Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Isaca > Isaca Certification > CISA

CISA Certified Information Systems Auditor Question and Answers

Question # 4

When auditing IT organizational structure, which of the following findings presents the GREATEST risk to an organization?

A.

Significantly higher turnover

B.

Lack of customer satisfaction surveys

C.

Aging staff

D.

Increase in the frequency of software upgrades

Full Access
Question # 5

A senior auditor is reviewing work papers prepared by a junior auditor indicating that a finding was removed after the auditee said they corrected the problem. Which of the following is the senior auditor s MOST appropriate course of action?

A.

Ask the auditee to retest

B.

Approve the work papers as written

C.

Have the finding reinstated

D.

Refer the issue to the audit director

Full Access
Question # 6

Which of the following is a social engineering attack method?

A.

An unauthorized person attempts to gam access to secure premises by following an authonzed person through a secure door.

B.

An employee is induced to reveal confidential IP addresses and passwords by answering questions over the phone.

C.

A hacker walks around an office building using scanning tools to search for a wireless network to gain access.

D.

An intruder eavesdrops and collects sensitive information flowing through the network and sells it to third parties.

Full Access
Question # 7

Which of the following is an IS auditor ' s BEST recommendation to mitigate the risk of eavesdropping

associated with an application programming interface (API) integration implementation?

A.

Encrypt the extensible markup language (XML) file.

B.

Implement Transport Layer Security (TLS).

C.

Implement Simple Object Access Protocol (SOAP).

D.

Mask the API endpoints.

Full Access
Question # 8

A programmer has made unauthorized changes to key fields in a payroll system report. Which of the following control weaknesses would have contributed MOST to this

problem?

A.

The programmer did not involve the user in testing.

B.

The user requirements were not documented.

C.

Payroll files were not under the control of a librarian.

D.

The programmer has access to the production programs.

Full Access
Question # 9

When an IS auditor needs to confirm that an organization is encrypting sensitive information at a database level, which of the following would provide the BEST assurance?

A.

Reviewing the drive settings of the host server

B.

Checking network traffic for clear text transmissions

C.

Verifying a sample of critical fields

D.

Reviewing the organization’s encryption policy

Full Access
Question # 10

Which task should an IS auditor complete FIRST during the preliminary planning phase of a database security review?

A.

Perform a business impact analysis (BIA).

B.

Determine which databases will be in scope.

C.

Identify the most critical database controls.

D.

Evaluate the types of databases being used

Full Access
Question # 11

Stress testing should ideally be earned out under a:

A.

test environment with production workloads.

B.

production environment with production workloads.

C.

production environment with test data.

D.

test environment with test data.

Full Access
Question # 12

During recent post-implementation reviews, an IS auditor has noted that several deployed applications are not being used by the business. The MOST likely cause would be the lack of:

A.

IT portfolio management.

B.

IT resource management.

C.

system support documentation.

D.

change management.

Full Access
Question # 13

Which of the following observations should be of GREATEST concern to an IS auditor reviewing an organization ' s enterprise architecture (EA) program?

A.

IT application owners have sole responsibility for architecture approval.

B.

The architecture review board is chaired by the CIO.

C.

Information security requirements are reviewed by the EA program.

D.

The EA program governs projects that are not IT-related.

Full Access
Question # 14

Following the sale of a business division, employees will be transferred to a new organization, but they will retain access to IT equipment from the previous employer. An IS auditor has recommended that both organizations agree to and document an acceptable use policy for the equipment. What type of control has been recommended?

A.

Detective control

B.

Preventive control

C.

Directive control

D.

Corrective control

Full Access
Question # 15

An organization that has suffered a cyber-attack is performing a forensic analysis of the affected users ' computers. Which of the following should be of GREATEST concern for the IS auditor reviewing this process?

A.

An imaging process was used to obtain a copy of the data from each computer.

B.

The legal department has not been engaged.

C.

The chain of custody has not been documented.

D.

Audit was only involved during extraction of the Information

Full Access
Question # 16

Which of the following provides the BEST evidence of the validity and integrity of logs in an organization ' s security information and event management (SIEM) system?

A.

Compliance testing

B.

Stop-or-go sampling

C.

Substantive testing

D.

Variable sampling

Full Access
Question # 17

Which of the following MOST effectively reduces the probability of a brute force attack being successful?

A.

Establishing account activity timeouts

B.

Establishing an account lockout policy

C.

Increasing password change frequency

D.

Requiring minimum password length

Full Access
Question # 18

Stress testing should ideally be carried out under a:

A.

test environment with production workloads.

B.

test environment with test data.

C.

production environment with production workloads.

D.

production environment with test data.

Full Access
Question # 19

Which of the following is the PRIMARY purpose of obtaining a baseline image during an operating system audit?

A.

To identify atypical running processes

B.

To verify antivirus definitions

C.

To identify local administrator account access

D.

To verify the integrity of operating system backups

Full Access
Question # 20

The BEST way for an IS auditor to validate that separation of duties has been implemented is to perform:

A.

A review of personnel files.

B.

An analysis of documented job descriptions.

C.

A review of the organizational chart.

D.

A walk-through of job functions.

Full Access
Question # 21

Which of the following is the MOST likely root cause of shadow IT in an organization?

A.

Lengthy approval for technology investment

B.

The opportunity to reduce software license fees

C.

Ease of use for cloud-based applications and services

D.

Approved software not meeting user requirements

Full Access
Question # 22

Which of the following operational log management considerations is MOST important for an organization undergoing a digital transformation?

A.

Changes in operating costs for log management

B.

Centralization of current log management

C.

Tuning of log reviews to provide enhanced oversight

D.

IT resource capability to manage application uptime

Full Access
Question # 23

The PRIMARY objective of value delivery in reference to IT governance is to:

A.

promote best practices

B.

increase efficiency.

C.

optimize investments.

D.

ensure compliance.

Full Access
Question # 24

An externally facing system containing sensitive data is configured such that users have either read-only or administrator rights. Most users of the system have administrator access. Which of the following is the GREATEST risk associated with this situation?

A.

Users can export application logs.

B.

Users can view sensitive data.

C.

Users can make unauthorized changes.

D.

Users can install open-licensed software.

Full Access
Question # 25

An IS auditor has been asked to advise on measures to improve IT governance within the organization. Which of the following IS the BEST recommendation?

A.

Benchmark organizational performance against industry peers

B.

Implement key performance indicators (KPIs).

C.

Require executive management to draft IT strategy

D.

Implement annual third-party audits.

Full Access
Question # 26

An IS auditor discovers a box of hard drives in a secured location that are overdue for physical destruction. The vendor responsible for this task was never made aware of these hard drives.

Which of the following is the BEST course of action to address this issue?

A.

Examine the workflow to identify gaps in asset-handling responsibilities.

B.

Escalate the finding to the asset owner for remediation.

C.

Recommend the drives be sent to the vendor for destruction.

D.

Evaluate the corporate asset-handling policy for potential gaps.

Full Access
Question # 27

A review of an organization ' s enterprise architecture (EA) BEST enables an IS auditor to determine:

A.

alignment of IT service levels with business objectives.

B.

the organization ' s level of compliance with regulations.

C.

adherence to budget for current IT initiative implementations.

D.

alignment of the IT strategy with business strategy.

Full Access
Question # 28

An IS auditor finds a high-risk vulnerability in a public-facing web server used to process online customer payments. The IS auditor should FIRST

A.

document the exception in an audit report.

B.

review security incident reports.

C.

identify compensating controls.

D.

notify the audit committee.

Full Access
Question # 29

Which of the following is MOST important to determine during the planning phase of a cloud-based messaging and collaboration platform acquisition?

A.

Role-based access control policies

B.

Types of data that can be uploaded to the platform

C.

Processes for on-boarding and off-boarding users to the platform

D.

Processes for reviewing administrator activity

Full Access
Question # 30

An organization allows employees to retain confidential data on personal mobile devices. Which of the following is the BEST recommendation to mitigate the risk of data leakage from lost or stolen devices?

A.

Require employees to attend security awareness training.

B.

Password protect critical data files.

C.

Configure to auto-wipe after multiple failed access attempts.

D.

Enable device auto-lock function.

Full Access
Question # 31

Which of the following is the MOST important regulatory consideration for an organization determining whether to use its customer data to train AI algorithms?

A.

Documentation of AI algorithm accuracy during the training process

B.

Ethical and optimal utilization of data computing resources

C.

Collection of data and obtaining data subject consent

D.

Continuous monitoring of AI algorithm performance

Full Access
Question # 32

A new regulation in one country of a global organization has recently prohibited cross-border transfer of personal data. An IS auditor has been asked to determine the organization ' s level of exposure In the affected country. Which of the following would be MOST helpful in making this assessment?

A.

Developing an inventory of all business entities that exchange personal data with the affected jurisdiction

B.

Identifying data security threats in the affected jurisdiction

C.

Reviewing data classification procedures associated with the affected jurisdiction

D.

Identifying business processes associated with personal data exchange with the affected jurisdiction

Full Access
Question # 33

Which of the following is found in an audit charter?

A.

The process of developing the annual audit plan

B.

The authority given to the audit function

C.

Required training for audit staff

D.

Audit objectives and scope

Full Access
Question # 34

An IS auditor is reviewing the installation of a new server. The IS auditor ' s PRIMARY objective is to ensure that

A.

security parameters are set in accordance with the manufacturer s standards.

B.

a detailed business case was formally approved prior to the purchase.

C.

security parameters are set in accordance with the organization ' s policies.

D.

the procurement project invited lenders from at least three different suppliers.

Full Access
Question # 35

How does the emergence of quantum computing impact traditional data encryption methods?

A.

Quantum computing may render classical encryption algorithms obsolete due to its ability to decrypt data with unprecedented efficiency.

B.

Quantum computing introduces new encryption techniques that are immune to decryption by classical and quantum computers alike.

C.

Quantum computing enhances the security of classical encryption algorithms by providing faster computation speeds.

D.

Quantum computing will require more frequent training on the application of classical data encryption methods.

Full Access
Question # 36

The FIRST step in an incident response plan is to:

A.

validate the incident.

B.

notify the head of the IT department.

C.

isolate systems impacted by the incident.

D.

initiate root cause analysis.

Full Access
Question # 37

If a recent release of a program has to be backed out of production, the corresponding changes within the delta version of the code should be:

A.

filed in production for future reference in researching the problem.

B.

applied to the source code that reflects the version in production.

C.

eliminated from the source code that reflects the version in production.

D.

reinstalled when replacing the version back into production.

Full Access
Question # 38

An IS auditor is reviewing an industrial control system (ICS) that uses older unsupported technology in the scope of an upcoming audit. What should the auditor consider the MOST significant concern?

A.

Attack vectors are evolving for industrial control systems.

B.

There is a greater risk of system exploitation.

C.

Disaster recovery plans (DRPs) are not in place.

D.

Technical specifications are not documented.

Full Access
Question # 39

Which of the following is the BEST way to ensure a vendor complies with system security requirements?

A.

Require security training for vendor staff.

B.

Review past incidents reported by the vendor.

C.

Review past audits on the vendor ' s security compliance.

D.

Require a compliance clause in the vendor contract.

Full Access
Question # 40

Which of the following findings should be of GREATEST concern to an IS auditor assessing the risk associated with end-user computing (EUC) in an organization?

A.

Insufficient processes to track ownership of each EUC application?

B.

Insufficient processes to lest for version control

C.

Lack of awareness training for EUC users

D.

Lack of defined criteria for EUC applications

Full Access
Question # 41

An IS auditor is verifying the adequacy of an organization ' s internal controls and is concerned about potential circumvention of regulations. Which of the following is the BEST sampling method to use?

A.

Variable sampling

B.

Random sampling

C.

Cluster sampling

D.

Attribute sampling

Full Access
Question # 42

Which of the following findings would be of GREATEST concern when auditing an organization ' s end-user computing (EUC)?

A.

Errors flowed through to financial statements

B.

Reduced oversight by the IT department

C.

Inconsistency of patching processes being followed

D.

Inability to monitor EUC audit logs and activities

Full Access
Question # 43

Which of the following would BEST assist an IS auditor in understanding the inputs and outputs of a microservice-oriented application?

A.

Data flow diagrams

B.

Network architecture diagrams

C.

Business requirements documentation

D.

Entity-relationship diagrams

Full Access
Question # 44

A bank wants to outsource a system to a cloud provider residing in another country. Which of the following would be the MOST appropriate IS audit recommendation?

A.

Find an alternative provider in the bank ' s home country.

B.

Ensure the provider ' s internal control system meets bank requirements.

C.

Proceed as intended, as the provider has to observe all laws of the clients’ countries.

D.

Ensure the provider has disaster recovery capability.

Full Access
Question # 45

During an external review, an IS auditor observes an inconsistent approach in classifying system criticality

within the organization. Which of the following should be recommended as the PRIMARY factor to

determine system criticality?

A.

Recovery point objective (RPO)

B.

Maximum allowable downtime (MAD)

C.

Mean time to restore (MTTR)

D.

Key performance indicators (KPls)

Full Access
Question # 46

An IS auditor suspects an organization ' s computer may have been used to commit a crime. Which of the following is the auditor ' s BEST course of action?

A.

Examine the computer to search for evidence supporting the suspicions.

B.

Advise management of the crime after the investigation.

C.

Contact the incident response team to conduct an investigation.

D.

Notify local law enforcement of the potential crime before further investigation.

Full Access
Question # 47

UESTION NO: 210

An accounting department uses a spreadsheet to calculate sensitive financial transactions. Which of the following is the MOST important control for maintaining the security of data in the spreadsheet?

A.

There Is a reconciliation process between the spreadsheet and the finance system

B.

A separate copy of the spreadsheet is routinely backed up

C.

The spreadsheet is locked down to avoid inadvertent changes

D.

Access to the spreadsheet is given only to those who require access

Full Access
Question # 48

Which of the following is the MOST important consideration when establishing operational log management?

A.

Types of data

B.

Log processing efficiency

C.

IT organizational structure

D.

Log retention period

Full Access
Question # 49

Which of the following would provide an IS auditor with the GREATEST assurance that data disposal controls support business strategic objectives?

A.

Media recycling policy

B.

Media sanitization policy

C.

Media labeling policy

D.

Media shredding policy

Full Access
Question # 50

With regard to resilience, which of the following is the GREATEST risk to an organization that has implemented a new critical system?

A.

A business impact analysis (BIA) has not been performed

B.

Business data is not sanitized in the development environment

C.

There is no plan for monitoring system downtime

D.

The process owner has not signed off on user acceptance testing (UAT)

Full Access
Question # 51

Which of the following BEST ensures the quality and integrity of test procedures used in audit analytics?

A.

Developing and communicating test procedure best practices to audit teams

B.

Developing and implementing an audit data repository

C.

Decentralizing procedures and Implementing periodic peer review

D.

Centralizing procedures and implementing change control

Full Access
Question # 52

Which of the following is the GREATEST concern when applying emergency patches?

A.

A change record may not be properly maintained.

B.

Temporary administrative permissions may be needed to apply patches.

C.

Patch-related risk may not be adequately assessed.

D.

Documented approvals may not be required before applying the emergency patch.

Full Access
Question # 53

Which of the following MOST effectively detects transposition and transcription errors?

A.

Duplicate check

B.

Completeness check

C.

Sequence check

D.

Check digit

Full Access
Question # 54

Which of the following presents the GREATEST challenge to the alignment of business and IT?

A.

Lack of chief information officer (CIO) involvement in board meetings

B.

Insufficient IT budget to execute new business projects

C.

Lack of information security involvement in business strategy development

D.

An IT steering committee chaired by the chief information officer (CIO)

Full Access
Question # 55

During a follow-up audit, an IS auditor finds that senior management has implemented a different remediation action plan than what was previously agreed upon. Which of the following is the auditor ' s BEST course of action?

A.

Report the deviation by the control owner in the audit report.

B.

Evaluate the implemented control to ensure it mitigates the risk to an acceptable level.

C.

Cancel the follow-up audit and reschedule for the next audit period.

D.

Request justification from management for not implementing the recommended control.

Full Access
Question # 56

In an environment where data virtualization is used, which of the following provides the BEST disaster recovery solution?

A.

Onsite disk-based backup systems

B.

Tape-based backup systems

C.

Virtual tape library

D.

Redundant array of independent disks (RAID)

Full Access
Question # 57

A month after a company purchased and implemented system and performance monitoring software, reports were too large and therefore were not reviewed or acted upon The MOST effective plan of action would be to:

A.

evaluate replacement systems and performance monitoring software.

B.

restrict functionality of system monitoring software to security-related events.

C.

re-install the system and performance monitoring software.

D.

use analytical tools to produce exception reports from the system and performance monitoring software

Full Access
Question # 58

Which of the following is the BEST metric to measure the alignment of IT and business strategy?

A.

Level of stakeholder satisfaction with the scope of planned IT projects

B.

Percentage of enterprise risk assessments that include IT-related risk

C.

Percentage of stat satisfied with their IT-related roles

D.

