ISACA CISA v2020-10-23 q332
ISACA CISA v2020-10-23 q332
ISACA CISA v2020-10-23 q332
q332
Exam Code: CISA
Exam Name: Certified Information Systems Auditor
Certification Provider: ISACA
Free Question Number: 332
Version: v2020-10-23
# of views: 265
# of Questions views: 7703
https://www.freecram.com/torrent/ISACA.CISA.v2020-10-23.q332.html
NEW QUESTION: 1
Which of the following is the MOST significant concerns when backup tapes are
encrypted?
A. Loss of encryption keys
B. Lack of physical security over the tapes
C. Inaccurate data due to encryption processing
D. Incompatibility with future software versions
Answer: A (LEAVE A REPLY)
NEW QUESTION: 2
An IS auditor suspects an organization's computer may have been used to commit a
crime. Which of the following is the auditor s BEST course of action?
A. Advise management of the crime after the investigation.
B. Contact the incident response team to conduct an investigation.
C. Examine the computer to search for evidence supporting the suspicions.
D. Notify local law enforcement of the potential crime before further investigation.
Answer: (SHOW ANSWER)
NEW QUESTION: 3
An IS auditor finds the timeliness and depth of information regarding the organization's IT
projects varies based on which project manager is assigned. Which of the following
recommendations would be A MOST helpful in achieving predictable and repeatable
project management processes?
A. Alignment of project performance to pay incentives
B. Adoption of business case and earned value templates
C. Measurement against defined and documented procedures
D. Use of Gantt charts and work breakdown structures
Answer: B (LEAVE A REPLY)
NEW QUESTION: 4
An enterprise receiving email should have procedures to control:
A. insufficient connectivity,
B. unsolicited executable code.
C. outdated protocols,
D. insufficient end-points.
Answer: B (LEAVE A REPLY)
NEW QUESTION: 5
Which of the following is the MOST effective mechanism for ensuring that critical IT
operational problems are reported to executive management in a timely manner?
A. Escalation procedures
B. Periodic status reports
C. Service level monitoring
D. Regular meetings
Answer: A (LEAVE A REPLY)
NEW QUESTION: 6
Which of the following documents would be MOST useful in detecting a weakness in
segregation of duties?
A. Entity-relationship diagram
B. Process flowchart
C. Data flowdiagram
D. Systems flowchart
Answer: A (LEAVE A REPLY)
NEW QUESTION: 7
During a vulnerability assessment, an IS auditor finds a high-risk vulnerability in a public-
facing web server used to process online customer orders via credit card. The IS auditor
could FIRST:
A. redesign the customer order process.
B. document the finding in the report
C. notify management.
D. suspend credit card processing.
Answer: C (LEAVE A REPLY)
NEW QUESTION: 8
Which of the following is the BEST physical security solution for granting and restricting
access to individuals based on their unique access needs?
A. Closed-circuit television (CCTV)
B. Bolting door locks
C. Electronic badge system
D. Cipher locks
Answer: C (LEAVE A REPLY)
NEW QUESTION: 9
An IS auditor identifies key controls that have been overridden by management. The next
step the IS auditor should take is to
A. Perform procedures to quantify the irregularities
B. Recommend compensating controls
C. Report the absence of key controls to regulators
D. Withdraw from the engagement
Answer: A (LEAVE A REPLY)
NEW QUESTION: 10
Which of the following occurs during the issues management process for a system
development project?
A. Configuration management
B. Help desk management
C. Impact assessment
D. Contingency planning
Answer: A (LEAVE A REPLY)
NEW QUESTION: 11
Which of the following would BEST detect that a distributed-denial-of-service attack
(DDoS) is occurring?
A. Automated monitoring of logs
B. Customer service complaints
C. Penetration testing
D. Server crashes
Answer: (SHOW ANSWER)
NEW QUESTION: 12
Which of the following should be an IS auditor's FIRST activity when planning an audit?
A. Document specific questions in the audit program
B. Gain an understanding of the area to be audited.
C. Identify proper resources for audit activities.
D. Create a list of key controls to be reviewed.
Answer: B (LEAVE A REPLY)
NEW QUESTION: 13
Which of the following would be MOST helpful in ensuring security procedures are followed
by employees in a multinational organization?
A. Regular policy updates by management
B. Security architecture review
C. Regular clean desk reviews
D. Comprehensive end-user training
Answer: D (LEAVE A REPLY)
NEW QUESTION: 14
A development team has designed a new application and incorporated best practices for
secure coding. Prior to launch, which of the following is the IS auditor's BEST
recommendation to mitigate the associated security risk?
A. Integration testing
B. User acceptance testing
C. Unit testing
D. Penetration testing
Answer: D (LEAVE A REPLY)
NEW QUESTION: 15
Which of the following is the BEST reason to perform root cause analysis after a critical
server failure?
A. To enable timely follow-up audits
B. To enable the gathering of system availability data
C. To enable appropriate corrective measures
D. To enable the optimization of IT investments
Answer: (SHOW ANSWER)
NEW QUESTION: 16
An IS auditor discovers that management has created a system interface to receive
financial data and store it in a data warehouse. Which of the following provides the BEST
assurance that data in the data warehouse is accurate?
A. Management reconciliations
B. A documented change management process
C. Established risk management processes
D. Management, access reviews
Answer: A (LEAVE A REPLY)
Valid CISA Dumps shared by PrepAwayExam.com for Helping Passing CISA Exam!
