ISACA CISA v2021-04-28 q260
ISACA CISA v2021-04-28 q260
ISACA CISA v2021-04-28 q260
q260
Exam Code: CISA
Exam Name: Certified Information Systems Auditor
Certification Provider: ISACA
Free Question Number: 260
Version: v2021-04-28
# of views: 112
# of Questions views: 2912
https://www.freecram.com/torrent/ISACA.CISA.v2021-04-28.q260.html
NEW QUESTION: 1
When reviewing capacity monitoring, an IS auditor notices several incidents where storage
capacity limits were reached, while the average utilization was below 30% Which of the
following is MOST likely the root cause?
A. The storage space should have been enlarged in time
B. The dynamics of the utilization were not properly taken into account.
C. Storage input and output requirements were not identified.
D. Load balancers were configured incorrect
Answer: B (LEAVE A REPLY)
NEW QUESTION: 2
An organization has outsourced its data leakage monitoring to an Internet service provider
(ISP). Which of the following is the BEST way for an IS auditor to determine the
effectiveness of this service?
A. Simulate a data leakage incident.
B. verify the ISP has staff to deal with data leakage.
C. Review the data leakage clause in the SLA.
D. Review the ISP's external audit report
Answer: A (LEAVE A REPLY)
NEW QUESTION: 3
Which of the following access rights in the production environment should be granted to a
developer to maintain segregation of duties?
A. System administration
B. IT operations
C. Database administration
D. Emergency support
Answer: D (LEAVE A REPLY)
NEW QUESTION: 4
An internal audit has revealed a large number of incidents for which root cause analysis
has not been performed. Which of the following is MOST important for the IS auditor to
verify to determine whether there is an audit issue?
A. Cost of resolving the incidents
B. Severity level of the incidents
C. Frequency of the incidents
D. Time required to resolve the incidents
Answer: B (LEAVE A REPLY)
NEW QUESTION: 5
Which of the following cloud computing models should an organization adopt if faced with
challenges in capacity planning and software maintenance?
A. Hybrid cloud model
B. Infrastructure as a Service (laaS)
C. Service-oriented architecture
D. Platform as a Service (PaaS)
Answer: D (LEAVE A REPLY)
NEW QUESTION: 6
During a project meeting for the Implementation of an Enterprise resource planning (ERP).
a new requirement Is requested by the finance department. Which of the following would
BEST Indicate to an IS auditor that the resulting risk to the project has been assessed?
A. The approval of the change by the finance department.
B. The project status as reported in the meeting minutes
C. The updated business requirements.
D. The analysis of the cost and time impact of the requirement
Answer: (SHOW ANSWER)
NEW QUESTION: 7
A region where an organization conducts business has announced changes in privacy
legislation. Which of the following should an IS auditor do FIRST to prepare for the
changes?
A. Communicate the changes In privacy legislation to the legal department.
B. Perform a gap analysis with current privacy procedures.
C. Design compensating controls to be in compliance with new privacy legislation.
D. Provide suggested updates to the organization's privacy procedures.
Answer: B (LEAVE A REPLY)
NEW QUESTION: 8
An organization recently implemented a cloud document storage solution and removed the
ability for end users to save data to their local workstation hard drives Which of the
following findings should be the IS auditor's GREATEST concern?
A. The business continuity plan (BCP) was not updated.
B. Users have not been trained on the new system.
C. Mobile devices are not encrypted.
D. Users are not required to sign updated acceptable
Answer: (SHOW ANSWER)
NEW QUESTION: 9
An IS auditor discovered abnormalities in a monthly report generated from a system
upgraded six months ago.
Which of the following should be the auditor's FIRST course of action?
A. Determine the impact of abnormalities in the report
B. Perform a change management review of the system
C. Inspect source code for proof of abnormalities.
D. Schedule an access review of the system.
Answer: A (LEAVE A REPLY)
NEW QUESTION: 10
The drives of a tile server are backed up at a hot site. Which of the following is the BEST
way to duplicate the files stored on the server for forensic analysis?
A. Capture a bit-by-bit image of the file server's drives.
B. Create a logical copy of the file server's drives.
C. Run forensic analysis software on the backup drive.
D. Replicate the server's volatile data to another drive.
D18912E1457D5D1DDCBD40AB3BF70D5D
Answer: A (LEAVE A REPLY)
NEW QUESTION: 11
An IS auditor observes that a bank's web page address is prefixed "https:/f. The auditor
would be correct to conclude that:
A. transactions are encrypted.
B. the customer is connected to the bank's intranet.
C. the bank has established a virtual private network (VPN).
D. the bank has a restricted Internet protocol (IP) address.
Answer: A (LEAVE A REPLY)
NEW QUESTION: 12
What is the PRIMARY objective of implementing data classification?
A. Create awareness among users.
B. Establish appropriate encryption methods.
C. Establish appropriate data protection methods.
D. Employ data leakage prevention tools.
Answer: C (LEAVE A REPLY)
NEW QUESTION: 13
When reviewing a database supported by a third-party service provider, an IS auditor
found minor control deficiencies. The auditor should FIRST
A. organization's chief information officer (CIO)
B. service provider contract liaison
C. service provider support team manager
D. organization's service level manager
Answer: (SHOW ANSWER)
NEW QUESTION: 14
An IS auditor is reviewing the upgrading of an operating system. Which of the following
would be the GREATEST audit concern?