Frequency of business process capability maturity assessments

Full Access
Question # 59

To enable the alignment of IT staff development plans with IT strategy, which of the following should be done FIRST?

A.

Review IT staff job descriptions for alignment

B.

Develop quarterly training for each IT staff member.

C.

Identify required IT skill sets that support key business processes

D.

Include strategic objectives m IT staff performance objectives

Full Access
Question # 60

How does a continuous integration/continuous development (CI/CD) process help to reduce software failure risk?

A.

Easy software version rollback

B.

Smaller incremental changes

C.

Fewer manual milestones

D.

Automated software testing

Full Access
Question # 61

Which of the following should be an IS auditor ' s PRIMARY consideration when determining which issues to include in an audit report?

A.

Professional skepticism

B.

Management ' s agreement

C.

Materiality

D.

Inherent risk

Full Access
Question # 62

An IS auditor is reviewing the service management of an outsourced help desk. Which of the following is the BEST indicator of how effectively the service provider is performing this function?

A.

Average ticket age

B.

Number of calls worked

C.

Customer satisfaction ratings

D.

Call transcript reviews

Full Access
Question # 63

During an audit, the IS auditor finds that in many cases excessive rights were not removed from a system. Which of the following is the auditor ' s BEST recommendation?

A.

System administrators should ensure consistency of assigned rights.

B.

IT security should regularly revoke excessive system rights.

C.

Human resources (HR) should delete access rights of terminated employees.

D.

Line management should regularly review and request modification of access rights

Full Access
Question # 64

Which of the following BEST minimizes performance degradation of servers used to authenticate users of an e-commerce website?

A.

Configure a single server as a primary authentication server and a second server as a secondary authentication server.

B.

Configure each authentication server as belonging to a cluster of authentication servers.

C.

Configure each authentication server and ensure that each disk of its RAID is attached to the primary controller.

D.

Configure each authentication server and ensure that the disks of each server form part of a duplex.

Full Access
Question # 65

An IT balanced scorecard is PRIMARILY used for:

A.

evaluating the IT project portfolio

B.

measuring IT strategic performance

C.

allocating IT budget and resources

D.

monitoring risk in lT-related processes

Full Access
Question # 66

Which of the following should be of MOST concern to an IS auditor reviewing an organization’s IT policies?

A.

The policies are reviewed and approved by an organizational IT committee.

B.

The policies are not regularly reviewed and updated.

C.

The policies are not mapped to industry best practices.

D.

The policies are primarily targeted toward IT staff.

Full Access
Question # 67

Which of the following is the BEST way to prevent social engineering incidents?

A.

Ensure user workstations are running the most recent version of antivirus software.

B.

Maintain an onboarding and annual security awareness program.

C.

Include security responsibilities in job descriptions and require signed acknowledgment.

D.

Enforce strict email security gateway controls.

Full Access
Question # 68

Which of the following should be the GREATEST concern for an IS auditor assessing an organization ' s disaster recovery plan (DRP)?

A.

The DRP was developed by the IT department.

B.

The DRP has not been tested during the past three years.

C.

The DRP has not been updated for two years.

D.

The DRP does not include the recovery the time objective (RTO) for a key system.

Full Access
Question # 69

An IS auditor is reviewing processes for importing market price data from external data providers. Which of the following findings should the auditor consider MOST critical?

A.

The transfer protocol does not require authentication.

B.

The quality of the data is not monitored.

C.

Imported data is not disposed of frequently.

D.

The transfer protocol is not encrypted.

Full Access
Question # 70

Which of the following is MOST important for an IS auditor to confirm when reviewing an organization ' s plans to implement robotic process automation (RPA > to automate routine business tasks?

A.

The end-to-end process is understood and documented.

B.

Roles and responsibilities are defined for the business processes in scope.

C.

A benchmarking exercise of industry peers who use RPA has been completed.

D.

A request for proposal (RFP) has been issued to qualified vendors.

Full Access
Question # 71

An organization is modernizing its technology policy framework to demonstrate compliance with external industry standards. Which of the following would be MOST useful to an IS auditor for validating the outcome?

A.

Benchmarking of internal standards against peer organizations

B.

Inventory of the organization ' s approved policy exceptions

C.

Policy recommendations from a leading external consulting agency

D.

Mapping of relevant standards against the organization ' s controls

Full Access
Question # 72

Which of the following is MOST important to include when developing a business continuity plan (BCP)?

A.

Criteria for triggering the plan

B.

Details of linked security policies

C.

Details of a comprehensive asset inventory

D.

Plans for addressing all types of threats

Full Access
Question # 73

An IS auditor has validated that an organization ' s IT department runs several low-priority automated tasks Which of the following is the BEST recommendation for an automated job schedule?

A.

Low-priority jobs should be avoided.

B.

Low-priority jobs should include the major functions.

C.

Low-priority jobs should be provided with optimal resources.

D.

Low-priority jobs should be scheduled subject to resource availability.

Full Access
Question # 74

Which of the following BEST contributes to the quality of an audit of a business-critical application?

A.

Assigning the audit to independent external auditors

B.

Reviewing previous findings reported by the application owner

C.

Identifying common coding errors made by the development team

D.

Involving the application owner early in the audit planning process

Full Access
Question # 75

Which of the following is the PRIMARY role of key performance indicators (KPIs) in supporting business process effectiveness?

A.

To analyze workflows in order to optimize business processes and eliminate tasks that do not provide value

B.

To evaluate the cost-benefit of tools implemented to monitor control performance

C.

To assess the functionality of a software deliverable based on business processes

D.

To enable conclusions about the performance of the processes and target variances for follow-up analysis

Full Access
Question # 76

Which of the following is the PRIMARY purpose of a rollback plan for a system change?

A.

To ensure steps exist to remove the change if necessary

B.

To ensure testing can be re-performed if required

C.

To ensure a backup exists before implementing a change

D.

To ensure the system change is effective

Full Access
Question # 77

Which of the following findings would be of GREATEST concern to an IS auditor reviewing firewall security for an organization ' s corporate network?

A.

The production configuration does not conform to corporate policy.

B.

Responsibility for the firewall administration rests with two different divisions.

C.

Industry hardening guidance has not been considered.

D.

The firewall configuration file is extremely long and complex.

Full Access
Question # 78

Which of the following would be MOST effective to protect information assets in a data center from theft by a vendor?

A.

Monitor and restrict vendor activities

B.

Issues an access card to the vendor.

C.

Conceal data devices and information labels

D.

Restrict use of portable and wireless devices.

Full Access
Question # 79

Which of the following biometric access controls has the HIGHEST rate of false negatives?

A.

Iris recognition

B.

Fingerprint scanning

C.

Face recognition

D.

Retina scanning

Full Access
Question # 80

An IS auditor is reviewing an organization ' s incident management processes and procedures. Which of the following observations should be the auditor ' s GREATEST concern?

A.

Ineffective post-incident review

B.

Ineffective incident prioritization

C.

Ineffective incident detection

D.

Ineffective incident classification

Full Access
Question # 81

Following a merger, a review of an international organization determines the IT steering committee ' s decisions do not extend to regional offices as required in the consolidated IT operating model. Which of the following is the IS auditor ' s BEST recommendation?

A.

Create regional centers of excellence.

B.

Engage an IT governance consultant.

C.

Create regional IT steering committees.

D.

Update the IT steering committee ' s formal charter.

Full Access
Question # 82

An IS auditor is assigned to review the IS department s quality procedures. Upon contacting the IS manager, the auditor finds that there is an informal unwritten set of standards Which of the following should be the auditor ' s NEXT action1?

A.

Make recommendations to IS management as to appropriate quality standards

B.

Postpone the audit until IS management implements written standards

C.

Document and lest compliance with the informal standards

D.

Finalize the audit and report the finding

Full Access
Question # 83

Which of the following responsibilities associated with a disaster recovery plan (DRP) can be outsourced to a Disaster Recovery as a Service (DRaaS) provider?

A.

System recovery procedures

B.

Stakeholder communications during a disaster

C.

Validation of recovered data

D.

Processes for maintaining currency of data

Full Access
Question # 84

When classifying information, it is MOST important to align the classification to:

A.

business risk

B.

security policy

C.

data retention requirements

D.

industry standards

Full Access
Question # 85

The PRIMARY objective of a follow-up audit is to:

A.

assess the appropriateness of recommendations.

B.

verify compliance with policies.

C.

evaluate whether the risk profile has changed.

D.

determine adequacy of actions taken on recommendations.

Full Access
Question # 86

in a controlled application development environment, the MOST important segregation of duties should be between the person who implements changes into the production environment and the:

A.

application programmer

B.

systems programmer

C.

computer operator

D.

quality assurance (QA) personnel

Full Access
Question # 87

Which of the following is an example of shadow IT?

A.

An employee using a cloud based order management tool without approval from IT

B.

An employee using a company provided laptop to access personal banking information

C.

An employee using personal email to communicate with clients without approval from IT

D.

An employee using a company-provided tablet to access social media during work hours

Full Access
Question # 88

Which of the following is the BEST way to determine whether a test of a disaster recovery plan (DRP) was successful?

A.

Analyze whether predetermined test objectives were met.

B.

Perform testing at the backup data center.

C.

Evaluate participation by key personnel.

D.

Test offsite backup files.

Full Access
Question # 89

Which of the following should be of MOST concern to an IS auditor reviewing the information systems acquisition, development, and implementation process?

A.

Data owners are not trained on the use of data conversion tools.

B.

A post-implementation lessons-learned exercise was not conducted.

C.

There is no system documentation available for review.

D.

System deployment is routinely performed by contractors.

Full Access
Question # 90

An IS auditor discovers from patch logs that some in-scope systems are not compliant with the regular patching schedule. What should the auditor do NEXT?

A.

Interview IT management to clarify the current procedure.

B.

Report this finding to senior management.

C.

Review the organization ' s patch management policy.

D.

Request a plan of action to be established as a follow-up item.

Full Access
Question # 91

Following a discussion on the results of a recent audit engagement, the process owner of the audited area has provided an action plan addressing the gaps and recommendations. The auditor disagrees with some of the responses where the process owner is accepting a level of residual risk that is not within the organization ' s risk appetite. What is the auditor ' s BEST course of action?

A.

Include the issue in the next report to the audit committee.

B.

Inform executive management of the residual risk.

C.

Accept the action plan proposed by the process owner.

D.

Escalate the situation to audit management.

Full Access
Question # 92

Which of the following is the GREATEST risk that could result from a contracted penetration tester attempting SQL injection techniques on the production system?

A.

The tester ' s access could be elevated.

B.

Events could be improperly logged.

C.

Sensitive data could be exfiltrated.

D.

Production data could be altered.

Full Access
Question # 93

An IS auditor performs a follow-up audit and learns the approach taken by the auditee to fix the findings differs from the agreed-upon approach confirmed during the last audit. Which of the following should be the auditor ' s NEXT course of action?

A.

Evaluate the appropriateness of the remedial action taken.

B.

Conduct a risk analysis incorporating the change.

C.

Report results of the follow-up to the audit committee.

D.

Inform senior management of the change in approach.

Full Access
Question # 94

Which of the following provides the BEST evidence that a third-party service provider ' s information security controls

are effective?

A.

An audit report of the controls by the service provider ' s external auditor

B.

Documentation of the service provider ' s security configuration controls

C.

An interview with the service provider ' s information security officer

D.

A review of the service provider ' s policies and procedures

Full Access
Question # 95

Which of the following is the GREATEST risk associated with utilizing spreadsheets for financial reporting in end-user computing (EUC)?

A.

Lack of password protection

B.

Lack of processing integrity

C.

Increase in regulatory violations

D.

Increase in operational incidents

Full Access
Question # 96

Which of the following is the MOST effective control to mitigate against the risk of inappropriate activity by employees?

A.

User activity monitoring

B.

Two-factor authentication

C.

Network segmentation

D.

Access recertification

Full Access
Question # 97

An internal audit team is deciding whether to use an audit management application hosted by a third party in a different country.

What should be the MOST important consideration related to the uploading of payroll audit documentation in the hosted

application?

A.

Financial regulations affecting the organization

B.

Data center physical access controls whore the application is hosted

C.

Privacy regulations affecting the organization

D.

Per-unit cost charged by the hosting services provider for storage

Full Access
Question # 98

Which of the following BEST reflects a mature strategic planning process?

A.

Action plans with IT requirements built into all projects

B.

An IT strategic plan with specifications of controls and safeguards

C.

An IT strategic plan that supports the corporate strategy

D.

IT projects from the strategic plan are approved by management

Full Access
Question # 99

Which of the following controls BEST ensures appropriate segregation of dudes within an accounts payable department?

A.

Ensuring that audit trails exist for transactions

B.

Restricting access to update programs to accounts payable staff only

C.

Including the creator ' s user ID as a field in every transaction record created

D.

Restricting program functionality according to user security profiles

Full Access
Question # 100

Which of the following is an IS auditor’s MOST important step in a privacy audit?

A.

Assess the controls in place for data management.

B.

Determine whether privacy training is being conducted for employees.

C.

Review third-party agreements for adequate personally identifiable information (PII) protection measures.

D.

Analyze all stages of the personally identifiable information (PII) data life cycle to identify potential risks.

Full Access
Question # 101

Which of the following is the MAIN objective of enterprise architecture (EA) governance?

A.

To ensure new processes and technologies harmonize with existing processes

B.

To ensure the EA can adapt to emerging technology trends

C.

To ensure the EA is compliant with local laws and regulations

D.

To ensure new initiatives produce an acceptable return on investment (ROI)

Full Access
Question # 102

Which of the following is the BEST indicator that a third-party vendor adheres to the controls required by the organization?

A.

Review of monthly performance reports submitted by the vendor

B.

Certifications maintained by the vendor

C.

Regular independent assessment of the vendor

D.

Substantive log file review of the vendor ' s system

Full Access
Question # 103

Which of the following is a PRIMARY benefit of an integrated audit?

A.

It enhances audit quality assurance (QA).

B.

It optimizes audit efforts across various functions.

C.

It ensures the improvement of auditor skills and competencies.

D.

It is suited for different business areas within organizations of any size.

Full Access
Question # 104

An organization ' s IT department and internal IS audit function all report to the chief information officer (CIO). Which of the following is the GREATEST concern associated with this reporting structure?

A.

Potential for inaccurate audit findings

B.

Compromise of IS audit independence

C.

IS audit resources being shared with other IT functions

D.

IS audit being isolated from other audit functions

Full Access
Question # 105

An IS auditor is reviewing an organization ' s risk management program. Which of the following should be the PRIMARY driver of the enterprise IT risk appetite?

A.

Strategic objectives

B.

Return on investment (ROI)

C.

Cost of implementing controls

D.

Likelihood of risk events

Full Access
Question # 106

If a source code is not recompiled when program changes are implemented, which of the following is a compensating control to ensure synchronization of source and object?

A.

Comparison of object and executable code

B.

Review of audit trail of compile dates

C.

Comparison of date stamping of source and object code

D.

Review of developer comments in executable code

Full Access
Question # 107

A credit card company has decided to outsource the printing of customer statements It Is MOST important for the company to verify whether:

A.

the provider has alternate service locations.

B.

the contract includes compensation for deficient service levels.

C.

the provider ' s information security controls are aligned with the company ' s.

D.

the provider adheres to the company ' s data retention policies.

Full Access
Question # 108

Which of the following should be an IS auditor ' s GREATEST concern when a data owner assigns an incorrect classification level to data?

A.

Controls to adequately safeguard the data may not be applied.

B.

Data may not be encrypted by the system administrator.

C.

Competitors may be able to view the data.

D.

Control costs may exceed the intrinsic value of the IT asset.

Full Access
Question # 109

Which of the following should be of GREATEST concern to an IS auditor who is assessing an organization ' s configuration and release management process?

A.

The organization does not use an industry-recognized methodology

B.

Changes and change approvals are not documented

C.

All changes require middle and senior management approval

D.

There is no centralized configuration management database (CMDB)

Full Access
Question # 110

An IS auditor conducts a review of a third-party vendor ' s reporting of key performance indicators (KPIs) Which of the following findings should be of MOST concern to the auditor?

A.

KPI data is not being analyzed

B.

KPIs are not clearly defined

C.

Some KPIs are not documented

D.

KPIs have never been updated

Full Access
Question # 111

What should an IS auditor ensure when a financial organization intends to utilize production data in the testing environment?

A.

The data utilized is de-identified.

B.

The data utilized is accurate.

C.

The data utilized is complete.

D.

The data utilized is current.

Full Access
Question # 112

What is the PRIMARY purpose of performing a parallel run of a now system?

A.

To train the end users and supporting staff on the new system

B.

To verify the new system provides required business functionality

C.

To reduce the need for additional testing

D.

To validate the new system against its predecessor

Full Access
Question # 113

When testing the accuracy of transaction data, which of the following situations BEST justifies the use of a smaller sample size?

A.

The IS audit staff has a high level of experience.

B.

It is expected that the population is error-free.

C.

Proper segregation of duties is in place.

D.

The data can be directly changed by users.

