ISACA CISA v2022-01-10 q320
ISACA CISA v2022-01-10 q320
ISACA CISA v2022-01-10 q320
q320
NEW QUESTION: 1
Which of the following is the BEST way to achieve high availability and fault tolerance for
an e-business system?
A. Robust systems architecture
B. Network diversity
C. Secure offsite backup storage
D. Storage area network
Answer: A (LEAVE A REPLY)
NEW QUESTION: 2
An organization is planning to re-purpose workstations mat were used to handle
confidential information. Which of the following would be the IS auditor's BEST
recommendation to dispose of this information?
A. Erase the disks by degaussing.
B. Delete the disk partitions.
C. Reformat the disks.
D. Overwrite the disks with random data
Answer: D (LEAVE A REPLY)
NEW QUESTION: 3
Which of the following should be the PRIMARY consideration for IT management when
selecting a new information security tool that monitors suspicious file access patterns?
A. Data correlation and visualization capabilities
B. Integration with existing architecture
C. Ease of support and troubleshooting
D. Ability to contribute to key performance indicator data
Answer: B (LEAVE A REPLY)
NEW QUESTION: 4
Which of the following poses the GREATEST security risk when implementing acquired
application systems?
A. Social engineering
B. Default logon IDs
C. Password length
D. Lack of audit logs
Answer: B (LEAVE A REPLY)
NEW QUESTION: 5
What is the BEST way (or an IS auditor to assess the adequacy of an expert consultant
who was selected to be involved in an audit engagement?
A. Obtain an understanding of the expert's relevant experience.
B. Review the independence and objectivity of the expert.
C. Verify that the engagement letter outlines the expert's responsibilities.
D. Review the industry reputation of the expert consultant's firm.
Answer: A (LEAVE A REPLY)
NEW QUESTION: 6
An IS auditor is reviewing a network diagram. Which of the following would be the BEST
location for placement of a firewall?
A. At borders of network segments with different security levels
B. Inside the demilitarized zone (DMZ)
C. Between each host and the local network switch/hub
D. Between virtual local area networks (VLANs)
Answer: B (LEAVE A REPLY)
NEW QUESTION: 7
Which of the following should be of GREATEST concern to an IS auditor reviewing project
documentation for a client relationship management (CRM) system migration project?
A. Five weeks prior to the target date, there are still numerous defects in the printing
functionality.
B. A single implementation phase is planned and the legacy system will be immediately
decommissioned.
C. The technical migration is planned for a holiday weekend and end users may not be
available.
D. Employees are concerned that data representation in the new system is completely
different from the old system.
Answer: (SHOW ANSWER)
NEW QUESTION: 8
Which of the following is the MOST effective sampling method for an IS auditor to use for
identifying fraud and circumvention of regulations?
A. Statistical sampling
B. Variable sampling
C. Stop-or-go sampling
D. Discovery sampling
Answer: D (LEAVE A REPLY)
NEW QUESTION: 9
The use of control totals reduces the risk of
A. incomplete processing
B. improper authorization
C. improper backup.
D. posting to the wrong record
Answer: (SHOW ANSWER)
NEW QUESTION: 10
An IS auditor is reviewing a data conversion project Which of the following is the auditor's
BEST recommendation prior to golive?
A. Conduct a mock conversion test.
B. Automate the test scripts
C. Establish a conliguiation baseline.
D. Review test procedures and scenarios
Answer: (SHOW ANSWER)
NEW QUESTION: 11
Which of the following BEST enables an organization to quantify acceptable data loss in
the event of a disaster?
A. Availability of backup software
B. Recovery time objective (RTO)
C. Recovery point objective (RPO)
D. Mean time to recover (MTTR)
Answer: C (LEAVE A REPLY)
NEW QUESTION: 12
Which of the following is the GREATEST risk associated with vulnerability scanning tools
used to identify security weaknesses?
A. Use of open source tools
B. False positives
C. Outdated signatures for detection
D. False negatives
Answer: (SHOW ANSWER)
NEW QUESTION: 13
During an ongoing audit management requests a briefing on the findings to date Which of
the following is the IS auditor's BEST course of action? *
A. Request management wait until a final report is ready for discussion
B. Present observations lor discussion only.
C. Request the auditee provide management responses
D. Review working papers with the auditee
Answer: B (LEAVE A REPLY)
NEW QUESTION: 14
Which of the following is the GREATEST benefit of implementing an incident management
process?
A. Reduction of cost by the efficient use of resources
B. Reduction in the business impact of incidents
C. Reduction in security threats
D. Opportunity for frequent reassessment of incidents
Answer: (SHOW ANSWER)
NEW QUESTION: 15
While conducting a review of project plans related to a new software development, an IS
auditor finds the project initiation document (PID) is incomplete. What is the BEST way for
the auditor to proceed?
A. Escalate to the project steering committee.
B. Inform audit management of possible risks associated with the deficiency.
C. Prepare a finding for the audit report.
D. Meet with the project sponsor to discuss the incomplete document.
Answer: D (LEAVE A REPLY)
NEW QUESTION: 16
Which of the following are examples of detective controls?
