CISA Dump - Updated
CISA Dump - Updated
CISA Dump - Updated
CISA
Certified Information
Systems Auditor
Version: 33.0
Email: support@dumpscollection.com
IMPORTANT NOTICE
Feedback
We have developed quality product and state-of-art service to ensure our customers interest. If you have any
suggestions, please feel free to contact us at feedback@dumpscollection.com
Support
If you have any questions about our product, please provide the following items:
exam code
screenshot of the question
login id/email
please contact us at support@dumpscollection.com and our technical experts will provide support within 24 hours.
Copyright
The product of each order has its own encryption code, so you should use it independently. Any unauthorized
changes will inflict legal punishment. We reserve the right of final explanation for this statement.
Dumps Q&A Isaca - CISA
Question #:1
An organization is within a jurisdiction where new regulations have recently been announced to restrict
cross-border data transfer of personally identifiable information (PIl). Which of the following IT decisions will
MOST likely need to be assessed in the context of this?
Answer: D
Question #:2
Which of the following is the MOST effective way to identify anomalous transactions when performing a
payroll fraud audit?
Answer: B
Question #:3
An organization decides to establish a formal incident response capability with clear roles and responsibilities
facilitating centralized reporting of security incidents. Which type of control is being implemented?
A. Corrective control
B. Compensating control
C. Preventive control
D. Detective control
Answer: A
Question #:4
Which of the following strategies BEST optimizes data storage without compromising data retention
practices?
Answer: B
Question #:5
Answer: D
Question #:6
Which of the following is MOST influential when defining disaster recovery strategies?
Answer: A
Question #:7
During a review of operations, it is noted that during a batch update, an error was detected and the database
initiated a roll-back. An IT operator stopped the roll-back and re-initiated the update. What should the operator
Answer: C
Question #:8
A. Encrypt data.
C. Back up data.
D. Classify data.
Answer: D
Question #:9
Answer: A
Question #:10
When aligning IT projects with organizational objectives, it is MOST important to ensure that the:
Answer: C
Question #:11
Which of the following Is the MOST effective way for an IS auditor to evaluate whether an organization is
well positioned to defend against an advanced persistent threat (APT)?
B. Verify that the organization is using correlated data for security monitoring
C. Review the validity of external Internet Protocol (IP) addresses accessing the network
Answer: B
Question #:12
The use of symmetric key encryption controls to protect sensitive data transmitted over a communications
network requires that.
Answer: C
Question #:13
During a systems development project, participation in which of the following activities would compromise
the IS auditor's independence?
D.
Answer: B
Question #:14
When reviewing an organization's data protection practices, an IS auditor should be MOST concerned with a
lack of:
A. a security team.
B. data classification.
C. training manuals.
D. data encryption.
Answer: B
Question #:15
Management has decided to include a compliance manager in the approval process for a new business that
may require changes to tie IT infrastructure. Which of the following is the GREATEST benefit of this
approach?
Answer: D
Question #:16
A data center's physical access log system captures each visitor's identification document numbers along with
the visitor's photo. Which of the following sampling methods would be MOST useful to an IS auditor
conducting compliance testing for the effectiveness of the system?
A. Haphazard sampling
B. Attribute sampling
C. Variable sampling
D.
D. Quota sampling
Answer: A
Question #:17
The FIRST course of action an investigator should take when a computer is being attacked is to:
Answer: C
Question #:18
Which of the following BEST indicates that an organization has effective governance in place?
Answer: C
Question #:19
Which of the following should an IS auditor recommend to reduce the likelihood of potential intruders using
social engineering?
Answer: B
Question #:20
Which of the following is the MOST likely reason an organization would use Platform as a Service (PaaS)?
Answer: A
Question #:21
Answer: C
Question #:22
An organization is deciding whether to outsource its customer relationship management systems to a provider
located in another country. Which of the following should be the PRIMARY influence in the outsourcing
decision?
Answer: C
Question #:23
Which of the following MOST effectively mitigates the risk of disclosure of sensitive data stored on
company-owned smartphones?
A. Secure containers
Answer: B
Question #:24
An IS auditors independence with respect to the audit of an application system is MOST likely to be impaired
if the auditor
Answer: C
Question #:25
Which of the following would be the MOST effective method to identify high risk areas in the business to be
included in the audit plan?
Answer: D
Question #:26
An IS auditor evaluating a three-tier client/server architecture observes an issue with graphical user interface
(GUI) tasks. Which layer should the auditor recommend the client address?
A. Presentation layer
B.
