Weekend Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

ExamsBrite Dumps

Certified Information Systems Auditor Question and Answers

Certified Information Systems Auditor

Last Update Jun 14, 2025
Total Questions : 1404

We are offering FREE CISA Isaca exam questions. All you do is to just go and sign up. Give your details, prepare CISA free exam questions and then go for complete pool of Certified Information Systems Auditor test questions that will help you more.

CISA pdf

CISA PDF

$69.65  $199
CISA Engine

CISA Testing Engine

$78.75  $225
CISA PDF + Engine

CISA PDF + Testing Engine

$87.15  $249
Questions 1

An IS auditor finds that a key Internet-facing system is vulnerable to attack and that patches are not available. What should the auditor recommend be done FIRST?

Options:

A.  

Implement a new system that can be patched.

B.  

Implement additional firewalls to protect the system.

C.  

Decommission the server.

D.  

Evaluate the associated risk.

Discussion 0
Questions 2

Which of the following is the MOST effective method of destroying sensitive data stored on electronic media?

Options:

A.  

Degaussing

B.  

Random character overwrite

C.  

Physical destruction

D.  

Low-level formatting

Discussion 0
Questions 3

Which of the following provides the MOST useful information regarding an organization's risk appetite and tolerance?

Options:

A.  

Gap analysis

B.  

Audit reports

C.  

Risk profile

D.  

Risk register

Discussion 0
Questions 4

The IS auditor has recommended that management test a new system before using it in production mode. The BEST approach for management in developing a test plan is to use processing parameters that are:

Options:

A.  

randomly selected by a test generator.

B.  

provided by the vendor of the application.

C.  

randomly selected by the user.

D.  

simulated by production entities and customers.

Discussion 0
Questions 5

Which of the following is the MOST important determining factor when establishing appropriate timeframes for follow-up activities related to audit findings?

Options:

A.  

Availability of IS audit resources

B.  

Remediation dates included in management responses

C.  

Peak activity periods for the business

D.  

Complexity of business processes identified in the audit

Discussion 0
Questions 6

The BEST way to determine whether programmers have permission to alter data in the production environment is by reviewing:

Options:

A.  

the access control system's log settings.

B.  

how the latest system changes were implemented.

C.  

the access control system's configuration.

D.  

the access rights that have been granted.

Discussion 0
Questions 7

An organization has assigned two now IS auditors to audit a now system implementation. One of the auditors has an IT-related degree, and one has a business degree. Which ol the following is MOST important to meet the IS audit standard for proficiency?

Options:

A.  

The standard is met as long as one member has a globally recognized audit certification.

B.  

Technical co-sourcing must be used to help the new staff.

C.  

Team member assignments must be based on individual competencies.

D.  

The standard is met as long as a supervisor reviews the new auditors' work.

Discussion 0
Questions 8

What is the PRIMARY purpose of documenting audit objectives when preparing for an engagement?

Options:

A.  

To address the overall risk associated with the activity under review

B.  

To identify areas with relatively high probability of material problems

C.  

To help ensure maximum use of audit resources during the engagement

D.  

To help prioritize and schedule auditee meetings

Discussion 0
Questions 9

Which of the following concerns is BEST addressed by securing production source libraries?

Options:

A.  

Programs are not approved before production source libraries are updated.

B.  

Production source and object libraries may not be synchronized.

C.  

Changes are applied to the wrong version of production source libraries.

D.  

Unauthorized changes can be moved into production.

Discussion 0
Questions 10

Which of the following is the BEST indicator of the effectiveness of an organization's incident response program?

Options:

A.  

Number of successful penetration tests

B.  

Percentage of protected business applications

C.  

Financial impact per security event

D.  

Number of security vulnerability patches

Discussion 0
Questions 11

What is the Most critical finding when reviewing an organization’s information security management?

Options:

A.  

No dedicated security officer

B.  

No official charier for the information security management system

C.  

No periodic assessments to identify threats and vulnerabilities

D.  

No employee awareness training and education program

Discussion 0
Questions 12

In a RAO model, which of the following roles must be assigned to only one individual?

Options:

A.  

Responsible

B.  

Informed

C.  

Consulted

D.  

Accountable

Discussion 0
Questions 13

An IS auditor is reviewing the release management process for an in-house software development solution. In which environment Is the software version MOST likely to be the same as production?

Options:

A.  

Staging

B.  

Testing

C.  

Integration

D.  

Development

Discussion 0
Questions 14

An organization with many desktop PCs is considering moving to a thin client architecture. Which of the following is the MAJOR advantage?

Options:

A.  

The security of the desktop PC is enhanced.

B.  

Administrative security can be provided for the client.

C.  

Desktop application software will never have to be upgraded.

D.  

System administration can be better managed

Discussion 0
Questions 15

After the merger of two organizations, which of the following is the MOST important task for an IS auditor to perform?

Options:

A.  

Verifying that access privileges have been reviewed

B.  

investigating access rights for expiration dates

C.  

Updating the continuity plan for critical resources

D.  

Updating the security policy

Discussion 0
Questions 16

Which of the following is the GREATEST security risk associated with data migration from a legacy human resources (HR) system to a cloud-based system?

Options:

A.  

Data from the source and target system may be intercepted.

B.  

Data from the source and target system may have different data formats.

C.  

Records past their retention period may not be migrated to the new system.

D.  

System performance may be impacted by the migration

Discussion 0
Questions 17

Which of the following is the BEST evidence that an organization's IT strategy is aligned lo its business objectives?

Options:

A.  

The IT strategy is modified in response to organizational change.

B.  

The IT strategy is approved by executive management.

C.  

The IT strategy is based on IT operational best practices.

D.  

The IT strategy has significant impact on the business strategy

Discussion 0
Questions 18

Which of the following is the MOST appropriate and effective fire suppression method for an unstaffed computer room?

Options:

A.  

Water sprinkler

B.  

Fire extinguishers

C.  

Carbon dioxide (CO2)

D.  

Dry pipe

Discussion 0
Questions 19

Which of the following should be of MOST concern to an IS auditor reviewing the public key infrastructure (PKI) for enterprise email?

Options:

A.  

The certificate revocation list has not been updated.

B.  

The PKI policy has not been updated within the last year.

C.  

The private key certificate has not been updated.

D.  

The certificate practice statement has not been published

Discussion 0
Questions 20

Which of the following is MOST helpful for measuring benefits realization for a new system?

Options:

A.  

Function point analysis

B.  

Balanced scorecard review

C.  

Post-implementation review

D.  

Business impact analysis (BIA)

Discussion 0
Questions 21

With regard to resilience, which of the following is the GREATEST risk to an organization that has implemented a new critical system?

Options:

A.  

A business impact analysis (BIA) has not been performed

B.  

Business data is not sanitized in the development environment

C.  

There is no plan for monitoring system downtime

D.  

The process owner has not signed off on user acceptance testing (UAT)

Discussion 0
Questions 22

During an exit interview, senior management disagrees with some of me facts presented m the draft audit report and wants them removed from the report. Which of the following would be the auditor's BEST course of action?

Options:

A.  

Revise the assessment based on senior management's objections.

B.  

Escalate the issue to audit management.

C.  

Finalize the draft audit report without changes.

D.  

Gather evidence to analyze senior management's objections

Discussion 0
Questions 23

Which of the following business continuity activities prioritizes the recovery of critical functions?

Options:

A.  

Business continuity plan (BCP) testing

B.  

Business impact analysis (BIA)

C.  

Disaster recovery plan (DRP) testing

D.  

Risk assessment

Discussion 0
Questions 24

During an IT governance audit, an IS auditor notes that IT policies and procedures are not regularly reviewed and updated. The GREATEST concern to the IS auditor is that policies and procedures might not:

Options:

A.  

reflect current practices.

B.  

include new systems and corresponding process changes.

C.  

incorporate changes to relevant laws.

D.  

be subject to adequate quality assurance (QA).

Discussion 0
Questions 25

Stress testing should ideally be earned out under a:

Options:

A.  

test environment with production workloads.

B.  

production environment with production workloads.

C.  

production environment with test data.

D.  

test environment with test data.

Discussion 0
Questions 26

When determining whether a project in the design phase will meet organizational objectives, what is BEST to compare against the business case?

Options:

A.  

Implementation plan

B.  

Project budget provisions

C.  

Requirements analysis

D.  

Project plan

Discussion 0
Questions 27

In an environment that automatically reports all program changes, which of the following is the MOST efficient way to detect unauthorized changes to production programs?

Options:

A.  

Reviewing the last compile date of production programs

B.  

Manually comparing code in production programs to controlled copies

C.  

Periodically running and reviewing test data against production programs

D.  

Verifying user management approval of modifications

Discussion 0
Questions 28

Which of the following is the MOST effective control to mitigate unintentional misuse of authorized access?

Options:

A.  

Annual sign-off of acceptable use policy

B.  

Regular monitoring of user access logs

C.  

Security awareness training

D.  

Formalized disciplinary action

Discussion 0
Questions 29

During an ongoing audit, management requests a briefing on the findings to date. Which of the following is the IS auditor's BEST course of action?

Options:

A.  

Review working papers with the auditee.

B.  

Request the auditee provide management responses.

C.  

Request management wait until a final report is ready for discussion.

D.  

Present observations for discussion only.

Discussion 0
Questions 30

Spreadsheets are used to calculate project cost estimates. Totals for each cost category are then keyed into the job-costing system. What is the BEST control to ensure that data is accurately entered into the system?

Options:

A.  

Reconciliation of total amounts by project

B.  

Validity checks, preventing entry of character data

C.  

Reasonableness checks for each cost type

D.  

Display the back of the project detail after the entry

Discussion 0
Questions 31

Which of the following should an IS auditor be MOST concerned with during a post-implementation review?

Options:

A.  

The system does not have a maintenance plan.

B.  

The system contains several minor defects.

C.  

The system deployment was delayed by three weeks.

D.  

The system was over budget by 15%.

Discussion 0
Questions 32

Which of the following is the MOST important reason to implement version control for an end-user computing (EUC) application?

Options:

A.  

To ensure that older versions are availability for reference

B.  

To ensure that only the latest approved version of the application is used

C.  

To ensure compatibility different versions of the application

D.  

To ensure that only authorized users can access the application

Discussion 0
Questions 33

What should be the PRIMARY basis for selecting which IS audits to perform in the coming year?

Options:

A.  

Senior management's request

B.  

Prior year's audit findings

C.  

Organizational risk assessment

D.  

Previous audit coverage and scope

Discussion 0
Questions 34

When implementing Internet Protocol security (IPsec) architecture, the servers involved in application delivery:

Options:

A.  

communicate via Transport Layer Security (TLS),

B.  

block authorized users from unauthorized activities.

C.  

channel access only through the public-facing firewall.

D.  

channel access through authentication.

Discussion 0
Questions 35

What is the BEST control to address SQL injection vulnerabilities?

Options:

A.  

Unicode translation

B.  

Secure Sockets Layer (SSL) encryption

C.  

Input validation

D.  

Digital signatures

Discussion 0
Questions 36

Which of the following is the MOST important consideration for an IS auditor when assessing the adequacy of an organization's information security policy?

Options:

A.  

Alignment with the IT tactical plan

B.  

IT steering committee minutes

C.  

Compliance with industry best practice

D.  

Business objectives

Discussion 0
Questions 37

An IS auditor is reviewing an organization's information asset management process. Which of the following would be of GREATEST concern to the auditor?

Options:

A.  

The process does not require specifying the physical locations of assets.

B.  

Process ownership has not been established.

C.  

The process does not include asset review.

D.  

Identification of asset value is not included in the process.

Discussion 0
Questions 38

The PRIMARY advantage of object-oriented technology is enhanced:

Options:

A.  

efficiency due to the re-use of elements of logic.

B.  

management of sequential program execution for data access.

C.  

grouping of objects into methods for data access.

D.  

management of a restricted variety of data types for a data object.

Discussion 0
Questions 39

During the implementation of an upgraded enterprise resource planning (ERP) system, which of the following is the MOST important consideration for a go-live decision?

Options:

A.  

Rollback strategy

B.  

Test cases

C.  

Post-implementation review objectives

D.  

Business case

Discussion 0
Questions 40

Which of the following is the BEST data integrity check?

Options:

A.  

Counting the transactions processed per day

B.  

Performing a sequence check

C.  

Tracing data back to the point of origin

D.  

Preparing and running test data

Discussion 0
Questions 41

Due to limited storage capacity, an organization has decided to reduce the actual retention period for media containing completed low-value transactions. Which of the following is MOST important for the organization to ensure?

Options:

A.  

The policy includes a strong risk-based approach.

B.  

The retention period allows for review during the year-end audit.

C.  

The total transaction amount has no impact on financial reporting.

D.  

The retention period complies with data owner responsibilities.

Discussion 0
Questions 42

Which of the following should be an IS auditor's PRIMARY focus when developing a risk-based IS audit program?

Options:

A.  

Portfolio management

B.  

Business plans

C.  

Business processes

D.  

IT strategic plans

Discussion 0
Questions 43

Which of the following is the BEST way to determine whether a test of a disaster recovery plan (DRP) was successful?

Options:

A.  

Analyze whether predetermined test objectives were met.

B.  

Perform testing at the backup data center.

C.  

Evaluate participation by key personnel.

D.  

Test offsite backup files.

Discussion 0
Questions 44

Which of the following is an executive management concern that could be addressed by the implementation of a security metrics dashboard?

Options:

A.  

Effectiveness of the security program

B.  

Security incidents vs. industry benchmarks

C.  

Total number of hours budgeted to security

D.  

Total number of false positives

Discussion 0
Questions 45

An IS auditor wants to determine who has oversight of staff performing a specific task and is referencing the organization's RACI chart. Which of the following roles within the chart would provide this information?

Options:

A.  

Consulted

B.  

Informed

C.  

Responsible

D.  

Accountable

Discussion 0
Questions 46

Which of the following is the PRIMARY role of the IS auditor m an organization's information classification process?

Options:

A.  

Securing information assets in accordance with the classification assigned

B.  

Validating that assets are protected according to assigned classification

C.  

Ensuring classification levels align with regulatory guidelines

D.  

Defining classification levels for information assets within the organization

Discussion 0
Questions 47

A third-party consultant is managing the replacement of an accounting system. Which of the following should be the IS auditor's GREATEST concern?

Options:

A.  

Data migration is not part of the contracted activities.

B.  

The replacement is occurring near year-end reporting

C.  

The user department will manage access rights.

D.  

Testing was performed by the third-party consultant

Discussion 0
Questions 48

An organization has recently implemented a Voice-over IP (VoIP) communication system. Which ot the following should be the IS auditor's PRIMARY concern?

Options:

A.  

A single point of failure for both voice and data communications

B.  

Inability to use virtual private networks (VPNs) for internal traffic

C.  

Lack of integration of voice and data communications

D.  

Voice quality degradation due to packet toss

Discussion 0
Questions 49

Which of the following is the BEST reason for an organization to use clustering?

Options:

A.  

To decrease system response time

B.  

To Improve the recovery lime objective (RTO)

C.  

To facilitate faster backups

D.  

To improve system resiliency

Discussion 0
Questions 50

An organization has established hiring policies and procedures designed specifically to ensure network administrators are well qualified Which type of control is in place?

Options:

A.  

Detective

B.  

Compensating

C.  

Corrective

D.  

Directive

Discussion 0
Questions 51

Which of the following is the BEST approach for determining the overall IT risk appetite of an organization when business units use different methods formanaging IT risks?

Options:

A.  

Average the business units’ IT risk levels

B.  

Identify the highest-rated IT risk level among the business units

C.  

Prioritize the organization's IT risk scenarios

D.  

Establish a global IT risk scoring criteria

Discussion 0
Questions 52

An organization has outsourced the development of a core application. However, the organization plans to bring the support and future maintenance of the application back in-house. Which of the following findings should be the IS auditor's GREATEST concern?

Options:

A.  

The cost of outsourcing is lower than in-house development.

B.  

The vendor development team is located overseas.

C.  

A training plan for business users has not been developed.

D.  

The data model is not clearly documented.

Discussion 0
Questions 53

Cross-site scripting (XSS) attacks are BEST prevented through:

Options:

A.  

application firewall policy settings.

B.  

a three-tier web architecture.

C.  

secure coding practices.

D.  

use of common industry frameworks.

Discussion 0
Questions 54

A system administrator recently informed the IS auditor about the occurrence of several unsuccessful intrusion attempts from outside the organization. Which of the following is MOST effective in detecting such an intrusion?

Options:

A.  

Periodically reviewing log files

B.  

Configuring the router as a firewall

C.  

Using smart cards with one-time passwords

D.  

