Certified Information Systems Auditor Questions and Answers
During audit planning, the IS audit manager is considering whether to budget for audits of entities regarded by the business as having low risk. Which of the following is the BEST course of action in this situation?
An IS audit manager is reviewing workpapers for a recently completed audit of the corporate disaster recovery test. Which of the following should the IS audit manager specifically review to substantiate the conclusions?
When reviewing past results of a recurring annual audit, an IS auditor notes that findings may not have been reported and independence may not have been maintained. Which of the following is the auditor's BEST course of action?
Which of the following is the BEST compensating control against segregation of duties conflicts in new code development?
In a high-volume, real-time system, the MOST effective technique by which to continuously monitor and analyze transaction processing is:
During the walk-through procedures for an upcoming audit, an IS auditor notes that the key application in scope is part of a Software as a Service (SaaS)
agreement. What should the auditor do NEXT?
Which of the following is a PRIMARY responsibility of a quality assurance (QA) team?
An organization's security team created a simulated production environment with multiple vulnerable applications. What would be the PRIMARY purpose of creating such an environment?
A global organization's policy states that all workstations must be scanned for malware each day. Which of the following would provide an IS auditor with the BEST evidence of continuous compliance with this policy?
Which of the following is an IS auditor's BEST recommendation to mitigate the risk of eavesdropping
associated with an application programming interface (API) integration implementation?
An organization's security team created a simulated production environment with multiple vulnerable applications. What would be the PRIMARY purpose of creating such an environment?
Which of the following is MOST helpful to an IS auditor reviewing the alignment of planned IT budget with the organization's goals and strategic objectives?
An organization is concerned about duplicate vendor payments on a complex system with a high volume of transactions. Which of the following would be MOST helpful to an IS auditor to determine whether duplicate vendor payments exist?
In an organization's feasibility study to acquire hardware to support a new web server, omission of which of the following would be of MOST concern?
Which of the following should be the FIRST step when developing a data loss prevention (DLP) solution for a large organization?
Which of the following provides the GREATEST assurance that a middleware application compiling data from multiple sales transaction databases for forecasting is operating effectively?
Which of the following should an IS auditor be MOST concerned with when a system uses RFID?
A small IT department has embraced DevOps, which allows members of this group to deploy code to production and maintain some development access to automate releases. Which of the following is the MOST effective control?
Which of the following should be done FIRST when planning to conduct internal and external penetration testing for a client?
During planning for a cloud service audit, audit management becomes aware that the assigned IS auditor is unfamiliar with the technologies in use and their associated risks to the business. To ensure audit quality, which of the following actions should audit management consider FIRST?
In an environment where data virtualization is used, which of the following provides the BEST disaster recovery solution?
Which of the following areas of responsibility would cause the GREATEST segregation of duties conflict if the individual who performs the related tasks also has approval authority?
To reduce operational costs, IT management plans to reduce the number of servers currently used to run business applications. Which of the following is MOST helpful to review when identifying which servers are no longer required?
Which of the following should an IS auditor use when verifying a three-way match has occurred in an enterprise resource planning (ERR) system?
Aligning IT strategy with business strategy PRIMARILY helps an organization to:
A core system fails a week after a scheduled update, causing an outage that impacts service. Which of the following is MOST important for incident management to focus on when addressing the issue?
Which of the following BEST demonstrates to senior management and the board that an audit function is compliant with standards and the code of ethics?
An organization has recently become aware of a pervasive chip-level security vulnerability that affects all of its processors. Which of the following is the BEST way to prevent this vulnerability from being exploited?
In the case of a disaster where the data center is no longer available, which of the following tasks should be done FIRST?
Which of the following is the MOST important area of focus for an IS auditor when developing a risk-based audit strategy?
An IS audit review identifies inconsistencies in privacy requirements across third-party service provider contracts. Which of the following is the BEST
recommendation to address this situation?
Which of the following is the MOST important reason for an IS auditor to examine the results of a post-incident review performed after a security incident?
Which of the following is MOST helpful for an IS auditor to review when evaluating an organizations business process that are supported by applications and IT systems?
Which of the following metrics is the BEST indicator of the performance of a web application
Which of the following physical controls provides the GREATEST assurance that only authorized individuals can access a data center?
A transaction processing system interfaces with the general ledger. Data analytics has identified that some transactions are being recorded twice in the general ledger. While management states a system fix has been implemented, what should the IS auditor recommend to validate the interface is working in the future?
Which of the following BEST contributes to the quality of an audit of a business-critical application?
An IS auditor has identified deficiencies within the organization's software development life cycle policies. Which of the following should be done NEXT?
Which of the following BEST describes the role of a document owner when implementing a data classification policy in an organization?
An organization plans to replace its nightly batch processing backup to magnetic tape with real-time replication to a second data center. Which of the following is the GREATEST risk associated with this change?
An IS auditor discovers that validation controls in a web application have been moved from the server side into the browser to boost performance. This would MOST likely increase the risk of a successful attack by:
When developing customer-facing IT applications, in which stage of the system development life cycle (SDLC) is it MOST beneficial to consider data privacy principles?
An IS auditor has been tasked with auditing the inventory control process for a large organization that processes millions of data transactions. Which of the following is the BEST testing strategy to adopt?
Which of the following would be an auditor's GREATEST concern when reviewing data inputs from spreadsheets into the core finance system?
Which of the following is the BEST indication of effective governance over IT infrastructure?
If a source code is not recompiled when program changes are implemented, which of the following is a compensating control to ensure synchronization of source and object?
