Certified Information Systems Auditor Questions and Answers
An IS auditor learns that an organization did not conduct any penetration testing over one internet-facing webpage prior to of the following is the auditor ' s BEST course of action?
Which of the following responsibilities associated with a disaster recovery plan (DRP) can be outsourced to a Disaster Recovery as a Service (DRaaS) provider?
Which of the following areas of responsibility would cause the GREATEST segregation of duties conflict if the individual who performs the related tasks also has approval authority?
What should be the PRIMARY focus during a review of a business process improvement project?
Which of the following is MOST important when defining the IS audit scope?
Which of the following is a PRIMARY benefit of an integrated audit?
Which of the following is the PRIMARY reason for an IS auditor to conduct post-implementation reviews?
Which of the following is the MOST important reason for an IS auditor to examine the results of a post-incident review performed after a security incident?
Which of the following observations should be of GREATEST concern to an IS auditor performing an audit of change and release management controls for a new complex system developed by a small in-house IT team?
During a disaster recovery audit, an IS auditor finds that a business impact analysis (BIA) has not been performed. The auditor should FIRST
Which of the following BEST demonstrates to senior management and the board that an audit function is compliant with standards and the code of ethics?
Which of the following would be the BEST process for continuous auditing to a large financial Institution?
Which of the following BEST enables an organization to verify whether an encrypted message sent by a client has been altered?
Which of the following types of environmental equipment will MOST likely be deployed below the floor tiles of a data center?
An organization has developed processes to recover critical files in the event of a ransomware attack. Which type of control do these processes represent?
Which of the following is the MOST important area of focus for an IS auditor when developing a risk-based audit strategy?
Which of the following is the BEST disposal method for flash drives that previously stored confidential data?
Which of the following is the MOST significant risk to an organization migrating its onsite application servers to a public cloud service provider?
Which of the following provides the BEST evidence that system requirements are met when evaluating a project before implementation?
An IS auditor discovers that due to resource constraints a database administrator (DBA) is responsible for developing and executing changes into the production environment Which ot the following should the auditor do FIRSTS
Which of the following would be of GREATEST concern to an IS auditor evaluating an organization’s change management process?
Which of the following is the PRIMARY purpose of conducting a control self-assessment (CSA)?
An IS auditor finds that irregularities have occurred and that auditee management has chosen to ignore them. If reporting to external authorities is required which of the following is the BEST action for the IS auditor to take?
Compared to developing a system in-house, acquiring a software package means that the need for testing by end users is:
Which of the following is MOST important to successfully implement a corporate data classification program?
What should an IS auditor evaluate FIRST when reviewing an organization ' s response to new privacy legislation?
During audit planning, the IS audit manager is considering whether to budget for audits of entities regarded by the business as having low risk. Which of the following is the BEST course of action in this situation?
An organization is planning to implement a control self-assessment (CSA) program for selected business processes. Which of the following should be the role of the internal audit team for this program?
A post-implementation review was conducted by issuing a survey to users. Which of the following should be of GREATEST concern to an IS auditor?
An IS auditor has found that an organization is unable to add new servers on demand in a cost-efficient manner. Which of the following is the auditor ' s BEST recommendation?
A security review focused on data loss prevention (DLP) revealed the organization has no visibility to data stored in the cloud. What is the IS auditor ' s BEST recommendation to address this
issue?
Which of the following is the BEST way to prevent social engineering incidents?
During a review of a production schedule, an IS auditor observes that a staff member is not complying with mandatory operational procedures. The auditor ' s NEXT step should be to:
Which of the following is the BEST recommendation to include in an organization ' s bring your own device (BYOD)
policy to help prevent data leakage?
Which of the following would be an IS auditor ' s GREATEST concern when reviewing the organization ' s business continuity plan (BCP)?
Which of the following findings would be of GREATEST concern to an IS auditor reviewing firewall security for an organization ' s corporate network?
Which of the following is the BEST indicator that a third-party vendor adheres to the controls required by the organization?
Which of the following would MOST effectively ensure the integrity of data transmitted over a network?
Which of the following is the MOST appropriate and effective fire suppression method for an unstaffed computer room?
During a new system implementation, an IS auditor has been assigned to review risk management at each milestone. The auditor finds that several risks to project benefits have not been addressed. Who should be accountable for managing these risks?
Following a security breach in which a hacker exploited a well-known vulnerability in the domain controller, an IS audit has been asked to conduct a control assessment. the auditor ' s BEST course of action would be to determine if:
Which of the following should be of GREATEST concern to an IS auditor conducting an audit of an organization that recently experienced a ransomware attack?
Which of the following is MOST helpful to an IS auditor when assessing the effectiveness of controls?
Which of the following BEST enables the effectiveness of an agile project for the rapid development of a new software application?
An organization uses an automated continuous integration/continuous deployment (CI/CD) tool to deploy changes to production. Which of the following would be an IS auditor ' s GREATEST concern in this situation?
Which of the following would BEST manage the risk of changes in requirements after the analysis phase of a business application development project?
During a closing meeting, the IT manager disagrees with a valid audit finding presented by the IS auditor and requests the finding be excluded from the final report. Which of the following is the auditor ' s BEST course of action?
An IS auditor finds that while an organization ' s IT strategy is heavily focused on research and development, the majority of protects n the IT portfolio focus on operations and maintenance. Which of the Mowing is the BEST recommendation?
While reviewing the effectiveness of an incident response program, an IS auditor notices a high number of reported incidents involving malware originating from removable media found by employees. Which of the following is the MOST appropriate recommendation to management?
Which of the following demonstrates the use of data analytics for a loan origination process?
Which of the following is the BEST way to mitigate risk to an organization ' s network associated with devices permitted under a bring your own device (BYOD) policy?
Which of the following provides IS audit professionals with the BEST source of direction for performing audit functions?
The use of control totals reduces the risk of:
Which of the following technologies BEST assists in protection of digital evidence as part of forensic investigation acquisition?
Which of the following should be considered when examining fire suppression systems as part of a data center environmental controls review?
Which of the following BEST mitigates the risk associated with the deployment of a new production system?