Installing biometrics-based authentication

Discussion 0
Questions 55

During an incident management audit, an IS auditor finds that several similar incidents were logged during the audit period. Which of the following is the auditor's MOST important course of action?

Options:

A.  

Document the finding and present it to management.

B.  

Determine if a root cause analysis was conducted.

C.  

Confirm the resolution time of the incidents.

D.  

Validate whether all incidents have been actioned.

Discussion 0
Questions 56

During a new system implementation, an IS auditor has been assigned to review risk management at each milestone. The auditor finds that several risks to project benefits have not been addressed. Who should be accountable for managing these risks?

Options:

A.  

Enterprise risk manager

B.  

Project sponsor

C.  

Information security officer

D.  

Project manager

Discussion 0
Questions 57

An IS auditor found that a company executive is encouraging employee use of social networking sites for business purposes. Which of the following recommendations would BEST help to reduce the risk of data leakage?

Options:

A.  

Requiring policy acknowledgment and nondisclosure agreements (NDAs) signed by employees

B.  

Establishing strong access controls on confidential data

C.  

Providing education and guidelines to employees on use of social networking sites

D.  

Monitoring employees' social networking usage

Discussion 0
Questions 58

Management is concerned about sensitive information being intentionally or unintentionally emailed as attachments outside the organization by employees. What is the MOST important task before implementing any associated email controls?

Options:

A.  

Require all employees to sign nondisclosure agreements (NDAs).

B.  

Develop an acceptable use policy for end-user computing (EUC).

C.  

Develop an information classification scheme.

D.  

Provide notification to employees about possible email monitoring.

Discussion 0
Questions 59

Secure code reviews as part of a continuous deployment program are which type of control?

Options:

A.  

Detective

B.  

Logical

C.  

Preventive

D.  

Corrective

Discussion 0
Questions 60

An IS auditor is examining a front-end subledger and a main ledger. Which of the following would be the GREATEST concern if there are flaws in the mapping of accounts between the two systems?

Options:

A.  

Double-posting of a single journal entry

B.  

Inability to support new business transactions

C.  

Unauthorized alteration of account attributes

D.  

Inaccuracy of financial reporting

Discussion 0
Questions 61

An IS auditor notes the transaction processing times in an order processing system have significantly increased after a major release. Which of the following should the IS auditor review FIRST?

Options:

A.  

Capacity management plan

B.  

Training plans

C.  

Database conversion results

D.  

Stress testing results

Discussion 0
Questions 62

Which of the following is the BEST compensating control when segregation of duties is lacking in a small IS department?

Options:

A.  

Background checks

B.  

User awareness training

C.  

Transaction log review

D.  

Mandatory holidays

Discussion 0
Questions 63

Which of the following BEST ensures the quality and integrity of test procedures used in audit analytics?

Options:

A.  

Developing and communicating test procedure best practices to audit teams

B.  

Developing and implementing an audit data repository

C.  

Decentralizing procedures and Implementing periodic peer review

D.  

Centralizing procedures and implementing change control

Discussion 0
Questions 64

An IS auditor finds the log management system is overwhelmed with false positive alerts. The auditor's BEST recommendation would be to:

Options:

A.  

establish criteria for reviewing alerts.

B.  

recruit more monitoring personnel.

C.  

reduce the firewall rules.

D.  

fine tune the intrusion detection system (IDS).

Discussion 0
Questions 65

An IS auditor is evaluating an organization's IT strategy and plans. Which of the following would be of GREATEST concern?

Options:

A.  

There is not a defined IT security policy.

B.  

The business strategy meeting minutes are not distributed.

C.  

IT is not engaged in business strategic planning.

D.  

There is inadequate documentation of IT strategic planning.

Discussion 0
Questions 66

An IS auditor suspects an organization's computer may have been used to commit a crime. Which of the following is the auditor's BEST course of action?

Options:

A.  

Examine the computer to search for evidence supporting the suspicions.

B.  

Advise management of the crime after the investigation.

C.  

Contact the incident response team to conduct an investigation.

D.  

Notify local law enforcement of the potential crime before further investigation.

Discussion 0
Questions 67

An incorrect version of the source code was amended by a development team. This MOST likely indicates a weakness in:

Options:

A.  

incident management.

B.  

quality assurance (QA).

C.  

change management.

D.  

project management.

Discussion 0
Questions 68

While executing follow-up activities, an IS auditor is concerned that management has implemented corrective actions that are different from those originally discussed and agreed with the audit function. In order to resolve the situation, the IS auditor's BEST course of action would be to:

Options:

A.  

re-prioritize the original issue as high risk and escalate to senior management.

B.  

schedule a follow-up audit in the next audit cycle.

C.  

postpone follow-up activities and escalate the alternative controls to senior audit management.

D.  

determine whether the alternative controls sufficiently mitigate the risk.

Discussion 0
Questions 69

During a follow-up audit, an IS auditor learns that some key management personnel have been replaced since the original audit, and current management has decided not to implement some previously accepted recommendations. What is the auditor's BEST course of action?

Options:

A.  

Notify the chair of the audit committee.

B.  

Notify the audit manager.

C.  

Retest the control.

D.  

Close the audit finding.

Discussion 0
Questions 70

When auditing the security architecture of an online application, an IS auditor should FIRST review the:

Options:

A.  

firewall standards.

B.  

configuration of the firewall

C.  

firmware version of the firewall

D.  

location of the firewall within the network

Discussion 0
Questions 71

An IS auditor discovers an option in a database that allows the administrator to directly modify any table. This option is necessary to overcome bugs in the software, but is rarely used. Changes to tables are automatically logged. The IS auditor's FIRST action should be to:

Options:

A.  

recommend that the option to directly modify the database be removed immediately.

B.  

recommend that the system require two persons to be involved in modifying the database.

C.  

determine whether the log of changes to the tables is backed up.

D.  

determine whether the audit trail is secured and reviewed.

Discussion 0
Questions 72

Which of the following is MOST useful for determining whether the goals of IT are aligned with the organization's goals?

Options:

A.  

Balanced scorecard

B.  

Enterprise dashboard

C.  

Enterprise architecture (EA)

D.  

Key performance indicators (KPIs)

Discussion 0
Questions 73

An IS audit reveals that an organization is not proactively addressing known vulnerabilities. Which of the following should the IS auditor recommend the organization do FIRST?

Options:

A.  

Verify the disaster recovery plan (DRP) has been tested.

B.  

Ensure the intrusion prevention system (IPS) is effective.

C.  

Assess the security risks to the business.

D.  

Confirm the incident response team understands the issue.

Discussion 0
Questions 74

Which of the following is the MOST effective way for an organization to project against data loss?

Options:

A.  

Limit employee internet access.

B.  

Implement data classification procedures.

C.  

Review firewall logs for anomalies.

D.  

Conduct periodic security awareness training.

Discussion 0
Questions 75

When evaluating the design of controls related to network monitoring, which of the following is MOST important for an IS auditor to review?

Options:

A.  

Incident monitoring togs

B.  

The ISP service level agreement

C.  

Reports of network traffic analysis

D.  

Network topology diagrams

Discussion 0
Questions 76

To confirm integrity for a hashed message, the receiver should use:

Options:

A.  

the same hashing algorithm as the sender's to create a binary image of the file.

B.  

a different hashing algorithm from the sender's to create a binary image of the file.

C.  

the same hashing algorithm as the sender's to create a numerical representation of the file.

D.  

a different hashing algorithm from the sender's to create a numerical representation of the file.

Discussion 0
Questions 77

Which of the following application input controls would MOST likely detect data input errors in the customer account number field during the processing of an accounts receivable transaction?

Options:

A.  

Limit check

B.  

Parity check

C.  

Reasonableness check

D.  

Validity check

Discussion 0
Questions 78

Which of the following is the BEST recommendation to prevent fraudulent electronic funds transfers by accounts payable employees?

Options:

A.  

Periodic vendor reviews

B.  

Dual control

C.  

Independent reconciliation

D.  

Re-keying of monetary amounts

E.  

Engage an external security incident response expert for incident handling.

Discussion 0
Questions 79

Which of the following tests would provide the BEST assurance that a health care organization is handling patient data appropriately?

Options:

A.  

Compliance with action plans resulting from recent audits

B.  

Compliance with local laws and regulations

C.  

Compliance with industry standards and best practice

D.  

Compliance with the organization's policies and procedures

Discussion 0
Questions 80

What would be an IS auditor's BEST recommendation upon finding that a third-party IT service provider hosts the organization's human resources (HR) system in a foreign country?

Options:

A.  

Perform background verification checks.

B.  

Review third-party audit reports.

C.  

Implement change management review.

D.  

Conduct a privacy impact analysis.

Discussion 0
Questions 81

Which of the following is the PRIMARY concern when negotiating a contract for a hot site?

Options:

A.  

Availability of the site in the event of multiple disaster declarations

B.  

Coordination with the site staff in the event of multiple disaster declarations

C.  

Reciprocal agreements with other organizations

D.  

Complete testing of the recovery plan

Discussion 0
Questions 82

An organization's security policy mandates that all new employees must receive appropriate security awareness training. Which of the following metrics would BEST assure compliance with this policy?

Options:

A.  

Percentage of new hires that have completed the training.

B.  

Number of new hires who have violated enterprise security policies.

C.  

Number of reported incidents by new hires.

D.  

Percentage of new hires who report incidents

Discussion 0
Questions 83

Which of the following would BEST facilitate the successful implementation of an IT-related framework?

Options:

A.  

Aligning the framework to industry best practices

B.  

Establishing committees to support and oversee framework activities

C.  

Involving appropriate business representation within the framework

D.  

Documenting IT-related policies and procedures

Discussion 0
Questions 84

Which of the following documents would be MOST useful in detecting a weakness in segregation of duties?

Options:

A.  

System flowchart

B.  

Data flow diagram

C.  

Process flowchart

D.  

Entity-relationship diagram

Discussion 0
Questions 85

Which of the following is the BEST control to prevent the transfer of files to external parties through instant messaging (IM) applications?

Options:

A.  

File level encryption

B.  

File Transfer Protocol (FTP)

C.  

Instant messaging policy

D.  

Application-level firewalls

Discussion 0
Questions 86

Which audit approach is MOST helpful in optimizing the use of IS audit resources?

Options:

A.  

Agile auditing

B.  

Continuous auditing

C.  

Outsourced auditing

D.  

Risk-based auditing

Discussion 0
Questions 87

Which of the following would be to MOST concern when determine if information assets are adequately safequately safeguarded during transport and disposal?

Options:

A.  

Lack of appropriate labelling

B.  

Lack of recent awareness training.

C.  

Lack of password protection

D.  

Lack of appropriate data classification

Discussion 0
Questions 88

Which of the following is the BEST way to mitigate the impact of ransomware attacks?

Options:

A.  

Invoking the disaster recovery plan (DRP)

B.  

Backing up data frequently

C.  

Paying the ransom

D.  

Requiring password changes for administrative accounts

Discussion 0
Questions 89

An organization's enterprise architecture (EA) department decides to change a legacy system's components while maintaining its original functionality. Which of the following is MOST important for an IS auditor to understand when reviewing this decision?

Options:

A.  

The current business capabilities delivered by the legacy system

B.  

The proposed network topology to be used by the redesigned system

C.  

The data flows between the components to be used by the redesigned system

D.  

The database entity relationships within the legacy system

Discussion 0
Questions 90

When reviewing an organization's information security policies, an IS auditor should verify that the policies have been defined PRIMARILY on the basis of:

Options:

A.  

a risk management process.

B.  

an information security framework.

C.  

past information security incidents.

D.  

industry best practices.

Discussion 0
Questions 91

An organization allows employees to retain confidential data on personal mobile devices. Which of the following is the BEST recommendation to mitigate the risk of data leakage from lost or stolen devices?

Options:

A.  

Require employees to attend security awareness training.

B.  

Password protect critical data files.

C.  

Configure to auto-wipe after multiple failed access attempts.

D.  

Enable device auto-lock function.

Discussion 0
Questions 92

During a review of a production schedule, an IS auditor observes that a staff member is not complying with mandatory operational procedures. The auditor's NEXT step should be to:

Options:

A.  

note the noncompliance in the audit working papers.

B.  

issue an audit memorandum identifying the noncompliance.

C.  

include the noncompliance in the audit report.

D.  

determine why the procedures were not followed.

Discussion 0
Questions 93

Which of the following is an audit reviewer's PRIMARY role with regard to evidence?

Options:

A.  

Ensuring unauthorized individuals do not tamper with evidence after it has been captured

B.  

Ensuring evidence is sufficient to support audit conclusions

C.  

Ensuring appropriate statistical sampling methods were used

D.  

Ensuring evidence is labeled to show it was obtained from an approved source

Discussion 0
Questions 94

Which of the following will be the MOST effective method to verify that a service vendor keeps control levels as required by the client?

Options:

A.  

Conduct periodic on-site assessments using agreed-upon criteria.

B.  

Periodically review the service level agreement (SLA) with the vendor.

C.  

Conduct an unannounced vulnerability assessment of vendor's IT systems.

D.  

Obtain evidence of the vendor's control self-assessment (CSA).

Discussion 0
Questions 95

When an intrusion into an organization network is deleted, which of the following should be done FIRST?

Options:

A.  

Block all compromised network nodes.

B.  

Contact law enforcement.

C.  

Notify senior management.

D.  

Identity nodes that have been compromised.

Discussion 0
Questions 96

The decision to accept an IT control risk related to data quality should be the responsibility of the:

Options:

A.  

information security team.

B.  

IS audit manager.

C.  

chief information officer (CIO).

D.  

business owner.

Discussion 0
Questions 97

Management receives information indicating a high level of risk associated with potential flooding near the organization's data center within the next few years. As a result, a decision has been made to move data center operations to another facility on higher ground. Which approach has been adopted?

Options:

A.  

Risk avoidance

B.  

Risk transfer

C.  

Risk acceptance

D.  

Risk reduction

Discussion 0
Questions 98

An IS auditor is reviewing the installation of a new server. The IS auditor's PRIMARY objective is to ensure that

Options:

A.  

security parameters are set in accordance with the manufacturer s standards.

B.  

a detailed business case was formally approved prior to the purchase.

C.  

security parameters are set in accordance with the organization's policies.

D.  

the procurement project invited lenders from at least three different suppliers.

Discussion 0
Questions 99

During an audit of a reciprocal disaster recovery agreement between two companies, the IS auditor would be MOST concerned with the:

Options:

A.  

allocation of resources during an emergency.

B.  

frequency of system testing.

C.  

differences in IS policies and procedures.

D.  

maintenance of hardware and software compatibility.

Discussion 0
Questions 100

A system development project is experiencing delays due to ongoing staff shortages. Which of the following strategies would provide the GREATEST assurance of system quality at implementation?

Options:

A.  

Implement overtime pay and bonuses for all development staff.

B.  

Utilize new system development tools to improve productivity.

C.  

Recruit IS staff to expedite system development.

D.  

Deliver only the core functionality on the initial target date.

Discussion 0
Questions 101

Which of the following BEST guards against the risk of attack by hackers?

Options:

A.  

Tunneling

B.  

Encryption

C.  

Message validation

D.  

Firewalls

Discussion 0
Questions 102

Which of the following should be GREATEST concern to an IS auditor reviewing data conversion and migration during the implementation of a new application system?

Options:

A.  

Data conversion was performed using manual processes.

B.  

Backups of the old system and data are not available online.

C.  

Unauthorized data modifications occurred during conversion.

D.  

The change management process was not formally documented

Discussion 0
Questions 103

An IS auditor is planning an audit of an organization's accounts payable processes. Which of the following controls is MOST important to assess in the audit?

Options:

A.  

Segregation of duties between issuing purchase orders and making payments.

B.  

Segregation of duties between receiving invoices and setting authorization limits

C.  

Management review and approval of authorization tiers

D.  

Management review and approval of purchase orders

Discussion 0
Questions 104

Which of the following audit procedures would be MOST conclusive in evaluating the effectiveness of an e-commerce application system's edit routine?

Options:

A.  

Review of program documentation

B.  

Use of test transactions

C.  

Interviews with knowledgeable users

D.  

Review of source code

Discussion 0
Questions 105

Which of the following is the BEST metric to measure the alignment of IT and business strategy?

Options:

A.  

Level of stakeholder satisfaction with the scope of planned IT projects

B.  

Percentage of enterprise risk assessments that include IT-related risk

C.  

Percentage of stat satisfied with their IT-related roles

D.  

Frequency of business process capability maturity assessments

Discussion 0
Questions 106

An IS auditor is reviewing documentation of application systems change control and identifies several patches that were not tested before being put into production. Which of the following is the MOST significant risk from this situation?