Which type of control is being implemented when a biometric access device is installed at the entrance to a facility?
An IS auditor is reviewing an organization's business intelligence infrastructure. The BEST recommendation to help the organization achieve a reasonable level of data quality would be to:
Which of the following controls is MOST important for ensuring the integrity of system interfaces?
An IS auditor reviewing a job scheduling tool notices performance and reliability problems. Which of the following is MOST likely affecting the tool?
What should an IS auditor evaluate FIRST when reviewing an organization's response to new privacy legislation?
When reviewing an IT strategic plan, the GREATEST concern would be that
Which of the following is MOST critical to the success of an information security program?
Which of the following findings would be of GREATEST concern to an IS auditor assessing an organization's patch management process?
Which of the following is an example of a preventive control for physical access?
During a project audit, an IS auditor notes that project reporting does not accurately reflect current progress. Which of the following is the GREATEST resulting impact?
An organization has assigned two new IS auditors to audit a new system implementation. One of the auditors has an IT-related degree, and one has a business degree. Which of the following is MOST important to meet the IS audit standard for proficiency?
An IS auditor is providing input to an RFP to acquire a financial application system. Which of the following is MOST important for the auditor to recommend?
An organization that operates an e-commerce website wants to provide continuous service to its customers and is planning to invest in a hot site due to service criticality. Which of the following is the MOST important consideration when making this decision?
An IS auditor finds that periodic reviews of read-only users for a reporting system are not being performed. Which of the following should be the IS auditor's NEXT course of action?
An organization's IT department and internal IS audit function all report to the chief information officer (CIO). Which of the following is the GREATEST concern associated with this reporting structure?
Which of the following is MOST critical to the success of an information security program?
Which of the following is the MOST effective accuracy control for entry of a valid numeric part number?
During a review of system access, an IS auditor notes that an employee who has recently changed roles within the organization still has previous access rights. The auditor's NEXT step should be to:
Which of the following statements appearing in an organization's acceptable use policy BEST demonstrates alignment with data classification standards related to the protection of information assets?
An IS audit reveals an IT application is experiencing poor performance including data inconsistency and integrity issues. What is the MOST likely cause?
During the review of a system disruption incident, an IS auditor notes that IT support staff were put in a position to make decisions beyond their level of authority.
Which of the following is the BEST recommendation to help prevent this situation in the future?
Which of the following provides the BEST evidence of the validity and integrity of logs in an organization's security information and event management (SIEM) system?
Following a security breach in which a hacker exploited a well-known vulnerability in the domain controller, an IS audit has been asked to conduct a control assessment. the auditor's BEST course of action would be to determine if:
During a follow-up audit, it was found that a complex security vulnerability of low risk was not resolved within the agreed-upon timeframe. IT has stated that the system with the identified vulnerability is being replaced and is expected to be fully functional in two months Which of the following is the BEST course of action?
Which of the following should an IS auditor review FIRST when planning a customer data privacy audit?
Which of the following business continuity activities prioritizes the recovery of critical functions?
Which of the following is MOST important to consider when scheduling follow-up audits?
To develop meaningful recommendations 'or findings, which of the following is MOST important 'or an IS auditor to determine and understand?
An IS auditor is reviewing security controls related to collaboration tools for a business unit responsible for intellectual property and patents. Which of the following observations should be of MOST concern to the auditor?
Which of the following security risks can be reduced by a property configured network firewall?
During the implementation of a new system, an IS auditor must assess whether certain automated calculations comply with the regulatory requirements Which of the following is the BEST way to obtain this assurance?
An information systems security officer's PRIMARY responsibility for business process applications is to:
Which of the following activities would allow an IS auditor to maintain independence while facilitating a control sell-assessment (CSA)?
An IS auditor learns the organization has experienced several server failures in its distributed environment. Which of the following is the BEST recommendation to limit the potential impact of server failures in the future?
After the merger of two organizations, which of the following is the MOST important task for an IS auditor to perform?
During an audit of a financial application, it was determined that many terminated users' accounts were not disabled. Which of the following should be the IS auditor's NEXT step?
IT disaster recovery time objectives (RTOs) should be based on the:
An IS auditor is reviewing an organization's primary router access control list. Which of the following should result in a finding?
Which of the following is the GREATEST security risk associated with data migration from a legacy human resources (HR) system to a cloud-based system?
Which of the following documents should specify roles and responsibilities within an IT audit organization?
Which of the following would BEST manage the risk of changes in requirements after the analysis phase of a business application development project?
Which of the following are BEST suited for continuous auditing?
Which of the following findings should be of GREATEST concern for an IS auditor when auditing the effectiveness of a phishing simu-lation test administered for staff members?
Providing security certification for a new system should include which of the following prior to the system's implementation?
Due to limited storage capacity, an organization has decided to reduce the actual retention period for media containing completed low-value transactions. Which of the following is MOST important for the organization to ensure?
When planning an audit to assess application controls of a cloud-based system, it is MOST important tor the IS auditor to understand the.
A manager Identifies active privileged accounts belonging to staff who have left the organization. Which of the following is the threat actor In this scenario?
Which of the following observations would an IS auditor consider the GREATEST risk when conducting an audit of a virtual server farm tor potential software vulnerabilities?
What is the MAIN reason to use incremental backups?
An organization with many desktop PCs is considering moving to a thin client architecture. Which of the following is the MAJOR advantage?
Which of the following is the GREATEST risk associated with storing customer data on a web server?