A. Source code review and echo checks in telecommunications
B. Check points in production jobs and rerun procedures
C. Use of access control software and deploying encryption software
D. Continuity of operations planning and backup procedures
Answer: (SHOW ANSWER)
Valid CISA Dumps shared by Fast2test.com for Helping Passing CISA Exam!
Fast2test.com now offer the newest CISA exam dumps, the Fast2test.com CISA exam
questions have been updated and answers have been corrected get the newest
Fast2test.com CISA dumps with Test Engine here: https://www.fast2test.com/CISA-
premium-file.html (440 Q&As Dumps, 30%OFF Special Discount: freecram)
NEW QUESTION: 17
An organization plans to implement a virtualization strategy enabling multiple operating
systems on a single host. Which of the following should be the GREATEST concern with
this strategy?
A. Licensing costs of the host
B. Adequate storage space
C. Application performance
D. Network bandwidth
Answer: A (LEAVE A REPLY)
NEW QUESTION: 18
In a high-volume, real-time system, the MOST effective technique by which to continuously
monitor and analyze transaction processing is:
A. integrated test facility (ITF)
B. transaction tagging
C. embedded audit modules.
D. parallel simulation.
Answer: (SHOW ANSWER)
NEW QUESTION: 19
Which of the following types of testing would BEST mitigate the risk of a newly
implemented system adversely impacting existing systems?
A. Sociability testing
B. User acceptance testing (UAT)
C. Functionality testing
D. Unit testing
Answer: (SHOW ANSWER)
NEW QUESTION: 20
Which of the following should be of concern to an IS auditor performing a software audit on
virtual machines?
A. Multiple users can access critical applications
B. Software licensing does not support virtual machines
C. Software has been installed on virtual machines by privileged users.
D. Applications have not been approved by the chief financial officer (CFO) .
Answer: B (LEAVE A REPLY)
NEW QUESTION: 21
Which of the following is necessary for effective risk management in IT governance?
A. Local managers are solely responsible for risk evaluation
B. Risk management strategy is approved by the audit committee
C. Risk evaluation is embedded in management processes.
D. IT risk management is separate from corporate risk management
Answer: C (LEAVE A REPLY)
NEW QUESTION: 22
Which of the following is the client organization's responsibility in a Software as a Service
(SaaS) environment?
A. Detecting unauthorized access
B. Ensuring the data is available when needed
C. Preventing insertion of malicious code
D. Ensuring that users are properly authorized
Answer: D (LEAVE A REPLY)
NEW QUESTION: 23
An IS auditor finds that one employee has unauthorized access to confidential dat a. The
IS auditor's BEST recommendation should be to:
A. recommend corrective actions to be taken by the security administrator.
B. require the business owner to conduct regular access reviews.
C. reclassify the data to a lower level of confidentiality.
D. implement a strong password schema for users,
Answer: B (LEAVE A REPLY)
NEW QUESTION: 24
An IS auditor is reviewing an industrial control system (ICS) that uses older unsupported
technology in the scope of an upcoming audit. What should the auditor consider the MOST
significant concern?
A. There is a greater risk of system exploitation.
B. Disaster recovery plans (DRPs) are not in place.
C. Attack vectors are evolving for industrial control systems.
D. Technical specifications are not documented.
Answer: B (LEAVE A REPLY)
NEW QUESTION: 25
Which of the following is the MOST important process to ensure planned IT system
changes are completed in an efficient manner?
A. Release management
B. Incident management
C. Demand management
D. Configuration management
Answer: A (LEAVE A REPLY)
NEW QUESTION: 26
Which of the following reports would provide the GREATEST assurance to an IS auditor
about the controls of a third party that processes critical data for the organization?
A. Black box penetration test report
B. Independent control assessment
C. Vulnerability scan report
D. The third party's control self-assessment (CSA)
Answer: B (LEAVE A REPLY)
NEW QUESTION: 27
What is the BEST way to control updates to the vendor master file in an accounts payable
system?
A. Periodically reviewing the entire vendor master file
B. Using prenumbered and authorized request forms
C. Comparing updates against authorization
D. Having only one person updating the master file
Answer: C (LEAVE A REPLY)
NEW QUESTION: 28
During the planning stage of a compliance audit an IS auditor discovers that a bank's
Inventory of compliance requirements does not include recent regulatory changes related
to managing data risk. What should the auditor do FIRST?
A. Discuss potential regulatory issues with the legal department.
B. Ask management why the regulatory changes have not been included
C. Report the missing regulatory updates to the chief information officer (CIO)
D. Exclude recent regulatory changes from the audit scope
Answer: A (LEAVE A REPLY)
NEW QUESTION: 29
internal IS auditor recommends that incoming accounts payable payment files be
encrypted. Which type of control is the auditor recommending?
A. Detective
B. Corrective
C. Preventive
D. Directive
Answer: (SHOW ANSWER)
NEW QUESTION: 30
An IS auditor has been asked to perform a post-Implementation assessment of a new
corporate human resources (HR) system. Which of the following control areas would be
MOST important to review for the protection of employee information?