Options:

A.  

Loss of application support

B.  

Lack of system integrity

C.  

Outdated system documentation

D.  

Developer access 1o production

Discussion 0
Questions 107

Which of the following BEST helps to ensure data integrity across system interfaces?

Options:

A.  

Environment segregation

B.  

Reconciliation

C.  

System backups

D.  

Access controls

Discussion 0
Questions 108

An IS auditor finds that the process for removing access for terminated employees is not documented What is the MOST significant risk from this observation?

Options:

A.  

Procedures may not align with best practices

B.  

Human resources (HR) records may not match system access.

C.  

Unauthorized access cannot he identified.

D.  

Access rights may not be removed in a timely manner.

Discussion 0
Questions 109

An externally facing system containing sensitive data is configured such that users have either read-only or administrator rights. Most users of the system have administrator access. Which of the following is the GREATEST risk associated with this situation?

Options:

A.  

Users can export application logs.

B.  

Users can view sensitive data.

C.  

Users can make unauthorized changes.

D.  

Users can install open-licensed software.

Discussion 0
Questions 110

An IS auditor reviewing security incident processes realizes incidents are resolved and closed, but root causes are not investigated. Which of the following should be the MAJOR concern with this situation?

Options:

A.  

Abuses by employees have not been reported.

B.  

Lessons learned have not been properly documented

C.  

vulnerabilities have not been properly addressed

D.  

Security incident policies are out of date.

Discussion 0
Questions 111

Which of the following is MOST important for an IS auditor to confirm when reviewing an organization's plans to implement robotic process automation (RPA> to automate routine business tasks?

Options:

A.  

The end-to-end process is understood and documented.

B.  

Roles and responsibilities are defined for the business processes in scope.

C.  

A benchmarking exercise of industry peers who use RPA has been completed.

D.  

A request for proposal (RFP) has been issued to qualified vendors.

Discussion 0
Questions 112

During the planning phase of a data loss prevention (DLP) audit, management expresses a concern about mobile computing. Which of the following should the IS auditor identity as the associated risk?

Options:

A.  

The use of the cloud negatively impacting IT availably

B.  

Increased need for user awareness training

C.  

Increased vulnerability due to anytime, anywhere accessibility

D.  

Lack of governance and oversight for IT infrastructure and applications

Discussion 0
Questions 113

An organization has made a strategic decision to split into separate operating entities to improve profitability. However, the IT infrastructure remains shared between the entities. Which of the following would BEST help to ensure that IS audit still covers key risk areas within the IT environment as part of its annual plan?

Options:

A.  

Increasing the frequency of risk-based IS audits for each business entity

B.  

Developing a risk-based plan considering each entity's business processes

C.  

Conducting an audit of newly introduced IT policies and procedures

D.  

Revising IS audit plans to focus on IT changes introduced after the split

Discussion 0
Questions 114

Which of the following should an IS auditor ensure is classified at the HIGHEST level of sensitivity?

Options:

A.  

Server room access history

B.  

Emergency change records

C.  

IT security incidents

D.  

Penetration test results

Discussion 0
Questions 115

An organization allows its employees lo use personal mobile devices for work. Which of the following would BEST maintain information security without compromising employee privacy?

Options:

A.  

Installing security software on the devices

B.  

Partitioning the work environment from personal space on devices

C.  

Preventing users from adding applications

D.  

Restricting the use of devices for personal purposes during working hours

Discussion 0
Questions 116

Which of the following is the BEST control lo mitigate attacks that redirect Internet traffic to an unauthorized website?

Options:

A.  

Utilize a network-based firewall.

B.  

Conduct regular user security awareness training.

C.  

Perform domain name system (DNS) server security hardening.

D.  

Enforce a strong password policy meeting complexity requirement.

Discussion 0
Questions 117

Which of the following would BEST detect that a distributed denial of service (DDoS) attack is occurring?

Options:

A.  

Customer service complaints

B.  

Automated monitoring of logs

C.  

Server crashes

D.  

Penetration testing

Discussion 0
Questions 118

During an IT general controls audit of a high-risk area where both internal and external audit teams are reviewing the same approach to optimize resources?

Options:

A.  

Leverage the work performed by external audit for the internal audit testing.

B.  

Ensure both the internal and external auditors perform the work simultaneously.

C.  

Request that the external audit team leverage the internal audit work.

D.  

Roll forward the general controls audit to the subsequent audit year.

Discussion 0
Questions 119

Which task should an IS auditor complete FIRST during the preliminary planning phase of a database security review?

Options:

A.  

Perform a business impact analysis (BIA).

B.  

Determine which databases will be in scope.

C.  

Identify the most critical database controls.

D.  

Evaluate the types of databases being used

Discussion 0
Questions 120

Which of the following should an IS auditor expect to see in a network vulnerability assessment?

Options:

A.  

Misconfiguration and missing updates

B.  

Malicious software and spyware

C.  

Zero-day vulnerabilities

D.  

Security design flaws

Discussion 0
Questions 121

The PRIMARY benefit of information asset classification is that it:

Options:

A.  

prevents loss of assets.

B.  

helps to align organizational objectives.

C.  

facilitates budgeting accuracy.

D.  

enables risk management decisions.

Discussion 0
Questions 122

in a controlled application development environment, the MOST important segregation of duties should be between the person who implements changes into the production environment and the:

Options:

A.  

application programmer

B.  

systems programmer

C.  

computer operator

D.  

quality assurance (QA) personnel

Discussion 0
Questions 123

What should an IS auditor do FIRST when management responses

to an in-person internal control questionnaire indicate a key internal

control is no longer effective?

Options:

A.  

Determine the resources required to make the controleffective.

B.  

Validate the overall effectiveness of the internal control.

C.  

Verify the impact of the control no longer being effective.

D.  

Ascertain the existence of other compensating controls.

Discussion 0
Questions 124

An IS auditor has completed the fieldwork phase of a network security review and is preparing the initial following findings should be ranked as the HIGHEST risk?

Options:

A.  

Network penetration tests are not performed

B.  

The network firewall policy has not been approved by the information security officer.

C.  

Network firewall rules have not been documented.

D.  

The network device inventory is incomplete.

Discussion 0
Questions 125

Which of the following would BEST enable an organization to address the security risks associated with a recently implemented bring your own device (BYOD) strategy?

Options:

A.  

Mobile device tracking program

B.  

Mobile device upgrade program

C.  

Mobile device testing program

D.  

Mobile device awareness program

Discussion 0
Questions 126

Which of the following is the BEST way to ensure that business continuity plans (BCPs) will work effectively in the event of a major disaster?

Options:

A.  

Prepare detailed plans for each business function.

B.  

Involve staff at all levels in periodic paper walk-through exercises.

C.  

Regularly update business impact assessments.

D.  

Make senior managers responsible for their plan sections.

Discussion 0
Questions 127

An IS auditor has found that a vendor has gone out of business and the escrow has an older version of the source code. What is the auditor's BEST recommendation for the organization?

Options:

A.  

Analyze a new application that moots the current re

B.  

Perform an analysis to determine the business risk

C.  

Bring the escrow version up to date.

D.  

Develop a maintenance plan to support the application using the existing code

Discussion 0
Questions 128

An IS auditor is reviewing processes for importing market price data from external data providers. Which of the following findings should the auditor consider MOST critical?

Options:

A.  

The quality of the data is not monitored.

B.  

Imported data is not disposed frequently.

C.  

The transfer protocol is not encrypted.

D.  

The transfer protocol does not require authentication.

Discussion 0
Questions 129

During an audit of an organization's risk management practices, an IS auditor finds several documented IT risk acceptances have not been renewed in a timely manner after the assigned expiration date When assessing the seventy of this finding, which mitigating factor would MOST significantly minimize the associated impact?

Options:

A.  

There are documented compensating controls over the business processes.

B.  

The risk acceptances were previously reviewed and approved by appropriate senior management

C.  

The business environment has not significantly changed since the risk acceptances were approved.

D.  

The risk acceptances with issues reflect a small percentage of the total population

Discussion 0
Questions 130

Which of the following is a challenge in developing a service level agreement (SLA) for network services?

Options:

A.  

Establishing a well-designed framework for network servirces.

B.  

Finding performance metrics that can be measured properly

C.  

Ensuring that network components are not modified by the client

D.  

Reducing the number of entry points into the network

Discussion 0
Questions 131

Which of the following activities would allow an IS auditor to maintain independence while facilitating a control sell-assessment (CSA)?

Options:

A.  

Implementing the remediation plan

B.  

Partially completing the CSA

C.  

Developing the remediation plan

D.  

Developing the CSA questionnaire

Discussion 0
Questions 132

An IS auditor learns the organization has experienced several server failures in its distributed environment. Which of the following is the BEST recommendation to limit the potential impact of server failures in the future?

Options:

A.  

Redundant pathways

B.  

Clustering

C.  

Failover power

D.  

Parallel testing

Discussion 0
Questions 133

Which of the following would MOST effectively help to reduce the number of repealed incidents in an organization?

Options:

A.  

Testing incident response plans with a wide range of scenarios

B.  

Prioritizing incidents after impact assessment.

C.  

Linking incidents to problem management activities

D.  

Training incident management teams on current incident trends

Discussion 0
Questions 134

Which of the following should be of GREATEST concern for an IS auditor reviewing an organization's disaster recovery plan (DRP)?

Options:

A.  

The DRP has not been formally approved by senior management.

B.  

The DRP has not been distributed to end users.

C.  

The DRP has not been updated since an IT infrastructure upgrade.

D.  

The DRP contains recovery procedures for critical servers only.

Discussion 0
Questions 135

An IS auditor has discovered that a software system still in regular use is years out of date and no longer supported the auditee has stated that it will take six months until the software is running on the current version. Which of the following is the BEST way to reduce the immediate risk associated with using an unsupported version of the software?

Options:

A.  

Verify all patches have been applied to the software system's outdated version

B.  

Close all unused ports on the outdated software system.

C.  

Segregate the outdated software system from the main network.

D.  

Monitor network traffic attempting to reach the outdated software system.

Discussion 0
Questions 136

An IS auditor discovers that an IT organization serving several business units assigns equal priority to all initiatives, creating a risk of delays in securing project funding Which of the following would be MOST helpful in matching demand for projects and services with available resources in a way that supports business objectives?

Options:

A.  

Project management

B.  

Risk assessment results

C.  

IT governance framework

D.  

Portfolio management

Discussion 0
Questions 137

Which of the following types of environmental equipment will MOST likely be deployed below the floor tiles of a data center?

Options:

A.  

Temperature sensors

B.  

Humidity sensors

C.  

Water sensors

D.  

Air pressure sensors

Discussion 0
Questions 138

Which of the following would BEST determine whether a post-implementation review (PIR) performed by the project management office (PMO) was effective?

Options:

A.  

Lessons learned were implemented.

B.  

Management approved the PIR report.

C.  

The review was performed by an external provider.

D.  

Project outcomes have been realized.

Discussion 0
Questions 139

An organization plans to receive an automated data feed into its enterprise data warehouse from a third-party service provider. Which of the following would be the BEST way to prevent accepting bad data?

Options:

A.  

Obtain error codes indicating failed data feeds.

B.  

Purchase data cleansing tools from a reputable vendor.

C.  

Appoint data quality champions across the organization.

D.  

Implement business rules to reject invalid data.

Discussion 0
Questions 140

Which of the following would MOST effectively ensure the integrity of data transmitted over a network?

Options:

A.  

Message encryption

B.  

Certificate authority (CA)

C.  

Steganography

D.  

Message digest

Discussion 0
Questions 141

Which of the following components of a risk assessment is MOST helpful to management in determining the level of risk mitigation to apply?

Options:

A.  

Risk identification

B.  

Risk classification

C.  

Control self-assessment (CSA)

D.  

Impact assessment

Discussion 0
Questions 142

An organization is disposing of a system containing sensitive data and has deleted all files from the hard disk. An IS auditor should be concerned because:

Options:

A.  

deleted data cannot easily be retrieved.

B.  

deleting the files logically does not overwrite the files' physical data.

C.  

backup copies of files were not deleted as well.

D.  

deleting all files separately is not as efficient as formatting the hard disk.

Discussion 0
Questions 143

Which of the following is the BEST way to mitigate the risk associated with unintentional modifications of complex calculations in end-user computing (EUC)?

Options:

A.  

Have an independent party review the source calculations

B.  

Execute copies of EUC programs out of a secure library

C.  

implement complex password controls

D.  

Verify EUC results through manual calculations

Discussion 0
Questions 144

In response to an audit finding regarding a payroll application, management implemented a new automated control. Which of the following would be MOST helpful to the IS auditor when evaluating the effectiveness of the new control?

Options:

A.  

Approved test scripts and results prior to implementation

B.  

Written procedures defining processes and controls

C.  

Approved project scope document

D.  

A review of tabletop exercise results

Discussion 0
Questions 145

A review of an organization’s IT portfolio revealed several applications that are not in use. The BEST way to prevent this situation from recurring would be to implement.

Options:

A.  

A formal request for proposal (RFP) process

B.  

Business case development procedures

C.  

An information asset acquisition policy

D.  

Asset life cycle management.

Discussion 0
Questions 146

Which of the following BEST protects an organization's proprietary code during a joint-development activity involving a third party?

Options:

A.  

Statement of work (SOW)

B.  

Nondisclosure agreement (NDA)

C.  

Service level agreement (SLA)

D.  

Privacy agreement

Discussion 0
Questions 147

Which of the following would be an appropriate role of internal audit in helping to establish an organization’s privacy program?

Options:

A.  

Analyzing risks posed by new regulations

B.  

Developing procedures to monitor the use of personal data

C.  

Defining roles within the organization related to privacy

D.  

Designing controls to protect personal data

Discussion 0
Questions 148

An audit identified that a computer system is not assigning sequential purchase order numbers to order requests. The IS auditor is conducting an audit follow-up to determine if management has reserved this finding. Which of two following is the MOST reliable follow-up procedure?

Options:

A.  

Review the documentation of recant changes to implement sequential order numbering.

B.  

Inquire with management if the system has been configured and tested to generate sequential order numbers.

C.  

Inspect the system settings and transaction logs to determine if sequential order numbers are generated.

D.  

Examine a sample of system generated purchase orders obtained from management

Discussion 0
Questions 149

Which of the following is MOST important to determine during the planning phase of a cloud-based messaging and collaboration platform acquisition?

Options:

A.  

Role-based access control policies

B.  

Types of data that can be uploaded to the platform

C.  

Processes for on-boarding and off-boarding users to the platform

D.  

Processes for reviewing administrator activity

Discussion 0
Questions 150

An IS auditor notes that the previous year's disaster recovery test was not completed within the scheduled time frame due to insufficient hardware allocated by a third-party vendor. Which of the following provides the BEST evidence that adequate resources are now allocated to successfully recover the systems?

Options:

A.  

Service level agreement (SLA)

B.  

Hardware change management policy

C.  

Vendor memo indicating problem correction

D.  

An up-to-date RACI chart

Discussion 0
Questions 151

An IS auditor has been asked to advise on measures to improve IT governance within the organization. Which at the following is the BEST recommendation?

Options:

A.  

Implement key performance indicators (KPIs)

B.  

Implement annual third-party audits.

C.  

Benchmark organizational performance against industry peers.

D.  

Require executive management to draft IT strategy

Discussion 0
Questions 152

What Is the BEST method to determine if IT resource spending is aligned with planned project spending?

Options:

A.  

Earned value analysis (EVA)

B.  

Return on investment (ROI) analysis

C.  

Gantt chart

D.  

Critical path analysis

Discussion 0
Questions 153

Which of the following is the BEST reason to implement a data retention policy?

Options:

A.  

To limit the liability associated with storing and protecting information

B.  

To document business objectives for processing data within the organization

C.  

To assign responsibility and ownership for data protection outside IT

D.  

To establish a recovery point detective (RPO) for (toaster recovery procedures

Discussion 0
Questions 154

Which of the following would be MOST effective to protect information assets in a data center from theft by a vendor?

Options:

A.  

Monitor and restrict vendor activities

B.  

Issues an access card to the vendor.

C.  

Conceal data devices and information labels

D.  

Restrict use of portable and wireless devices.

Discussion 0
Questions 155

The PRIMARY objective of value delivery in reference to IT governance is to:

Options:

A.  

promote best practices

B.  

increase efficiency.

C.  

optimize investments.

D.  

ensure compliance.

Discussion 0
Questions 156

An IS auditor finds that one employee has unauthorized access to confidential data. The IS auditor's BEST recommendation should be to:

Options:

A.  

reclassify the data to a lower level of confidentiality

B.  

require the business owner to conduct regular access reviews.

