Certified Information Systems Auditor Questions and Answers
Stress testing should ideally be earned out under a:
An IS auditor is reviewing an industrial control system (ICS) that uses older unsupported technology in the scope of an upcoming audit. What should the auditor consider the MOST significant concern?
During the implementation of a new system, an IS auditor must assess whether certain automated calculations comply with the regulatory requirements Which of the following is the BEST way to obtain this assurance?
Which of the following would lead an IS auditor to conclude that the evidence collected during a digital forensic investigation would not be admissible in court?
Which of the following is the PRIMARY reason to follow a configuration management process to maintain application?
Due to limited storage capacity, an organization has decided to reduce the actual retention period for media containing completed low-value transactions. Which of the following is MOST important for the organization to ensure?
Which of the following would BEST manage the risk of changes in requirements after the analysis phase of a business application development project?
Which of the following is the BEST source of information tor an IS auditor to use when determining whether an organization's information security policy is adequate?
Which of the following is an example of a preventative control in an accounts payable system?
Which of the following is MOST helpful for measuring benefits realization for a new system?
An organization has recently implemented a Voice-over IP (VoIP) communication system. Which ot the following should be the IS auditor's PRIMARY concern?
During an IT governance audit, an IS auditor notes that IT policies and procedures are not regularly reviewed and updated. The GREATEST concern to the IS auditor is that policies and procedures might not:
The IS quality assurance (OA) group is responsible for:
In an online application, which of the following would provide the MOST information about the transaction audit trail?
Which of the following would MOST effectively ensure the integrity of data transmitted over a network?
The performance, risks, and capabilities of an IT infrastructure are BEST measured using a:
Which of the following occurs during the issues management process for a system development project?
Which of the following is the BEST indicator of the effectiveness of an organization's incident response program?
Which of the following is the BEST way for an organization to mitigate the risk associated with third-party application performance?
An organization is considering allowing users to connect personal devices to the corporate network. Which of the following should be done FIRST?
An IS auditor should ensure that an application's audit trail:
Which of the following observations would an IS auditor consider the GREATEST risk when conducting an audit of a virtual server farm tor potential software vulnerabilities?
Due to a recent business divestiture, an organization has limited IT resources to deliver critical projects Reviewing the IT staffing plan against which of the following would BEST guide IT management when estimating resource requirements for future projects?
Which of the following types of firewalls provide the GREATEST degree of control against hacker intrusion?
An IS audit learn is evaluating the documentation related to the most recent application user-access review performed by IT and business management It is determined that the user list was not system-generated. Which of the following should be the GREATEST concern?
Which of the following must be in place before an IS auditor initiates audit follow-up activities?
Which of the following should an IS auditor consider the MOST significant risk associated with a new health records system that replaces a legacy system?
Which of the following is the BEST indicator of the effectiveness of signature-based intrusion detection systems (lDS)?
An IS auditor is reviewing an organization's primary router access control list. Which of the following should result in a finding?
An organization has assigned two now IS auditors to audit a now system implementation. One of the auditors has an IT-related degree, and one has a business degree. Which ol the following is MOST important to meet the IS audit standard for proficiency?
Which of the following would be an appropriate rote of internal audit in helping to establish an organization's privacy program?
A new system is being developed by a vendor for a consumer service organization. The vendor will provide its proprietary software once system development is completed Which of the following is the MOST important requirement to include In the vendor contract to ensure continuity?
An IS auditor finds a high-risk vulnerability in a public-facing web server used to process online customer payments. The IS auditor should FIRST
Following a security breach in which a hacker exploited a well-known vulnerability in the domain controller, an IS audit has been asked to conduct a control assessment. the auditor's BEST course of action would be to determine if:
An IS auditor learns the organization has experienced several server failures in its distributed environment. Which of the following is the BEST recommendation to limit the potential impact of server failures in the future?
Due to system limitations, segregation of duties (SoD) cannot be enforced in an accounts payable system. Which of the following is the IS auditor's BEST recommendation for a compensating control?
A new regulation in one country of a global organization has recently prohibited cross-border transfer of personal data. An IS auditor has been asked to determine the organization's level of exposure In the affected country. Which of the following would be MOST helpful in making this assessment?
Upon completion of audit work, an IS auditor should:
During the planning stage of a compliance audit, an IS auditor discovers that a bank's inventory of compliance requirements does not include recent regulatory changes related to managing data risk. What should the auditor do FIRST?
In which phase of penetration testing would host detection and domain name system (DNS) interrogation be performed?
Which of the following environments is BEST used for copying data and transformation into a compatible data warehouse format?
After the merger of two organizations, which of the following is the MOST important task for an IS auditor to perform?
Which of the following conditions would be of MOST concern to an IS auditor assessing the risk of a successful brute force attack against encrypted data at test?
Which of the following is MOST important to verify when determining the completeness of the vulnerability scanning process?
Which of the following is the GREATEST risk associated with storing customer data on a web server?
Which of the following is MOST important to consider when scheduling follow-up audits?
An IS auditor is reviewing the release management process for an in-house software development solution. In which environment Is the software version MOST likely to be the same as production?
An IS auditor performs a follow-up audit and learns the approach taken by the auditee to fix the findings differs from the agreed-upon approach confirmed during the last audit. Which of the following should be the auditor's NEXT course of action?
Which of the following BEST protects an organization's proprietary code during a joint-development activity involving a third party?
An IS auditor is conducting a review of a data center. Which of the following observations could indicate an access control Issue?
Which of the following is the PRIMARY role of the IS auditor m an organization's information classification process?
Which of the following is a detective control?
Which of the following is a social engineering attack method?