Full Access
Question # 114

Which of the following is a PRIMARY benefit of using risk assessments to determine areas to be included in an audit plan?

A.

Timely audit execution

B.

Effective allocation of audit resources

C.

Reduced travel and expense costs

D.

Effective risk mitigation

Full Access
Question # 115

Which of the following is the BEST way to detect unauthorized copies of licensed software on systems?

A.

Implement controls to prohibit downloads of unauthorized software.

B.

Conduct periodic software scanning.

C.

Perform periodic counting of licenses.

D.

Require senior management approval when installing licenses.

Full Access
Question # 116

An organization has both an IT strategy committee and an IT steering committee. When reviewing the minutes of the IT steering committee, an IS auditor would expect to find that the

committee:

A.

assessed the contribution of IT to the business.

B.

acquired and assigned appropriate resources for projects.

C.

compared the risk and return of IT investments.

D.

reviewed the achievement of the strategic IT objective.

Full Access
Question # 117

Which of the following methods BEST enforces data leakage prevention in a multi-tenant cloud environment?

A.

Monitoring tools are configured to alert in case of downtime

B.

A comprehensive security review is performed every quarter.

C.

Data for different tenants is segregated by database schema

D.

Tenants are required to implement data classification polices

Full Access
Question # 118

Which of the following is MOST appropriate to prevent unauthorized retrieval of confidential information stored in a business application system?

A.

Apply single sign-on for access control

B.

Implement segregation of duties.

C.

Enforce an internal data access policy.

D.

Enforce the use of digital signatures.

Full Access
Question # 119

Which of the following is the PRIMARY objective of performing quality assurance (QA) in a system development process?

A.

To ensure that expected benefits have been realized

B.

To ensure the developed system meets business requirements

C.

To ensure the developed system integrates well with another system

D.

To help determine high-level requirements for the new system

Full Access
Question # 120

The operations team of an organization has reported an IS security attack Which of the following should be the FIRST step for the security incident response team?

A.

Report results to management

B.

Document lessons learned

C.

Perform a damage assessment

D.

Prioritize resources for corrective action

Full Access
Question # 121

What would be the PRIMARY reason an IS auditor would recommend replacing universal PIN codes with an RFID access card system at a data center?

A.

To improve traceability

B.

To prevent piggybacking

C.

To implement multi-factor authentication

D.

To reduce maintenance costs

Full Access
Question # 122

During an operational audit on the procurement department, the audit team encounters a key system that uses an artificial intelligence (Al) algorithm. The audit team does not have the necessary knowledge to proceed with the audit. Which of the following is the BEST way to handle this situation?

A.

Perform a skills assessment to identify members from other business units with knowledge of Al.

B.

Remove the Al portion from the audit scope and proceed with the audit.

C.

Delay the audit until the team receives training on Al.

D.

Engage external consultants who have audit experience and knowledge of Al.

Full Access
Question # 123

An IS auditor is following up on prior period items and finds management did not address an audit finding. Which of the following should be the IS auditor ' s NEXT course of action?

A.

Note the exception in a new report as the item was not addressed by management.

B.

Recommend alternative solutions to address the repeat finding.

C.

Conduct a risk assessment of the repeat finding.

D.

Interview management to determine why the finding was not addressed.

Full Access
Question # 124

Which of the following is the PRIMARY benefit of implementing an IT capacity management process?

A.

Ensuring infrastructure meets current performance requirements

B.

Enabling rapid deployment of new software applications

C.

Helping resolve significant security concerns

D.

Reducing the cost and time to implement IT services

Full Access
Question # 125

An IS audit review identifies inconsistencies in privacy requirements across third-party service provider contracts. Which of the following is the BEST

recommendation to address this situation?

A.

Suspend contracts with third-party providers that handle sensitive data.

B.

Prioritize contract amendments for third-party providers.

C.

Review privacy requirements when contracts come up for renewal.

D.

Require third-party providers to sign nondisclosure agreements (NDAs).

Full Access
Question # 126

In response to an audit finding regarding a payroll application, management implemented a new automated control. Which of the following would be MOST helpful to the IS auditor when evaluating the effectiveness of the new control?

A.

Approved test scripts and results prior to implementation

B.

Written procedures defining processes and controls

C.

Approved project scope document

D.

A review of tabletop exercise results

Full Access
Question # 127

Which of the following should be of GREATEST concern to an IS auditor reviewing an organization ' s mobile device policies and controls in its corporate environment?

A.

The mobile authentication policy requires biometrics.

B.

The virtual private network (VPN) policy is not enabled for the internal corporate network.

C.

Not all active devices are enrolled in mobile device management (MDM).

D.

Remote wipe and lock features are only available with access to the internet.

Full Access
Question # 128

When evaluating whether the expected benefits of a project have been achieved, it is MOST important for an IS auditor to review:

A.

The business case.

B.

The project schedule.

C.

Proposed enhancements.

D.

Quality assurance (QA) results.

Full Access
Question # 129

A system experiences multiple recurring processing errors. Which of the following is the PRIMARY concern for an IS auditor?

A.

Inefficient incident management

B.

Lack of problem management

C.

Lack of change management

D.

Inefficient project management

Full Access
Question # 130

Using swipe cards to limit employee access to restricted areas requires implementing which additional control?

A.

Physical sign-in of all employees for access to restricted areas

B.

Implementation of additional PIN pads

C.

Periodic review of access profiles by management

D.

Installation of closed-circuit television (CCTV)

Full Access
Question # 131

Which of the following will be the MOST effective method to verify that a service vendor keeps control levels as required by the client?

A.

Conduct periodic on-site assessments using agreed-upon criteria.

B.

Periodically review the service level agreement (SLA) with the vendor.

C.

Conduct an unannounced vulnerability assessment of vendor ' s IT systems.

D.

Obtain evidence of the vendor ' s control self-assessment (CSA).

Full Access
Question # 132

Which of the following is the BEST control to help ensure the completeness of outbound transactions?

A.

Perform edit checks to identify erroneous, unusual, or invalid transactions.

B.

Verify transactions are sequentially numbered in the header record.

C.

Ensure the validity of the recipient ID and use auto-numbered reports.

D.

Maintain a log of the number of messages sent and validate periodically.

Full Access
Question # 133

When auditing the closing stages of a system development protect which of the following should be the MOST important consideration?

A.

Control requirements

B.

Rollback procedures

C.

Functional requirements documentation

D.

User acceptance lest (UAT) results

Full Access
Question # 134

Which of the following user actions poses the GREATEST risk for inadvertently introducing malware into a local network?

A.

Uploading a file onto an internal server

B.

Viewing a hypertext markup language (HTML) document

C.

Downloading a file from an enterprise file share

D.

Opening an email attachment from an external account

Full Access
Question # 135

An IS auditor has discovered that a software system still in regular use is years out of date and no longer supported the auditee has stated that it will take six months until the software is running on the current version. Which of the following is the BEST way to reduce the immediate risk associated with using an unsupported version of the software?

A.

Verify all patches have been applied to the software system ' s outdated version

B.

Close all unused ports on the outdated software system.

C.

Segregate the outdated software system from the main network.

D.

Monitor network traffic attempting to reach the outdated software system.

Full Access
Question # 136

Which of the following Is the BEST way to ensure payment transaction data is restricted to the appropriate users?

A.

Implementing two-factor authentication

B.

Restricting access to transactions using network security software

C.

implementing role-based access at the application level

D.

Using a single menu tor sensitive application transactions

Full Access
Question # 137

An organization has replaced all of the storage devices at its primary data center with new higher-capacity units The replaced devices have been installed at the disaster recovery site to replace older units An IS auditor s PRIMARY concern would be whether

A.

the recovery site devices can handle the storage requirements

B.

hardware maintenance contract is in place for both old and new storage devices

C.

the procurement was in accordance with corporate policies and procedures

D.

the relocation plan has been communicated to all concerned parties

Full Access
Question # 138

Which of the following would provide the BEST evidence of an IT strategy corrections effectiveness?

A.

The minutes from the IT strategy committee meetings

B.

Synchronization of IT activities with corporate objectives

C.

The IT strategy committee charier

D.

Business unit satisfaction survey results

Full Access
Question # 139

An organization has partnered with a third party to transport backup drives to an offsite storage facility. Which of the following is MOST important before sending the drives?

A.

Creating a chain of custody to accompany the drive in transit

B.

Ensuring data protection is aligned with the data classification policy

C.

Encrypting the drive with strong protection standards

D.

Ensuring the drive is placed in a tamper-evident mechanism

Full Access
Question # 140

Which of the following is the BEST recommendation to prevent fraudulent electronic funds transfers by accounts payable employees?

A.

Periodic vendor reviews

B.

Dual control

C.

Independent reconciliation

D.

Re-keying of monetary amounts

E.

Engage an external security incident response expert for incident handling.

Full Access
Question # 141

Which of the following BEST enables alignment of IT with business objectives?

A.

Benchmarking against peer organizations

B.

Developing key performance indicators (KPIs)

C.

Completing an IT risk assessment

D.

Leveraging an IT governance framework

Full Access
Question # 142

An organization is planning an acquisition and has engaged an IS auditor lo evaluate the IT governance framework of the target company. Which of the following would be MOST helpful In determining the effectiveness of the framework?

A.

Sell-assessment reports of IT capability and maturity

B.

IT performance benchmarking reports with competitors

C.

Recent third-party IS audit reports

D.

Current and previous internal IS audit reports

Full Access
Question # 143

A system administrator recently informed the IS auditor about the occurrence of several unsuccessful intrusion attempts from outside the organization. Which of the following is MOST effective in detecting such an intrusion?

A.

Periodically reviewing log files

B.

Configuring the router as a firewall

C.

Using smart cards with one-time passwords

D.

Installing biometrics-based authentication

Full Access
Question # 144

An organization has introduced a capability maturity model to the system development life cycle (SDLC) to measure improvements. Which of the following is the BEST indication of successful process improvement?

A.

Evaluation results align with defined business goals

B.

Process maturity reaches the highest state of process optimization.

C.

Evaluation results exceed process maturity benchmarks against competitors.

D.

Processes demonstrate the mitigation of inherent business risk.

Full Access
Question # 145

One benefit of return on investment (ROI) analysts in IT decision making is that it provides the:

A.

basis for allocating indirect costs.

B.

cost of replacing equipment.

C.

estimated cost of ownership.

D.

basis for allocating financial resources.

Full Access
Question # 146

Which of the following is MOST likely to be a project deliverable of an agile software development methodology?

A.

Strictly managed software requirements baselines

B.

Extensive project documentation

C.

Automated software programming routines

D.

Rapidly created working prototypes

Full Access
Question # 147

Which of the following system attack methods is executed by entering malicious code into the search box of a vulnerable website, causing the server to reveal restricted information?

A.

Man-m-the-middle

B.

Denial of service (DoS)

C.

SQL injection

D.

Cross-site scripting

Full Access
Question # 148

The record-locking option of a database management system (DBMS) serves to.

A.

eliminate the risk of concurrent updates to a record

B.

allow database administrators (DBAs) to record the activities of users.

C.

restrict users from changing certain values within records.

D.

allow users to lock others out of their files.

Full Access
Question # 149

Which of the following IT service management activities is MOST likely to help with identifying the root cause of repeated instances of network latency?

A.

Change management

B.

Problem management

C.

incident management

D.

Configuration management

Full Access
Question # 150

Which of the following is MOST important for an IS auditor to assess during a post-implementation review of a newly modified IT application developed in-house?

A.

Sufficiency of implemented controls

B.

Resource management plan

C.

Updates required for end-user manuals

D.

Rollback plans for changes

Full Access
Question # 151

Which of the following should an IS auditor recommend as a PRIMARY area of focus when an organization decides to outsource technical support for its external customers?

A.

Align service level agreements (SLAs) with current needs.

B.

Monitor customer satisfaction with the change.

C.

Minimize costs related to the third-party agreement.

D.

Ensure right to audit is included within the contract.

Full Access
Question # 152

A vendor requires privileged access to a key business application. Which of the following is the BEST recommendation to reduce the risk of data leakage?

A.

Implement real-time activity monitoring for privileged roles

B.

Include the right-to-audit in the vendor contract

C.

Perform a review of privileged roles and responsibilities

D.

Require the vendor to implement job rotation for privileged roles

Full Access
Question # 153

Which of the following is an IS auditor ' s BEST recommendation to protect an organization from attacks when its file server needs to be accessible to external users?

A.

Enforce a secure tunnel connection.

B.

Enhance internal firewalls.

C.

Set up a demilitarized zone (DMZ).

D.

Implement a secure protocol.

Full Access
Question # 154

Which of the following performance management tools BEST helps an IS auditor evaluate the success of an organization’s IT strategy implementation and execution?

A.

IT benchmarking

B.

Capability maturity model

C.

Six Sigma

D.

IT metrics dashboard

Full Access
Question # 155

Which of the following should be the IS auditor ' s PRIMARY focus, when evaluating an organization ' s offsite storage facility?

A.

Shared facilities

B.

Adequacy of physical and environmental controls

C.

Results of business continuity plan (BCP) test

D.

Retention policy and period

Full Access
Question # 156

An IS auditor assessing the controls within a newly implemented call center would First

A.

gather information from the customers regarding response times and quality of service.

B.

review the manual and automated controls in the call center.

C.

test the technical infrastructure at the call center.

D.

evaluate the operational risk associated with the call center.

Full Access
Question # 157

When planning an audit to assess controls for an application in the cloud environment, it is MOST important for an IS auditor to understand:

A.

The noncompliance fee for violating a service level agreement (SLA).

B.

Availability reports from the cloud platform architecture.

C.

The shared responsibility model between cloud provider and organization.

D.

Business process reengineering that is supported by the cloud system.

Full Access
Question # 158

An IS auditor will be testing accounts payable controls by performing data analytics on the entire population of transactions. Which of the following is MOST important for the auditor to confirm when sourcing the population data?

A.

The data is taken directly from the system.

B.

There is no privacy information in the data.

C.

The data can be obtained in a timely manner.

D.

The data analysis tools have been recently updated.

Full Access
Question # 159

Which of the following is the GREATEST risk if two users have concurrent access to the same database record?

A.

Availability integrity

B.

Data integrity

C.

Entity integrity

D.

Referential integrity

Full Access
Question # 160

An IS auditor reviewing an organization’s IT systems finds that the organization frequently purchases systems that are incompatible with the technologies already in the organization. Which of the following is the MOST likely reason?

A.

Ineffective risk management policy

B.

Lack of enterprise architecture (EA)

C.

Lack of a maturity model

D.

Outdated enterprise resource planning (ERP) system

Full Access
Question # 161

Which of the following BEST indicates that the effectiveness of an organization ' s security awareness program has improved?

A.

A decrease in the number of information security audit findings

B.

An increase in the number of staff who complete awareness training

C.

An increase in the number of phishing emails reported by employees

D.

A decrease in the number of malware outbreaks

Full Access
Question # 162

Which of the following would the IS auditor MOST likely review to determine whether modifications to the operating system parameters were authorized?

A.

Documentation of exit routines

B.

System initialization logs

C.

Change control log

D.

Security system parameters

Full Access
Question # 163

In which phase of the internal audit process is contact established with the individuals responsible for the business processes in scope for review?

A.

Planning phase

B.

Execution phase

C.

Follow-up phase

D.

Selection phase

Full Access
Question # 164

An IS auditor is reviewing an organizations release management practices and observes inconsistent and inaccurate estimation of the size and complexity of business application development projects. Which of the following should the auditor recommend to address this issue?

A.

Critical path methodology

B.

Agile development approach

C.

Function point analysis

D.

Rapid application development

Full Access
Question # 165

Which of the following system redundancy configurations BEST improves system resiliency and reduces the possibility of a single cause of failure impacting system dependability?

A.

Active redundancy

B.

Homogeneous redundancy

C.

Diverse redundancy

D.

Passive redundancy

Full Access
Question # 166

Which of the following would be to MOST concern when determine if information assets are adequately safequately safeguarded during transport and disposal?

A.

Lack of appropriate labelling

B.

Lack of recent awareness training.

C.

Lack of password protection

D.

Lack of appropriate data classification

Full Access
Question # 167

An organization ' s software developers need access to personally identifiable information (Pll) stored in a particular data format. Which of the following is the BEST way to protect this sensitive information while allowing the developers to use it in development and test environments?

A.

Data masking

B.

Data tokenization

C.

Data encryption

D.

Data abstraction

Full Access
Question # 168

An IS auditor is reviewing an organization ' s cloud access security broker (CASB) solution. Which ofthe following is MOST important for the auditor to verify?

A.

Cloud services are classified.

B.

Users are centrally managed.

C.

Cloud processes are resilient.

D.

Users are periodically recertified.

Full Access
Question # 169

During the review of a system disruption incident, an IS auditor notes that IT support staff were put in a position to make decisions beyond their level of authority.

Which of the following is the BEST recommendation to help prevent this situation in the future?

A.

Introduce escalation protocols.

B.

Develop a competency matrix.

C.

Implement fallback options.

D.

Enable an emergency access ID.