To enable the alignment of IT staff development plans with IT strategy, which of the following should be done FIRST?
An IS auditor finds that an organization's data loss prevention (DLP) system is configured to use vendor default settings to identify violations. The auditor's MAIN concern should be that:
Which of the following would lead an IS auditor to conclude that the evidence collected during a digital forensic investigation would not be admissible in court?
In an online application which of the following would provide the MOST information about the transaction audit trail?
During an audit of a multinational bank's disposal process, an IS auditor notes several findings. Which of the following should be the auditor's GREATEST concern?
A new regulation in one country of a global organization has recently prohibited cross-border transfer of personal data. An IS auditor has been asked to determine the organization's level of exposure In the affected country. Which of the following would be MOST helpful in making this assessment?
Which of the following controls BEST ensures appropriate segregation of dudes within an accounts payable department?
Which of the following would BEST help lo support an auditor’s conclusion about the effectiveness of an implemented data classification program?
An organization that has suffered a cyber-attack is performing a forensic analysis of the affected users' computers. Which of the following should be of GREATEST concern for the IS auditor reviewing this process?
Which of the following metrics would BEST measure the agility of an organization's IT function?
An IS auditor finds a high-risk vulnerability in a public-facing web server used to process online customer payments. The IS auditor should FIRST
An organization is considering allowing users to connect personal devices to the corporate network. Which of the following should be done FIRST?
Capacity management enables organizations to:
An organization plans to receive an automated data feed into its enterprise data warehouse from a third-party service provider. Which of the following would be the BEST way to prevent accepting bad data?
Which of the following concerns is BEST addressed by securing production source libraries?
Which of the following is the MOST appropriate and effective fire suppression method for an unstaffed computer room?
An IS auditor notes that IT and the business have different opinions on the availability of their application servers. Which of the following should the IS auditor review FIRST in order to understand the problem?
Which of the following will MOST likely compromise the control provided By a digital signature created using RSA encryption?
Which of the following weaknesses would have the GREATEST impact on the effective operation of a perimeter firewall?
Which of the following findings should be of GREATEST concern to an IS auditor performing a review of IT operations?
Which of the following should be an IS auditor's GREATEST concern when an international organization intends to roll out a global data privacy policy?
An IS auditor has been asked to audit the proposed acquisition of new computer hardware. The auditor’s PRIMARY concern Is that:
Which of the following would be of MOST concern for an IS auditor evaluating the design of an organization's incident management processes?
Which of the following provides IS audit professionals with the BEST source of direction for performing audit functions?
The IS auditor has recommended that management test a new system before using it in production mode. The BEST approach for management in developing a test plan is to use processing parameters that are:
A now regulation requires organizations to report significant security incidents to the regulator within 24 hours of identification. Which of the following is the IS auditor’s BEST recommendation to facilitate compliance with the regulation?
Which of the following is the BEST indicator of the effectiveness of signature-based intrusion detection systems (lDS)?
Upon completion of audit work, an IS auditor should:
Which of the following would be an appropriate rote of internal audit in helping to establish an organization's privacy program?
An organization recently implemented a cloud document storage solution and removed the ability for end users to save data to their local workstation hard drives. Which of the following findings should be the IS auditor's GREATEST concern?
Which of the following must be in place before an IS auditor initiates audit follow-up activities?
Due to system limitations, segregation of duties (SoD) cannot be enforced in an accounts payable system. Which of the following is the IS auditor's BEST recommendation for a compensating control?
Which of the following is MOST important for an IS auditor to do during an exit meeting with an auditee?
The performance, risks, and capabilities of an IT infrastructure are BEST measured using a:
Which of the following is the BEST source of information tor an IS auditor to use when determining whether an organization's information security policy is adequate?
An IS auditor is analyzing a sample of accesses recorded on the system log of an application. The auditor intends to launch an intensive investigation if one exception is found Which sampling method would be appropriate?
An IS auditor is reviewing the release management process for an in-house software development solution. In which environment Is the software version MOST likely to be the same as production?
Which of the following is the PRIMARY reason to follow a configuration management process to maintain application?
An organization has recently implemented a Voice-over IP (VoIP) communication system. Which ot the following should be the IS auditor's PRIMARY concern?
An organization is concerned about duplicate vendor payments on a complex system with a high volume of transactions. Which of the following would be MOST helpful to an IS auditor to determine whether duplicate vendor payments exist?
Which of the following is the BEST way to prevent social engineering incidents?
Which of the following should be the PRIMARY objective of conducting an audit follow-up of management action plans?
Which of the following is the GREATEST benefit of adopting an Agile audit methodology?
An organization wants to classify database tables according to its data classification scheme From an IS auditor's perspective the tables should be classified based on the:
An IS auditor is reviewing processes for importing market price data from external data providers. Which of the following findings should the auditor consider MOST critical?
Which of the following should be of MOST concern to an IS auditor reviewing an organization’s business impact analysis (BIA)?
An IS auditor finds that irregularities have occurred and that auditee management has chosen to ignore them. If reporting to external authorities is required which of the following is the BEST action for the IS auditor to take?
A new regulation has been enacted that mandates specific information security practices for the protection of customer data. Which of the following is MOST useful for an IS auditor to review when auditing against the regulation?
Which of the following should an IS auditor do FIRST when auditing a robotics process automation (RPA) implementation?
Which of the following should be an IS auditor's PRIMARY focus when auditing the implementation of a new IT operations performance monitoring system?