B. Application layer
C. Storage layer
D. Transport layer
Answer: A
Question #:27
Which of the following technologies has the SMALLEST maximum range for data transmission between
devices?
C. Bluetooth
D. Wi-Fi
Answer: A
Question #:28
A third-party service provider is hosting a private cloud for an organization. Which of the following findings
during an audit of the provider poses the GREATEST risk to the organization?
B. The organization’s virtual machines share the same hypervisor with virtual machines of other clients.
C. Two different hypervisor versions are used due to the compatibility restrictions of some virtual
machines.
D. 5% of detected incidents exceeded the defined service level agreement (SLA) for
escalation.
Answer: B
Question #:29
A large insurance company is about to replace a major financial application. Which of the following is the IS
auditor's PRIMARY focus when conducting the pre-implementation review?
A. Procedure updates
B. Migration of data
C. System manuals
D. Unit testing
Answer: B
Question #:30
Which of the following should be of MOST concern to an IS auditor during the review of a quality
management system?
D. Important quality checklists are maintained outside the quality management system.
Answer: B
Question #:31
An organization has established hiring policies and procedures designed specifically to ensure network
administrators are well qualified. Which type of control is in place?
A. Detective
B. Directive
C. Corrective
D. Preventive
Answer: A
Question #:32
Which of the following is MOST important to ensure when planning a black box penetration test?
C.
Answer: C
Question #:33
Which of the following is the MOST effective way to reduce risk to an organization from widespread use of
unauthorized web-based communication technologies?
B. Block access from user devices to unauthorized sites that allow web-based
C. communication. 1 Monitor unauthorized staff usage of web-based communication and notify the IT
security department of violations.
Answer: D
Question #:34
An organization's IT security policy requires annual security awareness training for all employees. Which of
the following would provide the BEST evidence of the training's effectiveness?
Answer: A
Question #:35
Which of the following observations would an IS auditor consider the GREATEST risk when conducting an
audit of a virtual server farm for potential software vulnerabilities?
C. Antivirus software has been implemented on the guest operating system only.
Answer: C
Question #:36
The BEST way to validate whether a malicious act has actually occurred in an application is to review.
B. segregation of duties
C. activity logs
D. access controls
Answer: C
Question #:37
Which of the following is the PRIMARY purpose of quality assurance (QA) within an IS audit department?
Answer: B
Question #:38
An IS auditor's PRIMARY objective when examining problem reports should be to help ensure:
Answer: B
Question #:39
Which of the following should be an IS auditor's PRIMARY consideration when evaluating the development
and design of a privacy program?
Answer: D
Question #:40
The decision to accept an IT control risk related to data quality should be the responsibility of the:
C. business owner.
D. IS audit manager.
Answer: C
Question #:41
Which of the following can help ensure that IT deliverables are linked to business goals and that appropriate
performance criteria are in place?
D. Benchmarking
Answer: B
Question #:42
chain management processes Customer orders are not being fulfilled in a timely manner, and the inventory in
the warehouse does not match the quantity of goods in the sales orders. Which of the following is the auditor's
BEST recommendation?
A. Require the sales representative to verify inventory levels prior to finalizing sales orders.
B. Require the warehouse manager to send updated inventory levels on a periodic basis.
C. Revise the order fulfillment procedures in collaboration with the e-commerce team.
D. Implement an automated control to verify inventory levels prior to finalizing sales orders.
Answer: D
Question #:43
A. a capability model.
B. industry benchmarks
D. organizational goals.
Answer: C
Question #:44
When evaluating an IT organizational structure, which of the following is MOST important to ensure has been
documented?
Answer: C
Question #:45
An organization has recently converted its infrastructure to a virtualized environment. The GREATEST
Answer: A
Question #:46
Which of the following would BEST enable an IS auditor to perform an audit that requires testing the full
population of data?
Answer: B
Question #:47
When using a wireless device, which of the following BEST ensures confidential access to email via web
mail?
Answer: A
Question #:48
Which of the following is the BEST source of information for an IS auditor when planning an audit of a
business application's controls?
B. User documentation
Answer: A
Question #:49
To ensure efficient and economic use of limited resources in supporting a local area network (LAN)
infrastructure, it is advisable to:
C. quickly upgrade to the latest hardware and software versions to take advantage of new features
D. recommend a variety of products so that user effectiveness and flexibility can be maximized.
Answer: B
Question #:50
Which of the following should be done FIRST when planning a penetration test?
Answer: D
Question #:51
Which of the following would an IS auditor recommend as the MOST effective preventive control to reduce
the risk of data leakage?
