Pre-Summer Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

CISA Questions and Answers

Question # 6

Which of the following is the PRIMARY purpose of a rollback plan for a system change?

A.

To ensure steps exist to remove the change if necessary

B.

To ensure testing can be re-performed if required

C.

To ensure a backup exists before implementing a change

D.

To ensure the system change is effective

Full Access
Question # 7

An IS auditor is reviewing processes for importing market price data from external data providers. Which of the following findings should the auditor consider MOST critical?

A.

The quality of the data is not monitored.

B.

Imported data is not disposed frequently.

C.

The transfer protocol is not encrypted.

D.

The transfer protocol does not require authentication.

Full Access
Question # 8

In an environment where data virtualization is used, which of the following provides the BEST disaster recovery solution?

A.

Onsite disk-based backup systems

B.

Tape-based backup systems

C.

Virtual tape library

D.

Redundant array of independent disks (RAID)

Full Access
Question # 9

Which of the following is the PRIMARY objective of enterprise architecture (EA)?

A.

Maintaining detailed system documentation

B.

Managing and planning for IT investments

C.

Executing customized development and delivery of projects

D.

Enforcing the IT policy across the organization

Full Access
Question # 10

An internal audit department recently established a quality assurance (QA) program. Which of the following activities Is MOST important to include as part of the QA program requirements?

A.

Long-term Internal audit resource planning

B.

Ongoing monitoring of the audit activities

C.

Analysis of user satisfaction reports from business lines

D.

Feedback from Internal audit staff

Full Access
Question # 11

Which of the following is the GREATEST risk if two users have concurrent access to the same database record?

A.

Availability integrity

B.

Data integrity

C.

Entity integrity

D.

Referential integrity

Full Access
Question # 12

Retention periods and conditions for the destruction of personal data should be determined by the.

A.

risk manager.

B.

database administrator (DBA).

C.

privacy manager.

D.

business owner.

Full Access
Question # 13

An IS auditor is reviewing enterprise governance and finds there is no defined organizational structure for technology risk governance. Which of the following is the GREATEST concern with this lack of structure?

A.

Software developers may adopt inappropriate technology.

B.

Project managers may accept technology risks exceeding the organization ' s risk appetite.

C.

Key decision-making entities for technology risk have not been identified

D.

There is no clear approval entity for organizational security standards.

Full Access
Question # 14

An employee loses a mobile device resulting in loss of sensitive corporate data. Which o( the following would have BEST prevented data leakage?

A.

Data encryption on the mobile device

B.

Complex password policy for mobile devices

C.

The triggering of remote data wipe capabilities

D.

Awareness training for mobile device users

Full Access
Question # 15

Which of the following findings should be of GREATEST concern for an IS auditor when auditing the effectiveness of a phishing simu-lation test administered for staff members?

A.

Staff members who failed the test did not receive follow-up education

B.

Test results were not communicated to staff members.

C.

Staff members were not notified about the test beforehand.

D.

Security awareness training was not provided prior to the test.

Full Access
Question # 16

An IS auditor is reviewing the installation of a new server. The IS auditor ' s PRIMARY objective is to ensure that

A.

security parameters are set in accordance with the manufacturer s standards.

B.

a detailed business case was formally approved prior to the purchase.

C.

security parameters are set in accordance with the organization ' s policies.

D.

the procurement project invited lenders from at least three different suppliers.

Full Access
Question # 17

For security awareness training to be MOST effective, management should ensure the training:

A.

covers all aspects of the IT environment.

B.

is conducted by IT personnel.

C.

is tailored to specific groups.

D.

occurs annually.

Full Access
Question # 18

An IS auditor is evaluating an organization ' s IT strategy and plans. Which of the following would be of GREATEST concern?

A.

There is not a defined IT security policy.

B.

The business strategy meeting minutes are not distributed.

C.

IT is not engaged in business strategic planning.

D.

There is inadequate documentation of IT strategic planning.

Full Access
Question # 19

When designing metrics for information security, the MOST important consideration is that the metrics:

A.

conform to industry standards.

B.

apply to all business units.

C.

provide actionable data.

D.

are easy to understand.

Full Access
Question # 20

The BEST way for an IS auditor to validate that separation of duties has been implemented is to perform:

A.

A review of personnel files.

B.

An analysis of documented job descriptions.

C.

A review of the organizational chart.

D.

A walk-through of job functions.

Full Access
Question # 21

An organization ' s information security policies should be developed PRIMARILY on the basis of:

A.

enterprise architecture (EA).

B.

industry best practices.

C.

a risk management process.

D.

past information security incidents.

Full Access
Question # 22

Which of the following would be of MOST concern to an IS auditor reviewing a data loss prevention (DLP) solution implementation for endpoints?

A.

The DLP solution does not support all types of servers.

B.

The solution has been implemented in blocking mode prior to performing tuning.

C.

The organization has never finished tuning the solution.

D.

The solution does not prevent data leakage because it is still in the monitoring phase.

Full Access
Question # 23

During a project assessment, an IS auditor finds that business owners have been removed from the project initiation phase. Which of the following should be the auditor ' s GREATEST concern with this situation?

A.

Unrealistic milestones

B.

Inadequate deliverables

C.

Unclear benefits

D.

Incomplete requirements

Full Access
Question # 24

Which of the following is the GREATEST concern related to an organization ' s data classification processes?

A.

Users responsible for managing records are unaware of the data classification processes.

B.

Systems used to manage the data classification processes are not synchronized.

C.

The data classification processes have not been updated in the last year.

D.

The data classification processes are not aligned with industry standards.

Full Access
Question # 25

Providing security certification for a new system should include which of the following prior to the system ' s implementation?

A.

End-user authorization to use the system in production

B.

External audit sign-off on financial controls

C.

Testing of the system within the production environment

D.

An evaluation of the configuration management practices

Full Access
Question # 26

To protect the organization from malware transmitted by physical media, IT administrators have disabled USB access for storage devices. Which of the following BEST describes this type of control?

A.

Corrective

B.

Administrative

C.

Preventive

D.

Physical

Full Access
Question # 27

While reviewing the effectiveness of an incident response program, an IS auditor notices a high number of reported incidents involving malware originating from removable media found by employees. Which of the following is the MOST appropriate recommendation to management?

A.

Restrict access to removable media ports on company devices.

B.

Install an additional antivirus program to increase protection.

C.

Ensure the antivirus program contains up-to-date signature files for all company devices.

D.

Implement an organization-wide removable media policy.

Full Access
Question # 28

Which of the following should be of GREATEST concern to an IS auditor reviewing data conversion and migration during the implementation of a new application system?

A.

Backups of the old system and data are not available online

B.

The change management process was not formally documented

C.

Data conversion was performed using manual processes

D.

Unauthorized data modifications occurred during conversion

Full Access
Question # 29

Which of the following MOST effectively minimizes downtime during system conversions?

A.

Phased approach

B.

Direct cutover

C.

Pilot study

D.

Parallel run

Full Access
Question # 30

Which of the following is an IS auditor ' s BEST approach when prepanng to evaluate whether the IT strategy supports the organization ' s vision and mission?

A.

Review strategic projects tor return on investments (ROls)

B.

Solicit feedback from other departments to gauge the organization ' s maturity

C.

Meet with senior management to understand business goals

D.

Review the organization ' s key performance indicators (KPls)

Full Access
Question # 31

Which of the following is the PRIMARY benefit of benchmarking an organization ' s software development lifecycle practices against a capability maturity model?

A.

Reliable products are guaranteed.

B.

Repeatable software development procedures are established.

C.

Programmers ' efficiency is improved.

D.

Security requirements are added to software development processes.

Full Access
Question # 32

Which of the following is the MOST effective way for an organization to project against data loss?

A.

Limit employee internet access.

B.

Implement data classification procedures.

C.

Review firewall logs for anomalies.

D.

Conduct periodic security awareness training.

Full Access
Question # 33

Which of the following is the GREATEST advantage of outsourcing the development of an e-banking solution when in-house technical expertise is not available?

A.

Lower start-up costs

B.

Reduced risk of system downtime

C.

Direct oversight of risks

D.

Increased ability to adapt the system

Full Access
Question # 34

Which of the following parameters reflects the risk threshold for an organization experiencing a service disruption?

A.

Maximum tolerable outage (MTO)

B.

Recovery point objective (RPO)

C.

Service delivery objective (SDO)

D.

Allowable interruption window (AIW)

Full Access
Question # 35

Which of the following features of a library control software package would protect against unauthorized updating of source code?

A.

Required approvals at each life cycle step

B.

Date and time stamping of source and object code

C.

Access controls for source libraries

D.

Release-to-release comparison of source code

Full Access
Question # 36

Which of the following is the PRIMARY reason that asset classification is vital to an information security program?

A.

To ensure the appropriate level of protection to assets

B.

To ensure asset protection efforts are in line with industry standards

C.

To ensure risk mitigation efforts are adequate

D.

To ensure sufficient resources are allocated for information security

Full Access
Question # 37

An IS auditor is reviewing an IT project and finds that an earned value analysis (EVA) is not regularly performed as part of project status reporting. Which of the following is the GREATEST risk resulting from this situation?

A.

Resources might not be assigned and prioritized in a timely manner.

B.

Time and budget overruns might not be identified in a timely manner.

C.

The project might not be compliant with project management standards.

D.

Business requirements may not be properly benchmarked.

Full Access
Question # 38

An IS auditor learns that an in-house system development life cycle (SDLC) project has not met user specifications. The auditor should FIRST examine requirements from which of the following phases?

A.

Configuration phase

B.

User training phase

C.

Quality assurance (QA) phase

D.

Development phase

Full Access
Question # 39

An internal audit team is deciding whether to use an audit management application hosted by a third party in a different country.

What should be the MOST important consideration related to the uploading of payroll audit documentation in the hosted

application?

A.

Financial regulations affecting the organization

B.

Data center physical access controls whore the application is hosted

C.

Privacy regulations affecting the organization

D.

Per-unit cost charged by the hosting services provider for storage

Full Access
Question # 40

Which of the following is the BEST way to prevent social engineering incidents?

A.

Ensure user workstations are running the most recent version of antivirus software.

B.

Maintain an onboarding and annual security awareness program.

C.

Include security responsibilities in job descriptions and require signed acknowledgment.

D.

Enforce strict email security gateway controls.

Full Access
Question # 41

An organization that has decided to approve the use of end-user computing (EUC) should FIRST ensure:

A.

a business impact analysis (BIA) is conducted.

B.

EUC controls are reviewed.

C.

EUC use cases are assessed and documented.

D.

an EUC policy is developed.

Full Access
Question # 42

Which of the following is the BEST review for an IS auditor to conduct when a vulnerability has been exploited by an employee?

A.

Compliance audit

B.

Application security testing

C.

Forensic audit

D.

Penetration testing

Full Access
Question # 43

During a database security audit, an IS auditor is reviewing the process used to input data. Which of the following is the MOST significant risk area for the auditor to focus on?

A.

Data resilience

B.

Data availability

C.

Data normalization

D.

Data integrity

Full Access
Question # 44

Which of the following establishes the PRIMARY difference between a business continuity plan (BCP) and a disaster recovery plan (DRP)?

A.

The annual testing requirements

B.

The focus on system recovery

C.

The timeframe for plan activation

D.

The involvement of senior management

Full Access
Question # 45

An outsourced recruitment vendor processes personally identifiable information (PII) related to an organization’s new hires. Which of the following would be the GREATEST concern to an IS auditor reviewing the third-party risk management process?

A.

The vendor collects data using an external-facing web service.

B.

The vendor lacks a team of dedicated privacy professionals.

C.

The vendor uses a fourth party to host client data.

D.

The vendor is excluded from the third-party due diligence process.

Full Access
Question # 46

A secure server room has a badge reader system that records name, date, and time information whenever a staff member uses a badge to enter or exit. When reviewing the system logs, an IS auditor notices records for some employees entering, but not exiting, the room. Which of the following would be the MOST effective compensating control to recommend?

A.

Installing security cameras at the doors

B.

Changing to a biometric access control system

C.

Implementing a monitored mantrap at entrance and exit points

D.

Requiring two-factor authentication at entrance and exit points

Full Access
Question # 47

Which of the following key performance indicators (KPIs) provides stakeholders with the MOST useful information about whether information security risk is being managed?

A.

Time from identifying security threats to implementing solutions

B.

The number of security controls audited

C.

Time from security log capture to log analysis

D.

The number of entries in the security risk register

Full Access
Question # 48

When reviewing whether IT investments are meeting business objectives, which of the following evaluations would be MOST useful?

A.

A break-even analysis

B.

Realized return on investment (ROI) versus projected ROI

C.

Budgeted spend versus actual spend

D.

Actual return on investment (ROI) versus industry average ROI

Full Access
Question # 49

Management receives information indicating a high level of risk associated with potential flooding near the organization ' s data center within the next few years. As a result, a decision has been made to move data center operations to another facility on higher ground. Which approach has been adopted?

A.

Risk avoidance

B.

Risk transfer

C.

Risk acceptance

D.

Risk reduction

Full Access
Question # 50

Which of the following is the BEST recommendation to drive accountability for achieving the desired outcomes specified in a benefits realization plan for an IT project?

A.

Document the dependencies between the project and other projects within the same program.

B.

Ensure that IT takes ownership for the delivery and tracking of all aspects of the benefits realization plan.

C.

Ensure that the project manager has formal authority for managing the benefits realization plan.

D.

Assign responsibilities, measures, and timelines for each identified benefit within the plan.

Full Access
Question # 51

Which of the following would be of GREATEST concern to an IS auditor reviewing an IT-related customer service project?

A.

The project risk exceeds the organization ' s risk appetite.

B.

Executing the project will require additional investments.

C.

Expected business value is expressed in qualitative terms.

D.

The organization will be the first to offer the proposed services.

Full Access
Question # 52

Backup procedures for an organization ' s critical data are considered to be which type of control?

A.

Directive

B.

Corrective

C.

Detective

D.

Compensating

Full Access
Question # 53

The PRIMARY objective of value delivery in reference to IT governance is to:

A.

promote best practices

B.

increase efficiency.

C.

optimize investments.

D.

ensure compliance.

Full Access
Question # 54

When reviewing an organization ' s finalized risk assessment process, what would be the MAIN reason for an IS auditor to compare acceptable risk level with residual risk?

A.

To identify omissions made in the completed risk assessment

B.

To identify new risks the organization may have to address

C.

To recommend control enhancements for further risk reduction

D.

To advise management on risk appetite levels

Full Access
Question # 55

When selecting a new data loss prevention (DLP) solution, the MOST important consideration is that the solution:

A.

is cost effective and meets proposed return on investment (ROI) criteria.

B.

provides comprehensive reporting and alerting features with detailed insights on data movements.

C.

is compatible with legacy IT infrastructure and integrates with other security tools.

D.

identifies and safeguards confidential information from unauthorized transmission.

Full Access
Question # 56

When physical destruction IS not practical, which of the following is the MOST effective means of disposing of sensitive data on a hard disk?

A.

Overwriting multiple times

B.

Encrypting the disk

C.

Reformatting

D.

Deleting files sequentially

Full Access
Question # 57

An organization that has suffered a cyber-attack is performing a forensic analysis of the affected users ' computers. Which of the following should be of GREATEST concern for the IS auditor reviewing this process?

A.

An imaging process was used to obtain a copy of the data from each computer.

B.

The legal department has not been engaged.

C.

The chain of custody has not been documented.

D.

Audit was only involved during extraction of the Information

Full Access
Question # 58

What is MOST important to verify during an external assessment of network vulnerability?

A.

Update of security information event management (SIEM) rules

B.

Regular review of the network security policy

C.

Completeness of network asset inventory

D.

Location of intrusion detection systems (IDS)

Full Access
Question # 59

What is the PRIMARY purpose of documenting audit objectives when preparing for an engagement?

A.

To address the overall risk associated with the activity under review

B.

To identify areas with relatively high probability of material problems

C.

To help ensure maximum use of audit resources during the engagement

D.

To help prioritize and schedule auditee meetings

Full Access
Question # 60

Which of the following is the BEST way to mitigate the impact of ransomware attacks?

A.

Invoking the disaster recovery plan (DRP)

B.

Backing up data frequently

C.

Paying the ransom

D.

Requiring password changes for administrative accounts

Full Access
Question # 61

During an audit of a multinational bank ' s disposal process, an IS auditor notes several findings. Which of the following should be the auditor ' s GREATEST concern?

A.

Backup media are not reviewed before disposal.

B.

Degaussing is used instead of physical shredding.

C.

Backup media are disposed before the end of the retention period

D.

Hardware is not destroyed by a certified vendor.

Full Access
Question # 62

An IS auditor wants to inspect recent events in a system to observe failed authentications and password changes. Which of the following is the MOST appropriate method to use for this purpose?

A.

Penetration testing

B.

Authenticated scanning

C.

Change management records

D.

System log review

Full Access
Question # 63

Which of the following security measures will reduce the risk of propagation when a cyberattack occurs?