PrepAwayExam.com now offer the newest CISA exam dumps, the
PrepAwayExam.com CISA exam questions have been updated and answers have
been corrected get the newest PrepAwayExam.com CISA dumps with Test Engine
here: https://www.prepawayexam.com/ISACA/braindumps.CISA.ete.file.html (745 Q&As
Dumps, 40%OFF Special Discount: freecram)
NEW QUESTION: 17
A security administrator should have read-only access for which of the following?
A. Password policy
B. Services/daemons configuration
C. Security logs
D. Router configuration
Answer: C (LEAVE A REPLY)
NEW QUESTION: 18
Which of the following controls would BEST decrease the exposure if a password is
compromised?
A. Passwords are masked.
B. Passwords are encrypted.
C. Password changes are forced periodically.
D. Passwords have format restrictions.
Answer: B (LEAVE A REPLY)
NEW QUESTION: 19
An organization has outsourced its data processing function to a service provider. Which of
the following would BEST determine whether the service provider continues to meet the
organization s objectives?
A. Periodic audits of controls by an independent auditor
B. Review of performance against service level agreements (SLAs)
C. Adequacy of the service provider's insurance
D. Assessment of the personnel training processes of the provider
Answer: B (LEAVE A REPLY)
NEW QUESTION: 20
Which of the following is MOST important for an IS auditor to consider when determining
an appropriate sample size in situations where selecting the entire population is not
feasible?
A. Responsiveness of the auditee
B. Accessibility of the data
C. Tolerable error
D. Data integrity
Answer: C (LEAVE A REPLY)
NEW QUESTION: 21
When introducing a maturity model to the IT management process, it is BEST to align the
maturity level to a point that reflects which of the following?
A. Maximum risk tolerance level
B. Ideal business production level
C. Industry standard practice level
D. Minimum cost expenditure level
Answer: (SHOW ANSWER)
NEW QUESTION: 22
When determining the specifications for a server supporting an online application using
more than a hundred endpoints, which of the following is the MOST important factor to be
Considered?
A. High availability of different systems
B. Cost-benefit comparison between the available systems
C. Reputation of the vendors and their customer base
D. Transaction volume estimate during peak periods
Answer: D (LEAVE A REPLY)
NEW QUESTION: 23
Which of the following roles combined with the role of a database administrator (DBA) will
create a segregation of duties conflict?
A. Security administrator
B. Systems analyst
C. Quality assurance
D. Application end user
Answer: D (LEAVE A REPLY)
NEW QUESTION: 24
Which of the following is MOST important when an incident may lead to prosecution?
A. Impact analysis
B. Timely incident detection
C. Preservation of evidence
D. Independent assessment
Answer: C (LEAVE A REPLY)
NEW QUESTION: 25
When physical destruction is not practical, which of the following is the MOST effective
measure of disposing of sensitive data on a hard disk?
A. Overwriting multiple times
B. Recycling the disk
C. Deleting files sequentially
D. Reformatting
Answer: B (LEAVE A REPLY)
NEW QUESTION: 26
When auditing a quality assurance plan, an IS auditor should be MOST concerned if the:
A. SDLC is coupled with the quality assurance plan
B. scope of quality assurance activities is undefined
C. quality assurance function is periodically reviewed by internal audit
D. quality assurance function is separate from the programming function
Answer: B (LEAVE A REPLY)
NEW QUESTION: 27
An IS auditor reviewing security incident processes realizes incidents are resolved and
dosed, but root causes are not investigated Which of the following should be the MAJOR
concern with this situation?
A. Abuses by employees have not been reported
B. Vulnerabilities have not been properly addressed
C. Lessons earned have not been property documented.
D. Security incident policies are out of date
Answer: (SHOW ANSWER)
NEW QUESTION: 28
Which function in the purchasing module of an enterprise resource planning (ERP) system
ensures payments are not issued for incorrect invoices'
A. Management workflow approval
B. Three-way match
C. Sequential payment numbers
D. Purchasing authority levels
Answer: B (LEAVE A REPLY)
NEW QUESTION: 29
Which of the following procedures should an IS auditor complete FIRST when evaluating
the adequacy of IT key performance indicators (KPIs)?
A. Validate the KPI thresholds.
B. Determine whether the KPIs support IT objectives.
C. Review KPIs that indicate poor IT performance.
D. Independently calculate the accuracy of the KPIs.
Answer: B (LEAVE A REPLY)
NEW QUESTION: 30
Which of the following should be a PRIMARY control objective when designing controls for
system interfaces?
A. Ensure all data transferred through system interfaces is encrypted.
B. Ensure managed file transfer (MFT) systems have restart capability for interruptions.
C. Ensure data on the sending system is identical to the data on the receiving system.
D. Ensure peer-to-peer data transfers are minimized.
Answer: (SHOW ANSWER)
NEW QUESTION: 31
An audit team has a completed schedule approved by the audit committee. After starting
some of the scheduled audits, executive management asked the team to immediately audit
an additional process. There are not enough resources available to add the additional audit
to the schedule. Which of the following is the BEST course of action?
A. Revise the scope of scheduled audits.
B. Consider scheduling the audit for the next period.
C. Propose a revised audit schedule.
D. Approve overtime work to ensure the audit is completed.
Answer: C (LEAVE A REPLY)
Valid CISA Dumps shared by PrepAwayExam.com for Helping Passing CISA Exam!