C.  

implement a strong password schema for users.

D.  

recommend corrective actions to be taken by the security administrator.

Discussion 0
Questions 157

An IS auditor assessing the controls within a newly implemented call center would First

Options:

A.  

gather information from the customers regarding response times and quality of service.

B.  

review the manual and automated controls in the call center.

C.  

test the technical infrastructure at the call center.

D.  

evaluate the operational risk associated with the call center.

Discussion 0
Questions 158

Which of the following would BEST ensure that a backup copy is available for restoration of mission critical data after a disaster''

Options:

A.  

Use an electronic vault for incremental backups

B.  

Deploy a fully automated backup maintenance system.

C.  

Periodically test backups stored in a remote location

D.  

Use both tape and disk backup systems

Discussion 0
Questions 159

What is the GREATEST concern for an IS auditor reviewing contracts for licensed software that executes a critical business process?

Options:

A.  

The contract does not contain a right-to-audit clause.

B.  

An operational level agreement (OLA) was not negotiated.

C.  

Several vendor deliverables missed the commitment date.

D.  

Software escrow was not negotiated.

Discussion 0
Questions 160

When verifying the accuracy and completeness of migrated data for a new application system replacing a legacy system. It is MOST effective for an IS auditor to review;

Options:

A.  

data analytics findings.

B.  

audit trails

C.  

acceptance lasting results

D.  

rollback plans

Discussion 0
Questions 161

During a security audit, an IS auditor is tasked with reviewing log entries obtained from an enterprise intrusion prevention system (IPS). Which type of risk would be associated with the potential for the auditor to miss a sequence of logged events that could indicate an error in the IPS configuration?

Options:

A.  

Sampling risk

B.  

Detection risk

C.  

Control risk

D.  

Inherent risk

Discussion 0
Questions 162

A credit card company has decided to outsource the printing of customer statements It Is MOST important for the company to verify whether:

Options:

A.  

the provider has alternate service locations.

B.  

the contract includes compensation for deficient service levels.

C.  

the provider's information security controls are aligned with the company's.

D.  

the provider adheres to the company's data retention policies.

Discussion 0
Questions 163

Which of the following is the GREATEST advantage of vulnerability scanning over penetration testing?

Options:

A.  

The testing produces a lower number of false positive results

B.  

Network bandwidth is utilized more efficiently

C.  

Custom-developed applications can be tested more accurately

D.  

The testing process can be automated to cover large groups of assets

Discussion 0
Questions 164

Which of the following is the BEST way to detect unauthorized copies of licensed software on systems?

Options:

A.  

Implement controls to prohibit downloads of unauthorized software.

B.  

Conduct periodic software scanning.

C.  

Perform periodic counting of licenses.

D.  

Require senior management approval when installing licenses.

Discussion 0
Questions 165

Which of the following provides the MOST assurance of the integrity of a firewall log?

Options:

A.  

The log is reviewed on a monthly basis.

B.  

Authorized access is required to view the log.

C.  

The log cannot be modified.

D.  

The log is retained per policy.

Discussion 0
Questions 166

What is the MOST effective way to detect installation of unauthorized software packages by employees?

Options:

A.  

Regular scanning of hard drives

B.  

Communicating the policy to employees

C.  

Logging of activity on the network

D.  

Maintaining current antivirus software

Discussion 0
Questions 167

The PRIMARY purpose of requiring source code escrow in a contractual agreement is to:

Options:

A.  

comply with vendor management policy

B.  

convert source code to new executable code.

C.  

satisfy regulatory requirements.

D.  

ensure the source code is available.

Discussion 0
Questions 168

Which of the following findings should be of GREATEST concern to an IS auditor assessing the risk associated with end-user computing (EUC) in an organization?

Options:

A.  

Insufficient processes to track ownership of each EUC application?

B.  

Insufficient processes to lest for version control

C.  

Lack of awareness training for EUC users

D.  

Lack of defined criteria for EUC applications

Discussion 0
Questions 169

Which of the following information security requirements BE ST enables the tracking of organizational data in a bring your own device (BYOD) environment?

Options:

A.  

Employees must immediately report lost or stolen mobile devices containing organizational data

B.  

Employees must sign acknowledgment of the organization's mobile device acceptable use policy

C.  

Employees must enroll their personal devices in the organization's mobile device management program

Discussion 0
Questions 170

Which of the following should be the FIRST step in the incident response process for a suspected breach?

Options:

A.  

Inform potentially affected customers of the security breach

B.  

Notify business management of the security breach.

C.  

Research the validity of the alerted breach

D.  

Engage a third party to independently evaluate the alerted breach.

Discussion 0
Questions 171

Which of the following would be the MOST useful metric for management to consider when reviewing a project portfolio?

Options:

A.  

Cost of projects divided by total IT cost

B.  

Expected return divided by total project cost

C.  

Net present value (NPV) of the portfolio

D.  

Total cost of each project

Discussion 0
Questions 172

Which of the following BEST enables the effectiveness of an agile project for the rapid development of a new software application?

Options:

A.  

Project segments are established.

B.  

The work is separated into phases.

C.  

The work is separated into sprints.

D.  

Project milestones are created.

Discussion 0
Questions 173

Which of the following should be the FRST step when developing a data toes prevention (DIP) solution for a large organization?

Options:

A.  

Identify approved data workflows across the enterprise.

B.  

Conduct a threat analysis against sensitive data usage.

C.  

Create the DLP pcJc.es and templates

D.  

Conduct a data inventory and classification exercise

Discussion 0
Questions 174

Which of the following should be the IS auditor's PRIMARY focus, when evaluating an organization's offsite storage facility?

Options:

A.  

Shared facilities

B.  

Adequacy of physical and environmental controls

C.  

Results of business continuity plan (BCP) test

D.  

Retention policy and period

Discussion 0
Questions 175

Which of the following is the BEST way to ensure that an application is performing according to its specifications?

Options:

A.  

Unit testing

B.  

Pilot testing

C.  

System testing

D.  

Integration testing

Discussion 0
Questions 176

Due to a recent business divestiture, an organization has limited IT resources to deliver critical projects Reviewing the IT staffing plan against which of the following would BEST guide IT management when estimating resource requirements for future projects?

Options:

A.  

Human resources (HR) sourcing strategy

B.  

Records of actual time spent on projects

C.  

Peer organization staffing benchmarks

D.  

Budgeted forecast for the next financial year

Discussion 0
Questions 177

Which of the following is MOST important for an IS auditor to consider when performing the risk assessment poor to an audit engagement?

Options:

A.  

The design of controls

B.  

Industry standards and best practices

C.  

The results of the previous audit

D.  

The amount of time since the previous audit

Discussion 0
Questions 178

A project team has decided to switch to an agile approach to develop a replacement for an existing business application. Which of the following should an IS auditor do FIRST to ensure the effectiveness of the protect audit?

Options:

A.  

Compare the agile process with previous methodology.

B.  

Identify and assess existing agile process control

C.  

Understand the specific agile methodology that will be followed.

D.  

Interview business process owners to compile a list of business requirements

Discussion 0
Questions 179

A manager Identifies active privileged accounts belonging to staff who have left the organization. Which of the following is the threat actor In this scenario?

Options:

A.  

Terminated staff

B.  

Unauthorized access

C.  

Deleted log data

D.  

Hacktivists

Discussion 0
Questions 180

Which of the following is the BEST audit procedure to determine whether a firewall is configured in compliance with the organization's security policy?

Options:

A.  

Reviewing the parameter settings

B.  

Reviewing the system log

C.  

Interviewing the firewall administrator

D.  

Reviewing the actual procedures

Discussion 0
Questions 181

Which of the following activities provides an IS auditor with the MOST insight regarding potential single person dependencies that might exist within the organization?

Options:

A.  

Reviewing vacation patterns

B.  

Reviewing user activity logs

C.  

Interviewing senior IT management

D.  

Mapping IT processes to roles

Discussion 0
Questions 182

Which of the following is the BEST source of information tor an IS auditor to use when determining whether an organization's information security policy is adequate?

Options:

A.  

Information security program plans

B.  

Penetration test results

C.  

Risk assessment results

D.  

Industry benchmarks

Discussion 0
Questions 183

Which of the following will MOST likely compromise the control provided By a digital signature created using RSA encryption?

Options:

A.  

Reversing the hash function using the digest

B.  

Altering the plaintext message

C.  

Deciphering the receiver's public key

D.  

Obtaining the sender's private key

Discussion 0
Questions 184

While auditing a small organization's data classification processes and procedures, an IS auditor noticed that data is often classified at the incorrect level. What is the MOST effective way for the organization to improve this situation?

Options:

A.  

Use automatic document classification based on content.

B.  

Have IT security staff conduct targeted training for data owners.

C.  

Publish the data classification policy on the corporate web portal.

D.  

Conduct awareness presentations and seminars for information classification policies.

Discussion 0
Questions 185

When auditing the alignment of IT to the business strategy, it is MOST Important for the IS auditor to:

Options:

A.  

compare the organization's strategic plan against industry best practice.

B.  

interview senior managers for their opinion of the IT function.

C.  

ensure an IT steering committee is appointed to monitor new IT projects.

D.  

evaluate deliverables of new IT initiatives against planned business services.

Discussion 0
Questions 186

The GREATEST benefit of using a polo typing approach in software development is that it helps to:

Options:

A.  

minimize scope changes to the system.

B.  

decrease the time allocated for user testing and review.

C.  

conceptualize and clarify requirements.

D.  

Improve efficiency of quality assurance (QA) testing

Discussion 0
Questions 187

Which of the following environments is BEST used for copying data and transformation into a compatible data warehouse format?

Options:

A.  

Testing

B.  

Replication

C.  

Staging

D.  

Development

Discussion 0
Questions 188

In an online application, which of the following would provide the MOST information about the transaction audit trail?

Options:

A.  

System/process flowchart

B.  

File layouts

C.  

Data architecture

D.  

Source code documentation

Discussion 0
Questions 189

An IS auditor should ensure that an application's audit trail:

Options:

A.  

has adequate security.

B.  

logs ail database records.

C.  

Is accessible online

D.  

does not impact operational efficiency

Discussion 0
Questions 190

Which of the following findings from an IT governance review should be of GREATEST concern?

Options:

A.  

The IT budget is not monitored

B.  

All IT services are provided by third parties.

C.  

IT value analysis has not been completed.

D.  

IT supports two different operating systems.

Discussion 0
Questions 191

In which phase of penetration testing would host detection and domain name system (DNS) interrogation be performed?

Options:

A.  

Discovery

B.  

Attacks

C.  

Planning

D.  

Reporting

Discussion 0
Questions 192

Which of the following security risks can be reduced by a property configured network firewall?

Options:

A.  

SQL injection attacks

B.  

Denial of service (DoS) attacks

C.  

Phishing attacks

D.  

Insider attacks

Discussion 0
Questions 193

Providing security certification for a new system should include which of the following prior to the system's implementation?

Options:

A.  

End-user authorization to use the system in production

B.  

External audit sign-off on financial controls

C.  

Testing of the system within the production environment

D.  

An evaluation of the configuration management practices

Discussion 0
Questions 194

Following a security breach in which a hacker exploited a well-known vulnerability in the domain controller, an IS audit has been asked to conduct a control assessment. the auditor's BEST course of action would be to determine if:

Options:

A.  

the patches were updated.

B.  

The logs were monitored.

C.  

The network traffic was being monitored.

D.  

The domain controller was classified for high availability.

Discussion 0
Questions 195

Which of the following BEST enables the timely identification of risk exposure?

Options:

A.  

External audit review

B.  

Internal audit review

C.  

Control self-assessment (CSA)

D.  

Stress testing

Discussion 0
Questions 196

The PRIMARY reason for an IS auditor to use data analytics techniques is to reduce which type of audit risk?

Options:

A.  

Technology risk

B.  

Detection risk

C.  

Control risk

D.  

Inherent risk

Discussion 0
Questions 197

Which of the following provides the BEST providence that outsourced provider services are being properly managed?

Options:

A.  

The service level agreement (SLA) includes penalties for non-performance.

B.  

Adequate action is taken for noncompliance with the service level agreement (SLA).

C.  

The vendor provides historical data to demonstrate its performance.

D.  

Internal performance standards align with corporate strategy.

Discussion 0
Questions 198

Which of the following is MOST important to ensure that electronic evidence collected during a forensic investigation will be admissible in future legal proceedings?

Options:

A.  

Restricting evidence access to professionally certified forensic investigators

B.  

Documenting evidence handling by personnel throughout the forensic investigation

C.  

Performing investigative procedures on the original hard drives rather than images of the hard drives

D.  

Engaging an independent third party to perform the forensic investigation

Discussion 0
Questions 199

Which of the following BEST describes an audit risk?

Options:

A.  

The company is being sued for false accusations.

B.  

The financial report may contain undetected material errors.

C.  

Employees have been misappropriating funds.

D.  

Key employees have not taken vacation for 2 years.

Discussion 0
Questions 200

Which of the following is MOST important for an IS auditor to determine during the detailed design phase of a system development project?

Options:

A.  

Program coding standards have been followed

B.  

Acceptance test criteria have been developed

C.  

Data conversion procedures have been established.

D.  

The design has been approved by senior management.

Discussion 0
Questions 201

An IS auditor reviewing the threat assessment tor a data center would be MOST concerned if:

Options:

A.  

some of the identified throats are unlikely to occur.

B.  

all identified throats relate to external entities.

C.  

the exercise was completed by local management.

D.  

neighboring organizations operations have been included.

Discussion 0
Questions 202

Which of the following should be performed FIRST before key performance indicators (KPIs) can be implemented?

Options:

A.  

Analysis of industry benchmarks

B.  

Identification of organizational goals

C.  

Analysis of quantitative benefits

D.  

Implementation of a balanced scorecard

Discussion 0
Questions 203

An IS auditor Is renewing the deployment of a new automated system Which of the following findings presents the MOST significant risk?

Options:

A.  

The new system has resulted m layoffs of key experienced personnel.

B.  

Users have not been trained on the new system.

C.  

Data from the legacy system is not migrated correctly to the new system.

D.  

The new system is not platform agnostic

Discussion 0
Questions 204

Which of the following indicates that an internal audit organization is structured to support the independence and clarity of the reporting process?

Options:

A.  

Auditors are responsible for performing operational duties or activities.

B.  

The internal audit manager reports functionally to a senior management official.

C.  

The internal audit manager has a reporting line to the audit committee.

D.  

Auditors are responsible for assessing and operating a system of internal controls.

Discussion 0
Questions 205

Which of the following would be MOST impacted if an IS auditor were to assist with the implementation of recommended control enhancements?

Options:

A.  

Independence

B.  

Integrity

C.  

Materiality

D.  

Accountability

Discussion 0
Questions 206

An IS auditor is reviewing the security of a web-based customer relationship management (CRM) system that is directly accessed by customers via the Internet, which of the following should be a concern for the auditor?

Options:

A.  

The system is hosted on an external third-party service provider’s server.

B.  

The system is hosted in a hybrid-cloud platform managed by a service provider.

C.  

The system is hosted within a demilitarized zone (DMZ) of a corporate network.

D.  

The system is hosted within an internal segment of a corporate network.

Discussion 0
Questions 207

An IS auditor is reviewing an organization's business continuity plan (BCP) following a change in organizational structure with significant impact to business processes. Which of the following findings should be the auditor's GREATEST concern?

Options:

A.  

Key business process end users did not participate in the business impact " analysis (BIA)

B.  

Copies of the BCP have not been distributed to new business unit end users sjnce the reorganization

C.  

A test plan for the BCP has not been completed during the last two years

Discussion 0
Questions 208

During a database management evaluation an IS auditor discovers that some accounts with database administrator (DBA) privileges have been assigned a default password with an unlimited number of failed login attempts Which of the following is the auditor's BEST course of action?

Options:

A.  

Identify accounts that have had excessive failed login attempts and request they be disabled

B.  

Request the IT manager to change administrator security parameters and update the finding

C.  

Document the finding and explain the risk of having administrator accounts with inappropriate security settings

Discussion 0
Questions 209

What is the PRIMARY purpose of performing a parallel run of a now system?

Options:

A.  

To train the end users and supporting staff on the new system

B.  

To verify the new system provides required business functionality

C.  

To reduce the need for additional testing

D.  

To validate the new system against its predecessor

Discussion 0
Questions 210

Which of the following is the MOST important outcome of an information security program?

Options:

A.  

Operating system weaknesses are more easily identified.

B.  

Emerging security technologies are better understood and accepted.

C.  

The cost to mitigate information security risk is reduced.

D.  

Organizational awareness of security responsibilities is improved.