A. The lack of change control
B. The lack of activity logging
C. The lack of malware protection
D. The lack of release notes
Answer: A (LEAVE A REPLY)
NEW QUESTION: 15
When developing a business continuity plan (BCP), which of the following should be
performed FIRST?
A. Classify operations.
B. Establish a disaster recovery plan (DRP)
C. Develop business continuity training.
D. Conduct a busines impact analysis (BIA)
Answer: D (LEAVE A REPLY)
NEW QUESTION: 16
Which of the following are the PRIMARY considerations when determining the timing of
remediation testing?
A. The significance of the reported findings and the impact if corrective actions ate not
taken
B. The difficult of scheduling resources and availability of management tor a I up
engagement
C. The availability and competencies of control owners tor implementing the agreed action
plans
D. The level of management and business commitment to implementing agreed action
plans
Answer: (SHOW ANSWER)
Valid CISA Dumps shared by Fast2test.com for Helping Passing CISA Exam!
Fast2test.com now offer the newest CISA exam dumps, the Fast2test.com CISA exam
questions have been updated and answers have been corrected get the newest
Fast2test.com CISA dumps with Test Engine here: https://www.fast2test.com/CISA-
practice-test.html (575 Q&As Dumps, 40%OFF Special Discount: freecram)
NEW QUESTION: 17
During the course of an audit, an IS auditor's organizational independence is impaired. The
IS auditor should FIRST
A. inform audit management of the situation.
B. obtain the auditee s approval before continuing the audit.
C. inform senior management in writing and proceed with the audit
D. proceed with the audit as planned after documenting the incident.
Answer: A (LEAVE A REPLY)
NEW QUESTION: 18
Which of the following controls would BEST enable IT management: to detect shadow IT
within the organization?
A. Enterprise data on mobile devices is encrypted
B. Proxy restrictions are in place
C. Help desk calls and incidents are reviewed
D. Unauthorized network and email traffic is restricted
Answer: (SHOW ANSWER)
NEW QUESTION: 19
An IS auditor is preparing a data set for a data analytics project. The data will be used to
benchmark a new computer-assisted audit technique (CAAT) tool being developed. Which
of the following will help to ensure the data cannot be identified?
A. Data redaction
B. Anonymization
C. Encryption
D. Data masking
Answer: B (LEAVE A REPLY)
NEW QUESTION: 20
Two servers are deployed in a cluster to run a mission-critical application. To determine
whether the system has been designed for optimal efficiency, the IS auditor should verify
that:
A. the two servers are of exactly the same configuration
B. load balancing between the servers has been implemented
C. the number of disks in the cluster meets minimum requirements
D. the security features in the operating system are all enabled
Answer: B (LEAVE A REPLY)
NEW QUESTION: 21
As part of a quality assurance initiative, an organization has engaged an external auditor to
evaluate the internal IS audit function. Which of the following observations should be of
MOST concern?
A. Audit reports do not state they are conducted in accordance with industry standards.
B. Audit engagements are not risk-based.
C. Audit reports are not approved by the audit committee.
D. The audit team is not sufficiently leveraging data analytics.
Answer: B (LEAVE A REPLY)
NEW QUESTION: 22
An IS auditor is conducting a pre-implementation review to determine a new system's
production readiness.
The auditor's PRIMARY concern should be whether:
A. there are unresolved high-risk items
B. benefits realization has been evidenced
C. users were involved in the quality assurance (QA) testing.
D. the project adhered to the budget and target date.
Answer: A (LEAVE A REPLY)
NEW QUESTION: 23
Which of the following could be used to evaluate the effectiveness of IT operations?
A. Balanced scorecard
B. Net present value
C. Total cost of ownership
D. Internal rate of return
Answer: (SHOW ANSWER)
NEW QUESTION: 24
With a properly implemented public key infrastructure (PKI) In use, person A wishes to
ensure that an outgoing message can be read only by person B. To achieve this, the
message should be encrypted using which of the following?
A. Person A's public key
B. Person B's private key
C. Person B's public key
D. Person A's private key
Answer: C (LEAVE A REPLY)
NEW QUESTION: 25
Which of the following roles is ULTIMATELY accountable for the protection of an
organization s information?
A. The data owner
B. The chief information security officer (CISO)
C. The board of directors
D. The chief information officer (CIO)
Answer: C (LEAVE A REPLY)
NEW QUESTION: 26
Which of the following is the safest means of transmitting confidential information over the
Internet?
A. Use asymmetric encryption and encrypt the data with a private key.
B. Establish a virtual private network (VPN) between the source and the destination.
C. Send the data to a trusted third party to resend to the destination.
D. Break the data into many packets and send it over different routes.
Answer: B (LEAVE A REPLY)
NEW QUESTION: 27
During an audit of a mission-critical system hosted in an outsourced data center, an IS
auditor discovers that contracted routine maintenance for the alternate power generator
was not performed. Which of the following should be the auditor's MAIN concern?