Which of the following activities provides an IS auditor with the MOST insight regarding potential single person dependencies that might exist within the organization?
An organization plans to receive an automated data feed into its enterprise data warehouse from a third-party service provider. Which of the following would be the BEST way to prevent accepting bad data?
Which of the following business continuity activities prioritizes the recovery of critical functions?
Which of the following is the MOST appropriate and effective fire suppression method for an unstaffed computer room?
Which of the following provides IS audit professionals with the BEST source of direction for performing audit functions?
A third-party consultant is managing the replacement of an accounting system. Which of the following should be the IS auditor's GREATEST concern?
During a follow-up audit, it was found that a complex security vulnerability of low risk was not resolved within the agreed-upon timeframe. IT has stated that the system with the identified vulnerability is being replaced and is expected to be fully functional in two months Which of the following is the BEST course of action?
An organization that has suffered a cyber-attack is performing a forensic analysis of the affected users' computers. Which of the following should be of GREATEST concern for the IS auditor reviewing this process?
Which of the following would BEST help lo support an auditor’s conclusion about the effectiveness of an implemented data classification program?
An organization with many desktop PCs is considering moving to a thin client architecture. Which of the following is the MAJOR advantage?
The BEST way to determine whether programmers have permission to alter data in the production environment is by reviewing:
The due date of an audit project is approaching, and the audit manager has determined that only 60% of the audit has been completed. Which of the following should the audit manager do FIRST?
A now regulation requires organizations to report significant security incidents to the regulator within 24 hours of identification. Which of the following is the IS auditor’s BEST recommendation to facilitate compliance with the regulation?
Which of the following BEST enables the timely identification of risk exposure?
An IS auditor finds that an organization's data loss prevention (DLP) system is configured to use vendor default settings to identify violations. The auditor's MAIN concern should be that:
Which of the following is MOST important for an IS auditor to do during an exit meeting with an auditee?
Which of the following security risks can be reduced by a property configured network firewall?
During an exit interview, senior management disagrees with some of me facts presented m the draft audit report and wants them removed from the report. Which of the following would be the auditor's BEST course of action?
An IS auditor found that operations personnel failed to run a script contributing to year-end financial statements. Which of the following is the BEST recommendation?
A startup organization wants to develop a data loss prevention (DLP) program. The FIRST step should be to implement:
An organization has decided to purchase a web-based email service from a third-party vendor and eliminate its own email server infrastructure. What type of cloud computing environment would BEST meet the organization's objective?
An IS auditor is reviewing a medical device that is attached to a patient’s body, which automatically takes and uploads measurements to a cloud server. Treatment may be updated based on the measurements. Which of the following should be the auditor's PRIMARY focus?
Which of the following would be of GREATEST concern to an IS auditor reviewing the resiliency of an organizational network that has two internet connections?
Which of the following provides the BEST evidence that all elements of a business continuity plan (BCP) are operating effectively?
Which of the following BEST enables an IS auditor to prioritize financial reporting spreadsheets for an end-user computing (EUC) audit?
Which of the following is the MOST effective way to evaluate the physical security of a data center?
An IS auditor is reviewing an organization that performs backups on local database servers every two weeks and does not have a formal policy to govern data backup and restoration procedures. Which of the following findings presents the GREATEST risk to the organization?
Which of the following is the BEST review for an IS auditor to conduct when a vulnerability has been exploited by an employee?
Which of the following is MOST appropriate to review when determining if the work completed on an IT project is in alignment with budgeted costs?
Which of the following is the MOST important consideration of any disaster response plan?
An IS auditor wants to verify alignment of the organization's business continuity plan (BCP) with the business strategy. Which of the following would be MOST helpful to review?
When an organization conducts business process improvements, the IS auditor should be MOST concerned with the:
When reviewing the disaster recovery strategy, IT management identified an application that requires a short recovery point objective (RPO). Which of the following data restoration strategies would BEST enable the organization to meet this objective?
An organization that has decided to approve the use of end-user computing (EUC) should FIRST ensure:
An organization's strategy to source certain IT functions from a Software as a Service (SaaS) provider should be approved by the:
Which of the following is the MOST likely root cause of shadow IT in an organization?
The PRIMARY reason to perform internal quality assurance (QA) for an internal audit function is to ensure:
Management has requested a post-implementation review of a newly implemented purchasing package to determine the extent that business requirements are being met. Which of the following
is MOST likely to be assessed?
When selecting a new data loss prevention (DLP) solution, the MOST important consideration is that the solution:
Which of the following types of firewalls provides the GREATEST degree of control against hacker intrusion?
An organization allows programmers to change production systems in emergency situations without seeking prior approval. Which of the following controls should an IS auditor consider MOST
important?
In which phase of the audit life cycle process should an IS auditor initially discuss observations with management?
The GREATEST concern for an IS auditor reviewing vulnerability assessments by the auditee would be if the assessments are:
Which of the following security testing techniques is MOST effective for confirming that inputs to a web application have been properly sanitized?
Which of the following will provide the GREATEST assurance to IT management that a quality management system (QMS) is effective?
An organization's information security policies should be developed PRIMARILY on the basis of:
In a data center audit, an IS auditor finds that the humidity level is very low. The IS auditor would be MOST concerned because of an expected increase in:
An organization wants to classify database tables according to its data classification scheme From an IS auditor's perspective the tables should be classified based on the:
Which of the following recommendations would BEST prevent the implementation of IT projects without collaborating with the business?
Which of the following protocols should be used when transferring data via the internet?
An IS auditor is reviewing an organization's system development life cycle (SDLC) Which of the following MUST be included in the review?
Following a merger, a review of an international organization determines the IT steering committee's decisions do not extend to regional offices as required in the consolidated IT operating model. Which of the following is the IS auditor's BEST recommendation?