Discussion 0
Questions 211

To mitigate the risk of exposing data through application programming interface (API) queries. which of the following design considerations is MOST important?

Options:

A.  

Data retention

B.  

Data minimization

C.  

Data quality

D.  

Data integrity

Discussion 0
Questions 212

Which of the following should be the FIRST step m managing the impact of a recently discovered zero-day attack?

Options:

A.  

Evaluating the likelihood of attack

B.  

Estimating potential damage

C.  

Identifying vulnerable assets

D.  

Assessing the Impact of vulnerabilities

Discussion 0
Questions 213

Afire alarm system has been installed in the computer room The MOST effective location for the fire alarm control panel would be inside the

Options:

A.  

computer room closest to the uninterruptible power supply (UPS) module

B.  

computer room closest to the server computers

C.  

system administrators’ office

D.  

booth used by the building security personnel

Discussion 0
Questions 214

An IS auditor is reviewing a data conversion project Which of the following is the auditor's BEST recommendation prior to go-live?

Options:

A.  

Review test procedures and scenarios

B.  

Conduct a mock conversion test

C.  

Establish a configuration baseline

D.  

Automate the test scripts

Discussion 0
Questions 215

Which of the following is the GREATEST risk if two users have concurrent access to the same database record?

Options:

A.  

Availability integrity

B.  

Data integrity

C.  

Entity integrity

D.  

Referential integrity

Discussion 0
Questions 216

Which of the following is the BEST source of information to determine the required level of data protection on a file server?

Options:

A.  

Data classification policy and procedures

B.  

Access rights of similar file servers

C.  

Previous data breach incident reports

D.  

Acceptable use policy and privacy statements

Discussion 0
Questions 217

Which of the following would provide the BEST evidence of an IT strategy corrections effectiveness?

Options:

A.  

The minutes from the IT strategy committee meetings

B.  

Synchronization of IT activities with corporate objectives

C.  

The IT strategy committee charier

D.  

Business unit satisfaction survey results

Discussion 0
Questions 218

An IS auditor reviewing the throat assessment for a data cantor would be MOST concerned if:

Options:

A.  

some of the identified threats are unlikely to occur.

B.  

all identified threats relate to external entities.

C.  

the exercise was completed by local management.

D.  

neighboring organizations' operations have been included.

Discussion 0
Questions 219

An organization has replaced all of the storage devices at its primary data center with new higher-capacity units The replaced devices have been installed at the disaster recovery site to replace older units An IS auditor s PRIMARY concern would be whether

Options:

A.  

the recovery site devices can handle the storage requirements

B.  

hardware maintenance contract is in place for both old and new storage devices

C.  

the procurement was in accordance with corporate policies and procedures

D.  

the relocation plan has been communicated to all concerned parties

Discussion 0
Questions 220

During a follow-up audit, an IS auditor finds that senior management has implemented a different remediation action plan than what was previously agreed upon. Which of the following is the auditor's BEST course of action?

Options:

A.  

Report the deviation by the control owner in the audit report.

B.  

Evaluate the implemented control to ensure it mitigates the risk to an acceptable level.

C.  

Cancel the follow-up audit and reschedule for the next audit period.

D.  

Request justification from management for not implementing the recommended control.

Discussion 0
Questions 221

Which of the following is MOST effective for controlling visitor access to a data center?

Options:

A.  

Visitors are escorted by an authorized employee

B.  

Pre-approval of entry requests

C.  

Visitors sign in at the front desk upon arrival

D.  

Closed-circuit television (CCTV) is used to monitor the facilities

Discussion 0
Questions 222

Which of the following is the BEST way to verify the effectiveness of a data restoration process?

Options:

A.  

Performing periodic reviews of physical access to backup media

B.  

Performing periodic complete data restorations

C.  

Validating off ne backups using software utilities

D.  

Reviewing and updating data restoration policies annually

Discussion 0
Questions 223

Which of the following methods will BEST reduce the risk associated with the transition to a new system using technologies that are not compatible with the old system?

Options:

A.  

Parallel changeover

B.  

Modular changeover

C.  

Phased operation

D.  

Pilot operation

Discussion 0
Questions 224

An internal audit team is deciding whether to use an audit management application hosted by a third party in a different country.

What should be the MOST important consideration related to the uploading of payroll audit documentation in the hosted

application?

Options:

A.  

Financial regulations affecting the organization

B.  

Data center physical access controls whore the application is hosted

C.  

Privacy regulations affecting the organization

D.  

Per-unit cost charged by the hosting services provider for storage

Discussion 0
Questions 225

Which of the following findings should be of GREATEST concern to an IS auditor reviewing an organization s newly implemented online security awareness program'?

Options:

A.  

Only new employees are required to attend the program

B.  

Metrics have not been established to assess training results

C.  

Employees do not receive immediate notification of results

D.  

The timing for program updates has not been determined

Discussion 0
Questions 226

An organization outsourced its IS functions to meet its responsibility for disaster recovery, the organization should:

Options:

A.  

discontinue maintenance of the disaster recovery plan (DRP>

B.  

coordinate disaster recovery administration with the outsourcing vendor

C.  

delegate evaluation of disaster recovery to a third party

D.  

delegate evaluation of disaster recovery to internal audit

Discussion 0
Questions 227

Which of the following concerns is MOST effectively addressed by implementing an IT framework for alignment between IT and business objectives?

Options:

A.  

Inaccurate business impact analysis (BIA)

B.  

Inadequate IT change management practices

C.  

Lack of a benchmark analysis

D.  

Inadequate IT portfolio management

Discussion 0
Questions 228

After delivering an audit report, the audit manager discovers that evidence was overlooked during the audit This evidence indicates that a procedural control may have failed and could contradict a conclusion of the audit Which of the following risks is MOST affected by this oversight?

Options:

A.  

Inherent

B.  

Operational

C.  

Audit

D.  

Financial

Discussion 0
Questions 229

Which of the following is the MAJOR advantage of automating internal controls?

Options:

A.  

To enable the review of large value transactions

B.  

To efficiently test large volumes of data

C.  

To help identity transactions with no segregation of duties

D.  

To assist in performing analytical reviews

Discussion 0
Questions 230

Which of the following is MOST important during software license audits?

Options:

A.  

Judgmental sampling

B.  

Substantive testing

C.  

Compliance testing

D.  

Stop-or-go sampling

Discussion 0
Questions 231

Which of the following is the MOST effective control to mitigate against the risk of inappropriate activity by employees?

Options:

A.  

User activity monitoring

B.  

Two-factor authentication

C.  

Network segmentation

D.  

Access recertification

Discussion 0
Questions 232

Which of the following is the MOST important factor when an organization is developing information security policies and procedures?

Options:

A.  

Consultation with security staff

B.  

Inclusion of mission and objectives

C.  

Compliance with relevant regulations

D.  

Alignment with an information security framework

Discussion 0
Questions 233

During a routine internal software licensing review, an IS auditor discovers instances where employees shared license keys to critical pieces of business software. Which of the following would be the auditor's BEST course of action?

Options:

A.  

Recommend the utilization of software licensing monitoring tools

B.  

Recommend the purchase of additional software license keys

C.  

Validate user need for shared software licenses

D.  

Verify whether the licensing agreement allows shared use

Discussion 0
Questions 234

An organization has recently moved to an agile model for deploying custom code to its in-house accounting software system. When reviewing the procedures in place for production code deployment, which of the following is the MOST significant security concern to address?

Options:

A.  

Software vulnerability scanning is done on an ad hoc basis.

B.  

Change control does not include testing and approval from quality assurance (QA).

C.  

Production code deployment is not automated.

D.  

Current DevSecOps processes have not been independently verified.

Discussion 0
Questions 235

An organization has engaged a third party to implement an application to perform business-critical calculations. Which of the following is the MOST important process to help ensure the application provides accurate calculations?

Options:

A.  

Key performance indicator (KPI) monitoring

B.  

Change management

C.  

Configuration management

D.  

Quality assurance (QA)

Discussion 0
Questions 236

An online retailer is receiving customer complaints about receiving different items from what they ordered on the organization's website. The root cause has been traced to poor data quality. Despite efforts to clean erroneous data from the system, multiple data quality issues continue to occur. Which of the following recommendations would be the BEST way to reduce the likelihood of future occurrences?

Options:

A.  

Assign responsibility for improving data quality.

B.  

Invest in additional employee training for data entry.

C.  

Outsource data cleansing activities to reliable third parties.

D.  

Implement business rules to validate employee data entry.

Discussion 0
Questions 237

The BEST way to prevent fraudulent payments is to implement segregation of duties between the vendor setup and:

Options:

A.  

payment processing.

B.  

payroll processing.

C.  

procurement.

D.  

product registration.

Discussion 0
Questions 238

Which of the following is MOST important for an IS auditor to verify when evaluating an organization's data conversion andinfrastructure migration plan?

Options:

A.  

Strategic: goals have been considered.

B.  

A rollback plan is included.

C.  

A code check review is included.

D.  

A migration steering committee has been formed.

Discussion 0
Questions 239

Which of the following is the BEST way to address potential data privacy concerns associated with inadvertent disclosure of machine identifier information contained within security logs?

Options:

A.  

Unit the use of logs to only those purposes for which they were collected

B.  

Restrict the transfer of log files from host machine to online storage

C.  

Only collect logs from servers classified as business critical

D.  

Limit log collection to only periods of increased security activity

Discussion 0
Questions 240

During a project assessment, an IS auditor finds that business owners have been removed from the project initiation phase. Which of the following should be the auditor's GREATEST concern with this situation?

Options:

A.  

Unrealistic milestones

B.  

Inadequate deliverables

C.  

Unclear benefits

D.  

Incomplete requirements

Discussion 0
Questions 241

Which of the following is the BEST reason for an IS auditor to emphasize to management the importance of using an IT governance framework?

Options:

A.  

Frameworks enable IT benchmarks against competitors

B.  

Frameworks can be tailored and optimized for different organizations

C.  

Frameworks help facilitate control self-assessments (CSAs)

D.  

Frameworks help organizations understand and manage IT risk

Discussion 0
Questions 242

Which of following areas is MOST important for an IS auditor to focus on when reviewing the maturity model for a technology organization?

Options:

A.  

Standard operating procedures

B.  

Service level agreements (SLAs)

C.  

Roles and responsibility matrix

D.  

Business resiliency

Discussion 0
Questions 243

An IS auditor is evaluating the access controls for a shared customer relationship management (CRM) system. Which of the following would be the GREATEST concern?

Options:

A.  

Single sign-on is not enabled

B.  

Audit logging is not enabled

C.  

Security baseline is not consistently applied

D.  

Complex passwords are not required

Discussion 0
Questions 244

Audit frameworks cart assist the IS audit function by:

Options:

A.  

defining the authority and responsibility of the IS audit function.

B.  

providing details on how to execute the audit program.

C.  

providing direction and information regarding the performance of audits.

D.  

outlining the specific steps needed to complete audits

Discussion 0
Questions 245

Which of the following is the BEST performance indicator for the effectiveness of an incident management program?

Options:

A.  

Average time between incidents

B.  

Incident alert meantime

C.  

Number of incidents reported

D.  

Incident resolution meantime

Discussion 0
Questions 246

Which of the following should be the PRIMARY role of an internal audit function in the management of identified business risks?

Options:

A.  

Establishing a risk appetite

B.  

Establishing a risk management framework

C.  

Validating enterprise risk management (ERM)

D.  

Operating the risk management framework

Discussion 0
Questions 247

An IS auditor is performing a follow-up audit for findings identified in an organization's user provisioning process Which of the following is the MOST appropriate population to sample from when testing for remediation?

Options:

A.  

All users provisioned after the finding was originally identified

B.  

All users provisioned after management resolved the audit issue

C.  

All users provisioned after the final audit report was issued

D.  

All users who have followed user provisioning processes provided by management

Discussion 0
Questions 248

Which of the following is MOST important to define within a disaster recovery plan (DRP)?

Options:

A.  

Business continuity plan (BCP)

B.  

Test results for backup data restoration

C.  

A comprehensive list of disaster recovery scenarios and priorities

D.  

Roles and responsibilities for recovery team members

Discussion 0
Questions 249

Which of the following would be the BEST process for continuous auditing to a large financial Institution?

Options:

A.  

Testing encryption standards on the disaster recovery system

B.  

Validating access controls for real-time data systems

C.  

Performing parallel testing between systems

D.  

Validating performance of help desk metrics

Discussion 0
Questions 250

An incident response team has been notified of a virus outbreak in a network subnet. Which of the following should be the NEXT step?

Options:

A.  

Verify that the compromised systems are fully functional

B.  

Focus on limiting the damage

C.  

Document the incident

D.  

Remove and restore the affected systems

Discussion 0
Questions 251

Which of the following risk scenarios is BEST addressed by implementing policies and procedures related to full disk encryption?

Options:

A.  

Data leakage as a result of employees leaving to work for competitors

B.  

Noncompliance fines related to storage of regulated information

C.  

Unauthorized logical access to information through an application interface

D.  

Physical theft of media on which information is stored

Discussion 0
Questions 252

Which of the following is a method to prevent disclosure of classified documents printed on a shared printer?

Options:

A.  

Using passwords to allow authorized users to send documents to the printer

B.  

Requiring a key code to be entered on the printer to produce hard copy

C.  

Encrypting the data stream between the user's computer and the printer

D.  

Producing a header page with classification level for printed documents

Discussion 0
Questions 253

When reviewing the functionality of an intrusion detection system (IDS), the IS auditor should be MOST concerned if:

Options:

A.  

legitimate packets blocked by the system have increased

B.  

actual attacks have not been identified

C.  

detected events have increased

D.  

false positives have been reported

Discussion 0
Questions 254

A firewall between internal network segments improves security and reduces risk by:

Options:

A.  

Jogging all packets passing through network segments

B.  

inspecting all traffic flowing between network segments and applying security policies

C.  

monitoring and reporting on sessions between network participants

D.  

ensuring all connecting systems have appropriate security controls enabled.

Discussion 0
Questions 255

When classifying information, it is MOST important to align the classification to:

Options:

A.  

business risk

B.  

security policy

C.  

data retention requirements

D.  

industry standards

Discussion 0
Questions 256

Transaction records from a business database were inadvertently deleted, and system operators decided to restore from a snapshot copy. Which of the following provides assurance that the BEST transactions were recovered successfully?

Options:

A.  

Review transaction recovery logs to ensure no errors were recorded.

B.  

Recount the transaction records to ensure no records are missing.

C.  

Rerun the process on a backup machine to verify the results are the same.

D.  

Compare transaction values against external statements to verify accuracy.

Discussion 0
Questions 257

Which of the following is the BEST indication that there are potential problems within an organization's IT service desk function?

Options:

A.  

Undocumented operating procedures

B.  

Lack of segregation of duties

C.  

An excessive backlog of user requests

D.  

Lack of key performance indicators (KPIs)

Discussion 0
Questions 258

Which of the following is the BEST way to minimize sampling risk?

Options:

A.  

Use a larger sample size

B.  

Perform statistical sampling

C.  

Perform judgmental sampling

D.  

Enhance audit testing procedures

Discussion 0
Questions 259

The FIRST step in auditing a data communication system is to determine:

Options:

A.  

traffic volumes and response-time criteria

B.  

physical security for network equipment

C.  

the level of redundancy in the various communication paths

D.  

business use and types of messages to be transmitted

Discussion 0
Questions 260

An organization plans to receive an automated data feed into its enterprise data warehouse from a third-party service provider. Which of the following would be the BEST way to prevent accepting bad data?

Options:

A.  

Obtain error codes indicating failed data feeds.

B.  

Appoint data quality champions across the organization.

C.  

Purchase data cleansing tools from a reputable vendor.

D.  

Implement business rules to reject invalid data.

Discussion 0
Questions 261

Which of the following should be the FIRST consideration when deciding whether data should be moved to a cloud provider for storage?

Options:

A.  

Data storage costs

B.  

Data classification

C.  

Vendor cloud certification

D.  

Service level agreements (SLAs)

Discussion 0
Questions 262

Which of the following is MOST important for an IS auditor to review when determining whether IT investments are providing value to tie business?

Options:

A.  

Return on investment (ROI)

B.  

Business strategy

C.  

Business cases

D.  

Total cost of ownership (TCO)

Discussion 0
Questions 263

An organization is shifting to a remote workforce In preparation the IT department is performing stress and capacity testing of remote access infrastructure and systems What type of control is being implemented?

Options:

A.  

Directive

B.  

Detective

C.  

Preventive

D.  

Compensating

Discussion 0
Questions 264

To enable the alignment of IT staff development plans with IT strategy, which of the following should be done FIRST?

Options:

A.  