Full Access
Question # 170

Which of the following findings from a network security review presents the GREATEST risk to the organization?

A.

There are shared administrator accounts on internet-facing routers.

B.

An internet server in the demilitarized zone (DMZ) hosts a test web page.

C.

Operating system patches released last week have not been applied.

D.

The intrusion detection system (IDS) has pending updates from within the last week.

Full Access
Question # 171

Which of the following is the BEST reason for an IS auditor to emphasize to management the importance of using an IT governance framework?

A.

Frameworks enable IT benchmarks against competitors

B.

Frameworks can be tailored and optimized for different organizations

C.

Frameworks help facilitate control self-assessments (CSAs)

D.

Frameworks help organizations understand and manage IT risk

Full Access
Question # 172

A staff accountant regularly uploads spreadsheets with inventory levels to the organization ' s financial reporting system. The transfers are executed through a customized interface created by an in-house developer. Which of the following is MOST important for the IS auditor to confirm during a review of the interface?

A.

The data in the spreadsheet is correctly recorded in the financial system.

B.

The financial system transfers are performed by the accountant at predefined intervals.

C.

The spreadsheets do not contain malware or malicious macros.

D.

The data transfer connection does not support full duplex communication.

Full Access
Question # 173

Which of the following is MOST important to ensure when planning a black box penetration test?

A.

The management of the client organization is aware of the testing.

B.

The test results will be documented and communicated to management.

C.

The environment and penetration test scope have been determined.

D.

Diagrams of the organization ' s network architecture are available.

Full Access
Question # 174

Which of the following is the MOST effective way for an IS auditor to ensure information is preserved when conducting a forensic investigation?

A.

Harden computer hardware and software.

B.

Image residual data and deleted files.

C.

Encode system logs and intrusion detection system (IDS) logs.

D.

Document all application programming interface (API) connections with third parties.

Full Access
Question # 175

Which of the following will be the MOST effective method to verify that a service vendor keeps control levels as required by the client?

A.

Conduct periodic onsite assessments using agreed-upon criteria.

B.

Conduct an unannounced vulnerability assessment of the vendor’s IT systems.

C.

Periodically review the service level agreement (SLA) with the vendor.

D.

Obtain evidence of the vendor ' s control self-assessment (CSA).

Full Access
Question # 176

Which of the following controls is MOST important for ensuring the integrity of system interfaces?

A.

Periodic audits

B.

File counts

C.

File checksums

D.

IT operator monitoring

Full Access
Question # 177

Which of the following BEST describes the concept of fault tolerance in system resiliency?

A.

It enables switching to redundant systems in case of faults.

B.

It minimizes downtime and ensures continuous operations.

C.

It allows systems to continue operating in the presence of faults.

D.

It distributes workloads across multiple servers to prevent overload.

Full Access
Question # 178

Data from a system of sensors located outside of a network is received by the open ports on a server. Which of the following is the BEST way to ensure the integrity of the data being collected from the sensor system?

A.

Route the traffic from the sensor system through a proxy server.

B.

Hash the data that is transmitted from the sensor system.

C.

Implement network address translation on the sensor system.

D.

Transmit the sensor data via a virtual private network (VPN) to the server.

Full Access
Question # 179

A bank performed minor changes to the interest calculation computer program. Which of the following techniques would provide the STRONGEST evidence to determine whether the interest calculations are correct?

A.

Source code review

B.

Parallel simulation using audit software

C.

Manual verification of a sample of the results

D.

Review of the quality assurance (QA) test results

Full Access
Question # 180

A secure server room has a badge reader system that records name, date, and time information whenever a staff member uses a badge to enter or exit. When reviewing the system logs, an IS auditor notices records for some employees entering, but not exiting, the room. Which of the following would be the MOST effective compensating control to recommend?

A.

Installing security cameras at the doors

B.

Changing to a biometric access control system

C.

Implementing a monitored mantrap at entrance and exit points

D.

Requiring two-factor authentication at entrance and exit points

Full Access
Question # 181

Which of the following is the GREATEST benefit of adopting an Agile audit methodology?

A.

Better ability to address key risks

B.

Less frequent client interaction

C.

Annual cost savings

D.

Reduced documentation requirements

Full Access
Question # 182

An IS auditor discovers that validation controls m a web application have been moved from the server side into the browser to boost performance This would MOST likely increase the risk of a successful attack by.

A.

phishing.

B.

denial of service (DoS)

C.

structured query language (SQL) injection

D.

buffer overflow

Full Access
Question # 183

An IS auditor is planning an audit of an organization ' s accounts payable processes. Which of the following controls is MOST important to assess in the audit?

A.

Segregation of duties between issuing purchase orders and making payments.

B.

Segregation of duties between receiving invoices and setting authorization limits

C.

Management review and approval of authorization tiers

D.

Management review and approval of purchase orders

Full Access
Question # 184

Which of the following is MOST helpful for measuring benefits realization for a new system?

A.

Function point analysis

B.

Balanced scorecard review

C.

Post-implementation review

D.

Business impact analysis (BIA)

Full Access
Question # 185

An IS audit manager was temporarily tasked with supervising a project manager assigned to the organization ' s payroll application upgrade. Upon returning to the audit department, the audit manager has been asked to perform an audit to validate the implementation of the payroll application. The audit manager is the only one in the audit department with IT project management

experience. What is the BEST course of action?

A.

Transfer the assignment to a different audit manager despite lack of IT project management experience.

B.

Outsource the audit to independent and qualified resources.

C.

Manage the audit since there is no one else with the appropriate experience.

D.

Have a senior IS auditor manage the project with the IS audit manager performing final review.

Full Access
Question # 186

A system development project is experiencing delays due to ongoing staff shortages. Which of the following strategies would provide the GREATEST assurance of system quality at implementation?

A.

Implement overtime pay and bonuses for all development staff.

B.

Utilize new system development tools to improve productivity.

C.

Recruit IS staff to expedite system development.

D.

Deliver only the core functionality on the initial target date.

Full Access
Question # 187

What is the MOST effective way to detect installation of unauthorized software packages by employees?

A.

Regular scanning of hard drives

B.

Communicating the policy to employees

C.

Logging of activity on the network

D.

Maintaining current antivirus software

Full Access
Question # 188

Which of the following audit evidence collection procedures is MOST reliable?

A.

Inspecting paper documentation obtained from an independent third party

B.

Inspecting system-generated evidence provided by a control owner

C.

Examining critical data received from an auditee

D.

Performing manual procedures independently from a control owner

Full Access
Question # 189

Which of the following is MOST important for an IS auditor to consider when performing the risk assessment poor to an audit engagement?

A.

The design of controls

B.

Industry standards and best practices

C.

The results of the previous audit

D.

The amount of time since the previous audit

Full Access
Question # 190

An IS auditor reviewing a job scheduling tool notices performance and reliability problems. Which of the following is MOST likely affecting the tool?

A.

Administrator passwords do not meet organizational security and complexity requirements.

B.

The number of support staff responsible for job scheduling has been reduced.

C.

The scheduling tool was not classified as business-critical by the IT department.

D.

Maintenance patches and the latest enhancement upgrades are missing.

Full Access
Question # 191

An IS auditor is reviewing documentation of application systems change control and identifies several patches that were not tested before being put into production. Which of the following is the MOST significant risk from this situation?

A.

Loss of application support

B.

Lack of system integrity

C.

Outdated system documentation

D.

Developer access 1o production

Full Access
Question # 192

Which of the following security risks can be reduced by a property configured network firewall?

A.

SQL injection attacks

B.

Denial of service (DoS) attacks

C.

Phishing attacks

D.

Insider attacks

Full Access
Question # 193

Which of the following provides the BEST evidence that IT portfolio management is aligned with organizational strategies?

A.

Finance committee minutes that include approval for the annual IT budget

B.

Project sponsor sign-off on all project documents from beginning to end

C.

IT steering committee minutes that include approval for prioritization of IT projects

D.

Project sponsor sign-off on IT project proposals and milestones

Full Access
Question # 194

Which of the following is MOST important to consider when scheduling follow-up audits?

A.

The efforts required for independent verification with new auditors

B.

The impact if corrective actions are not taken

C.

The amount of time the auditee has agreed to spend with auditors

D.

Controls and detection risks related to the observations

Full Access
Question # 195

Which of the following is MOST important to consider when developing a service level agreement (SLAP)?

A.

Description of the services from the viewpoint of the provider

B.

Detailed identification of work to be completed

C.

Provisions for regulatory requirements that impact the end users ' businesses

D.

Description of the services from the viewpoint of the client organization

Full Access
Question # 196

Job scheduling impacts system availability and reliability by:

A.

Reducing system downtime.

B.

Ensuring flexibility and scalability.

C.

Optimizing resource utilization.

D.

Decreasing system complexity.

Full Access
Question # 197

Which of the following can only be provided by asymmetric encryption?

A.

Information privacy

B.

256-brt key length

C.

Data availability

D.

Nonrepudiation

Full Access
Question # 198

An audit has identified that business units have purchased cloud-based applications without IPs support. What is the GREATEST risk associated with this situation?

A.

The applications are not included in business continuity plans (BCFs)

B.

The applications may not reasonably protect data.

C.

The application purchases did not follow procurement policy.

D.

The applications could be modified without advanced notice.

Full Access
Question # 199

An IS auditor is assessing backup performance and observes that the system administrator manually initiates backups during unexpected peak usage. Which of the following is the auditor ' s BEST course of action?

A.

Review separation of duties documentation.

B.

Verify the load balancer configuration.

C.

Recommend using cloud-based backups.

D.

Inspect logs to verify timely execution of backups.

Full Access
Question # 200

Which of the following BEST demonstrates to senior management and the board that an audit function is compliant with standards and the code of ethics?

A.

Audit staff interviews

B.

Quality control reviews

C.

Control self-assessments (CSAs)

D.

Corrective action plans

Full Access
Question # 201

An IS auditor is reviewing a machine learning (ML) model that predicts the likelihood that a user will watch a certain movie. Which of the following would be of GREATEST concern to the auditor?

A.

An open source programming language was used to develop the model.

B.

The model was tested with data drawn from the same population as the training data.

C.

When the model was tested with data drawn from a different population, the accuracy decreased.

D.

The dataset for training the model was obtained from an unreliable source.

Full Access
Question # 202

A white box testing method is applicable with which of the following testing processes?

A.

Integration testing

B.

Parallel testing

C.

Sociability testing

D.

User acceptance testing (UAT)

Full Access
Question # 203

An organization that processes credit card information employs a remote workforce. Which of the following is the MOST effective way to mitigate risk associated with data exfiltration?

A.

Require employees to sign acknowledgment of the data security policy.

B.

Deploy a data loss prevention (DLP) system.

C.

Enable a web application firewall (WAF) along with an intrusion detection system (IDS).

D.

Implement a security information and event management (SIEM) solution.

Full Access
Question # 204

When auditing an organization ' s software acquisition process the BEST way for an IS auditor to understand the software benefits to the organization would be to review the

A.

feasibility study

B.

business case

C.

request for proposal (RFP)

D.

alignment with IT strategy

Full Access
Question # 205

What is the GREATEST concern for an IS auditor reviewing contracts for licensed software that executes a critical business process?

A.

The contract does not contain a right-to-audit clause.

B.

An operational level agreement (OLA) was not negotiated.

C.

Several vendor deliverables missed the commitment date.

D.

Software escrow was not negotiated.

Full Access
Question # 206

Which of the following controls helps to ensure that data extraction queries run by the database administrator (DBA) are monitored?

A.

Restricting access to DBA activities

B.

Performing periodic access reviews

C.

Storing logs of database access

D.

Reviewing activity logs of the DBA

Full Access
Question # 207

Which of the following is the MOST important privacy consideration for an organization that uses a cloud service provider to process customer data?

A.

Data privacy must be managed in accordance with the regulations applicable to the organization.

B.

Data privacy must be monitored in accordance with industry standards and best practices.

C.

No personal information may be transferred to the service provider without notifying the customer.

D.

Customer data transferred to the service provider must be reported to the regulatory authority.

Full Access
Question # 208

An IS auditor finds that capacity management for a key system is being performed by IT with no input from the business The auditor ' s PRIMARY concern would be:

A.

failure to maximize the use of equipment

B.

unanticipated increase in business s capacity needs.

C.

cost of excessive data center storage capacity

D.

impact to future business project funding.

Full Access
Question # 209

Which of the following is the MOST effective way for an organization to project against data loss?

A.

Limit employee internet access.

B.

Implement data classification procedures.

C.

Review firewall logs for anomalies.

D.

Conduct periodic security awareness training.

Full Access
Question # 210

Management is concerned about sensitive information being intentionally or unintentionally emailed as attachments outside the organization by employees. What is the MOST important task before implementing any associated email controls?

A.

Require all employees to sign nondisclosure agreements (NDAs).

B.

Develop an acceptable use policy for end-user computing (EUC).

C.

Develop an information classification scheme.

D.

Provide notification to employees about possible email monitoring.

Full Access
Question # 211

An IS auditor is reviewing a client ' s outsourced payroll system to assess whether the financial audit team can rely on the application. Which of the following findings would be the auditor ' s

GREATEST concern?

A.

User access rights have not been periodically reviewed by the client.

B.

Payroll processing costs have not been included in the IT budget.

C.

The third-party contract has not been reviewed by the legal department.

D.

The third-party contract does not comply with the vendor management policy.

Full Access
Question # 212

An IS auditor finds that firewalls are outdated and not supported by vendors. Which of the following should be the auditor ' s NEXT course of action?

A.

Report the mitigating controls.

B.

Report the security posture of the organization.

C.

Determine the value of the firewall.

D.

Determine the risk of not replacing the firewall.

Full Access
Question # 213

Which of the following parameters reflects the risk threshold for an organization experiencing a service disruption?

A.

Maximum tolerable outage (MTO)

B.

Recovery point objective (RPO)

C.

Service delivery objective (SDO)

D.

Allowable interruption window (AIW)

Full Access
Question # 214

An organization performs virtual machine (VM) replication instead of daily backups of its critical servers. Which of the following is MOST important to validate when evaluating the adequacy of recovery procedures?

A.

Replication servers are located offsite.

B.

Periodic testing of VM replication is completed.

C.

VM load balancing is configured.

D.

Internet access is restricted for VM backup administrators.

Full Access
Question # 215

When auditing the alignment of IT to the business strategy, it is MOST Important for the IS auditor to:

A.

compare the organization ' s strategic plan against industry best practice.

B.

interview senior managers for their opinion of the IT function.

C.

ensure an IT steering committee is appointed to monitor new IT projects.

D.

evaluate deliverables of new IT initiatives against planned business services.

Full Access
Question # 216

An IS auditor discovers that backups of critical systems are not being performed in accordance with the recovery point objective (RPO) established in the business continuity plan (BCP). What should the auditor do NEXT?

A.

Request an immediate backup be performed.

B.

Expand the audit scope.

C.

Identify the root cause.

D.

Include the observation in the report.

Full Access
Question # 217

When physical destruction IS not practical, which of the following is the MOST effective means of disposing of sensitive data on a hard disk?

A.

Overwriting multiple times

B.

Encrypting the disk

C.

Reformatting

D.

Deleting files sequentially

Full Access
Question # 218

An incorrect version of the source code was amended by a development team. This MOST likely indicates a weakness in:

A.

incident management.

B.

quality assurance (QA).

C.

change management.

D.

project management.

Full Access
Question # 219

Which of the following is MOST important to consider when assessing the scope of privacy concerns for an IT project?

A.

Data ownership

B.

Applicable laws and regulations

C.

Business requirements and data flows

D.

End-user access rights

Full Access
Question # 220

The PRIMARY objective of a control self-assessment (CSA) is to:

A.

educate functional areas on risks and controls.

B.

ensure appropriate access controls are implemented.

C.

eliminate the audit risk by leveraging management ' s analysis.

D.

gain assurance for business functions that cannot be audited.

Full Access
Question # 221

Which of the following BEST indicates a need to review an organization ' s information security policy?

A.

High number of low-risk findings in the audit report

B.

Increasing exceptions approved by management

C.

Increasing complexity of business transactions

D.

Completion of annual IT risk assessment

Full Access
Question # 222

An online retailer is receiving customer complaints about receiving different items from what they ordered on the organization ' s website. The root cause has been traced to poor data quality. Despite efforts to clean erroneous data from the system, multiple data quality issues continue to occur. Which of the following recommendations would be the BEST way to reduce the likelihood of future occurrences?

A.

Assign responsibility for improving data quality.

B.

Invest in additional employee training for data entry.

C.

Outsource data cleansing activities to reliable third parties.

D.

Implement business rules to validate employee data entry.

Full Access
Question # 223

A current project to develop IT-based solutions will need additional funding to meet changes in business requirements. Who is BEST suited to obtain this additional funding?

A.

Project sponsor

B.

Project manager

C.

IT strategy committee

D.

Board of directors

Full Access
Question # 224

An organization has made a strategic decision to split into separate operating entities to improve profitability. However, the IT infrastructure remains shared between the entities. Which of the following would BEST help to ensure that IS audit still covers key risk areas within the IT environment as part of its annual plan?