A. Logging capabilities
B. Authentication mechanisms
C. System architecture
D. Data retention practices
Answer: A (LEAVE A REPLY)
NEW QUESTION: 31
Which of the following is the PRIMARY reason an IS auditor should use an IT-related
framework as a basis for scoping and structuring an audit?
A. It helps ensure comprehensiveness of the review and provides guidance on best
practices.
B. It demonstrates to management whether legal and regulatory requirements have been
met.
C. It simplifies audit planning and reduces resource requirements to complete an audit.
D. It provides a foundation to recommend certification of the organization's compliance
with the framework.
Answer: A (LEAVE A REPLY)
Valid CISA Dumps shared by Fast2test.com for Helping Passing CISA Exam!
Fast2test.com now offer the newest CISA exam dumps, the Fast2test.com CISA exam
questions have been updated and answers have been corrected get the newest
Fast2test.com CISA dumps with Test Engine here: https://www.fast2test.com/CISA-
premium-file.html (440 Q&As Dumps, 30%OFF Special Discount: freecram)
NEW QUESTION: 32
The PRIMARY benefit of information asset classification is that it:
A. helps to align organizational objectives.
B. enables risk management decisions.
C. facilitates budgeting accuracy.
D. prevents loss of assets.
Answer: B (LEAVE A REPLY)
NEW QUESTION: 33
Malicious program code was found in an application and corrected prior to release into
production. After the release, the same issue was reported. Which of the following is the IS
auditor's BEST recommendation?
A. Ensure the business signs off on end-to-end user acceptance test (UAT) results.
B. Ensure change management reports are independently reviewed.
C. Ensure programmers cannot access code after the completion of program edits.
D. Ensure corrected program code is compiled in a dedicated server.
Answer: C (LEAVE A REPLY)
NEW QUESTION: 34
A PRIMARY benefit derived by an organization employing control self-assessment (CSA)
techniques is that CSA
A. can identify nigh-risk areas for detailed review
B. can be used as a replacement for traditional audits.
C. allows management to relinquish responsibility for control.
D. allows IS auditors to independently assess risk
Answer: A (LEAVE A REPLY)
NEW QUESTION: 35
Which of the following is the PRIMARY reason for an organization's procurement
processes to include an independent party who is not directly involved with business
operations and related decision-making'?
A. To ensure continuity of processes and procedures
B. To avoid conflicts of interest
C. To ensure favorable price negotiations
D. To optimize use of business team resources
Answer: B (LEAVE A REPLY)
NEW QUESTION: 36
An organization plans to launch a social media presence as part of a new customer service
campaign. Which of the following is the MOST significant risk from the perspective of
potential litigation?
A. Access to corporate-sponsored social media accounts requires only single-factor
authentication.
B. Approved employees can use personal devices to post on the company $ behalf
C. There is a lack of dear procedures for responding to customers on social media outlets
D. The policy stating what employees can post on the organization s behalf is unclear.
Answer: D (LEAVE A REPLY)
NEW QUESTION: 37
Which of the following is a preventive control related to change management?
A. Debugging of implemented changes
B. Log review of managed changes
C. Audit of implemented changes for the period under review
D. Implementation of managed change approval processes
Answer: D (LEAVE A REPLY)
NEW QUESTION: 38
Which of the following is the BEST way to loster continuous improvement of IS audit
processes and practices?
A. Establish and embed quality assurance (QA) within the IS audit function.
B. Invite external auditors and regulators to perform regular assessments of the IS audit
function.
C. Frequently review IS audit policies, procedures, and instruction manuals
D. Implement rigorous management review and sign-off of IS audit deliverables.
Answer: A (LEAVE A REPLY)
NEW QUESTION: 39
Which of the following is the MOST important factor when an organization is developing
information security policies and procedures?
A. Compliance with relevant regulations
B. Consultation with security staff
C. Alignment with an information security framework
D. Inclusion of mission and objectives
Answer: A (LEAVE A REPLY)
NEW QUESTION: 40
Which of the following is the GREATEST risk associated with conducting penetration
testing on a business-critical application production environment?
A. Data integrity may become compromised
B. Results may differ from those obtained in the test environment
C. This type of testing may not adhere to audit standards
D. System owners may not be informed in advance
Answer: A (LEAVE A REPLY)
NEW QUESTION: 41
An IS auditor is planning on utilizing attribute sampling to determine the error rate for
health care claims processed. Which of the following factors will cause the sample size to
decrease?
A. Acceptable risk level decrease
B. Expected error rate increase
C. Tolerable error rate increase
D. Population size increase
Answer: B (LEAVE A REPLY)
NEW QUESTION: 42
Which of the following should be of GREATEST concern for an IS auditor reviewing an
organization's bring your own device (BYOD) policy?
A. The policy does not include the right to audit BYOD devices.
B. Not all devices are approved for BYOD.
C. The policy is not updated annually.
D. A mobile device management (MDM) solution is not implemented.
Answer: D (LEAVE A REPLY)
NEW QUESTION: 43
Which of the following is a determine security control that reduces the likelihood of an
insider threat event?
