1.exercise 1 Exam 1
1.exercise 1 Exam 1
EXAMINATION-1
Exercise Question
QUESTION: 1
Which of the following reports can MOST effectively be used to analyze a systems performance problem?
Answer:
QUESTION: 2
Which of the following it BEST enabled by following a configuration management process for new applications?
Answer:
QUESTION: 3
Which of the following is the BEST way to help ensure the security of privacy-related data stored by an
organization?
Answer:
QUESTION: 4
Which of the following would be an auditor's GREATEST concern when reviewing data inputs from spreadsheets
into the core finance system?
Answer:
QUESTION: 5
A recent audit identified duplicate software licenses and technologies which of the following would be MOST
helpful to prevent this type of duplication in the future?
Which of the following communication modes should be of GREATEST concern to an IS auditor evaluating end user
networking?
A. System-to-system.
B. Client-to-server.
C. Peer-to-peer.
D. Host-to-host.
Answer:
QUESTION: 7
An IS auditor is reviewing an organization's method to transport sensitive data between offices. Which of the
following would cause the auditor MOST concern?
Answer:
QUESTION: 8
Audit software designed to detect invalid data, extreme values, or linear correlations between data elements can
be classified as which type of data analytics tool?
A. Predictive.
B. Descriptive.
C. Diagnostic.
D. Prescriptive.
Answer:
QUESTION: 9
A start-up company acquiring for its order-taking system is unable to predict the volume of transactions. Which of
the following is MOST important for the company to consider?
A. Compatibility.
B. Scalability.
C. Configuration.
D. Optimization.
Answer:
QUESTION: 10
An auditor is creating an audit program in which the objective is to establish the adequacy of personal data privacy
controls in a payroll process. Which of the following would be MOST important to include?
Answer:
QUESTION: 11
A recent audit concluded that an organization's information security system was weak and that monitoring would
likely fail to detect penetration. Which of the following would be the MOST appropriate recommendation?
Answer:
QUESTION: 12
A post-implementation review of a system implementation has identified that the defined objectives were changed
several times without the approval of the project board. What would the IS auditor do NEXT?
Answer:
QUESTION: 13
An IS auditor learns that after each scheduled batch process runs, management performs a reconciliation between
upstream and downstream data. Which of the following is MOST important for the auditor to investigate?
Answer:
QUESTION: 14
Of the following procedures for testing a disaster recovery plan (DRP), which should be used MOST frequently?
QUESTION: 15
An organization was recently notified by its regulatory body of significant discrepancies in its reporting data. A
preliminary investigation revealed that the discrepancies were caused problems with the organization's data
quality. Management has directed the data quality team to enhance their program. The audit committee has asked
internal audit to be visors to the process. After the data quality team identifies the system data at fault which of
the following should internal audit recommend as the NEXT step m the process?
Which of the following should be restricted from a network administrator's privileges in an adequately segregated
environment?
Answer:
QUESTION: 17
An IS auditor reviewing a new application for compliance with information privacy principles should be MOST
concerned with:
A. collection limitation.
B. nonrepudiation.
C. awareness.
D. availability.
Answer:
QUESTION: 18
Which of the following is MOST likely to improve the portability of an application connected to a database?
Answer:
QUESTION: 19
An IS auditor reviewing a recently implemented virtual environment notices discrepancies among similar machine
setups. Which of the following should the auditor recommend to minimize configuration risks?
Answer:
QUESTION: 20
When introducing a maturity model to the IT management process, it is BEST to align the maturity level to a point
that reflects which of the following?
Answer:
QUESTION: 21
Which of the following would BEST deter the theft of corporate information from a laptop?
Answer:
QUESTION: 22
During an audit of information security procedures of a large retailer s online store, an IS auditor notes that
operating system (OS) patches are automatically deployed upon -. Which of the following should be of GREATEST
concern to the auditor?
Answer:
QUESTION: 23
Which the following is MOST critical for the effective implementation of IT governance?
Answer:
QUESTION: 24
Which of the following is the MOST effective control for a utility program?
Answer:
QUESTION: 25
Which of the following is the BEST guidance from an IS auditor to an organization planning an initiative to improve
the effectiveness of its IT processes?