B.
Answer: D
Question #:52
Which of the following observations should be of GREATEST concern to an IS auditor reviewing a large
organization's virtualization environment?
Answer: B
Question #:53
An IS auditor has found that an organization is unable to add new servers on demand in a cost-efficient
manner Which of the following is the auditor s BEST recommendation?
Answer: C
Question #:54
When deploying an application that was created using the programming language and tools supported by the
cloud provider, the MOST appropriate cloud computing model for an organization to adopt is:
Answer: A
Question #:55
Which of the following should be the PRIMARY consideration for IT management when selecting a new
information security tool that monitors suspicious file access patterns?
Answer: A
Question #:56
Which of the following should be of MOST concern lo an IS auditor reviewing the public key infrastructure
(PKI) for enterprise email?
C. The PKI policy has not been updated within the last year.
Answer: A
Question #:57
Answer: A
Question #:58
Answer: D
Question #:59
Which of the following is the BEST way for an IS auditor to ensure the completeness of data collected for
advanced analytics during an audit?
B. Review the query or parameters used to download the data before selecting samples
C. Obtain access to the quality assurance (QA) system to independently download the information
Answer: B
Question #:60
Which of the following would an IS auditor PRIMARILY review to understand key drivers of a project?
D. Business case
Answer: D
Question #:61
What is the BEST population to select from when testing that programs are migrated to production with proper
approval?
B.
Answer: D
Question #:62
Which of the following is the PRIMARY risk when business units procure IT assets without IT involvement?
Answer: D
Question #:63
During the post-implementation review of an application that was implemented six months ago which of the
following would be MOST helpful in determining whether the application meets business requirements?
A. Project closure report and lessons-learned documents from the project management office (PMO)
B. User acceptance testing (UAT) results and sign-off from users on meeting business requirements
C. Comparison between expected benefits from the business case and actual benefits after implementation
D. Difference between approved budget and actual project expenditures determined post implementation
Answer: C
Question #:64
D.
Answer: C
Question #:65
A bank recently experienced fraud where unauthorized payments were inserted into the payments transaction
process. An IS auditor has reviewed the application systems and databases along the processing chain but has
not identified the entry point of the fraudulent transactions. Where should the auditor look NEXT?
Answer: D
Question #:66
When engaging services from external auditors, which of the following should be established FIRST?
B. Nondisclosure agreements
Answer: B
Question #:67
An IS auditor has completed an audit of an organization's accounts payable system. Which of the following
should be rated as the HIGHEST risk in the audit report and requires immediate remediation?
D. Lack of segregation of duty controls for updating the vendor master file
Answer: D
Question #:68
Which of the following is the MOST important operational aspect for an IS auditor to consider when assessing
an assembly line with quality control sensors accessible via wireless techno
A. Known vulnerabilities
B. Resource utilization
C. Device security
D. Device updates
Answer: C
Question #:69
When planning an end-user computing (EUC) audit, it is MOST important for the IS auditor to:
Answer: D
Question #:70
An IS auditor finds that firewalls are outdated and not supported by vendors. Which of the following should be
the auditor s NEXT course of action?
Answer: D
Question #:71
A.
Answer: C
Question #:72
Which of the following BEST guards against the risk of attack by hackers?
A. Tunneling
B. Message validation
C. Encryption
D. Firewalls
Answer: C
Question #:73
Which of the following BEST enables an IS auditor to detect incorrect exchange rates applied to outward
remittance transactions at a financial institution?
D. Using supervised machine learning techniques to develop a regression model to predict incorrect input
Answer: A
Question #:74
UESTION NO: 3
The CIO of an organization is concerned that the information security policies may not be comprehensive.
Which of the following should an IS auditor recommend be performed FIRST?
Answer: D
Question #:75
Answer: B
Question #:76
Which of the following is the BEST way to detect system security breaches?
Answer: B
Question #:77
Tunneling provides additional security for connecting one host to another through the Internet by:
Answer: C
Question #:78
An organization has outsourced its data leakage monitoring to an Internet service provider (ISP). Which of the
following is the BEST way for an IS auditor to determine the effectiveness of this service?
Answer: C
Question #:79
Which type of control is in place when an organization requires new employees to complete training on
applicable privacy and data protection regulations?
A. Preventive control
B. Directive control
C. Detective control
D. Corrective control
Answer: B
Question #:80
Which of the following should be of GREATEST concern to an IS auditor conducting a security review of a
point-of-sale (POS) system?