An organization has decided to reengineer business processes to improve the performance of overall IT service delivery. Which of the following recommendations from the project team should be the GREATEST concern to the IS auditor?
To help determine whether a controls-reliant approach to auditing financial systems in a company should be used, which sequence of IS audit work is MOST appropriate?
Which of the following is MOST important when creating a forensic image of a hard drive?
When reviewing whether IT investments are meeting business objectives, which of the following evaluations would be MOST useful?
An external attacker spoofing an internal Internet Protocol (IP) address can BEST be detected by which of the following?
An IS auditor is assessing the adequacy of management's remediation action plan. Which of the following should be the MOST important consideration?
Which of the following is the PRIMARY reason for an airline's IT management to continuously monitor the controls for a critical integrated flight schedule and payment application?
Which of the following is the BEST indicator that a third-party vendor adheres to the controls required by the organization?
An organization has moved all of its infrastructure to the cloud. Which of the following would be an IS auditor’s GREATEST concern related to the organization’s ability to continue operations in case of a disaster?
Which of the following job scheduling schemes for operating system updates is MOST likely to adequately balance protection of workstations with user requirements?
Which of the following is an effective way to ensure the integrity of file transfers in a peer-to-peer (P2P) computing environment?
An organization saves confidential information in a file with password protection and the file is placed in a shared folder. An attacker has stolen this information by obtaining the password through social engineering. Implementing which of the following would BEST enable the organization to prevent this type of incident in the future?
Which of the following should be the GREATEST concern to an IS auditor reviewing the information security framework of an organization?
The PRIMARY objective of the disaster recovery planning process is to:
What should be an IS auditor's PRIMARY focus when reviewing a patch management procedure in an environment where availability is a top priority?
Which of the following is the BEST method for converting system-generated log files into a format suitable for data analysis?
Which of the following measures BEST mitigates the risk of data exfiltration during a cyberattack?
Using swipe cards to limit employee access to restricted areas requires implementing which additional control?
The PRIMARY reason to perform internal quality assurance (QA) for an internal audit function is to ensure:
Based on best practices, which types of accounts should be disabled for interactive login?
Which of the following documents should define roles and responsibilities within an IT audit organization?
Which of the following key performance indicators (KPIs) provides stakeholders with the MOST useful information about whether information security risk is being managed?
Management has decided to accept a risk in response to a draft audit recommendation. Which of the following should be the IS auditor’s NEXT course of action?
A web application is developed in-house by an organization. Which of the following would provide the BEST evidence to an IS auditor that the application is secure from external attack?
Which of the following observations should be of GREATEST concern to an IS auditor reviewing an organization's enterprise architecture (EA) program?
Which of the following is the BEST approach to help organizations address risks associated with shadow IT?
Which of the following network communication protocols is used by network devices such as routers to send error messages and operational information indicating success or failure when communicating with another IP address?
An external audit firm was engaged to perform a validation and verification review for a systems implementation project. The IS auditor identifies that regression testing is not part of the project plan and was not performed by the systems implementation team. According to the team, the parallel testing being performed is sufficient, making regression testing unnecessary. What should be the auditor’s NEXT step?
An organization using a cloud provider for its online billing system requires the website to be accessible to customers at all times. What is the BEST way to verify the organization's business requirements are met?
External audits have identified recurring exceptions in the user termination process, despite similar internal audits having reported no exceptions in the past. Which of the following is the IS auditor's BEST course of action to improve the internal audit process in the future?
Which of the following is the BEST way to foster continuous improvement of IS audit processes and practices?
Which of the following is the GREATEST impact as a result of the ongoing deterioration of a detective control?
An organization is implementing a new system that supports a month-end business process. Which of the following implementation strategies would be MOST efficient to decrease business downtime?
An IS auditor observes that an organization's systems are being used for cryptocurrency mining on a regular basis. Which of the following is the auditor's FIRST course of action?
An IS auditor reviewing database security should be MOST concerned if the database administrator (DBA):
The PRIMARY reason to assign data ownership for protection of data is to establish:
Which of the following is the PRIMARY purpose of batch processing monitoring?
In a small IT web development company where developers must have write access to production, the BEST recommendation of an IS auditor would be to:
What is the BEST control to address SQL injection vulnerabilities?
Which of the following is the PRIMARY advantage of parallel processing for a new system implementation?
Which of the following is MOST important for an effective control self-assessment (CSA) program?
Which of the following should be an IS auditor's GREATEST consideration when scheduling follow-up activities for agreed-upon management responses to remediate audit observations?
Which of the following is the BEST compensating control when segregation of duties is lacking in a small IS department?
An organization's software developers need access to personally identifiable information (Pll) stored in a particular data format. Which of the following is the BEST way to protect this sensitive information while allowing the developers to use it in development and test environments?
An IS auditor is examining a front-end subledger and a main ledger. Which of the following would be the GREATEST concern if there are flaws in the mapping of accounts between the two systems?
A system development project is experiencing delays due to ongoing staff shortages. Which of the following strategies would provide the GREATEST assurance of system quality at implementation?
What is BEST for an IS auditor to review when assessing the effectiveness of changes recently made to processes and tools related to an organization's business continuity plan (BCP)?
Which of the following would be to MOST concern when determine if information assets are adequately safequately safeguarded during transport and disposal?
Which of the following BEST indicates the effectiveness of an organization's risk management program?
Which of the following is the MOST effective control to mitigate unintentional misuse of authorized access?
Prior to a follow-up engagement, an IS auditor learns that management has decided to accept a level of residual risk related to an audit finding without remediation. The IS auditor is concerned about management's decision. Which of the following should be the IS auditor's NEXT course of action?