A.

Perimeter firewall

B.

Data loss prevention (DLP) system

C.

Web application firewall

D.

Network segmentation

Full Access
Question # 64

An organization produces control reports with a desktop application that accesses data in the central production database. Which of the following would give an IS auditor concern about the reliability of these reports?

A.

The reports are printed by the same person who reviews them.

B.

The reports are available to all end users.

C.

The report definitions file is not included in routine backups.

D.

The report definitions can be modified by end users.

Full Access
Question # 65

Which of the following will BEST ensure that a proper cutoff has been established to reinstate transactions and records to their condition just prior to a computer system failure?

A.

Rotating backup copies of transaction files offsite

B.

Using a database management system (DBMS) to dynamically back-out partially processed transactions

C.

Maintaining system console logs in electronic formal

D.

Ensuring bisynchronous capabilities on all transmission lines

Full Access
Question # 66

Which of the following is the MAIN purpose of an information security management system?

A.

To identify and eliminate the root causes of information security incidents

B.

To enhance the impact of reports used to monitor information security incidents

C.

To keep information security policies and procedures up-to-date

D.

To reduce the frequency and impact of information security incidents

Full Access
Question # 67

Which of the following control measures is the MOST effective against unauthorized access of confidential information on stolen or lost laptops?

A.

Remote wipe capabilities

B.

Disk encryption

C.

User awareness

D.

Password-protected files

Full Access
Question # 68

An external attacker spoofing an internal Internet Protocol (IP) address can BEST be detected by which of the following?

A.

Comparing the source address to the domain name server (DNS) entry

B.

Using static IP addresses for identification

C.

Comparing the source address to the interface used as the entry point

D.

Using a state table to compare the message states of each packet as it enters the system

Full Access
Question # 69

Which of the following should be used as the PRIMARY basis for prioritizing IT projects and initiatives?

A.

Estimated cost and time

B.

Level of risk reduction

C.

Expected business value

D.

Available resources

Full Access
Question # 70

Which of the following is the PRIMARY reason to perform a risk assessment?

A.

To determine the current risk profile

B.

To ensure alignment with the business impact analysis (BIA)

C.

To achieve compliance with regulatory requirements

D.

To help allocate budget for risk mitigation controls

Full Access
Question # 71

Which of the following should be the IS auditor ' s PRIMARY focus, when evaluating an organization ' s offsite storage facility?

A.

Shared facilities

B.

Adequacy of physical and environmental controls

C.

Results of business continuity plan (BCP) test

D.

Retention policy and period

Full Access
Question # 72

An IS auditor reviewing an organization’s online payment system finds that the system sometimes duplicates payments. Which control will BEST compensate for this weakness?

A.

Using hash totals

B.

Performing a bank reconciliation

C.

Manually receipting payments

D.

Using control totals

Full Access
Question # 73

Which of the following provides re BEST evidence that outsourced provider services are being properly managed?

A.

Adequate action is taken for noncompilance with the service level agreement (SLA).

B.

The service level agreement (SLA) includes penalties tor non-performance.

C.

Internal performance standards align with corporate strategy.

D.

The vendor provides historical data to demonstrate its performance.

Full Access
Question # 74

A company has implemented an IT segregation of duties policy. In a role-based environment, which of the following roles may be assigned to an application developer?

A.

IT operator

B.

System administration

C.

Emergency support

D.

Database administration

Full Access
Question # 75

Which of the following is MOST important to consider when scheduling follow-up audits?

A.

The efforts required for independent verification with new auditors

B.

The impact if corrective actions are not taken

C.

The amount of time the auditee has agreed to spend with auditors

D.

Controls and detection risks related to the observations

Full Access
Question # 76

Who is PRIMARILY responsible for the design of IT controls to meet control objectives?

A.

Risk management

B.

Business management

C.

IT manager

D.

Internal auditor

Full Access
Question # 77

Which of the following management decisions presents the GREATEST risk associated with data leakage?

A.

There is no requirement for desktops to be encrypted

B.

Staff are allowed to work remotely

C.

Security awareness training is not provided to staff

D.

Security policies have not been updated in the past year

Full Access
Question # 78

Which of the following is the PRIMARY reason for an IS auditor to conduct post-implementation reviews?

A.

To determine whether project objectives in the business case have been achieved

B.

To ensure key stakeholder sign-off has been obtained

C.

To align project objectives with business needs

D.

To document lessons learned to improve future project delivery

Full Access
Question # 79

A sample for testing must include the 80 largest client balances and a random sample of the rest. What should the IS auditor recommend?

A.

Query the database.

B.

Develop an integrated test facility (ITF).

C.

Use generalized audit software.

D.

Leverage a random number generator.

Full Access
Question # 80

Which of the following is the PRIMARY advantage of a decentralized database architecture over a centralized architecture?

A.

The risk and the impact of a denial of service (DoS) attack is reduced.

B.

Data can be more easily synchronized in real time over public networks.

C.

Transactions performed in a decentralized environment are more consistent.

D.

Uniform security policies can be applied more easily.

Full Access
Question # 81

Which of the following is me GREATE ST impact as a result of the ongoing deterioration of a detective control?

A.

Increased number of false negatives in security logs

B.

Decreased effectiveness of roof cause analysis

C.

Decreased overall recovery time

D.

Increased demand for storage space for logs

Full Access
Question # 82

An organization has replaced its call center with Al chatbots that autonomously learn new responses through internet queries and customer conversation history. Which of the following would an IS auditor tasked with verifying IT controls consider to be the GREATEST risk?

A.

The model may not result in expected efficiencies.

B.

The model ' s operations may be difficult for the IT team to document.

C.

The model may not generate accurate responses due to overfitting.

D.

It may be difficult to audit the model due to the lack of a suitable framework.

Full Access
Question # 83

Which of the following is the MOST cost-effective way to determine the effectiveness of a business continuity plan (BCP)?

A.

Stress test

B.

Tabletop exercise

C.

Full operational test

D.

Post-implementation review

Full Access
Question # 84

Which of the following is MOST important to include in forensic data collection and preservation procedures?

A.

Assuring the physical security of devices

B.

Preserving data integrity

C.

Maintaining chain of custody

D.

Determining tools to be used

Full Access
Question # 85

Which of the following concerns is BEST addressed by securing production source libraries?

A.

Programs are not approved before production source libraries are updated.

B.

Production source and object libraries may not be synchronized.

C.

Changes are applied to the wrong version of production source libraries.

D.

Unauthorized changes can be moved into production.

Full Access
Question # 86

The use of which of the following would BEST enhance a process improvement program?

A.

Model-based design notations

B.

Balanced scorecard

C.

Capability maturity models

D.

Project management methodologies

Full Access
Question # 87

Which of the following is the MAIN objective of enterprise architecture (EA) governance?

A.

To ensure new processes and technologies harmonize with existing processes

B.

To ensure the EA can adapt to emerging technology trends

C.

To ensure the EA is compliant with local laws and regulations

D.

To ensure new initiatives produce an acceptable return on investment (ROI)

Full Access
Question # 88

Which of the following observations regarding change management should be considered the MOST serious risk by an IS auditor?

A.

There is no software used to track change management.

B.

The change is not approved by the business owners.

C.

The change is deployed two weeks after approval.

D.

The development of the change is not cost-effective.

Full Access
Question # 89

Which of the following provides the BEST evidence of the validity and integrity of logs in an organization ' s security information and event management (SIEM) system?

A.

Compliance testing

B.

Stop-or-go sampling

C.

Substantive testing

D.

Variable sampling

Full Access
Question # 90

An organization outsourced its IS functions to meet its responsibility for disaster recovery, the organization should:

A.

discontinue maintenance of the disaster recovery plan (DRP >

B.

coordinate disaster recovery administration with the outsourcing vendor

C.

delegate evaluation of disaster recovery to a third party

D.

delegate evaluation of disaster recovery to internal audit

Full Access
Question # 91

When reviewing the functionality of an intrusion detection system (IDS), the IS auditor should be MOST concerned if:

A.

legitimate packets blocked by the system have increased

B.

actual attacks have not been identified

C.

detected events have increased

D.

false positives have been reported

Full Access
Question # 92

An IS department is evaluated monthly on its cost-revenue ratio user satisfaction rate, and computer downtime This is BEST zed as an application of.

A.

risk framework

B.

balanced scorecard

C.

value chain analysis

D.

control self-assessment (CSA)

Full Access
Question # 93

Which of the following is the BEST indication that there are potential problems within an organization ' s IT service desk function?

A.

Undocumented operating procedures

B.

Lack of segregation of duties

C.

An excessive backlog of user requests

D.

Lack of key performance indicators (KPIs)

Full Access
Question # 94

Which of the following recommendations would BEST prevent the implementation of IT projects without collaborating with the business?

A.

Partner with the business units to evaluate IT projects.

B.

Review the projects to identify similarities and eliminate duplication.

C.

Periodically review the projects ' return on investment (ROI).

D.

Prioritize protects based on business and IT resource availability.

Full Access
Question # 95

Which of the following would provide the BEST evidence of an IT strategy corrections effectiveness?

A.

The minutes from the IT strategy committee meetings

B.

Synchronization of IT activities with corporate objectives

C.

The IT strategy committee charier

D.

Business unit satisfaction survey results

Full Access
Question # 96

An IS auditor is reviewing a decision to consolidate processing for multiple applications onto a single large server. Which of the following is the MOST significant impact from this decision?

A.

Higher operating system license fees

B.

More applications affected by a server outage

C.

Simplified asset management

D.

Fewer application servers requiring vulnerability scans

Full Access
Question # 97

Which of the following audit evidence collection procedures is MOST reliable?

A.

Inspecting paper documentation obtained from an independent third party

B.

Inspecting system-generated evidence provided by a control owner

C.

Examining critical data received from an auditee

D.

Performing manual procedures independently from a control owner

Full Access
Question # 98

Which of the following is MOST important for the successful establishment of a security vulnerability management program?

A.

A robust tabletop exercise plan

B.

A comprehensive asset inventory

C.

A tested incident response plan

D.

An approved patching policy

Full Access
Question # 99

In a high-volume, real-time system, the MOST effective technique by which to continuously monitor and analyze transaction processing is:

A.

integrated test facility (ITF).

B.

parallel simulation.

C.

transaction tagging.

D.

embedded audit modules.

Full Access
Question # 100

An IS auditor reviewing the throat assessment for a data cantor would be MOST concerned if:

A.

some of the identified threats are unlikely to occur.

B.

all identified threats relate to external entities.

C.

the exercise was completed by local management.

D.

neighboring organizations ' operations have been included.

Full Access
Question # 101

Several unattended laptops containing sensitive customer data were stolen from personnel offices Which of the following would be an IS auditor ' s BEST recommendation to protect data in case of recurrence?

A.

Encrypt the disk drive.

B.

Require two-factor authentication

C.

Enhance physical security

D.

Require the use of cable locks

Full Access
Question # 102

Which of the following technology trends can lead to more robust data loss prevention (DLP) tools?

A.

Cloud computing

B.

Robotic process automation (RPA)

C.

Internet of Things (IoT)

D.

Machine learning algorithms

Full Access
Question # 103

Which of the following is the BEST way to determine whether a test of a disaster recovery plan (DRP) was successful?

A.

Analyze whether predetermined test objectives were met.

B.

Perform testing at the backup data center.

C.

Evaluate participation by key personnel.

D.

Test offsite backup files.

Full Access
Question # 104

Capacity management enables organizations to:

A.

forecast technology trends

B.

establish the capacity of network communication links

C.

identify the extent to which components need to be upgraded

D.

determine business transaction volumes.

Full Access
Question # 105

Which of the following is MOST important for an IS auditor to confirm when reviewing an organization ' s incident response management program?

A.

All incidents have a severity level assigned.

B.

All identified incidents are escalated to the CEO and the CISO.

C.

Incident response is within defined service level agreements (SLAs).

D.

The alerting tools and incident response team can detect incidents.

Full Access
Question # 106

Which of the following should be the FIRST step in managing the impact of recently discovered zero-day vulnerabilities?

A.

Identifying at-risk assets

B.

Assessing the impact of vulnerabilities

C.

Evaluating the likelihood of attack

D.

Estimating potential damage

Full Access
Question # 107

Which of the following is MOST important when planning a network audit?

A.

Determination of IP range in use

B.

Analysis of traffic content

C.

Isolation of rogue access points

D.

Identification of existing nodes

Full Access
Question # 108

A security administrator is called in the middle of the night by the on-call programmer A number of programs have failed, and the programmer has asked for access to the live system. What IS the BEST course of action?

A.

Require that a change request be completed and approved

B.

Give the programmer an emergency ID for temporary access and review the activity

C.

Give the programmer read-only access to investigate the problem

D.

Review activity logs the following day and investigate any suspicious activity

Full Access
Question # 109

Which of the following is the GREATEST risk associated with hypervisors in virtual environments?

A.

Availability issues

B.

Virtual sprawl

C.

Single point of failure

D.

Lack of patches

Full Access
Question # 110

When an IS audit reveals that a firewall was unable to recognize a number of attack attempts, the auditor ' s BEST recommendation is to place an intrusion detection system (IDS) between the firewall and:

A.

the organization ' s web server.

B.

the demilitarized zone (DMZ).

C.

the organization ' s network.

D.

the Internet

Full Access
Question # 111

Which of the following findings should be of GREATEST concern to an IS auditor assessing the risk associated with end-user computing (EUC) in an organization?

A.

Insufficient processes to track ownership of each EUC application?

B.

Insufficient processes to lest for version control

C.

Lack of awareness training for EUC users

D.

Lack of defined criteria for EUC applications

Full Access
Question # 112

An organization has implemented a distributed security administration system to replace the previous centralized one. Which of the following presents the GREATEST potential concern?

A.

Security procedures may be inadequate to support the change

B.

A distributed security system is inherently a weak security system

C.

End-user acceptance of the new system may be difficult to obtain

D.

The new system will require additional resources

Full Access
Question # 113

An IS auditor suspects an organization ' s computer may have been used to commit a crime. Which of the following is the auditor ' s BEST course of action?

A.

Examine the computer to search for evidence supporting the suspicions.

B.

Advise management of the crime after the investigation.

C.

Contact the incident response team to conduct an investigation.

D.

Notify local law enforcement of the potential crime before further investigation.

Full Access
Question # 114

An IS audit reveals that an organization is not proactively addressing known vulnerabilities. Which of the following should the IS auditor recommend the organization do FIRST?

A.

Verify the disaster recovery plan (DRP) has been tested.

B.

Ensure the intrusion prevention system (IPS) is effective.

C.

Assess the security risks to the business.

D.

Confirm the incident response team understands the issue.

Full Access
Question # 115

An organization has partnered with a third party to transport backup drives to an offsite storage facility. Which of the following is MOST important before sending the drives?

A.

Creating a chain of custody to accompany the drive in transit

B.

Ensuring data protection is aligned with the data classification policy

C.

Encrypting the drive with strong protection standards

D.

Ensuring the drive is placed in a tamper-evident mechanism

Full Access
Question # 116

An organization is planning an acquisition and has engaged an IS auditor lo evaluate the IT governance framework of the target company. Which of the following would be MOST helpful In determining the effectiveness of the framework?

A.

Sell-assessment reports of IT capability and maturity

B.

IT performance benchmarking reports with competitors

C.

Recent third-party IS audit reports

D.

Current and previous internal IS audit reports

Full Access
Question # 117

An IS auditor has been asked to review the quality of data in a general ledger system. Which of the following would provide the auditor with the MOST meaningful results?

A.

Discussion of the largest account values with business owners

B.

Integrity checks against source documentation

C.

System vulnerability assessment

D.

Interviews with system owners and operators

Full Access
Question # 118

Which of the following would be MOST important to include in an IS audit report?

A.

Observations not reported as findings due to inadequate evidence

B.

The roadmap for addressing the various risk areas

C.

The level of unmitigated risk along with business impact

D.

Specific technology solutions for each audit observation

Full Access
Question # 119

Which of the following observations should be of GREATEST concern to an IS auditor assessing access controls for the accounts payable module of a finance system?

A.

Payment files are stored on a shared drive in a writable format prior to processing.

B.

Accounts payable staff have access to update vendor bank account details.

C.

The IS auditor was granted access to create purchase orders.

D.

Configured delegation limits do not align to the organization ' s delegation’s policy.

Full Access
Question # 120

An IS auditor is reviewing an organization ' s cloud access security broker (CASB) solution. Which ofthe following is MOST important for the auditor to verify?

A.

Cloud services are classified.

B.

Users are centrally managed.

C.

Cloud processes are resilient.

D.

Users are periodically recertified.

Full Access
Question # 121

A bank has a combination of corporate customer accounts (higher monetary value) and small business accounts (lower monetary value) as part of online banking. Which of the following is the BEST sampling approach for an IS auditor to use for these accounts?

A.

Difference estimation sampling

B.

Stratified mean per unit sampling

C.

Customer unit sampling

D.