A.

Increasing the frequency of risk-based IS audits for each business entity

B.

Developing a risk-based plan considering each entity ' s business processes

C.

Conducting an audit of newly introduced IT policies and procedures

D.

Revising IS audit plans to focus on IT changes introduced after the split

Full Access
Question # 225

The PRIMARY benefit lo using a dry-pipe fire-suppression system rather than a wet-pipe system is that a dry-pipe system:

A.

is more effective at suppressing flames.

B.

allows more time to abort release of the suppressant.

C.

has a decreased risk of leakage.

D.

disperses dry chemical suppressants exclusively.

Full Access
Question # 226

Which of the following will BEST ensure that archived electronic information of permanent importance remains accessible over time?

A.

Performing preventive maintenance on old hardware

B.

Acquiring applications that emulate old software

C.

Regularly migrating data to current technology

D.

Periodically backing up archived data

Full Access
Question # 227

An IS auditor follows up on a recent security incident and finds the incident response was not adequate. Which of the following findings should be considered MOST critical?

A.

The security weakness facilitating the attack was not identified.

B.

The attack was not automatically blocked by the intrusion detection system (IDS).

C.

The attack could not be traced back to the originating person.

D.

Appropriate response documentation was not maintained.

Full Access
Question # 228

In an IT organization where many responsibilities are shared which of the following is the BEST control for detecting unauthorized data changes?

A.

Users are required to periodically rotate responsibilities

B.

Segregation of duties conflicts are periodically reviewed

C.

Data changes are independently reviewed by another group

D.

Data changes are logged in an outside application

Full Access
Question # 229

An IS auditor plans to review all access attempts to a video-monitored and proximity card-controlled communications room. Which of the following would be MOST useful to the auditor?

A.

Alarm system with CCTV

B.

Access control log

C.

Security incident log

D.

Access card allocation records

Full Access
Question # 230

In a review of the organization standards and guidelines for IT management, which of the following should be included in an IS development methodology?

A.

Value-added activity analysis

B.

Risk management techniques

C.

Access control rules

D.

Incident management techniques

Full Access
Question # 231

The IS quality assurance (OA) group is responsible for:

A.

ensuring that program changes adhere to established standards.

B.

designing procedures to protect data against accidental disclosure.

C.

ensuring that the output received from system processing is complete.

D.

monitoring the execution of computer processing tasks.

Full Access
Question # 232

Which of the following should be used to evaluate an IT development project before an investment is committed?

A.

Earned value analysis (EVA)

B.

Rapid application development

C.

Function point analysis

D.

Feasibility study

Full Access
Question # 233

Which of the following is MOST useful to an IS auditor performing a review of access controls for a document management system?

A.

Policies and procedures for managing documents provided by department heads

B.

A system-generated list of staff and their project assignments. roles, and responsibilities

C.

Previous audit reports related to other departments ' use of the same system

D.

Information provided by the audit team lead an the authentication systems used by the department

Full Access
Question # 234

An IS auditor would MOST likely recommend that IT management use a balanced scorecard to:

A.

indicate whether the organization meets quality standards.

B.

ensure that IT staff meet performance requirements.

C.

train and educate IT staff.

D.

assess IT functions and processes.

Full Access
Question # 235

A business application ' s database is copied to a replication server within minutes. Which of the following processes taking place during business hours will MOST benefit from this architecture?

A.

Rolling forward of transactions when a production server fails

B.

Ad hoc batch reporting jobs from the replication server

C.

Analysis of application performance degradation

D.

Hardware replacement work involving databases

Full Access
Question # 236

Which of the following is the BEST recommendation by an IS auditor to prevent unauthorized access to Internet of Things (loT) devices ' ?

A.

loT devices should only be accessible from the host network.

B.

loT devices should log and alert on access attempts.

C.

IoT devices should require identification and authentication.

D.

loT devices should monitor the use of device system accounts.

Full Access
Question # 237

During an exit interview, senior management disagrees with some of me facts presented m the draft audit report and wants them removed from the report. Which of the following would be the auditor ' s BEST course of action?

A.

Revise the assessment based on senior management ' s objections.

B.

Escalate the issue to audit management.

C.

Finalize the draft audit report without changes.

D.

Gather evidence to analyze senior management ' s objections

Full Access
Question # 238

Which of the following should be the IS auditor ' s PRIMARY focus when evaluating an organizations offsite storage facility?

A.

Adequacy of physical and environmental controls

B.

Results of business continuity plan (BCP) tests

C.

Shared facilities

D.

Retention policy and period

Full Access
Question # 239

An organization outsourced its IS functions to meet its responsibility for disaster recovery, the organization should:

A.

discontinue maintenance of the disaster recovery plan (DRP >

B.

coordinate disaster recovery administration with the outsourcing vendor

C.

delegate evaluation of disaster recovery to a third party

D.

delegate evaluation of disaster recovery to internal audit

Full Access
Question # 240

The process of applying a hash function to a message and obtaining and ciphering a digest refers to:

A.

digital certificates.

B.

digital signatures.

C.

public key infrastructure (PKI).

D.

authentication.

Full Access
Question # 241

in a post-implantation Nation review of a recently purchased system it is MOST important for the iS auditor to determine whether the:

A.

stakeholder expectations were identified

B.

vendor product offered a viable solution.

C.

user requirements were met.

D.

test scenarios reflected operating activities.

Full Access
Question # 242

An IS auditor is reviewing a decision to consolidate processing for multiple applications onto a single large server. Which of the following is the MOST significant impact from this decision?

A.

Higher operating system license fees

B.

More applications affected by a server outage

C.

Simplified asset management

D.

Fewer application servers requiring vulnerability scans

Full Access
Question # 243

Which of the following is the BEST control to mitigate the risk of shadow IT?

A.

Intrusion detection system (IDS)

B.

Vendor management reviews

C.

Vulnerability scanning

D.

Security awareness training

Full Access
Question # 244

Which of the following occurs during the issues management process for a system development project?

A.

Contingency planning

B.

Configuration management

C.

Help desk management

D.

Impact assessment

Full Access
Question # 245

An IS auditor observes that a business-critical application does not currently have any level of fault tolerance. Which of the following is the GREATEST concern with this situation?

A.

Degradation of services

B.

Limited tolerance for damage

C.

Decreased mean time between failures (MTBF)

D.

Single point of failure

Full Access
Question # 246

The PRIMARY advantage of object-oriented technology is enhanced:

A.

efficiency due to the re-use of elements of logic.

B.

management of sequential program execution for data access.

C.

grouping of objects into methods for data access.

D.

management of a restricted variety of data types for a data object.

Full Access
Question # 247

An IS audit learn is evaluating the documentation related to the most recent application user-access review performed by IT and business management It is determined that the user list was not system-generated. Which of the following should be the GREATEST concern?

A.

Availability of the user list reviewed

B.

Confidentiality of the user list reviewed

C.

Source of the user list reviewed

D.

Completeness of the user list reviewed

Full Access
Question # 248

Which of the following should be of GREATEST concern to an IS auditor reviewing data conversion and migration during the implementation of a new application system?

A.

Backups of the old system and data are not available online

B.

The change management process was not formally documented

C.

Data conversion was performed using manual processes

D.

Unauthorized data modifications occurred during conversion

Full Access
Question # 249

What should be the PRIMARY basis for selecting which IS audits to perform in the coming year?

A.

Senior management ' s request

B.

Prior year ' s audit findings

C.

Organizational risk assessment

D.

Previous audit coverage and scope

Full Access
Question # 250

The waterfall life cycle model of software development is BEST suited for which of the following situations?

A.

The project will involve the use of new technology.

B.

The project intends to apply an object-oriented design approach.

C.

The project requirements are well understood.

D.

The project is subject to time pressures.

Full Access
Question # 251

Which of the following BEST enables an organization to improve the visibility of end-user computing (EUC) applications that support regulatory reporting?

A.

EUC inventory

B.

EUC availability controls

C.

EUC access control matrix

D.

EUC tests of operational effectiveness

Full Access
Question # 252

Which type of threat can utilize a large group of automated social media accounts to steal data, send spam, or launch distributed denial of service (DDoS) attacks?

A.

Botnet attack

B.

Data mining

C.

Phishing attempt

D.

Malware sharing

Full Access
Question # 253

Which of the following should be of GREATEST concern to an IS auditor assessing the effectiveness of an organization ' s information security governance?

A.

Risk assessments of information assets are not periodically performed.

B.

All Control Panel Items

C.

The information security policy does not extend to service providers.

D.

There is no process to measure information security performance.

E.

The information security policy is not reviewed by executive management.

Full Access
Question # 254

Which of the following be of GREATEST concern to an IS auditor reviewing on-site preventive maintenance for an organization’s business-critical server hardware?

A.

Preventive maintenance costs exceed the business allocated budget.

B.

Preventive maintenance has not been approved by the information system

C.

Preventive maintenance is outsourced to multiple vendors without requiring nondisclosure agreements (NDAs)

D.

The preventive maintenance schedule is based on mean time between failures (MTBF) parameters.

Full Access
Question # 255

Which of the following should be done FIRST when planning a penetration test?

A.

Execute nondisclosure agreements (NDAs).

B.

Determine reporting requirements for vulnerabilities.

C.

Define the testing scope.

D.

Obtain management consent for the testing.

Full Access
Question # 256

Which of the following is an IS auditor ' s BEST recommendation to help an organization increase the efficiency of computing resources?

A.

Virtualization

B.

Hardware upgrades

C.

Overclocking the central processing unit (CPU)

D.

Real-time backups

Full Access
Question # 257

Which of the following provides the BEST assurance of data integrity after file transfers?

A.

Check digits

B.

Monetary unit sampling

C.

Hash values

D.

Reasonableness check

Full Access
Question # 258

Due to system limitations, segregation of duties (SoD) cannot be enforced in an accounts payable system. Which of the following is the IS auditor ' s BEST recommendation for a compensating control?

A.

Require written authorization for all payment transactions

B.

Restrict payment authorization to senior staff members.

C.

Reconcile payment transactions with invoices.

D.

Review payment transaction history

Full Access
Question # 259

In an annual audit cycle, the audit of an organization ' s IT department resulted in many findings. Which of the following would be the MOST important consideration when planning the next audit?

A.

Postponing the review until all of the findings have been rectified

B.

Limiting the review to the deficient areas

C.

Verifying that all recommendations have been implemented

D.

Following up on the status of all recommendations

Full Access
Question # 260

Which of the following recommendations would BEST prevent the implementation of IT projects without collaborating with the business?

A.

Partner with the business units to evaluate IT projects.

B.

Review the projects to identify similarities and eliminate duplication.

C.

Periodically review the projects ' return on investment (ROI).

D.

Prioritize protects based on business and IT resource availability.

Full Access
Question # 261

When classifying information, it is MOST important to align the classification to:

A.

Business risk.

B.

Industry standards.

C.

Security policy.

D.

Data retention requirements.

Full Access
Question # 262

Which of the following should be an IS auditor ' s PRIMARY focus when evaluating the response process for cybercrimes?

A.

Communication with law enforcement

B.

Notification to regulators

C.

Root cause analysis

D.

Evidence collection

Full Access
Question # 263

Which of the following threats is mitigated by a firewall?

A.

Intrusion attack

B.

Asynchronous attack

C.

Passive assault

D.

Trojan horse

Full Access
Question # 264

An organization is concerned about duplicate vendor payments on a complex system with a high volume of transactions. Which of the following would be MOST helpful to an IS auditor to determine whether duplicate vendor payments exist?

A.

Computer-assisted audit technique (CAAT)

B.

Stratified sampling

C.

Statistical sampling

D.

Process walk-through

Full Access
Question # 265

While auditing a small organization ' s data classification processes and procedures, an IS auditor noticed that data is often classified at the incorrect level. What is the MOST effective way for the organization to improve this situation?

A.

Use automatic document classification based on content.

B.

Have IT security staff conduct targeted training for data owners.

C.

Publish the data classification policy on the corporate web portal.

D.

Conduct awareness presentations and seminars for information classification policies.

Full Access
Question # 266

An IS auditor finds a segregation of duties issue in an enterprise resource planning (ERP) system. Which of the following is the BEST way to prevent the misconfiguration from recurring?

A.

Monitoring access rights on a regular basis

B.

Referencing a standard user-access matrix

C.

Granting user access using a role-based model

D.

Correcting the segregation of duties conflicts

Full Access
Question # 267

Which of the following is the PRIMARY objective of cyber resiliency?

A.

To resume normal operations after service disruptions

B.

To prevent potential attacks or disruptions in operations

C.

To efficiently and effectively recover from an incident with limited operational impact

D.

To limit the severity of security breaches and maintain continuous operations

Full Access
Question # 268

An IS auditor is reviewing the security of a web-based customer relationship management (CRM) system that is directly accessed by customers via the Internet, which of the following should be a concern for the auditor?

A.

The system is hosted on an external third-party service provider’s server.

B.

The system is hosted in a hybrid-cloud platform managed by a service provider.

C.

The system is hosted within a demilitarized zone (DMZ) of a corporate network.

D.

The system is hosted within an internal segment of a corporate network.

Full Access
Question # 269

Which of the following is MOST likely to be reduced when implementing optimal risk management strategies?

A.

Sampling risk

B.

Residual risk

C.

Inherent risk

D.

Detection risk

Full Access
Question # 270

After areas have been appropriately scoped, what is the IS auditor ' s NEXT step in the selection for sampling?

A.

Define the population for sampling.

B.

Determine the sampling method.

C.

Calculate the sample size.

D.

Pull the sample.

Full Access
Question # 271

Which of the following security measures is MOST important for protecting Internet of Things (IoT) devices from potential cyberattacks?

A.

Logging and monitoring network traffic

B.

Confirming firmware compliance to current security requirements

C.

Changing default passwords

D.

Reviewing and updating the network diagram on a regular basis

Full Access
Question # 272

Which of the following should be the FIRST consideration when deciding whether data should be moved to a cloud provider for storage?

A.

Data storage costs

B.

Data classification

C.

Vendor cloud certification

D.

Service level agreements (SLAs)

Full Access
Question # 273

Which of the following is the GREATEST risk of project dashboards being set without sufficiently defined criteria?

A.

Adverse findings from internal and external auditors

B.

Lack of project portfolio status oversight

C.

Lack of alignment of project status reports

D.

Inadequate decision-making and prioritization

Full Access
Question # 274

Which of the following will BEST ensure that a proper cutoff has been established to reinstate transactions and records to their condition just prior to a computer system failure?

A.

Rotating backup copies of transaction files offsite

B.

Using a database management system (DBMS) to dynamically back-out partially processed transactions

C.

Maintaining system console logs in electronic formal

D.

Ensuring bisynchronous capabilities on all transmission lines

Full Access
Question # 275

When planning an audit, it is acceptable for an IS auditor to rely on a third-party provider’s external audit report on service level management when the

A.

scope and methodology meet audit requirements

B.

service provider is independently certified and accredited

C.

report confirms that service levels were not violated

D.

report was released within the last 12 months

Full Access
Question # 276

Which of the following BEST indicates that an incident management process is effective?

A.

Decreased number of calls to the help desk

B.

Decreased time for incident resolution

C.

Increased number of incidents reviewed by IT management

D.

Increased number of reported critical incidents

Full Access
Question # 277

An organization has decided to reengineer business processes to improve the performance of overall IT service delivery. Which of the following recommendations from the project team should be the GREATEST concern to the IS auditor?

A.

Disable operational logging to enhance the processing speed and save storage.

B.

Adopt a service delivery model based on insights from peer organizations.

C.

Delegate business decisions to the chief risk officer (CRO).

D.

Eliminate certain reports and key performance indicators (KPIs)

Full Access
Question # 278

A manager Identifies active privileged accounts belonging to staff who have left the organization. Which of the following is the threat actor In this scenario?

A.

Terminated staff

B.

Unauthorized access

C.

Deleted log data

D.

Hacktivists

Full Access
Question # 279

The FIRST step in auditing a data communication system is to determine:

A.

traffic volumes and response-time criteria

B.

physical security for network equipment

C.

the level of redundancy in the various communication paths

D.

business use and types of messages to be transmitted

Full Access
Question # 280

Which of the following MUST be performed by senior audit leadership prior to starting an IS audit project?

A.

Signoff on the audit scope.

B.

Attend planning walk-throughs.

C.

Review audit planning documents.

D.

Meet with auditee leadership.

Full Access
Question # 281

When an intrusion into an organization ' s network is detected, which of the following should be done FIRST?

A.

Notify senior management.

B.

Block all compromised network nodes.

C.

Identify nodes that have been compromised.

D.

Contact law enforcement.

Full Access
Question # 282

An organization has decided to purchase a web-based email service from a third-party vendor and eliminate its own email server infrastructure. What type of cloud computing environment would BEST meet the organization ' s objective?

A.

Platform as a Service (PaaS)

B.

Software as a Service (SaaS)

C.

Database as a Service (DBaaS)

D.