An IS auditor is reviewing an organization's information asset management process. Which of the following would be of GREATEST concern to the auditor?
Which of the following attack techniques will succeed because of an inherent security weakness in an Internet firewall?
Which of the following is MOST useful for determining whether the goals of IT are aligned with the organization's goals?
During an incident management audit, an IS auditor finds that several similar incidents were logged during the audit period. Which of the following is the auditor's MOST important course of action?
During a new system implementation, an IS auditor has been assigned to review risk management at each milestone. The auditor finds that several risks to project benefits have not been addressed. Who should be accountable for managing these risks?
An IS auditor notes that several employees are spending an excessive amount of time using social media sites for personal reasons. Which of the following should the auditor recommend be performed FIRST?
Which of the following data would be used when performing a business impact analysis (BIA)?
Which of the following is the PRIMARY concern when negotiating a contract for a hot site?
An online retailer is receiving customer complaints about receiving different items from what they ordered on the organization's website. The root cause has been traced to poor data quality. Despite efforts to clean erroneous data from the system, multiple data quality issues continue to occur. Which of the following recommendations would be the BEST way to reduce the likelihood of future occurrences?
Which of the following would BEST determine whether a post-implementation review (PIR) performed by the project management office (PMO) was effective?
Which of the following is the BEST method to prevent wire transfer fraud by bank employees?
Which of the following BEST minimizes performance degradation of servers used to authenticate users of an e-commerce website?
During the evaluation of controls over a major application development project, the MOST effective use of an IS auditor's time would be to review and evaluate:
The PRIMARY benefit lo using a dry-pipe fire-suppression system rather than a wet-pipe system is that a dry-pipe system:
An IS auditor finds that a key Internet-facing system is vulnerable to attack and that patches are not available. What should the auditor recommend be done FIRST?
An IS auditor is conducting a post-implementation review of an enterprise resource planning (ERP) system. End users indicated concerns with the accuracy of critical automatic calculations made by the system. The auditor's FIRST course of action should be to:
In a 24/7 processing environment, a database contains several privileged application accounts with passwords set to never expire. Which of the following recommendations would BEST address the risk with minimal disruption to the business?
An IT balanced scorecard is the MOST effective means of monitoring:
Which of the following is the PRIMARY reason for an IS auditor to conduct post-implementation reviews?
Which of the following should be the PRIMARY basis for prioritizing follow-up audits?
Which of the following is the MOST effective way for an organization to project against data loss?
During the discussion of a draft audit report. IT management provided suitable evidence fiat a process has been implemented for a control that had been concluded by the IS auditor as Ineffective. Which of the following is the auditor's BEST action?
A data breach has occurred due lo malware. Which of the following should be the FIRST course of action?
An IS auditor will be testing accounts payable controls by performing data analytics on the entire population of transactions. Which of the following is MOST important for the auditor to confirm when sourcing the population data?
Which of the following is the BEST control to mitigate the malware risk associated with an instant messaging (IM) system?
Which of the following is the MOST effective control for protecting the confidentiality and integrity of data stored unencrypted on virtual machines?
An organization has recently acquired and implemented intelligent-agent software for granting loans to customers. During the post-implementation review, which of the following is the MOST important procedure for the IS auditor to perform?
An organization allows employees to retain confidential data on personal mobile devices. Which of the following is the BEST recommendation to mitigate the risk of data leakage from lost or stolen devices?
Which of the following would BEST demonstrate that an effective disaster recovery plan (DRP) is in place?
The implementation of an IT governance framework requires that the board of directors of an organization:
Which of the following should be the MOST important consideration when conducting a review of IT portfolio management?
While executing follow-up activities, an IS auditor is concerned that management has implemented corrective actions that are different from those originally discussed and agreed with the audit function. In order to resolve the situation, the IS auditor's BEST course of action would be to:
Which of the following would BEST facilitate the successful implementation of an IT-related framework?
Which of the following is a social engineering attack method?
Which of the following documents would be MOST useful in detecting a weakness in segregation of duties?
When reviewing an organization's information security policies, an IS auditor should verify that the policies have been defined PRIMARILY on the basis of:
Which of the following is the MOST effective way to maintain network integrity when using mobile devices?
Which of the following MOST effectively minimizes downtime during system conversions?
Which of the following is MOST important for an IS auditor to examine when reviewing an organization's privacy policy?
Which of the following should an IS auditor be MOST concerned with during a post-implementation review?
Which of the following should be an IS auditor's PRIMARY focus when developing a risk-based IS audit program?
Which of the following tests would provide the BEST assurance that a health care organization is handling patient data appropriately?
An IS audit reveals that an organization is not proactively addressing known vulnerabilities. Which of the following should the IS auditor recommend the organization do FIRST?
Which of the following is MOST important to include in forensic data collection and preservation procedures?
Which of the following is the BEST control to prevent the transfer of files to external parties through instant messaging (IM) applications?
Which of the following is an audit reviewer's PRIMARY role with regard to evidence?
An IS auditor who was instrumental in designing an application is called upon to review the application. The auditor should:
Which of the following is the MOST important reason to implement version control for an end-user computing (EUC) application?
Cross-site scripting (XSS) attacks are BEST prevented through:
Management has requested a post-implementation review of a newly implemented purchasing package to determine to what extent business requirements are being met. Which of the following is MOST likely to be assessed?
Which of the following should an IS auditor recommend as a PRIMARY area of focus when an organization decides to outsource technical support for its external customers?
When an intrusion into an organization network is deleted, which of the following should be done FIRST?
An IS auditor discovers that validation controls m a web application have been moved from the server side into the browser to boost performance This would MOST likely increase the risk of a successful attack by.