A. The organization should use a capability maturity model to identify current maturity levels for each IT process.
B. IT staff should be surveyed to identify current IT process weaknesses and suggest improvements.
C. The organization should refer to poor audit reports to identify the specific IT processes to be improved.
D. IT management should include process improvement requirements in staff performance objectives.
Answer:
QUESTION: 26
Which of the following is the GREATEST risk associated with instant messaging?
Answer:
QUESTION: 27
Which of the following is the PRIMARY reason for an IS auditor to map out the narrative of a business process?
Answer:
QUESTION: 28
Based on the Guidance of internal audit, an IT steering committee is considering the use of a balanced scorecard
to evaluate its project management process. Which of the following is the GREATEST advantage to using this
approach?
Answer:
QUESTION: 29
While reviewing similar issues in an organization s help desk system, an IS auditor finds that they were analyzed
independently and resolved differently, this situation MOST likely indicates a deficiency in:
A. change management.
B. IT service level management.
C. problem management.
D. configuration management.
Answer:
QUESTION: 30
Before concluding that internal controls can be relied upon, the IS auditor should:
Answer:
QUESTION: 31
Which of the following is the MOST important difference between end-user computing (EUC) applications and
traditional applications?
Answer:
QUESTION: 32
Which of the following BEST ensures that only authorized software is moved into a production environment?
Answer:
QUESTION: 33
Which of the following is the MOST effective way to identify anomalous transactions when performing a payroll
fraud audit?
Answer:
QUESTION: 34
Which of the following controls MOST effectively reduces the risk associated with use of instant messaging (IM) in
the workplace?
Answer:
QUESTION: 35
The demilitarized zone (DMZ) is the part of a network where servers that are placed are:
Answer:
QUESTION: 36
When an intrusion into an organizations network is detected, which of the following should be performed FIRST?
Answer:
QUESTION: 37
An IT governance body wants to determine whether IT service delivery is based on consistently efficient and
effective processes. Which of the following would be the BEST approach?
Answer:
QUESTION: 38
A. Back up data.
B. Classify data.
C. Restrict access to data.
D. Encrypt data.
Answer:
QUESTION: 39
Answer:
QUESTION: 40
A PRIMARY benefit derived by an organization employing control self-assessment (CSA) techniques s that CSA:
A. Allow management to relinquish responsibilities of control.
B. Allows IS auditors 10 independently assess risk.
C. Can be used as a replacement for traditional audits.
D. Can identify high-risk areas for detailed review.
Answer:
QUESTION: 41
When planning for the implementation of a new system, an organization will opt for a parallel run PRIMARILY to:
Answer:
QUESTION: 42
Which of the following is the MOST likely cause of a successful firewall penetration?
Answer:
QUESTION: 43
An IS auditor is evaluating the risks and controls associated with a virtualized environment. Which of the following
observations should be of GREATEST concern?
Answer:
QUESTION: 44
An IS auditor reviewing security incident processes realizes incidents are resolved and dosed, but root causes are
not investigated Which of the following should be the MAJOR concern with this situation?
Answer:
QUESTION: 45
A. a different hashing algorithm from me sender s to create a binary image of the file.
B. the same hashing algorithm as the sender's to create a binary image of the file.
C. the same hashing algorithm as the tender s to create a numerical representation of the file.
D. a different hashing algorithm from the sender s to create a numerical representation of the file
Answer:
QUESTION: 46
Which of the following should be the MOST important consideration when establishing data classification
standards?
Answer:
QUESTION: 47
Answer:
QUESTION: 48
Which of the following is the MOST important activity to undertake to avoid rework later in a project?
A. Phase review.
B. Control review.
C. Acceptance testing.
D. Risk assessment.
Answer:
QUESTION: 49
An organization with high security requirements is evaluating the effectiveness of biometric systems. Which of the
following performance indicators is MOST important?
Answer:
QUESTION: 50
A new regulatory standard for data privacy requires an organization to protect personally identifiable information
(Pll). Which of the following is MOST important to include in the audit engagement plan to assess compliance with
the new standard?
Answer:
QUESTION:
A manufacturing company is implementing application software for its sales and distribution system. Which of the
following is the MOST important reason for the company to choose a centralized online database?