A. Distributing disciplinary policies
B. Executing data recovery procedures
C. Removing malicious code
D. Creating contingency plans
Answer: (SHOW ANSWER)
NEW QUESTION: 44
A sales representative is reviewing the organization's feedback blog and gets redirected to
a site that sells illegal prescription drugs. The blog site is MOST likely susceptible to which
of the following types of attacks?
A. SQL injection
B. Phishing attack
C. Cross-site scripting
D. Directory harvesting
Answer: C (LEAVE A REPLY)
NEW QUESTION: 45
An IS auditor finds that an organization's data toss prevention (DLP) system is configured
to use vendor default settings to identify violations. The auditor's MAIN concern should be
that:
A. violation reports may not be reviewed in a timely manner.
B. violations may not be categorized according to the organization's risk profile.
C. a significant number of false positive violations may be reported.
D. violation reports may not be retained according to the organization's risk profile.
Answer: (SHOW ANSWER)
NEW QUESTION: 46
An IS auditor is asked to provide feedback on the systems options analysis for a new
project The BEST course of action for the IS auditor would be to:
A. comment on the criteria used to assess the alternatives.
B. request at least one other alternative.
C. identify the best alternative.
D. retain comments as findings for the audit report.
Answer: (SHOW ANSWER)
Valid CISA Dumps shared by Fast2test.com for Helping Passing CISA Exam!
Fast2test.com now offer the newest CISA exam dumps, the Fast2test.com CISA exam
questions have been updated and answers have been corrected get the newest
Fast2test.com CISA dumps with Test Engine here: https://www.fast2test.com/CISA-
premium-file.html (440 Q&As Dumps, 30%OFF Special Discount: freecram)
NEW QUESTION: 47
Which of the following BEST helps to identify errors during data transfer?
A. Decrease the size of data transfer packets.
B. Enable a logging process for data transfer.
C. Test the integrity of the data transfer.
D. Review and verify the data transfer sequence numbers.
Answer: D (LEAVE A REPLY)
NEW QUESTION: 48
An IS auditor has obtained a large complex data set for analysis. Which of the following
activities will MOST improve the output from the use of data analytics tools?
A. Data classification
B. Data masking
C. Data preparation
D. Data anonymization
Answer: C (LEAVE A REPLY)
NEW QUESTION: 49
When auditing the closing stages of a system development project, which of the following
should be the MOST important consideration?
A. Control requirements
B. Functional requirements documentation
C. User acceptance test (UAT) results
D. Rollback procedures
Answer: C (LEAVE A REPLY)
NEW QUESTION: 50
A senior auditor is reviewing work papers prepared by a junior auditor indicating that a
finding was removed after the auditee said they corrected the problem. Which of the
following is the senior auditor's MOST appropriate course of action?
A. Approve the work papers as written
B. Ask the auditee to retest
C. Have the finding reinstated
D. Refer the issue to the audit director
Answer: (SHOW ANSWER)
NEW QUESTION: 51
An organization that has suffered a cyber attack is performing a forensic analysis of the
affected users' computers Which of the following should be of GREATEST concern for the
IS editor reviewing this process?
A. The chain of custody has not been documented
B. Audit was only involved during extraction of the information.
C. The legal department has not been engaged.
D. An imaging process was used to obtain a copy of the data from each computer.
Answer: A (LEAVE A REPLY)
NEW QUESTION: 52
Which of the following BEST describes the relationship between vulnerability scanning and
penetration testing?
A. For entities with regulatory drivers, the two tests must be the same.
B. Both utilize a risk-based analysis that considers threat scenarios
C. Both are labor-intensive in preparation, planning and execution
D. The scope of both is determined primarily by the likelihood of exploitation
Answer: B (LEAVE A REPLY)
NEW QUESTION: 53
Which of the following is the GREATEST risk associated with data conversion and
migration during implementation of a new application?
A. Inadequate audit trails and logging
B. Lack of data transformation rules
C. Obsolescence and data backup compatibility
D. Absence of segregation of duties
Answer: (SHOW ANSWER)
NEW QUESTION: 54
Which of the following provides an IS auditor with the BEST evidence that a system has
been assessed for known exploits?
A. Black box testing report
B. Patch cycle report
C. Vulnerability scanning report
D. White box testing report
Answer: C (LEAVE A REPLY)
NEW QUESTION: 55
Which of the following is MOST important for an IS auditor to test when reviewing market
data received from external providers?
A. Data encryption configurations
B. Data transformation configurations
C. Data loading controls
D. Data quality controls
Answer: D (LEAVE A REPLY)
NEW QUESTION: 56
A help desk has been contacted regarding a lost business mobile device The FIRST
course of action should be to
A. verify the user's identity through a challenge response system
B. involve the security response team to launch an investigation
C. consult the legal team regarding the impact of intellectual property loss
D. attempt to locate the device remotely.
Answer: D (LEAVE A REPLY)
NEW QUESTION: 57
A banking organization has outsourced its customer data processing facilities to an
external service provider. Which of the following roles is accountable for ensuring the
security of customer data?
A. The bank's senior management
B. The service provider's data processor
C. The service provider's data privacy officer
D. The bank's vendor risk manager
Answer: (SHOW ANSWER)
NEW QUESTION: 58
Which of the following are BEST suited for continuous auditing?