The decision to accept an IT control risk related to data quality should be the responsibility of the:
What should be the PRIMARY basis for selecting which IS audits to perform in the coming year?
During a review of a production schedule, an IS auditor observes that a staff member is not complying with mandatory operational procedures. The auditor's NEXT step should be to:
Due to limited storage capacity, an organization has decided to reduce the actual retention period for media containing completed low-value transactions. Which of the following is MOST important for the organization to ensure?
Which of the following should be an IS auditor's GREATEST concern when a data owner assigns an incorrect classification level to data?
A financial group recently implemented new technologies and processes, Which type of IS audit would provide the GREATEST level of assurance that the department's objectives have been met?
Which of the following is the BEST methodology to use for estimating the complexity of developing a large business application?
An IS auditor finds a segregation of duties issue in an enterprise resource planning (ERP) system. Which of the following is the BEST way to prevent the misconfiguration from recurring?
Which of the following should be of GREATEST concern to an IS auditor when auditing an organization's IT strategy development process?
Which of the following should be of GREATEST concern to an IS auditor who is assessing an organization's configuration and release management process?
In an IT organization where many responsibilities are shared which of the following is the BEST control for detecting unauthorized data changes?
Which of the following provides the BEST evidence that a third-party service provider's information security controls
are effective?
Which of the following is the BEST recommendation to include in an organization's bring your own device (BYOD)
policy to help prevent data leakage?
Which of the following is the MAJOR advantage of automating internal controls?
A vendor requires privileged access to a key business application. Which of the following is the BEST recommendation to reduce the risk of data leakage?
Which of the following would protect the confidentiality of information sent in email messages?
Backup procedures for an organization's critical data are considered to be which type of control?
A company requires that all program change requests (PCRs) be approved and all modifications be automatically logged. Which of the following IS audit procedures will BEST determine whether unauthorized changes have been made to production programs?
Which of following areas is MOST important for an IS auditor to focus on when reviewing the maturity model for a technology organization?
Which of the following is the BEST way to minimize sampling risk?
An IS auditor is evaluating the progress of a web-based customer service application development project. Which of the following would be MOST helpful for this evaluation?
The PRIMARY purpose of a configuration management system is to:
Which of the following should be the FIRST step when planning an IS audit of a third-party service provider that monitors network activities?
Which of the following are used in a firewall to protect the entity's internal resources?
Which of the following would be the BEST criteria for monitoring an IT vendor's service levels?
The FIRST step in auditing a data communication system is to determine:
Which of the following provides the MOST reliable method of preventing unauthonzed logon?
What is the PRIMARY purpose of performing a parallel run of a now system?
An organization has engaged a third party to implement an application to perform business-critical calculations. Which of the following is the MOST important process to help ensure the application provides accurate calculations?
Which of the following indicates that an internal audit organization is structured to support the independence and clarity of the reporting process?
An IS auditor is reviewing the security of a web-based customer relationship management (CRM) system that is directly accessed by customers via the Internet, which of the following should be a concern for the auditor?
Which of the following is the BEST indicator for measuring performance of IT help desk function?
Which of the following findings should be of GREATEST concern to an IS auditor assessing the risk associated with end-user computing (EUC) in an organization?
An IS auditor is asked to review an organization's technology relationships, interfaces, and data. Which of the following enterprise architecture (EA) areas is MOST appropriate this review? (Choose Correct answer and give explanation from CISA Certification - Information Systems Auditor official book)
A characteristic of a digital signature is that it
Which of the following information security requirements BE ST enables the tracking of organizational data in a bring your own device (BYOD) environment?
A database administrator (DBA) should be prevented from having end user responsibilities:
An organization implemented a cybersecurity policy last year Which of the following is the GREATE ST indicator that the policy may need to be revised?
When evaluating information security governance within an organization, which of the following findings should be of MOST concern to an IS auditor?
Which of the following is the BEST way to verify the effectiveness of a data restoration process?
Recovery facilities providing a redundant combination of Internet connections to the local communications loop is an example of which type of telecommunications continuity?
Management has learned the implementation of a new IT system will not be completed on time and has requested an audit. Which of the following audit findings should be of GREATEST concern?
Which of the following provides the MOST useful information regarding an organization's risk appetite and tolerance?
Which of the following should be an IS auditor's GREATEST concern when reviewing an organization's security controls for policy compliance?
Which of the following BEST protects evidence in a forensic investigation?
Transaction records from a business database were inadvertently deleted, and system operators decided to restore from a snapshot copy. Which of the following provides assurance that the BEST transactions were recovered successfully?
in a post-implantation Nation review of a recently purchased system it is MOST important for the iS auditor to determine whether the:
Which of the following can only be provided by asymmetric encryption?
Which of the following risk scenarios is BEST addressed by implementing policies and procedures related to full disk encryption?
Which of the following BEST enables alignment of IT with business objectives?
Which of the following is MOST important to consider when developing a service level agreement (SLAP)?
An IS auditor learns a server administration team regularly applies workarounds to address repeated failures of critical data processing services Which of the following would BEST enable the organization to resolve this issue?
Which of the following findings should be of GREATEST concern to an IS auditor reviewing an organization s newly implemented online security awareness program'?
Which of the following poses the GREATEST risk to an organization when employees use public social networking sites?
When assessing the overall effectiveness of an organization's disaster recovery planning process, which of the following is MOST important for the IS auditor to verify?
Which of the following is the BEST method to delete sensitive information from storage media that will be reused?
A programmer has made unauthorized changes lo key fields in a payroll system report. Which of the following control weaknesses would have contributed MOST to this problem?