A. POS systems are not integrated with accounting applications for data transfer
C. An optical scanner is not used to read bar codes for generating sales invoices
D. Credit card verification value (CW) information is stored on local POS systems
Answer: D
Question #:81
Which of the following provides an IS auditor the MOST assurance that an organization is compliant with
legal and regulatory requirements?
B. Controls associated with legal and regulatory requirements have been identified and tested
D. The IT manager is responsible for the organization s compliance with legal and regulatory requirements.
Answer: B
Question #:82
Which of the following network management toots should an IS auditor use to review the type of packets
flowing along a monitored link'?
B. Network monitors
C. Protocol analyzers
D. Online monitors
Answer: B
Question #:83
In a situation where the recovery point objective (RPO) is 0 for an online transaction processing system, which
of the following is MOST important for an IS auditor to verify?
Answer: B
Question #:84
Which of the following should be done FIRST to effectively define the IT audit universe for an entity with
multiple business lines?
D. Identify key control objectives for each business line's core processes
Answer: C
Question #:85
Which of the following observations should be of GREATEST concern to an IS auditor reviewing a hosted
virtualized environment where each guest operating system (OS) is r
A. There are file shares between the host OS and the guest OS
D. All virtual machines are launching an application backup job at the same time
Answer: B
Question #:86
Which of the following BEST demonstrates the degree of alignment between IT and business strategy?
Answer: D
Question #:87
A. The system produces daily payment summary reports that staff use to compare against invoice totals.
B. Policies and procedures are clearly communicated to all members of the accounts payable department.
C. The system only allows payments to vendors who are included in the system's master vendor list.
D. Backups of the system and its data are performed on a nightly basis and tested periodically.
Answer: C
Question #:88
A. Detective
B. Directive
C. Preventive
D. Corrective
Answer: D
Question #:89
Which of the following is the BEST indication of the completeness of interface control documents used for the
development of a new application?
Answer: B
Question #:90
Which of the following MUST be completed before selecting and deploying a biometric system that uses
facial recognition software?
B.
B. Vulnerability assessment
Answer: D
Question #:91
While conducting a system architecture review, an IS auditor learns of multiple complaints from field agents
about the latency of a mobile thin client designed to provide information during site inspections Which of the
following is the BEST way to address this situation?
C. Switch to a thick-client architecture that does not require a persistent fetwork connectio.
D. Upgrade the thin-client software to provide more informative error messages during application loading
Answer: B
Question #:92
Which of the following should be the FIRST step in an organization's forensics process to preserve evidence?
Answer: D
Question #:93
Which of the following would be of GREATEST concern to an IS auditor evaluating governance over open
source development components?
B. The open source development components do not meet industry best practices
C. Existing open source policies have not been approved in over a year
Answer: A
Question #:94
A month after a company purchased and implemented system and performance monitoring software reports
were too large and therefore were not reviewed or acted upon The MOST effective plan of action would be to
D. use analytical tools to produce exception reports from the system and performance monitoring software
Answer: C
Question #:95
Which of the following is the GREATEST advantage of application penetration testing over vulnerability
scanning?
B. Penetration testing creates relatively smaller risks to application availability and integrity
Answer: C
Question #:96
To BEST evaluate the effectiveness of a disaster recovery plan, the IS auditor should review the:
Answer: A
Question #:97
The GREATEST benefit of using a prototyping approach in software development is that it helps to:
Answer: B
Question #:98
An organization has agreed to perform remediation related to high-risk audit findings. The remediation process
involves a complex reorganization of user roles as well as the Implementation of several compensating
controls that may not be completed within the next audit cycle Which of the following is the BEST way for an
IS auditor to follow up on their activities?
Answer: A
Question #:99
An IS auditor has been asked to assess the security of a recently migrated database system that contains
personal and financial data for a bank's customers. Which of the following controls is MOST important for the
auditor to confirm is in place?
B. The default administration account is used after changing the account password.
C. The service port used by the database server has been changed.
Answer: A
Question #:100
Which of the following is the MOST important factor when an organization is developing information security
policies and procedures?
Answer: A
Question #:101
An IS auditor has assessed a payroll service provider’s security policy and finds significant topics are missing.
Which of the following is the auditor’s BEST course of action?
Answer: B
Question #:102
Which of the following is MOST important for the successful establishment of a security vulnerability
management program?
Answer: C
Question #:103
Which of the following is the PRIMARY purpose of conducting follow-up audits for material observations?
Answer: C
Question #:104
Answer: A
Question #:105
The PRIMARY benefit of using secure shell (SSH) to access a server on a network is that it:
Answer: A
Question #:106
Answer: C
Question #:107
In the risk assessment process, which of the following should be identified FIRST?