Which of the following protocols should be used when transferring data via the internet?
An IS auditor is reviewing an artificial intelligence (Al) and expert system application. The system has produced several critical errors with severe impact. Which of the following should the IS auditor do NEXT to understand the cause of the errors?
Which of the following should be of GREATEST concern to an IS auditor reviewing system interfaces used to transfer publicly available information?
An IS auditor is reviewing desktop software profiles and notes that a user has downloaded and installed several games that are not approved by the company. Which of the following is the MOST significant risk that could result from this situation?
When reviewing hard disk utilization reports, an IS auditor observes that utilization is routinely above 95%. Which of the following should be the GREATEST concern to the IS auditor?
Which of the following is the PRIMARY benefit of benchmarking an organization's software development lifecycle practices against a capability maturity model?
An IS auditor is reviewing a machine learning model that predicts the likelihood that a user will watch a certain movie. Which of the following would be of GREATEST concern to the auditor?
Which of the following should be an IS auditor's PRIMARY consideration when determining which issues to include in an audit report?
Which of the following is the PRIMARY reason for using a digital signature?
Which of the following is a PRIMARY benefit of using risk assessments to determine areas to be included in an audit plan?
Which of the following BEST enables an organization to standardize its IT infrastructure to align with business goals?
Which of the following would be of GREATEST concern to an IS auditor reviewing the feasibility study for a new application system?
When reviewing an organization’s enterprise architecture (EA), which of the following is an IS auditor MOST likely to find within the EA documentation?
Which of the following observations should be of GREATEST concern to an IS auditor reviewing an organization’s enterprise architecture (EA) program?
An organization requires the use of a key card to enter its data center. Recently, a control was implemented that requires biometric authentication for each employee. Which type of control has
been added?
The business case for an information system investment should be available for review until the:
Which of the following is found in an audit charter?
Which of the following BEST addresses the availability of an online store?
In an area susceptible to unexpected increases in electrical power, which of the following would MOST effectively protect the system?
When protecting the confidentiality of information assets, the MOST effective control practice is the:
Which of the following system redundancy configurations BEST improves system resiliency and reduces the possibility of a single cause of failure impacting system dependability?
Which of the following is the GREATEST risk of project dashboards being set without sufficiently defined criteria?
Which of the following is the GREATEST risk associated with security patches being automatically downloaded and applied to production servers?
Which of the following is the BEST approach to validate whether a streaming site can continue to provide service during a period of live streaming with an anticipated high volume of viewers?
During a follow-up engagement, an IS auditor confirms evidence of a problem that was not an issue in the original audit. Which of the following is the auditor's BEST course of action?
Which of the following is MOST helpful for evaluating benefits realized by IT projects?
Which of the following parameters reflects the risk threshold for an organization experiencing a service disruption?
Which of the following should be the GREATEST concern for an IS auditor reviewing recent disaster recovery operations?
Which of the following should be of GREATEST concern to an IS auditor assessing the effectiveness of an organization's information security governance?
When building or upgrading enterprise cryptographic infrastructure, which of the following is the MOST critical requirement for growing business environments?
An organization is enhancing the security of a client-facing web application following a proposal to acquire personal information for a business purpose. Which of the following is MOST important to review before implementing this initiative?
Which of the following is the BEST way to mitigate risk to an organization's network associated with devices permitted under a bring your own device (BYOD) policy?
A configuration management audit identified that predefined automated procedures are used when deploying and configuring application infrastructure in a cloud-based
environment. Which of the following is MOST important for the IS auditor to review?
Which of the following is the MOST important consideration when defining an operational log management strategy?
Which of the following is the MOST appropriate testing approach when auditing a daily data flow between two systems via an automated interface to confirm that it is complete and accurate?
Which of the following control measures is the MOST effective against unauthorized access of confidential information on stolen or lost laptops?
Which of the following is MOST helpful for understanding an organization’s key driver to modernize application platforms?
An organization has decided to reengineer business processes to improve the performance of overall IT service delivery. Which of the following recommendations from the project team should be the GREATEST concern to the IS auditor?
Which of the following is the MOST effective control when granting access to a service provider for a ctoud-6ased application?
An organization offers an e-commerce platform that allows consumer-to-consumer transactions. The platform now uses blockchain technology to ensure the parties are unable to deny the transactions. Which of the following attributes BEST describes the risk element that this technology is addressing?
An IS auditor is reviewing an organization's cloud access security broker (CASB) solution. Which ofthe following is MOST important for the auditor to verify?
Which of the following is the BEST way to ensure email confidentiality in transit?
Which of the following is the MOST important regulatory consideration for an organization determining whether to use its customer data to train AI algorithms?
An IS auditor is reviewing documentation from a change that was applied to an application. Which of the following findings would be the GREATEST concern?
Which of the following technologies is BEST suited to fulfill a business requirement for nonrepudiation of business-to-business transactions with external parties without the need for a mutually trusted entity?
An organization is establishing a steering committee for the implementation of a new enterprise resource planning (ERP) system that uses Agile project management methodology. What is the MOST important criterion for the makeup of this committee?
An organization used robotic process automation (RPA) technology to develop software bots that extract data from various sources for input into a legacy financial application. Which of the following should be of GREATEST concern to an IS auditor when reviewing the software bot job scheduling and production process automation?
The purpose of a checksum on an amount field in an electronic data interchange (EDI) communication of financial transactions is to ensure:
A post-implementation audit has been completed for the deployment of a sophisticated job scheduling tool Which of the following observations would be of GREATEST concern?