Review IT staff job descriptions for alignment

B.  

Develop quarterly training for each IT staff member.

C.  

Identify required IT skill sets that support key business processes

D.  

Include strategic objectives m IT staff performance objectives

Discussion 0
Questions 265

In an online application which of the following would provide the MOST information about the transaction audit trail?

Options:

A.  

File layouts

B.  

Data architecture

C.  

System/process flowchart

D.  

Source code documentation

Discussion 0
Questions 266

For an organization that has plans to implement web-based trading, it would be MOST important for an IS auditor to verify the organization's information security plan includes:

Options:

A.  

attributes for system passwords.

B.  

security training prior to implementation.

C.  

security requirements for the new application.

D.  

the firewall configuration for the web server.

Discussion 0
Questions 267

Which of the following would be of MOST concern for an IS auditor evaluating the design of an organization's incident management processes?

Options:

A.  

Service management standards are not followed.

B.  

Expected time to resolve incidents is not specified.

C.  

Metrics are not reported to senior management.

D.  

Prioritization criteria are not defined.

Discussion 0
Questions 268

The due date of an audit project is approaching, and the audit manager has determined that only 60% of the audit has been completed. Which of the following should the audit manager do FIRST?

Options:

A.  

Determine where delays have occurred

B.  

Assign additional resources to supplement the audit

C.  

Escalate to the audit committee

D.  

Extend the audit deadline

Discussion 0
Questions 269

Which of the following documents should specify roles and responsibilities within an IT audit organization?

Options:

A.  

Organizational chart

B.  

Audit charier

C.  

Engagement letter

D.  

Annual audit plan

Discussion 0
Questions 270

Which of the following should an IS auditor consider the MOST significant risk associated with a new health records system that replaces a legacy system?

Options:

A.  

Staff were not involved in the procurement process, creating user resistance to the new system.

B.  

Data is not converted correctly, resulting in inaccurate patient records.

C.  

The deployment project experienced significant overruns, exceeding budget projections.

D.  

The new system has capacity issues, leading to slow response times for users.

Discussion 0
Questions 271

Which of the following BEST demonstrates that IT strategy Is aligned with organizational goals and objectives?

Options:

A.  

IT strategies are communicated to all Business stakeholders

B.  

Organizational strategies are communicated to the chief information officer (CIO).

C.  

Business stakeholders are Involved In approving the IT strategy.

D.  

The chief information officer (CIO) is involved In approving the organizational strategies

Discussion 0
Questions 272

An IS auditor performs a follow-up audit and learns the approach taken by the auditee to fix the findings differs from the agreed-upon approach confirmed during the last audit. Which of the following should be the auditor's NEXT course of action?

Options:

A.  

Evaluate the appropriateness of the remedial action taken.

B.  

Conduct a risk analysis incorporating the change.

C.  

Report results of the follow-up to the audit committee.

D.  

Inform senior management of the change in approach.

Discussion 0
Questions 273

Which of the following is a detective control?

Options:

A.  

Programmed edit checks for data entry

B.  

Backup procedures

C.  

Use of pass cards to gain access to physical facilities

D.  

Verification of hash totals

Discussion 0
Questions 274

An organization is planning an acquisition and has engaged an IS auditor lo evaluate the IT governance framework of the target company. Which of the following would be MOST helpful In determining the effectiveness of the framework?

Options:

A.  

Sell-assessment reports of IT capability and maturity

B.  

IT performance benchmarking reports with competitors

C.  

Recent third-party IS audit reports

D.  

Current and previous internal IS audit reports

Discussion 0
Questions 275

Which of the following BEST Indicates that an incident management process is effective?

Options:

A.  

Decreased time for incident resolution

B.  

Increased number of incidents reviewed by IT management

C.  

Decreased number of calls lo the help desk

D.  

Increased number of reported critical incidents

Discussion 0
Questions 276

During the planning stage of a compliance audit, an IS auditor discovers that a bank's inventory of compliance requirements does not include recent regulatory changes related to managing data risk. What should the auditor do FIRST?

Options:

A.  

Ask management why the regulatory changes have not been Included.

B.  

Discuss potential regulatory issues with the legal department

C.  

Report the missing regulatory updates to the chief information officer (CIO).

D.  

Exclude recent regulatory changes from the audit scope.

Discussion 0
Questions 277

Which of the following would be an appropriate rote of internal audit in helping to establish an organization's privacy program?

Options:

A.  

Analyzing risks posed by new regulations

B.  

Designing controls to protect personal data

C.  

Defining roles within the organization related to privacy

D.  

Developing procedures to monitor the use of personal data

Discussion 0
Questions 278

Which of the following controls BEST ensures appropriate segregation of dudes within an accounts payable department?

Options:

A.  

Ensuring that audit trails exist for transactions

B.  

Restricting access to update programs to accounts payable staff only

C.  

Including the creator's user ID as a field in every transaction record created

D.  

Restricting program functionality according to user security profiles

Discussion 0
Questions 279

Which of the following would lead an IS auditor to conclude that the evidence collected during a digital forensic investigation would not be admissible in court?

Options:

A.  

The person who collected the evidence is not qualified to represent the case.

B.  

The logs failed to identify the person handling the evidence.

C.  

The evidence was collected by the internal forensics team.

D.  

The evidence was not fully backed up using a cloud-based solution prior to the trial.

Discussion 0
Questions 280

Which of the following is an example of a preventative control in an accounts payable system?

Options:

A.  

The system only allows payments to vendors who are included In the system's master vendor list.

B.  

Backups of the system and its data are performed on a nightly basis and tested periodically.

C.  

The system produces daily payment summary reports that staff use to compare against invoice totals.

D.  

Policies and procedures are clearly communicated to all members of the accounts payable department

Discussion 0
Questions 281

An IS audit learn is evaluating the documentation related to the most recent application user-access review performed by IT and business management It is determined that the user list was not system-generated. Which of the following should be the GREATEST concern?

Options:

A.  

Availability of the user list reviewed

B.  

Confidentiality of the user list reviewed

C.  

Source of the user list reviewed

D.  

Completeness of the user list reviewed

Discussion 0
Questions 282

During an audit of a financial application, it was determined that many terminated users' accounts were not disabled. Which of the following should be the IS auditor's NEXT step?

Options:

A.  

Perform substantive testing of terminated users' access rights.

B.  

Perform a review of terminated users' account activity

C.  

Communicate risks to the application owner.

D.  

Conclude that IT general controls ate ineffective.

Discussion 0
Questions 283

Which of the following should be an IS auditor's GREATEST concern when an international organization intends to roll out a global data privacy policy?

Options:

A.  

Requirements may become unreasonable.

B.  

The policy may conflict with existing application requirements.

C.  

Local regulations may contradict the policy.

D.  

Local management may not accept the policy.

Discussion 0
Questions 284

In data warehouse (DW) management, what is the BEST way to prevent data quality issues caused by changes from a source system?

Options:

A.  

Configure data quality alerts to check variances between the data warehouse and the source system

B.  

Require approval for changes in the extract/Transfer/load (ETL) process between the two systems

C.  

Include the data warehouse in the impact analysis (or any changes m the source system

D.  

Restrict access to changes in the extract/transfer/load (ETL) process between the two systems

Discussion 0
Questions 285

Which of the following should an IS auditor recommend be done FIRST when an organization is planning to implement an IT compliance program?

Options:

A.  

Identify staff training needs related to compliance requirements.

B.  

Analyze historical compliance-related audit findings.

C.  

Research and purchase an industry-recognized IT compliance tool

D.  

Identify applicable laws, regulations, and standards.

Discussion 0
Questions 286

Control self-assessments (CSAs) can be used to:

Options:

A.  

Determine the value of assets.

B.  

Establish baselines.

C.  

Evaluate strategic business goals.

D.  

Replace audits.

Discussion 0
Questions 287

What should be the PRIMARY focus during a review of a business process improvement project?

Options:

A.  

Business project plan

B.  

Continuous monitoring plans

C.  

The cost of new controls

D.  

Business impact

Discussion 0
Questions 288

An organization's information security policies should be developed PRIMARILY on the basis of:

Options:

A.  

enterprise architecture (EA).

B.  

industry best practices.

C.  

a risk management process.

D.  

past information security incidents.

Discussion 0
Questions 289

Which of the following is the PRIMARY reason for using a digital signature?

Options:

A.  

Provide availability to the transmission

B.  

Authenticate the sender of a message

C.  

Provide confidentiality to the transmission

D.  

Verify the integrity of the data and the identity of the recipient

Discussion 0
Questions 290

Which of the following would be the GREATEST concern during a financial statement audit?

Options:

A.  

A backup has not been identified for key approvers.

B.  

System capacity has not been tested.

C.  

The procedures for generating key reports have not been approved.

D.  

The financial management system is cloud based.

Discussion 0
Questions 291

An IS auditor finds that a number of key patches have not been applied in a timely manner due to re-source constraints. Which of the following is the GREATEST risk to the organization in this

situation?

Options:

A.  

Systems may not be supported by the vendor.

B.  

Known security vulnerabilities may not be mitigated.

C.  

Different systems may not be compatible.

D.  

The systems may not meet user requirements.

Discussion 0
Questions 292

Which of the following is the MAIN risk associated with adding a new system functionality during the development phase without following a project change management process?

Options:

A.  

The project may go over budget.

B.  

The added functionality has not been documented.

C.  

The project may fail to meet the established deadline.

D.  

The new functionality may not meet requirements.

Discussion 0
Questions 293

The PRIMARY goal of capacity management is to:

Options:

A.  

minimize data storage needs across the organization.

B.  

provide necessary IT resources to meet business requirements.

C.  

minimize system idle time to optimize cost.

D.  

ensure that IT teams have sufficient personnel.

Discussion 0
Questions 294

Which of the following provides the BEST evidence of effective IT portfolio managements?

Options:

A.  

IT portfolio updates are communicated when approved.

B.  

Programs in the IT portfolio are prioritized by each business function.

C.  

The IT portfolio is updated as business strategy changes.

D.  

The IT portfolio is updated on the basis of current industry benchmarks.

Discussion 0
Questions 295

During an organization's implementation of a data loss prevention (DLP) solution, which of the following activities should be completed FIRST?

Options:

A.  

Configuring reports

B.  

Configuring rule sets

C.  

Enabling detection points

D.  

Establishing exceptions workflow

Discussion 0
Questions 296

Which of the following should be of MOST concern to an IS auditor reviewing an organization’s business impact analysis (BIA)?

Options:

A.  

A risk assessment was not conducted prior to completing the BI

A.  

B.  

System criticality information was only provided by the IT manager.

C.  

A questionnaire was used to gather information as opposed to in-person interviews.

D.  

The BIA was not signed off by executive management.

Discussion 0
Questions 297

How is nonrepudiation supported within a public key infrastructure (PKI) environment?

Options:

A.  

Through the use of elliptical curve cryptography on transmitted messages

B.  

Through the use of a certificate issued by a certificate authority (CA)

C.  

Through the use of private keys to decrypt data received by a user

D.  

Through the use of enterprise key management systems

Discussion 0
Questions 298

Which of the following security testing techniques is MOST effective for confirming that inputs to a web application have been properly sanitized?

Options:

A.  

SQL injection

B.  

Fuzzing

C.  

Brute force

D.  

Password spraying

Discussion 0
Questions 299

Which of the following features would BEST address risk associated with data at rest when evaluating a data loss prevention (DLP) solution?

Options:

A.  

Printing of scan files

B.  

File movement detection

C.  

Enforcement of access policies

D.  

Storage-scanning technology

Discussion 0
Questions 300

Which of the following is the PRIMARY advantage of using an automated security log monitoring tool instead of conducting a manual review to monitor the use of privileged access?

Options:

A.  

Reduced costs associated with automating the review

B.  

Increased likelihood of detecting suspicious activity

C.  

Ease of storing and maintaining log file

D.  

Ease of log retrieval for audit purposes

Discussion 0
Questions 301

Which of the following is an IS auditor’s BEST approach when low-risk anomalies have been identified?

Options:

A.  

Reprioritize further testing of the anomalies and refocus on issues with higher risk

B.  

Update the audit plan to include the information collected during the audit

C.  

Ask auditees to promptly remediate the anomalies

D.  

Document the anomalies in audit workpapers

Discussion 0
Questions 302

An organization establishes capacity utilization thresholds and monitors for instances when thresholds are exceeded. Which of the following is BEST supported by this activity?

Options:

A.  

Integrity

B.  

Availability

C.  

Confidentiality

D.  

Nonrepudiation

Discussion 0
Questions 303

A cloud access security broker (CASB) administers the user access of a Software as a Service {SaaS) on behalf of the customer organization. When conducting an audit of the service, which of the following is MOST important for the IS auditor to confirm?

Options:

A.  

The CASB logs the access request as a service record that is reviewed after granting access.

B.  

The CASB verifies the access request from a named customer contact before granting access.

C.  

The CASB manages secure access to the federated directory service used by the SaaS application.

D.  

The CASB conducts periodic audits of access requests to ensure compliance with customer policy.

Discussion 0
Questions 304

The PRIMARY reason to assign data ownership for protection of data is to establish:

Options:

A.  

reliability.

B.  

traceability.

C.  

authority,

D.  

accountability.

Discussion 0
Questions 305

Which of the following is the MOST important course of action to ensure a cloud access security broker (CASB) effectively detects and responds to threats?

Options:

A.  

Monitoring data movement

B.  

Implementing a long-term CASB contract

C.  

Reviewing the information security policy

D.  

Evaluating firewall effectiveness

Discussion 0
Questions 306

An IS auditor wants to gain a better understanding of an organization’s selected IT operating system software. Which of the following would be MOST helpful to review?

Options:

A.  

Service level agreements (SLAs)

B.  

Project steering committee charter

C.  

IT audit reports

D.  

Enterprise architecture (EA)

Discussion 0
Questions 307

Which of the following encryption methods offers the BEST wireless security?

Options:

A.  

Wi-Fi Protected Access 3 (WPA3)

B.  

Data Encryption Standard (DES)

C.  

Wired Equivalent Privacy (WEP)

D.  

Secure Sockets Layer (SSL)

Discussion 0
Questions 308

Which of the following is MOST likely to be reduced when implementing optimal risk management strategies?

Options:

A.  

Sampling risk

B.  

Residual risk

C.  

Detection risk

D.  

Inherent risk

Discussion 0
Questions 309

Which of the following should an IS auditor be MOST concerned with when a system uses RFID?

Options:

A.  

Scalability

B.  

Maintainability

C.  

Nonrepudiation

D.  

Privacy

Discussion 0
Questions 310

Which of the following types of firewalls provides the GREATEST degree of control against hacker intrusion?

Options:

A.  

Packet filtering router

B.  

Circuit gateway

C.  

Application-level gateway

D.  

Screening router.

Discussion 0
Questions 311

An organization is implementing a new system that supports a month-end business process. Which of the following implementation strategies would be MOST efficient to decrease business downtime?

Options:

A.  

Big bang

B.  

Phased

C.  

Cutover

D.  

Parallel

Discussion 0
Questions 312

Which of the following system attack methods is executed by entering malicious code into the search box of a vulnerable website, causing the server to reveal restricted information?

Options:

A.  

Man-m-the-middle

B.  

Denial of service (DoS)

C.  

SQL injection

D.  

Cross-site scripting

Discussion 0
Questions 313

Which of the following controls helps to reduce fraud risk associated with robotic process automation (RPA)?

Options:

A.  

Inclusion of robots in business impact assessments (BIAs)

B.  

Password rotation

C.  

Recertification process for robots

D.  

Common RPA testing framework

Discussion 0
Questions 314

Which of the following is MOST appropriate to review when determining if the work completed on an IT project is in alignment with budgeted costs?

Options:

A.  

Return on investment (ROI) analysis

B.  

Earned value analysis (EVA)

C.  

Financial value analysis

D.  

Business impact analysis (BIA)

Discussion 0
Questions 315

Which of the following is the BEST way to prevent social engineering incidents?

Options:

A.  

Ensure user workstations are running the most recent version of antivirus software.

B.  

Maintain an onboarding and annual security awareness program.

C.  

Include security responsibilities in job descriptions and require signed acknowledgment.

D.  

Enforce strict email security gateway controls.

Discussion 0
Questions 316

Which of the following is MOST important to the effectiveness of smoke detectors installed in a data processing facility?

Options:

A.  

Detectors trigger audible alarms when activated.

B.  

Detectors have the correct industry certification.

C.  

Detectors are linked to dry pipe fire suppression systems.

D.  

Detectors are linked to wet pipe fire suppression systems.

Discussion 0
Questions 317

During a review, an IS auditor discovers that corporate users are able to access cloud-based applications and data from any Internet-connected web browser. Which of the following is the

auditor's BEST recommendation to help prevent unauthorized access?