Unstratified mean per unit sampling

Full Access
Question # 122

Which of the following should an IS auditor recommend as a PRIMARY area of focus when an organization decides to outsource technical support for its external customers?

A.

Align service level agreements (SLAs) with current needs.

B.

Monitor customer satisfaction with the change.

C.

Minimize costs related to the third-party agreement.

D.

Ensure right to audit is included within the contract.

Full Access
Question # 123

During a closing meeting, the IT manager disagrees with a valid audit finding presented by the IS auditor and requests the finding be excluded from the final report. Which of the following is the auditor ' s BEST course of action?

A.

Request that the IT manager be removed from the remaining meetings and future audits.

B.

Modify the finding to include the IT manager ' s comments and inform the audit manager of the changes.

C.

Remove the finding from the report and continue presenting the remaining findings.

D.

Provide the evidence which supports the finding and keep the finding in the report.

Full Access
Question # 124

In order to be useful, a key performance indicator (KPI) MUST

A.

be approved by management.

B.

be measurable in percentages.

C.

be changed frequently to reflect organizational strategy.

D.

have a target value.

Full Access
Question # 125

A new regulation has been enacted that mandates specific information security practices for the protection of customer data. Which of the following is MOST useful for an IS auditor to review when auditing against the regulation?

A.

Compliance gap analysis

B.

Customer data protection roles and responsibilities

C.

Customer data flow diagram

D.

Benchmarking studies of adaptation to the new regulation

Full Access
Question # 126

An IS auditor is reviewing the system development practices of an organization that is about to move from a Waterfall to an Agile approach. Which of the following is MOST important for the auditor to focus on as a result of this move?

A.

Secure code review

B.

Release management

C.

Capacity planning

D.

Code documentation

Full Access
Question # 127

When reviewing the disaster recovery strategy, IT management identified an application that requires a short recovery point objective (RPO). Which of the following data restoration strategies would BEST enable the organization to meet this objective?

A.

Snapshots

B.

Mirroring

C.

Log shipping

D.

Data backups

Full Access
Question # 128

Demonstrated support from which of the following roles in an organization has the MOST influence over information security governance?

A.

Chief information security officer (CISO)

B.

Information security steering committee

C.

Board of directors

D.

Chief information officer (CIO)

Full Access
Question # 129

Which of the following is the BEST control lo mitigate attacks that redirect Internet traffic to an unauthorized website?

A.

Utilize a network-based firewall.

B.

Conduct regular user security awareness training.

C.

Perform domain name system (DNS) server security hardening.

D.

Enforce a strong password policy meeting complexity requirement.

Full Access
Question # 130

Which of the following should be of GREATEST concern to an IS auditor when using data analytics?

A.

The data source lacks integrity.

B.

The data analytics software is open source.

C.

The data set contains irrelevant fields.

D.

The data was not extracted by the auditor.

Full Access
Question # 131

Which of the following is the BEST detective control for a job scheduling process involving data transmission?

A.

Metrics denoting the volume of monthly job failures are reported and reviewed by senior management.

B.

Jobs are scheduled to be completed daily and data is transmitted using a Secure File Transfer Protocol (SFTP).

C.

Jobs are scheduled and a log of this activity is retained for subsequent review.

D.

Job failure alerts are automatically generated and routed to support personnel.

Full Access
Question # 132

Which of the following responsibilities associated with a disaster recovery plan (DRP) can be outsourced to a Disaster Recovery as a Service (DRaaS) provider?

A.

System recovery procedures

B.

Stakeholder communications during a disaster

C.

Validation of recovered data

D.

Processes for maintaining currency of data

Full Access
Question # 133

An IS auditor finds an IT manager recently changed a Software as a Service (SaaS) provider contract in an effort to cut costs. The new contract increases the time to resolve incidents. Which of the following should be the auditor’s GREATEST concern?

A.

The impact on business processes has not been evaluated.

B.

The new contract is not in compliance with IT security policy.

C.

The corresponding service level agreement (SLA) was not modified.

D.

Alternative cost-reduction methods were not considered.

Full Access
Question # 134

As part of the architecture of virtualized environments, in a bare metal or native visualization the hypervisor runs without:

A.

a host operating system.

B.

a guest operating system.

C.

any applications on the guest operating system.

D.

any applications on the host operating system.

Full Access
Question # 135

Management has agreed to move the organization ' s data center due to recent flood map changes in its current location. Which risk response has been adopted?

A.

Risk elimination

B.

Risk transfer

C.

Risk acceptance

D.

Risk avoidance

Full Access
Question # 136

Which of the following should be the PRIMARY focus when communicating an IS audit issue to management?

A.

The risk to which the organization is exposed due to the issue

B.

The nature, extent, and timing of subsequent audit follow-up

C.

How the issue was found and who bears responsibility

D.

A detailed solution for resolving the issue

Full Access
Question # 137

Prior to a follow-up engagement, an IS auditor learns that management has decided to accept a level of residual risk related to an audit finding without remediation. The IS auditor is concerned about management ' s decision. Which of the following should be the IS auditor ' s NEXT course of action?

A.

Accept management ' s decision and continue the follow-up.

B.

Report the issue to IS audit management.

C.

Report the disagreement to the board.

D.

Present the issue to executive management.

Full Access
Question # 138

During the development of a business case for a new application, the IS auditor should be PRIMARILY involved in the:

A.

System test.

B.

Transaction blueprint.

C.

User acceptance testing (UAT).

D.

Feasibility study.

Full Access
Question # 139

An IS auditor notes that not all security tests were completed for an online sales system recently promoted to production. Which of the following is the auditor ' s BEST course of action?

A.

Determine exposure to the business

B.

Adjust future testing activities accordingly

C.

Increase monitoring for security incidents

D.

Hire a third party to perform security testing

Full Access
Question # 140

Which of the following be of GREATEST concern to an IS auditor reviewing on-site preventive maintenance for an organization’s business-critical server hardware?

A.

Preventive maintenance costs exceed the business allocated budget.

B.

Preventive maintenance has not been approved by the information system

C.

Preventive maintenance is outsourced to multiple vendors without requiring nondisclosure agreements (NDAs)

D.

The preventive maintenance schedule is based on mean time between failures (MTBF) parameters.

Full Access
Question # 141

An IS auditor has learned that access privileges are not periodically reviewed or updated. Which of the following would provide the BEST evidence to determine whether transactions have been executed by authorized employees?

A.

Audit trails

B.

Control totals

C.

Reconciliations

D.

Change logs

Full Access
Question # 142

Which of the following is the MOST likely root cause of shadow IT in an organization?

A.

Lengthy approval for technology investment

B.

The opportunity to reduce software license fees

C.

Ease of use for cloud-based applications and services

D.

Approved software not meeting user requirements

Full Access
Question # 143

Which of the following statements appearing in an organization ' s acceptable use policy BEST demonstrates alignment with data classification standards related to the protection of information assets?

A.

Any information assets transmitted over a public network must be approved by executive management.

B.

All information assets must be encrypted when stored on the organization ' s systems.

C.

Information assets should only be accessed by persons with a justified need.

D.

All information assets will be assigned a clearly defined level to facilitate proper employee handling.

Full Access
Question # 144

Which of the following is MOST important to verify when determining the completeness of the vulnerability scanning process?

A.

The organization ' s systems inventory is kept up to date.

B.

Vulnerability scanning results are reported to the CISO.

C.

The organization is using a cloud-hosted scanning tool for Identification of vulnerabilities

D.

Access to the vulnerability scanning tool is periodically reviewed

Full Access
Question # 145

An organization recently migrated Us data warehouse from a legacy system to a different architecture in the cloud. Which of the following should be of GREATEST concern to the IS auditor reviewing the new data architecture?

A.

The data was not cleansed before moving to the cloud data warehouse.

B.

The cloud data warehouse uses a hybrid cloud architecture.

C.

The migration analyst is not fully trained on the new tools.

D.

The data is stored in a multi-tenant environment.

Full Access
Question # 146

Which of the following is an IS auditor ' s BEST course of action when the auditee indicates that a corrective action plan for a high-risk finding will take longer than expected?

A.

Accept the longer target date and document it in the audit system.

B.

Determine if an interim compensating control has been implemented.

C.

Escalate the overdue finding to the audit committee.

D.

Require that remediation is completed in the agreed timeframe.

Full Access
Question # 147

An IS auditor finds that a new network connection allows communication between the Internet and the internal enterprise resource planning (ERP) system. Which of the following is the PRIMARY business impact to include when presenting this observation to management?

A.

An increase to the threat landscape

B.

A decrease in data quality in the ERP system

C.

A decrease in network performance

D.

An increase in potential fines from regulators

Full Access
Question # 148

Which of the following is the BEST control to help ensure that security requirements are considered throughout the life cycle of an agile software development project?

A.

Documenting security control requirements and obtaining internal audit sign off

B.

Including project team members who can provide security expertise

C.

Reverting to traditional waterfall software development life cycle (SDLC) techniques

D.

Requiring the project to go through accreditation before release into production

Full Access
Question # 149

In the case of a disaster where the data center is no longer available, which of the following tasks should be done FIRST?

A.

Perform data recovery.

B.

Arrange for a secondary site.

C.

Analyze risk.

D.

Activate the call tree.

Full Access
Question # 150

A financial accounting system audit determined that audit logging of transactions had been disabled by a finance employee. The IS auditor recommended that finance personnel no longer have the capability to change audit logging settings. Which of the following is MOST important to verify during the follow-up?

A.

Finance personnel receive security awareness training.

B.

Audit logs of transactions are reviewed.

C.

Changes to configurations are documented.

D.

Least privilege access is being enforced.

Full Access
Question # 151

Who is accountable for an organization ' s enterprise risk management (ERM) program?

A.

Board of directors

B.

Steering committee

C.

Chief risk officer (CRO)

D.

Executive management

Full Access
Question # 152

Which of the following is the BEST approach for determining the overall IT risk appetite of an organization when business units use different methods formanaging IT risks?

A.

Average the business units’ IT risk levels

B.

Identify the highest-rated IT risk level among the business units

C.

Prioritize the organization ' s IT risk scenarios

D.

Establish a global IT risk scoring criteria

Full Access
Question # 153

Which of the following is the MOST effective control when granting access to a service provider for a ctoud-6ased application?

A.

Administrator access is provided for a limited period with an expiration date.

B.

Access has been provided on a need-to-know basis.

C.

User IDs are deleted when work is completed.

D.

Access is provided to correspond with the service level agreement (SLA).

Full Access
Question # 154

What should an IS auditor ensure when a financial organization intends to utilize production data in the testing environment?

A.

The data utilized is de-identified.

B.

The data utilized is accurate.

C.

The data utilized is complete.

D.

The data utilized is current.

Full Access
Question # 155

Which of the following security measures is MOST important for protecting Internet of Things (IoT) devices from potential cyberattacks?

A.

Logging and monitoring network traffic

B.

Confirming firmware compliance to current security requirements

C.

Changing default passwords

D.

Reviewing and updating the network diagram on a regular basis

Full Access
Question # 156

A credit card company has decided to outsource the printing of customer statements It Is MOST important for the company to verify whether:

A.

the provider has alternate service locations.

B.

the contract includes compensation for deficient service levels.

C.

the provider ' s information security controls are aligned with the company ' s.

D.

the provider adheres to the company ' s data retention policies.

Full Access
Question # 157

Coding standards provide which of the following?

A.

Program documentation

B.

Access control tables

C.

Data flow diagrams

D.

Field naming conventions

Full Access
Question # 158

A database administrator (DBA) should be prevented from having end user responsibilities:

A.

having end user responsibilities

B.

accessing sensitive information

C.

having access to production files

D.

using an emergency user ID

Full Access
Question # 159

What is the FIRST step when creating a data classification program?

A.

Categorize and prioritize data.

B.

Develop data process maps.

C.

Categorize information by owner.

D.

Develop a policy.

Full Access
Question # 160

A web application is developed in-house by an organization. Which of the following would provide the BEST evidence to an IS auditor that the application is secure from external attack?

A.

Web application firewall (WAF) implementation

B.

Penetration test results

C.

Code review by a third party

D.

Database application monitoring logs

Full Access
Question # 161

Which of the following should an IS auditor do FIRST when auditing a robotics process automation (RPA) implementation?

A.

Evaluate the overall solution architecture.

B.

Analyze the sequence of activities performed by the robot.

C.

Understand the business processes automated by the robot.

D.

Identity the credentials used by the robot and where they are stored.

Full Access
Question # 162

To develop meaningful recommendations ' or findings, which of the following is MOST important ' or an IS auditor to determine and understand?

A.

Root cause

B.

Responsible party

C.

impact

D.

Criteria

Full Access
Question # 163

An IS audit manager is preparing the staffing plan for an audit engagement of a cloud service provider. What should be the manager ' s PRIMARY concern when being made aware that a new

auditor in the department previously worked for this provider?

A.

Independence

B.

Professional conduct

C.

Subject matter expertise

D.

Resource availability

Full Access
Question # 164

Which of the following provides the BEST evidence that all elements of a business continuity plan (BCP) are operating effectively?

A.

Walk-through test results

B.

Full operational test results

C.

Tabletop test results

D.

Simulation test results

Full Access
Question # 165

Which of the following approaches will ensure recovery time objectives (RTOs) are met for an organization ' s disaster recovery plan (DRP)?

A.

Performing a cyber resilience test

B.

Performing a full interruption test

C.

Performing a tabletop test

D.

Performing a parallel test

Full Access
Question # 166

Which of the following activities would allow an IS auditor to maintain independence while facilitating a control sell-assessment (CSA)?

A.

Implementing the remediation plan

B.

Partially completing the CSA

C.

Developing the remediation plan

D.

Developing the CSA questionnaire

Full Access
Question # 167

Which of the following information security requirements BE ST enables the tracking of organizational data in a bring your own device (BYOD) environment?

A.

Employees must immediately report lost or stolen mobile devices containing organizational data

B.

Employees must sign acknowledgment of the organization ' s mobile device acceptable use policy

C.

Employees must enroll their personal devices in the organization ' s mobile device management program

Full Access
Question # 168

To enable the alignment of IT staff development plans with IT strategy, which of the following should be done FIRST?

A.

Review IT staff job descriptions for alignment

B.

Develop quarterly training for each IT staff member.

C.

Identify required IT skill sets that support key business processes

D.

Include strategic objectives m IT staff performance objectives

Full Access
Question # 169

Which of the following provides the BEST assurance of data integrity after file transfers?

A.

Check digits

B.

Monetary unit sampling

C.

Hash values

D.

Reasonableness check

Full Access
Question # 170

An IS auditor follows up on a recent security incident and finds the incident response was not adequate. Which of the following findings should be considered MOST critical?

A.

The security weakness facilitating the attack was not identified.

B.

The attack was not automatically blocked by the intrusion detection system (IDS).

C.

The attack could not be traced back to the originating person.

D.

Appropriate response documentation was not maintained.

Full Access
Question # 171

An IS auditor is reviewing an organization ' s incident management processes. Which of the following observations should be the auditor ' s GREATEST concern?

A.

Ineffective incident detection

B.

Ineffective incident dashboard

C.

Ineffective incident classification

D.

Ineffective post-incident review

Full Access
Question # 172

Reviewing which of the following would provide the BEST indication that a project is progressing as planned?

A.

Identification of the critical path

B.

Earned value analysis (EVA) results

C.

Work breakdown structure

D.

Traceability matrix

Full Access
Question # 173

Which of the following would MOST effectively help to reduce the number of repealed incidents in an organization?

A.

Testing incident response plans with a wide range of scenarios

B.

Prioritizing incidents after impact assessment.

C.

Linking incidents to problem management activities

D.

Training incident management teams on current incident trends

Full Access
Question # 174

Which of the following presents the GREATEST risk to an organization ' s ability to manage quality control (QC) processes?

A.

Lack of segregation of duties

B.

Lack of a dedicated QC function

C.

Lack of policies and procedures

D.

Lack of formal training and attestation

Full Access
Question # 175

An online retailer is receiving customer complaints about receiving different items from what they ordered on the organization ' s website. The root cause has been traced to poor data quality. Despite efforts to clean erroneous data from the system, multiple data quality issues continue to occur. Which of the following recommendations would be the BEST way to reduce the likelihood of future occurrences?

A.

Assign responsibility for improving data quality.

B.

Invest in additional employee training for data entry.

C.

Outsource data cleansing activities to reliable third parties.

D.

Implement business rules to validate employee data entry.

Full Access
Question # 176

A vendor requires privileged access to a key business application. Which of the following is the BEST recommendation to reduce the risk of data leakage?

A.

Implement real-time activity monitoring for privileged roles

B.

Include the right-to-audit in the vendor contract

C.

Perform a review of privileged roles and responsibilities

D.

Require the vendor to implement job rotation for privileged roles

Full Access
Question # 177

In which phase of the audit life cycle process should an IS auditor initially discuss observations with management?

A.

Planning phase

B.

Reporting phase

C.

Follow-up phase

D.