PrepAwayExam.com now offer the newest CISA exam dumps, the
PrepAwayExam.com CISA exam questions have been updated and answers have
been corrected get the newest PrepAwayExam.com CISA dumps with Test Engine
here: https://www.prepawayexam.com/ISACA/braindumps.CISA.ete.file.html (745 Q&As
Dumps, 40%OFF Special Discount: freecram)
NEW QUESTION: 32
A database is denormalized in order to:
A. ensure data integrity.
B. prevent loss of data.
C. save storage space.
D. increase processing efficiency.
Answer: (SHOW ANSWER)
NEW QUESTION: 33
Audit management has just completed the annual audit plan for the upcoming year, which
consists entirely of high-risk processor. However it is determined that there are insufficient
resources to execute the plan. What should be done NEXT?
A. Present the annual plan to the audit committee and ask for more resources
B. Remove audit from the annual plan to better match the number of resources available.
C. Reduce the scope of the audit to better match the number of resources available
D. Review the audit plan and defer some audits to the subsequent year
Answer: (SHOW ANSWER)
NEW QUESTION: 34
Which of the following is MOST important for the IS auditor to verify when reviewing the
development process of a security policy?
A. Output from the enterprise's risk management system
B. Evidence of management approval
C. Evidence of active involvement of key stakeholders
D. Identification of the control framework
Answer: A (LEAVE A REPLY)
NEW QUESTION: 35
Which of the following is MOST important in the audit quality assurance process?
A. Qualifications of the assessor
B. Testing performed during the assessment
C. Results of corrective action plans
D. Oversight by the audit committee
Answer: C (LEAVE A REPLY)
NEW QUESTION: 36
Which of the following is MOST important when planning a network audit?
A. Isolation of rogue access points
B. Identification of existing nodes
C. Analysts of traffic content
D. Determination of IP range in use
Answer: (SHOW ANSWER)
NEW QUESTION: 37
The quality assurance (QA) function should be prevented from
A. Changing programs for business functions
B. Establishing analysis techniques
C. Developing naming conventions
D. Amending review procedures
Answer: (SHOW ANSWER)
NEW QUESTION: 38
Which of the following is the PRIMARY role of an IS auditor with regard to data privacy?
A. Ensuring compliance with data privacy laws
B. Verifying that privacy practices match privacy statements
C. Drafting the organization's data privacy policy
D. Communicating data privacy requirements to the organization
Answer: (SHOW ANSWER)
NEW QUESTION: 39
Communicating which of the following would BEST encourage management to initiate
appropriate actions following the receipt of report findings?
A. Risk implications of the observations
B. Statistical sampling used to derive observations
C. Recommendations that align with the business strategy
D. Strict deadlines to close all observations
Answer: (SHOW ANSWER)
NEW QUESTION: 40
An organization is using a single account shared by personnel for its social networking
marketing page. Which of the following is the BEST method to maintain accountability over
the account?
A. Regular monitoring of proxy server logs
B. Reviewing access rights on a periodic basis
C. Implementing an account password check-out process
D. Integrating the account with single sign-on
Answer: (SHOW ANSWER)
NEW QUESTION: 41
When reviewing a disaster recovery plan (DRP) an IS auditor should examine the:
A. Offsite data file storage
B. Fire-fighting equipment
C. Access to the computer site by the backup staff
D. Uninterruptible power supply (UPS)
Answer: A (LEAVE A REPLY)
NEW QUESTION: 42
Which of the following data would be used when performing a business impact analysis
(BIA)?
A. Cost benefit analysis of running the current business
B. Projected impact of current business on future business
C. Expected costs for recovering the business
D. Cost of regulatory compliance
Answer: B (LEAVE A REPLY)
NEW QUESTION: 43
Which of the following methods should be used to effectively erase sensitive data from
portable storage devices that are to be reused?
A. Using media sanitization software
B. Formatting the portable device
C. Overwriting the sensitive data
D. Exposing the portable device to a magnetic field
Answer: (SHOW ANSWER)
NEW QUESTION: 44
A legacy application is running on an operating system that is no longer supported by
vendor, if the organization continues to use the current application, which of the application
should be the IS auditor's GREATEST concern?
A. Increased cost of maintaining the system
B. Potential exploitation of zero-day vulnerabilities in the system
C. Inability to use the operating system due to potential licence issues
D. Inability to update the legacy application database
Answer: B (LEAVE A REPLY)
NEW QUESTION: 45
Which of the following would provide the BEST evidence for an IS auditor to determine
whether segregation of duties is in place?
A. A review of personnel files
B. A review of the organizational chart
C. A walk-through of job functions
D. An analysis of user access requests
Answer: D (LEAVE A REPLY)
NEW QUESTION: 46
Which of the following should the IS auditor do FIRST to ensure data transfer integrity for
Internet of Things (loT) devices?
A. Verify access control lists to the database where collected data is stored.
B. Confirm that acceptable limits of data bandwidth are defined for each device.
C. Ensure that message queue telemetry transport (MQTT) is used.
D. Determine how devices are connected to the local network.
Answer: (SHOW ANSWER)
Valid CISA Dumps shared by PrepAwayExam.com for Helping Passing CISA Exam!
PrepAwayExam.com now offer the newest CISA exam dumps, the
PrepAwayExam.com CISA exam questions have been updated and answers have
been corrected get the newest PrepAwayExam.com CISA dumps with Test Engine
here: https://www.prepawayexam.com/ISACA/braindumps.CISA.ete.file.html (745 Q&As
Dumps, 40%OFF Special Discount: freecram)
NEW QUESTION: 47
The recovery time objective (RTO) is normally determined on the basis of the:
A. criticality of the systems affected.
B. acceptable downtime of the alternate site,
C. cost of recovery of all systems.
D. risk of occurrence.
Answer: A (LEAVE A REPLY)
NEW QUESTION: 48
Which of the following would provide the BEST assurance that an organization s backup
media is adequate in the case of a disaster?