A. Loss of warranty due to lack of system maintenance
B. Fraudulent behavior by the outsourcer charging for work not performed
C. Failure of the alternate power generator during a power outage
D. High repair costs if faulty generator parts are not detected in a timely manner
Answer: C (LEAVE A REPLY)
NEW QUESTION: 28
Which of the following would be MOST important for an IS auditor to review when
identifying Key IT risk areas to include in an IS audit scope?
A. External audit reports
B. It risk management processes
C. Control self-assessments (CSAs)
D. The IT risk register
Answer: D (LEAVE A REPLY)
NEW QUESTION: 29
Which of the following BEST ensures IT incident and problem management practices will
meet expected service level agreements (SLAs)?
A. Creating records of known errors and documenting procedures for workarounds
B. Defining problem impact and urgency levels through consultation with the business
C. Obtaining regular progress reports from IT change management on problem resolution
D. Incorporating lessons learned into problem resolution review meetings
Answer: B (LEAVE A REPLY)
NEW QUESTION: 30
When determining whether a project in the design phase will meet organizational
objectives what is BEST to compare against the business case?
A. Project plan
B. Project budget provisions
C. Implementation plan
D. Requirements analysis
Answer: (SHOW ANSWER)
NEW QUESTION: 31
An IS auditor is reviewing the process followed in identifying and prioritizing the critical
business processes.
This process is part of the:
A. balanced scorecard.
B. enterprise risk management plan.
C. business impact analysis (BIA).
D. operations component of the business continuity plan (BCP).
Answer: C (LEAVE A REPLY)
Valid CISA Dumps shared by Fast2test.com for Helping Passing CISA Exam!
Fast2test.com now offer the newest CISA exam dumps, the Fast2test.com CISA exam
questions have been updated and answers have been corrected get the newest
Fast2test.com CISA dumps with Test Engine here: https://www.fast2test.com/CISA-
practice-test.html (575 Q&As Dumps, 40%OFF Special Discount: freecram)
NEW QUESTION: 32
Which of the following would BEST detect that a distributed-denial-of-service attack
(DDoS) is occurring?
A. Penetration testing
B. Customer service complaints
C. Automated monitoring of logs
D. Server crashes
Answer: B (LEAVE A REPLY)
NEW QUESTION: 33
Which of the following BEST indicates to an IS auditor that an IT-related project will deliver
value to the organization?
A. The project will use existing infrastructure to deliver services.
B. Competitors are considering similar IT-based solutions.
C. The cost of the project is within the organization's risk appetite.
D. Requirements are based on stakeholder expectations.
Answer: (SHOW ANSWER)
NEW QUESTION: 34
In a database management system (DBMS) normalization is used to:
A. standardize data names
B. reduce access time
C. reduce data redundancy
D. eliminate processing deadlocks
Answer: C (LEAVE A REPLY)
NEW QUESTION: 35
Which of the following audit procedures would provide the BEST assurance that an
application program is functioning as designed?
A. Interviewing business management
B. Confirming accounts
C. Using a continuous auditing module
D. Reviewing program documentation
Answer: (SHOW ANSWER)
NEW QUESTION: 36
Which of the following will enable a customer to authenticate an online Internet vendor?
A. Customer verifies the vendor is certificate with a certificate authority (CA).
B. Vendor decrypts incoming orders using its own private key.
C. Customer encrypts an order using the vendor s public key.
D. Vendor signs a reply using a hash function and the customer's public key.
Answer: (SHOW ANSWER)
NEW QUESTION: 37
Which of the following is the PRIMARY objective of the IS audit function?
A. Facilitate extraction of computer-based data for substantive testing.
B. Certify the accuracy of financial data
C. Report to management on the functioning of internal controls.
D. Perform reviews based on standards developed by professional organizations
Answer: D (LEAVE A REPLY)
NEW QUESTION: 38
Which of the following is the BEST indication of the completeness of interface control
documents used for the development of a new application?
A. All inputs and outputs for potential actions are included.
B. Both successful and failed interface data transfers are recorded.
C. Failed interface data transfers prevent subsequent processes.
D. All documents have been reviewed by end users.
Answer: A (LEAVE A REPLY)
NEW QUESTION: 39
Which of the following is the MOST important factor when an organization is developing
information security policies and procedures?
A. Consultation with management
B. Cross-references between policies and procedures
C. Compliance with relevant regulations
D. Inclusion of mission and objectives
Answer: (SHOW ANSWER)
NEW QUESTION: 40
Which of the following should be reviewed FIRST when planning an IS audit?
A. Annual business unit budget
B. IS audit standards
C. The business environment
D. Recent financial information
Answer: D (LEAVE A REPLY)
NEW QUESTION: 41
During a "clean desk" audit, a USB flash drive labeled "confidential" was found on the desk
of a terminated employee. Which of the following would be the BEST way to safety review
its contents?