A. Low-value transactions
B. Manual transactions
C. Irregular transactions
D. Real-time transactions
Answer: D (LEAVE A REPLY)
NEW QUESTION: 59
An IS auditor learns a server administration team regularly applies workarounds to address
repeated failures of critical data processing services. Which of the following would BEST
enable the organization to resolve this issue?
A. Change management
B. Problem management
C. Incident management
D. Service level management
Answer: B (LEAVE A REPLY)
NEW QUESTION: 60
Which of the following security testing techniques is MOST effective in discovering
unknown malicious attacks?
A. Sandboxing
B. Penetration testing
C. Vulnerability testing
D. Reverse engineering
Answer: A (LEAVE A REPLY)
NEW QUESTION: 61
Which of the following is the BEST way to mitigate risk to an organization's network
associated with devices permitted under a bring your own device (BYOD) policy?
A. Ensure the policy requires antivirus software on devices
B. Require personal devices to be reviewed by IT staff
C. Enable port security on all network switches
D. Implement a network access control system
Answer: A (LEAVE A REPLY)
Valid CISA Dumps shared by Fast2test.com for Helping Passing CISA Exam!
Fast2test.com now offer the newest CISA exam dumps, the Fast2test.com CISA exam
questions have been updated and answers have been corrected get the newest
Fast2test.com CISA dumps with Test Engine here: https://www.fast2test.com/CISA-
premium-file.html (440 Q&As Dumps, 30%OFF Special Discount: freecram)
NEW QUESTION: 62
Capacity management enables organizations to:
A. identify the extent to which components need to be upgraded.
B. forecast technology trends.
C. establish the capacity of network communication links.
D. determine business transaction volumes.
Answer: (SHOW ANSWER)
NEW QUESTION: 63
Which of the following provides the MOST assurance that new information systems are
ready for migration to the production environment?
A. Approval by the change advisory board
B. Results of end user acceptance testing (UAT)
C. Results of penetration testing performed by the development team
D. System quality assurance (QA) performed by an in-house team
Answer: B (LEAVE A REPLY)
NEW QUESTION: 64
A financial institution has a system interface that is used by its branches to obtain
applicable currency exchange rates when processing transactions Which of the following
should be the PRIMARY control objective for maintaining the security of the system
interface?
A. Preventing unauthorized access to the data via interception
B. Preventing unauthorized access to the data via malicious activity
C. Ensuring the integrity of the data being transferred
D. Ensuring the availability of the data being transferred
Answer: (SHOW ANSWER)
NEW QUESTION: 65
The BEST way to determine whether programmers have permission to alter data in the
production environment is by reviewing:
A. how the latest system changes were implemented
B. the access rights that have been granted
C. the access control system's configuration.
D. the access control system's log settings.
Answer: B (LEAVE A REPLY)
NEW QUESTION: 66
Which of the following is the BEST development methodology to help manage project
requirements in a rapidly changing environment?
A. Object-oriented system development
B. Prototyping
C. Waterfall development process
D. Iterative development process
Answer: D (LEAVE A REPLY)
NEW QUESTION: 67
Which of the following MOST effectively mitigates the risk of disclosure of sensitive data
stored on company-owned smartphones?
A. Mobile device management (MDM)
B. Data leakage prevention (DLP) tools
C. Physical device tagging
D. Secure containers
Answer: (SHOW ANSWER)
NEW QUESTION: 68
Which of the following is the PRIMARY reason an IS auditor should discuss observations
with management before delivering a final report?
A. Validate the audit observations.
B. Identify business risks associated with the observations
C. Record the proposed course of corrective action.
D. Assist the management with control enhancements.
Answer: (SHOW ANSWER)
NEW QUESTION: 69
A bank is relocating its servers to a vendor that provides data center hosting services to
multiple clients. Which of the following controls would restrict other clients from physical
access to the bank servers?
A. Closed-circuit television camera
B. 24-hour security guards
C. Locking server cages
D. Biometric access at all data center entrances
Answer: C (LEAVE A REPLY)
NEW QUESTION: 70
An IS audit manager is preparing the starling plan for an audit engagement of a cloud
service provider What should be the manager's PRIMARY concern when made aware that
a new auditor in the department previous worked for this provider?
A. Integrity
B. Professional conduct
C. Independence
D. Competency
Answer: A (LEAVE A REPLY)
NEW QUESTION: 71
Which of the following is the MOST likely cause of a successful firewall penetration?
A. Firewall misconfiguration by the administrator
B. Virus infection
C. Use of a Trojan to bypass the firewall
D. Loophole m firewall vendor's code
Answer: (SHOW ANSWER)
NEW QUESTION: 72
During an audit of identity and access management, an IS auditory finds that the
engagement audit plan does not include the testing of controls that regulate access by
third parties. Which of the following would be the auditor's BEST course of action?
A. Escalate the deficiency to audit management.
B. Add testing of third-party access controls to the scope of the audit.
C. Plan to test these controls in another audit
D. Determine whether the risk has been identified in the planning documents
Answer: B (LEAVE A REPLY)
NEW QUESTION: 73
Which of the following is MOST important for an IS auditor to consider during a review of
the IT governance of an organization?