Which of the following is an analytical review procedure for a payroll system?
Which of the following findings would be of GREATEST concern to an IS auditor reviewing the security architecture of an organization that has just implemented a Zero Trust solution?
Which type of control has been established when an organization implements a security information and event management (SIEM) system?
When reviewing the disaster recovery strategy, IT management identified an application that requires a short recovery point objective (RPO). Which of the following data restoration strategies would BEST enable the organization to meet this objective?
Which of the following is MOST important for an IS auditor to verify when reviewing the planned use of Benford's law as a data analytics technique to detect fraud in a set of credit card transactions?
An IS auditor reviewing an organization’s IT systems finds that the organization frequently purchases systems that are incompatible with the technologies already in the organization. Which of the following is the MOST likely reason?
Which of the following is the MOST important consideration of any disaster response plan?
Which of the following approaches would present the GREATEST concern for the implementation of a quality assurance (QA) function?
Which of the following would an IS auditor recommend as the MOST effective preventive control to reduce the risk of data leakage?
Which of the following should be the FRST step when developing a data toes prevention (DIP) solution for a large organization?
Which of the following would BEST ensure that a backup copy is available for restoration of mission critical data after a disaster''
What would be an IS auditor's BEST recommendation upon finding that a third-party IT service provider hosts the organization's human resources (HR) system in a foreign country?
Which of the following is MOST critical for the effective implementation of IT governance?
Which of the following would be the MOST useful metric for management to consider when reviewing a project portfolio?
An externally facing system containing sensitive data is configured such that users have either read-only or administrator rights. Most users of the system have administrator access. Which of the following is the GREATEST risk associated with this situation?
Which of the following would be of GREATEST concern when reviewing an organization's security information and event management (SIEM) solution?
Which of the following is the MOST effective way for an organization to help ensure agreed-upon action plans from an IS audit will be implemented?
What is the PRIMARY purpose of documenting audit objectives when preparing for an engagement?
Which of the following is MOST important for an IS auditor to look
for in a project feasibility study?
Which of the following is MOST important to determine during the planning phase of a cloud-based messaging and collaboration platform acquisition?
Which of the following would BEST help to ensure that potential security issues are considered by the development team as part of incremental changes to agile-developed software?
Which of the following BEST describes an audit risk?
Which of the following controls BEST ensures appropriate segregation of duties within an accounts payable department?
Which of the following application input controls would MOST likely detect data input errors in the customer account number field during the processing of an accounts receivable transaction?
An IS auditor discovers that an IT organization serving several business units assigns equal priority to all initiatives, creating a risk of delays in securing project funding Which of the following would be MOST helpful in matching demand for projects and services with available resources in a way that supports business objectives?
Which of the following should be performed FIRST before key performance indicators (KPIs) can be implemented?
Which of the following security measures will reduce the risk of propagation when a cyberattack occurs?
Which of the following presents the GREATEST challenge to the alignment of business and IT?
Which of the following is MOST appropriate to prevent unauthorized retrieval of confidential information stored in a business application system?
Which of the following provides the BEST providence that outsourced provider services are being properly managed?
Which of the following is the GREATEST risk of using a reciprocal site for disaster recovery?
An IS auditor finds that the process for removing access for terminated employees is not documented What is the MOST significant risk from this observation?
A credit card company has decided to outsource the printing of customer statements It Is MOST important for the company to verify whether:
Which of the following is the BEST control lo mitigate attacks that redirect Internet traffic to an unauthorized website?
During an exit meeting, an IS auditor highlights that backup cycles
are being missed due to operator error and that these exceptions
are not being managed. Which of the following is the BEST way to
help management understand the associated risk?
What should an IS auditor do FIRST when management responses
to an in-person internal control questionnaire indicate a key internal
control is no longer effective?
An audit has identified that business units have purchased cloud-based applications without IPs support. What is the GREATEST risk associated with this situation?
An IS auditor finds that one employee has unauthorized access to confidential data. The IS auditor's BEST recommendation should be to:
Which of the following should an IS auditor expect to see in a network vulnerability assessment?
Which of the following is the BEST evidence that an organization's IT strategy is aligned lo its business objectives?
Which of the following is the BEST metric to measure the alignment of IT and business strategy?
An IS auditor plans to review all access attempts to a video-monitored and proximity card-controlled communications room. Which of the following would be MOST useful to the auditor?
A system administrator recently informed the IS auditor about the occurrence of several unsuccessful intrusion attempts from outside the organization. Which of the following is MOST effective in detecting such an intrusion?
Which of the following should be the IS auditor's PRIMARY focus, when evaluating an organization's offsite storage facility?
Which of the following is the PRIMARY advantage of using visualization technology for corporate applications?
Which of the following should be of GREATEST concern to an IS auditor reviewing an organization's business continuity plan (BCP)?
An IS auditor assessing the controls within a newly implemented call center would First
An IS auditor finds that application servers had inconsistent security settings leading to potential vulnerabilities. Which of the following is the BEST recommendation by the IS auditor?
A warehouse employee of a retail company has been able to conceal the theft of inventory items by entering adjustments of either damaged or lost stock items lo the inventory system. Which control would have BEST prevented this type of fraud in a retail environment?
An IS auditor notes that the previous year's disaster recovery test was not completed within the scheduled time frame due to insufficient hardware allocated by a third-party vendor. Which of the following provides the BEST evidence that adequate resources are now allocated to successfully recover the systems?
Which of the following features of a library control software package would protect against unauthorized updating of source code?
Which of the following is the BEST way to enforce the principle of least privilege on a server containing data with different security classifications?
Which of the following audit procedures would be MOST conclusive in evaluating the effectiveness of an e-commerce application system's edit routine?
An IS auditor is reviewing the installation of a new server. The IS auditor's PRIMARY objective is to ensure that
An IS auditor follows up on a recent security incident and finds the incident response was not adequate. Which of the following findings should be considered MOST critical?
Which of the following is a challenge in developing a service level agreement (SLA) for network services?
During audit framework. an IS auditor teams that employees are allowed to connect their personal devices to company-owned computers. How can the auditor BEST validate that appropriate security controls are in place to prevent data loss?
An organization is disposing of a system containing sensitive data and has deleted all files from the hard disk. An IS auditor should be concerned because:
A post-implementation review was conducted by issuing a survey to users. Which of the following should be of GREATEST concern to an IS auditor?
During a follow-up audit, an IS auditor finds that some critical recommendations have the IS auditor's BEST course of action?
An IS auditor has completed the fieldwork phase of a network security review and is preparing the initial following findings should be ranked as the HIGHEST risk?
Which of the following is MOST important for an IS auditor to determine during the detailed design phase of a system development project?
Which of the following is the MOST important consideration for an IS auditor when assessing the adequacy of an organization's information security policy?
Which of the following should be of GREATEST concern for an IS auditor reviewing an organization's disaster recovery plan (DRP)?
Which of the following IT service management activities is MOST likely to help with identifying the root cause of repeated instances of network latency?
What Is the BEST method to determine if IT resource spending is aligned with planned project spending?
Management receives information indicating a high level of risk associated with potential flooding near the organization's data center within the next few years. As a result, a decision has been made to move data center operations to another facility on higher ground. Which approach has been adopted?
Which of the following would BEST enable an organization to address the security risks associated with a recently implemented bring your own device (BYOD) strategy?
Which of the following is necessary for effective risk management in IT governance?
A review of Internet security disclosed that users have individual user accounts with Internet service providers (ISPs) and use these accounts for downloading business data. The organization wants to ensure that only the corporate network is used. The organization should FIRST:
Which of the following is MOST important when implementing a data classification program?
An organization allows its employees lo use personal mobile devices for work. Which of the following would BEST maintain information security without compromising employee privacy?
Which of the following would BEST detect that a distributed denial of service (DDoS) attack is occurring?
Which of the following would be MOST effective to protect information assets in a data center from theft by a vendor?
The PRIMARY objective of value delivery in reference to IT governance is to:
During an IT general controls audit of a high-risk area where both internal and external audit teams are reviewing the same approach to optimize resources?
Which of the following should be the PRIMARY basis for prioritizing follow-up audits?
Which of the following is the BEST control to mitigate the malware risk associated with an instant messaging (IM) system?
Which of the following would BEST demonstrate that an effective disaster recovery plan (DRP) is in place?
Which of the following is the MOST important prerequisite for the protection of physical information assets in a data center?
Which of the following is the MOST effective control for protecting the confidentiality and integrity of data stored unencrypted on virtual machines?
Which of the following should be done FIRST when planning a penetration test?
An IS audit reveals that an organization is not proactively addressing known vulnerabilities. Which of the following should the IS auditor recommend the organization do FIRST?
Cross-site scripting (XSS) attacks are BEST prevented through:
During the implementation of an upgraded enterprise resource planning (ERP) system, which of the following is the MOST important consideration for a go-live decision?
During a review of a production schedule, an IS auditor observes that a staff member is not complying with mandatory operational procedures. The auditor's NEXT step should be to:
Which of the following is the MOST effective control to mitigate unintentional misuse of authorized access?
Which of the following would MOST likely impair the independence of the IS auditor when performing a post-implementation review of an application system?
From an IS auditor's perspective, which of the following would be the GREATEST risk associated with an incomplete inventory of deployed software in an organization?
An IS auditor notes that several employees are spending an excessive amount of time using social media sites for personal reasons. Which of the following should the auditor recommend be performed FIRST?
An IS auditor finds that a key Internet-facing system is vulnerable to attack and that patches are not available. What should the auditor recommend be done FIRST?
An organizations audit charier PRIMARILY:
Which of the following is the MOST important benefit of involving IS audit when implementing governance of enterprise IT?
What is the BEST control to address SQL injection vulnerabilities?
Which of the following is the PRIMARY advantage of parallel processing for a new system implementation?
Which of the following would be a result of utilizing a top-down maturity model process?
Which of the following is the MOST important consideration for an IS auditor when assessing the adequacy of an organization's information security policy?
An organization's software developers need access to personally identifiable information (Pll) stored in a particular data format. Which of the following is the BEST way to protect this sensitive information while allowing the developers to use it in development and test environments?
Which of the following access rights presents the GREATEST risk when granted to a new member of the system development staff?
An IS auditor suspects an organization's computer may have been used to commit a crime. Which of the following is the auditor's BEST course of action?
Which of the following is the BEST control to prevent the transfer of files to external parties through instant messaging (IM) applications?
Which of the following would BEST facilitate the successful implementation of an IT-related framework?
An IS auditor is evaluating an organization's IT strategy and plans. Which of the following would be of GREATEST concern?
When an intrusion into an organization network is deleted, which of the following should be done FIRST?