Which of the following is the MOST reliable way for an IS auditor to evaluate the operational effectiveness of an organization ' s data loss prevention (DLP) controls?
Which of the following should an IS auditor use when verifying a three-way match has occurred in an enterprise resource planning (ERR) system?
Which of the following should be the GREATEST concern to an IS auditor reviewing the information security framework of an organization?
A contract for outsourcing IS functions should always include:
An IS auditor is reviewing desktop software profiles and notes that a user has downloaded and installed several games that are not approved by the company. Which of the following is the MOST significant risk that could result from this situation?
An IS auditor has been asked to advise on measures to improve IT governance within the organization. Which of the following IS the BEST recommendation?
Which of the following should be the role of internal audit in an organization’s move to the cloud?
Which of the following should be of MOST concern to an IS auditor reviewing an organization’s IT policies?
The PRIMARY advantage of using open-source-based solutions is that they:
Retention periods and conditions for the destruction of personal data should be determined by the.
Which of the following is the PRIMARY advantage of using an automated security log monitoring tool over a manual review to monitor the use of privileged access?
Which of the following is the MOST effective method of destroying sensitive data stored on electronic media?
Which of the following is an executive management concern that could be addressed by the implementation of a security metrics dashboard?
Which of the following should be the FIRST step when developing a data loss prevention (DLP) solution for a large organization?
An IS auditor is reviewing the system development practices of an organization that is about to move from a Waterfall to an Agile approach. Which of the following is MOST important for the auditor to focus on as a result of this move?
Which of the following is the BEST source of information to determine the required level of data protection on a file server?
An information systems security officer ' s PRIMARY responsibility for business process applications is to:
An organization has engaged a third party to implement an application to perform business-critical calculations. Which of the following is the MOST important process to help ensure the application provides accurate calculations?
When an organization conducts business process improvements, the IS auditor should be MOST concerned with the:
Which of the following audit evidence collection procedures is MOST reliable?
The use of control totals satisfies which of the following control objectives?
Which of the following methods provides the MOST reliable audit evidence?
When classifying information, it is MOST important to align the classification to:
Which of the following should be done FIRST to minimize the risk of unstructured data?
Afire alarm system has been installed in the computer room The MOST effective location for the fire alarm control panel would be inside the
A characteristic of a digital signature is that it
Which of the following controls is MOST crucial to ensure an organization will be able to recover its data from backup media in the event of a disaster?
An IS auditor finds that firewalls are outdated and not supported by vendors. Which of the following should be the auditor ' s NEXT course of action?
An IS auditor is conducting an IT governance audit and notices many initiatives are managed informally by isolated project managers. Which of the following recommendations would have the GREATEST impact on improving the maturity of the IT team?
While reviewing transactions, an IS auditor discovers inconsistencies in a relational database. Which of the following would be the auditor ' s BEST recommendation?
An IS auditor wants to gain a better understanding of an organization’s selected IT operating system software. Which of the following would be MOST helpful to review?
A firewall between internal network segments improves security and reduces risk by:
Which of the following is the PRIMARY advantage of a decentralized database architecture over a centralized architecture?
Which of the following audit procedures would provide the BEST assurance that an application program is functioning as designed?
An IS auditor has been asked to assess the security of a recently migrated database system that contains personal and financial data for a bank ' s customers. Which of the following controls is MOST important for the auditor to confirm is in place?
An external audit firm was engaged to perform a validation and verification review for a systems implementation project. The IS auditor identifies that regression testing is not part of the project plan and was not performed by the systems implementation team. According to the team, the parallel testing being performed is sufficient, making regression testing unnecessary. What should be the auditor’s NEXT step?
During a review, an IS auditor discovers that corporate users are able to access cloud-based applications and data any Internet-connected web browser. Which Of the following
is the auditor’s BEST recommendation to prevent unauthorized access?
An IS auditor finds that the process for removing access for terminated employees is not documented What is the MOST significant risk from this observation?
Which of the following observations regarding change management should be considered the MOST serious risk by an IS auditor?
An organization is modernizing its technology policy framework to demonstrate compliance with external industry standards. Which of the following would be MOST useful to an IS auditor for validating the outcome?
During a review of system access, an IS auditor notes that an employee who has recently changed roles within the organization still has previous access rights. The auditor ' s NEXT step should be to:
Which of the following is the MOST important consideration for a contingency facility?
An IS auditor is planning a review of an organizations robotic process automation (RPA) technology. Which of the following MUST be included in the audit work plan?
Which of the following is the MOST important consideration for patching mission critical business application servers against known vulnerabilities?
Capacity management enables organizations to:
Management receives information indicating a high level of risk associated with potential flooding near the organization ' s data center within the next few years. As a result, a decision has been made to move data center operations to another facility on higher ground. Which approach has been adopted?
During an audit of a reciprocal disaster recovery agreement between two companies, the IS auditor would be MOST concerned with the:
An IS auditor notes that not all security tests were completed for an online sales system recently promoted to production. Which of the following is the auditor ' s BEST course of action?
Which of the following is MOST likely to be reduced when implementing optimal risk management strategies?
Which of the following is the MOST appropriate control to ensure integrity of online orders?
A new system development project is running late against a critical implementation deadline Which of the following is the MOST important activity?
What should an IS auditor do FIRST upon discovering that a service provider did not notify its customers of a security breach?
Which of the following conditions would be of MOST concern to an IS auditor assessing the risk of a successful brute force attack against encrypted data at test?
Which of the following types of firewalls provide the GREATEST degree of control against hacker intrusion?
A sample for testing must include the 80 largest client balances and a random sample of the rest. What should the IS auditor recommend?
Which of the following controls helps to ensure that data extraction queries run by the database administrator (DBA) are monitored?
When planning a review of IT governance, an IS auditor is MOST likely to:
Which of the following is MOST important for an IS auditor to determine during the detailed design phase of a system development project?
Which of the following BEST helps to ensure data integrity across system interfaces?
When determining the quality of evidence collected during an audit, it is MOST important to ensure the evidence is:
Which of the following is the MOST efficient solution for a multi-location healthcare organization that wants to be able to access patient data wherever patients present themselves
for care?