A. Impact
B. Threats
C. Assets
D. Vulnerabilities
Answer: C
Question #:108
An IS auditor finds that a document related to a client has been leaked. Which of the following should be the
auditor's NEXT step?
Answer: B
Question #:109
An IS auditor is using data analytics in an audit and has obtained the data to be used for testing. Which of the
following is the MOST important task before testing begins?
Answer: C
Question #:110
What is the MOST important business concern when an organization is about to migrate a mission-critical
application to a virtual environment?
Answer: B
Question #:111
Regression testing should be used during a system development project to ensure that:
Answer: D
Question #:112
Answer: B
Question #:113
Which of the following control testing approaches is BEST used to evaluate a control's ongoing effectiveness
by comparing processing results to independently calculated data?
A.
B. Sample-based re-performance
D. Statistical sampling
Answer: C
Question #:114
A database audit reveals an issue with the way data ownership for client data is defined. Which of the
following roles should be accountable for this finding?
A. Business management
B. Database administrator
D. Privacy manager
Answer: A
Question #:115
A 5 year audit plan provides for general audits every year and application audits on alternating years. To
achieve higher efficiency, the IS audit manager would MOST likely:
A. Alternate between control self-assessment (CSA) and general audits every year.
B. Have control self-assessments (CSAs) and formal audits of application on alternating years
Answer: C
Question #:116
Which of the following would provide the BEST evidence for use in a forensic investigation of an employee's
hard drive?
A. Prior backups
Answer: B
Question #:117
Which of the following should MOST concern an IS auditor reviewing an intrusion detection system (IDS)?
Answer: C
Question #:118
An organization plans to launch a social media presence as part of a new customer service campaign. Which of
the following is the MOST significant risk from the perspective of potential litigation?
A. Approved employees can use personal devices to post on the company $ behalf
B. There is a lack of dear procedures for responding to customers on social media outlets
D. The policy stating what employees can post on the organization s behalf is unclear.
Answer: D
Question #:119
An IS auditor attempts to sample for variables in a population of items with wide differences in values but
determines that an unreasonably large number of sample items must be selected to produce the desired
confidence level. In this situation, which of the following is the BEST audit decision?
B.
Answer: C
Question #:120
Which of the following should be the FIRST step when drafting an incident response plan for a new
cyber-attack scenario?
Answer: B
Question #:121
B. Reviewing credit card applications submitted in the past month for blank data fields
D. Reviewing the business requirements document for the credit card application system
Answer: B
Question #:122
Which of the following is the BEST way to achieve high availability and fault tolerance for an e-business
system?
D. Network diversity
Answer: C
Question #:123
Which of the following is a detective control that can be used to uncover unauthorized access to information
systems?
Answer: B
Question #:124
Which of the following is the BEST justification for deferring remediation testing until the next audit?
B. Management's planned actions are sufficient given the relative importance of the observations
Answer: D
Question #:125
An IS auditor is planning an audit of an organization's accounts payable processes. Which of the following
controls is I to assess m the audit?
Answer: C
Question #:126
Which of the following is the MOST important step in the development of an effective IT governance action
plan?
Answer: A
Question #:127
Within the context of an IT-related governance framework, which type of organization would be considered
MOST mature?
B. An organization m a state of dynamic growth with continuously updated policies and procedures
Answer: D
Question #:128
Which of the following is the BEST way to ensure that business continuity plans (BCPs) will work effectively
in the event of a major disaster?
Answer: C
Question #:129
Answer: C
Question #:130
An IS auditor noted that a change to a critical calculation was placed into the production environment without
being tested. Which of the following is the BEST way to obtain assurance that the calculation functions
correctly?
Answer: A
Question #:131
Which of the following is the MAIN risk associated with adding a new system functionality during the
development phase without following a project change management process?
Answer: B
Question #:132
Due to a global pandemic, a health organization has instructed its employees to work from home as much as
possible. The employees communicate using instant messaging Which of the following is the GREATEST risk
in this situation?
A. Home office setups may not be compliant with workplace health and safety requirements.
C. The capacity of servers may not allow all users to connect simultaneously
Answer: D
Question #:133
While reviewing similar issues in an organization s help desk system, an IS auditor finds that they were
analyzed independently and resolved differently This situation MOST likely indicates a deficiency in:
A. problem management
C. change management
D. configuration management
Answer: D
Question #:134
Which of the following practices BEST ensures that archived electronic information of permanent importance
is accessible over time?