Infrastructure as a Service (laaS)

Full Access
Question # 283

Which of the following MUST be completed as part of the annual audit planning process?

A.

Business impact analysis (BIA)

B.

Fieldwork

C.

Risk assessment

D.

Risk control matrix

Full Access
Question # 284

A post-implementation review was conducted by issuing a survey to users. Which of the following should be of GREATEST concern to an IS auditor?

A.

The survey results were not presented in detail lo management.

B.

The survey questions did not address the scope of the business case.

C.

The survey form template did not allow additional feedback to be provided.

D.

The survey was issued to employees a month after implementation.

Full Access
Question # 285

Which of the following is the BEST indicator of the effectiveness of an organization ' s incident response program?

A.

Number of successful penetration tests

B.

Percentage of protected business applications

C.

Financial impact per security event

D.

Number of security vulnerability patches

Full Access
Question # 286

Which of the following would be the BEST process for continuous auditing to a large financial Institution?

A.

Testing encryption standards on the disaster recovery system

B.

Validating access controls for real-time data systems

C.

Performing parallel testing between systems

D.

Validating performance of help desk metrics

Full Access
Question # 287

Which of the following presents the GREATEST risk of data leakage in the cloud environment?

A.

Lack of data retention policy

B.

Multi-tenancy within the same database

C.

Lack of role-based access

D.

Expiration of security certificate

Full Access
Question # 288

An IS auditor finds that the process for removing access for terminated employees is not documented What is the MOST significant risk from this observation?

A.

Procedures may not align with best practices

B.

Human resources (HR) records may not match system access.

C.

Unauthorized access cannot he identified.

D.

Access rights may not be removed in a timely manner.

Full Access
Question # 289

Which of the following is the BEST way to determine the adequacy of controls for detecting inappropriate network activity in an organization?

A.

Reviewing SIEM reports of suspicious events in a timely manner

B.

Reviewing business application logs on a regular basis

C.

Troubleshooting connectivity issues routinely

D.

Installing a packet filtering firewall to block malicious traffic

Full Access
Question # 290

An IS auditor has discovered that a software system still in regular use is years out of date and no longer supported. The auditee has stated that it will take six months until the software is running on the current version. Which of the following is the BEST way to reduce the immediate risk associated with using an unsupported version of the software?

A.

Verify all patches have been applied to the software system ' s outdated version.

B.

Close all unused ports on the outdated software system.

C.

Monitor network traffic attempting to reach the outdated software system.

D.

Segregate the outdated software system from the main network.

Full Access
Question # 291

An IS auditor reviewing security incident processes realizes incidents are resolved and closed, but root causes are not investigated. Which of the following should be the MAJOR concern with this situation?

A.

Abuses by employees have not been reported.

B.

Lessons learned have not been properly documented

C.

vulnerabilities have not been properly addressed

D.

Security incident policies are out of date.

Full Access
Question # 292

Which of the following is the MOST important responsibility of data owners when implementing a data classification process?

A.

Reviewing emergency changes to data

B.

Authorizing application code changes

C.

Determining appropriate user access levels

D.

Implementing access rules over database tables

Full Access
Question # 293

Which of the following BEST helps monitor and manage operational logs to create value for an organization?

A.

Using automated tools to collect logs and raise alerts based on use cases

B.

Reporting results of log analyses to senior management for review

C.

Selecting logs only from critical operational systems and devices for monitoring

D.

Encrypting logs processed before archiving for defined retention periods

Full Access
Question # 294

Which of the following is the MOST important success factor for implementing a data loss prevention (DLP) tool?

A.

Implementing the tool in monitor mode to avoid unnecessary blocking of communication

B.

Defining and configuring policies and tool rule sets to monitor sensitive data movement

C.

Testing the tool in a test environment before moving to the production environment

D.

Assigning responsibilities for maintaining the tool to applicable data owners and stakeholders

Full Access
Question # 295

Which of the following must be in place before an IS auditor initiates audit follow-up activities?

A.

Available resources for the activities included in the action plan

B.

A management response in the final report with a committed implementation date

C.

A heal map with the gaps and recommendations displayed in terms of risk

D.

Supporting evidence for the gaps and recommendations mentioned in the audit report

Full Access
Question # 296

Which of the following is MOST important to include in forensic data collection and preservation procedures?

A.

Assuring the physical security of devices

B.

Preserving data integrity

C.

Maintaining chain of custody

D.

Determining tools to be used

Full Access
Question # 297

The PRIMARY responsibility of a project steering committee is to:

A.

sign off on the final build document.

B.

ensure that each project deadline is met.

C.

ensure that developed systems meet business needs.

D.

provide regular project updates and oversight.

Full Access
Question # 298

An IS auditor noted a recent production incident in which a teller transaction system incorrectly charged fees to customers due to a defect from a recent release. Which of the following should be the auditor ' s NEXT step?

A.

Evaluate developer training.

B.

Evaluate the incident management process.

C.

Evaluate the change management process.

D.

Evaluate secure code practices.

Full Access
Question # 299

Which of the following would be of MOST concern for an IS auditor evaluating the design of an organization ' s incident management processes?

A.

Service management standards are not followed.

B.

Expected time to resolve incidents is not specified.

C.

Metrics are not reported to senior management.

D.

Prioritization criteria are not defined.

Full Access
Question # 300

An IS auditor discovers that an IT organization serving several business units assigns equal priority to all initiatives, creating a risk of delays in securing project funding Which of the following would be MOST helpful in matching demand for projects and services with available resources in a way that supports business objectives?

A.

Project management

B.

Risk assessment results

C.

IT governance framework

D.

Portfolio management

Full Access
Question # 301

Which of the following should be given GREATEST consideration when implementing the use of an open-source product?

A.

Support

B.

Performance

C.

Confidentiality

D.

Usability

Full Access
Question # 302

A PRIMARY objective of risk management is to keep the total cost of risks below the:

A.

amount of losses that would materially damage the firm.

B.

average cost of physical security measures.

C.

administrative cost of risk management.

D.

estimated amount of losses included in the firm ' s budget

Full Access
Question # 303

An IS audit manager is reviewing workpapers for a recently completed audit of the corporate disaster recovery test. Which of the following should the IS audit manager specifically review to substantiate the conclusions?

A.

Overviews of interviews between data center personnel and the auditor

B.

Prior audit reports involving other corporate disaster recovery audits

C.

Summary memos reflecting audit opinions regarding noted weaknesses

D.

Detailed evidence of the successes and weaknesses of all contingency testing

Full Access
Question # 304

An IS auditor is reviewing a data conversion project Which of the following is the auditor ' s BEST recommendation prior to go-live?

A.

Review test procedures and scenarios

B.

Conduct a mock conversion test

C.

Establish a configuration baseline

D.

Automate the test scripts

Full Access
Question # 305

The PRIMARY reason to assign data ownership for protection of data is to establish:

A.

reliability.

B.

traceability.

C.

authority,

D.

accountability.

Full Access
Question # 306

Which of the following is MOST important when defining the IS audit scope?

A.

Minimizing the time and cost to the organization of IS audit procedures

B.

Involving business in the formulation of the scope statement

C.

Aligning the IS audit procedures with IT management priorities

D.

Understanding the relationship between IT and business risks

Full Access
Question # 307

Which of the following indicates that an internal audit organization is structured to support the independence and clarity of the reporting process?

A.

Auditors are responsible for performing operational duties or activities.

B.

The internal audit manager reports functionally to a senior management official.

C.

The internal audit manager has a reporting line to the audit committee.

D.

Auditors are responsible for assessing and operating a system of internal controls.

Full Access
Question # 308

An IS auditor has discovered that a software system still in regular use is outdated and no longer supported. Which of the following is the BEST way to reduce the immediate risk associated with using an unsupported version of the software?

A.

Verify all patches have been applied to the outdated software system.

B.

Encrypt network traffic to the outdated software system.

C.

Isolate the outdated software system from the main network.

D.

Close all unused ports on the outdated software system.

Full Access
Question # 309

An IS auditor wants to gain a better understanding of an organization’s selected IT operating system software. Which of the following would be MOST helpful to review?

A.

Service level agreements (SLAs)

B.

Project steering committee charter

C.

IT audit reports

D.

Enterprise architecture (EA)

Full Access
Question # 310

Which of the following should be done FIRST when planning to conduct internal and external penetration testing for a client?

A.

Establish the timing of testing.

B.

Identify milestones.

C.

Determine the test reporting

D.

Establish the rules of engagement.

Full Access
Question # 311

Which of the following should be the PRIMARY consideration when validating a data analytic algorithm that has never been used before?

A.

Enhancing the design of data visualization

B.

Increasing speed and efficiency of audit procedures

C.

Confirming completeness and accuracy

D.

Decreasing the time for data analytics execution

Full Access
Question # 312

Which of the following is the PRIMARY role of the IS auditor m an organization ' s information classification process?

A.

Securing information assets in accordance with the classification assigned

B.

Validating that assets are protected according to assigned classification

C.

Ensuring classification levels align with regulatory guidelines

D.

Defining classification levels for information assets within the organization

Full Access
Question # 313

Which of the following weaknesses would have the GREATEST impact on the effective operation of a perimeter firewall?

A.

Use of stateful firewalls with default configuration

B.

Ad hoc monitoring of firewall activity

C.

Misconfiguration of the firewall rules

D.

Potential back doors to the firewall software

Full Access
Question # 314

Which of the following applications has the MOST inherent risk and should be prioritized during audit planning?

A.

A decommissioned legacy application

B.

An onsite application that is unsupported

C.

An outsourced accounting application

D.

An internally developed application

Full Access
Question # 315

An IS auditor is reviewing the backup procedures in an organization that has high volumes of data with frequent changes to transactions. Which of the following is the BEST backup scheme to recommend given the need for a shorter restoration time in the event of a disruption?

A.

Differential backup

B.

Full backup

C.

Incremental backup

D.

Mirror backup

Full Access
Question # 316

Transaction records from a business database were inadvertently deleted, and system operators decided to restore from a snapshot copy. Which of the following provides assurance that the BEST transactions were recovered successfully?

A.

Review transaction recovery logs to ensure no errors were recorded.

B.

Recount the transaction records to ensure no records are missing.

C.

Rerun the process on a backup machine to verify the results are the same.

D.

Compare transaction values against external statements to verify accuracy.

Full Access
Question # 317

During planning for a cloud service audit, audit management becomes aware that the assigned IS auditor is unfamiliar with the technologies in use and their associated risks to the business. To ensure audit quality, which of the following actions should audit management consider FIRST?

A.

Conduct a follow-up audit after a suitable period has elapsed.

B.

Reschedule the audit assignment for the next financial year.

C.

Reassign the audit to an internal audit subject matter expert.

D.

Extend the duration of the audit to give the auditor more time.

Full Access
Question # 318

Which of the following is a PRIMARY responsibility of an IT steering committee?

A.

Prioritizing IT projects in accordance with business requirements

B.

Reviewing periodic IT risk assessments

C.

Validating and monitoring the skill sets of IT department staff

D.

Establishing IT budgets for the business

Full Access
Question # 319

Upon completion of audit work, an IS auditor should:

A.

provide a report to senior management prior to discussion with the auditee.

B.

distribute a summary of general findings to the members of the auditing team.

C.

provide a report to the auditee stating the initial findings.

D.

review the working papers with the auditee.

Full Access
Question # 320

An IS auditor is conducting a physical security audit of a healthcare facility and finds closed-circuit television (CCTV) systems located in a patient care area. Which of the following is the GREATEST concern?

A.

Cameras are not monitored 24/7.

B.

There are no notices indicating recording IS in progress.

C.

The retention period for video recordings is undefined

D.

There are no backups of the videos.

Full Access
Question # 321

Which of the following is a corrective control?

A.

Separating equipment development testing and production

B.

Verifying duplicate calculations in data processing

C.

Reviewing user access rights for segregation

D.

Executing emergency response plans

Full Access
Question # 322

Which of the following is the MOST effective way to maintain network integrity when using mobile devices?

A.

Implement network access control.

B.

Implement outbound firewall rules.

C.

Perform network reviews.

D.

Review access control lists.

Full Access
Question # 323

In order for a firewall to effectively protect a network against external attacks, what fundamental practice must be followed?

A.

The firewall must be placed in the demilitarized zone (DMZ).

B.

Only essential external services should be permitted.

C.

Filters for external information must be defined.

D.

All external communication must be via the firewall.

Full Access
Question # 324

An IS auditor finds that an organization ' s data loss prevention (DLP) system is configured to use vendor default settings to identify violations. The auditor ' s MAIN concern should be that:

A.

violation reports may not be reviewed in a timely manner.

B.

a significant number of false positive violations may be reported.

C.

violations may not be categorized according to the organization ' s risk profile.

D.

violation reports may not be retained according to the organization ' s risk profile.

Full Access
Question # 325

An IS auditor is performing a follow-up audit for findings identified in an organization ' s user provisioning process Which of the following is the MOST appropriate population to sample from when testing for remediation?

A.

All users provisioned after the finding was originally identified

B.

All users provisioned after management resolved the audit issue

C.

All users provisioned after the final audit report was issued

D.

All users who have followed user provisioning processes provided by management

Full Access
Question # 326

An IS auditor finds that a new network connection allows communication between the Internet and the internal enterprise resource planning (ERP) system. Which of the following is the PRIMARY business impact to include when presenting this observation to management?

A.

An increase to the threat landscape

B.

A decrease in data quality in the ERP system

C.

A decrease in network performance

D.

An increase in potential fines from regulators

Full Access
Question # 327

Management has agreed to move the organization ' s data center due to recent flood map changes in its current location. Which risk response has been adopted?

A.

Risk elimination

B.

Risk transfer

C.

Risk acceptance

D.

Risk avoidance

Full Access
Question # 328

An IS auditor should ensure that an application ' s audit trail:

A.

has adequate security.

B.

logs ail database records.

C.

Is accessible online

D.

does not impact operational efficiency

Full Access
Question # 329

Which of the following is the GREATEST benefit of an effective data classification process?

A.

Data custodians are identified.

B.

Data retention periods are well defined

C.

Data is protected according to its sensitivity

D.

Appropriate ownership over data is assigned

Full Access
Question # 330

During audit framework. an IS auditor teams that employees are allowed to connect their personal devices to company-owned computers. How can the auditor BEST validate that appropriate security controls are in place to prevent data loss?

A.

Conduct a walk-through to view results of an employee plugging in a device to transfer confidential data.

B.

Review compliance with data loss and applicable mobile device user acceptance policies.

C.

Verify the data loss prevention (DLP) tool is properly configured by the organization.

D.

Verify employees have received appropriate mobile device security awareness training.

Full Access
Question # 331

Which of the following would BEST determine whether a post-implementation review (PIR) performed by the project management office (PMO) was effective?

A.

Lessons learned were implemented.

B.

Management approved the PIR report.

C.

The review was performed by an external provider.

D.

Project outcomes have been realized.

Full Access
Question # 332

While executing follow-up activities, an IS auditor is concerned that management has implemented corrective actions that are different from those originally discussed and agreed with the audit function. In order to resolve the situation, the IS auditor ' s BEST course of action would be to:

A.

re-prioritize the original issue as high risk and escalate to senior management.

B.

schedule a follow-up audit in the next audit cycle.

C.

postpone follow-up activities and escalate the alternative controls to senior audit management.

D.

determine whether the alternative controls sufficiently mitigate the risk.

Full Access
Question # 333

Which of the following BEST demonstrates alignment of the IT department with the corporate mission?

A.

Analysis of IT department functionality

B.

Biweekly reporting to senior management

C.

Annual board meetings

D.

Quarterly steering committee meetings

Full Access
Question # 334

How is nonrepudiation supported within a public key infrastructure (PKI) environment?

A.

Through the use of elliptical curve cryptography on transmitted messages

B.

Through the use of a certificate issued by a certificate authority (CA)

C.

Through the use of private keys to decrypt data received by a user

D.

Through the use of enterprise key management systems

Full Access
Question # 335

During an information security review, an IS auditor learns an organizational policy requires all employ-ees to attend information security training during the first week of each new year. What is

the auditor ' s BEST recommendation to ensure employees hired after January receive adequate guid-ance regarding security awareness?

A.

Ensure new employees read and sign acknowledgment of the acceptable use policy.

B.

Revise the policy to include security training during onboarding.

C.

Revise the policy to require security training every six months for all employees.

D.

Require management of new employees to provide an overview of security awareness.

Full Access
Question # 336

Which of the following should an IS auditor expect to see in a network vulnerability assessment?

A.

Misconfiguration and missing updates

B.

Malicious software and spyware

C.

Zero-day vulnerabilities

D.

Security design flaws

Full Access
Question # 337

During which process is regression testing MOST commonly used?

A.

System modification

B.

Unit testing

C.

Stress testing

D.

Program development

Full Access
Question # 338

Which of the following concerns is BEST addressed by securing production source libraries?

A.

Programs are not approved before production source libraries are updated.

B.

Production source and object libraries may not be synchronized.

C.

Changes are applied to the wrong version of production source libraries.

D.

Unauthorized changes can be moved into production.