During the evaluation of controls over a major application development project, the MOST effective use of an IS auditor ' s time would be to review and evaluate:
An organization allows its employees lo use personal mobile devices for work. Which of the following would BEST maintain information security without compromising employee privacy?
Which of the following should an IS auditor recommend be done FIRST when an organization is planning to implement an IT compliance program?
The PRIMARY purpose of a vulnerability assessment in a cybersecurity program is to:
Which of the following would BEST ensure that a backup copy is available for restoration of mission critical data after a disaster ' '
Which of the following is the BEST compensating control when segregation of duties is lacking in a small IS department?
Which of the following application input controls would MOST likely detect data input errors in the customer account number field during the processing of an accounts receivable transaction?
What is the Most critical finding when reviewing an organization’s information security management?
The IS quality assurance (OA) group is responsible for:
Which of the following would be MOST effective in detecting the presence of an unauthorized wireless access point on an internal network?
Which of the following is the PRIMARY reason for using a digital signature?
Management has agreed to move the organization ' s data center due to recent flood map changes in its current location. Which risk response has been adopted?
At the end of each business day, a business-critical application generates a report of financial transac-tions greater than a certain value, and an employee
then checks these transactions for errors. What type of control is in place?
What Is the BEST method to determine if IT resource spending is aligned with planned project spending?
An organization has recently acquired and implemented intelligent-agent software for granting loans to customers. During the post-implementation review, which of the following is the MOST important procedure for the IS auditor to perform?
Which type of attack targets security vulnerabilities in web applications to gain access to data sets?
Which of the following is the MAIN risk associated with adding a new system functionality during the development phase without following a project change
management process?
Which of the following is the BEST way to ensure that an application is performing according to its specifications?
Some control activities have been found to be only partially compliant with the design of the control. Which of the following is an IS auditor’s PRIMARY course of action?
Which of the following should be an IS auditor ' s PRIMARY focus when developing a risk-based IS audit program?
Which of the following is the PRIMARY basis on which audit objectives are established?
During the walk-through procedures for an upcoming audit, an IS auditor notes that the key application in scope is part of a Software as a Service (SaaS)
agreement. What should the auditor do NEXT?
Which of the following is a threat to IS auditor independence?
Which of the following would be of MOST concern for an IS auditor evaluating the design of an organization ' s incident management processes?
An IS auditor is providing input to an RFP to acquire a financial application system. Which of the following is MOST important for the auditor to recommend?
Which of the following security measures will reduce the risk of propagation when a cyberattack occurs?
Which of the following is the BEST detective control for a job scheduling process involving data transmission?
An IS auditor observes that an organization ' s systems are being used for cryptocurrency mining on a regular basis. Which of the following is the auditor ' s FIRST course of action?
Which of the following would minimize the risk of losing transactions as a result of a disaster?
Management has learned the implementation of a new IT system will not be completed on time and has requested an audit. Which of the following audit findings should be of GREATEST concern?
The BEST way to determine whether programmers have permission to alter data in the production environment is by reviewing:
In which phase of the internal audit process is contact established with the individuals responsible for the business processes in scope for review?
Which of the following BEST reflects a mature strategic planning process?
Which of the following procedures for testing a disaster recovery plan (DRP) is MOST effective?
Which of the following is MOST appropriate to review when determining if the work completed on an IT project is in alignment with budgeted costs?
Which of the following threats is mitigated by a firewall?
Which of the following poses the GREATEST risk to the use of active RFID tags?
Which of the following BEST enables an IS auditor to prioritize financial reporting spreadsheets for an end-user computing (EUC) audit?
An IS auditor is reviewing the service management of an outsourced help desk. Which of the following is the BEST indicator of how effectively the service provider is performing this function?
Which of the following is MOST useful for determining whether the goals of IT are aligned with the organization ' s goals?
Which of the following is BEST used for detailed testing of a business application ' s data and configuration files?
A steering committee established to oversee an organization ' s digital transformation program is MOSTlikely to be involved with which of the following activities?
Which of the following is the MOST important prerequisite for implementing a data loss prevention (DLP) tool?
Which type of risk would MOST influence the selection of a sampling methodology?
An IS auditor has been asked to review an event log aggregation system to ensure risk management practices have been applied. Which of the following should be of MOST concern to the auditor?
Which of the following is a PRIMARY objective of incident management?
An organization was recently notified by its regulatory body of significant discrepancies in its reporting data. A preliminary investigation revealed that the discrepancies were caused by problems with the organization ' s data quality Management has directed the data quality team to enhance their program. The audit committee has asked internal audit to be advisors to the process. To ensure that management concerns are addressed, which data set should internal audit recommend be reviewed FIRST?
Which of the following should be the FIRST step in a data migration project?
Which of the following is the GREATEST concern when applying emergency patches?
Which of the following is the MOST important consideration when developing tabletop exercises within a cybersecurity incident response plan?
Which of the following should be of GREATEST concern to an |$ auditor reviewing data conversion and migration during the implementation of a newapplication system?
Which of the following would be of GREATEST concern to an IS auditor reviewing the feasibility study for a new application system?
An IS auditor is examining a front-end subledger and a main ledger. Which of the following would be the GREATEST concern if there are flaws in the mapping of accounts between the two systems?
Which of the following operational log management considerations is MOST important for an organization undergoing a digital transformation?
Which of the following should be an IS auditor ' s GREATEST concern when an international organization intends to roll out a global data privacy policy?
Recovery facilities providing a redundant combination of Internet connections to the local communications loop is an example of which type of telecommunications continuity?
A source code repository should be designed to:
Which of the following is the BEST method to prevent wire transfer fraud by bank employees?
Data centers that want to prevent unauthorized personnel from entering during a power outage should ensure external access doors:
An IS auditor is evaluating the log management system for an organization with devices and systems in multiple geographic locations. Which of the following is MOST important for the auditor to verify?
During an organization ' s implementation of a data loss prevention (DLP) solution, which of the following activities should be completed FIRST?