Answer: A
QUESTION:
Which of the following is the BEST method to assess the adequacy of security awareness in an organization?
Answer:
QUESTION: 53
To test the integrity of the data in the accounts receivable master file, an IS auditor particularly interested in
reviewing customers with balances over $400.000. the selection technique the IS auditor would use to obtain such
a sample is called:
A. Stratification.
B. Discovery sampling.
C. Systematic selection.
D. Random selection.
Answer:
QUESTION: 54
Answer:
QUESTION: 55
Mission-critical applications with a low recovery time objective (RTO). Which of the following is the BEST backup
strategy?
Answer:
QUESTION: 56
Which of the following is the PRIMARY advantage of using virtualization technology for corporate applications?
Answer:
QUESTION: 57
Which of the following would be the MOST effective control to mitigate unintentional misuse of authorized access?
Answer:
QUESTION: 58
When developing metrics to measure the contribution of IT to the achievement of business goals, the MOST
Answer:
QUESTION: 59
During a vulnerability assessment, an IS auditor finds a high-risk vulnerability in a public facing web server used to
process online customer orders via credit card. The IS auditor could FIRST:
A. notify management.
B. redesign the customer order process.
C. suspend credit card processing.
D. document the finding in the report.
Answer:
QUESTION: 60
In an online application, which of the following would provide the information about the transaction audit trail?
A. File layouts.
B. Source code documentation.
C. System/process flowchart.
D. Data architecture.
Answer:
QUESTION: 61
The MOST efficient way to confirm that an ERP system being implemented satisfies business expectations is to
utilize which of the following types of testing?
A. Sociability.
B. Pilot.
C. Parallel.
D. Alpha.
Answer:
QUESTION: 62
During an audit of an organization s incident management process, an IS auditor teams that the security operations
team includes detailed reports of recent attacks in its communications to employees. Which of the following is the
GREATEST concern with this situation?
Answer:
QUESTION: 63
Internal audit reports should be PRIMARILY written for and communicated to:
Answer:
QUESTION: 64
Which of the following is the MOST efficient solution for a multi-location healthcare organization that wants to be
able to access patient data wherever patients present themselves for care?
Answer:
QUESTION: 65
After the release of an application system, an IS auditor wants to verify that the system is providing value to the
organization. The auditor's BEST course of action would be to:
What is the BEST population to select from when testing that programs are migrated to production with proper
approval?
Answer:
QUESTION: 67
Answer:
QUESTION: 68
When evaluating the recent implementation of an intrusion detection system (IDS), an IS auditor should be MOST
concerned with inappropriate:
A. Tuning.
B. Patching.
C. Training.
D. Encryption.
Answer:
QUESTION: 69
During an audit, it is discovered that several suppliers with standing orders have been deleted from the supplier
master file Which of the following controls would have BEST evented such an occurrence?
Answer:
QUESTION: 70
Which of the following is the BEST point in time to conduct a post-implementation review (PIR)?
Answer:
QUESTION: 71
Which of the following is the BEST reason to utilize block chain technology to record accounting transactions?
A. Integrity of records.
B. Distribution of records.
C. Confidentiality of records.
D. Availability of records.
Answer:
QUESTION: 72
An IS auditor notes that help desk personnel are required to make critical decisions during major service
disruptions. Which of the following is the auditor's BEST recommendation to address this situation?
Answer:
QUESTION: 73
Answer:
QUESTION: 74
An IS auditor has discovered that unauthorized customer management software was installed on a workstation.
The auditor determines the software has been uploading customer ita to an external party. Which of the following
is the IS auditor's BEST course of action?
Answer:
QUESTION: 75
Which of the following audit procedures would assist an IS auditor in determining the effectiveness of a business
continuity plan (BCP)?
Answer:
QUESTION: 76
An IS auditor is performing a post-implementation review of a system deployed two years ago. Which of the
following findings should be of MOST concern to the auditor?
Answer:
QUESTION: 77
A. Manual transactions.
B. Low-value transactions.
C. Irregular transactions.
D. Real-time transactions.
Answer:
QUESTION: 78
Which of the following would provide management with the MOST reasonable assurance that a new data
warehouse will meet the needs of the organization?