Answer: C
Question #:135
Answer: C
Question #:136
When evaluating the management practices at a third-party organization providing outsourced services, the IS
auditor considers relying on an independent auditors report. The IS auditor.....
Answer: C
Question #:137
Answer: B
Question #:138
After delivering an audit report, the audit manager discovers that evidence was overlooked during the audit
This evidence indicates that a procedural control may have failed and could contradict a conclusion of the
audit. Which of the following risks is MOST affected by the oversight?
A. Operational
B. Audit
C. Inherent
D.
D. Financial
Answer: C
Question #:139
Answer: B
Question #:140
Which of the following is an IS auditor's BEST recommendation to help an organization increase the
efficiency of computing resources?
B. Virtualization
C. Real-time backups
D. Hardware upgrades
Answer: D
Question #:141
A senior auditor is reviewing work papers prepared by a junior auditor indicating that a finding was removed
after the auditee said they corrected the problem. Which of the following is the senior auditor's MOST
appropriate course of action?
Answer: B
Question #:142
During the design phase of a software development project, the PRIMARY responsibility of an IS auditor is to
evaluate the:
Answer: B
Question #:143
A. Input validation
B. Unicode translation
D. Digital signatures
Answer: C
Question #:144
Which of the following should be the PRIMARY concern of an IS auditor during a review of an external IT
service level agreement (SLA) for computer operations?
Answer: A
Question #:145
When reviewing a contract for a disaster recovery hot site, which of the following would be the MOST
significant omission?
A. Equipment provided
B. Testing procedures
C. Audit rights
D. Exposure coverage
Answer: C
Question #:146
An IS audit manager finds that data manipulation logic developed by the audit analytics team leads to incorrect
conclusions This inaccurate logic is MOST likely an indication of lich of the following?
A. Poor change controls over data sets collected from the business
Answer: B
Question #:147
When evaluating database management practices, which of the following controls would MOST effectively
support data integrity?
Answer: B
Question #:148
internal IS auditor recommends that incoming accounts payable payment files be encrypted. Which type of
control is the auditor recommending?
A. Directive
B. Detective
C. Preventive
D. Corrective
Answer: C
Question #:149
Which of the following would be a result of utilizing a top-down maturity model process?
Answer: B
Question #:150
A. Data integrity
B. Business continuity
C. System performance
D. Control adequacy
Answer: A
Question #:151
Which of the following represents a potential single point of failure in the virtualized environment that could
result in a compromise with greater scope and impact?
C.
Answer: C
Question #:152
After an employee termination, a network account was removed, but the application account remained active.
To keep this issue from recurring, which of the following is the BEST recommendation?
Answer: D
Question #:153
Which of the following is the MOST significant risk associated with peer-to-peer networking technology?
Answer: D
Question #:154
An IS auditor is reviewing the change management process in a large IT service organization. Which of the
following observations would be the GREATEST concern?
B. User acceptance testing (UAT) can be waived in case of emergency software releases
D. A senior developer has permanent access to promote code for emergency software releases
Answer: D
Question #:155
An IS auditor reviewing the use of encryption finds that the symmetric key is sent by an email message
between the parties. Which of the following audit responses is correct in this situation?
A. No audit finding is recorded as it is normal to distribute a key of this nature in this manner
B. An audit finding is recorded as the key should be asymmetric and therefore changed
Answer: D
Question #:156
Which of the following factors constitutes a strength in regard to the use of a disaster recovery planning
reciprocal agreement?
B. The two companies might share a need for a specialized piece of equipment
C. Changes to the hardware or software environment by one company could make the agreement
ineffective or obsolete.
Answer: B
Question #:157
Which of the following is the BEST way for an IS auditor to maintain visibility of a new system
implementation project when faced with resource limitations
Answer: D
Question #:158
An IS auditor is following up on prior period items and finds management did not address an audit finding.
Which of the following should be the IS auditor's NEXT course of action?
D. Note the exception in a new report as the item was not addressed by management
Answer: A
Question #:159
Which of the following would be of GREATEST concern to an IS auditor reviewing backup and recovery
controls?
Answer: B
Question #:160
During business process reengineering (BPR) of a bank's teller activities, an IS auditor should evaluate:
Answer: A
Question #:161
Which of the following areas of responsibility would cause the GREATEST segregation of duties conflict if
the individual who performs the related tasks also has approval authority?
Answer: A
Question #:162
A company converted its payroll system from an external service to an internal package Payroll processing in
April was run in parallel. To validate the completeness of data after the conversion, which of the following
comparisons from the old to the new system would be MOST effective?