A. Disable autorun on the PC used to plug in the flash drive
B. Scan the USB flash drive with anti-virus software
C. Access the USB flash drive in an offline sandbox environment
D. Copy the files to a secure USB flash drive
Answer: (SHOW ANSWER)
NEW QUESTION: 42
When responding to an ongoing denial of service (DoS) attack, an organization's FIRST
course of action should be to
A. minimize impact
B. investigate damage
C. analyze the attack path
D. restore service
Answer: (SHOW ANSWER)
NEW QUESTION: 43
Which of the following would be of GREATEST concern to an IS auditor reviewing a critical
spreadsheet during a financial audit?
A. Periodic access reviews are manually performed.
B. A copy of the current validated file is not available.
C. Changes to the file are not always documented.
D. Access requests are manually processed.
Answer: C (LEAVE A REPLY)
NEW QUESTION: 44
During an audit of the organization's data privacy policy, the IS auditor identified that only
some IT application databases have encryption in place. What should be the auditors
FIRST action?
A. Determine whether compensating controls are in place
B. Review the most recent database penetration testing results.
C. Review a comprehensive list of databases with the information they contain.
D. Assess the resources required to implement encryption to unencrypted databases.
Answer: C (LEAVE A REPLY)
NEW QUESTION: 45
When an organization is having new software implemented under contract, which of the
following is key to controlling escalating costs due to scope creep?
A. Change management
B. Risk management
C. Quality management
D. Problem management
Answer: A (LEAVE A REPLY)
NEW QUESTION: 46
An IS auditor notes that several of a client's servers are vulnerable to attack due to open
unused ports and protocols. The auditor recommends management implement minimum
security requirements. Which type of control has been recommended?
A. Preventive
B. Compensating
C. Directive
D. Corrective
Answer: (SHOW ANSWER)
Valid CISA Dumps shared by Fast2test.com for Helping Passing CISA Exam!
Fast2test.com now offer the newest CISA exam dumps, the Fast2test.com CISA exam
questions have been updated and answers have been corrected get the newest
Fast2test.com CISA dumps with Test Engine here: https://www.fast2test.com/CISA-
practice-test.html (575 Q&As Dumps, 40%OFF Special Discount: freecram)
NEW QUESTION: 47
Which of the following threats is MOST effectively controlled by a firewall?
A. Network congestion
B. Password cracking
C. Network sniffing
D. Denial of service (DoS) attack
Answer: A (LEAVE A REPLY)
NEW QUESTION: 48
The BEST data backup strategy for mobile users is to:
A. have them regularly go to branch offices to perform backups.
B. have them regularly back up data directories onto CD and courier the backups to the
head office.
C. synchronize data directories automatically over the network.
D. mirror all data to a portable storage device.
Answer: C (LEAVE A REPLY)
NEW QUESTION: 49
Which of the following should an IS auditor recommend to facilitate the management of
baseline requirements for hardening of firewalls?
A. Configuration management
B. Capacity management
C. Patch management
D. Release management
Answer: (SHOW ANSWER)
NEW QUESTION: 50
Which of the following is a prerequisite to help ensure that IS hardware and software
support the delivery of mission-critical functions?
A. Documented emergency change procedures
B. Control over IS infrastructure expenditure
C. An independent audit of the process
D. A comprehensive IS applications architecture
Answer: D (LEAVE A REPLY)
NEW QUESTION: 51
When assessing a business case as part of a post-implementation review, the IS auditor
MUST ensure that the:
A. business case has not been amended since project approval.
B. amendments to the business case have been approved.
C. feasibility of alternative project approaches has been assessed.
D. quality assurance measures have been applied throughout the project
Answer: B (LEAVE A REPLY)
NEW QUESTION: 52
Which of the following is the BEST way to transmit documents classified as confidential
over the Internet?
A. Sending documents as multiple packets over different network routes
B. Using a virtual private network (VPN)
C. Hashing the document contents and destroying the hash value
D. Converting documents to proprietary format before transmission
Answer: B (LEAVE A REPLY)
NEW QUESTION: 53
Which of the following would help to ensure the completeness of batch file transfers?
A. Input controls
B. Hash totals
C. Self-checking digits
D. Parity check
Answer: B (LEAVE A REPLY)
NEW QUESTION: 54
Which of the following is the BEST audit procedure to determine whether a firewall is
configured in compliance with the organization's security policy?
A. Reviewing the system log
B. Reviewing the actual procedures
C. Interviewing the firewall administrator
D. Reviewing the parameter settings
Answer: B (LEAVE A REPLY)
NEW QUESTION: 55
Which of the following is the MOST reliable network connection medium in an environment
where there is strong electromagnetic interface?
A. Wireless link
B. Coaxial cable
C. Shielded twisted-pair cable
D. Fiber optic cable
Answer: (SHOW ANSWER)
NEW QUESTION: 56
What is the BEST indicator of successful implementation of an organization s information
security policy?
A. Reduced number of noncompliance penalties incurred
B. Reduced number of false-positive security events
C. Reduced number of successful phishing incidents
D. Reduced number of help desk calls
Answer: (SHOW ANSWER)
NEW QUESTION: 57
Which of the following is MOST important for an IS auditor to verify during a disaster
recovery audit?