During a follow-up audit, an IS auditor learns that some key management personnel have been replaced since the original audit, and current management has decided not to implement some previously accepted recommendations. What is the auditor ' s BEST course of action?
An organization wants to classify database tables according to its data classification scheme From an IS auditor ' s perspective the tables should be classified based on the:
The implementation of an IT governance framework requires that the board of directors of an organization:
A business has requested an audit to determine whether information stored in an application is adequately protected. Which of the following is the MOST important action before the audit work begins?
Which of following is MOST important to determine when conducting a post-implementation review?
When evaluating information security governance within an organization, which of the following findings should be of MOST concern to an IS auditor?
If a recent release of a program has to be backed out of production, the corresponding changes within the delta version of the code should be:
An IS auditor identifies that a legacy application to be decommissioned in three months cannot meet the security requirements established by the current policy. What is the BEST way (or the auditor to address this issue?
Which of the following is MOST important to include in security awareness training?
Which of the following attack techniques will succeed because of an inherent security weakness in an Internet firewall?
To develop meaningful recommendations ' or findings, which of the following is MOST important ' or an IS auditor to determine and understand?
An IS auditor is reviewing documentation of application systems change control and identifies several patches that were not tested before being put into production. Which of the following is the MOST significant risk from this situation?
An IS auditor is reviewing processes for importing market price data from external data providers. Which of the following findings should the auditor consider MOST critical?
Which of the following would be MOST important to include in an IS audit report?
Who should be the FIRST to evaluate an audit report prior to issuing it to the project steering committee?
An organization has made a strategic decision to split into separate operating entities to improve profitability. However, the IT infrastructure remains shared between the entities. Which of the following would BEST help to ensure that IS audit still covers key risk areas within the IT environment as part of its annual plan?
Which of the following should be used as the PRIMARY basis for prioritizing IT projects and initiatives?
An IS auditor is reviewing an organization ' s system development life cycle (SDLC) Which of the following MUST be included in the review?
Which of the following should an IS auditor ensure is classified at the HIGHEST level of sensitivity?
Which of the following approaches would utilize data analytics to facilitate the testing of a new account creation process?
Which of the following is the PRIMARY role of key performance indicators (KPIs) in supporting business process effectiveness?
An IS auditor has been asked to audit the proposed acquisition of new computer hardware. The auditor’s PRIMARY concern Is that:
An IS auditor is assessing backup performance and observes that the system administrator manually initiates backups during unexpected peak usage. Which of the following is the auditor ' s BEST course of action?
Which of the following is the BEST way to foster continuous improvement of IS audit processes and practices?
To ensure confidentiality through the use of asymmetric encryption, a message is encrypted with which of the following?
Which of the following staff should an IS auditor interview FIRST to obtain a general overview of the various technologies used across different programs?
Controls related to authorized modifications to production programs are BEST tested by:
Which of the following is the BEST source of information for examining the classification of new data?
A programmer has made unauthorized changes lo key fields in a payroll system report. Which of the following control weaknesses would have contributed MOST to this problem?
In a high-volume, real-time system, the MOST effective technique by which to continuously monitor and analyze transaction processing is:
Which of the following is the MOST cost-effective way to determine the effectiveness of a business continuity plan (BCP)?
Which of the following control measures is the MOST effective against unauthorized access of confidential information on stolen or lost laptops?
Which of the following risk scenarios is BEST mitigated through the use of a data loss prevention (DLP) tool?
Which of the following is the MOST important consideration when defining an operational log management strategy?
Which of the following should be the GREATEST concern to an IS auditor reviewing an organization ' s method to transport sensitive data between offices?
Which of the following should be the FIRST step to successfully implement a corporate data classification program?
When an IS auditor needs to confirm that an organization is encrypting sensitive information at a database level, which of the following would provide the BEST assurance?
Which of the following is the MOST important consideration to facilitate prosecution of a perpetrator after a cybercrime?
Which of the following areas is MOST likely to be overlooked when implementing a new data classification process?
Which of the following BEST contributes to the quality of an audit of a business-critical application?
Which of the following is an example of a passive attack method?
An IS auditor is reviewing a decision to consolidate processing for multiple applications onto a single large server. Which of the following is the MOST significant impact from this decision?
An audit identified that a computer system is not assigning sequential purchase order numbers to order requests. The IS auditor is conducting an audit follow-up to determine if management has reserved this finding. Which of two following is the MOST reliable follow-up procedure?
Which of the following is the BEST method to safeguard data on an organization ' s laptop computers?
Which of the following is the PRIMARY role of the IT steering committee?
Which of the following is the BEST way to prevent social engineering incidents?
Which of the following is the MOST important consideration when establishing operational log management?
An IS auditor finds that some employees are using public cloud-based AI tools. Which of the following presents the GREATEST concern?
IT governance should be driven by:
The PRIMARY advantage of object-oriented technology is enhanced:
Which of the following practices associated with capacity planning provides the GREATEST assurance that future incidents related to existing server performance will be prevented?
Which of the following establishes the PRIMARY difference between a business continuity plan (BCP) and a disaster recovery plan (DRP)?
Which of the following should be the GREATEST concern for an IS auditor reviewing recent disaster recovery operations?
Which of the following is an example of a preventative control in an accounts payable system?
An organization conducted an exercise to test the security awareness level of users by sending an email offering a cash reward 10 those who click on a link embedded in the body of the email. Which of the following metrics BEST indicates the effectiveness of awareness training?
Which of the following BEST describes the role of the IS auditor in a control self-assessment (CSA)?
Which of the following is the PRIMARY advantage of using an automated security log monitoring tool instead of conducting a manual review to monitor the use of privileged access?
During the planning phase of a data loss prevention (DLP) audit, management expresses a concern about mobile computing. Which of the following should the IS auditor identity as the associated risk?
Which of the following IT service monitoring tools is MOST effective in identifying abnormal system events?
The PRIMARY objective of value delivery in reference to IT governance is to:
What is the MOST effective way to detect installation of unauthorized software packages by employees?
An organization is implementing a new system that supports a month-end business process. Which of the following implementation strategies would be MOST efficient to decrease business downtime?
An IS auditor concludes that logging and monitoring mechanisms within an organization are ineffective because critical servers are not included within the central log repository. Which of the following audit procedures would have MOST likely identified this exception?
An organization wants to use virtual desktops to deliver corporate applications to its end users. Which of the following should an IS auditor recommend to prevent domain name system (DNS) poisoning in their cloud environment?
An organization is concerned with meeting new regulations for protecting data confidentiality and asks an IS auditor to evaluate their procedures for transporting data. Which of the
following would BEST support the organization ' s objectives?
One advantage of monetary unit sampling is the fact that
Which type of control has been established when an organization implements a security information and event management (SIEM) system?
Which of the following is an audit reviewer ' s PRIMARY role with regard to evidence?
How does the emergence of quantum computing impact traditional data encryption methods?
An organization is ready to implement a new IT solution consisting of multiple modules. The last module updates the processed data into the database. Which of the following findings should be of MOST concern to the IS auditor?
Which of the following should be of MOST concern to an IS auditor reviewing the information systems acquisition, development, and implementation process?
An IS auditor notes that the previous year ' s disaster recovery test was not completed within the scheduled time frame due to insufficient hardware allocated by a third-party vendor. Which of the following provides the BEST evidence that adequate resources are now allocated to successfully recover the systems?
An organization is establishing a steering committee for the implementation of a new enterprise resource planning (ERP) system that uses Agile project management methodology. What is the MOST important criterion for the makeup of this committee?
When reviewing hard disk utilization reports, an IS auditor observes that utilization is routinely above 95%. Which of the following should be the GREATEST concern to the IS auditor?
Which of the following observations should be of GREATEST concern to an IS auditor reviewing an organization ' s enterprise architecture (EA) program?
Which of the following is the BEST control to mitigate the risk of shadow IT?
Which of the following encryption methods offers the BEST wireless security?
Which of the following is the GREATEST benefit of adopting an international IT governance framework rather than establishing a new framework based on the actual situation of a specific organization1?
To enable the alignment of IT staff development plans with IT strategy, which of the following should be done FIRST?
Due to advancements in technology and electronic records, an IS auditor has completed an engagement by email only. Which of the following did the IS auditor potentially compromise?
What type of control has been implemented when secure code reviews are conducted as part of a deployment program?
Which of the following is the BEST indicator of the effectiveness of an organization ' s incident response program?
An external IS auditor is reviewing the continuous monitoring system for a large bank and notes several potential issues. Which of the following would present the GREATEST concern regarding the reliability of the monitoring system?
Which of the following tests is MOST likely to detect an error in one subroutine resulting from a recent change in another subroutine?
Which of the following should an IS auditor consider the MOST significant risk associated with a new health records system that replaces a legacy system?
Which of the following is MOST important for an IS auditor to verify when reviewing the planned use of Benford ' s law as a data analytics technique to detect fraud in a set of credit card transactions?
Which of the following is the BEST method to safeguard data on an organization ' s laptop computers?
Which of the following should an IS auditor recommend be done FIRST when an organization is made aware of a new regulation that is likely to impact IT security requirements?
Demonstrated support from which of the following roles in an organization has the MOST influence over information security governance?
The PRIMARY role of an IS auditor in the remediation of problems found during an audit engagement is to:
During an IT general controls audit of a high-risk area where both internal and external audit teams are reviewing the same approach to optimize resources?
Which of the following information security requirements BE ST enables the tracking of organizational data in a bring your own device (BYOD) environment?
During an audit of an organization ' s risk management practices, an IS auditor finds several documented IT risk acceptances have not been renewed in a timely manner after the assigned expiration date When assessing the seventy of this finding, which mitigating factor would MOST significantly minimize the associated impact?
An IS auditor has completed the fieldwork phase of a network security review and is preparing the initial following findings should be ranked as the HIGHEST risk?
A new regulation requires organizations to report significant security incidents to the regulator within 24 hours of identification. Which of the following is the IS auditor ' s BEST recommendation to facilitate compliance with the regulation?
Which of the following would be the GREATEST concern for an IS auditor conducting a pre-implementation review of a data loss prevention (DLP > tool?
Which of the following is the BEST way to identify key areas for a risk-based audit plan?
Which of the following is the GREATEST advantage of maintaining an internal IS audit function within an organization?
Which of the following would BEST indicate the effectiveness of a security awareness training program?
Which of the following should be an IS auditor ' s GREATEST concern when a data owner assigns an incorrect classification level to data?
Which of the following provides the MOST reliable method of preventing unauthonzed logon?
Which of the following poses the GREATEST risk to an organization when employees use public social networking sites?
Which of the following system redundancy configurations BEST improves system resiliency and reduces the possibility of a single cause of failure impacting system dependability?
An incident response team has been notified of a virus outbreak in a network subnet. Which of the following should be the NEXT step?
A financial accounting system audit determined that audit logging of transactions had been disabled by a finance employee. The IS auditor recommended that finance personnel no longer have the capability to change audit logging settings. Which of the following is MOST important to verify during the follow-up?
Which of the following is a social engineering attack method?
Which of the following is the BEST way to sanitize a hard disk for reuse to ensure the organization ' s information cannot be accessed?
The use of access control lists (ACLs) is the MOST effective method to mitigate security risk for routers because they: (Identify Correct answer and related explanation/references from CISA Certification - Information Systems Auditor official Manual or book)
An IS auditor reviewing the threat assessment tor a data center would be MOST concerned if:
An IS auditor is analyzing a sample of accounts payable transactions for a specific vendor and identifies one transaction with a value five times as high as the average transaction. Which of the following should the auditor do NEXT?
Which of the following would BEST reduce the risk of application programming interface (API) unavailability?
An organization has decided to build a data warehouse using source data from several disparate systems to support strategic decision-making.
Which of the following is the BEST way to ensure the accuracy and completeness of the data used to support business decisions?
Which of the following methods BEST enforces data leakage prevention in a multi-tenant cloud environment?
An IS auditor is reviewing a bank ' s service level agreement (SLA) with a third-party provider that hosts the bank ' s secondary data center, which of the following findings should be of GREATEST concern to the auditor?
Which of the following is MOST appropriate to prevent unauthorized retrieval of confidential information stored in a business application system?
Which of the following is MOST important for an IS auditor to look
for in a project feasibility study?
Which of following areas is MOST important for an IS auditor to focus on when reviewing the maturity model for a technology organization?
Which of the following is the BEST metric to measure the alignment of IT and business strategy?
Which of the following provides the BEST assurance of data integrity after file transfers?
Which of the following BEST indicates a need to review an organization ' s information security policy?
A senior auditor is reviewing work papers prepared by a junior auditor indicating that a finding was removed after the auditee said they corrected the problem. Which of the following is the senior auditor s MOST appropriate course of action?
Which of the following findings from a network security review presents the GREATEST risk to the organization?
Which of the following is the MOST important outcome of an information security program?
Aligning IT strategy with business strategy PRIMARILY helps an organization to:
The due date of an audit project is approaching, and the audit manager has determined that only 60% of the audit has been completed. Which of the following should the audit manager do FIRST?
Which of the following is the BEST approach to validate whether a streaming site can continue to provide service during a period of live streaming with an anticipated high volume of viewers?
Which of the following MUST be completed as part of the annual audit planning process?
Which of the following user actions poses the GREATEST risk for inadvertently introducing malware into a local network?
The purpose of a checksum on an amount field in an electronic data interchange (EDI) communication of financial transactions is to ensure:
Which of the following is the PRIMARY purpose of obtaining a baseline image during an operating system audit?
A bank performed minor changes to the interest calculation computer program. Which of the following techniques would provide the STRONGEST evidence to determine whether the interest calculations are correct?
An organization ' s software developers need access to personally identifiable information (Pll) stored in a particular data format. Which of the following is the BEST way to protect this sensitive information while allowing the developers to use it in development and test environments?
An organization ' s enterprise architecture (EA) department decides to change a legacy system ' s components while maintaining its original functionality. Which of the following is MOST important for an IS auditor to understand when reviewing this decision?
Which of the following poses the GREATEST potential concern for an organization that decides to consolidate mission-critical applications on a large server as part of IT capacity management?
Which of the following is the BEST way to ensure that business continuity plans (BCPs) will work effectively in the event of a major disaster?
One advantage of managing an entire collection of projects as a portfolio is that it highlights the need to:
Which of the following observations should be of GREATEST concern to an IS auditor assessing access controls for the accounts payable module of a finance system?
Which of the following MUST be performed by senior audit leadership prior to starting an IS audit project?
Which of the following is MOST important to review during the project initiation phase of developing and deploying a new application?
An external attacker spoofing an internal Internet Protocol (IP) address can BEST be detected by which of the following?
An organization plans to replace its nightly batch processing backup to magnetic tape with real-time replication to a second data center. Which of the following is the GREATEST risk associated with this change?
Which of the following is MOST important to ensure that electronic evidence collected during a forensic investigation will be admissible in future legal proceedings?
Which of the following is the BEST methodology to use for estimating the complexity of developing a large business application?
Which of the following should be done FIRST to ensure the secure configuration of new IT assets in an organization?
An organization is disposing of a system containing sensitive data and has deleted all files from the hard disk. An IS auditor should be concerned because:
When physical destruction IS not practical, which of the following is the MOST effective means of disposing of sensitive data on a hard disk?
The PRIMARY benefit of information asset classification is that it:
Which of the following is MOST effective for controlling visitor access to a data center?
When planning an internal penetration test, which of the following is the MOST important step prior to finalizing the scope of testing?
In which of the following system development life cycle (SDLC) phases would an IS auditor expect to find that controls have been incorporated into system specifications?
Which of the following is a PRIMARY benefit of using risk assessments to determine areas to be included in an audit plan?
Which of the following features of a library control software package would protect against unauthorized updating of source code?
Management is concerned about sensitive information being intentionally or unintentionally emailed as attachments outside the organization by employees. What is the MOST important task before implementing any associated email controls?
Which of the following is an IS auditor ' s BEST recommendation for mitigating risk associated with inadvertent disclosure of sensitive information by employees?
Cross-site scripting (XSS) attacks are BEST prevented through:
Which of the following is the BEST indication that there are potential problems within an organization ' s IT service desk function?
The PRIMARY benefit lo using a dry-pipe fire-suppression system rather than a wet-pipe system is that a dry-pipe system:
Which of the following provides the BEST evidence that a third-party service provider ' s information security controls
are effective?
Which of the following is the PRIMARY reason for an IS audit manager to review the work performed by a senior IS auditor prior to presentation of a report?
Which of the following provides the MOST assurance over the completeness and accuracy ol loan application processing with respect to the implementation of a new system?
Spreadsheets are used to calculate project cost estimates. Totals for each cost category are then keyed into the job-costing system. What is the BEST control to ensure that data is accurately entered into the system?
An organization has alternative links in its wide area network (WAN) to provide redundancy. However, each time there is a problem with a link, network administrators have to update the configuration to divert traffic to the other link. Which of the following would be an IS auditor ' s BEST recommendation?
An IS auditor is reviewing an organization ' s business continuity plan (BCP) following a change in organizational structure with significant impact to business processes. Which of the following findings should be the auditor ' s GREATEST concern?
Which of the following should be an IS auditor ' s GREATEST consideration when scheduling follow-up activities for agreed-upon management responses to remediate audit observations?
An IS auditor decides to review a data inventory list captured directly from a system instead of relying on an interview with the system owner. Which of the following provides the BEST justification for the auditor ' s decision?
During a physical security audit, an IS auditor was provided a proximity badge that granted access to three specific floors in a corporate office building. Which of the following issues should be of MOST concern?
An organization plans to receive an automated data feed into its enterprise data warehouse from a third-party service provider. Which of the following would be the BEST way to prevent accepting bad data?
An IS auditor is analyzing a sample of accesses recorded on the system log of an application. The auditor intends to launch an intensive investigation if one exception is found Which sampling method would be appropriate?
Which of the following would present the GREATEST concern during a review of internal audit quality assurance (QA) and continuous improvement processes?