A. Scheduled maintenance of the backup device
B. Scheduled read/write tests of the backup media
C. Regular review of backup logs to ensure that all data from the production environment is
included
D. Regular recovery of production systems in a test environment
Answer: D (LEAVE A REPLY)
NEW QUESTION: 49
When engaging services from external auditors, which of the following should be
established FIRST7
A. Operational level agreements
B. Termination conditions agreements
C. Service level agreements
D. Nondisclosure agreements
Answer: D (LEAVE A REPLY)
NEW QUESTION: 50
The MAIN reason an organization's incident management procedures should include a
post-incident review is to:
A. take appropriate action when procedures are not followed
B. ensure evidence is collected tor possible post-event litigation.
C. enable better reporting for executives and the audit committee
D. improve processes by learning from identified weaknesses
Answer: D (LEAVE A REPLY)
NEW QUESTION: 51
To help ensure the accuracy and completeness of end-user computing output it is MOST
important to include strong:
A. reconciliation controls
B. change management controls.
C. access management controls
D. documentation controls.
Answer: A (LEAVE A REPLY)
NEW QUESTION: 52
An audit committee is reviewing an annual IT risk assessment Which of the following is the
BEST justification for the audits selected?
A. Key IT general process controls
B. Applications impacted
C. Likelihood of an IT process failure
D. Underlying business risks
Answer: D (LEAVE A REPLY)
NEW QUESTION: 53
A database administrator (DBA) extracts a user listing for an auditor as testing evidence.
Which of the following will provide the GREATEST assurance that the user listing is
reliable'
A. Obtaining sign-off from the DBA to attest that the list is complete
B. Witnessing the DBA running the query in-person
C. Requesting a query that returns the count of the users
D. Requesting a copy of the query that generated the user listing
Answer: B (LEAVE A REPLY)
NEW QUESTION: 54
A large insurance company is about to replace a major financial application. Which of the
following is the IS auditor's PRIMARY focus when conducting the pre-implementation
review?
A. Migration of data
B. Unit testing
C. System manuals
D. Procedure updates
Answer: A (LEAVE A REPLY)
NEW QUESTION: 55
Which of the following findings would have the GREATEST impact on the objective of a
business intelligence system?
A. Key controls have not been tested in a year.
B. Decision support queries use database functions proprietary to the vendor.
C. The hot site for disaster recovery does not include the decision support system.
D. Management reports have not been evaluated since implementation.
Answer: A (LEAVE A REPLY)
NEW QUESTION: 56
Which of the following would be MOST important to update once a decision has been
made to outsource a critical application to a cloud service provider?
A. Project portfolio
B. IT budget
C. Business impact analysis (BIA)
D. IT resource plan
Answer: C (LEAVE A REPLY)
NEW QUESTION: 57
Which of the following provides an IS auditor the MOST assurance that an organization is
compliant with legal and regulatory requirements?
A. The IT manager is responsible for the organization s compliance with legal and
regulatory requirements.
B. There is no history of complaints or fines from regulators regarding noncompliance
C. Senior management has provided attestation of legal and regulatory compliance
D. Controls associated with legal and regulatory requirements have been identified and
tested
Answer: D (LEAVE A REPLY)
NEW QUESTION: 58
Reviewing which of the following would be MOST helpful in assessing whether an
organization s IT performance measures are comparable to other organizations in the
same industry?
A. Reputable IT governance frameworks
B. Employee satisfaction surveys
C. Maturity models for IT processes
D. Key performance indicators (KPIs) for IT processes
Answer: D (LEAVE A REPLY)
NEW QUESTION: 59
Which of the following is the BEST key performance indicator (KPI) for determining how
well the IT policy is aligned to the business requirements?
A. Number of approved exceptions to the policy
B. Total cost to support the policy
C. Number of inquiries regarding the policy
D. Total cost of policy breaches
Answer: A (LEAVE A REPLY)
NEW QUESTION: 60
During an audit, which of the following would be MOST helpful in establishing a baseline
for measuring data quality?
A. Industry standard business definitions
B. Input from customers
C. Built-in data error prevention application controls
D. Validation of rules by the business
Answer: B (LEAVE A REPLY)
NEW QUESTION: 61
During a network security review the system log indicates an unusually high number of
unsuccessful login attempts Which of the following sampling techniques is MOST
appropriate for selecting a sample of user IDs for further investigation?
A. Monetary unit
B. Variable
C. Stratified
D. Attribute
Answer: D (LEAVE A REPLY)
Valid CISA Dumps shared by PrepAwayExam.com for Helping Passing CISA Exam!
PrepAwayExam.com now offer the newest CISA exam dumps, the
PrepAwayExam.com CISA exam questions have been updated and answers have
been corrected get the newest PrepAwayExam.com CISA dumps with Test Engine
here: https://www.prepawayexam.com/ISACA/braindumps.CISA.ete.file.html (745 Q&As
Dumps, 40%OFF Special Discount: freecram)
NEW QUESTION: 62
Which of the following is MOST important to include in a contract to outsource data
processing that involves customer personally identifiable information (Pit)?