A. Media are stored in fireproof cabmen.
B. The disaster recovery plan is updated on a regular basis
C. Disaster recovery tests are carried out.
D. Regular backups are made and stored offsite.
Answer: C (LEAVE A REPLY)
NEW QUESTION: 58
A retirement system verifies that the field for employee status has either a value of A (for
active) or R (for retired). This is an example of which type of check?
A. Completeness
B. Existence
C. Validity
D. Limit
Answer: B (LEAVE A REPLY)
NEW QUESTION: 59
Which of the following conditions would be of MOST concern to an IS auditor assessing
the risk of a successful brute force attack against encrypted data at rest?
A. Use of asymmetric encryption
B. Use of symmetric encrypt
C. Random key generation
D. Short key length
Answer: D (LEAVE A REPLY)
NEW QUESTION: 60
An IS auditor is conducting a post-implementation review of an enterprise resource
planning (ERP) system End users indicated concerns with the accuracy of critical
automatic calculations made by the system. The auditor's FIRST course of action should
be to:
A. verify completeness of user acceptance testing
B. verify results to determine validity of user concerns
C. review recent changes to the system
D. review initial business requirements
Answer: (SHOW ANSWER)
NEW QUESTION: 61
An IS auditor Is assessing risk associated with peer-to-peer file sharing within an
organization. Which of the following should be of GREATEST concern?
A. File-sharing policies have not been reviewed since last year
B. Only some employees are required to attend security awareness training
C. The organization does not have an efficient patch management process.
D. Not all devices are running antivirus programs
Answer: D (LEAVE A REPLY)
Valid CISA Dumps shared by Fast2test.com for Helping Passing CISA Exam!
Fast2test.com now offer the newest CISA exam dumps, the Fast2test.com CISA exam
questions have been updated and answers have been corrected get the newest
Fast2test.com CISA dumps with Test Engine here: https://www.fast2test.com/CISA-
practice-test.html (575 Q&As Dumps, 40%OFF Special Discount: freecram)
NEW QUESTION: 62
During an audit of a reciprocal disaster recovery agreement between two companies, the
IS auditor would be MOST concerned with the:
A. frequency of system testing
B. allocation of resources during an emergency
C. maintenance of hardware and software compatibility
D. differences in IS policies and procedures
Answer: D (LEAVE A REPLY)
NEW QUESTION: 63
Which of the following provides the BEST indication that IT key performance indicators
(KPls) are Integrated into management practices?
A. KPls are reviewed on a periodic basis.
B. IT KPls include business metrics
C. All relevant parties are involved in the design of KPls
D. KPls are communicated lo stakeholders
Answer: B (LEAVE A REPLY)
NEW QUESTION: 64
Which of the following has the GREATEST influence on the success of IT governance?
A. IT strategy is embedded in all risk management processes
B. Alignment of IT strategies with the entity's vision
C. The CIO is a member of the audit committee
D. Clear, concise, and enforced IS policies
Answer: B (LEAVE A REPLY)
NEW QUESTION: 65
Two organizations will share ownership of a new enterprise resource management (ERM)
system To help ensure the successful implementation of the system, it k MOST important
to define:
A. access to data.
B. appropriate procedures
C. custody of assets
D. the governance model.
Answer: D (LEAVE A REPLY)
NEW QUESTION: 66
The results of an IS audit indicating the need to strengthen controls has oeen
communicated to the appropriate stakeholders Which of the following is the BEST way for
management to enforce Implementation of the recommendations?
A. Copy senior management on communications related to the audit
B. Assign ownership to each remediation activity
C. Have stakeholders developer a business case for control changes
D. Request auditors to design a roadmap for closure
Answer: B (LEAVE A REPLY)
NEW QUESTION: 67
When designing metrics for information security, the MOST important consideration is that
the metrics:
A. provide actionable data.
B. apply to all business units.
C. are easy to understand.
D. track trends over time.
Answer: A (LEAVE A REPLY)
NEW QUESTION: 68
An organization's sensitive data is stored in a cloud computing environment and is
encrypted. Which of the following findings should be of GREATEST concern to an IS
auditor?
A. Symmetric keys are used for encryption.
B. Encryption keys are not rotated on a regular basis.
C. Test data encryption keys are being used in production
D. Data encryption keys are accessible lo the service provider.
Answer: C (LEAVE A REPLY)
NEW QUESTION: 69
Which of the following controls BEST mitigates the impact of a distributed denial of service
(DDoS) attack against the controller in a softwaredefined network (SDN)?
A. Hardening the operating system that hosts the SDN controller
B. Implementing multiple physical SDN controllers
C. Relocating virtualized network functions to physical infrastructure
D. Implementing configuration management for SDN controllers
Answer: A (LEAVE A REPLY)
NEW QUESTION: 70
An IS auditor is assigned to review the development of a specific application. Which of the
following would be the MOST significant step following the feasibility study?
A. Assist users in the design of proper acceptance-testing procedures.
B. Review functional design to determine that appropriate controls are planned.
C. Follow up with project sponsor for project's budgets and actual costs.
D. Attend project progress meetings to monitor timely implementation of the application.
Answer: B (LEAVE A REPLY)
NEW QUESTION: 71
Which of the following activities is MOST important to consider when conducting IS audit
planning?
A. Results from previous audits are reviewed.
B. The audit committee agrees on risk rankings.
C. Audit scheduling is based on skill set of audit team.
D. Resources are allocated to areas of high risk.
Answer: D (LEAVE A REPLY)
NEW QUESTION: 72
An IS auditor reviewing a financial organization's identity management solution found thai
some critical business applications do not have identified owners. Which of the following
should the auditor do NEXT?
A. Discuss the issue with the auditee.
B. Revoke access rights to the critical applications.
C. Write a finding in the audit report.
D. Request a business risk acceptance.
Answer: A (LEAVE A REPLY)
NEW QUESTION: 73
Which of the following IS functions can be performed by the same group or individual while
still providing the proper segregation of duties?
A. Application programming and systems analysis
B. Security administration and application programming
C. Computer operations and application programming
D. Database administration and computer operations
Answer: (SHOW ANSWER)
NEW QUESTION: 74
Which of the following is an example of a corrective control?
A. Employing only qualified personnel to execute tasks
B. Utilizing processes that enforce segregation of duties
C. Generating automated batch job failure notifications
D. Restoring system information from data backups
Answer: D (LEAVE A REPLY)
NEW QUESTION: 75
In which of the following sampling methodologies does each member of the population
have a known nonzero probability of being selected?
A. Stratified sampling
B. Haphazard sampling
C. Quota sampling
D. Judgmental sampling
Answer: (SHOW ANSWER)
NEW QUESTION: 76
An IS auditor has been asked to review an organization's security incident response plan
for effectiveness Which of the following should the auditor recommend be done FIRST
after a network intrusion event has occurred?
A. Contain the impact of the event
B. Identify procedures for recovery from the event
C. Notify the appropriate regulatory bodies
D. Escalate the event to senior management
Answer: A (LEAVE A REPLY)
Valid CISA Dumps shared by Fast2test.com for Helping Passing CISA Exam!
Fast2test.com now offer the newest CISA exam dumps, the Fast2test.com CISA exam
questions have been updated and answers have been corrected get the newest
Fast2test.com CISA dumps with Test Engine here: https://www.fast2test.com/CISA-
practice-test.html (575 Q&As Dumps, 40%OFF Special Discount: freecram)
NEW QUESTION: 77
What would be an IS auditor's BEST course of action when a critical issue outside the
audit scope is discovered on an employee workstation?
A. Expand the audit scope to include desktop audits.
B. Take no action as this issue is outside the audit scope.
C. Include the finding with recommendations in the final report.
D. Record the observation in the workpapers.
Answer: (SHOW ANSWER)
NEW QUESTION: 78
Which of the following would be MOST useful when analyzing computer performance?
A. Tuning of system software to optimize resource usage
B. Operations report of user dissatisfaction with response time
C. Report of off-peal utilization and response time
D. statiscal metrics measuring capacity utilization
Answer: D (LEAVE A REPLY)
NEW QUESTION: 79
A recent audit concluded that an organization's information security system was weak and
that monitoring would likely fail to detect penetration. Which of the following would be the
MOST appropriate recommendation?
A. Encrypt sensitive data while strengthening the system
B. Identify and periodically remove sensitive data that is no longer needed
C. Establish a clear policy related to security and the handling of sensitive data
D. Look continually for new criminal behavior and attacks on sensitive data
Answer: A (LEAVE A REPLY)
NEW QUESTION: 80
Which of the following mechanisms for process improvement involves examination of
industry best practice?
A. Knowledge management
B. Business process reengineering (BPR)
C. Continuous improvement
D. Benchmarking
D18912E1457D5D1DDCBD40AB3BF70D5D
Answer: D (LEAVE A REPLY)
NEW QUESTION: 81
Which of the following is a KEY consideration to ensure the availability of nodes in an
active-active application cluster configuration?
A. Adequate storage exists across all nodes.
B. Some of the nodes are located in the same city.
C. Network encryption exists between nodes
D. The duster agent software used is open source
Answer: C (LEAVE A REPLY)
NEW QUESTION: 82
Which of the following findings is the GREATES concern when reviewing a disaster
recovery plan (DRP) with high availability requirements?
A. Current vendor contact information is not included.
B. Recovery time objectives (RTO) are not defined.
C. Disaster recovery testing is not required.
D. Responsibilities are not defined for the recovery team.
Answer: C (LEAVE A REPLY)
NEW QUESTION: 83
An organization using instant messaging to communicate with customers prevent
legitimate customers from being impersonated by:
A. Logging conversation.
B. Using firewall to limit network traffic to authorized ports.
C. Authentication users before conversation are initiated.
D. Using call monitoring.
Answer: C (LEAVE A REPLY)
NEW QUESTION: 84
Which of the following is the BEST control to reduce the likelihood that a spear phishing
attack will be successful?
A. Education for staff and high-profile users on social engineering
B. Automated alerts to security managers identifying confidential information transferred
externally
C. Spam filtering for emails containing external hyperlinks sent to mass recipient lists
D. Tools for users to report suspicious emails and unusual financial transactions
Answer: A (LEAVE A REPLY)
NEW QUESTION: 85
Which of the following is MOST essential to quality management?
A. Adherence to a globally recognized quality standard
B. Application of statistical process control methods
C. Teamwork by all representatives of the quality group
D. Commilment on the part of executive management
Answer: D (LEAVE A REPLY)
NEW QUESTION: 86
When determining the specifications for a server supporting an online application using
more than a hundred endpoints, which of the following is the MOST important factor to be
Considered?
A. Reputation of the vendors and their customer base
B. High availability of different systems
C. Transaction volume estimate during peak periods
D. Cost-benefit comparison between the available systems
Answer: C (LEAVE A REPLY)
NEW QUESTION: 87
Which of the following observations should be of concern to an is auditor in the fieldwork
stage of a procurement audit?
A. Requisitions are being processed by the finance team.
B. The purchase requester receives notifications of goods delivery.
C. Requisitions are being facilitated by a third-party procurement service.
D. Purchase commitments are made prior to requisitions being approved.
Answer: D (LEAVE A REPLY)
NEW QUESTION: 88
Which of the following is MOST important with regard to an application development
acceptance test?
A. User management approves the test design before the test is started.
B. All data files are tested for valid information before conversion.
C. The quality assurance (QA) team is in charge of the testing process.
D. The programming team is involved in the testing process.
Answer: B (LEAVE A REPLY)
NEW QUESTION: 89
Which of the following should be the FIRST step when developing a business continuity
plan (BCP)?
A. Conduct a risk assessment
B. Discuss recovery time and recovery process objectives with the business owner
C. Choose appropriate controls and measures for recovering IT components.
D. Develop a business continuity strategy
Answer: A (LEAVE A REPLY)
NEW QUESTION: 90
An IS auditor has found that despite an increase in phishing attacks over the past two
years, there has been a significant decrease in the success rate. Which of the following is
the MOST likely reason for this decline?
A. Enhanced training for incident responders
B. Implementation of an intrusion detection system (IDS)
C. Implementation of a security awareness program
D. Development of an incident response plan
Answer: A (LEAVE A REPLY)
NEW QUESTION: 91
Which of the following controls would BEST decrease the exposure if a password is
compromised?
A. Passwords are masked.
B. Passwords are encrypted.
C. Passwords have format restrictions.
D. Password changes are forced periodically.
Answer: (SHOW ANSWER)
Valid CISA Dumps shared by Fast2test.com for Helping Passing CISA Exam!
Fast2test.com now offer the newest CISA exam dumps, the Fast2test.com CISA exam
questions have been updated and answers have been corrected get the newest
Fast2test.com CISA dumps with Test Engine here: https://www.fast2test.com/CISA-
practice-test.html (575 Q&As Dumps, 40%OFF Special Discount: freecram)
NEW QUESTION: 92
For a company that outsources payroll processing, which of the following is the BEST way
to ensure that only authorized employees are paid?
A. Employees should receive pay statements showing gross pay, net pay. and deductions.
B. The company's bank reconciliations should be independently prepared and checked.
C. Electronic payroll reports should be independently reviewed.
D. Only payroll employees should be given the password for data entry and report
retrieval.
Answer: C (LEAVE A REPLY)
NEW QUESTION: 93
An IS auditor suspects an organization's computer may have been used to commit a
crime. Which of the following is the auditor s BEST course of action?
A. Advise management of the crime after the investigation.
B. Notify local law enforcement of the potential crime before further investigation.
C. Contact the incident response team to conduct an investigation.
D. Examine the computer to search for evidence supporting the suspicions.
Answer: C (LEAVE A REPLY)
NEW QUESTION: 94
Which of the following is MOST useful for determining whether the goals of IT are aligned
with the organization's goals?
A. Balanced scorecard
B. Enterprise dashboard
C. Key performance indicators (KPIs)
D. Enterprise architecture (EA)
Answer: (SHOW ANSWER)
NEW QUESTION: 95
To create a digital signature in a message using asymmetric encryption, it is necessary to:
A. First use a symmetric algorithm for the authentication sequence.
B. encrypt the authentication sequence using a private key.
C. encrypt the authentication sequence using a public key.
D. transmit the actual digital signature in unencrypted clear text.
Answer: C (LEAVE A REPLY)
NEW QUESTION: 96
Which of the following is MOST important for the successful completion of a new
application system?
A. Appropriate training of system analysts
B. Steering committee approval of the new system
C. User participation in the project development
D. Completion of a positive cost-benefit analysis
Answer: C (LEAVE A REPLY)
NEW QUESTION: 97
Which of the following system deployments requires the cloud provider to assume the
widest range of responsibilities for data protection?
A. Database as a Service (DBaaS)
B. Platform as a Service (PaaS)
C. Software as a Service (SaaS)
D. Infrastructure as a Service (IasS)
Answer: C (LEAVE A REPLY)
NEW QUESTION: 98
Which of the following is the GREATEST risk resulting from conducting periodic reviews of
IT over several years based on the same audit program?
A. Audit risk is increased because the programs might not be adapted to the organization s
current situation.
B. The amount of errors with increase because the routine work promotes r\attentiveness.
C. Staff turnover in the audit department will increase because fieldwork becomes less
interesting.
D. Detection risk is increased because auditees already know the audit program.
Answer: A (LEAVE A REPLY)
NEW QUESTION: 99
A legacy application is running on an operating system that is no longer supported by the
vendor. If the organization continues to use the current application, which of the following
should be the IS auditor's GREATEST concern?
A. Inability to use the operating system due to potential license issues
B. Inability to update the legacy application database
C. Increased cost of maintaining the system
D. Potential exploitation of zero-day vulnerabilities in the system
Answer: A (LEAVE A REPLY)
Valid CISA Dumps shared by Fast2test.com for Helping Passing CISA Exam!
Fast2test.com now offer the newest CISA exam dumps, the Fast2test.com CISA exam
questions have been updated and answers have been corrected get the newest
Fast2test.com CISA dumps with Test Engine here: https://www.fast2test.com/CISA-
practice-test.html (575 Q&As Dumps, 40%OFF Special Discount: freecram)
Valid CISA Dumps shared by Fast2test.com for Helping Passing CISA Exam!
Fast2test.com now offer the newest CISA exam dumps, the Fast2test.com CISA exam
questions have been updated and answers have been corrected get the newest
Fast2test.com CISA dumps with Test Engine here: https://www.fast2test.com/CISA-
practice-test.html (575 Q&As Dumps, 40%OFF Special Discount: freecram)
Valid CISA Dumps shared by Fast2test.com for Helping Passing CISA Exam!
Fast2test.com now offer the newest CISA exam dumps, the Fast2test.com CISA exam
questions have been updated and answers have been corrected get the newest
Fast2test.com CISA dumps with Test Engine here: https://www.fast2test.com/CISA-
practice-test.html (575 Q&As Dumps, 40%OFF Special Discount: freecram)
Valid CISA Dumps shared by Fast2test.com for Helping Passing CISA Exam!
Fast2test.com now offer the newest CISA exam dumps, the Fast2test.com CISA exam
questions have been updated and answers have been corrected get the newest
Fast2test.com CISA dumps with Test Engine here: https://www.fast2test.com/CISA-
practice-test.html (575 Q&As Dumps, 40%OFF Special Discount: freecram)
Valid CISA Dumps shared by Fast2test.com for Helping Passing CISA Exam!
Fast2test.com now offer the newest CISA exam dumps, the Fast2test.com CISA exam
questions have been updated and answers have been corrected get the newest
Fast2test.com CISA dumps with Test Engine here: https://www.fast2test.com/CISA-
practice-test.html (575 Q&As Dumps, 40%OFF Special Discount: freecram)
Valid CISA Dumps shared by Fast2test.com for Helping Passing CISA Exam!
Fast2test.com now offer the newest CISA exam dumps, the Fast2test.com CISA exam
questions have been updated and answers have been corrected get the newest
Fast2test.com CISA dumps with Test Engine here: https://www.fast2test.com/CISA-
practice-test.html (575 Q&As Dumps, 40%OFF Special Discount: freecram)
Valid CISA Dumps shared by Fast2test.com for Helping Passing CISA Exam!
Fast2test.com now offer the newest CISA exam dumps, the Fast2test.com CISA exam
questions have been updated and answers have been corrected get the newest
Fast2test.com CISA dumps with Test Engine here: https://www.fast2test.com/CISA-
practice-test.html (575 Q&As Dumps, 40%OFF Special Discount: freecram)
Valid CISA Dumps shared by Fast2test.com for Helping Passing CISA Exam!
Fast2test.com now offer the newest CISA exam dumps, the Fast2test.com CISA exam
questions have been updated and answers have been corrected get the newest
Fast2test.com CISA dumps with Test Engine here: https://www.fast2test.com/CISA-
practice-test.html (575 Q&As Dumps, 40%OFF Special Discount: freecram)
Valid CISA Dumps shared by Fast2test.com for Helping Passing CISA Exam!
Fast2test.com now offer the newest CISA exam dumps, the Fast2test.com CISA exam
questions have been updated and answers have been corrected get the newest
Fast2test.com CISA dumps with Test Engine here: https://www.fast2test.com/CISA-
practice-test.html (575 Q&As Dumps, 40%OFF Special Discount: freecram)
Valid CISA Dumps shared by Fast2test.com for Helping Passing CISA Exam!
Fast2test.com now offer the newest CISA exam dumps, the Fast2test.com CISA exam
questions have been updated and answers have been corrected get the newest
Fast2test.com CISA dumps with Test Engine here: https://www.fast2test.com/CISA-
practice-test.html (575 Q&As Dumps, 40%OFF Special Discount: freecram)
Valid CISA Dumps shared by Fast2test.com for Helping Passing CISA Exam!
Fast2test.com now offer the newest CISA exam dumps, the Fast2test.com CISA exam
questions have been updated and answers have been corrected get the newest
Fast2test.com CISA dumps with Test Engine here: https://www.fast2test.com/CISA-
practice-test.html (575 Q&As Dumps, 40%OFF Special Discount: freecram)