A. Risk management methodology
B. Funding allocation
C. Defined service levels
D. Decision making responsibilities
Answer: D (LEAVE A REPLY)
NEW QUESTION: 74
An organization is using a single account shared by personnel for its social networking
marketing page. Which of the following is the BEST method to maintain accountability over
the account?
A. Integrating the account with single sign-on
B. Reviewing access rights on a periodic basis
C. Regular monitoring of proxy server logs
D. Implementing an account password check-out process
Answer: B (LEAVE A REPLY)
NEW QUESTION: 75
What is the BEST control to address SQL injection vulnerabilities?
A. Unicode translation
B. Digital signatures
C. Input validation
D. Secure Sockets Layer (SSL) encryption
Answer: D (LEAVE A REPLY)
NEW QUESTION: 76
Secure code reviews as part of a conbnuous deployment program are which type of
control?
A. Logical
B. Corrective
C. Detective
D. Preventive
Answer: (SHOW ANSWER)
Valid CISA Dumps shared by Fast2test.com for Helping Passing CISA Exam!
Fast2test.com now offer the newest CISA exam dumps, the Fast2test.com CISA exam
questions have been updated and answers have been corrected get the newest
Fast2test.com CISA dumps with Test Engine here: https://www.fast2test.com/CISA-
premium-file.html (440 Q&As Dumps, 30%OFF Special Discount: freecram)
NEW QUESTION: 77
Which of the following is a preventive control that can be used to mitigate insider threats?
A. Role-based access
B. User activity monitoring
C. Backup procedures
D. Penetration testing
Answer: A (LEAVE A REPLY)
NEW QUESTION: 78
An IS auditor is reviewing the installation of a new server. The IS auditor's PRIMARY
objective is to ensure that
A. security parameters are set in accordance with the organizations policies
B. a detailed business case was formally approved prior to the purchase.
C. security parameters are set in accordance with the manufacturer's standards
D. the procurement project invited tenders from at least three different suppliers.
Answer: A (LEAVE A REPLY)
NEW QUESTION: 79
As part of business continuity planning, which of the following is MOST important to assess
when conducting a business impact analysis (BIA)?
A. Critical applications in the cloud
B. Risk appetite
C. Completeness of critical asset inventory
D. Recovery scenarios
Answer: C (LEAVE A REPLY)
NEW QUESTION: 80
Due to budget restraints, an organization is postponing the replacement of an in-house
developed mission critical application. Which of the following represents the GREATEST
risk?
A. Maintenance costs may rise
B. Inability to virtualize the server
C. Inability to align to changing business needs
D. Eventual replacement may be more expensive
Answer: C (LEAVE A REPLY)
NEW QUESTION: 81
Which of the following should be reviewed FIRST when assessing the effectiveness of an
organization's network security procedures and controls?
A. Inventory of authorized devices
B. Vulnerability remediation
C. Malware defenses
D. Data recovery capability
Answer: A (LEAVE A REPLY)
NEW QUESTION: 82
An organization seeks to control costs related to storage media throughout the information
life cycle while still meeting business and regulatory requirements. Which of the following is
the BEST way to achieve this objective?
A. Utilize solid state memory.
B. Perform periodic tape backups.
C. Stream backups to the cloud.
D. Implement a data retention policy.
Answer: D (LEAVE A REPLY)
NEW QUESTION: 83
During a review of a production schedule, an IS auditor observes that a staff member is not
complying with mandatory operational procedures. The auditor's NEXT step should be to:
A. Issue an audit memorandum identifying the incompliance
B. Note the noncompliance in the audit working papers
C. Determine why the procedures were not followed
D. Include the noncompliance in the audit report
Answer: (SHOW ANSWER)
NEW QUESTION: 84
Which of the following is MOST critical for the effective implementation of IT governance?
A. Strong risk management practices
B. Internal auditor commitment
C. Documented policies
D. Supportive corporate culture
Answer: D (LEAVE A REPLY)
NEW QUESTION: 85
Which of the following metrics is MOST useful to an IS auditor when evaluating whether IT
investments are meeting business objectives?
A. Actual return on investment (ROI) versus industry average ROI.
B. Realized return on investment (ROI) versus projected ROI
C. Budgeted spend versus actual spend
D. Actual versus projected customer satisfaction
Answer: (SHOW ANSWER)
NEW QUESTION: 86
Which of the following should be a concern to an IS auditor reviewing a digital forensic
process for a security incident?
A. The media with the original evidence was not write-blocked.
B. The forensic expert used open-source forensic tools.
C. Analysis was performed using an image of the original media.
D. The affected computer was not immediately shut down after the incident.
Answer: A (LEAVE A REPLY)
NEW QUESTION: 87
Which of the following should be the PRIMARY basis for prioritizing follow-up audits?
A. Residual risk from the findings of previous audits
B. Complexity of management's action plans
C. Audit cycle defined in the audit plan
D. Recommendation from executive management
Answer: A (LEAVE A REPLY)
NEW QUESTION: 88
Using swipe cards to limit employee access to restricted areas requires implementing
which additional control?