A. The vendor must sign a nondisclosure agreement with the organization.
B. The vendor must comply with the organization is legal and regulatory requirement.
C. The vendor must compensate the organization if nonperformance occurs.
D. The vendor must provide an independent report of its data processing facilities.
Answer: C (LEAVE A REPLY)
NEW QUESTION: 63
Which of the following is a key success factor for implementing IT governance?
A. Establishing an IT governance committee
B. Delivering IT projects within budget
C. Aligning IT and business strategies
D. Embedding quality assurance processes
Answer: C (LEAVE A REPLY)
NEW QUESTION: 64
Buffer overflow in an Internet environment is of particular concern to the IS auditor
because it can:
A. cause the loss of critical data during processing.
B. cause printers to lose some of the document text when printing
C. be used to obtain improper access to a system.
D. corrupt databases during the build.
Answer: (SHOW ANSWER)
NEW QUESTION: 65
A post-implementation review of a system implementation has identified that the defined
objectives were changed several times without the approval of the project board. What
would the IS auditor do NEXT?
A. Notify the project management office and raise a finding
B. Notify the project sponsor and request that the project be reopened.
C. Determine whether the revised objectives are appropriate
D. Ask management to obtain retrospective approvals
Answer: C (LEAVE A REPLY)
NEW QUESTION: 66
During a help desk review, an IS auditor determines the call abandonment rate exceeds
agreed-upon service levels. What conclusion can be drawn from this finding?
A. Users are finding solutions from alternative sources.
B. There are insufficient telephone lines available to the help desk.
C. Help desk staff are unable to resolve a sufficient number of problems on the first call.
D. There is insufficient staff to handle the help desk call volume.
Answer: D (LEAVE A REPLY)
NEW QUESTION: 67
Which of the following is MOST important to include in forensic data collection and
preservation procedure?
A. Determining tools to be used
B. Maintaining chain of custody
C. Preserving data integrity
D. Assuring the physical security of devices
Answer: (SHOW ANSWER)
NEW QUESTION: 68
What is an IS auditor's BEST recommendation to management if a review of the incident
management process finds multiple instances of incident tickets remaining open for an
unusually long time?
A. Implement reporting of key performance indicators (KPIs) for ticket closure.
B. Configure the system to automatically close tickets after a defined period.
C. Increase the number of help desk staff to enable faster ticket closure.
D. Manually review the identified tickets and mark as closed in the system.
Answer: A (LEAVE A REPLY)
NEW QUESTION: 69
Which of the following would provide the BEST evidence of successfully completed batch
uploads?
A. Enforcing batch cut-off times
B. Sign-off on the batch journal
C. Using sequence controls
D. Reviewing process logs
Answer: D (LEAVE A REPLY)
NEW QUESTION: 70
Which of the following would BEST detect logic bombs in new programs?
A. Regression testing
B. Parallel/pilot testing
C. Final acceptance testing by users
D. Independent program review
Answer: D (LEAVE A REPLY)
NEW QUESTION: 71
MOST effective way to determine if IT is meeting business requirements is to establish:
A. organizational goals.
B. industry benchmarks
C. a capability model.
D. key performance indicators (KPls).
Answer: D (LEAVE A REPLY)
NEW QUESTION: 72
An IS auditor is planning a risk-based audit of the human resources department. The
department uses separate systems for its payroll, training and employee performance
review functions. What should the IS auditor do FIRST before identifying the key controls
to be tested?
A. Assess the control risk associated with each system.
B. Determine the number of samples to be tested for each system.
C. Identify the technical skills and resources needed to audit each system.
D. Determine the inherent risk related to each system.
Answer: (SHOW ANSWER)
NEW QUESTION: 73
An IS auditor learns that after each scheduled batch process runs, management performs
a reconciliation between upstream and downstream data. Which of the following is MOST
important for the auditor to investigate?
A. Change management over job scheduling
B. Access to the job scheduler
C. Results of user acceptance testing
D. Job failure resolution controls
Answer: D (LEAVE A REPLY)
NEW QUESTION: 74
The operations team of an organization has reported an IS security attack. Which of the
following should be the NEXT step for the security incident response team?
A. Document lessons learned
B. Report results to management.
C. Perform a damage assessment
D. Prioritize resources for corrective action
Answer: (SHOW ANSWER)
NEW QUESTION: 75
An IS auditor is examining a front-end sub ledger and a main ledger Which of the following
would be the GREATEST concern if there are flaws in the mapping of accounts between
the two systems?
A. Double-posting of a single journal entry
B. inability to support new business Transactions
C. Inaccuracy of financial reporting
D. Unauthorized alteration of account attributes
Answer: (SHOW ANSWER)
NEW QUESTION: 76
Which of the following findings should hr of GREATEST concern for an IS auditor when
auditing the effectiveness of a phishing simulation test administered for staff members?
A. Staff members were not notified about the test beforehand
B. C
C. Test results were not communicated to staff members
D. Security awareness training was not provided poor to the test
E. Staff members who failed the test did not receive follow-up education
Answer: (SHOW ANSWER)
Valid CISA Dumps shared by PrepAwayExam.com for Helping Passing CISA Exam!
PrepAwayExam.com now offer the newest CISA exam dumps, the
PrepAwayExam.com CISA exam questions have been updated and answers have
been corrected get the newest PrepAwayExam.com CISA dumps with Test Engine
here: https://www.prepawayexam.com/ISACA/braindumps.CISA.ete.file.html (745 Q&As
Dumps, 40%OFF Special Discount: freecram)
NEW QUESTION: 77
An IS auditor notes that several users have not logged into an application for more than
one year. Which of the following would be the BEST audit recommendation?