Answer:
QUESTION: 79
Which of the following is the GREATEST risk associated with in-house program development and customization?
Answer:
QUESTION: 80
An IS auditor is evaluating the access controls at a multinational company with a shared network infrastructure.
Which of the following is MOST important?
Answer:
QUESTION: 81
An organization has outsourced its data processing function to a service provider. Which of the following would
BEST determine whether the service provider continues to meet the organization s objectives?
Answer:
QUESTION: 82
Which of the following would be MOST important for an IS auditor to review during an audit of an automated
continuous monitoring process being used by the finance department.
Answer:
QUESTION: 83
Which of the following is the MOST effective way to assess whether an outsourcer's controls are following the
service level agreement (SLA)?
Answer:
QUESTION: 84
Which of the following should be the PRIMARY consideration when developing an IT strategy?
Answer:
QUESTION: 85
Which of the following is MOST important to ensure when planning a black box penetration test?
Answer:
QUESTION: 86
-------Implementing which of the following would BEST address issues relating to the aging of IT systems?
A. IT project management
B. Release management
C. Application portfolio management
D. Configuration management
Answer:
QUESTION: 87
An organization with high availability resource requirements is selecting a provider for cloud computing.
Which of the following would cause the GREATEST concern to an IS auditor? The provider:
Answer:
QUESTION: 88
Which of the following is the BEST way to help ensure new IT implementations align with enterprise architecture
principles and requirements?
Answer:
QUESTION: 89
Privileged account access is require to start an ad hoc batch job. Which of the following would MOST effectively
detect unauthorized job execution?
Answer:
QUESTION: 90
Answer:
QUESTION: 91
Loading of illegal software packages onto a network by an employee is MOST effectively detected by:
Answer:
QUESTION: 92
Which of the following would be considered a corrective control when designing the security of a data center?
A. Security guards.
B. Fire extinguisher.
C. Closed-circuit television (CCTV).
D. Perimeter fence.
Answer:
QUESTION: 93
An IS audit manager finds that data manipulation logic developed by the audit analytics team leads to incorrect
conclusions This inaccurate logic is MOST likely an indication of lich of the following?
A. Poor change controls over data sets collected from the business.
B. Incompatibility between data volume and analytics processing capacity.
C. Poor security controls that grant inappropriate access to analysis produced.
D. The team's poor understanding of the business process being analyzed.
Answer:
QUESTION: 94
A. permit the incident to go on and follow the trail back to the beginning.
B. have an external computer security incident response team assess damage.
C. keep the business going while the response is occurring.
D. test for readiness to respond when facing an incident.
Answer:
QUESTION: 95
An IS audit report highlighting inadequate network internal controls is challenged because no serious incident has
ever occurred. Which of the following actions performed during the audit would have BEST supported the findings?
Answer:
QUESTION: 96
Answer:
QUESTION: 97
An internal audit has revealed a large number of incidents for which root cause analysis has not been performed.
Which of the following is MOST important for the IS auditor to verify to determine whether there is an audit issue?
Answer:
QUESTION: 98
Due to cost restraints, a company defers the replacement of hardware supporting core applications. Which of the
following represents the GREATEST risk?
Answer:
QUESTION: 99
Answer:
QUESTION: 100
An IS auditor is conducting a review of an organization s information systems and discovers data that is no longer
needed by business applications. Which of the following would b IS auditor's BEST recommendation?
A. Ask the data custodian to remove it after confirmation from the business user.
B. Assess the data according to the retention policy.
C. Keep the data and protect it using a data classification policy.
D. Back up the data to removable media and store in a secure area.
Answer:
QUESTION: 101
An organization allows employees to use personally owned mobile devices to access customer's personal
information. An IS auditor's GREATEST concern should be whether
Answer:
QUESTION: 102
An IS auditor identifies key controls that have been overridden by management. The next step the IS auditor should
take is to
Answer:
QUESTION: 103
Which of the following should MOST concern an IS auditor reviewing an intrusion detection system (IDS)?
Answer:
QUESTION: 104
Which of the following would provide the BEST evidence for use in a forensic investigation of an employee's hard
drive?
A. Memory dump to an external hard drive.
B. Bit-stream copy of the hard drive.
C. A file level copy of the hard drive.
D. Prior backups.
Answer:
QUESTION: 105
Which of the following would be the MOST appropriate reason for an organization to purchase fault-tolerant
hardware?
