Certified Information Systems Auditor (CISA) - Mock Exam 2
Certified Information Systems Auditor (CISA) - Mock Exam 2
Certified Information Systems Auditor (CISA) - Mock Exam 2
2. Which of the following should be the first step in managing the impact of
a recently discovered zero-day attack?
a. Estimating potential damage.
b. Identifying vulnerable assets.
c. Evaluating the likelihood of an attack.
d. Assessing the impact of vulnerabilities.
19. Which of the following would MOST effectively ensure the integrity of
data transmitted over a network?
a. Message encryption
b. Steganography
c. A certificate authority (CA)
d. Message digest
20. Which of the following would be MOST useful to an IS auditor assessing
the effectiveness of IT resource planning?
a. Budget execution status.
b. A capacity analysis of IT operations.
c. A succession plan for key IT personnel.
d. A list of new applications to be implemented.
26. A small startup organisation does not have the resources to implement
segregation of duties. Which of the following is the MOST effective
compensating control?
a. Rotation of log monitoring and analysis responsibilities.
b. Additional management reviews and reconciliations.
c. Mandatory vacations.
d. Third-party assessments.
31. Which of the following security measures will reduce the risk of
propagation when a cyberattack occurs?
a. Data loss prevention (DLP) system.
b. Perimeter firewall.
c. Network segmentation on Web application firewall.
d. Internally-facing network assets.
32. An IS auditor notes that the previous year's disaster recovery test was
not completed within the scheduled time frame due to insufficient
hardware allocated by a third-party vendor. Which of the following
provides the best evidence that adequate resources are now allocated
to successfully recover the systems?
a. Hardware change management policy.
b. An up-to-date RACI charts.
c. Vendor memo indicating problem correction.
d. Service level agreement (SLA).
34. During audit fieldwork, an IS auditor learns that employees are allowed
to connect their personal devices to company-owned computers. How
can the auditor best validate that appropriate security controls are in
place to prevent data loss?
a. Verify the data loss prevention (DLP) tool is properly configured by
the organisation.
b. Review compliance with data loss and applicable mobile device
user acceptance policies.
c. Verify employees have received appropriate mobile device
security awareness training.
d. Conduct a walk-through to view the results of an employee
plugging in a device to transfer confidential data.
35. Management has requested a post-implementation review of a newly
implemented purchasing package to determine to what extent business
requirements are being met. Which of the following is most likely to be
assessed?
a. Implementation methodology
b. Test results
c. Purchasing guidelines and policies
d. Results of live processing
37. In an online application, which of the following would provide the MOST
information about the transaction audit trail?
a. File layouts
b. Data architecture
c. System/process flowchart
d. Source code documentation
40. Which of the following approaches will ensure recovery time objectives
(RTOs) are met for an organisation's disaster recovery plan (DRP)?
a. Performing a full interruption test
b. Performing a parallel test
c. Performing a tabletop test
d. Performing a cyber-resilience test