An organization has introduced a capability maturity model to the system development life cycle (SDLC) to measure improvements. Which of the following is the BEST indication of successful process improvement?
In a 24/7 processing environment, a database contains several privileged application accounts with passwords set to never expire. Which of the following recommendations would BEST address the risk with minimal disruption to the business?
Which of the following represents the HIGHEST level of maturity of an information security program?
An IS auditor has learned that access privileges are not periodically reviewed or updated. Which of the following would provide the BEST evidence to determine whether transactions have been executed by authorized employees?
An organization is migrating its HR application to an Infrastructure as a Service (laaS) model in a private cloud. Who is PRIMARILY responsible for the security configurations of the deployed application ' s operating system?
Which of the following BEST describes the role of a document owner when implementing a data classification policy in an organization?
Which of the following should be an IS auditor ' s GREATEST concern when evaluating an organization ' s ability to recover from system failures?
A staff accountant regularly uploads spreadsheets with inventory levels to the organization ' s financial reporting system. The transfers are executed through a customized interface created by an in-house developer. Which of the following is MOST important for the IS auditor to confirm during a review of the interface?
Which of the following is the MOST important responsibility of user departments associated with program changes?
A finance department has a multi-year project to upgrade the enterprise resource planning (ERP) system hosting the general ledger. and in year one, the system version upgrade will be applied. Which of the following should be the PRIMARY focus of the IS auditor reviewing the first year of the project?
Which of the following is the BEST reason for an IS auditor to emphasize to management the importance of using an IT governance framework?
Which of the following is the PRIMARY benefit of a tabletop exercise for an incident response plan?
In continuous delivery, the critical connector between development and production is:
An organization has recently become aware of a pervasive chip-level security vulnerability that affects all of its processors. Which of the following is the BEST way to prevent this vulnerability from being exploited?
A secure server room has a badge reader system that records name, date, and time information whenever a staff member uses a badge to enter or exit. When reviewing the system logs, an IS auditor notices records for some employees entering, but not exiting, the room. Which of the following would be the MOST effective compensating control to recommend?
Which of the following should be of GREATEST concern to an IS auditor for work-from-anywhere scenarios as compared to work from home or work from office?
What should an IS auditor recommend to management as the MOST important action before selecting a Software as a Service (SaaS) vendor?
Which of the following environments is BEST used for copying data and transformation into a compatible data warehouse format?
An organization uses public key infrastructure (PKI) to provide email security. Which of the following would be the MOST efficient method to determine whether email messages have been modified in transit?
During a project audit, an IS auditor notes that project reporting does not accurately reflect current progress. Which of the following is the GREATEST resulting impact?
One benefit of return on investment (ROI) analysts in IT decision making is that it provides the:
When auditing IT organizational structure, which of the following findings presents the GREATEST risk to an organization?
Which of the following would be of GREATEST concern to an IS auditor reviewing an IT strategy document?
Which of the following is the GREATEST risk of using a reciprocal site for disaster recovery?
An organization allows employees to retain confidential data on personal mobile devices. Which of the following is the BEST recommendation to mitigate the risk of data leakage from lost or stolen devices?
Which of the following is the BEST way to ensure an organization ' s data classification policies are preserved during the process of data transformation?
Which of the following findings would be of GREATEST concern to an IS auditor assessing an organization ' s patch management process?
Which of the following should be the FRST step when developing a data toes prevention (DIP) solution for a large organization?
An organization ' s networking team wants to route data between two virtual local area networks (VLANs). Which type of device is the BEST recommendation for installation of the VLANs?
When planning an audit to assess controls for an application in the cloud environment, it is MOST important for an IS auditor to understand:
Which of the following BEST enables an organization to standardize its IT infrastructure to align with business goals?
Which of the following represents the GREATEST risk to virtualized environments?
In a data center audit, an IS auditor finds that the humidity level is very low. The IS auditor would be MOST concerned because of an expected increase in:
An IS auditor has discovered that a software system still in regular use is years out of date and no longer supported. The auditee has stated that it will take six months until the software is running on the current version. Which of the following is the BEST way to reduce the immediate risk associated with using an unsupported version of the software?
Which of the following findings should be of GREATEST concern to an IS auditor assessing the risk associated with end-user computing (EUC) in an organization?
The operations team of an organization has reported an IS security attack Which of the following should be the FIRST step for the security incident response team?
An IS auditor is reviewing the backup procedures in an organization that has high volumes of data with frequent changes to transactions. Which of the following is the BEST backup scheme to recommend given the need for a shorter restoration time in the event of a disruption?
Which of the following is the MOST effective way to ensure adequate system resources are available for high-priority activities?
Which of the following is the PRIMARY purpose of a rollback plan for a system change?
An IT governance body wants to determine whether IT service delivery is based on consistently effective processes. Which of the following is the BEST approach?
which of the following is a core functionality of a configuration and release management system?
Which of the following is MOST helpful to an IS auditor reviewing the alignment of planned IT budget with the organization ' s goals and strategic objectives?
A bank has a combination of corporate customer accounts (higher monetary value) and small business accounts (lower monetary value) as part of online banking. Which of the following is the BEST sampling approach for an IS auditor to use for these accounts?
Due to a recent business divestiture, an organization has limited IT resources to deliver critical projects Reviewing the IT staffing plan against which of the following would BEST guide IT management when estimating resource requirements for future projects?
Which of the following is the BEST performance indicator for the effectiveness of an incident management program?
Which of the following is the MOST effective control to mitigate against the risk of inappropriate activity by employees?
Which of the following MOST effectively minimizes downtime during system conversions?
An IS auditor is assigned to review the IS department s quality procedures. Upon contacting the IS manager, the auditor finds that there is an informal unwritten set of standards Which of the following should be the auditor ' s NEXT action1?
Which of the following is the BEST indication of effective governance over IT infrastructure?
Which of the following is an IS auditor ' s BEST approach when prepanng to evaluate whether the IT strategy supports the organization ' s vision and mission?
Which of the following network topologies will provide the GREATEST fault tolerance?
An IS auditor is reviewing a data conversion project. Which of the following is the auditor ' s BEST recommendation prior to go-live?