Answer:
QUESTION: 106
Documentation of workaround processes to keep a business function operational during recovery of IT systems is
a core part of a:
Answer:
QUESTION: 107
Due to the small size of the payroll department, an organization is unable to segregate the employee setup and
payroll processing functions. Which of the following would be the BEST compensating control for the lack of
segregation of duties?
A. A review is conducted to verity that terminated employees, are removed from the employee master file.
B. A payroll variance report is reviewed tor anomalies every pay period.
C. The system is configured to require secondary approval for changes to the employee master file
D. An independent payroll disbursement review is conducted.
Answer:
QUESTION: 108
During an audit of a reciprocal disaster recovery agreement between two companies, the IS auditor would be MOST
concerned with the:
Answer:
QUESTION: 109
Which of the following control? MOST efficiently ensures that orders transmitted from a sales office to a production
warehouse are received accurately and completely?
A. Transaction totals and record counts should be sent and reconciled before transaction processing.
B. Continuity of numerical sequences for all sales orders should be checked.
C. Data should be sent back to the originating site and compared to what was sent to production.
D. Parity checking should be incorporated into all data transmissions.
Answer:
QUESTION: 110
Which of the following should an IS auditor expect to find in an organization s information security policies?
Which of the following observations noted during a review of the organization s social media practices should be
of MOST concern to the IS auditor?
Answer:
QUESTION: 112
Which of the following is the BEST way to reduce the risk of vulnerabilities during the rapid deployment of
container-based applications to a hybrid cloud?
Answer:
QUESTION: 113
An IS auditor is reviewing an organization's implementation of a bring your own device (BYOD) program. Which of
the following would be the BEST recommendation to help ensure sensitive data is protected if a device is in the
possession of an unauthorized individual?
Answer:
QUESTION: 114
An IS auditor auditing the effectiveness of utilizing a hot site will MOST likely:
Answer:
QUESTION: 115
During the procurement process which of the following would be the BEST indication that prospective vendors will
meet the organization's needs?
Answer:
QUESTION: 117
Answer:
QUESTION: 118
When auditing the effectiveness of a biometric system, which of the following indicators would be MOST important
to review?
Answer:
QUESTION: 119
During the evaluation of a firm's newly established whistleblower system, an auditor notes several findings. Which
of the following should be the auditor's GREATEST concern?
A. The whistleblower system does not track the time and date of submission.
B. The whistleblower's privacy is not protected.
C. The whistleblower system is only available during business hours.
D. New employees have not been informed of the whistleblower policy.
Answer:
QUESTION: 120
Which of the following is the BEST way for an IT forensics investigator to detect evidence of steganography?
Answer:
QUESTION: 121
Which of the following requires a consensus by key stakeholders on IT strategic goals and objectives?
A. Benchmarking.
B. Balanced scorecards.
C. Maturity models.
D. Peer reviews.
Answer:
QUESTION: 122
After an external IS audit, which of the following should be IT management's MAIN consideration when determining
the prioritization of follow-up activities?
Answer:
QUESTION: 123
Which of the following would represent an acceptable test of an organization s business continuity plan?
Answer:
QUESTION: 124
Answer:
QUESTION: 125
Which of the following types of controls would BEST facilitate a root cause analysis for an information security
incident?
A. Detective.
B. Corrective.
C. Preventive.
D. Directive.
Answer:
QUESTION: 126
Which of the following is the BEST source for describing the objectives of an organization s information systems?
Answer:
QUESTION: 127
An organization is replacing a mission-critical system. Which of the following is the BEST implementation strategy
to mitigate and reduce the risk of system failure?
A. Stage.
B. Big-bang.
C. Phase.
D. Parallel.
Answer:
QUESTION: 128
An IS auditor conducting audit follow-up activities learns that some previously agreed-upon corrective actions have
not been taken and that the associated risk has been accepted by senior management. If the auditor disagrees with
management s decision what is the BEST way to address the situation?
Answer:
QUESTION: 129
Which of the following controls is MOST appropriate against brute force attacks at login?