Options:

A.  

Utilize strong anti-malware controls on all computing devices.

B.  

Update security policies and procedures.

C.  

Implement an intrusion detection system (IDS).

D.  

Implement multi-factor authentication.

Discussion 0
Questions 318

Which of the following approaches BEST enables an IS auditor to detect security vulnerabilities within an application?

Options:

A.  

Threat modeling

B.  

Concept mapping

C.  

Prototyping

D.  

Threat intelligence

Discussion 0
Questions 319

Which of the following responsibilities associated with a disaster recovery plan (DRP) can be outsourced to a Disaster Recovery as a Service (DRaaS) provider?

Options:

A.  

System recovery procedures

B.  

Stakeholder communications during a disaster

C.  

Validation of recovered data

D.  

Processes for maintaining currency of data

Discussion 0
Questions 320

Which of the following would be of GREATEST concern to an IS auditor reviewing the feasibility study for a new application system?

Options:

A.  

Security requirements have not been defined.

B.  

Conditions under which the system will operate are unclear.

C.  

The business case does not include well-defined strategic benefits.

D.  

System requirements and expectations have not been clarified.

Discussion 0
Questions 321

Which of the following is the PRIMARY advantage of using an automated security log monitoring tool over a manual review to monitor the use of privileged access?

Options:

A.  

Increased likelihood of detecting suspicious activity

B.  

Reduced costs associated with automating the review

C.  

Improved incident response time

D.  

Reduced manual effort of reviewing logs

Discussion 0
Questions 322

Which of the following would be MOST useful to an IS auditor when making recommendations to enable continual improvement of IT processes over time?

Options:

A.  

Benchmarking studies

B.  

Maturity model

C.  

IT risk register

D.  

IT incident log

Discussion 0
Questions 323

An organization's strategy to source certain IT functions from a Software as a Service (SaaS) provider should be approved by the:

Options:

A.  

chief financial officer (CFO).

B.  

chief risk officer (CRO).

C.  

IT steering committee.

D.  

IT operations manager.

Discussion 0
Questions 324

An organization requires the use of a key card to enter its data center. Recently, a control was implemented that requires biometric authentication for each employee.

Which type of control has been added?

Options:

A.  

Corrective

B.  

Compensating

C.  

Preventive

D.  

Detective

Discussion 0
Questions 325

When designing metrics for information security, the MOST important consideration is that the metrics:

Options:

A.  

conform to industry standards.

B.  

apply to all business units.

C.  

provide actionable data.

D.  

are easy to understand.

Discussion 0
Questions 326

Which of the following BEST addresses the availability of an online store?

Options:

A.  

RAID level 5 storage devices

B.  

A mirrored site at another location

C.  

Online backups

D.  

Clustered architecture

Discussion 0
Questions 327

Which of the following applications has the MOST inherent risk and should be prioritized during audit planning?

Options:

A.  

A decommissioned legacy application

B.  

An onsite application that is unsupported

C.  

An outsourced accounting application

D.  

An internally developed application

Discussion 0
Questions 328

What is the PRIMARY reason to adopt a risk-based IS audit strategy?

Options:

A.  

To achieve synergy between audit and other risk management functions

B.  

To prioritize available resources and focus on areas with significant risk

C.  

To reduce the time and effort needed to perform a full audit cycle

D.  

To identify key threats, risks, and controls for the organization

Discussion 0
Questions 329

Which of the following procedures for testing a disaster recovery plan (DRP) is MOST effective?

Options:

A.  

Testing at a secondary site using offsite data backups

B.  

Performing a quarterly tabletop exercise

C.  

Reviewing recovery time and recovery point objectives

D.  

Reviewing documented backup and recovery procedures

Discussion 0
Questions 330

As part of an audit response, an auditee has concerns with the recommendations and is hesitant to implement them. Which of the following is the BEST course of action for the IS auditor?

Options:

A.  

Accept the auditee's response and perform additional testing.

B.  

Suggest hiring a third-party consultant to perform a current state assessment.

C.  

Conduct further discussions with the auditee to develop a mitigation plan.

D.  

Issue a final report without including the opinion of the auditee.

Discussion 0
Questions 331

Which of the following would present the GREATEST risk within a release management process for a new application?

Options:

A.  

Procedures are not updated to coincide with the production release schedule.

B.  

Code is deployed to production without authorization.

C.  

A newly added program may overwrite existing production files.

D.  

An identified bug was not resolved.

Discussion 0
Questions 332

Which of the following is the MOST effective control when granting access to a service provider for a ctoud-6ased application?

Options:

A.  

Administrator access is provided for a limited period with an expiration date.

B.  

Access has been provided on a need-to-know basis.

C.  

User IDs are deleted when work is completed.

D.  

Access is provided to correspond with the service level agreement (SLA).

Discussion 0
Questions 333

Which of the following should be the PRIMARY focus for any network design that deploys a Zero Trust architecture?

Options:

A.  

Protecting network segments

B.  

Protecting technology resources

C.  

Maintaining network router operating system versions

D.  

Ensuring a vendor-agnostic environment

Discussion 0
Questions 334

Which of the following is the BEST review for an IS auditor to conduct when a vulnerability has been exploited by an employee?

Options:

A.  

Compliance audit

B.  

Application security testing

C.  

Forensic audit

D.  

Penetration testing

Discussion 0
Questions 335

Which of the following roles is PRIMARILY responsible for mitigating the risk of benefits not being realized in an IT project?

Options:

A.  

Project sponsor

B.  

Project manager

C.  

Quality assurance (QA) manager

D.  

Chief risk officer (CRO)

Discussion 0
Questions 336

When an IS audit reveals that a firewall was unable to recognize a number of attack attempts, the auditor's BEST recommendation is to place an intrusion detection system (IDS) between the

firewall and:

Options:

A.  

the organization's network.

B.  

the demilitarized zone (DMZ).

C.  

the Internet.

D.  

the organization's web server.

Discussion 0
Questions 337

Which of the following key performance indicators (KPIs) provides stakeholders with the MOST useful information about whether information security risk is being managed?

Options:

A.  

Time from identifying security threats to implementing solutions

B.  

The number of security controls audited

C.  

Time from security log capture to log analysis

D.  

The number of entries in the security risk register

Discussion 0
Questions 338

An IS auditor would MOST likely recommend that IT management use a balanced scorecard to:

Options:

A.  

indicate whether the organization meets quality standards.

B.  

ensure that IT staff meet performance requirements.

C.  

train and educate IT staff.

D.  

assess IT functions and processes.

Discussion 0
Questions 339

An IS auditor has been asked to review an event log aggregation system to ensure risk management practices have been applied. Which of the following should be of MOST concern to the auditor?

Options:

A.  

Log feeds are uploaded via batch process.

B.  

Completeness testing has not been performed on the log data.

C.  

The log data is not normalized.

D.  

Data encryption standards have not been considered.

Discussion 0
Questions 340

An IS auditor is reviewing desktop software profiles and notes that a user has downloaded and installed several games that are not approved by the company. Which of the following is the MOST significant risk that could result from this situation?

Options:

A.  

Violation of user's privacy

B.  

Potential for malware

C.  

Noncompliance with the acceptable use policy

D.  

Interoperability issues with company software

Discussion 0
Questions 341

The waterfall life cycle model of software development is BEST suited for which of the following situations?

Options:

A.  

The project will involve the use of new technology.

B.  

The project intends to apply an object-oriented design approach.

C.  

The project requirements are well understood.

D.  

The project is subject to time pressures.

Discussion 0
Questions 342

Which of the following controls is the BEST recommendation to prevent the skimming of debit or credit card data in point of sale (POS) systems?

Options:

A.  

Encryption

B.  

Chip and PIN

C.  

Hashing

D.  

Biometric authentication

Discussion 0
Questions 343

The business case for an information system investment should be available for review until the:

Options:

A.  

information system investment is retired.

B.  

information system has reached end of life.

C.  

formal investment decision is approved.

D.  

benefits have been fully realized.

Discussion 0
Questions 344

If concurrent update transactions to an account are not processed properly, which of the following will be affected?

Options:

A.  

Confidentiality

B.  

Integrity

C.  

Accountability

D.  

Availability

Discussion 0
Questions 345

Which of the following will provide the GREATEST assurance to IT management that a quality management system (QMS) is effective?

Options:

A.  

A high percentage of stakeholders satisfied with the quality of IT

B.  

A high percentage of IT processes reviewed by quality assurance (QA)

C.  

A high percentage of incidents being quickly resolved

D.  

A high percentage of IT employees attending quality training

Discussion 0
Questions 346

An IS auditor has been asked to review the quality of data in a general ledger system. Which of the following would provide the auditor with the MOST meaningful results?

Options:

A.  

Discussion of the largest account values with business owners

B.  

Integrity checks against source documentation

C.  

System vulnerability assessment

D.  

Interviews with system owners and operators

Discussion 0
Questions 347

Which of the following technologies BEST assists in protection of digital evidence as part of forensic investigation acquisition?

Options:

A.  

Hardware-based media write blocker

B.  

Data encryption

C.  

Differential backups

D.  

Source media sanitization

Discussion 0
Questions 348

Which of the following cloud capabilities BEST enables an organization to meet unexpectedly high service demand?

Options:

A.  

Scalability

B.  

High availability

C.  

Alternate routing

D.  

Flexibility

Discussion 0
Questions 349

An external audit firm was engaged to perform a validation and verification review for a systems implementation project. The IS auditor identifies that regression testing is not part of the project plan and was not performed by the systems implementation team. According to the team, the parallel testing being performed is sufficient, making regression testing unnecessary. What should be the auditor’s NEXT step?

Options:

A.  

Evaluate the extent of the parallel testing being performed

B.  

Recommend integration and stress testing be conducted by the systems implementation team

C.  

Conclude that parallel testing is sufficient and regression testing is not needed

D.  

Recommend regression testing be conducted by the systems implementation team

Discussion 0
Questions 350

A global bank plans to use a cloud provider for backup of customer financial data. Which of the following should be the PRIMARY focus of this project?

Options:

A.  

Backup testing schedule

B.  

Data retention policy

C.  

Transfer frequency

D.  

Data confidentiality

Discussion 0
Questions 351

An organization allows programmers to change production systems in emergency situations without seeking prior approval. Which of the following controls should an IS auditor consider MOST

important?

Options:

A.  

Programmers' subsequent reports

B.  

Limited number of super users

C.  

Operator logs

D.  

Automated log of changes

Discussion 0
Questions 352

Which of the following metrics is the BEST indicator of the performance of a web application?

Options:

A.  

Server thread count

B.  

Server uptime

C.  

Average response time

D.  

HTTP server error rate

Discussion 0
Questions 353

Which of the following would be MOST important to include in an IS audit report?

Options:

A.  

Observations not reported as findings due to inadequate evidence

B.  

The roadmap for addressing the various risk areas

C.  

The level of unmitigated risk along with business impact

D.  

Specific technology solutions for each audit observation

Discussion 0
Questions 354

Which of the following issues identified during a formal review of an organization's information security policies presents the GREATEST potential risk to the organization?

Options:

A.  

The policies are not available to key risk stakeholders.

B.  

The policies have not been reviewed by the risk management committee.

C.  

The policies are not aligned with the information security risk appetite.

D.  

The policies are not based on industry best practices for information security.

Discussion 0
Questions 355

Which of the following findings would be of GREATEST concern to an IS auditor reviewing the security architecture of an organization that has just implemented a Zero Trust solution?

Options:

A.  

An increase in security-related costs

B.  

User complaints about the new mode of working

C.  

An increase in user identification errors

D.  

A noticeable drop in the performance of IT systems

Discussion 0
Questions 356

An organization uses public key infrastructure (PKI) to provide email security. Which of the following would be the MOST efficient method to determine whether email messages have been modified in transit?

Options:

A.  

The message is encrypted using a symmetric algorithm.

B.  

The message is sent using Transport Layer Security (TLS) protocol.

C.  

The message is sent along with an encrypted hash of the message.

D.  

The message is encrypted using the private key of the sender.

Discussion 0
Questions 357

Stress testing should ideally be carried out under a:

Options:

A.  

test environment with production workloads.

B.  

test environment with test data.

C.  

production environment with production workloads.

D.  

production environment with test data.

Discussion 0
Questions 358

An IS audit manager is reviewing workpapers for a recently completed audit of the corporate disaster recovery test. Which of the following should the IS audit manager specifically review to substantiate the conclusions?

Options:

A.  

Overviews of interviews between data center personnel and the auditor

B.  

Prior audit reports involving other corporate disaster recovery audits

C.  

Summary memos reflecting audit opinions regarding noted weaknesses

D.  

Detailed evidence of the successes and weaknesses of all contingency testing

Discussion 0
Questions 359

An IT strategic plan that BEST leverages IT in achieving organizational goals will include:

Options:

A.  

a comparison of future needs against current capabilities.

B.  

a risk-based ranking of projects.

C.  

enterprise architecture (EA) impacts.

D.  

IT budgets linked to the organization's budget.

Discussion 0
Questions 360

The BEST way to provide assurance that a project is adhering to the project plan is to:

Options:

A.  

require design reviews at appropriate points in the life cycle.

B.  

have an IS auditor participate on the steering committee.

C.  

have an IS auditor participate on the quality assurance (QA) team.

D.  

conduct compliance audits at major system milestones.

Discussion 0
Questions 361

An IS audit manager was temporarily tasked with supervising a project manager assigned to the organization's payroll application upgrade. Upon returning to the audit department, the audit manager has been asked to perform an audit to validate the implementation of the payroll application. The audit manager is the only one in the audit department with IT project management

experience. What is the BEST course of action?

Options:

A.  

Transfer the assignment to a different audit manager despite lack of IT project management experience.

B.  

Outsource the audit to independent and qualified resources.

C.  

Manage the audit since there is no one else with the appropriate experience.

D.  

Have a senior IS auditor manage the project with the IS audit manager performing final review.

Discussion 0
Questions 362

Which of the following observations should be of GREATEST concern to an IS auditor performing an audit of change and release management controls for a new complex system developed by a small in-house IT team?

Options:

A.  

Access to change testing strategy and results is not restricted to staff outside the IT team.

B.  

Some user acceptance testing (IJAT) was completed by members of the IT team.

C.  

IT administrators have access to the production and development environment

D.  

Post-implementation testing is not conducted for all system releases.

Discussion 0
Questions 363

Which of the following is the PRIMARY reason for an IS auditor to perform a risk assessment?

Options:

A.  

It helps to identify areas with a relatively high probability of material problems.

B.  

It provides a basis for the formulation of corrective action plans.

C.  

It increases awareness of the types of management actions that may be inappropriate

D.  

It helps to identify areas that are most sensitive to fraudulent or inaccurate practices

Discussion 0
Questions 364

An IS auditor is reviewing a contract for the outsourcing of IT facilities. If missing, which of the following should present the GREATEST concern to the auditor?

Options:

A.  

Hardware configurations

B.  

Access control requirements

C.  

Help desk availability

D.  

Perimeter network security diagram

Discussion 0
Questions 365

Which of the following is MOST critical to the success of an information security program?

Options:

A.  

Management's commitment to information security

B.  

User accountability for information security

C.  

Alignment of information security with IT objectives

D.  

Integration of business and information security

Discussion 0
Questions 366

Which of the following would BEST guide an IS auditor when determining an appropriate time to schedule the follow-up of agreed corrective actions for reported audit issues?

Options:

A.  

Progress updates indicate that the implementation of agreed actions is on track.

B.  

Sufficient time has elapsed since implementation to provide evidence of control operation.

C.  

Business management has completed the implementation of agreed actions on schedule.

D.  

Regulators have announced a timeline for an inspection visit.

Discussion 0
Questions 367

Which of the following is the BEST compensating control against segregation of duties conflicts in new code development?

Options:

A.  

Adding the developers to the change approval board

B.  

A small number of people have access to deploy code

C.  

Post-implementation change review

D.  

Creation of staging environments

Discussion 0
Questions 368

Which of the following would be an auditor's GREATEST concern when reviewing data inputs from spreadsheets into the core finance system?

Options:

A.  

Undocumented code formats data and transmits directly to the database.

B.  

There is not a complete inventory of spreadsheets, and file naming is inconsistent.

C.  

The department data protection policy has not been reviewed or updated for two years.

D.  

Spreadsheets are accessible by all members of the finance department.

Discussion 0
Questions 369

When reviewing a business case for a proposed implementation of a third-party system, which of the following should be an IS auditor's GREATEST concern?

Options:

A.  

Lack of ongoing maintenance costs

B.  

Lack of training materials

C.  