A. Delete the affected users' IDs.
B. Update the termination procedures
C. Periodically review user access.
D. Periodically review the information security policy.
Answer: (SHOW ANSWER)
NEW QUESTION: 78
In which of the following cloud service models does the user organization have the
GREATEST control over the accuracy of configuration items in its configuration
management database (CMDB)?
A. Software as a Service (SaaS)
B. Platform as a Service (PaaS)
C. Database as a Service (DbaaS)
D. Infrastructure as a Service (laaS)
Answer: D (LEAVE A REPLY)
NEW QUESTION: 79
In the IT department where segregation of duties is not feasible due to a limited number of
resources, a team member is performing the functions of computer operator and reviewer
of application logs. Which of the following would be the IS auditor's BEST
recommendation?
A. Prevent the operator from performing application development activities.
B. Restrict the computer operator's access to the production environment
C. Assign an independent second reviewer to verify the application logs.
D. Develop procedures to verify that the application logs are not modified.
Answer: D (LEAVE A REPLY)
NEW QUESTION: 80
An IS auditor is assessing a recent migration of mission critical applications to a virtual
platform. Which of the following observations poses the GREATEST risk to the
organization?
A. Role descriptions do not accurately reflect new virtualization responsibilities.
B. A post-implementation review of the hypervisor has not yet been conducted.
C. The migration was not approved by the board of directors.
D. Training for staff with new virtualization responsibilities has not been conducted.
Answer: A (LEAVE A REPLY)
NEW QUESTION: 81
An IS auditor is planning an audit of an organization s payroll processes. Which of the
following is the BEST procedure to provide assurance against internal fraud?
A. Review management's approval of payroll system changes.
B. Review management's validation of payroll payment recipients.
C. Compare employee work contracts against hours entered in the payroll system.
D. Interview the payroll manager to obtain a detailed process workflow.
Answer: (SHOW ANSWER)
NEW QUESTION: 82
As part of an IS audit, the auditor notes the practices listed below.
Which of the following would be a segregation of duties concern?
A. System programmers have logged access to operating system parameters.
B. Operators are acting as tape librarians on alternate shifts.
C. Operators are degaussing magnetic tapes during night shifts
D. System programmers are performing the duties of operators.
Answer: (SHOW ANSWER)
NEW QUESTION: 83
Due to the increasing size of a database, user access times and daily backups continue to
increase. Which of the following would be the BEST way to address this situation?
A. Data mining
B. Data purging
C. Data modeling
D. Data visualization
Answer: (SHOW ANSWER)
NEW QUESTION: 84
To confirm integrity for a hashed message, the receiver should use
A. a different hashing algorithm from the sender s to create a numerical representation of
the file
B. the same hashing algorithm as the tender s to create a numerical representation of the
file.
C. the same hashing algorithm as the sender's to create a binary image of the file.
D. a different hashing algorithm from me sender s to create a binary image of the file
Answer: C (LEAVE A REPLY)
NEW QUESTION: 85
A retirement system verifies that the field for employee status has either a value of A (for
active) or R (for retired). This is an example of which type of check?
A. Completeness
B. Limit
C. Existence
D. Validity
Answer: C (LEAVE A REPLY)
NEW QUESTION: 86
An IS auditor is conducting a review of an organization s information systems and
discovers data that is no longer needed by business applications. Which of the following
would b IS auditor's BEST recommendation?
A. Ask the data custodian to remove it after confirmation from the business user
B. Assess the data according to the retention policy.
C. Keep the data and protect it using a data classification policy
D. Back up the data to removable media and store in a secure area.
Answer: D (LEAVE A REPLY)
NEW QUESTION: 87
Which of the following is the MOST critical characteristic of a biometric system?
A. Throughput rate
B. Registration time
C. Ease of use
D. Accuracy
Answer: D (LEAVE A REPLY)
NEW QUESTION: 88
Previous audits have found that a large organization has had a number of segregation of
duties conflicts between various roles, and the IT governance committee has asked the
audit function for guidance on how to address this issue. Which of the following is the
BEST recommendation?
A. Conduct a risk assessment and develop mitigating controls.
B. Review system access logs to identify escalation of user privileges.
C. Institute additional supervisory approvals when granting system access.
D. Revise the user organizational structure and policies
Answer: A (LEAVE A REPLY)
NEW QUESTION: 89
Which of the following poses the GREATEST risk to data security and integrity in a cloud
environment?
A. Data regulations are not clearly defined for the cloud provider.
B. Data backups are maintained with the cloud provider.
C. Data is transmitted using hypertext transfer protocol (HTTP).
D. Data is not classified prior to transmission to the cloud provider.
Answer: (SHOW ANSWER)
NEW QUESTION: 90
Which of the following should be done FIRST when planning a penetration test?
A. Determine reporting requirements for vulnerabilities
B. Obtain management consent for the testing
C. Execute nondisclosure agreements (NDAs).
D. Define the testing scope.
Answer: (SHOW ANSWER)
NEW QUESTION: 91
An advantage of object-oriented system development is that it:
A. is suited to data with complex relationships.
B. partitions systems into a client/server architecture.
C. is easier to code than procedural languages.
D. decreases the need for system documentation.
Answer: C (LEAVE A REPLY)
Valid CISA Dumps shared by PrepAwayExam.com for Helping Passing CISA Exam!
PrepAwayExam.com now offer the newest CISA exam dumps, the
PrepAwayExam.com CISA exam questions have been updated and answers have
been corrected get the newest PrepAwayExam.com CISA dumps with Test Engine
here: https://www.prepawayexam.com/ISACA/braindumps.CISA.ete.file.html (745 Q&As
Dumps, 40%OFF Special Discount: freecram)
NEW QUESTION: 92
Which of the following IS audit findings should be of GREATEST concern when preparing
to migrate to a new core system using a direct cut-over?
A. Lack of a rollback strategy for the system go-live
B. Plans to use some workarounds for an extended period after go-live
C. incomplete test cases for some critical reports
D. informal management approval to 90 live
Answer: A (LEAVE A REPLY)
NEW QUESTION: 93
Which of the following would be the MOST effective control to mitigate unintentional
misuse of authorized access?
A. Security awareness training
B. Formalized disciplinary action
C. Annual sign-off of acceptable use policy
D. Regular monitoring of user access logs
Answer: (SHOW ANSWER)
NEW QUESTION: 94
In a decentralized organization, the selection and purchase of IS products is acceptable as
long as which of the following conditions exists?
A. Managers undertake a full cost-benefit analysis before deciding what to purchase.
B. Acquired items are consistent with the organization's short- and long-term IS strategy
plans.
C. The same operating system is used throughout the organization.
D. Various offices are independent and exchange data on an occasional basis.
Answer: (SHOW ANSWER)
NEW QUESTION: 95
When conducting a requirements analysis for a project, the BEST approach would be to:
A. conduct a control self-assessment
B. prototype the requirements,
C. test operational deliverable
D. consult key stakeholders
Answer: (SHOW ANSWER)
NEW QUESTION: 96
Which of the following is the KST source of information for assessing the effectiveness of
IT process monitoring?
A. Performance data
B. Quality assurance (QA) reviews
C. Participative management techniques
D. Real-time audit software
Answer: (SHOW ANSWER)
NEW QUESTION: 97
Which of the following would BEST prevent data from being orphaned?
A. Table indexes
B. Table partitioning
C. Input validation checks
D. Referential integrity
Answer: (SHOW ANSWER)
NEW QUESTION: 98
Which combination of access controls provides the BEST physical protection for a server
room?
A. Card with a magnetic strip and a smart card
B. PIN and smart card
C. Card with a magnetic stop and a shared PIN
D. User ID and PIN
Answer: A (LEAVE A REPLY)
NEW QUESTION: 99
Which of the following is MOST important to helping incident response managers quickly
and accurately estimate the overall business impact of security incidents?
A. Develop a communication plan and identity key business stakeholders to be notified.
B. Engage senior business management in determining seventy levels for escalation.
C. Map IT infrastructure to the business processes and client services they support.
D. Ensure the security Incident management team Is staffed with qualified Individuals.
Answer: C (LEAVE A REPLY)
Valid CISA Dumps shared by PrepAwayExam.com for Helping Passing CISA Exam!
PrepAwayExam.com now offer the newest CISA exam dumps, the
PrepAwayExam.com CISA exam questions have been updated and answers have
been corrected get the newest PrepAwayExam.com CISA dumps with Test Engine
here: https://www.prepawayexam.com/ISACA/braindumps.CISA.ete.file.html (745 Q&As
Dumps, 40%OFF Special Discount: freecram)
Valid CISA Dumps shared by PrepAwayExam.com for Helping Passing CISA Exam!
PrepAwayExam.com now offer the newest CISA exam dumps, the
PrepAwayExam.com CISA exam questions have been updated and answers have
been corrected get the newest PrepAwayExam.com CISA dumps with Test Engine
here: https://www.prepawayexam.com/ISACA/braindumps.CISA.ete.file.html (745 Q&As
Dumps, 40%OFF Special Discount: freecram)
Valid CISA Dumps shared by PrepAwayExam.com for Helping Passing CISA Exam!
PrepAwayExam.com now offer the newest CISA exam dumps, the
PrepAwayExam.com CISA exam questions have been updated and answers have
been corrected get the newest PrepAwayExam.com CISA dumps with Test Engine
here: https://www.prepawayexam.com/ISACA/braindumps.CISA.ete.file.html (745 Q&As
Dumps, 40%OFF Special Discount: freecram)
Valid CISA Dumps shared by PrepAwayExam.com for Helping Passing CISA Exam!
PrepAwayExam.com now offer the newest CISA exam dumps, the
PrepAwayExam.com CISA exam questions have been updated and answers have
been corrected get the newest PrepAwayExam.com CISA dumps with Test Engine
here: https://www.prepawayexam.com/ISACA/braindumps.CISA.ete.file.html (745 Q&As
Dumps, 40%OFF Special Discount: freecram)
Valid CISA Dumps shared by PrepAwayExam.com for Helping Passing CISA Exam!
PrepAwayExam.com now offer the newest CISA exam dumps, the
PrepAwayExam.com CISA exam questions have been updated and answers have
been corrected get the newest PrepAwayExam.com CISA dumps with Test Engine
here: https://www.prepawayexam.com/ISACA/braindumps.CISA.ete.file.html (745 Q&As
Dumps, 40%OFF Special Discount: freecram)
Valid CISA Dumps shared by PrepAwayExam.com for Helping Passing CISA Exam!