Fieldwork phase

Full Access
Question # 178

An organization has assigned two now IS auditors to audit a now system implementation. One of the auditors has an IT-related degree, and one has a business degree. Which ol the following is MOST important to meet the IS audit standard for proficiency?

A.

The standard is met as long as one member has a globally recognized audit certification.

B.

Technical co-sourcing must be used to help the new staff.

C.

Team member assignments must be based on individual competencies.

D.

The standard is met as long as a supervisor reviews the new auditors ' work.

Full Access
Question # 179

Which of the following BEST describes an audit risk?

A.

The company is being sued for false accusations.

B.

The financial report may contain undetected material errors.

C.

Employees have been misappropriating funds.

D.

Key employees have not taken vacation for 2 years.

Full Access
Question # 180

Which of the following controls helps to ensure that data extraction queries run by the database administrator (DBA) are monitored?

A.

Restricting access to DBA activities

B.

Performing periodic access reviews

C.

Storing logs of database access

D.

Reviewing activity logs of the DBA

Full Access
Question # 181

An IS auditor has been asked to review an event log aggregation system to ensure risk management practices have been applied. Which of the following should be of MOST concern to the auditor?

A.

Log feeds are uploaded via batch process.

B.

Completeness testing has not been performed on the log data.

C.

The log data is not normalized.

D.

Data encryption standards have not been considered.

Full Access
Question # 182

Recovery facilities providing a redundant combination of Internet connections to the local communications loop is an example of which type of telecommunications continuity?

A.

Voice recovery

B.

Alternative routing

C.

Long-haul network diversity

D.

Last-mile circuit protection

Full Access
Question # 183

A review of Internet security disclosed that users have individual user accounts with Internet service providers (ISPs) and use these accounts for downloading business data. The organization wants to ensure that only the corporate network is used. The organization should FIRST:

A.

use a proxy server to filter out Internet sites that should not be accessed.

B.

keep a manual log of Internet access.

C.

monitor remote access activities.

D.

include a statement in its security policy about Internet use.

Full Access
Question # 184

The business case for an information system investment should be available for review until the:

A.

information system investment is retired.

B.

information system has reached end of life.

C.

formal investment decision is approved.

D.

benefits have been fully realized.

Full Access
Question # 185

Which of the following system attack methods is executed by entering malicious code into the search box of a vulnerable website, causing the server to reveal restricted information?

A.

Man-m-the-middle

B.

Denial of service (DoS)

C.

SQL injection

D.

Cross-site scripting

Full Access
Question # 186

Which of the following is the MOST effective way for an IS auditor to ensure information is preserved when conducting a forensic investigation?

A.

Harden computer hardware and software.

B.

Image residual data and deleted files.

C.

Encode system logs and intrusion detection system (IDS) logs.

D.

Document all application programming interface (API) connections with third parties.

Full Access
Question # 187

IT management has accepted the risk associated with an IS auditor ' s finding due to the cost and complexity of the corrective actions. Which of the following should be the auditor ' s NEXT course of action?

A.

Perform a cost-benefit analysis.

B.

Document and inform the audit committee.

C.

Report the finding to external regulators.

D.

Notify senior management.

Full Access
Question # 188

Which of the following observations should be of GREATEST concern to an IS auditor reviewing an organization’s enterprise architecture (EA) program?

A.

The architecture review board is chaired by the CIO

B.

IT application owners have sole responsibility for architecture approval

C.

The EA program governs projects that are not IT-related

D.

Information security requirements are reviewed by the EA program

Full Access
Question # 189

Which of the following would be an auditor ' s GREATEST concern when reviewing data inputs from spreadsheets into the core finance system?

A.

Undocumented code formats data and transmits directly to the database.

B.

There is not a complete inventory of spreadsheets, and file naming is inconsistent.

C.

The department data protection policy has not been reviewed or updated for two years.

D.

Spreadsheets are accessible by all members of the finance department.

Full Access
Question # 190

Which of the following is the BEST methodology to use for estimating the complexity of developing a large business application?

A.

Function point analysis

B.

Work breakdown structure

C.

Critical path analysts

D.

Software cost estimation

Full Access
Question # 191

Which of the following access rights presents the GREATEST risk when granted to a new member of the system development staff?

A.

Write access to production program libraries

B.

Write access to development data libraries

C.

Execute access to production program libraries

D.

Execute access to development program libraries

Full Access
Question # 192

The PRIMARY goal of capacity management is to:

A.

minimize data storage needs across the organization.

B.

provide necessary IT resources to meet business requirements.

C.

minimize system idle time to optimize cost.

D.

ensure that IT teams have sufficient personnel.

Full Access
Question # 193

An IS auditor determines that the vendor ' s deliverables do not include the source code for a newly acquired product. To address this issue, which of the following should the auditor recommend be included in the contract?

A.

Confidentiality and data protection clauses

B.

Service level agreement (SLA)

C.

Software escrow agreement

D.

Right-to-audit clause

Full Access
Question # 194

Email required for business purposes is being stored on employees ' personal devices.

Which of the following is an IS auditor ' s BEST recommendation?

A.

Require employees to utilize passwords on personal devices

B.

Prohibit employees from storing company email on personal devices

C.

Ensure antivirus protection is installed on personal devices

D.

Implement an email containerization solution on personal devices

Full Access
Question # 195

Which of the following controls is MOST important for ensuring the integrity of system interfaces?

A.

Periodic audits

B.

File counts

C.

File checksums

D.

IT operator monitoring

Full Access
Question # 196

An organization plans to centrally decommission end-of-life databases and migrate the data to the latest model of hardware. Which of the following BEST ensures data integrity is preserved during the migration?

A.

Reconciling sample data to most recent backups

B.

Obfuscating confidential data

C.

Encrypting the data

D.

Comparing checksums

Full Access
Question # 197

During the audit of an enterprise resource planning (ERP) system, an IS auditor found an applicationpatch was applied to the production environment. It is MOST

important for the IS auditor to verify approval from the:

A.

information security officer.

B.

system administrator.

C.

information asset owner.

D.

project manager.

Full Access
Question # 198

Which of the following is the BEST indicator of the effectiveness of signature-based intrusion detection systems (lDS)?

A.

An increase in the number of identified false positives

B.

An increase in the number of detected Incidents not previously identified

C.

An increase in the number of unfamiliar sources of intruders

D.

An increase in the number of internally reported critical incidents

Full Access
Question # 199

Which of the following is the PRIMARY reason an IS auditor should discuss observations with management before delivering a final report?

A.

Validate the audit observations_

B.

Identify business risks associated with the observations.

C.

Assist the management with control enhancements.

D.

Record the proposed course of corrective action.

Full Access
Question # 200

An organization is concerned with meeting new regulations for protecting data confidentiality and asks an IS auditor to evaluate their procedures for transporting data. Which of the

following would BEST support the organization ' s objectives?

A.

Cryptographic hashes

B.

Virtual local area network (VLAN)

C.

Encryption

D.

Dedicated lines

Full Access
Question # 201

Which of the following should be restricted from a network administrator ' s privileges in an adequately segregated IT environment?

A.

Monitoring network traffic

B.

Changing existing configurations for applications

C.

Hardening network ports

D.

Ensuring transmission protocols are functioning correctly

Full Access
Question # 202

Which of the following is MOST likely to be a project deliverable of an agile software development methodology?

A.

Strictly managed software requirements baselines

B.

Extensive project documentation

C.

Automated software programming routines

D.

Rapidly created working prototypes

Full Access
Question # 203

When auditing the feasibility study of a system development project, the IS auditor should:

A.

review qualifications of key members of the project team.

B.

review the request for proposal (RFP) to ensure that it covers the scope of work.

C.

review cost-benefit documentation for reasonableness.

D.

ensure that vendor contracts are reviewed by legal counsel.

Full Access
Question # 204

A data breach has occurred due lo malware. Which of the following should be the FIRST course of action?

A.

Notify the cyber insurance company.

B.

Shut down the affected systems.

C.

Quarantine the impacted systems.

D.

Notify customers of the breach.

Full Access
Question # 205

Which of the following is the MOST effective way to identify exfiltration of sensitive data by a malicious insider?

A.

Implement data loss prevention (DLP) software

B.

Review perimeter firewall logs

C.

Provide ongoing information security awareness training

D.

Establish behavioral analytics monitoring

Full Access
Question # 206

A finance department has a multi-year project to upgrade the enterprise resource planning (ERP) system hosting the general ledger. and in year one, the system version upgrade will be applied. Which of the following should be the PRIMARY focus of the IS auditor reviewing the first year of the project?

A.

unit testing

B.

Network performance

C.

User acceptance testing (UAT)

D.

Regression testing

Full Access
Question # 207

During an audit, the IS auditor finds that in many cases excessive rights were not removed from a system. Which of the following is the auditor ' s BEST recommendation?

A.

System administrators should ensure consistency of assigned rights.

B.

IT security should regularly revoke excessive system rights.

C.

Human resources (HR) should delete access rights of terminated employees.

D.

Line management should regularly review and request modification of access rights

Full Access
Question # 208

What would be an IS auditor ' s BEST course of action when an auditee is unable to close all audit recommendations by the time of the follow-up audit?

A.

Ensure the open issues are retained in the audit results.

B.

Terminate the follow-up because open issues are not resolved

C.

Recommend compensating controls for open issues.

D.

Evaluate the residual risk due to open issues.

Full Access
Question # 209

Which of the following should be of GREATEST concern to an IS auditor assessing an organization ' s patch management program?

A.

Patches are deployed from multiple deployment servers.

B.

There is no process in place to scan the network to identify missing patches.

C.

Patches for medium- and low-risk vulnerabilities are omitted.

D.

There is no process in place to quarantine servers that have not been patched.

Full Access
Question # 210

A now regulation requires organizations to report significant security incidents to the regulator within 24 hours of identification. Which of the following is the IS auditor’s BEST recommendation to facilitate compliance with the regulation?

A.

Establish key performance indicators (KPls) for timely identification of security incidents.

B.

Engage an external security incident response expert for incident handling.

C.

Enhance the alert functionality of the intrusion detection system (IDS).

D.

Include the requirement in the incident management response plan.

Full Access
Question # 211

An IS auditor is reviewing the service management of an outsourced help desk. Which of the following is the BEST indicator of how effectively the service provider is performing this function?

A.

Average ticket age

B.

Number of calls worked

C.

Customer satisfaction ratings

D.

Call transcript reviews

Full Access
Question # 212

Which of the following is the MOST appropriate and effective fire suppression method for an unstaffed computer room?

A.

Water sprinkler

B.

Fire extinguishers

C.

Carbon dioxide (CO2)

D.

Dry pipe

Full Access
Question # 213

An IS auditor found that a company executive is encouraging employee use of social networking sites for business purposes. Which of the following recommendations would BEST help to reduce the risk of data leakage?

A.

Requiring policy acknowledgment and nondisclosure agreements signed by employees

B.

Providing education and guidelines to employees on use of social networking sites

C.

Establishing strong access controls on confidential data

D.

Monitoring employees ' social networking usage

Full Access
Question # 214

An organization is ready to implement a new IT solution consisting of multiple modules. The last module updates the processed data into the database. Which of the following findings should be of MOST concern to the IS auditor?

A.

Absence of a formal change approval process

B.

Lack of input validation

C.

Use of weak encryption

D.

Lack of a data dictionary

Full Access
Question # 215

A post-implementation review was conducted by issuing a survey to users. Which of the following should be of GREATEST concern to an IS auditor?

A.

The survey results were not presented in detail lo management.

B.

The survey questions did not address the scope of the business case.

C.

The survey form template did not allow additional feedback to be provided.

D.

The survey was issued to employees a month after implementation.

Full Access
Question # 216

Which of the following is an example of a preventative control in an accounts payable system?

A.

The system only allows payments to vendors who are included In the system ' s master vendor list.

B.

Backups of the system and its data are performed on a nightly basis and tested periodically.

C.

The system produces daily payment summary reports that staff use to compare against invoice totals.

D.

Policies and procedures are clearly communicated to all members of the accounts payable department

Full Access
Question # 217

An organization considering the outsourcing of a business application should FIRST:

A.

define service level requirements.

B.

perform a vulnerability assessment.

C.

conduct a cost-benefit analysis.

D.

issue a request for proposal (RFP).

Full Access
Question # 218

Which of the following is the BEST point in time to conduct a post-implementation review?

A.

After a full processing cycle

B.

Immediately after deployment

C.

After the warranty period

D.

Prior to the annual performance review

Full Access
Question # 219

Which of the following is the MOST important action when populating a project risk register?

A.

Identifying the risk scoring criteria

B.

Assigning risk ownership for identified risk

C.

Creating risk action plans

D.

Conducting process walk-throughs

Full Access
Question # 220

If enabled within firewall rules, which of the following services would present the GREATEST risk?

A.

Simple mail transfer protocol (SMTP)

B.

Simple object access protocol (SOAP)

C.

Hypertext transfer protocol (HTTP)

D.

File transfer protocol (FTP)

Full Access
Question # 221

While auditing a small organization ' s data classification processes and procedures, an IS auditor noticed that data is often classified at the incorrect level. What is the MOST effective way for the organization to improve this situation?

A.

Use automatic document classification based on content.

B.

Have IT security staff conduct targeted training for data owners.

C.

Publish the data classification policy on the corporate web portal.

D.

Conduct awareness presentations and seminars for information classification policies.

Full Access
Question # 222

An IS auditor has discovered that a software system still in regular use is years out of date and no longer supported. The auditee has stated that it will take six months until the software is running on the current version. Which of the following is the BEST way to reduce the immediate risk associated with using an unsupported version of the software?

A.

Verify all patches have been applied to the software system ' s outdated version.

B.

Close all unused ports on the outdated software system.

C.

Monitor network traffic attempting to reach the outdated software system.

D.

Segregate the outdated software system from the main network.

Full Access
Question # 223

Which of the following would BEST enable an organization to address the security risks associated with a recently implemented bring your own device (BYOD) strategy?

A.

Mobile device tracking program

B.

Mobile device upgrade program

C.

Mobile device testing program

D.

Mobile device awareness program

Full Access
Question # 224

An IS auditor is auditing the operating effectiveness of weekly user access reviews. Of the five weekly reviews sampled, one has not been signed or dated. What is the MAIN reason to note this observation as a finding?

A.

The review may not be accurate.

B.

The review may not contain the appropriate content.

C.

The review may not be in compliance with industry standards.

D.

The review may not have been performed.

Full Access
Question # 225

Which of the following is the MOST important reason to classify a disaster recovery plan (DRP) as confidential?

A.

Ensure compliance with the data classification policy.

B.

Protect the plan from unauthorized alteration.

C.

Comply with business continuity best practice.

D.

Reduce the risk of data leakage that could lead to an attack.

Full Access
Question # 226

When reviewing a business case for a proposed implementation of a third-party system, which of the following should be an IS auditor ' s GREATEST concern?

A.

Lack of ongoing maintenance costs

B.

Lack of training materials

C.

Lack of plan for pilot implementation

D.

Lack of detailed work breakdown structure

Full Access
Question # 227

Which of the following should an IS auditor recommend be done FIRST when an organization is planning to implement an IT compliance program?

A.

Identify staff training needs related to compliance requirements.

B.

Analyze historical compliance-related audit findings.

C.

Research and purchase an industry-recognized IT compliance tool

D.

Identify applicable laws, regulations, and standards.

Full Access
Question # 228

Which of the following should be an IS auditor ' s PRIMARY focus when auditing the implementation of a new IT operations performance monitoring system?

A.

Reviewing whether all changes have been implemented

B.

Validating whether baselines have been established

C.

Confirming whether multi-factor authentication (MFA) is deployed as part of the operational enhancements

D.

Determining whether there is a process for annual review of the maintenance manual

Full Access
Question # 229

Which of the following should an IS auditor consider the MOST significant risk associated with a new health records system that replaces a legacy system?

A.

Staff were not involved in the procurement process, creating user resistance to the new system.

B.

Data is not converted correctly, resulting in inaccurate patient records.

C.

The deployment project experienced significant overruns, exceeding budget projections.

D.

The new system has capacity issues, leading to slow response times for users.

Full Access
Question # 230

Which of the following is an example of shadow IT?

A.

An employee using a cloud based order management tool without approval from IT

B.

An employee using a company provided laptop to access personal banking information

C.

An employee using personal email to communicate with clients without approval from IT

D.

An employee using a company-provided tablet to access social media during work hours

Full Access
Question # 231

Which of the following BEST addresses the availability of an online store?

A.

RAID level 5 storage devices

B.

Online backups

C.

A mirrored site at another location

D.

Clustered architecture

Full Access
Question # 232

Which of the following is the GREATEST concern when applying emergency patches?

A.

A change record may not be properly maintained.

B.

Temporary administrative permissions may be needed to apply patches.

C.

Patch-related risk may not be adequately assessed.

D.

Documented approvals may not be required before applying the emergency patch.

Full Access
Question # 233

An IS auditor is reviewing a bank ' s service level agreement (SLA) with a third-party provider that hosts the bank ' s secondary data center, which of the following findings should be of GREATEST concern to the auditor?