Answer: B
Question #:163
Which of the following observations should be of GREATEST concern to an IS auditor reviewing a large
organization's IT steering committee?
A. Resource and priority conflict resolution has been delegated to the project management office
Answer: C
Question #:164
An organization has suffered a number of incidents in which USB flash drives with sensitive data have been
lost. Which of the following would be MOST effective in preventing loss of sensitive data?
Answer: A
Question #:165
Which of the following is the BEST sampling method when performing an audit test to determine the number
of access requests without approval signatures?
A. Attribute sampling
B. Judgment sampling
C. Stratified sampling
D. Stop-or-go sampling
Answer: A
Question #:166
A financial institution has a system interface that is used by its branches to obtain applicable currency
exchange rates when processing transactions Which of the following should be the PRIMARY control
objective for maintaining the security of the system interface?
Answer: C
Question #:167
Which of the following should be reviewed FIRST when assessing the effectiveness of an organization's
network security procedures and controls?
A. Vulnerability remediation
B.
C. Malware defenses
Answer: B
Question #:168
An organization is in the process of deciding whether to allow a bring your own device (BYOD) program. If
approved, which of the following should be the FIRST control required before implementation''
A. Device registration
D. An awareness program
Answer: B
Question #:169
Which of the following is MOST critical to include when developing a data loss prevention (DIP) policy?
C. Identification of the users, groups, and roles to whom the policy will apply
Answer: D
Question #:170
D.
Answer: C
Question #:171
A. Directive
B. Deterrent
C. Preventive
D. Detective
Answer: D
Question #:172
A sales representative is reviewing the organization's feedback blog and gets redirected to a site that sells
illegal prescription drugs. The blog site is MOST likely susceptible to which of the following types of attacks?
A. Directory harvesting
B. Phishing attack
C. Cross-site scripting
D. SQL injection
Answer: C
Question #:173
Which of the following is the MOST effective control to ensure electronic records beyond their retention
periods are deleted from IT systems?
Answer: A
Question #:174
Which of the following is the PRIMARY reason for an IS auditor to select a statistical sampling method?
A. Statistical sampling methods enable the auditor to objectively quantify the probability of error.
B. Statistical sampling methods are the most effective way to avoid sampling risk.
D. Statistical sampling methods help the auditor to determine the tolerable error rate.
Answer: B
Question #:175
An IS auditor reviewing the system development life cycle (SDLC) finds there is no requirement for business
cases. Which of the following should be of GREATEST concern to the organization?
Answer: A
Question #:176
An e-commerce enterprise's disaster recovery (DR) site has 30% less processing capability than the primary
site. Based on this information, which of the following presents the GREATEST risk?
A. Network firewalls and database firewalls at the DR site do not provide high availability.
B. No disaster recovery plan (DRP) testing has been performed during the last six months.
Answer: D
Question #:177
Which of the following controls will BEST ensure that the board of directors receives sufficient information
about IT?
B. Board members are knowledgeable about IT and the CIO is consulted on IT issues.
D. Regular meetings occur between the board the CIO and a technology committee
Answer: B
Question #:178
Which of the following would be MOST important to update once a decision has been made to outsource a
critical application to a cloud service provider?
A. IT budget
C. IT resource plan
D. Project portfolio
Answer: B
Question #:179
Answer: C
Question #:180
An IS auditor is planning to audit an organization's infrastructure for access, patching, and change
management. Which of the following is the BEST way to prioritize the systems?
A.
Answer: B
Question #:181
In a high-volume, real-time system, the MOST effective technique by which to continuously monitor and
analyze transaction processing is:
A. transaction tagging
B. parallel simulation.
Answer: C
Question #:182
Which of the following metrics is MOST useful to an IS auditor when evaluating whether IT investments are
meeting business objectives?
Answer: C
Question #:183
Which of the following is the PRIMARY concern when negotiating a contract for a hot site?
B. Coordination with the site staff in the event of multiple disaster declarations
C.
Answer: A
Question #:184
During an exit interview senior management disagrees with some of the facts presented in the draft audit
report and wants them removed from the report Which of the following would be the auditor's BEST course of
action?
Answer: A
Question #:185
An organization's enterprise architecture (EA) department decides to change a legacy system's components
while maintaining its original functionality Which of the following is MOST important for an IS auditor to
understand when reviewing this decision?
C. The data flows between the components to be used by the redesigned system
Answer: A
Question #:186
Which of the following is MOST important lo have in place for he continuous improvement of process
maturity within a large IT support function?