A. Physical sign-in of all employees for access to restricted areas
B. Initial escort of all new hires by a current employee
C. Employee-access criteria determined on the basis of IS experience
D. Periodic review of access profiles by management
Answer: D (LEAVE A REPLY)
NEW QUESTION: 89
Which of the following is the BEST indication of the completeness of interface control
documents used for the development of a new application?
A. All documents have been reviewed by end users.
B. Both successful and failed interface data transfers are recorded.
C. All inputs and outputs for potential actions are included.
D. Failed interface data transfers prevent subsequent processes.
Answer: B (LEAVE A REPLY)
NEW QUESTION: 90
An IS auditor is a member of an application development team that is selecting software.
Which of the following would impair the auditor's independence?
A. Approving the vendor selection methodology
B. verifying the weighting of each selection criteria
C. Witnessing the vendor selection process
D. Reviewing the request for proposal (RFP)
Answer: (SHOW ANSWER)
NEW QUESTION: 91
An organization has recently implemented a Voice-over IP (VoIP) communication system.
Which of the following should be the IS auditor's PRIMARY concern?
A. Lack of integration of voice and data communications
B. A single point of failure for both voice and data communications
C. Voice quality degradation due to packet loss
D. Inability to use virtual private networks (VPNs) for internal traffic
Answer: A (LEAVE A REPLY)
Valid CISA Dumps shared by Fast2test.com for Helping Passing CISA Exam!
Fast2test.com now offer the newest CISA exam dumps, the Fast2test.com CISA exam
questions have been updated and answers have been corrected get the newest
Fast2test.com CISA dumps with Test Engine here: https://www.fast2test.com/CISA-
premium-file.html (440 Q&As Dumps, 30%OFF Special Discount: freecram)
NEW QUESTION: 92
An organization's strategy to source certain IT functions from a Software as a Service
(SaaS) provider should be approved by the:
A. IT steering committee
B. IT operations manager
C. chief financial officer (CFO).
D. chief risk officer (CRO)
Answer: B (LEAVE A REPLY)
NEW QUESTION: 93
Which of the following would provide the BEST evidence for use in a forensic investigation
of an employee's hard drive?
A. A file level copy of the hard drive
B. Prior backups
C. Bit-stream copy of the hard drive
D. Memory dump to an external hard drive
Answer: C (LEAVE A REPLY)
NEW QUESTION: 94
Batch processes running in multiple countries are merged to one batch job to be executed
in a single data center. Which of the following is the GREATEST concern with this
approach?
A. The job execution approval process at the regional level may be compromised.
B. Restart of the batch job after disruption may impair the integrity of databases.
C. Change management may become highly complex after job integration
D. The knowledge base maintained by current staff may be lost.
Answer: C (LEAVE A REPLY)
NEW QUESTION: 95
When evaluating information security governance within an organization which of the
following findings should be of MOST concern to an IS auditor?
A. Information security policies are updated annually
B. The information security department has difficulty filling vacancies
C. An information security governance audit was not conducted within the past year
D. The data center manager has final sign-off on security projects.
Answer: (SHOW ANSWER)
NEW QUESTION: 96
An organization decides to establish a formal incident response capability with clear roles
and responsibilities facilitating centralized reporting of security incidents. Which type of
control is being implemented?
A. Preventive control
B. Corrective control
C. Compensating control
D. Detective control
Answer: (SHOW ANSWER)
NEW QUESTION: 97
Which of the following should be included in emergency change control procedures?
A. Use an emergency ID to move production programs into development.
B. Obtain user management approval before implementing the changes.
C. Update production source libraries to reflect changes.
D. Request that the help desk make the changes.
Answer: B (LEAVE A REPLY)
NEW QUESTION: 98
Which of the following provides the MOST comprehensive understanding of an
organizations information security posture?
A. External audit findings
B. The organization items security incident trends
C. Results of vulnerability assessments
D. Risk management metrics
Answer: (SHOW ANSWER)
NEW QUESTION: 99
An IS auditor plans to review all access attempts to a video-monitored and proximity card-
controlled communications room. Which of the following would be MOST useful to the
auditor?
A. System electronic log
B. Alarm system with CCTV
C. Security incident log
D. Manual sign-in and sign-out log
Answer: C (LEAVE A REPLY)
Valid CISA Dumps shared by Fast2test.com for Helping Passing CISA Exam!
Fast2test.com now offer the newest CISA exam dumps, the Fast2test.com CISA exam
questions have been updated and answers have been corrected get the newest
Fast2test.com CISA dumps with Test Engine here: https://www.fast2test.com/CISA-
premium-file.html (440 Q&As Dumps, 30%OFF Special Discount: freecram)
Valid CISA Dumps shared by Fast2test.com for Helping Passing CISA Exam!
Fast2test.com now offer the newest CISA exam dumps, the Fast2test.com CISA exam
questions have been updated and answers have been corrected get the newest
Fast2test.com CISA dumps with Test Engine here: https://www.fast2test.com/CISA-
premium-file.html (440 Q&As Dumps, 30%OFF Special Discount: freecram)
Valid CISA Dumps shared by Fast2test.com for Helping Passing CISA Exam!