The use of access control lists (ACLs) is the MOST effective method to mitigate security risk for routers because they: (Identify Correct answer and related explanation/references from CISA Certification - Information Systems Auditor official Manual or book)
Which of the following is the BEST indication that there are potential problems within an organization's IT service desk function?
Which of the following is the BEST source of information for examining the classification of new data?
One advantage of monetary unit sampling is the fact that
As part of business continuity planning, which of the following is MOST important to assess when conducting a business impact analysis (B1A)?
Demonstrated support from which of the following roles in an organization has the MOST influence over information security governance?
A finance department has a multi-year project to upgrade the enterprise resource planning (ERP) system hosting the general ledger. and in year one, the system version upgrade will be applied. Which of the following should be the PRIMARY focus of the IS auditor reviewing the first year of the project?
Which of the following is the PRIMARY advantage of using virtualization technology for corporate applications?
An IS auditor requests direct access to data required to perform audit procedures instead of asking management to provide the data Which of the following is the PRIMARY advantage of this approach?
An IS auditor is assigned to review the IS department s quality procedures. Upon contacting the IS manager, the auditor finds that there is an informal unwritten set of standards Which of the following should be the auditor's NEXT action1?
An auditee disagrees with a recommendation for corrective action that appears in the draft engagement report. Which of the following is the IS auditor's BEST course of action when preparing the final report?
What should an IS auditor do FIRST when a follow-up audit reveals some management action plans have not been initiated?
During a follow-up audit, an IS auditor finds that senior management has implemented a different remediation action plan than what was previously agreed upon. Which of the following is the auditor's BEST course of action?
An IS department is evaluated monthly on its cost-revenue ratio user satisfaction rate, and computer downtime This is BEST zed as an application of.
During a database management evaluation an IS auditor discovers that some accounts with database administrator (DBA) privileges have been assigned a default password with an unlimited number of failed login attempts Which of the following is the auditor's BEST course of action?
Email required for business purposes is being stored on employees' personal devices.
Which of the following is an IS auditor's BEST recommendation?
A disaster recovery plan (DRP) should include steps for:
In the development of a new financial application, the IS auditor's FIRST involvement should be in the:
Which of the following is necessary for effective risk management in IT governance?
Which of the following is the PRIMARY advantage of using visualization technology for corporate applications?
Which of the following should be performed FIRST before key performance indicators (KPIs) can be implemented?
What is the GREATEST concern for an IS auditor reviewing contracts for licensed software that executes a critical business process?
Which of the following is MOST important for an IS auditor to determine during the detailed design phase of a system development project?
Which of the following is the MOST important consideration for an IS auditor when assessing the adequacy of an organization's information security policy?
Which of the following would an IS auditor recommend as the MOST effective preventive control to reduce the risk of data leakage?
Which of the following is the BEST way to ensure that business continuity plans (BCPs) will work effectively in the event of a major disaster?
Which of the following is the BEST metric to measure the alignment of IT and business strategy?
Which of the following would be MOST useful when analyzing computer performance?
An IS auditor finds that one employee has unauthorized access to confidential data. The IS auditor's BEST recommendation should be to:
Which of the following IT service management activities is MOST likely to help with identifying the root cause of repeated instances of network latency?
The PRIMARY objective of value delivery in reference to IT governance is to:
An IS auditor is reviewing logical access controls for an organization's financial business application Which of the following findings should be of GREATEST concern to the auditor?
Which of the following should be of GREATEST concern to an IS auditor reviewing an organization's business continuity plan (BCP)?
Which of the following is the GREATEST risk of using a reciprocal site for disaster recovery?
An IS auditor is reviewing documentation of application systems change control and identifies several patches that were not tested before being put into production. Which of the following is the MOST significant risk from this situation?
An IS auditor finds that the process for removing access for terminated employees is not documented What is the MOST significant risk from this observation?
Which of the following application input controls would MOST likely detect data input errors in the customer account number field during the processing of an accounts receivable transaction?
Which of the following is MOST important for an IS auditor to confirm when reviewing an organization's plans to implement robotic process automation (RPA> to automate routine business tasks?
An IS auditor plans to review all access attempts to a video-monitored and proximity card-controlled communications room. Which of the following would be MOST useful to the auditor?
What Is the BEST method to determine if IT resource spending is aligned with planned project spending?
An IS auditor finds that application servers had inconsistent security settings leading to potential vulnerabilities. Which of the following is the BEST recommendation by the IS auditor?
Which of the following is the BEST control lo mitigate attacks that redirect Internet traffic to an unauthorized website?
Which of the following is the BEST way to mitigate the risk associated with unintentional modifications of complex calculations in end-user computing (EUC)?
An IS auditor reviewing security incident processes realizes incidents are resolved and closed, but root causes are not investigated. Which of the following should be the MAJOR concern with this situation?
An organization allows its employees lo use personal mobile devices for work. Which of the following would BEST maintain information security without compromising employee privacy?
An IS auditor has been asked to advise on measures to improve IT governance within the organization. Which at the following is the BEST recommendation?
An IS auditor has discovered that a software system still in regular use is years out of date and no longer supported the auditee has stated that it will take six months until the software is running on the current version. Which of the following is the BEST way to reduce the immediate risk associated with using an unsupported version of the software?
Which of the following is the MOST efficient way to identify segregation of duties violations in a new system?
Which of the following would be MOST effective to protect information assets in a data center from theft by a vendor?
Which of the following would BEST ensure that a backup copy is available for restoration of mission critical data after a disaster''
An externally facing system containing sensitive data is configured such that users have either read-only or administrator rights. Most users of the system have administrator access. Which of the following is the GREATEST risk associated with this situation?