Answer:
QUESTION: 130
During a review of an application system, an IS auditor identifies automated controls designed to prevent the entry
of duplicate transactions. What is the BEST way to verify that the controls work as designed?
Answer:
QUESTION: 131
Which of the following should be performed FIRST when preparing to deploy a major upgrade to a critical online
application?
Answer:
QUESTION: 132
While executing follow-up activities, an IS auditor is concerned that management has implemented corrective
actions that are different from those originally discussed and agreed the audit function. In order to resolve the
situation, the IS auditor/, BEST course of action would be to:
A. determine whether the alternative controls sufficiently mitigate the risk and record the results.
B. reject the alternative controls and re-prioritize the original issue as high risk.
C. postpone follow-up activities and escalate the alternative controls to senior audit management.
D. schedule another audit due to the implementation of alternative controls.
Answer:
QUESTION: 133
When reviewing a disaster recovery plan (DRP) an IS auditor should examine the:
Answer:
QUESTION: 134
An IS auditor finds that firewalls are outdated and not supported by vendors. Which of the following should be the
auditor s NEXT course of action?
Answer:
QUESTION: 135
Which of the following is the MOST important consideration when developing an online business architecture and
recovery strategy?
Which of the following roles combined with the role of a database administrator (DBA) will create a segregation of
duties conflict?
A. Systems analyst.
B. Security administrator.
C. Quality assurance.
D. Application end user.
Answer:
QUESTION: 137
Which of the following is MOST helpful in preventing a systems failure from occurring when an application is
replaced using the abrupt changeover technique?
A. Comprehensive documentation.
B. Change management.
C. Comprehensive testing.
D. Threat and risk assessment.
Answer:
QUESTION: 138
An IS auditor observed that most users do not comply with physical access controls. The business manager has
explained that the control design is inefficient. What is the auditor's BEST course of action?
Answer:
QUESTION: 139
An IS auditor is observing transaction processing and notes that a high-priority update job ran out of sequence.
What is the MOST significant risk from this observation'
Answer:
QUESTION: 140
A new regulation in one country of a global organization has recently prohibited cross border transfer of personal
data. An IS auditor has been asked to determine the organization's level of exposure in the affected country. Which
of the following would be MOST helpful in making this assessment?
Which of the following should be of GREATEST concern to an IS auditor conducting an audit of incident response
procedures?
Answer:
QUESTION: 142
An IT service desk has recorded several incidents related to server downtime following the failure of a network
time protocol (NTP) server. Which of the following is the BEST methodology to help identify the root cause?
A. Cause-and-effect diagram.
B. Data flow diagram.
C. Server architecture diagram.
D. Crow-functional diagram.
Answer:
QUESTION: 143
In attribute sampling, what is the relationship between expected error rate and sample size?
Answer:
QUESTION: 144
Which of the following would provide the MOST assurance that an application will work in a live environment?
A. Processing of test data to prove that data can passed between individual programs.
B. Walking through the programs to view the results of processing copies of production data.
C. Walking through the programs to view the results of error processing.
D. Processing of valid and erroneous data in an acceptance test environment.
Answer:
QUESTION: 145
Which of the following should be of GREATEST concern to an IS auditor reviewing an organization's initiative to
adopt an enterprise governance framework?
A. The organization has not identified the business drivers for adopting the framework.
B. The organization's security department has not been involved with the initiative.
C. The organization has not provided employees with formal training on the framework.
D. The organization has tried to adopt the entire framework at once.
Answer:
QUESTION: 146
Which of the following would be the MOST effective method to address software license violations on employee
workstations?
Answer:
QUESTION: 147
Which of the following is MOST important for an IS auditor to consider when determining an appropriate sample
size in situations where selecting the entire population is not feasible?
A. Data integrity.
B. Tolerable error.
C. Responsiveness of the auditee.
D. Accessibility of the data.
Answer:
QUESTION: 148
Answer:
QUESTION: 149
Which of the following is the BEST indication that an information security program is effective?
A. The security team has performed a risk assessment to understand the organization's risk appetite.
B. The security team is knowledgeable and uses the best available tools.
C. The number of reported and confirmed security incidents has increased after awareness training.
D. The security awareness program was developed following industry best practices.
Answer:
QUESTION: 150
Answer: