?
A. Escalate to the audit committee
B. Assign additional resources to supplement the audit
C. Determine where delays have occurred
D. Extend the audit deadline
Answer: (SHOW ANSWER)

NEW QUESTION: 68
Which of the following is MOST important for an effective control self-assessment (CSA)
program?
A. Determining the scope of the assessment
B. Evaluating changes to the risk environment
C. Understanding the business process
D. Performing detailed test procedures
Answer: (SHOW ANSWER)

NEW QUESTION: 69
An organization has outsourced its data processing function to a service provider. Which of the
following would BEST determine whether the service provider continues to meet the organization
s objectives?
A. Periodic audits of controls by an independent auditor
B. Review of performance against service level agreements (SLAs)
C. Assessment of the personnel training processes of the provider
D. Adequacy of the service provider's insurance
Answer: (SHOW ANSWER)

NEW QUESTION: 70

A. Technical co-sourcing must be used to help the new staff.


B. Team member assignments must be based on individual competencies.
C. The standard is met as long as a supervisor reviews the new auditors' work.
D. The standard is met as long as one member has a globally recognized audit certification.
Answer: (SHOW ANSWER)

NEW QUESTION: 71
Which of the following is the PRIMARY reason to follow a configuration management process to
maintain application?
A. To optimize system resources
B. To ensure proper change control
C. To follow system hardening standards
D. To optimize asset management workflows
Answer: (SHOW ANSWER)

NEW QUESTION: 72
Which of the following would MOST likely impair the independence of the IS auditor when
performing a post-implementation review of an application system?
A. The IS auditor designed an embedded audit module exclusively for auditing the application
system.
B. The IS auditor provided consulting advice concerning application system best practices.
C. The IS auditor participated as a member of the application system project team, but did not
have operational responsibilities.
D. The IS auditor implemented a specific control during the development of the application
system.
Answer: (SHOW ANSWER)

NEW QUESTION: 73
An IS auditor notes that several employees are spending an excessive amount of time using
social media sites for personal reasons. Which of the following should the auditor recommend be
performed FIRST?
A. Adjust budget for network usage to include social media usage.
B. Implement a process to actively monitor postings on social networking sites.
C. implement policies addressing acceptable usage of social media during working hours.
D. Use data loss prevention (DLP) tools on endpoints.
Answer: (SHOW ANSWER)

NEW QUESTION: 74
Malicious program code was found in an application and corrected prior to release into
production. After the release, the same issue was reported. Which of the following is the IS
auditor's BEST recommendation?
A. Ensure change management reports are independently reviewed.
B. Ensure the business signs off on end-to-end user acceptance test (UAT) results.
C. Ensure corrected program code is compiled in a dedicated server.
D. Ensure programmers cannot access code after the completion of program edits.
Answer: (SHOW ANSWER)

NEW QUESTION: 75
Capacity management enables organizations to:
A. identify the extent to which components need to be upgraded
B. determine business transaction volumes.
C. forecast technology trends
D. establish the capacity of network communication links
Answer: (SHOW ANSWER)

NEW QUESTION: 76
Which of the following is MOST important to ensure when planning a black box penetration test?
A. The environment and penetration test scope have been determined.
B. The test results will be documented and communicated to management.
C. The management of the client organization is aware of the testing.
D. Diagrams of the organization's network architecture are available.
Answer: (SHOW ANSWER)

Valid CISA Dumps shared by [Link] for Helping Passing CISA Exam! [Link]
now offer the newest CISA exam dumps, the [Link] CISA exam questions have
been updated and answers have been corrected get the newest [Link] CISA
dumps with Test Engine here: [Link] (500 Q&As
Dumps, 30%OFF Special Discount: freecram)

NEW QUESTION: 77
Which of the following security risks can be reduced by a property configured network firewall?
A. SQL injection attacks
B. Phishing attacks
C. Denial of service (DoS) attacks
D. Insider attacks
Answer: (SHOW ANSWER)

NEW QUESTION: 78
Which of the following would provide an IS auditor with the GREATEST assurance that data
disposal controls support business strategic objectives?
A. Media recycling policy
B. Media sanitization policy
C. Media shredding policy
D. Media labeling policy
Answer: (SHOW ANSWER)