PrepAwayExam.com now offer the newest CISA exam dumps, the
PrepAwayExam.com CISA exam questions have been updated and answers have
been corrected get the newest PrepAwayExam.com CISA dumps with Test Engine
here: https://www.prepawayexam.com/ISACA/braindumps.CISA.ete.file.html (745 Q&As
Dumps, 40%OFF Special Discount: freecram)
Valid CISA Dumps shared by PrepAwayExam.com for Helping Passing CISA Exam!
PrepAwayExam.com now offer the newest CISA exam dumps, the
PrepAwayExam.com CISA exam questions have been updated and answers have
been corrected get the newest PrepAwayExam.com CISA dumps with Test Engine
here: https://www.prepawayexam.com/ISACA/braindumps.CISA.ete.file.html (745 Q&As
Dumps, 40%OFF Special Discount: freecram)
Valid CISA Dumps shared by PrepAwayExam.com for Helping Passing CISA Exam!
PrepAwayExam.com now offer the newest CISA exam dumps, the
PrepAwayExam.com CISA exam questions have been updated and answers have
been corrected get the newest PrepAwayExam.com CISA dumps with Test Engine
here: https://www.prepawayexam.com/ISACA/braindumps.CISA.ete.file.html (745 Q&As
Dumps, 40%OFF Special Discount: freecram)
Valid CISA Dumps shared by PrepAwayExam.com for Helping Passing CISA Exam!
PrepAwayExam.com now offer the newest CISA exam dumps, the
PrepAwayExam.com CISA exam questions have been updated and answers have
been corrected get the newest PrepAwayExam.com CISA dumps with Test Engine
here: https://www.prepawayexam.com/ISACA/braindumps.CISA.ete.file.html (745 Q&As
Dumps, 40%OFF Special Discount: freecram)
Valid CISA Dumps shared by PrepAwayExam.com for Helping Passing CISA Exam!
PrepAwayExam.com now offer the newest CISA exam dumps, the
PrepAwayExam.com CISA exam questions have been updated and answers have
been corrected get the newest PrepAwayExam.com CISA dumps with Test Engine
here: https://www.prepawayexam.com/ISACA/braindumps.CISA.ete.file.html (745 Q&As
Dumps, 40%OFF Special Discount: freecram)
Valid CISA Dumps shared by PrepAwayExam.com for Helping Passing CISA Exam!
PrepAwayExam.com now offer the newest CISA exam dumps, the
PrepAwayExam.com CISA exam questions have been updated and answers have
been corrected get the newest PrepAwayExam.com CISA dumps with Test Engine
here: https://www.prepawayexam.com/ISACA/braindumps.CISA.ete.file.html (745 Q&As
Dumps, 40%OFF Special Discount: freecram)
Valid CISA Dumps shared by PrepAwayExam.com for Helping Passing CISA Exam!
PrepAwayExam.com now offer the newest CISA exam dumps, the
PrepAwayExam.com CISA exam questions have been updated and answers have
been corrected get the newest PrepAwayExam.com CISA dumps with Test Engine
here: https://www.prepawayexam.com/ISACA/braindumps.CISA.ete.file.html (745 Q&As
Dumps, 40%OFF Special Discount: freecram)
Valid CISA Dumps shared by PrepAwayExam.com for Helping Passing CISA Exam!
PrepAwayExam.com now offer the newest CISA exam dumps, the
PrepAwayExam.com CISA exam questions have been updated and answers have
been corrected get the newest PrepAwayExam.com CISA dumps with Test Engine
here: https://www.prepawayexam.com/ISACA/braindumps.CISA.ete.file.html (745 Q&As
Dumps, 40%OFF Special Discount: freecram)
Valid CISA Dumps shared by PrepAwayExam.com for Helping Passing CISA Exam!
PrepAwayExam.com now offer the newest CISA exam dumps, the
PrepAwayExam.com CISA exam questions have been updated and answers have
been corrected get the newest PrepAwayExam.com CISA dumps with Test Engine
here: https://www.prepawayexam.com/ISACA/braindumps.CISA.ete.file.html (745 Q&As
Dumps, 40%OFF Special Discount: freecram)
Valid CISA Dumps shared by PrepAwayExam.com for Helping Passing CISA Exam!
PrepAwayExam.com now offer the newest CISA exam dumps, the
PrepAwayExam.com CISA exam questions have been updated and answers have
been corrected get the newest PrepAwayExam.com CISA dumps with Test Engine
here: https://www.prepawayexam.com/ISACA/braindumps.CISA.ete.file.html (745 Q&As
Dumps, 40%OFF Special Discount: freecram)
Valid CISA Dumps shared by PrepAwayExam.com for Helping Passing CISA Exam!
PrepAwayExam.com now offer the newest CISA exam dumps, the
PrepAwayExam.com CISA exam questions have been updated and answers have
been corrected get the newest PrepAwayExam.com CISA dumps with Test Engine
here: https://www.prepawayexam.com/ISACA/braindumps.CISA.ete.file.html (745 Q&As
Dumps, 40%OFF Special Discount: freecram)
Valid CISA Dumps shared by PrepAwayExam.com for Helping Passing CISA Exam!
PrepAwayExam.com now offer the newest CISA exam dumps, the
PrepAwayExam.com CISA exam questions have been updated and answers have
been corrected get the newest PrepAwayExam.com CISA dumps with Test Engine
here: https://www.prepawayexam.com/ISACA/braindumps.CISA.ete.file.html (745 Q&As
Dumps, 40%OFF Special Discount: freecram)