Which of the following presents the GREATEST challenge to the alignment of business and IT?
The PRIMARY benefit of information asset classification is that it:
Which of the following is the BEST way to ensure that an application is performing according to its specifications?
Which of the following backup schemes is the BEST option when storage media is limited?
Which of the following is MOST important for an IS auditor to look
for in a project feasibility study?
Which of the following will BEST ensure that a proper cutoff has been established to reinstate transactions and records to their condition just prior to a computer system failure?
An IS auditor has found that a vendor has gone out of business and the escrow has an older version of the source code. What is the auditor's BEST recommendation for the organization?
Which of the following should be the FRST step when developing a data toes prevention (DIP) solution for a large organization?
Which of the following would MOST effectively help to reduce the number of repealed incidents in an organization?
During a security audit, an IS auditor is tasked with reviewing log entries obtained from an enterprise intrusion prevention system (IPS). Which type of risk would be associated with the potential for the auditor to miss a sequence of logged events that could indicate an error in the IPS configuration?
During the planning phase of a data loss prevention (DLP) audit, management expresses a concern about mobile computing. Which of the following should the IS auditor identity as the associated risk?
Which of the following BEST enables the effectiveness of an agile project for the rapid development of a new software application?
Which of the following audit procedures would be MOST conclusive in evaluating the effectiveness of an e-commerce application system's edit routine?
An audit identified that a computer system is not assigning sequential purchase order numbers to order requests. The IS auditor is conducting an audit follow-up to determine if management has reserved this finding. Which of two following is the MOST reliable follow-up procedure?
An audit has identified that business units have purchased cloud-based applications without IPs support. What is the GREATEST risk associated with this situation?
Which of the following would be the MOST useful metric for management to consider when reviewing a project portfolio?
Which of the following issues associated with a data center's closed-circuit television (CCTV) surveillance cameras should be of MOST concern to an IS auditor?
Which of the following should be of GREATEST concern to an IS auditor reviewing a network printer disposal process?
A review of Internet security disclosed that users have individual user accounts with Internet service providers (ISPs) and use these accounts for downloading business data. The organization wants to ensure that only the corporate network is used. The organization should FIRST:
An IS auditor assessing the controls within a newly implemented call center would First
What would be an IS auditor's BEST recommendation upon finding that a third-party IT service provider hosts the organization's human resources (HR) system in a foreign country?
Which of the following BEST helps to ensure data integrity across system interfaces?
An organization is disposing of a system containing sensitive data and has deleted all files from the hard disk. An IS auditor should be concerned because:
An organization has virtualized its server environment without making any other changes to the network or security infrastructure. Which of the following is the MOST significant risk?
The PRIMARY role of a control self-assessment (CSA) facilitator is to:
Which of the following BEST describes an audit risk?
An organization has outsourced the development of a core application. However, the organization plans to bring the support and future maintenance of the application back in-house. Which of the following findings should be the IS auditor's GREATEST concern?
An IS auditor is reviewing processes for importing market price data from external data providers. Which of the following findings should the auditor consider MOST critical?
Which of the following features of a library control software package would protect against unauthorized updating of source code?
A company has implemented an IT segregation of duties policy. In a role-based environment, which of the following roles may be assigned to an application developer?
Which of the following is the MOST significant risk that IS auditors are required to consider for each engagement?
Which of the following is a corrective control?
What is the PRIMARY purpose of documenting audit objectives when preparing for an engagement?
During a follow-up audit, an IS auditor finds that some critical recommendations have the IS auditor's BEST course of action?
An IS auditor follows up on a recent security incident and finds the incident response was not adequate. Which of the following findings should be considered MOST critical?
Which of the following provides the BEST providence that outsourced provider services are being properly managed?
During audit framework. an IS auditor teams that employees are allowed to connect their personal devices to company-owned computers. How can the auditor BEST validate that appropriate security controls are in place to prevent data loss?
Which of the following is the BEST evidence that an organization's IT strategy is aligned lo its business objectives?
A core system fails a week after a scheduled update, causing an outage that impacts service. Which of the following is MOST important for incident management to focus on when addressing the issue?
Which of the following BEST describes a digital signature?
Which of the following would present the GREATEST concern during a review of internal audit quality assurance (QA) and continuous improvement processes?
During audit planning, the IS audit manager is considering whether to budget for audits of entities regarded by the business as having low risk. Which of the following is the BEST course of action in this situation?
An organization's security team created a simulated production environment with multiple vulnerable applications. What would be the PRIMARY purpose of creating such an environment?
An IS auditor found that a company executive is encouraging employee use of social networking sites for business purposes. Which of the following recommendations would BEST help to reduce the risk of data leakage?
Which of the following responsibilities of an organization's quality assurance (QA) function should raise concern for an IS auditor?
Which of the following should an IS auditor use when verifying a three-way match has occurred in an enterprise resource planning (ERR) system?
An organization uses public key infrastructure (PKI) to provide email security. Which of the following would be the MOST efficient method to determine whether email messages have been modified in transit?
An IS auditor learns that an organization's business continuity plan (BCP) has not been updated in the last 18 months and that the organization recently closed a production plant. Which of the following is the auditor's BEST course of action?
During an audit, the IS auditor finds that in many cases excessive rights were not removed from a system. Which of the following is the auditor's BEST recommendation?
A small business unit is implementing a control self-assessment (CSA) program and leveraging the internal
audit function to test its internal controls annually. Which of the following is the MOST significant benefit of
this approach?
Which of the following BEST supports the effectiveness of a compliance program?
An IS auditor is reviewing a client's outsourced payroll system to assess whether the financial audit team can rely on the application. Which of the following findings would be the auditor's
GREATEST concern?