NEW QUESTION: 79
An IS auditor finds that the process for removing access for terminated employees is not
documented What is the MOST significant risk from this observation?
A. Human resources (HR) records may not match system access.
B. Access rights may not be removed in a timely manner.
C. Unauthorized access cannot he identified.
D. Procedures may not align with best practices
Answer: (SHOW ANSWER)

NEW QUESTION: 80

A. Capacity management plan


B. Database conversion results
C. Training plans
D. Stress testing results
Answer: (SHOW ANSWER)

NEW QUESTION: 81
In a RAO model, which of the following roles must be assigned to only one individual?
A. Consulted
B. Responsible
C. Informed
D. Accountable
Answer: (SHOW ANSWER)

NEW QUESTION: 82
Which of the following would be of MOST concern for an IS auditor evaluating the design of an
organization's incident management processes?
A. Expected time to resolve incidents is not specified.
B. Metrics are not reported to senior management.
C. Service management standards are not followed.
D. Prioritization criteria are not defined.
Answer: (SHOW ANSWER)

NEW QUESTION: 83
What is the BEST control to address SQL injection vulnerabilities?
A. Unicode translation
B. Secure Sockets Layer (SSL) encryption
C. Digital signatures
D. Input validation
Answer: D (LEAVE A REPLY)

NEW QUESTION: 84
An IS auditor is analyzing a sample of accesses recorded on the system log of an application.
The auditor intends to launch an intensive investigation if one exception is found Which sampling
method would be appropriate?
A. Stratified sampling
B. Judgmental sampling
C. Variable sampling
D. Discovery sampling
Answer: D (LEAVE A REPLY)

NEW QUESTION: 85
An IS auditor is reviewing an industrial control system (ICS) that uses older unsupported
technology in the scope of an upcoming audit. What should the auditor consider the MOST
significant concern?
A. Attack vectors are evolving for industrial control systems.
B. There is a greater risk of system exploitation.
C. Technical specifications are not documented.
D. Disaster recovery plans (DRPs) are not in place.
Answer: (SHOW ANSWER)

NEW QUESTION: 86
During an exit interview, senior management disagrees with some of me facts presented m the
draft audit report and wants them removed from the report. Which of the following would be the
auditor's BEST course of action?
A. Finalize the draft audit report without changes.
B. Revise the assessment based on senior management's objections.
C. Escalate the issue to audit management.
D. Gather evidence to analyze senior management's objections
Answer: (SHOW ANSWER)

NEW QUESTION: 87
Which of the following is an audit reviewer's PRIMARY role with regard to evidence?
A. Ensuring appropriate statistical sampling methods were used
B. Ensuring evidence is labeled to show it was obtained from an approved source
C. Ensuring evidence is sufficient to support audit conclusions
D. Ensuring unauthorized individuals do not tamper with evidence after it has been captured
Answer: (SHOW ANSWER)

NEW QUESTION: 88
An IS auditor is reviewing the release management process for an in-house software
development solution. In which environment Is the software version MOST likely to be the same
as production?
A. Staging
B. Testing
C. Development
D. Integration
Answer: (SHOW ANSWER)

NEW QUESTION: 89
Which of the following should be the MOST important consideration when conducting a review of
IT portfolio management?
A. Frequency of meetings where the business discusses the IT portfolio
B. Assignment of responsibility for each project to an IT team member
C. Adherence to best practice and industry approved methodologies
D. Controls to minimize risk and maximize value for the IT portfolio
Answer: (SHOW ANSWER)

NEW QUESTION: 90

A. The network security group can change network address translation (NAT).
B. Individual permissions are overriding group permissions.
C. There are conflicting permit and deny rules for the IT group.
D. There is only one rule per group with access privileges.
Answer: (SHOW ANSWER)

NEW QUESTION: 91
When auditing the security architecture of an online application, an IS auditor should FIRST
review the:
A. firewall standards.
B. configuration of the firewall
C. firmware version of the firewall
D. location of the firewall within the network
Answer: (SHOW ANSWER)
Valid CISA Dumps shared by [Link] for Helping Passing CISA Exam! [Link]
now offer the newest CISA exam dumps, the [Link] CISA exam questions have
been updated and answers have been corrected get the newest [Link] CISA
dumps with Test Engine here: [Link] (500 Q&As
Dumps, 30%OFF Special Discount: freecram)