Full Access
Question # 339

When planning a review of IT governance, an IS auditor is MOST likely to:

A.

assess whether business process owner responsibilities are consistent.

B.

obtain information about the control framework adopted by management.

C.

examine audit committee minutes for IT-related controls.

D.

define key performance indicators (KPIs).

Full Access
Question # 340

Which of the following issues identified during a formal review of an organization ' s information security policies presents the GREATEST potential risk to the organization?

A.

The policies are not available to key risk stakeholders.

B.

The policies have not been reviewed by the risk management committee.

C.

The policies are not aligned with the information security risk appetite.

D.

The policies are not based on industry best practices for information security.

Full Access
Question # 341

Which of the following should be a concern to an IS auditor reviewing an organization’s use of a major cloud provider for Infrastructure as a Service (IaaS)?

A.

The IaaS service is connected to the organization’s network via a virtual private network (VPN).

B.

End users are able to create their own cloud server instances.

C.

The IaaS service relies on the organization’s active directory domain.

D.

The cloud governance policy was not reviewed within the last year by the IT department.

Full Access
Question # 342

Which of the following is MOST useful for determining whether the goals of IT are aligned with the organization ' s goals?

A.

Balanced scorecard

B.

Enterprise dashboard

C.

Enterprise architecture (EA)

D.

Key performance indicators (KPIs)

Full Access
Question # 343

During a pre-deployment assessment, what is the BEST indication that a business case will lead to the achievement of business objectives?

A.

The business case reflects stakeholder requirements.

B.

The business case is based on a proven methodology.

C.

The business case passed a quality review by an independent party.

D.

The business case identifies specific plans for cost allocation.

Full Access
Question # 344

What is the Most critical finding when reviewing an organization’s information security management?

A.

No dedicated security officer

B.

No official charier for the information security management system

C.

No periodic assessments to identify threats and vulnerabilities

D.

No employee awareness training and education program

Full Access
Question # 345

An organization offers an e-commerce platform that allows consumer-to-consumer transactions. The platform now uses blockchain technology to ensure the parties are unable to deny the transactions. Which of the following attributes BEST describes the risk element that this technology is addressing?

A.

Integrity

B.

Nonrepudiation

C.

Confidentiality

D.

Availability

Full Access
Question # 346

Which of the following is the BEST reason for an organization to use clustering?

A.

To decrease system response time

B.

To Improve the recovery lime objective (RTO)

C.

To facilitate faster backups

D.

To improve system resiliency

Full Access
Question # 347

Which of the following is the PRIMARY reason to perform a risk assessment?

A.

To determine the current risk profile

B.

To ensure alignment with the business impact analysis (BIA)

C.

To achieve compliance with regulatory requirements

D.

To help allocate budget for risk mitigation controls

Full Access
Question # 348

Which of the following provides the BEST evidence that system requirements are met when evaluating a project before implementation?

A.

Integration testing results

B.

Sign-off from senior management

C.

User acceptance testing (UAT) results

D.

Regression testing results

Full Access
Question # 349

Which of the following is the BEST security control to validate the integrity of data communicated between production databases and a big data analytics

system?

A.

Hashing in-scope data sets

B.

Encrypting in-scope data sets

C.

Running and comparing the count function within the in-scope data sets

D.

Hosting a digital certificate for in-scope data sets

Full Access
Question # 350

What type of control has been implemented when secure code reviews are conducted as part of a deployment program?

A.

Detective

B.

Corrective

C.

Monitoring

D.

Deterrent

Full Access
Question # 351

An organization plans to centrally decommission end-of-life databases and migrate the data to the latest model of hardware. Which of the following BEST ensures data integrity is preserved during the migration?

A.

Reconciling sample data to most recent backups

B.

Obfuscating confidential data

C.

Encrypting the data

D.

Comparing checksums

Full Access
Question # 352

An organization ' s security policy mandates that all new employees must receive appropriate security awareness training. Which of the following metrics would BEST assure compliance with this policy?

A.

Percentage of new hires that have completed the training.

B.

Number of new hires who have violated enterprise security policies.

C.

Number of reported incidents by new hires.

D.

Percentage of new hires who report incidents

Full Access
Question # 353

Which of the following can BEST reduce the impact of a long-term power failure?

A.

Power conditioning unit

B.

Emergency power-off switches

C.

Battery bank

D.

Redundant power source

Full Access
Question # 354

Audit observations should be FIRST communicated with the auditee:

A.

when drafting the report.

B.

during fieldwork.

C.

at the end of fieldwork.

D.

within the audit report

Full Access
Question # 355

What should be an IS auditor ' s PRIMARY focus when reviewing a patch management procedure in an environment where availability is a top priority?

A.

Deployment automation to all servers

B.

Technical skills of the deployment team

C.

Comprehensive testing prior to deployment

D.

Validity certification prior to deployment

Full Access
Question # 356

An IS auditor is providing input to an RFP to acquire a financial application system. Which of the following is MOST important for the auditor to recommend?

A.

The application should meet the organization ' s requirements.

B.

Audit trails should be included in the design.

C.

Potential suppliers should have experience in the relevant area.

D.

Vendor employee background checks should be conducted regularly.

Full Access
Question # 357

Which of the following is an effective way to ensure the integrity of file transfers in a peer-to-peer (P2P) computing environment?

A.

Associate a message authentication code with each file transferred.

B.

Ensure the files are transferred through an intrusion detection system (IDS).

C.

Encrypt the packets shared between peers within the environment.

D.

Connect the client computers in the environment to a jump server.

Full Access
Question # 358

Which of the following is MOST important to consider when reviewing an organization ' s defined data backup and restoration procedures?

A.

Business continuity plan (BCP)

B.

Recovery point objective (RPO)

C.

Mean time to restore (MTTR)

D.

Mean time between failures (MTBF)

Full Access
Question # 359

Which of the following activities is MOST likely to increase internal audit quality?

A.

Increasing audit staff training

B.

Outsourcing the internal audit function

C.

Increasing the number of planned audits

D.

Conducting client surveys

Full Access
Question # 360

An IS auditor is tasked to review an organization ' s plan-do-check-act (PDCA) method for improving IT-related processes and wants to determine the accuracy of defined targets to be achieved. Which of the following steps in the PDCA process should the auditor PRIMARILY focus on in this situation?

A.

Check

B.

Plan

C.

Do

D.

Act

Full Access
Question # 361

Which of the following should be the FIRST step in a data migration project?

A.

Reviewing decisions on how business processes should be conducted in the new system

B.

Completing data cleanup in the current database to eliminate inconsistencies

C.

Understanding the new system ' s data structure

D.

Creating data conversion scripts

Full Access
Question # 362

An IS audit team is evaluating documentation of the most recent application user access review. It is determined that the user list was not system generated. Which of the following should be of

MOST concern?

A.

Confidentiality of the user list

B.

Timeliness of the user list review

C.

Completeness of the user list

D.

Availability of the user list

Full Access
Question # 363

How does public key infrastructure (PKI) help to verify that a digitally signed document is not a forgery?

A.

By decrypting the signature with the signer’s public key

B.

By verifying the signature with the signer’s private key

C.

By checking the signature against the receiver’s public key

D.

By checking the signed document’s audit history

Full Access
Question # 364

For an organization that has plans to implement web-based trading, it would be MOST important for an IS auditor to verify the organization ' s information security plan includes:

A.

attributes for system passwords.

B.

security training prior to implementation.

C.

security requirements for the new application.

D.

the firewall configuration for the web server.

Full Access
Question # 365

The use of control totals reduces the risk of:

A.

posting to the wrong record.

B.

incomplete processing.

C.

improper backup.

D.

improper authorization.

Full Access
Question # 366

What is the purpose of hashing a document?

A.

To prevent unauthorized disclosure of the contents

B.

To validate the integrity of the file contents

C.

To classify the file for internal use only

D.

To compress the size of the file

Full Access
Question # 367

Which of the following would BEST help lo support an auditor’s conclusion about the effectiveness of an implemented data classification program?

A.

Purchase of information management tools

B.

Business use cases and scenarios

C.

Access rights provisioned according to scheme

D.

Detailed data classification scheme

Full Access
Question # 368

Which of the following should be of GREATEST concern to an IS auditor performing a review of information security controls?

A.

The information security policy has not been approved by the chief audit executive (CAE).

B.

The information security policy does not include mobile device provisions

C.

The information security policy is not frequently reviewed

D.

The information security policy has not been approved by the policy owner

Full Access
Question # 369

An IS auditor discovers that validation controls in a web application have been moved from the server side into the browser to boost performance. This would MOST likely increase the risk of a successful attack by:

A.

structured query language (SQL) injection

B.

buffer overflow.

C.

denial of service (DoS).

D.

phishing.

Full Access
Question # 370

During a review of system access, an IS auditor notes that an employee who has recently changed roles within the organization still has previous access rights. The auditor ' s NEXT step should be to:

A.

recommend a control to automatically update access rights.

B.

determine the reason why access rights have not been revoked.

C.

direct management to revoke current access rights.

D.

determine if access rights are in violation of software licenses.

Full Access
Question # 371

To help determine whether a controls-reliant approach to auditing financial systems in a company should be used, which sequence of IS audit work is MOST appropriate?

A.

Review of the general IS controls followed by a review of the application controls

B.

Detailed examination of financial transactions followed by review of the general ledger

C.

Review of major financial applications followed by a review of IT governance processes

D.

Review of application controls followed by a test of key business process controls

Full Access
Question # 372

Which of the following is the PRIMARY benefit of operational log management?

A.

It enhances user experience via predictive analysis.

B.

It improves security with real-time monitoring of network data.

C.

It organizes data to identify performance issues.

D.

It supports data aggregation using unified storage.

Full Access
Question # 373

Which of the following is BEST used for detailed testing of a business application ' s data and configuration files?

A.

Version control software

B.

Audit hooks

C.

Utility software

D.

Audit analytics tool

Full Access
Question # 374

Which of the following is necessary for effective risk management in IT governance?

A.

Local managers are solely responsible for risk evaluation.

B.

IT risk management is separate from corporate risk management.

C.

Risk management strategy is approved by the audit committee.

D.

Risk evaluation is embedded in management processes.

Full Access
Question # 375

In which of the following sampling methods is the entire sample considered to be irregular if a single error is found?

A.

Discovery sampling

B.

Variable sampling

C.

Stop-or-go sampling

D.

Judgmental sampling

Full Access
Question # 376

Which of the following is the MOST important consideration for patching mission critical business application servers against known vulnerabilities?

A.

Patches are implemented in a test environment prior to rollout into production.

B.

Network vulnerability scans are conducted after patches are implemented.

C.

Vulnerability assessments are periodically conducted according to defined schedules.

D.

Roles and responsibilities for implementing patches are defined

Full Access
Question # 377

Which of the following issues associated with a data center ' s closed-circuit television (CCTV) surveillance cameras should be of MOST concern to an IS auditor?

A.

CCTV recordings are not regularly reviewed.

B.

CCTV cameras are not installed in break rooms

C.

CCTV records are deleted after one year.

D.

CCTV footage is not recorded 24 x 7.

Full Access
Question # 378

An organization is disposing of removable onsite media which contains sensitive information. Which of the following is the MOST effective method to prevent disclosure of sensitive data?

A.

Encrypting and destroying keys

B.

Machine shredding

C.

Software formatting

D.

Wiping and rewriting three times

Full Access
Question # 379

Which of the following is the MOST effective control when granting access to a service provider for a ctoud-6ased application?

A.

Administrator access is provided for a limited period with an expiration date.

B.

Access has been provided on a need-to-know basis.

C.

User IDs are deleted when work is completed.

D.

Access is provided to correspond with the service level agreement (SLA).

Full Access
Question # 380

Which of the following is the BEST way to minimize sampling risk?

A.

Use a larger sample size

B.

Perform statistical sampling

C.

Perform judgmental sampling

D.

Enhance audit testing procedures

Full Access
Question # 381

An organization ' s sensitive data is stored in a cloud computing environment and is encrypted. Which of the following findings should be of GREATEST concern to an IS auditor?

A.

The encryption keys are not kept under dual control.

B.

The cloud vendor does not have multi-regional presence.

C.

Symmetric keys are used for encryption.

D.

Data encryption keys are accessible to the service provider.

Full Access
Question # 382

Which of the following types of environmental equipment will MOST likely be deployed below the floor tiles of a data center?

A.

Temperature sensors

B.

Humidity sensors

C.

Water sensors

D.

Air pressure sensors

Full Access
Question # 383

Which of the following findings would be of GREATEST concern when reviewing project risk management practices?

A.

Ongoing issues are not formally tracked.

B.

Project management software is not being used.

C.

Qualitative risk analyses have not been updated.

D.

There are no formal milestone sign-offs.

Full Access
Question # 384

Which of the following BEST facilitates the legal process in the event of an incident?

A.

Right to perform e-discovery

B.

Advice from legal counsel

C.

Preserving the chain of custody

D.

Results of a root cause analysis

Full Access
Question # 385

An IS auditor is reviewing the perimeter security design of a network. Which of the following provides the GREATEST assurance outgoing Internet traffic is controlled?

A.

Intrusion detection system (IDS)

B.

Security information and event management (SIEM) system

C.

Stateful firewall

D.

Load balancer

Full Access
Question # 386

An organization has recently moved to an agile model for deploying custom code to its in-house accounting software system. When reviewing the procedures in place for production code deployment, which of the following is the MOST significant security concern to address?

A.

Software vulnerability scanning is done on an ad hoc basis.

B.

Change control does not include testing and approval from quality assurance (QA).

C.

Production code deployment is not automated.

D.

Current DevSecOps processes have not been independently verified.

Full Access
Question # 387

The charging method that effectively encourages the MOST efficient use of IS resources is:

A.

specific charges that can be tied back to specific usage.

B.

total utilization to achieve full operating capacity.

C.

residual income in excess of actual incurred costs.

D.

allocations based on the ability to absorb charges.

Full Access
Question # 388

What is the FIRST step when creating a data classification program?

A.

Categorize and prioritize data.

B.

Develop data process maps.

C.

Categorize information by owner.

D.

Develop a policy.

Full Access
Question # 389

Which of the following would BEST detect that a distributed denial of service (DDoS) attack is occurring?

A.

Customer service complaints

B.

Automated monitoring of logs

C.

Server crashes

D.

Penetration testing

Full Access
Question # 390

When information processing has been outsourced to another organization, an IS auditor reviewing the contract should expect it to specify:

A.

Backup and recovery processes.

B.

Audit objectives.

C.

Compliance with legal requirements.

D.

Security administration processes.

Full Access
Question # 391

A proper audit trail of changes to server start-up procedures would include evidence of:

A.

subsystem structure.

B.

program execution.

C.

security control options.

D.

operator overrides.

Full Access
Question # 392

Which of the following is the MOST efficient solution for a multi-location healthcare organization that wants to be able to access patient data wherever patients present themselves

for care?

A.

Infrastructure as a Service (laaS) provider

B.

Software as a Service (SaaS) provider

C.

Network segmentation

D.

Dynamic localization

Full Access
Question # 393

Which of the following is the GREATEST advantage of maintaining an internal IS audit function within an organization?

A.

Increased independence and impartiality of recommendations

B.

Better understanding of the business and processes

C.

Ability to negotiate recommendations with management

D.

Increased IS audit staff visibility and availability throughout the year

Full Access
Question # 394

For security awareness training to be MOST effective, management should ensure the training:

A.

covers all aspects of the IT environment.

B.

is conducted by IT personnel.

C.

is tailored to specific groups.

D.

occurs annually.

Full Access
Question # 395

Which of the following helps to ensure the integrity of data for a system interface?

A.

System interface testing

B.

user acceptance testing (IJAT)

C.

Validation checks

D.

Audit logs

Full Access
Question # 396

Which of the following is the BEST compensating control against segregation of duties conflicts in new code development?

A.

Adding the developers to the change approval board

B.

A small number of people have access to deploy code

C.

Post-implementation change review

D.

Creation of staging environments

Full Access
Question # 397

An IS auditor finds the log management system is overwhelmed with false positive alerts. The auditor ' s BEST recommendation would be to:

A.

establish criteria for reviewing alerts.

B.

recruit more monitoring personnel.

C.

reduce the firewall rules.

D.

fine tune the intrusion detection system (IDS).

Full Access
Question # 398

Which of the following controls is MOST effective at preventing system failures when implementing a new web application?

A.

System recovery plan

B.

System testing

C.

Business continuity plan (BCP)

D.

Transaction monitoring

Full Access
Question # 399

Which of the following is the MOST efficient control to reduce the risk associated with a systems administrator having network administrator responsibilities?

A.

The administrator must obtain temporary access to make critical changes.

B.

The administrator will need to request additional approval for critical changes.

C.

The administrator must sign a due diligence agreement.

D.

The administrator will be subject to unannounced audits.

Full Access
Question # 400

A bank has a combination of corporate customer accounts (higher monetary value) and small business accounts (lower monetary value) as part of online banking. Which of the following is the BEST sampling approach for an IS auditor to use for these accounts?