Which of the following is an IS auditor's BEST recommendation to mitigate the risk of eavesdropping
associated with an application programming interface (API) integration implementation?
Which of the following approaches would utilize data analytics to facilitate the testing of a new account creation process?
The PRIMARY objective of a control self-assessment (CSA) is to:
Which of the following is the MOST important advantage of participating in beta testing of software products?
Which of the following is the MOST important control for virtualized environments?
Which of the following would provide management with the MOST reasonable assurance that a new data warehouse will meet the needs of the
organization?
Which of the following is the MAIN responsibility of the IT steering committee?
The BEST way to provide assurance that a project is adhering to the project plan is to:
A global organization's policy states that all workstations must be scanned for malware each day. Which of the following would provide an IS auditor with the BEST evidence of continuous compliance with this policy?
Aligning IT strategy with business strategy PRIMARILY helps an organization to:
An organization has shifted from a bottom-up approach to a top-down approach in the development of IT policies. This should result in:
When planning a follow-up, the IS auditor is informed by operational management that recent organizational changes have addressed the previously identified risk and implementing the action plan is no longer necessary. What should the auditor do NEXT?
In the case of a disaster where the data center is no longer available, which of the following tasks should be done FIRST?
Which of the following is the MOST important consideration when establishing vulnerability scanning on critical IT infrastructure?
A national tax administration agency with a distributed network experiences service disruptions due to a large influx of traffic to a regional office near the end of each year. Which of the following would BEST enable the agency to improve the performance of its servers during the busy period?
During an audit, an IT finding is agreed upon by all IT teams involved, but no team wants to be responsible for remediation or considers the finding within Its area of responsibility Which of the following is the IS auditor's BEST course of action?
What should an IS auditor evaluate FIRST when reviewing an organization's response to new privacy legislation?
Which of the following is MOST helpful to an IS auditor reviewing the alignment of planned IT budget with the organization's goals and strategic objectives?
An IS auditor is reviewing the service agreement with a technology company that provides IT help desk services to the organization. Which of the following monthly performance
metrics is the BEST indicator of service quality?
Which of the following should be identified FIRST during the risk assessment process?
What is the FIRST step when creating a data classification program?
Which of the following is the BEST way to identify whether the IT help desk is meeting service level agreements (SLAS)?
In which of the following sampling methods is the entire sample considered to be irregular if a single error is found?
An organization's IT department and internal IS audit function all report to the chief information officer (CIO). Which of the following is the GREATEST concern associated with this reporting structure?
Which of the following BEST enables a benefits realization process for a system development project?
Which of the following provides the MOST protection against emerging threats?
During an operational audit on the procurement department, the audit team encounters a key system that uses an artificial intelligence (Al) algorithm. The audit team does not have the necessary knowledge to proceed with the audit. Which of the following is the BEST way to handle this situation?
The PRIMARY responsibility of a project steering committee is to:
A small IT department has embraced DevOps, which allows members of this group to deploy code to production and maintain some development access to automate releases. Which of the following is the MOST effective control?
The PRIMARY purpose of an incident response plan is to:
Which of the following is the BEST compensating control against segregation of duties conflicts in new code development?
An IS auditor has learned that access privileges are not periodically reviewed or updated. Which of the following would provide the BEST evidence to determine whether transactions have been executed by authorized employees?
Which of the following is the PRIMARY reason an IS auditor should discuss observations with management before delivering a final report?
Which of the following helps to ensure the integrity of data for a system interface?
Retention periods and conditions for the destruction of personal data should be determined by the.
A business has requested an audit to determine whether information stored in an application is adequately protected. Which of the following is the MOST important action before the audit work begins?
Which of the following is BEST used for detailed testing of a business application's data and configuration files?
An IS auditor has been asked to advise on measures to improve IT governance within the organization. Which of the following IS the BEST recommendation?
An IS auditor reviewing the database controls for a new e-commerce system discovers a security weakness in the database configuration. Which of the following should be the IS auditor's NEXT course of action?
Which of the following approaches will ensure recovery time objectives (RTOs) are met for an organization's disaster recovery plan (DRP)?
The use of control totals reduces the risk of:
An IS auditor discovers that validation controls in a web application have been moved from the server side into the browser to boost performance. This would MOST likely increase the risk of a successful attack by:
Several unattended laptops containing sensitive customer data were stolen from personnel offices Which of the following would be an IS auditor's BEST recommendation to protect data in case of recurrence?
An IS audit manager is reviewing workpapers for a recently completed audit of the corporate disaster recovery test. Which of the following should the IS audit manager specifically review to substantiate the conclusions?
Which of the following responses to risk associated with segregation of duties would incur the LOWEST initial cost?
Which of the following is the MOST important area of focus for an IS auditor when developing a risk-based audit strategy?
Which of the following should an IS auditor be MOST concerned with when a system uses RFID?
A security administrator is called in the middle of the night by the on-call programmer A number of programs have failed, and the programmer has asked for access to the live system. What IS the BEST course of action?
An IS audit reveals that an organization operating in business continuity mode during a pandemic situation has not performed a simulation test of the
business continuity plan (BCP). Which of the following is the auditor's BEST course of action?
During an external review, an IS auditor observes an inconsistent approach in classifying system criticality
within the organization. Which of the following should be recommended as the PRIMARY factor to
determine system criticality?
When reviewing past results of a recurring annual audit, an IS auditor notes that findings may not have been reported and independence may not have been maintained. Which of the following is the auditor's BEST course of action?
An IT strategic plan that BEST leverages IT in achieving organizational goals will include:
An IS audit review identifies inconsistencies in privacy requirements across third-party service provider contracts. Which of the following is the BEST
recommendation to address this situation?