NEW QUESTION: 92
Which of the following would BEST help lo support an auditors conclusion about the effectiveness
of an implemented data classification program?
A. Access rights provisioned according to scheme
B. Detailed data classification scheme
C. Business use cases and scenarios
D. Purchase of information management tools
Answer: (SHOW ANSWER)

NEW QUESTION: 93
Which of the following concerns is BEST addressed by securing production source libraries?
A. Production source and object libraries may not be synchronized.
B. Changes are applied to the wrong version of production source libraries.
C. Programs are not approved before production source libraries are updated.
D. Unauthorized changes can be moved into production.
Answer: (SHOW ANSWER)

NEW QUESTION: 94
An IS auditor should ensure that an application's audit trail:
A. Is accessible online
B. logs ail database records.
C. does not impact operational efficiency
D. has adequate security.
Answer: C (LEAVE A REPLY)

NEW QUESTION: 95
Which of the following should be of GREATEST concern to an IS auditor reviewing a network
printer disposal process?
A. Evidence is not available to verify printer hard drives have been sanitized prior to disposal.
B. Disposal policies and procedures are not consistently implemented
C. Business units are allowed to dispose printers directly to
D. Inoperable printers are stored in an unsecured area.
Answer: (SHOW ANSWER)
NEW QUESTION: 96
In a small IT web development company where developers must have write access to production,
the BEST recommendation of an IS auditor would be to:
A. hire another person to perform migration to production.
B. remove production access from the developers.
C. implement continuous monitoring controls.
D. perform a user access review for the development team
Answer: (SHOW ANSWER)

NEW QUESTION: 97
Which of the following is the BEST control to prevent the transfer of files to external parties
through instant messaging (IM) applications?
A. File level encryption
B. Application level firewalls
C. Instant messaging policy
D. File Transfer Protocol (FTP)
Answer: (SHOW ANSWER)

NEW QUESTION: 98
What is the MAIN reason to use incremental backups?
A. To reduce costs associates with backups
B. To increase backup resiliency and redundancy
C. To minimize the backup time and resources
D. To improve key availability metrics
Answer: (SHOW ANSWER)

NEW QUESTION: 99
An organization's software developers need access to personally identifiable information (Pll)
stored in a particular data format. Which of the following is the BEST way to protect this sensitive
information while allowing the developers to use it in development and test environments?
A. Data tokenization
B. Data abstraction
C. Data masking
D. Data encryption
Answer: (SHOW ANSWER)

NEW QUESTION: 100

A. To help prioritize and schedule auditee meetings


B. To identify areas with relatively high probability of material problems
C. To help ensure maximum use of audit resources during the engagement
D. To address the overall risk associated with the activity under review
Answer: (SHOW ANSWER)

NEW QUESTION: 101


During an audit of a financial application, it was determined that many terminated users' accounts
were not disabled. Which of the following should be the IS auditor's NEXT step?
A. Perform a review of terminated users' account activity
B. Perform substantive testing of terminated users' access rights.
C. Conclude that IT general controls ate ineffective.
D. Communicate risks to the application owner.
Answer: A (LEAVE A REPLY)

NEW QUESTION: 102


Which of the following is MOST important to consider when scheduling follow-up audits?
A. The efforts required for independent verification with new auditors
B. The impact if corrective actions are not taken
C. The amount of time the auditee has agreed to spend with auditors
D. Controls and detection risks related to the observations
Answer: (SHOW ANSWER)

NEW QUESTION: 103


Which of the following is MOST important for an IS auditor to do during an exit meeting with an
auditee?
A. Ensure that the facts presented in the report are correct
B. Communicate the recommendations lo senior management
C. Request input in determining corrective action.
D. Specify implementation dates for the recommendations.
Answer: (SHOW ANSWER)

NEW QUESTION: 104


Which of the following findings from an IT governance review should be of GREATEST concern?
A. The IT budget is not monitored
B. IT supports two different operating systems.
C. IT value analysis has not been completed.
D. All IT services are provided by third parties.
Answer: (SHOW ANSWER)

NEW QUESTION: 105


In order to be useful, a key performance indicator (KPI) MUST
A. be measurable in percentages.
B. have a target value.
C. be approved by management.
D. be changed frequently to reflect organizational strategy.
Answer: (SHOW ANSWER)