Fast2test.com now offer the newest CISA exam dumps, the Fast2test.com CISA exam
questions have been updated and answers have been corrected get the newest
Fast2test.com CISA dumps with Test Engine here: https://www.fast2test.com/CISA-
premium-file.html (440 Q&As Dumps, 30%OFF Special Discount: freecram)
Valid CISA Dumps shared by Fast2test.com for Helping Passing CISA Exam!
Fast2test.com now offer the newest CISA exam dumps, the Fast2test.com CISA exam
questions have been updated and answers have been corrected get the newest
Fast2test.com CISA dumps with Test Engine here: https://www.fast2test.com/CISA-
premium-file.html (440 Q&As Dumps, 30%OFF Special Discount: freecram)
Valid CISA Dumps shared by Fast2test.com for Helping Passing CISA Exam!
Fast2test.com now offer the newest CISA exam dumps, the Fast2test.com CISA exam
questions have been updated and answers have been corrected get the newest
Fast2test.com CISA dumps with Test Engine here: https://www.fast2test.com/CISA-
premium-file.html (440 Q&As Dumps, 30%OFF Special Discount: freecram)
Valid CISA Dumps shared by Fast2test.com for Helping Passing CISA Exam!
Fast2test.com now offer the newest CISA exam dumps, the Fast2test.com CISA exam
questions have been updated and answers have been corrected get the newest
Fast2test.com CISA dumps with Test Engine here: https://www.fast2test.com/CISA-
premium-file.html (440 Q&As Dumps, 30%OFF Special Discount: freecram)
Valid CISA Dumps shared by Fast2test.com for Helping Passing CISA Exam!
Fast2test.com now offer the newest CISA exam dumps, the Fast2test.com CISA exam
questions have been updated and answers have been corrected get the newest
Fast2test.com CISA dumps with Test Engine here: https://www.fast2test.com/CISA-
premium-file.html (440 Q&As Dumps, 30%OFF Special Discount: freecram)
Valid CISA Dumps shared by Fast2test.com for Helping Passing CISA Exam!
Fast2test.com now offer the newest CISA exam dumps, the Fast2test.com CISA exam
questions have been updated and answers have been corrected get the newest
Fast2test.com CISA dumps with Test Engine here: https://www.fast2test.com/CISA-
premium-file.html (440 Q&As Dumps, 30%OFF Special Discount: freecram)
Valid CISA Dumps shared by Fast2test.com for Helping Passing CISA Exam!
Fast2test.com now offer the newest CISA exam dumps, the Fast2test.com CISA exam
questions have been updated and answers have been corrected get the newest
Fast2test.com CISA dumps with Test Engine here: https://www.fast2test.com/CISA-
premium-file.html (440 Q&As Dumps, 30%OFF Special Discount: freecram)
Valid CISA Dumps shared by Fast2test.com for Helping Passing CISA Exam!
Fast2test.com now offer the newest CISA exam dumps, the Fast2test.com CISA exam
questions have been updated and answers have been corrected get the newest
Fast2test.com CISA dumps with Test Engine here: https://www.fast2test.com/CISA-
premium-file.html (440 Q&As Dumps, 30%OFF Special Discount: freecram)
Valid CISA Dumps shared by Fast2test.com for Helping Passing CISA Exam!
Fast2test.com now offer the newest CISA exam dumps, the Fast2test.com CISA exam
questions have been updated and answers have been corrected get the newest
Fast2test.com CISA dumps with Test Engine here: https://www.fast2test.com/CISA-
premium-file.html (440 Q&As Dumps, 30%OFF Special Discount: freecram)
Valid CISA Dumps shared by Fast2test.com for Helping Passing CISA Exam!
Fast2test.com now offer the newest CISA exam dumps, the Fast2test.com CISA exam
questions have been updated and answers have been corrected get the newest
Fast2test.com CISA dumps with Test Engine here: https://www.fast2test.com/CISA-
premium-file.html (440 Q&As Dumps, 30%OFF Special Discount: freecram)
Valid CISA Dumps shared by Fast2test.com for Helping Passing CISA Exam!
Fast2test.com now offer the newest CISA exam dumps, the Fast2test.com CISA exam
questions have been updated and answers have been corrected get the newest
Fast2test.com CISA dumps with Test Engine here: https://www.fast2test.com/CISA-
premium-file.html (440 Q&As Dumps, 30%OFF Special Discount: freecram)
Valid CISA Dumps shared by Fast2test.com for Helping Passing CISA Exam!
Fast2test.com now offer the newest CISA exam dumps, the Fast2test.com CISA exam
questions have been updated and answers have been corrected get the newest
Fast2test.com CISA dumps with Test Engine here: https://www.fast2test.com/CISA-
premium-file.html (440 Q&As Dumps, 30%OFF Special Discount: freecram)
Valid CISA Dumps shared by Fast2test.com for Helping Passing CISA Exam!
Fast2test.com now offer the newest CISA exam dumps, the Fast2test.com CISA exam
questions have been updated and answers have been corrected get the newest
Fast2test.com CISA dumps with Test Engine here: https://www.fast2test.com/CISA-
premium-file.html (440 Q&As Dumps, 30%OFF Special Discount: freecram)