When reviewing an organization's information security policies, an IS auditor should verify that the policies have been defined PRIMARILY on the basis of:
Which of the following is MOST important for an IS auditor to examine when reviewing an organization's privacy policy?
During the evaluation of controls over a major application development project, the MOST effective use of an IS auditor's time would be to review and evaluate:
Which of the following is MOST important with regard to an application development acceptance test?
An IS auditor who was instrumental in designing an application is called upon to review the application. The auditor should:
What is BEST for an IS auditor to review when assessing the effectiveness of changes recently made to processes and tools related to an organization's business continuity plan (BCP)?
What should be the PRIMARY basis for selecting which IS audits to perform in the coming year?
An IS auditor has been asked to assess the security of a recently migrated database system that contains personal and financial data for a bank's customers. Which of the following controls is MOST important for the auditor to confirm is in place?
Which of the following should an IS auditor be MOST concerned with during a post-implementation review?
Which of the following strategies BEST optimizes data storage without compromising data retention practices?
One benefit of return on investment (ROI) analysts in IT decision making is that it provides the:
The decision to accept an IT control risk related to data quality should be the responsibility of the:
Which of the following should an IS auditor recommend as a PRIMARY area of focus when an organization decides to outsource technical support for its external customers?
An organization plans to receive an automated data feed into its enterprise data warehouse from a third-party service provider. Which of the following would be the BEST way to prevent accepting bad data?
IS management has recently disabled certain referential integrity controls in the database management system (DBMS) software to provide users increased query performance. Which of the following controls will MOST effectively compensate for the lack of referential integrity?
Which of the following is the BEST justification for deferring remediation testing until the next audit?
In a small IT web development company where developers must have write access to production, the BEST recommendation of an IS auditor would be to:
Which of the following provides the MOST reliable audit evidence on the validity of transactions in a financial application?
Management has requested a post-implementation review of a newly implemented purchasing package to determine to what extent business requirements are being met. Which of the following is MOST likely to be assessed?
Which of the following is the GREATEST concern associated with a high number of IT policy exceptions approved by management?
Which of the following will be the MOST effective method to verify that a service vendor keeps control levels as required by the client?
Which of the following is MOST important to ensure when planning a black box penetration test?
An incorrect version of the source code was amended by a development team. This MOST likely indicates a weakness in:
A new regulation requires organizations to report significant security incidents to the regulator within 24 hours of identification. Which of the following is the IS auditor's BEST recommendation to facilitate compliance with the regulation?
Which of the following is the BEST detective control for a job scheduling process involving data transmission?
During the discussion of a draft audit report. IT management provided suitable evidence fiat a process has been implemented for a control that had been concluded by the IS auditor as Ineffective. Which of the following is the auditor's BEST action?
Which of the following fire suppression systems needs to be combined with an automatic switch to shut down the electricity supply in the event of activation?
During a follow-up audit, an IS auditor learns that some key management personnel have been replaced since the original audit, and current management has decided not to implement some previously accepted recommendations. What is the auditor's BEST course of action?
Which of the following is the PRIMARY reason for an IS auditor to conduct post-implementation reviews?
Coding standards provide which of the following?
When implementing Internet Protocol security (IPsec) architecture, the servers involved in application delivery:
Which of the following demonstrates the use of data analytics for a loan origination process?
When evaluating the design of controls related to network monitoring, which of the following is MOST important for an IS auditor to review?
Which of the following is MOST useful for determining whether the goals of IT are aligned with the organization's goals?
Which of the following is the BEST data integrity check?
An organization has outsourced its data processing function to a service provider. Which of the following would BEST determine whether the service provider continues to meet the organization s objectives?
Which audit approach is MOST helpful in optimizing the use of IS audit resources?
An organization conducted an exercise to test the security awareness level of users by sending an email offering a cash reward 10 those who click on a link embedded in the body of the email. Which of the following metrics BEST indicates the effectiveness of awareness training?
Which of the following tests would provide the BEST assurance that a health care organization is handling patient data appropriately?
During an incident management audit, an IS auditor finds that several similar incidents were logged during the audit period. Which of the following is the auditor's MOST important course of action?
Which of the following is MOST important to define within a disaster recovery plan (DRP)?
The PRIMARY benefit of automating application testing is to:
What would be an IS auditor's BEST course of action when an auditee is unable to close all audit recommendations by the time of the follow-up audit?
Which of the following should be considered when examining fire suppression systems as part of a data center environmental controls review?
An IS auditor is analyzing a sample of accounts payable transactions for a specific vendor and identifies one transaction with a value five times as high as the average transaction. Which of the following should the auditor do NEXT?
Which of the following provides the MOST useful information to an IS auditor when selecting projects for inclusion in an IT audit plan?
Which of the following should be an IS auditor's GREATEST concern when a data owner assigns an incorrect classification level to data?
Which of the following methods will BEST reduce the risk associated with the transition to a new system using technologies that are not compatible with the old system?
Which of the following should be an IS auditor's GREATEST concern when reviewing an organization's security controls for policy compliance?
Which of the following is the MOST effective method of destroying sensitive data stored on electronic media?
During a review, an IS auditor discovers that corporate users are able to access cloud-based applications and data any Internet-connected web browser. Which Of the following
is the auditor’s BEST recommendation to prevent unauthorized access?
The FIRST step in auditing a data communication system is to determine:
Which of the following is the BEST way to address potential data privacy concerns associated with inadvertent disclosure of machine identifier information contained within security logs?
An IS auditor observes that a business-critical application does not currently have any level of fault tolerance. Which of the following is the GREATEST concern with this situation?