NEW QUESTION: 106


When an IS audit reveals that a firewall was unable to recognize a number of attack attempts, the
auditor's BEST recommendation is to place an intrusion detection system (IDS) between the
firewall and:
A. the organization's web server.
B. the organization's network.
C. the Internet.
D. the demilitarized zone (DMZ).
Answer: (SHOW ANSWER)

Valid CISA Dumps shared by [Link] for Helping Passing CISA Exam! [Link]
now offer the newest CISA exam dumps, the [Link] CISA exam questions have
been updated and answers have been corrected get the newest [Link] CISA
dumps with Test Engine here: [Link] (500 Q&As
Dumps, 30%OFF Special Discount: freecram)

NEW QUESTION: 107


Which of the following is MOST helpful for measuring benefits realization for a new system?
A. Balanced scorecard review
B. Business impact analysis (BIA)
C. Post-implementation review
D. Function point analysis
Answer: D (LEAVE A REPLY)

NEW QUESTION: 108


Which of the following issues associated with a data center's closed circuit television (CCTV)
surveillance cameras should be of MOST concern to an IS auditor?
A. CCTV recordings are not regularly reviewed.
B. CCTV footage is not recorded 24 x 7.
C. CCTV cameras are not installed in break rooms
D. CCTV records are deleted after one year.
Answer: (SHOW ANSWER)

NEW QUESTION: 109


Due to system limitations, segregation of duties (SoD) cannot be enforced in an accounts payable
system. Which of the following is the IS auditor's BEST recommendation for a compensating
control?
A. Review payment transaction history
B. Require written authorization for all payment transactions
C. Reconcile payment transactions with invoices.
D. Restrict payment authorization to senior staff members.
Answer: (SHOW ANSWER)

NEW QUESTION: 110

A. Audit charier
B. Engagement letter
C. Organizational chart
D. Annual audit plan
Answer: (SHOW ANSWER)

NEW QUESTION: 111


An organization is planning an acquisition and has engaged an IS auditor lo evaluate the IT
governance framework of the target company. Which of the following would be MOST helpful In
determining the effectiveness of the framework?
A. Sell-assessment reports of IT capability and maturity
B. Recent third-party IS audit reports
C. IT performance benchmarking reports with competitors
D. Current and previous internal IS audit reports
Answer: B (LEAVE A REPLY)

NEW QUESTION: 112


During a disaster recovery audit, an IS auditor finds that a business impact analysis (BIA) has not
been performed. The auditor should FIRST
A. evaluate the impact on current disaster recovery capability.
B. perform a business impact analysis (BIA).
C. issue an intermediate report to management.
D. conduct additional compliance testing.
Answer: (SHOW ANSWER)

NEW QUESTION: 113


Which of the following is an executive management concern that could be addressed by the
implementation of a security metrics dashboard?
A. Security incidents vs. industry benchmarks
B. Total number of false positives
C. Effectiveness of the security program
D. Total number of hours budgeted to security
Answer: (SHOW ANSWER)

NEW QUESTION: 114


Which of the following is a challenge in developing a service level agreement (SLA) for network
services?
A. Establishing a well-designed framework for network servirces.
B. Finding performance metrics that can be measured properly
C. Ensuring that network components are not modified by the client
D. Reducing the number of entry points into the network
Answer: (SHOW ANSWER)

NEW QUESTION: 115


Which of the following are BEST suited for continuous auditing?
A. Irregular transactions
B. Low-value transactions
C. Real-lime transactions
D. Manual transactions
Answer: (SHOW ANSWER)

NEW QUESTION: 116


Which of the following activities would allow an IS auditor to maintain independence while
facilitating a control sell-assessment (CSA)?
A. Developing the remediation plan
B. Developing the CSA questionnaire
C. Implementing the remediation plan
D. Partially completing the CSA
Answer: (SHOW ANSWER)

NEW QUESTION: 117


When an intrusion into an organization network is deleted, which of the following should be done
FIRST?
A. Notify senior management.
B. Block all compromised network nodes.
C. Contact law enforcement.
D. Identity nodes that have been compromised.
Answer: (SHOW ANSWER)
Valid CISA Dumps shared by [Link] for Helping Passing CISA Exam! [Link]
now offer the newest CISA exam dumps, the [Link] CISA exam questions have
been updated and answers have been corrected get the newest [Link] CISA
dumps with Test Engine here: [Link] (500 Q&As
Dumps, 30%OFF Special Discount: freecram)

You might also like