Lack of plan for pilot implementation

D.  

Lack of detailed work breakdown structure

Discussion 0
Questions 370

Which of the following should be done FIRST when planning to conduct internal and external penetration testing for a client?

Options:

A.  

Establish the timing of testing.

B.  

Identify milestones.

C.  

Determine the test reporting

D.  

Establish the rules of engagement.

Discussion 0
Questions 371

What should an IS auditor recommend to management as the MOST important action before selecting a Software as a Service (SaaS) vendor?

Options:

A.  

Determine service level requirements.

B.  

Complete a risk assessment.

C.  

Perform a business impact analysis (BIA)

D.  

Conduct a vendor audit.

Discussion 0
Questions 372

Which of the following is the MOST important advantage of participating in beta testing of software products?

Options:

A.  

It increases an organization's ability to retain staff who prefer to work with new technology.

B.  

It improves vendor support and training.

C.  

It enhances security and confidentiality.

D.  

It enables an organization to gain familiarity with new products and their functionality.

Discussion 0
Questions 373

Which of the following is MOST important to include in security awareness training?

Options:

A.  

How to respond to various types of suspicious activity

B.  

The importance of complex passwords

C.  

Descriptions of the organization's security infrastructure

D.  

Contact information for the organization's security team

Discussion 0
Questions 374

During a pre-deployment assessment, what is the BEST indication that a business case will lead to the achievement of business objectives?

Options:

A.  

The business case reflects stakeholder requirements.

B.  

The business case is based on a proven methodology.

C.  

The business case passed a quality review by an independent party.

D.  

The business case identifies specific plans for cost allocation.

Discussion 0
Questions 375

Which of the following should be the FIRST step when developing a data loss prevention (DLP) solution for a large organization?

Options:

A.  

Conduct a data inventory and classification exercise.

B.  

Identify approved data workflows across the enterprise_

C.  

Conduct a threat analysis against sensitive data usage.

D.  

Create the DLP policies and templates

Discussion 0
Questions 376

During planning for a cloud service audit, audit management becomes aware that the assigned IS auditor is unfamiliar with the technologies in use and their associated risks to the business. To ensure audit quality, which of the following actions should audit management consider FIRST?

Options:

A.  

Conduct a follow-up audit after a suitable period has elapsed.

B.  

Reschedule the audit assignment for the next financial year.

C.  

Reassign the audit to an internal audit subject matter expert.

D.  

Extend the duration of the audit to give the auditor more time.

Discussion 0
Questions 377

Which of the following would be the GREATEST concern to an IS auditor when reviewing the outsourcing contract for an organization's cloud service provider?

Options:

A.  

There is no change management process defined in the contract.

B.  

There are no procedures for incident escalation.

C.  

There is no dispute resolution process defined in the contract.

D.  

There is no right-to-audit clause defined in the contract.

Discussion 0
Questions 378

A core system fails a week after a scheduled update, causing an outage that impacts service. Which of the following is MOST important for incident management to focus on when addressing the issue?

Options:

A.  

Analyzing the root cause of the outage to ensure the incident will not reoccur

B.  

Restoring the system to operational state as quickly as possible

C.  

Ensuring all resolution steps are fully documented prior to returning thesystem to service

D.  

Rolling back the unsuccessful change to the previous state

Discussion 0
Questions 379

An IS auditor discovers that validation controls in a web application have been moved from the server side into the browser to boost performance. This would MOST likely increase the risk of a successful attack by:

Options:

A.  

structured query language (SQL) injection

B.  

buffer overflow.

C.  

denial of service (DoS).

D.  

phishing.

Discussion 0
Questions 380

An organization's security team created a simulated production environment with multiple vulnerable applications. What would be the PRIMARY purpose of creating such an environment?

Options:

A.  

To test the intrusion detection system (IDS)

B.  

To provide training to security managers

C.  

To collect digital evidence of cyberattacks

D.  

To attract attackers in order to study their behavior

Discussion 0
Questions 381

A global organization's policy states that all workstations must be scanned for malware each day. Which of the following would provide an IS auditor with the BEST evidence of continuous compliance with this policy?

Options:

A.  

Penetration testing results

B.  

Management attestation

C.  

Anti-malware tool audit logs

D.  

Recent malware scan reports

Discussion 0
Questions 382

Which of the following would BEST indicate the effectiveness of a security awareness training program?

Options:

A.  

Results of third-party social engineering tests

B.  

Employee satisfaction with training

C.  

Increased number of employees completing training

D.  

Reduced unintentional violations

Discussion 0
Questions 383

Which of the following would present the GREATEST concern during a review of internal audit quality assurance (QA) and continuous improvement processes?

Options:

A.  

The audit program does not involve periodic engagement with external assessors.

B.  

Quarterly reports are not distributed to the audit committee.

C.  

Results of corrective actions are not tracked consistently.

D.  

Substantive testing is not performed during the assessment phase of some audits.

Discussion 0
Questions 384

Which of the following BEST supports the effectiveness of a compliance program?

Options:

A.  

Implementing an awareness plan regarding compliance regulation requirements

B.  

Implementing a governance, risk, and compliance (GRC) tool to track compliance to regulations

C.  

Assessing and tracking all compliance audit findings

D.  

Monitoring which compliance regulations apply to the organization

Discussion 0
Questions 385

During an audit, the IS auditor finds that in many cases excessive rights were not removed from a system. Which of the following is the auditor's BEST recommendation?

Options:

A.  

System administrators should ensure consistency of assigned rights.

B.  

IT security should regularly revoke excessive system rights.

C.  

Human resources (HR) should delete access rights of terminated employees.

D.  

Line management should regularly review and request modification of access rights

Discussion 0
Questions 386

In which of the following sampling methods is the entire sample considered to be irregular if a single error is found?

Options:

A.  

Discovery sampling

B.  

Variable sampling

C.  

Stop-or-go sampling

D.  

Judgmental sampling

Discussion 0
Questions 387

When physical destruction IS not practical, which of the following is the MOST effective means of disposing of sensitive data on a hard disk?

Options:

A.  

Overwriting multiple times

B.  

Encrypting the disk

C.  

Reformatting

D.  

Deleting files sequentially

Discussion 0
Questions 388

An organization has recently become aware of a pervasive chip-level security vulnerability that affects all of its processors. Which of the following is the BEST way to prevent this vulnerability from being exploited?

Options:

A.  

Implement security awareness training.

B.  

Install vendor patches

C.  

Review hardware vendor contracts.

D.  

Review security log incidents.

Discussion 0
Questions 389

During a project audit, an IS auditor notes that project reporting does not accurately reflect current progress. Which of the following is the GREATEST resulting impact?

Options:

A.  

The project manager will have to be replaced.

B.  

The project reporting to the board of directors will be incomplete.

C.  

The project steering committee cannot provide effective governance.

D.  

The project will not withstand a quality assurance (QA) review.

Discussion 0
Questions 390

Which of the following is the BEST security control to validate the integrity of data communicated between production databases and a big data analytics

system?

Options:

A.  

Hashing in-scope data sets

B.  

Encrypting in-scope data sets

C.  

Running and comparing the count function within the in-scope data sets

D.  

Hosting a digital certificate for in-scope data sets

Discussion 0
Questions 391

The BEST way to evaluate the effectiveness of a newly developed application is to:

Options:

A.  

perform a post-implementation review-

B.  

analyze load testing results.

C.  

perform a secure code review.

D.  

review acceptance testing results.

Discussion 0
Questions 392

During the walk-through procedures for an upcoming audit, an IS auditor notes that the key application in scope is part of a Software as a Service (SaaS)

agreement. What should the auditor do NEXT?

Options:

A.  

Verify whether IT management monitors the effectiveness of the environment.

B.  

Verify whether a right-to-audit clause exists.

C.  

Verify whether a third-party security attestation exists.

D.  

Verify whether service level agreements (SLAs) are defined and monitored.

Discussion 0
Questions 393

Which of the following helps to ensure the integrity of data for a system interface?

Options:

A.  

System interface testing

B.  

user acceptance testing (IJAT)

C.  

Validation checks

D.  

Audit logs

Discussion 0
Questions 394

Which of the following is the GREATEST risk when relying on reports generated by end-user computing (EUC)?

Options:

A.  

Data may be inaccurate.

B.  

Reports may not work efficiently.

C.  

Reports may not be timely.

D.  

Historical data may not be available.

Discussion 0
Questions 395

Which type of review is MOST important to conduct when an IS auditor is informed that a recent internal exploitation of a bug has been discovered in a business application?

Options:

A.  

Penetration testing

B.  

Application security testing

C.  

Forensic audit

D.  

Server security audit

Discussion 0
Questions 396

Which of the following BEST contributes to the quality of an audit of a business-critical application?

Options:

A.  

Assigning the audit to independent external auditors

B.  

Reviewing previous findings reported by the application owner

C.  

Identifying common coding errors made by the development team

D.  

Involving the application owner early in the audit planning process

Discussion 0
Questions 397

Which of the following is MOST important to consider when assessing the scope of privacy concerns for an IT project?

Options:

A.  

Data ownership

B.  

Applicable laws and regulations

C.  

Business requirements and data flows

D.  

End-user access rights

Discussion 0
Questions 398

When planning an internal penetration test, which of the following is the MOST important step prior to finalizing the scope of testing?

Options:

A.  

Ensuring the scope of penetration testing is restricted to the test environment

B.  

Obtaining management's consent to the testing scope in writing

C.  

Notifying the IT security department regarding the testing scope

D.  

Agreeing on systems to be excluded from the testing scope with the IT department

Discussion 0
Questions 399

An organization's IT department and internal IS audit function all report to the chief information officer (CIO). Which of the following is the GREATEST concern associated with this reporting structure?

Options:

A.  

Potential for inaccurate audit findings

B.  

Compromise of IS audit independence

C.  

IS audit resources being shared with other IT functions

D.  

IS audit being isolated from other audit functions

Discussion 0
Questions 400

Which of the following is the BEST sampling method to use when relatively few errors are expected to be found in a population?

Options:

A.  

Variable sampling

B.  

Judgmental sampling

C.  

Stop-or-go sampling

D.  

Discovery sampling

Discussion 0
Questions 401

What should an IS auditor evaluate FIRST when reviewing an organization's response to new privacy legislation?

Options:

A.  

Implementation plan for restricting the collection of personal information

B.  

Privacy legislation in other countries that may contain similar requirements

C.  

Operational plan for achieving compliance with the legislation

D.  

Analysis of systems that contain privacy components

Discussion 0
Questions 402

When a data center is attempting to restore computing facilities at an alternative site following a disaster, which of the following should be restored FIRST?

Options:

A.  

Data backups

B.  

Decision support system

C.  

Operating system

D.  

Applications

Discussion 0
Questions 403

A bank performed minor changes to the interest calculation computer program. Which of the following techniques would provide the STRONGEST evidence to determine whether the interest calculations are correct?

Options:

A.  

Source code review

B.  

Parallel simulation using audit software

C.  

Manual verification of a sample of the results

D.  

Review of the quality assurance (QA) test results

Discussion 0
Questions 404

An IS auditor found that a company executive is encouraging employee use of social networking sites for business purposes. Which of the following recommendations would BEST help to reduce the risk of data leakage?

Options:

A.  

Requiring policy acknowledgment and nondisclosure agreements signed by employees

B.  

Providing education and guidelines to employees on use of social networking sites

C.  

Establishing strong access controls on confidential data

D.  

Monitoring employees' social networking usage

Discussion 0
Questions 405

Which of the following should be given GREATEST consideration when implementing the use of an open-source product?

Options:

A.  

Support

B.  

Performance

C.  

Confidentiality

D.  

Usability

Discussion 0
Questions 406

Following the sale of a business division, employees will be transferred to a new organization, but they will retain access to IT equipment from the previous employer. An IS auditor has recommended that both organizations agree to and document an acceptable use policy for the equipment. What type of control has been recommended?

Options:

A.  

Detective control

B.  

Preventive control

C.  

Directive control

D.  

Corrective control

Discussion 0
Questions 407

When reviewing an IT strategic plan, the GREATEST concern would be that

Options:

A.  

an IT strategy committee has not been created

B.  

the plan does not support relevant organizational goals.

C.  

there are no key performance indicators (KPls).

D.  

the plan was not formally approved by the board of directors

Discussion 0
Questions 408

A national tax administration agency with a distributed network experiences service disruptions due to a large influx of traffic to a regional office near the end of each year. Which of the following would BEST enable the agency to improve the performance of its servers during the busy period?

Options:

A.  

Virtual firewall

B.  

Proxy server

C.  

Load balancer

D.  

Virtual private network (VPN)

Discussion 0
Questions 409

When planning a follow-up, the IS auditor is informed by operational management that recent organizational changes have addressed the previously identified risk and implementing the action plan is no longer necessary. What should the auditor do NEXT?

Options:

A.  

Report that the changes make it impractical to determine whether the risks have been addressed.

B.  

Accept management's assertion and report that the risks have been addressed.

C.  

Determine whether the changes have introduced new risks that need to be addressed.

D.  

Review the changes and determine whether the risks have been addressed.

Discussion 0
Questions 410

An IS auditor is evaluating an enterprise resource planning (ERP) migration from local systems to the cloud. Who should be responsible for the data

classification in this project?

Options:

A.  

Information security officer

B.  

Database administrator (DBA)

C.  

Information owner

D.  

Data architect

Discussion 0
Questions 411

To reduce operational costs, IT management plans to reduce the number of servers currently used to run business applications. Which of the following is MOST helpful to review when identifying which servers are no longer required?

Options:

A.  

Performance feedback from the user community

B.  

Contract with the server vendor

C.  

Server CPU usage trends

D.  

Mean time between failure (MTBF) of each server

Discussion 0
Questions 412

Which of the following is the MOST important area of focus for an IS auditor when developing a risk-based audit strategy?

Options:

A.  

Critical business applications

B.  

Business processes

C.  

Existing IT controls

D.  

Recent audit results

Discussion 0
Questions 413

An organization's security team created a simulated production environment with multiple vulnerable applications. What would be the PRIMARY purpose of creating such an environment?

Options:

A.  

To collect digital evidence of cyberattacks

B.  

To attract attackers in order to study their behavior

C.  

To provide training to security managers

D.  

To test the intrusion detection system (IDS)

Discussion 0
Questions 414

An IS audit reveals an IT application is experiencing poor performance including data inconsistency and integrity issues. What is the MOST likely cause?

Options:

A.  

Database clustering

B.  

Data caching

C.  

Reindexing of the database table

D.  

Load balancing

Discussion 0
Questions 415

Which of the following should be the FIRST step in a data migration project?

Options:

A.  

Reviewing decisions on how business processes should be conducted in the new system

B.  

Completing data cleanup in the current database to eliminate inconsistencies

C.  

Understanding the new system's data structure

D.  

Creating data conversion scripts

Discussion 0
Questions 416

Which of the following is the BEST indication of effective governance over IT infrastructure?

Options:

A.  

The ability to deliver continuous, reliable performance

B.  

A requirement for annual security awareness programs

C.  

An increase in the number of IT infrastructure servers

D.  

A decrease in the number of information security incidents

Discussion 0
Questions 417

Which of the following is MOST critical to the success of an information security program?

Options:

A.  

Alignment of information security with IT objectives

B.  

Management’s commitment to information security

C.  

Integration of business and information security

D.  

User accountability for information security

Discussion 0
Questions 418

The PRIMARY purpose of an incident response plan is to:

Options:

A.  

reduce the impact of an adverse event on information assets.

B.  

increase the effectiveness of preventive controls.

C.  

reduce the maximum tolerable downtime (MTD) of impacted systems.

D.  

increase awareness of impacts from adverse events to IT systems.

Discussion 0
Questions 419

In a high-volume, real-time system, the MOST effective technique by which to continuously monitor and analyze transaction processing is:

Options:

A.  

integrated test facility (ITF).

B.  

parallel simulation.

C.  

transaction tagging.

D.  

embedded audit modules.

Discussion 0
Questions 420

Which of the following would minimize the risk of losing transactions as a result of a disaster?

Options:

A.  

Sending a copy of the transaction logs to offsite storage on a daily basis

B.  

Storing a copy of the transaction logs onsite in a fireproof vault

C.  

Encrypting a copy of the transaction logs and store on a local server

D.  

Signing a copy of the transaction logs and store on a local server

Discussion 0
Questions 421

An organization has an acceptable use policy in place, but users do not formally acknowledge the policy. Which of the following is the MOST significant risk from this finding?

Options:

A.  

Lack of data for measuring compliance

B.  

Violation of industry standards

C.  

Noncompliance with documentation requirements

D.  

Lack of user accountability

Discussion 0