A.

The recovery time objective (RTO) has a longer duration than documented in the disaster recovery plan (ORP).

B.

The SLA has not been reviewed in more than a year.

C.

Backup data is hosted online only.

D.

The recovery point objective (RPO) has a shorter duration than documented in the disaster recovery plan (DRP).

Full Access
Question # 234

Which of the following attack techniques will succeed because of an inherent security weakness in an Internet firewall?

A.

Phishing

B.

Using a dictionary attack of encrypted passwords

C.

Intercepting packets and viewing passwords

D.

Flooding the site with an excessive number of packets

Full Access
Question # 235

Which of the following would the IS auditor MOST likely review to determine whether modifications to the operating system parameters were authorized?

A.

Documentation of exit routines

B.

System initialization logs

C.

Change control log

D.

Security system parameters

Full Access
Question # 236

Which of the following provides the BEST evidence that IT portfolio management is aligned with organizational strategies?

A.

Finance committee minutes that include approval for the annual IT budget

B.

Project sponsor sign-off on all project documents from beginning to end

C.

IT steering committee minutes that include approval for prioritization of IT projects

D.

Project sponsor sign-off on IT project proposals and milestones

Full Access
Question # 237

Which of the following environments is BEST used for copying data and transformation into a compatible data warehouse format?

A.

Testing

B.

Replication

C.

Staging

D.

Development

Full Access
Question # 238

Which of the following should be of GREATEST concern to an IS auditor conducting an audit of an organization that recently experienced a ransomware attack?

A.

Antivirus software was unable to prevent the attack even though it was properly updated

B.

The most recent security patches were not tested prior to implementation

C.

Backups were only performed within the local network

D.

Employees were not trained on cybersecurity policies and procedures

Full Access
Question # 239

An IS auditor is tasked to review an organization ' s plan-do-check-act (PDCA) method for improving IT-related processes and wants to determine the accuracy of defined targets to be achieved. Which of the following steps in the PDCA process should the auditor PRIMARILY focus on in this situation?

A.

Check

B.

Plan

C.

Do

D.

Act

Full Access
Question # 240

In which phase of the internal audit process is contact established with the individuals responsible for the business processes in scope for review?

A.

Planning phase

B.

Execution phase

C.

Follow-up phase

D.

Selection phase

Full Access
Question # 241

Which of the following would BEST assist an IS auditor in understanding the inputs and outputs of a microservice-oriented application?

A.

Data flow diagrams

B.

Network architecture diagrams

C.

Business requirements documentation

D.

Entity-relationship diagrams

Full Access
Question # 242

Which of the following is the BEST source of information for assessing the effectiveness of IT process monitoring?

A.

Real-time audit software

B.

Performance data

C.

Quality assurance (QA) reviews

D.

Participative management techniques

Full Access
Question # 243

During an IS audit of a data center, it was found that programmers are allowed to make emergency fixes to operational programs. Which of the following should be the IS auditor ' s PRIMARY recommendation?

A.

Programmers should be allowed to implement emergency fixes only after obtaining verbal agreement from the application owner.

B.

Emergency program changes should be subject to program migration and testing procedures before they are applied to operational systems.

C.

Bypass user ID procedures should be put in place to ensure that the changes are subject to after-the-event approval and testing.

Full Access
Question # 244

Which of the following tests would provide the BEST assurance that a health care organization is handling patient data appropriately?

A.

Compliance with action plans resulting from recent audits

B.

Compliance with local laws and regulations

C.

Compliance with industry standards and best practice

D.

Compliance with the organization ' s policies and procedures

Full Access
Question # 245

Which of the following should be the GREATEST concern to an IS auditor reviewing an organization ' s method to transport sensitive data between offices?

A.

The method relies exclusively on the use of public key infrastructure (PKI).

B.

The method relies exclusively on the use of digital signatures.

C.

The method relies exclusively on the use of asymmetric encryption algorithms.

D.

The method relies exclusively on the use of 128-bit encryption.

Full Access
Question # 246

An IS auditor is planning a review of an organizations robotic process automation (RPA) technology. Which of the following MUST be included in the audit work plan?

A.

Integration architecture

B.

Change management

C.

Cost-benefit analysis

D.

Employee training content

Full Access
Question # 247

An organization using a cloud provider for its online billing system requires the website to be accessible to customers at all times. What is the BEST way to verify the organization ' s business requirements are met?

A.

Invoke the right-to-audit clause.

B.

Require the vendor to report any outages longer than five minutes

C.

Monitor the service level agreement (SLA) with the vendor.

D.

Agree on periodic performance discussions with the vendor

Full Access
Question # 248

Management has requested a post-implementation review of a newly implemented purchasing package to determine to what extent business requirements are being met. Which of the following is MOST likely to be assessed?

A.

Purchasing guidelines and policies

B.

Implementation methodology

C.

Results of line processing

D.

Test results

Full Access
Question # 249

The purpose of a checksum on an amount field in an electronic data interchange (EDI) communication of financial transactions is to ensure:

A.

nonrepudiation.

B.

authorization,

C.

integrity,

D.

authenticity.

Full Access
Question # 250

Which of the following is the MOST important reason to implement version control for an end-user computing (EUC) application?

A.

To ensure that older versions are availability for reference

B.

To ensure that only the latest approved version of the application is used

C.

To ensure compatibility different versions of the application

D.

To ensure that only authorized users can access the application

Full Access
Question # 251

During a routine internal software licensing review, an IS auditor discovers instances where employees shared license keys to critical pieces of business software. Which of the following would be the auditor ' s BEST course of action?

A.

Recommend the utilization of software licensing monitoring tools

B.

Recommend the purchase of additional software license keys

C.

Validate user need for shared software licenses

D.

Verify whether the licensing agreement allows shared use

Full Access
Question # 252

Which of the following BEST indicates a need to review an organization ' s information security policy?

A.

High number of low-risk findings in the audit report

B.

Increasing exceptions approved by management

C.

Increasing complexity of business transactions

D.

Completion of annual IT risk assessment

Full Access
Question # 253

The PRIMARY benefit of automating application testing is to:

A.

provide test consistency.

B.

provide more flexibility.

C.

replace all manual test processes.

D.

reduce the time to review code.

Full Access
Question # 254

An IS auditor is reviewing an organization ' s system development life cycle (SDLC) Which of the following MUST be included in the review?

A.

Ownership of the system quality management plan

B.

Utilization of standards in the system development processes and procedures

C.

Validation that system development processes adhere to quality standards

D.

Definition of quality attributes to be associated with the system

Full Access
Question # 255

What is the PRIMARY benefit of an audit approach which requires reported findings to be issued together with related action plans, owners, and target dates?

A.

it facilitates easier audit follow-up

B.

it enforces action plan consensus between auditors and auditees

C.

it establishes accountability for the action plans

D.

it helps to ensure factual accuracy of findings

Full Access
Question # 256

An organizations audit charier PRIMARILY:

A.

describes the auditors ' authority to conduct audits.

B.

defines the auditors ' code of conduct.

C.

formally records the annual and quarterly audit plans.

D.

documents the audit process and reporting standards.

Full Access
Question # 257

Which type of control has been established when an organization implements a security information and event management (SIEM) system?

A.

Preventive

B.

Detective

C.

Directive

D.

Corrective

Full Access
Question # 258

An IS auditor decides to review a data inventory list captured directly from a system instead of relying on an interview with the system owner. Which of the following provides the BEST justification for the auditor ' s decision?

A.

Independence of the evidence provider

B.

Qualification of the evidence provider

C.

Reliability of the evidence

D.

Timing of the evidence

Full Access
Question # 259

Which of the following would BEST manage the risk of changes in requirements after the analysis phase of a business application development project?

A.

Expected deliverables meeting project deadlines

B.

Sign-off from the IT team

C.

Ongoing participation by relevant stakeholders

D.

Quality assurance (OA) review

Full Access
Question # 260

When auditing the closing stages of a system development protect which of the following should be the MOST important consideration?

A.

Control requirements

B.

Rollback procedures

C.

Functional requirements documentation

D.

User acceptance lest (UAT) results

Full Access
Question # 261

An organization is implementing a new system that supports a month-end business process. Which of the following implementation strategies would be MOST efficient to decrease business downtime?

A.

Big bang

B.

Phased

C.

Cutover

D.

Parallel

Full Access
Question # 262

Which of the following is MOST important for an IS auditor to determine when reviewing the design and implementation of controls?

A.

Whether there is a proper balance between the magnitude of the risk and the control measures implemented

B.

Whether the implemented controls closely align with domestic and international industry best practices

C.

Whether identified risks are being completely mitigated through the proper application of control mechanisms

D.

Whether adequate resources are available for frequent and stringent control monitoring

Full Access
Question # 263

An IS auditor is reviewing a machine learning model that predicts the likelihood that a user will watch a certain movie. Which of the following would be of GREATEST concern to the auditor?

A.

When the model was tested with data drawn from a different population, the accuracy decreased.

B.

The data set for training the model was obtained from an unreliable source.

C.

An open-source programming language was used to develop the model.

D.

The model was tested with data drawn from the same population as the training data.

Full Access
Question # 264

An IS auditor is assessing the adequacy of management ' s remediation action plan. Which of the following should be the MOST important consideration?

A.

Plan approval by the audit committee

B.

Impacts on future audit work

C.

Criticality of audit findings

D.

Potential cost savings

Full Access
Question # 265

Which of the following roles is PRIMARILY responsible for mitigating the risk of benefits not being realized in an IT project?

A.

Project sponsor

B.

Project manager

C.

Quality assurance (QA) manager

D.

Chief risk officer (CRO)

Full Access
Question # 266

An IS auditor Is renewing the deployment of a new automated system Which of the following findings presents the MOST significant risk?

A.

The new system has resulted m layoffs of key experienced personnel.

B.

Users have not been trained on the new system.

C.

Data from the legacy system is not migrated correctly to the new system.

D.

The new system is not platform agnostic

Full Access
Question # 267

Which of the following is an objective of IT project portfolio management?

A.

Successful implementation of projects

B.

Selection of sound, strategically aligned investment opportunities

C.

Validation of business case benefits

D.

Establishment of tracking mechanisms

Full Access
Question # 268

An IS auditor is reviewing database fields updated in real-time and displayed through other applications in multiple organizational functions. When validating business approval for these various use cases, which of the following sources of information would be the BEST starting point?

A.

Network map from the network administrator

B.

Historical database change log records

C.

List of integrations from the database administrator (DBA)

D.

Business process flow from management

Full Access
Question # 269

An organization that operates an e-commerce website wants to provide continuous service to its customers and is planning to invest in a hot site due to service criticality. Which of the following is the MOST important consideration when making this decision?

A.

Maximum tolerable downtime (MTD)

B.

Recovery time objective (RTO)

C.

Recovery point objective (RPO)

D.

Mean time to repair (MTTR)

Full Access
Question # 270

An organization used robotic process automation (RPA) technology to develop software bots that extract data from various sources for input into a legacy financial application. Which of the following should be of GREATEST concern to an IS auditor when reviewing the software bot job scheduling and production process automation?

A.

Minor overrides were not authorized by the business

B.

Software bots were incapable of learning from training data

C.

Software bots were programmed to record all user interactions, including mouse tracking

D.

Unauthorized modifications were made to the scripts to improve performance

Full Access
Question # 271

Which of the following is the BEST way for an organization to mitigate the risk associated with third-party application performance?

A.

Ensure the third party allocates adequate resources to meet requirements.

B.

Use analytics within the internal audit function

C.

Conduct a capacity planning exercise

D.

Utilize performance monitoring tools to verify service level agreements (SLAs)

Full Access
Question # 272

During an audit of payment services of a branch based in a foreign country, a large global bank ' s audit team identifies an opportunity to use data analytics techniques to identify abnormal payments. Which of the following is the team ' s MOST important course of action?

A.

Consult the legal department to understand the procedure for requesting data from a different jurisdiction.

B.

Conduct a walk through of the analytical strategy with stakeholders of the audited branch to obtain their buy-in.

C.

Request the data from the branch as the team audit charter covers the country where it is based.

D.

Agree on a data extraction and sharing strategy with the IT team of the audited branch.

Full Access
Question # 273

A mission-critical application utilizes a one-node database server. On multiple occasions, the database service has been stopped to perform routine patching, causing application outages. Which of the following should be the IS auditor’s GREATEST concern?

A.

Revenue lost due to application outages

B.

Patching performed by the vendor

C.

A large number of scheduled database changes

D.

The presence of a single point of failure

Full Access
Question # 274

Which of the following is MOST important for an effective control self-assessment (CSA) program?

A.

Determining the scope of the assessment

B.

Performing detailed test procedures

C.

Evaluating changes to the risk environment

D.

Understanding the business process

Full Access
Question # 275

Which of the following should an IS auditor consider FIRST when evaluating firewall rules?

A.

The organization ' s security policy

B.

The number of remote nodes

C.

The firewalls ' default settings

D.

The physical location of the firewalls

Full Access
Question # 276

Which of the following is MOST important to determine during the planning phase of a cloud-based messaging and collaboration platform acquisition?

A.

Role-based access control policies

B.

Types of data that can be uploaded to the platform

C.

Processes for on-boarding and off-boarding users to the platform

D.

Processes for reviewing administrator activity

Full Access
Question # 277

An IS auditor is conducting an IT governance audit and notices many initiatives are managed informally by isolated project managers. Which of the following recommendations would have the GREATEST impact on improving the maturity of the IT team?

A.

Schedule a follow-up audit in the next year to confirm whether IT processes have matured.

B.

Create an interdisciplinary IT steering committee to oversee IT prioritization and spending.

C.

Document and track all IT decisions in a project management tool.

D.

Discontinue all current IT projects until formal approval is obtained and documented.

Full Access
Question # 278

An IS auditor assessing the controls within a newly implemented call center would First

A.

gather information from the customers regarding response times and quality of service.

B.

review the manual and automated controls in the call center.

C.

test the technical infrastructure at the call center.

D.

evaluate the operational risk associated with the call center.

Full Access
Question # 279

Which of the following is the MOST important outcome of an information security program?

A.

Operating system weaknesses are more easily identified.

B.

Emerging security technologies are better understood and accepted.

C.

The cost to mitigate information security risk is reduced.

D.

Organizational awareness of security responsibilities is improved.

Full Access
Question # 280

Which of the following is the BEST indicator for measuring performance of IT help desk function?

A.

Percentage of problems raised from incidents

B.

Mean time to categorize tickets

C.

Number 0t incidents reported

D.

Number of reopened tickets

Full Access
Question # 281

Which of the following is the PRIMARY objective of performing quality assurance (QA) in a system development process?

A.

To ensure that expected benefits have been realized

B.

To ensure the developed system meets business requirements

C.

To ensure the developed system integrates well with another system

D.

To help determine high-level requirements for the new system

Full Access
Question # 282

Which type of testing is used to identify security vulnerabilities in source code in the development environment?

A.

Interactive application security testing (IAST)

B.

Runtime application self-protection (RASP)

C.

Dynamic analysis security testing (DAST)

D.

Static analysis security testing (SAST)

Full Access
Question # 283

An IS auditor concludes that logging and monitoring mechanisms within an organization are ineffective because critical servers are not included within the central log repository. Which of the following audit procedures would have MOST likely identified this exception?

A.

Inspecting a sample of alerts generated from the central log repository

B.

Comparing a list of all servers from the directory server against a list of all servers present in the central log repository

C.

Inspecting a sample of alert settings configured in the central log repository

D.

Comparing all servers included in the current central log repository with the listing used for the prior-year audit

Full Access
Question # 284

Which of the following is the MOST important determining factor when establishing appropriate timeframes for follow-up activities related to audit findings?

A.

Availability of IS audit resources

B.

Remediation dates included in management responses

C.

Peak activity periods for the business

D.

Complexity of business processes identified in the audit

Full Access
Question # 285

Which of the following is the MOST effective control to mitigate against the risk of inappropriate activity by employees?

A.

User activity monitoring

B.

Two-factor authentication

C.

Network segmentation

D.

Access recertification

Full Access
Question # 286

An IS auditor finds that capacity management for a key system is being performed by IT with no input from the business The auditor ' s PRIMARY concern would be:

A.

failure to maximize the use of equipment

B.

unanticipated increase in business s capacity needs.

C.

cost of excessive data center storage capacity

D.

impact to future business project funding.

Full Access
Question # 287

An external IS auditor is reviewing the continuous monitoring system for a large bank and notes several potential issues. Which of the following would present the GREATEST concern regarding the reliability of the monitoring system?

A.

The system results are not reviewed by senior management.

B.

The alert threshold is updated periodically.

C.

The monitoring thresholds are not subject to change management.

D.

The monitoring system was configured by a third party.

Full Access
Question # 288

The MOST important measure of the effectiveness of an organization ' s security program is the:

A.

comparison with critical incidents experienced by competitors.

B.

number of vulnerability alerts escalated to senior management.

C.

number of new vulnerabilities reported.