During a follow-up audit, an IS auditor finds that senior management has implemented a different remediation action plan than what was previously agreed upon. Which of the following is the auditor's BEST course of action?
Which of the following should an organization do to anticipate the effects of a disaster?
An organization has replaced all of the storage devices at its primary data center with new higher-capacity units The replaced devices have been installed at the disaster recovery site to replace older units An IS auditor s PRIMARY concern would be whether
The use of access control lists (ACLs) is the MOST effective method to mitigate security risk for routers because they: (Identify Correct answer and related explanation/references from CISA Certification - Information Systems Auditor official Manual or book)
Which of the following provides the MOST useful information regarding an organization's risk appetite and tolerance?
An IT governance body wants to determine whether IT service delivery is based on consistently effective processes. Which of the following is the BEST approach?
Which of the following should be of GREATEST concern to an IS auditor when auditing an organization's IT strategy development process?
An organization is concerned with meeting new regulations for protecting data confidentiality and asks an IS auditor to evaluate their procedures for transporting data. Which of the
following would BEST support the organization's objectives?
When planning an audit, it is acceptable for an IS auditor to rely on a third-party provider’s external audit report on service level management when the
An IS auditor identifies that a legacy application to be decommissioned in three months cannot meet the security requirements established by the current policy. What is the BEST way (or the auditor to address this issue?
A CFO has requested an audit of IT capacity management due to a series of finance system slowdowns during month-end reporting. What would be MOST important to consider before including this audit in the program?
Which of the following is the BEST recommendation to include in an organization's bring your own device (BYOD)
policy to help prevent data leakage?
A programmer has made unauthorized changes lo key fields in a payroll system report. Which of the following control weaknesses would have contributed MOST to this problem?
A database administrator (DBA) should be prevented from having end user responsibilities:
Which of the following can only be provided by asymmetric encryption?
A firewall between internal network segments improves security and reduces risk by:
During a database management evaluation an IS auditor discovers that some accounts with database administrator (DBA) privileges have been assigned a default password with an unlimited number of failed login attempts Which of the following is the auditor's BEST course of action?
Demonstrated support from which of the following roles in an organization has the MOST influence over information security governance?
What is the MOST effective way to detect installation of unauthorized software packages by employees?
What is the PRIMARY benefit of using one-time passwords?
The use of which of the following is an inherent risk in the application container infrastructure?
A characteristic of a digital signature is that it
In the development of a new financial application, the IS auditor's FIRST involvement should be in the:
Recovery facilities providing a redundant combination of Internet connections to the local communications loop is an example of which type of telecommunications continuity?
Which of the following is the BEST way to verify the effectiveness of a data restoration process?
Audit frameworks cart assist the IS audit function by:
An IS department is evaluated monthly on its cost-revenue ratio user satisfaction rate, and computer downtime This is BEST zed as an application of.
Which of the following is an IS auditor's BEST recommendation to protect an organization from attacks when its file server needs to be accessible to external users?
In an IT organization where many responsibilities are shared which of the following is the BEST control for detecting unauthorized data changes?
Which of the following should be the FIRST consideration when deciding whether data should be moved to a cloud provider for storage?
Which of the following is me GREATE ST impact as a result of the ongoing deterioration of a detective control?
Which of the following provides the BEST audit evidence that a firewall is configured in compliance with the organization's security policy?
Which of the following should an IS auditor recommend be done FIRST when an organization is made aware of a new regulation that is likely to impact IT security requirements?
Which of the following is MOST important to determine when conducting an audit Of an organization's data privacy practices?
Which of the following is the GREATEST risk if two users have concurrent access to the same database record?
Which of the following would be MOST impacted if an IS auditor were to assist with the implementation of recommended control enhancements?
Which of the following is MOST effective for controlling visitor access to a data center?
An IS auditor learns that an in-house system development life cycle (SDLC) project has not met user specifications. The auditor should FIRST examine requirements from which of the following phases?
When auditing an organization's software acquisition process the BEST way for an IS auditor to understand the software benefits to the organization would be to review the
Which of the following should be the FIRST step m managing the impact of a recently discovered zero-day attack?
Controls related to authorized modifications to production programs are BEST tested by:
Users are complaining that a newly released enterprise resource planning (ERP) system is functioning too slowly. Which of the following tests during the quality assurance (QA) phase would have identified this concern?
During a project assessment, an IS auditor finds that business owners have been removed from the project initiation phase. Which of the following should be the auditor's GREATEST concern with this situation?
A data center's physical access log system captures each visitor's identification document numbers along with the visitor's photo. Which of the following sampling methods would be MOST useful to an IS auditor conducting compliance testing for the effectiveness of the system?
When reviewing a project to replace multiple manual data entry systems with an artificial intelligence (Al) system, the IS auditor should be MOST concerned with the impact Al will have on
When assessing whether an organization's IT performance measures are comparable to other organizations in the same industry, which of the following would be MOST helpful to review?
The PRIMARY purpose of requiring source code escrow in a contractual agreement is to:
Which of following is MOST important to determine when conducting a post-implementation review?
Email required for business purposes is being stored on employees' personal devices.
Which of the following is an IS auditor's BEST recommendation?
Which of the following is the PRIMARY reason for an IS audit manager to review the work performed by a senior IS auditor prior to presentation of a report?
During a routine internal software licensing review, an IS auditor discovers instances where employees shared license keys to critical pieces of business software. Which of the following would be the auditor's BEST course of action?