A.

Difference estimation sampling

B.

Stratified mean per unit sampling

C.

Customer unit sampling

D.

Unstratified mean per unit sampling

Full Access
Question # 401

Which of the following constitutes an effective detective control in a distributed processing environment?

A.

A log of privileged account use is reviewed.

B.

A disaster recovery plan (DRP)4% in place for the entire system.

C.

User IDs are suspended after three incorrect passwords have been entered.

D.

Users are required to request additional access via an electronic mail system.

Full Access
Question # 402

Which of the following should be the FIRST step to successfully implement a corporate data classification program?

A.

Approve a data classification policy.

B.

Select a data loss prevention (DLP) product.

C.

Confirm that adequate resources are available for the project.

D.

Check for the required regulatory requirements.

Full Access
Question # 403

Which of the following BEST enables an IS auditor to confirm the batch processing to post transactions from an input source is successful?

A.

Error log review

B.

Total number of items

C.

Hash totals

D.

Aggregate monetary amount

Full Access
Question # 404

When designing metrics for information security, the MOST important consideration is that the metrics:

A.

conform to industry standards.

B.

apply to all business units.

C.

provide actionable data.

D.

are easy to understand.

Full Access
Question # 405

An IS auditor is evaluating the access controls for a shared customer relationship management (CRM) system. Which of the following would be the GREATEST concern?

A.

Single sign-on is not enabled

B.

Audit logging is not enabled

C.

Security baseline is not consistently applied

D.

Complex passwords are not required

Full Access
Question # 406

Which of the following is the BEST source of information for assessing the effectiveness of IT process monitoring?

A.

Real-time audit software

B.

Performance data

C.

Quality assurance (QA) reviews

D.

Participative management techniques

Full Access
Question # 407

Which of the following application input controls would MOST likely detect data input errors in the customer account number field during the processing of an accounts receivable transaction?

A.

Limit check

B.

Parity check

C.

Reasonableness check

D.

Validity check

Full Access
Question # 408

Which of the following is MOST important to verify when determining the completeness of the vulnerability scanning process?

A.

The organization ' s systems inventory is kept up to date.

B.

Vulnerability scanning results are reported to the CISO.

C.

The organization is using a cloud-hosted scanning tool for Identification of vulnerabilities

D.

Access to the vulnerability scanning tool is periodically reviewed

Full Access
Question # 409

An organization is considering allowing users to connect personal devices to the corporate network. Which of the following should be done FIRST?

A.

Conduct security awareness training.

B.

Implement an acceptable use policy

C.

Create inventory records of personal devices

D.

Configure users on the mobile device management (MDM) solution

Full Access
Question # 410

Which of the following is the MOST important consideration when relying on the work of the prior auditor?

A.

Qualifications of the prior auditor

B.

Management agreement with recommendations

C.

Duration of the prior audit

D.

Number of findings identified by the prior auditor

Full Access
Question # 411

Which of the following BEST supports an organization ' s objective of restricting the use of removable storage devices by users?

A.

Data management policy

B.

Updated anti-malware solutions

C.

Data loss prevention (DLP)

D.

Online monitoring

Full Access
Question # 412

A computer forensic audit is MOST relevant in which of the following situations?

A.

Inadequate controls in the IT environment

B.

Mismatches in transaction data

C.

Missing server patches

D.

Data loss due to hacking of servers

Full Access
Question # 413

An organization saves confidential information in a file with password protection and the file is placed in a shared folder. An attacker has stolen this information by obtaining the password through social engineering. Implementing which of the following would BEST enable the organization to prevent this type of incident in the future?

A.

Multi-factor authentication (MFA)

B.

Security awareness programs for employees

C.

Access history log review by the business manager

D.

File encryption along with password protection

Full Access
Question # 414

Which of the following should be an IS auditor ' s GREATEST concern when reviewing an organization ' s security controls for policy compliance?

A.

The security policy has not been reviewed within the past year.

B.

Security policy documents are available on a public domain website.

C.

Security policies are not applicable across all business units.

D.

End users are not required to acknowledge security policy training.

Full Access
Question # 415

Which of the following is the BEST source of information for examining the classification of new data?

A.

Input by data custodians

B.

Security policy requirements

C.

Risk assessment results

D.

Current level of protection

Full Access
Question # 416

Which of the following should be the GREATEST concern for an IS auditor reviewing recent disaster recovery operations?

A.

The recovery point objective (RPO) was not defined.

B.

Test data was lost during a recovery operation.

C.

A warm site was used as a recovery strategy.

D.

A full backup was only performed once a week.

Full Access
Question # 417

An organization using a cloud provider for its online billing system requires the website to be accessible to customers at all times. What is the BEST way to verify the organization ' s business requirements are met?

A.

Invoke the right-to-audit clause.

B.

Require the vendor to report any outages longer than five minutes

C.

Monitor the service level agreement (SLA) with the vendor.

D.

Agree on periodic performance discussions with the vendor

Full Access
Question # 418

When assessing the overall effectiveness of an organization ' s disaster recovery planning process, which of the following is MOST important for the IS auditor to verify?

A.

Management contracts with a third party for warm site services.

B.

Management schedules an annual tabletop exercise.

C.

Management documents and distributes a copy of the plan to all personnel.

D.

Management reviews and updates the plan annually or as changes occur.

Full Access
Question # 419

An information systems security officer ' s PRIMARY responsibility for business process applications is to:

A.

authorize secured emergency access

B.

approve the organization ' s security policy

C.

ensure access rules agree with policies

D.

create role-based rules for each business process

Full Access
Question # 420

Which of the following is the BEST way to mitigate the impact of ransomware attacks?

A.

Invoking the disaster recovery plan (DRP)

B.

Backing up data frequently

C.

Paying the ransom

D.

Requiring password changes for administrative accounts

Full Access
Question # 421

Which of the following is the PRIMARY reason for an IS auditor to perform a risk assessment?

A.

It helps to identify areas with a relatively high probability of material problems.

B.

It provides a basis for the formulation of corrective action plans.

C.

It increases awareness of the types of management actions that may be inappropriate

D.

It helps to identify areas that are most sensitive to fraudulent or inaccurate practices

Full Access
Question # 422

Which of the following methods would MOST effectively provide positive authentication for physical access?

A.

Proximity card

B.

Retina scan

C.

Numeric keypads and surveillance camera

D.

A smart card and a security guard

Full Access
Question # 423

An organization that operates an e-commerce website wants to provide continuous service to its customers and is planning to invest in a hot site due to service criticality. Which of the following is the MOST important consideration when making this decision?

A.

Maximum tolerable downtime (MTD)

B.

Recovery time objective (RTO)

C.

Recovery point objective (RPO)

D.

Mean time to repair (MTTR)

Full Access
Question # 424

Which of the following should be an IS auditor ' s GREATEST concern when an international organization intends to roll out a global data privacy policy?

A.

Requirements may become unreasonable.

B.

The policy may conflict with existing application requirements.

C.

Local regulations may contradict the policy.

D.

Local management may not accept the policy.

Full Access
Question # 425

An IS auditor learns that a business owner violated the organization ' s security policy by creating a web page with access to production data. The auditor ' s NEXT step should be to:

A.

determine if sufficient access controls exist.

B.

assess the sensitivity of the production data.

C.

shut down the web page.

D.

escalate to senior management.

Full Access
Question # 426

An organization has recently implemented a Voice-over IP (VoIP) communication system. Which ot the following should be the IS auditor ' s PRIMARY concern?

A.

A single point of failure for both voice and data communications

B.

Inability to use virtual private networks (VPNs) for internal traffic

C.

Lack of integration of voice and data communications

D.

Voice quality degradation due to packet toss

Full Access
Question # 427

During a follow-up engagement, an IS auditor confirms evidence of a problem that was not an issue in the original audit. Which of the following is the auditor ' s BEST course of action?

A.

Include the evidence as part of a future audit.

B.

Report only on the areas within the scope of the follow-up.

C.

Report the risk to management in the follow-up report.

D.

Expand the follow-up scope to include examining the evidence.

Full Access
Question # 428

Which of the following is the PRIMARY advantage of using visualization technology for corporate applications?

A.

Improved disaster recovery

B.

Better utilization of resources

C.

Stronger data security

D.

Increased application performance

Full Access
Question # 429

Which of the following are BEST suited for continuous auditing?

A.

Low-value transactions

B.

Real-lime transactions

C.

Irregular transactions

D.

Manual transactions

Full Access
Question # 430

Which of the following provides the GREATEST assurance that an organization has effective controls preventing connection of unauthorized Internet of Things (IoT) devices to the corporate network?

A.

Reviewing authenticated network vulnerability scan results

B.

Assessing as-implemented IoT device configurations

C.

Assessing network access control (NAC) configurations

D.

Reviewing IT policies covering IoT authorizations

Full Access
Question # 431

Which of the following metrics is the BEST indicator of the performance of a web application

A.

HTTP server error rate

B.

Server thread count

C.

Average response time

D.

Server uptime

Full Access
Question # 432

Which of the following is the BEST indication to an IS auditor that management ' s post-implementation review was effective?

A.

Lessons learned were documented and applied.

B.

Business and IT stakeholders participated in the post-implementation review.

C.

Post-implementation review is a formal phase in the system development life cycle (SDLC).

D.

Internal audit follow-up was completed without any findings.

Full Access
Question # 433

Which of the following responsibilities of an organization ' s quality assurance (QA) function should raise concern for an IS auditor?

A.

Ensuring standards are adhered to within the development process

B.

Ensuring the test work supports observations

C.

Updating development methodology

D.

Implementing solutions to correct defects

Full Access
Question # 434

Which of the following is the PRIMARY reason that asset classification is vital to an information security program?

A.

To ensure the appropriate level of protection to assets

B.

To ensure asset protection efforts are in line with industry standards

C.

To ensure risk mitigation efforts are adequate

D.

To ensure sufficient resources are allocated for information security

Full Access
Question # 435

An organization allows programmers to change production systems in emergency situations without seeking prior approval. Which of the following controls should an IS auditor consider MOST

important?

A.

Programmers ' subsequent reports

B.

Limited number of super users

C.

Operator logs

D.

Automated log of changes

Full Access
Question # 436

During an audit of an organization ' s risk management practices, an IS auditor finds several documented IT risk acceptances have not been renewed in a timely manner after the assigned expiration date When assessing the seventy of this finding, which mitigating factor would MOST significantly minimize the associated impact?

A.

There are documented compensating controls over the business processes.

B.

The risk acceptances were previously reviewed and approved by appropriate senior management

C.

The business environment has not significantly changed since the risk acceptances were approved.

D.

The risk acceptances with issues reflect a small percentage of the total population

Full Access
Question # 437

During the course of fieldwork, an internal IS auditor observes a critical vulnerability within a newly deployed application. What is the auditor ' s BEST course of action?

A.

Document the finding in the report.

B.

Identify other potential vulnerabilities.

C.

Notify IT management.

D.

Report the finding to the external auditors.

Full Access
Question # 438

What would be an IS auditor ' s BEST course of action when an auditee is unable to close all audit recommendations by the time of the follow-up audit?

A.

Ensure the open issues are retained in the audit results.

B.

Terminate the follow-up because open issues are not resolved

C.

Recommend compensating controls for open issues.

D.

Evaluate the residual risk due to open issues.

Full Access
Question # 439

Which of the following should be of GREATEST concern to an IS auditor conducting an audit of an organization that recently experienced a ransomware attack?

A.

Antivirus software was unable to prevent the attack even though it was properly updated

B.

The most recent security patches were not tested prior to implementation

C.

Backups were only performed within the local network

D.

Employees were not trained on cybersecurity policies and procedures

Full Access
Question # 440

Which of the following controls BEST ensures appropriate segregation of duties within an accounts payable department?

A.

Restricting program functionality according to user security profiles

B.

Restricting access to update programs to accounts payable staff only

C.

Including the creator’s user ID as a field in every transaction record created

D.

Ensuring that audit trails exist for transactions

Full Access
Question # 441

Which of the following is the GREATEST concern associated with a high number of IT policy exceptions approved by management?

A.

The exceptions are likely to continue indefinitely.

B.

The exceptions may result in noncompliance.

C.

The exceptions may elevate the level of operational risk.

D.

The exceptions may negatively impact process efficiency.

Full Access
Question # 442

Which of the following should be an IS auditor ' s PRIMARY focus when auditing the implementation of a new IT operations performance monitoring system?

A.

Reviewing whether all changes have been implemented

B.

Validating whether baselines have been established

C.

Confirming whether multi-factor authentication (MFA) is deployed as part of the operational enhancements

D.

Determining whether there is a process for annual review of the maintenance manual

Full Access
Question # 443

Which of the following is the GREATEST risk associated with hypervisors in virtual environments?

A.

Availability issues

B.

Virtual sprawl

C.

Single point of failure

D.

Lack of patches

Full Access
Question # 444

Which of the following is the GREATEST risk when relying on reports generated by end-user computing (EUC)?

A.

Data may be inaccurate.

B.

Reports may not work efficiently.

C.

Reports may not be timely.

D.

Historical data may not be available.

Full Access
Question # 445

Which of the following is an analytical review procedure for a payroll system?

A.

Performing reasonableness tests by multiplying the number of employees by the average wage rate

B.

Evaluating the performance of the payroll system using benchmarking software

C.

Performing penetration attempts on the payroll system

D.

Testing hours reported on time sheets

Full Access
Question # 446

Which of the following is the MOST effective way to detect as many abnormalities as possible during an IS audit?

A.

Conduct a walk-through of the process.

B.

Perform substantive testing on sampled records.

C.

Perform judgmental sampling of key processes.

D.

Use a data analytics tool to identify trends.

Full Access
Question # 447

Which of the following should an IS auditor perform FIRST when auditing an outsourced human resource application?

A.

Verify that fees billed for the service are appropriate to the work performed.

B.

Review the terms and provisions in the contract.

C.

Implement data access rights consistent with the organization’s security policy.

D.

Verify that security incident reports are issued in a timely manner.

Full Access
Question # 448

Which of the following would present the GREATEST concern during a review of internal audit quality assurance (QA) and continuous improvement processes?

A.

Improvement opportunities are not centrally tracked.

B.

The audit function is not subject to independent periodic external review.

C.

Substantive testing is not performed during the assessment phase of some audits.

D.

Quarterly reports are not distributed to the audit committee.

Full Access
Question # 449

A data center ' s physical access log system captures each visitor ' s identification document numbers along with the visitor ' s photo. Which of the following sampling methods would be MOST useful to an IS auditor conducting compliance testing for the effectiveness of the system?

A.

Quota sampling

B.

Haphazard sampling

C.

Attribute sampling

D.

Variable sampling

Full Access
Question # 450

A contract for outsourcing IS functions should always include:

A.

Full details of security procedures to be observed by the contractor.

B.

A provision for an independent audit of the contractor’s operations.

C.

The names and roles of staff to be employed in the operation.

D.

Data transfer protocols.

Full Access
Question # 451

Which of the following is MOST helpful for understanding an organization’s key driver to modernize application platforms?

A.

Vendor software inventories

B.

Network architecture diagrams

C.

System-wide incident reports

D.

Inventory of end-of-life software

Full Access
Question # 452

Which of the following should be of GREATEST concern to an IS auditor when using data analytics?

A.

The data source lacks integrity.

B.

The data analytics software is open source.

C.

The data set contains irrelevant fields.

D.

The data was not extracted by the auditor.

Full Access
Question # 453

An organization wants to use virtual desktops to deliver corporate applications to its end users. Which of the following should an IS auditor recommend to prevent domain name system (DNS) poisoning in their cloud environment?

A.

Enable verification of administrators to protect against impersonators modifying DNS tables.

B.

Configure ONS servers to create appropriately sized responses to domain resolution requests.

C.

Ensure DNS changes are propagated across all servers in the organization ' s cloud account.

D.

Provide corporate laptops to end users with built-in antivirus tools that scan for DNS vulnerabilities.

Full Access
Question # 454

An IS auditor finds that periodic reviews of read-only users for a reporting system are not being performed. Which of the following should be the IS auditor ' s NEXT course of action?

A.

Review the list of end users and evaluate for authorization.

B.

Report this control process weakness to senior management.

C.

Verify managements approval for this exemption

D.

Obtain a verbal confirmation from IT for this exemption.

Full Access
Question # 455

Which of the following would be an auditor ' s GREATEST concern when reviewing data inputs from spreadsheets into the core finance system?

A.

Undocumented code formats data and transmits directly to the database.

B.

There is not a complete inventory of spreadsheets, and file naming is inconsistent.

C.

The department data protection policy has not been reviewed or updated for two years.

D.

Spreadsheets are accessible by all members of the finance department.

Full Access
Question # 456

Which of the following would be the GREATEST concern for an IS auditor conducting a pre-implementation review of a data loss prevention (DLP > tool?

A.

The tool is implemented in monitor mode rather than block mode.

B.

Crawlers are used to discover sensitive data.

C.

Deep packet inspection opens data packets in transit.

D.

Encryption keys are not centrally managed.

Full Access