D.

adverse impact of incidents on critical business activities.

Full Access
Question # 289

Which of the following security measures will reduce the risk of propagation when a cyberattack occurs?

A.

Perimeter firewall

B.

Data loss prevention (DLP) system

C.

Network segmentation

D.

Web application firewall (WAF)

Full Access
Question # 290

Which of the following is the MOST important factor when an organization is developing information security policies and procedures?

A.

Consultation with security staff

B.

Inclusion of mission and objectives

C.

Compliance with relevant regulations

D.

Alignment with an information security framework

Full Access
Question # 291

During an exit meeting, an IS auditor highlights that backup cycles

are being missed due to operator error and that these exceptions

are not being managed. Which of the following is the BEST way to

help management understand the associated risk?

A.

Explain the impact to disaster recovery.

B.

Explain the impact to resource requirements.

C.

Explain the impact to incident management.

D.

Explain the impact to backup scheduling.

Full Access
Question # 292

Which of the following BEST enables an IS auditor to prioritize financial reporting spreadsheets for an end-user computing (EUC) audit?

A.

Understanding the purpose of each spreadsheet

B.

Identifying the spreadsheets with built-in macros

C.

Reviewing spreadsheets based on file size

D.

Ascertaining which spreadsheets are most frequently used

Full Access
Question # 293

Which of the following would provide an IS auditor with the GREATEST assurance that data disposal controls support business strategic objectives?

A.

Media recycling policy

B.

Media sanitization policy

C.

Media labeling policy

D.

Media shredding policy

Full Access
Question # 294

An organization is shifting to a remote workforce In preparation the IT department is performing stress and capacity testing of remote access infrastructure and systems What type of control is being implemented?

A.

Directive

B.

Detective

C.

Preventive

D.

Compensating

Full Access
Question # 295

A bank wants to outsource a system to a cloud provider residing in another country. Which of the following would be the MOST appropriate IS audit recommendation?

A.

Find an alternative provider in the bank ' s home country.

B.

Ensure the provider ' s internal control system meets bank requirements.

C.

Proceed as intended, as the provider has to observe all laws of the clients’ countries.

D.

Ensure the provider has disaster recovery capability.

Full Access
Question # 296

An IS auditor performs a follow-up audit and learns the approach taken by the auditee to fix the findings differs from the agreed-upon approach confirmed during the last audit. Which of the following should be the auditor ' s NEXT course of action?

A.

Evaluate the appropriateness of the remedial action taken.

B.

Conduct a risk analysis incorporating the change.

C.

Report results of the follow-up to the audit committee.

D.

Inform senior management of the change in approach.

Full Access
Question # 297

An IS auditor finds that one employee has unauthorized access to confidential data. The IS auditor ' s BEST recommendation should be to:

A.

reclassify the data to a lower level of confidentiality

B.

require the business owner to conduct regular access reviews.

C.

implement a strong password schema for users.

D.

recommend corrective actions to be taken by the security administrator.

Full Access
Question # 298

A review of IT interface controls finds an organization does not have a process to identify and correct records that do not get transferred to the receiving system Which of the following is the IS auditors BEST recommendation?

A.

Enable automatic encryption decryption and electronic signing of data files

B.

implement software to perform automatic reconciliations of data between systems

C.

Have coders perform manual reconciliation of data between systems

D.

Automate the transfer of data between systems as much as feasible

Full Access
Question # 299

During an IT governance audit, an IS auditor notes that IT policies and procedures are not regularly reviewed and updated. The GREATEST concern to the IS auditor is that policies and procedures might not:

A.

reflect current practices.

B.

include new systems and corresponding process changes.

C.

incorporate changes to relevant laws.

D.

be subject to adequate quality assurance (QA).

Full Access
Question # 300

Which of the following are used in a firewall to protect the entity ' s internal resources?

A.

Remote access servers

B.

Secure Sockets Layers (SSLs)

C.

Internet Protocol (IP) address restrictions

D.

Failover services

Full Access
Question # 301

Which of the following is the BEST control to mitigate the malware risk associated with an instant messaging (IM) system?

A.

Blocking attachments in IM

B.

Blocking external IM traffic

C.

Allowing only corporate IM solutions

D.

Encrypting IM traffic

Full Access
Question # 302

Having knowledge in which of the following areas is MOST relevant for an IS auditor reviewing public key infrastructure (PKI)?

A.

Design and application of key controls in public audit

B.

Security strategy in public cloud Infrastructure as a Service (IaaS)

C.

Modern encoding methods for digital communications

D.

Technology and process life cycle for digital certificates and key pairs

Full Access
Question # 303

Which of the following is the MOST important consideration when implementing a Zero Trust strategy for mobile, wireless, and Internet of Things (IoT) devices?

A.

Ensuring the latest firmware updates are applied regularly to all devices

B.

Validating the identity of all devices and users before granting access to resources

C.

Focusing on user training and awareness to prevent phishing attacks

D.

Implementing strong encryption protocols for data in transit and at rest

Full Access
Question # 304

Which of the following BEST enables a governing body to monitor IT performance based on metrics?

A.

Metrics defined at the operational level are aligned with service delivery objectives (SDOs).

B.

IT asset metrics are defined based on manufacturers’ recommendations.

C.

Metrics are derived from quantitatively measurable data generated automatically by systems.

D.

Business goals have been properly aligned with IT performance metrics.

Full Access
Question # 305

Using swipe cards to limit employee access to restricted areas requires implementing which additional control?

A.

Physical sign-in of all employees for access to restricted areas

B.

Implementation of additional PIN pads

C.

Periodic review of access profiles by management

D.

Installation of closed-circuit television (CCTV)

Full Access
Question # 306

An IS auditor is reviewing an organization ' s primary router access control list. Which of the following should result in a finding?

A.

There are conflicting permit and deny rules for the IT group.

B.

The network security group can change network address translation (NAT).

C.

Individual permissions are overriding group permissions.

D.

There is only one rule per group with access privileges.

Full Access
Question # 307

Which of the following is the GREATEST advantage of vulnerability scanning over penetration testing?

A.

The testing produces a lower number of false positive results

B.

Network bandwidth is utilized more efficiently

C.

Custom-developed applications can be tested more accurately

D.

The testing process can be automated to cover large groups of assets

Full Access
Question # 308

Which of the following is a PRIMARY benefit of using risk assessments to determine areas to be included in an audit plan?

A.

Timely audit execution

B.

Effective allocation of audit resources

C.

Reduced travel and expense costs

D.

Effective risk mitigation

Full Access
Question # 309

Which of the following BEST supports the effectiveness of a compliance program?

A.

Implementing an awareness plan regarding compliance regulation requirements

B.

Implementing a governance, risk, and compliance (GRC) tool to track compliance to regulations

C.

Assessing and tracking all compliance audit findings

D.

Monitoring which compliance regulations apply to the organization

Full Access
Question # 310

Which of the following should be of GREATEST concern for an IS auditor reviewing an organization ' s disaster recovery plan (DRP)?

A.

The DRP has not been formally approved by senior management.

B.

The DRP has not been distributed to end users.

C.

The DRP has not been updated since an IT infrastructure upgrade.

D.

The DRP contains recovery procedures for critical servers only.

Full Access
Question # 311

Which of the following would be the GREATEST concern for an IS auditor conducting a pre-implementation review of a data loss prevention (DLP > tool?

A.

The tool is implemented in monitor mode rather than block mode.

B.

Crawlers are used to discover sensitive data.

C.

Deep packet inspection opens data packets in transit.

D.

Encryption keys are not centrally managed.

Full Access
Question # 312

An IS auditor is reviewing an organizations release management practices and observes inconsistent and inaccurate estimation of the size and complexity of business application development projects. Which of the following should the auditor recommend to address this issue?

A.

Critical path methodology

B.

Agile development approach

C.

Function point analysis

D.

Rapid application development

Full Access
Question # 313

An IS auditor is reviewing how password resets are performed for users working remotely. Which type of documentation should be requested to understand the detailed steps required for this activity?

A.

Standards

B.

Guidelines

C.

Policies

D.

Procedures

Full Access
Question # 314

When testing the adequacy of tape backup procedures, which step BEST verifies that regularly scheduled Backups are timely and run to completion?

A.

Observing the execution of a daily backup run

B.

Evaluating the backup policies and procedures

C.

Interviewing key personnel evolved In the backup process

D.

Reviewing a sample of system-generated backup logs

Full Access
Question # 315

A steering committee established to oversee an organization ' s digital transformation program is MOSTlikely to be involved with which of the following activities?

A.

Preparing project status reports

B.

Designing interface controls

C.

Reviewing escalated project issues

D.

Documenting requirements

Full Access
Question # 316

Which of the following should be the PRIMARY consideration when validating a data analytic algorithm that has never been used before?

A.

Enhancing the design of data visualization

B.

Increasing speed and efficiency of audit procedures

C.

Confirming completeness and accuracy

D.

Decreasing the time for data analytics execution

Full Access
Question # 317

Which of the following would BEST prevent an arbitrary application of a patch?

A.

Database access control

B.

Established maintenance windows

C.

Network based access controls

D.

Change management

Full Access
Question # 318

Which of the following BEST enables an organization to standardize its IT infrastructure to align with business goals?

A.

Enterprise architecture (EA)

B.

Operational technologies

C.

Data architecture

D.

Robotic process automation (RPA)

Full Access
Question # 319

An IS auditor has been tasked with analyzing an organization ' s capital expenditures against its repair and maintenance costs. Which of the following is the BEST reason to use a data analytics tool for this purpose?

A.

It reduces the error rate.

B.

It improves the reliability of the data.

C.

It enables the auditor to work with 100% of the transactions.

D.

It reduces the sample size required to perform the audit.

Full Access
Question # 320

Which of the following is the BEST indication of effective IT investment management?

A.

IT investments are implemented and monitored following a system development life cycle (SDLC)

B.

IT investments are mapped to specific business objectives

C.

Key performance indicators (KPIs) are defined for each business requiring IT Investment

D.

The IT Investment budget is significantly below industry benchmarks

Full Access
Question # 321

Which of the following should be of GREATEST concern to an IS auditor reviewing system interfaces used to transfer publicly available information?

A.

A system interface tracking program is not enabled.

B.

The data has not been encrypted.

C.

Data is intercepted while in transit between systems.

D.

The data from the originating system differs from the downloaded data.

Full Access
Question # 322

When auditing the security architecture of an online application, an IS auditor should FIRST review the:

A.

firewall standards.

B.

configuration of the firewall

C.

firmware version of the firewall

D.

location of the firewall within the network

Full Access
Question # 323

An IS auditor discovers that backups of critical systems are not being performed in accordance with the recovery point objective (RPO) established in the business continuity plan (BCP). What should the auditor do NEXT?

A.

Request an immediate backup be performed.

B.

Expand the audit scope.

C.

Identify the root cause.

D.

Include the observation in the report.

Full Access
Question # 324

An organization ' s enterprise architecture (EA) department decides to change a legacy system ' s components while maintaining its original functionality. Which of the following is MOST important for an IS auditor to understand when reviewing this decision?

A.

The current business capabilities delivered by the legacy system

B.

The proposed network topology to be used by the redesigned system

C.

The data flows between the components to be used by the redesigned system

D.

The database entity relationships within the legacy system

Full Access
Question # 325

To mitigate the risk of exposing data through application programming interface (API) queries. which of the following design considerations is MOST important?

A.

Data retention

B.

Data minimization

C.

Data quality

D.

Data integrity

Full Access
Question # 326

An organization has moved all of its infrastructure to the cloud. Which of the following would be an IS auditor’s GREATEST concern related to the organization’s ability to continue operations in case of a disaster?

A.

There is no evidence that disaster recovery plan (DRP) testing was performed after the migration.

B.

Only business-critical servers were configured with redundancy services on the cloud service provider.

C.

The previous infrastructure was not retained to support business operations in case of a disaster.

D.

The step-by-step recovery process was not updated in the disaster recovery plan (DRP) after the migration.

Full Access
Question # 327

Which of the following is the PRIMARY benefit of introducing business impact analyses (BIAs) to business resiliency strategies?

A.

It identifies legal obligations that may be incurred as a result of business service disruptions

B.

It provides updates on the risk level of disasters that may occur

C.

It delineates employee responsibilities that the organization must fulfill in a crisis

D.

It helps prioritize the restoration of systems and applications

Full Access
Question # 328

Which of the following is the MOST important reason for an IS auditor to examine the results of a post-incident review performed after a security incident?

A.

To evaluate the effectiveness of continuous improvement efforts

B.

To compare incident response metrics with industry benchmarks

C.

To re-analyze the incident to identify any hidden backdoors planted by the attacker

D.

To evaluate the effectiveness of the network firewall against future security breaches

Full Access
Question # 329

An IS auditor wants to verify alignment of the organization ' s business continuity plan (BCP) with the business strategy. Which of the following would be MOST helpful to review?

A.

Disaster recovery plan (DRP) testing results

B.

Business impact analysis (BIA)

C.

Corporate risk management policy

D.

Key performance indicators (KPIs)

Full Access
Question # 330

Which of the following is the MOST important advantage of participating in beta testing of software products?

A.

It increases an organization ' s ability to retain staff who prefer to work with new technology.

B.

It improves vendor support and training.

C.

It enhances security and confidentiality.

D.

It enables an organization to gain familiarity with new products and their functionality.

Full Access
Question # 331

Which of the following occurs during the issues management process for a system development project?

A.

Contingency planning

B.

Configuration management

C.

Help desk management

D.

Impact assessment

Full Access
Question # 332

When determining the quality of evidence collected during an audit, it is MOST important to ensure the evidence is:

A.

Valid, complete, and accurate.

B.

Timely, reliable, and reasonable.

C.

Sufficient and comes from the source of the information.

D.

Persuasive and applicable.

Full Access
Question # 333

Which of the following is the BEST way to mitigate the risk associated with unintentional modifications of complex calculations in end-user computing (EUC)?

A.

Have an independent party review the source calculations

B.

Execute copies of EUC programs out of a secure library

C.

implement complex password controls

D.

Verify EUC results through manual calculations

Full Access
Question # 334

An organization has recently become aware of a pervasive chip-level security vulnerability that affects all of its processors. Which of the following is the BEST way to prevent this vulnerability from being exploited?

A.

Implement security awareness training.

B.

Install vendor patches

C.

Review hardware vendor contracts.

D.

Review security log incidents.

Full Access
Question # 335

During a project audit, an IS auditor notes that project reporting does not accurately reflect current progress. Which of the following is the GREATEST resulting impact?

A.

The project manager will have to be replaced.

B.

The project reporting to the board of directors will be incomplete.

C.

The project steering committee cannot provide effective governance.

D.

The project will not withstand a quality assurance (QA) review.

Full Access
Question # 336

Which of the following technologies BEST assists in protection of digital evidence as part of forensic investigation acquisition?

A.

Hardware-based media write blocker

B.

Data encryption

C.

Differential backups

D.

Source media sanitization

Full Access
Question # 337

An IS auditor is preparing for a review of controls associated with a manufacturing plant ' s implementation of industrial Internet of Things (loT) infrastructure Which of the following vulnerabilities would present the GREATEST security risk to the organization?

A.

Insufficient physical security around the lo I devices for theft prevention

B.

Use of open-source software components within the loT devices

C.

Constraints in loT device firmware storage space for code upgrades

D.

loT devices that are not using wireless network connectivity

Full Access
Question # 338

Which of the following poses the GREATEST risk to an organization when employees use public social networking sites?

A.

Cross-site scripting (XSS)

B.

Copyright violations

C.

Social engineering

D.

Adverse posts about the organization

Full Access
Question # 339

Which of the following is the BEST control to minimize the risk of unauthorized access to lost company-owned mobile devices?

A.

Password/PIN protection

B.

Device tracking software

C.

Device encryption

D.

Periodic backup

Full Access
Question # 340

Which of the following controls BEST provides confidentiality and nonrepudiation for an online business looking for digital payment data security?

A.

Data Encryption Standard (DES)

B.

Advanced Encryption Standard (AES)

C.

Public Key Infrastructure (PKI)

D.

Virtual Private Network (VPN)

Full Access
Question # 341

A CFO has requested an audit of IT capacity management due to a series of finance system slowdowns during month-end reporting. What would be MOST important to consider before including this audit in the program?

A.

Whether system delays result in more frequent use of manual processing

B.

Whether the system ' s performance poses a significant risk to the organization

C.

Whether stakeholders are committed to assisting with the audit

D.

Whether internal auditors have the required skills to perform the audit

Full Access
Question # 342

An organization ' s senior management thinks current security controls may be excessive and requests an IS auditor ' s advice on how to assess the adequacy of current measures. What is the auditor ' s BEST recommendation to management?

A.

Perform correlation analysis between incidents and investments.

B.

Downgrade security controls on low-risk systems.

C.

Introduce automated security monitoring tools.

D.

Re-evaluate the organization ' s risk and control framework.

Full Access
Question # 343

Which of the following types of environmental equipment will MOST likely be deployed below the floor tiles of a data center?