In a RAO model, which of the following roles must be assigned to only one individual?
When designing a data analytics process, which of the following should be the stakeholder ' s role in automating data extraction and validation?
The decision to accept an IT control risk related to data quality should be the responsibility of the:
Which of the following BEST addresses the availability of an online store?
Which of the following would BEST demonstrate that an effective disaster recovery plan (DRP) is in place?
An IS auditor discovers an option in a database that allows the administrator to directly modify any table. This option is necessary to overcome bugs in the software, but is rarely used. Changes to tables are automatically logged. The IS auditor ' s FIRST action should be to:
An organization ' s security team created a simulated production environment with multiple vulnerable applications. What would be the PRIMARY purpose of creating such an environment?
Following a breach, what is the BEST source to determine the maximum amount of time before customers must be notified that their personal information may have been compromised?
Which of the following BEST protects an organization ' s proprietary code during a joint-development activity involving a third party?
In an area susceptible to unexpected increases in electrical power, which of the following would MOST effectively protect the system?
A disaster recovery plan (DRP) should include steps for:
Which of the following should be of GREATEST concern to an IS auditor assessing the effectiveness of an organization ' s information security governance?
An IS auditor finds that a key Internet-facing system is vulnerable to attack and that patches are not available. What should the auditor recommend be done FIRST?
An organization establishes capacity utilization thresholds and monitors for instances when thresholds are exceeded. Which of the following is BEST supported by this activity?
In a public key cryptographic system, which of the following is the PRIMARY requirement to address the risk of man-in-the-middle attacks through spoofing?
A transaction processing system interfaces with the general ledger. Data analytics has identified that some transactions are being recorded twice in the general ledger. While management states a system fix has been implemented, what should the IS auditor recommend to validate the interface is working in the future?
During the course of fieldwork, an internal IS auditor observes a critical vulnerability within a newly deployed application. What is the auditor ' s BEST course of action?
Which of the following is the PRIMARY advantage of using visualization technology for corporate applications?
Which of the following is the BEST way to ensure a vendor complies with system security requirements?
Which of the following should be of MOST concern to an IS auditor reviewing an organization ' s operational log management?
An IS auditor is conducting a post-implementation review of an enterprise resource planning (ERP) system. End users indicated concerns with the accuracy of critical automatic calculations made by the system. The auditor ' s FIRST course of action should be to:
An IS auditor is reviewing the perimeter security design of a network. Which of the following provides the GREATEST assurance outgoing Internet traffic is controlled?
Based on best practices, which types of accounts should be disabled for interactive login?
Which of the following provides the MOST assurance of the integrity of a firewall log?
Which of the following provides an IS auditor assurance that the interface between a point-of-sale (POS) system and the general ledger is transferring sales data completely and accurately?
Which of the following is the PRIMARY advantage of parallel processing for a new system implementation?
What is the GREATEST concern for an IS auditor reviewing contracts for licensed software that executes a critical business process?
An IS auditor notes that several employees are spending an excessive amount of time using social media sites for personal reasons. Which of the following should the auditor recommend be performed FIRST?
Which of the following should be an IS auditor ' s GREATEST concern when reviewing an organization ' s security controls for policy compliance?
Which of the following is MOST helpful for evaluating benefits realized by IT projects?
Which of the following would BEST help to ensure that potential security issues are considered by the development team as part of incremental changes to agile-developed software?
An IS audit reveals that an organization operating in business continuity mode during a pandemic situation has not performed a simulation test of the
business continuity plan (BCP). Which of the following is the auditor ' s BEST course of action?
The PRIMARY objective of a follow-up audit is to:
Which of the following is MOST critical for the effective implementation of IT governance?
Secure code reviews as part of a continuous deployment program are which type of control?
Which of the following BEST enables alignment of IT with business objectives?
An IS auditor finds that a new network connection allows communication between the Internet and the internal enterprise resource planning (ERP) system. Which of the following is the PRIMARY business impact to include when presenting this observation to management?
An organization recently migrated Us data warehouse from a legacy system to a different architecture in the cloud. Which of the following should be of GREATEST concern to the IS auditor reviewing the new data architecture?
Which of the following methods would MOST effectively provide positive authentication for physical access?
An incorrect version of the source code was amended by a development team. This MOST likely indicates a weakness in:
Which of the following is the MOST important control for virtualized environments?
An organization is planning to implement a work-from-home policy that allows users to work remotely as needed. Which of the following is the BEST solution for ensuring secure remote access to corporate resources?
Which of the following controls BEST ensures appropriate segregation of duties within an accounts payable department?
An organization has both an IT strategy committee and an IT steering committee. When reviewing the minutes of the IT steering committee, an IS auditor would expect to find that the
committee:
During a pre-deployment assessment, what is the BEST indication that a business case will lead to the achievement of business objectives?
Which of the following is an analytical review procedure for a payroll system?
A review of IT interface controls finds an organization does not have a process to identify and correct records that do not get transferred to the receiving system. Which of the following is the IS
auditor ' s BEST recommendation?
Which of the following BEST minimizes performance degradation of servers used to authenticate users of an e-commerce website?
Which of the following is the BEST audit procedure to determine whether a firewall is configured in compliance with the organization ' s security policy?
Which of the following provides the BEST evidence that IT portfolio management is aligned with organizational strategies?
Which of the following is MOST important to include in a feasibility study when developing a business case for an IT investment?
An IS auditor finds an IT manager recently changed a Software as a Service (SaaS) provider contract in an effort to cut costs. The new contract increases the time to resolve incidents. Which of the following should be the auditor’s GREATEST concern?
Audit frameworks cart assist the IS audit function by:
When designing metrics for information security, the MOST important consideration is that the metrics:
Which of the following is MOST important to consider when scheduling follow-up audits?
In reviewing the IT strategic plan, the IS auditor should consider whether it identifies the:
Which of the following should be the IS auditor ' s PRIMARY focus, when evaluating an organization ' s offsite storage facility?
An auditee disagrees with a recommendation for corrective action that appears in the draft engagement report. Which of the following is the IS auditor ' s BEST course of action when preparing the final report?