A.

Temperature sensors

B.

Humidity sensors

C.

Water sensors

D.

Air pressure sensors

Full Access
Question # 344

Which of the following is the MOST effective control over visitor access to highly secured areas?

A.

Visitors are required to be escorted by authorized personnel.

B.

Visitors are required to use biometric authentication.

C.

Visitors are monitored online by security cameras

D.

Visitors are required to enter through dead-man doors.

Full Access
Question # 345

A KEY benefit of integrated auditing is that it:

A.

Facilitates the business in reviewing its control environment.

B.

Enables continuous auditing and monitoring.

C.

Improves the review of audit work by team leaders.

D.

Combines skill sets from operational, functional, and IS auditors.

Full Access
Question # 346

Which of the following is a social engineering attack method?

A.

An unauthorized person attempts to gam access to secure premises by following an authonzed person through a secure door.

B.

An employee is induced to reveal confidential IP addresses and passwords by answering questions over the phone.

C.

A hacker walks around an office building using scanning tools to search for a wireless network to gain access.

D.

An intruder eavesdrops and collects sensitive information flowing through the network and sells it to third parties.

Full Access
Question # 347

Which of the following is a PRIMARY responsibility of a quality assurance (QA) team?

A.

Creating test data to facilitate the user acceptance testing (IJAT) process

B.

Managing employee onboarding processes and background checks

C.

Advising the steering committee on quality management issues and remediation efforts

D.

Implementing procedures to facilitate adoption of quality management best practices

Full Access
Question # 348

When an IS audit reveals that a firewall was unable to recognize a number of attack attempts, the auditor ' s BEST recommendation is to place an intrusion detection system (IDS) between the firewall and:

A.

the Internet.

B.

the demilitarized zone (DMZ).

C.

the organization ' s web server.

D.

the organization ' s network.

Full Access
Question # 349

What should an IS auditor evaluate FIRST when reviewing an organization ' s response to new privacy legislation?

A.

Implementation plan for restricting the collection of personal information

B.

Privacy legislation in other countries that may contain similar requirements

C.

Operational plan for achieving compliance with the legislation

D.

Analysis of systems that contain privacy components

Full Access
Question # 350

Which of the following should be an IS auditor ' s GREATEST concern when reviewing an organization ' s security controls for policy compliance?

A.

Security policies are not applicable across all business units

B.

End users are not required to acknowledge security policy training

C.

The security policy has not been reviewed within the past year

D.

Security policy documents are available on a public domain website

Full Access
Question # 351

Which of the following is MOST important for an IS auditor to do during an exit meeting with an auditee?

A.

Ensure that the facts presented in the report are correct

B.

Communicate the recommendations lo senior management

C.

Specify implementation dates for the recommendations.

D.

Request input in determining corrective action.

Full Access
Question # 352

Which type of attack poses the GREATEST risk to an organization ' s most sensitive data?

A.

Password attack

B.

Eavesdropping attack

C.

Insider attack

D.

Spear phishing attack

Full Access
Question # 353

When planning a review of IT governance, an IS auditor is MOST likely to:

A.

assess whether business process owner responsibilities are consistent.

B.

obtain information about the control framework adopted by management.

C.

examine audit committee minutes for IT-related controls.

D.

define key performance indicators (KPIs).

Full Access
Question # 354

Which of the following is the GREATEST security risk associated with data migration from a legacy human resources (HR) system to a cloud-based system?

A.

Data from the source and target system may be intercepted.

B.

Data from the source and target system may have different data formats.

C.

Records past their retention period may not be migrated to the new system.

D.

System performance may be impacted by the migration

Full Access
Question # 355

Which of the following is an example of a preventive control for physical access?

A.

Keeping log entries for all visitors to the building

B.

Implementing a fingerprint-based access control system for the building

C.

Installing closed-circuit television (CCTV) cameras for all ingress and egress points

D.

Implementing a centralized logging server to record instances of staff logging into workstations

Full Access
Question # 356

Following the sale of a business division, employees will be transferred to a new organization, but they will retain access to IT equipment from the previous employer. An IS auditor has recommended that both organizations agree to and document an acceptable use policy for the equipment. What type of control has been recommended?

A.

Detective control

B.

Preventive control

C.

Directive control

D.

Corrective control

Full Access
Question # 357

Which of the following is the BEST reason for an IS auditor to emphasize to management the importance of using an IT governance framework?

A.

Frameworks enable IT benchmarks against competitors

B.

Frameworks can be tailored and optimized for different organizations

C.

Frameworks help facilitate control self-assessments (CSAs)

D.

Frameworks help organizations understand and manage IT risk

Full Access
Question # 358

Which of the following is MOST useful when planning to audit an organization ' s compliance with cybersecurity regulations in foreign countries?

A.

Prioritize the audit to focus on the country presenting the greatest amount of operational risk.

B.

Follow the cybersecurity regulations of the country with the most stringent requirements.

C.

Develop a template that standardizes the reporting of findings from each country ' s audit team

D.

Map the different regulatory requirements to the organization ' s IT governance framework

Full Access
Question # 359

An organization has assigned two new IS auditors to audit a new system implementation. One of the auditors has an IT-related degree, and one has a business degree. Which of the following is MOST important to meet the IS audit standard for proficiency?

A.

Team member assignments must be based on individual competencies

B.

Technical co-sourcing must be used to help the new staff

C.

The standard is met as long as one member has a globally recognized audit certification.

D.

The standard is met as long as a supervisor reviews the new auditors ' work

Full Access
Question # 360

Which of the following criteria is MOST important for the successful delivery of benefits from an IT project?

A.

Assessing the impact of changes to individuals and business units within the organization

B.

Involving key stakeholders during the development and execution phases of the project

C.

Ensuring that IT project managers have sign-off authority on the business case

D.

Quantifying the size of the software development effort required by the project

Full Access
Question # 361

Which of the following is MOST important to consider when assessing the scope of privacy concerns for an IT project?

A.

Data ownership

B.

Applicable laws and regulations

C.

Business requirements and data flows

D.

End-user access rights

Full Access
Question # 362

Which of the following BEST facilitates the successful implementation of IT performance monitoring?

A.

Determining goals for IT resources and processes

B.

Identifying tools to automate performance measurement

C.

Establishing templates for periodic reporting to management

D.

Adopting global standards and measurement norms

Full Access
Question # 363

Which of the following provides the GREATEST assurance that an organization has effective controls preventing connection of unauthorized Internet of Things (IoT) devices to the corporate network?

A.

Reviewing authenticated network vulnerability scan results

B.

Assessing as-implemented IoT device configurations

C.

Assessing network access control (NAC) configurations

D.

Reviewing IT policies covering IoT authorizations

Full Access
Question # 364

Which of the following is the MOST important consideration when determining how frequently to review a data protection policy?

A.

Industry best practices

B.

Business objectives

C.

Local laws and regulations

D.

Known international standards

Full Access
Question # 365

During a follow-up audit, an IS auditor finds that some critical recommendations have the IS auditor ' s BEST course of action?

A.

Require the auditee to address the recommendations in full.

B.

Adjust the annual risk assessment accordingly.

C.

Evaluate senior management ' s acceptance of the risk.

D.

Update the audit program based on management ' s acceptance of risk.

Full Access
Question # 366

When reviewing a project to replace multiple manual data entry systems with an artificial intelligence (Al) system, the IS auditor should be MOST concerned with the impact Al will have on

A.

employee retention

B.

enterprise architecture (EA)

C.

future task updates

D.

task capacity output

Full Access
Question # 367

Which of the following methods would MOST effectively provide positive authentication for physical access?

A.

Proximity card

B.

Retina scan

C.

Numeric keypads and surveillance camera

D.

A smart card and a security guard

Full Access
Question # 368

An organization has both an IT strategy committee and an IT steering committee. When reviewing the minutes of the IT steering committee, an IS auditor would expect to find that the

committee:

A.

assessed the contribution of IT to the business.

B.

acquired and assigned appropriate resources for projects.

C.

compared the risk and return of IT investments.

D.

reviewed the achievement of the strategic IT objective.

Full Access
Question # 369

During the walk-through procedures for an upcoming audit, an IS auditor notes that the key application in scope is part of a Software as a Service (SaaS)

agreement. What should the auditor do NEXT?

A.

Verify whether IT management monitors the effectiveness of the environment.

B.

Verify whether a right-to-audit clause exists.

C.

Verify whether a third-party security attestation exists.

D.

Verify whether service level agreements (SLAs) are defined and monitored.

Full Access
Question # 370

Which of the following backup schemes is the BEST option when storage media is limited?

A.

Real-time backup

B.

Virtual backup

C.

Differential backup

D.

Full backup

Full Access
Question # 371

Which of the following is MOST important for an IS auditor to assess during a post-implementation review of a newly modified IT application developed in-house?

A.

Sufficiency of implemented controls

B.

Resource management plan

C.

Updates required for end-user manuals

D.

Rollback plans for changes

Full Access
Question # 372

Aligning IT strategy with business strategy PRIMARILY helps an organization to:

A.

optimize investments in IT.

B.

create risk awareness across business units.

C.

increase involvement of senior management in IT.

D.

monitor the effectiveness of IT.

Full Access
Question # 373

Which of the following is MOST helpful to an IS auditor reviewing the alignment of planned IT budget with the organization ' s goals and strategic objectives?

A.

Enterprise architecture (EA)

B.

Business impact analysis (BIA)

C.

Risk assessment report

D.

Audit recommendations

Full Access
Question # 374

Which of the following is the BEST reason to implement a data retention policy?

A.

To establish a recovery point objective (RPO) for disaster recovery procedures

B.

To limit the liability associated with storing and protecting information

C.

To document business objectives for processing data within the organization

D.

To assign responsibility and ownership for data protection outside IT

Full Access
Question # 375

Which type of control is being implemented when a biometric access device is installed at the entrance to a facility?

A.

Preventive

B.

Deterrent

C.

Corrective

D.

Detective

Full Access
Question # 376

During a follow-up audit, an IS auditor finds that senior management has implemented a different remediation action plan than what was previously agreed upon. Which of the following is the auditor ' s BEST course of action?

A.

Report the deviation by the control owner in the audit report.

B.

Evaluate the implemented control to ensure it mitigates the risk to an acceptable level.

C.

Cancel the follow-up audit and reschedule for the next audit period.

D.

Request justification from management for not implementing the recommended control.

Full Access
Question # 377

Which of the following is the BEST way to identify key areas for a risk-based audit plan?

A.

Review peer benchmarking results.

B.

Review open issues from recent audit reports.

C.

Interview relevant stakeholders in the business.

D.

Conduct a risk survey with the CIO.

Full Access
Question # 378

Which of the following groups is PRIMARILY accountable for establishing a culture that facilitates an effective and efficient internal control system?

A.

HR

B.

Senior management

C.

Line management

D.

Internal audit

Full Access
Question # 379

Which of the following MUST be performed by senior audit leadership prior to starting an IS audit project?

A.

Signoff on the audit scope.

B.

Attend planning walk-throughs.

C.

Review audit planning documents.

D.

Meet with auditee leadership.

Full Access
Question # 380

Which of the following BEST indicates that an incident management process is effective?

A.

Decreased number of calls to the help desk

B.

Decreased time for incident resolution

C.

Increased number of incidents reviewed by IT management

D.

Increased number of reported critical incidents

Full Access
Question # 381

A startup organization wants to develop a data loss prevention (DLP) program. The FIRST step should be to implement:

A.

Security awareness training

B.

Data encryption

C.

Data classification

D.

Access controls

Full Access
Question # 382

Which of the following is the PRIMARY reason to follow a configuration management process to maintain application?

A.

To optimize system resources

B.

To follow system hardening standards

C.

To optimize asset management workflows

D.

To ensure proper change control

Full Access
Question # 383

Which of the following is the MOST effective way to ensure adequate system resources are available for high-priority activities?

A.

System virtualization

B.

Job scheduling

C.

Zero Trust

D.

Code optimization

Full Access
Question # 384

When reviewing a data classification scheme, it is MOST important for an IS auditor to determine if.

A.

each information asset is to a assigned to a different classification.

B.

the security criteria are clearly documented for each classification

C.

Senior IT managers are identified as information owner.

D.

the information owner is required to approve access to the asset

Full Access
Question # 385

Which of the following is the BEST way for management to ensure the effectiveness of the cybersecurity incident response process?

A.

Periodic reporting of cybersecurity incidents to key stakeholders

B.

Periodic update of incident response process documentation

C.

Periodic cybersecurity training for staff involved in incident response

D.

Periodic tabletop exercises involving key stakeholders

Full Access
Question # 386

An IS auditor discovers a box of hard drives in a secured location that are overdue for physical destruction. The vendor responsible for this task was never made aware of these hard drives.

Which of the following is the BEST course of action to address this issue?

A.

Examine the workflow to identify gaps in asset-handling responsibilities.

B.

Escalate the finding to the asset owner for remediation.

C.

Recommend the drives be sent to the vendor for destruction.

D.

Evaluate the corporate asset-handling policy for potential gaps.

Full Access
Question # 387

Which of the following presents the GREATEST risk of data leakage in the cloud environment?

A.

Lack of data retention policy

B.

Multi-tenancy within the same database

C.

Lack of role-based access

D.

Expiration of security certificate

Full Access
Question # 388

An IS auditor has been tasked to review the processes that prevent fraud within a business expense claim system. Which of the following stakeholders is MOST important to involve in this review?

A.

Information security manager

B.

Quality assurance (QA) manager

C.

Business department executive

D.

Business process owner

Full Access
Question # 389

Which of the following is BEST used for detailed testing of a business application ' s data and configuration files?

A.

Version control software

B.

Audit hooks

C.

Utility software

D.

Audit analytics tool

Full Access
Question # 390

After areas have been appropriately scoped, what is the IS auditor ' s NEXT step in the selection for sampling?

A.

Define the population for sampling.

B.

Determine the sampling method.

C.

Calculate the sample size.

D.

Pull the sample.

Full Access
Question # 391

Following a merger, a review of an international organization determines the IT steering committee ' s decisions do not extend to regional offices as required in the consolidated IT operating model. Which of the following is the IS auditor ' s BEST recommendation?

A.

Create regional centers of excellence.

B.

Engage an IT governance consultant.

C.

Create regional IT steering committees.

D.

Update the IT steering committee ' s formal charter.

Full Access
Question # 392

An IS auditor has been asked to advise on measures to improve IT governance within the organization. Which at the following is the BEST recommendation?

A.

Implement key performance indicators (KPIs)

B.

Implement annual third-party audits.

C.

Benchmark organizational performance against industry peers.

D.

Require executive management to draft IT strategy

Full Access
Question # 393

Which of the following should be of GREATEST concern to an IS auditor reviewing an organization ' s mobile device policies and controls in its corporate environment?

A.

The mobile authentication policy requires biometrics.

B.

The virtual private network (VPN) policy is not enabled for the internal corporate network.

C.

Not all active devices are enrolled in mobile device management (MDM).

D.

Remote wipe and lock features are only available with access to the internet.

Full Access
Question # 394

Which of the following types of firewalls provide the GREATEST degree of control against hacker intrusion?

A.

Circuit gateway

B.

Application level gateway

C.

Packet filtering router

D.

Screening router

Full Access
Question # 395

An IS auditor has been asked to assess the security of a recently migrated database system that contains personal and financial data for a bank ' s customers. Which of the following controls is MOST important for the auditor to confirm is in place?

A.

The default configurations have been changed.

B.

All tables in the database are normalized.

C.

The service port used by the database server has been changed.

D.

The default administration account is used after changing the account password.

Full Access
Question # 396

Which of the following should be the PRIMARY consideration when incorporating user training and awareness into a data loss prevention (DLP) strategy?

A.

Avoiding financial penalties and reputational risk

B.

Ensuring data availability

C.

Promoting secure data handling practices

D.

Adhering to data governance policies

Full Access
Question # 397

Which of the following represents the GREATEST risk to virtualized environments?

A.

Virtual servers may not have the latest security updates.

B.

Servers may only be accessed remotely.

C.

Hypervisors may be a single point of failure.

D.

Account reviews may not be performed for guest operating systems.

Full Access
Question # 398

To ensure confidentiality through the use of asymmetric encryption, a message is encrypted with which of the following?

A.

Recipient ' s public key

B.

Sender ' s private key

C.

Sender ' s public key

D.

Recipient ' s private key

Full Access
Question # 399

Users are complaining that a newly released enterprise resource planning (ERP) system is functioning too slowly. Which of the following tests during the quality assurance (QA) phase would have identified this concern?

A.

Stress

B.

Regression

C.

Interface

D.

Integration

Full Access
Question # 400

Which of the following BEST describes the role of a document owner when implementing a data classification policy in an organization?

A.

Classifies documents to correctly reflect the level of sensitivity of information they contain

B.

Defines the conditions under which documents containing sensitive information may be transmitted

C.

Classifies documents in accordance with industry standards and best practices

D.

Ensures documents are handled in accordance With the sensitivity of information they contain

Full Access
Question # 401

Which of the following is the BEST way to prevent social engineering incidents?

A.

Maintain an onboarding and annual security awareness program.

B.

Ensure user workstations are running the most recent version of antivirus software.

C.

Include security responsibilities in job descriptions and require signed acknowledgment.

D.

Enforce strict email security gateway controls

Full Access
Question # 402

Which of the following would provide the MOST important input during the planning phase for an audit on the implementation of a bring your own device (BYOD) program?

A.

Findings from prior audits

B.

Results of a risk assessment

C.

An inventory of personal devices to be connected to the corporate network

D.

Policies including BYOD acceptable user statements

Full Access
Question # 403

A post-implementation audit has been completed for the deployment of a sophisticated job scheduling tool Which of the following observations would be of GREATEST concern?

A.

The IT learn customized tool settings without seeking approval from the provider.

B.

The overall project took longer to complete than planned.

C.

The data encryption setting is not enabled in the scheduling tool.

D.

The IT team accesses the scheduler admin panel via a generic account.

Full Access
Question # 404

Which of the following is MOST important for an IS auditor to confirm when reviewing an organization ' s plans to implement robotic process automation (RPA > to automate routine business tasks?

A.

The end-to-end process is understood and documented.

B.

Roles and responsibilities are defined for the business processes in scope.

C.

A benchmarking exercise of industry peers who use RPA has been completed.

D.

A request for proposal (RFP) has been issued to qualified vendors.

Full Access
Question # 405

An IS auditor is reviewing an industrial control system (ICS) that uses older unsupported technology in the scope of an upcoming audit. What should the auditor consider the MOST significant concern?

A.

Attack vectors are evolving for industrial control systems.

B.

There is a greater risk of system exploitation.

C.

Disaster recovery plans (DRPs) are not in place.

D.

Technical specifications are not documented.

Full Access
Question # 406

Which of the following presents the GREATEST challenge to the alignment of business and IT?

A.

Lack of chief information officer (CIO) involvement in board meetings

B.

Insufficient IT budget to execute new business projects

C.

Lack of information security involvement in business strategy development

D.

An IT steering committee chaired by the chief information officer (CIO)

Full Access
Question # 407

Which of the following is the GREATEST risk of project dashboards being set without sufficiently defined criteria?

A.

Adverse findings from internal and external auditors

B.

Lack of project portfolio status oversight

C.

Lack of alignment of project status reports

D.

Inadequate decision-making and prioritization

Full Access
Question # 408

Which of the following controls is BEST implemented through system configuration?

Network user accounts for temporary workers expire after 90 days.

Application user access is reviewed every 180 days for appropriateness.

Financial data in key reports is traced to source systems for completeness and accuracy.

A.

Computer operations personnel initiate batch processing jobs daily.

Full Access
Question # 409

An IS auditor reviewing the threat assessment tor a data center would be MOST concerned if:

A.

some of the identified throats are unlikely to occur.

B.

all identified throats relate to external entities.

C.

the exercise was completed by local management.

D.

neighboring organizations operations have been included.

Full Access
Question # 410

Stress testing should ideally be carried out under a:

A.

test environment with production workloads.

B.

test environment with test data.

C.

production environment with production workloads.

D.

production environment with test data.

Full Access
Question # 411

Which of the following should be the GREATEST concern for an IS auditor assessing an organization ' s disaster recovery plan (DRP)?

A.

The DRP was developed by the IT department.

B.

The DRP has not been tested during the past three years.

C.

The DRP has not been updated for two years.

D.

The DRP does not include the recovery the time objective (RTO) for a key system.

Full Access
Question # 412

A contract for outsourcing IS functions should always include:

A.

Full details of security procedures to be observed by the contractor.

B.

A provision for an independent audit of the contractor’s operations.

C.

The names and roles of staff to be employed in the operation.

D.

Data transfer protocols.

Full Access
Question # 413

Which of the following analytical methods would be MOST useful when trying to identify groups with similar behavior or characteristics in a large population?

A.

Deviation detection

B.

Cluster sampling

C.

Random sampling

D.

Classification

Full Access
Question # 414

Which of the following is the MOST important regulatory consideration for an organization determining whether to use its customer data to train AI algorithms?

A.

Documentation of AI algorithm accuracy during the training process

B.

Ethical and optimal utilization of data computing resources

C.

Collection of data and obtaining data subject consent

D.

Continuous monitoring of AI algorithm performance

Full Access
Question # 415

An IS auditor is assigned to review the IS department s quality procedures. Upon contacting the IS manager, the auditor finds that there is an informal unwritten set of standards Which of the following should be the auditor ' s NEXT action1?

A.

Make recommendations to IS management as to appropriate quality standards

B.

Postpone the audit until IS management implements written standards

C.

Document and lest compliance with the informal standards

D.

Finalize the audit and report the finding

Full Access
Question # 416

Which of the following is the BEST security control to validate the integrity of data communicated between production databases and a big data analytics

system?

A.

Hashing in-scope data sets

B.

Encrypting in-scope data sets

C.

Running and comparing the count function within the in-scope data sets

D.

Hosting a digital certificate for in-scope data sets

Full Access
Question # 417

An audit has identified that business units have purchased cloud-based applications without IPs support. What is the GREATEST risk associated with this situation?

A.

The applications are not included in business continuity plans (BCFs)

B.

The applications may not reasonably protect data.

C.

The application purchases did not follow procurement policy.

D.

The applications could be modified without advanced notice.

Full Access
Question # 418

While executing follow-up activities, an IS auditor is concerned that management has implemented corrective actions that are different from those originally discussed and agreed with the audit function. In order to resolve the situation, the IS auditor ' s BEST course of action would be to:

A.

re-prioritize the original issue as high risk and escalate to senior management.

B.

schedule a follow-up audit in the next audit cycle.

C.

postpone follow-up activities and escalate the alternative controls to senior audit management.

D.

determine whether the alternative controls sufficiently mitigate the risk.

Full Access
Question # 419

Which of the following is the BEST method to safeguard data on an organization ' s laptop computers?

A.

Disabled USB ports

B.

Full disk encryption

C.

Biometric access control

D.

Two-factor authentication

Full Access
Question # 420

An organization saves confidential information in a file with password protection and the file is placed in a shared folder. An attacker has stolen this information by obtaining the password through social engineering. Implementing which of the following would BEST enable the organization to prevent this type of incident in the future?

A.

Multi-factor authentication (MFA)

B.

Security awareness programs for employees

C.

Access history log review by the business manager

D.

File encryption along with password protection

Full Access
Question # 421

Which type of threat can utilize a large group of automated social media accounts to steal data, send spam, or launch distributed denial of service (DDoS) attacks?

A.

Botnet attack

B.

Data mining

C.

Phishing attempt

D.

Malware sharing

Full Access
Question # 422

Visitors to a data center are required to present an ID and pre-approved documents. Which type of control has been implemented?

A.

Administrative control

B.

Preventive control

C.

Corrective control

D.

Detective control

Full Access
Question # 423

Which of the following is the PRIMARY benefit of monitoring IT operational logs?

A.

Detecting processing errors in a timely manner

B.

Identifying configuration flaws in operating systems

C.

Managing the usability and capacity of IT resources

D.

Generating exception reports to assess security compliance

Full Access
Question # 424

Which of the following is MOST important when defining the IS audit scope?

A.

Minimizing the time and cost to the organization of IS audit procedures

B.

Involving business in the formulation of the scope statement

C.

Aligning the IS audit procedures with IT management priorities

D.

Understanding the relationship between IT and business risks

Full Access
Question # 425

Which of the following should be an IS auditor ' s GREATEST concern when evaluating an organization ' s ability to recover from system failures?

A.

Data backups being stored onsite

B.

Lack of documentation for data backup procedures

C.

Inadequate backup job monitoring

D.

Lack of periodic data backup restoration testing

Full Access
Question # 426

During an information security review, an IS auditor learns an organizational policy requires all employ-ees to attend information security training during the first week of each new year. What is

the auditor ' s BEST recommendation to ensure employees hired after January receive adequate guid-ance regarding security awareness?

A.

Ensure new employees read and sign acknowledgment of the acceptable use policy.

B.

Revise the policy to include security training during onboarding.

C.

Revise the policy to require security training every six months for all employees.

D.

Require management of new employees to provide an overview of security awareness.

Full Access
Question # 427

A network analyst is monitoring the network after hours and detects activity that appears to be a brute-force attempt to compromise a critical server. After reviewing the alerts to ensure their accuracy, what should be done NEXT?

A.

Perform a root cause analysis.

B.

Document all steps taken in a written report.

C.

Isolate the affected system.

D.

Invoke the incident response plan.

Full Access
Question # 428

Transaction records from a business database were inadvertently deleted, and system operators decided to restore from a snapshot copy. Which of the following provides assurance that the BEST transactions were recovered successfully?

A.

Review transaction recovery logs to ensure no errors were recorded.

B.

Recount the transaction records to ensure no records are missing.

C.

Rerun the process on a backup machine to verify the results are the same.

D.

Compare transaction values against external statements to verify accuracy.

Full Access
Question # 429

Which of the following is the PRIMARY reason to involve IS auditors in the software acquisition process?

A.

To help ensure hardware and operating system requirements are considered

B.

To help ensure proposed contracts and service level agreements (SLAs) address key elements

C.

To help ensure the project management process complies with policies and procedures

D.

To help ensure adequate controls to address common threats and risks are considered

Full Access
Question # 430

In an annual audit cycle, the audit of an organization ' s IT department resulted in many findings. Which of the following would be the MOST important consideration when planning the next audit?

A.

Postponing the review until all of the findings have been rectified

B.

Limiting the review to the deficient areas

C.

Verifying that all recommendations have been implemented

D.

Following up on the status of all recommendations

Full Access
Question # 431

Which of the following poses the GREATEST risk to the use of active RFID tags?

A.

Session hijacking

B.

Eavesdropping

C.

Piggybacking

D.

Phishing attacks

Full Access
Question # 432

in a controlled application development environment, the MOST important segregation of duties should be between the person who implements changes into the production environment and the:

A.

application programmer

B.

systems programmer

C.

computer operator

D.

quality assurance (QA) personnel

Full Access
Question # 433

Which of the following is the MAIN responsibility of the IT steering committee?

A.

Reviewing and assisting with IT strategy integration efforts

B.

Developing and assessing the IT security strategy

C.

Implementing processes to integrate security with business objectives

D.

Developing and implementing the secure system development framework

Full Access
Question # 434

Which of the following staff should an IS auditor interview FIRST to obtain a general overview of the various technologies used across different programs?

A.

Technical architect

B.

Enterprise architect

C.

Program manager

D.

Solution architect

Full Access
Question # 435

The waterfall life cycle model of software development is BEST suited for which of the following situations?

A.

The protect requirements are wall understood.

B.

The project is subject to time pressures.

C.

The project intends to apply an object-oriented design approach.

D.

The project will involve the use of new technology.

Full Access
Question # 436

Which of the following would be the BEST criteria for monitoring an IT vendor ' s service levels?

A.

Service auditor ' s report

B.

Performance metrics

C.

Surprise visit to vendor

D.

Interview with vendor

Full Access
Question # 437

An IS audit manager is reviewing workpapers for a recently completed audit of the corporate disaster recovery test. Which of the following should the IS audit manager specifically review to substantiate the conclusions?

A.

Overviews of interviews between data center personnel and the auditor

B.

Prior audit reports involving other corporate disaster recovery audits

C.

Summary memos reflecting audit opinions regarding noted weaknesses

D.

Detailed evidence of the successes and weaknesses of all contingency testing

Full Access
Question # 438

Which of the following findings from a database security audit presents the GREATEST risk of critical security exposures?

A.

Legacy data has not been purged.

B.

Admin account passwords are not set to expire.

C.

Default settings have not been changed.

D.

Database activity logging is not complete.

Full Access
Question # 439

Which of the following is the BEST way to ensure that business continuity plans (BCPs) will work effectively in the event of a major disaster?

A.

Prepare detailed plans for each business function.

B.

Involve staff at all levels in periodic paper walk-through exercises.

C.

Regularly update business impact assessments.

D.

Make senior managers responsible for their plan sections.

Full Access
Question # 440

An IS auditor should ensure that an application ' s audit trail:

A.

has adequate security.

B.

logs ail database records.

C.

Is accessible online

D.

does not impact operational efficiency

Full Access
Question # 441

An IS auditor discovers from patch logs that some in-scope systems are not compliant with the regular patching schedule. What should the auditor do NEXT?

A.

Interview IT management to clarify the current procedure.

B.

Report this finding to senior management.

C.

Review the organization ' s patch management policy.

D.

Request a plan of action to be established as a follow-up item.

Full Access
Question # 442

The process of applying a hash function to a message and obtaining and ciphering a digest refers to:

A.

digital certificates.

B.

digital signatures.

C.

public key infrastructure (PKI).

D.

authentication.

Full Access
Question # 443

Which of the following biometric access controls has the HIGHEST rate of false negatives?

A.

Iris recognition

B.

Fingerprint scanning

C.

Face recognition

D.

Retina scanning

Full Access
Question # 444

An IS auditor would MOST likely recommend that IT management use a balanced scorecard to:

A.

indicate whether the organization meets quality standards.

B.

ensure that IT staff meet performance requirements.

C.

train and educate IT staff.

D.

assess IT functions and processes.

Full Access
Question # 445

Which of the following business continuity activities prioritizes the recovery of critical functions?

A.

Business continuity plan (BCP) testing

B.

Business impact analysis (BIA)

C.

Disaster recovery plan (DRP) testing

D.

Risk assessment

Full Access
Question # 446

Which of the following would be of GREATEST concern when reviewing an organization ' s security information and event management (SIEM) solution?

A.

SIEM reporting is customized.

B.

SIEM configuration is reviewed annually

C.

The SIEM is decentralized.

D.

SIEM reporting is ad hoc.

Full Access
Question # 447

An organization ' s networking team wants to route data between two virtual local area networks (VLANs). Which type of device is the BEST recommendation for installation of the VLANs?

A.

Switch

B.

Firewall

C.

Bridge

D.

Hub

Full Access
Question # 448

Which of the following provides the MOST protection against emerging threats?

A.

Demilitarized zone (DMZ)

B.

Heuristic intrusion detection system (IDS)

C.

Real-time updating of antivirus software

D.

Signature-based intrusion detection system (IDS)

Full Access
Question # 449

An IS auditor has been asked to review the integrity of data transfer between two business-critical systems that have not been tested since implementation. Which of the following would provide the MOST useful information to plan an audit?

A.

Quality assurance (QA) testing

B.

System change logs

C.

IT testing policies and procedures

D.

Previous system interface testing records

Full Access
Question # 450

Which of the following is the MOST effective way for an organization to help ensure agreed-upon action plans from an IS audit will be implemented?

A.

Ensure sufficient audit resources are allocated,

B.

Communicate audit results organization-wide.

C.

Ensure ownership is assigned.

D.

Test corrective actions upon completion.

Full Access
Question # 451

Which type of device sits on the perimeter of a corporate of home network, where it obtains a public IP address and then generates private IP addresses internally?

A.

Switch

B.

Intrusion prevention system (IPS)

C.

Gateway

D.

Router

Full Access
Question # 452

Which of the following is the MOST reliable way for an IS auditor to evaluate the operational effectiveness of an organization ' s data loss prevention (DLP) controls?

A.

Review data classification levels based on industry best practice

B.

Verify that current DLP software is installed on all computer systems.

C.

Conduct interviews to identify possible data protection vulnerabilities.

D.

Verify that confidential files cannot be transmitted to a personal USB device.

Full Access
Question # 453

An incident response team has been notified of a virus outbreak in a network subnet. Which of the following should be the NEXT step?

A.

Verify that the compromised systems are fully functional

B.

Focus on limiting the damage

C.

Document the incident

D.

Remove and restore the affected systems

Full Access
Question # 454

An organization has decided to build a data warehouse using source data from several disparate systems to support strategic decision-making.

Which of the following is the BEST way to ensure the accuracy and completeness of the data used to support business decisions?

A.

The source data is pre-selected so that it already supports senior management ' s desired business decision outcome.

B.

The source data is from the current year of operations so that irrelevant data from prior years is not included.

C.

The source data is modified in the data warehouse to remove confidential or sensitive information.

D.

The source data is standardized and cleansed before loading into the data warehouse.

Full Access
Question # 455

An emergency power-off switch should:

A.

Be remotely accessible.

B.

Not be identified.

C.

Be protected.

D.

Be under dual control.

Full Access
Question # 456

Which of the following methods provides the MOST reliable audit evidence?

A.

Inquiry

B.

Management attestation

C.

Re-performance of controls

D.

Observation

Full Access
Question # 457

An IS auditor Is reviewing a recent security incident and is seeking information about me approval of a recent modification to a database system ' s security settings Where would the auditor MOST likely find this information?

A.

System event correlation report

B.

Database log

C.

Change log

D.

Security incident and event management (SIEM) report

Full Access