D. Project management
Answer: A
Question #:187
Which of the following implementation strategies for new applications presents the GREATEST risk during
data conversion and migration from an old system to a new system?
A. Pilot implementation
B. Phased implementation
C. Direct cutover
D. Parallel simulation
Answer: C
Question #:188
Which of the following would BEST manage the risk of changes in requirements after the analysis phase of a
business application development project?
Answer: D
Question #:189
A company is using a software developer for a project. At which of the following points should the software
quality assurance (QA) plan be developed?
Answer: D
Question #:190
Answer: C
Question #:191
During data migration, which of the following BEST prevents integrity issues when multiple processes within
the migration program are attempting to write to the same table in the databases?
A. Authentication controls
B. Concurrency controls
C. Normalization controls
Answer: B
Question #:192
What is BEST for an IS auditor to review when assessing the effectiveness of changes recently made to
processes and tools related to an organization's business continuity plan (BCP)?
Answer: B
Question #:193
Which of the following is MOST appropriate for measuring a batch processing application's system
performance over time?
A. System utilization
B. Idle time
C. Throughput
D. Uptime
Answer: C
Question #:194
A warehouse employee of a retail company has been able to conceal the theft of inventory items by entering
adjustments of either damaged or lost stock items to the inventory system Which control would have BEST
prevented this type of fraud in a retail environment?
Answer: D
Question #:195
Which of the following evidence-gathering techniques will provide the GREATEST assurance that procedures
are understood and practiced?
D. Observe processes.
Answer: D
Question #:196
An IS auditor finds that periodic reviews of read-only users for a reporting system are not being performed.
Which of the following should be the IS auditor's NEXT course of action?
Answer: B
Question #:197
An organization with high availability resource requirements is selecting a provider for cloud computing.
Which of the following would cause the GREATEST concern to an IS auditor? The provider:
Answer: D
Question #:198
Which of the following is the MOST reliable way for an IS auditor to evaluate the operational effectiveness of
an organization's data loss prevention (DLP) controls?
Answer: D
Question #:199
The BEST way to preserve data integrity through all phases of application containerization is to ensure which
of the following?
A.
A. Developers are educated about how their roles relate to application security best practices.
D. Information security roles are defined and communicated in the information security policy.
Answer: C
Question #:200
Reconciliations have identified data discrepancies between an enterprise data warehouse and a revenue system
for key financial reports. What is the GREATEST risk to the organization in this situation?
Answer: D
Question #:201
Answer: A
Question #:202
Which of the following is the BEST way to enforce the principle of least privilege on a server containing data
with different security classifications?
C.
C. Using scripted access control lists to prevent unauthorized access to the server
D. Obtaining formal agreement by users to comply with the data classification policy
Answer: A
Question #:203
An organization developed a comprehensive three-year IT strategic plan Halfway into the plan a major
legislative change impacting the organization is enacted Which oi the following should be management's
NEXT course of action?
C. Assess the legislation to determine whether changes are required to the strategic
D. IT plan Develop a new IT strategic plan that encompasses the new legislation
Answer: B
Question #:204
Which of the following is MOST important to include in a contract to outsource data processing that involves
customer personally identifiable information (Pit)?
A. The vendor must comply with the organization is legal and regulatory requirement.
B. The vendor must provide an independent report of its data processing facilities.
Answer: A
Question #:205
The PRIMARY reason for an IS auditor to use data analytics techniques is to reduce which type of audit risk?
A. Technology risk
B. Inherent risk
C. Control risk
D.
D. Detection risk
Answer: D
Question #:206
An application used at a financial services organization transmits confidential customer data to downstream
applications using a batch process. Which of the following controls would protect this information?
B. Record count
C. Control file
Answer: D
Question #:207
A new privacy regulation requires a customer's privacy information to be deleted within 72 hours, if requested.
Which of the following would be an IS auditor's GREATEST concern regarding compliance to this
regulation?
Answer: D
Question #:208
A banking organization has outsourced its customer data processing facilities to an external service provider.
Which of the following roles is accountable for ensuring the security of customer data?
Answer: D
Question #:209
Which of the following should be a concern to an IS auditor reviewing a digital forensic process for a security
incident?
C. The affected computer was not immediately shut down after the incident.
Answer: A
Question #:210
Which of the following is the MOST important difference between end-user computing (EUC) applications
and
traditional applications?
D. Traditional application input controls are typically more robust than EUC application input controls.
Answer: D
Question #:211
Which of the following is MOST important to ensure when reviewing a global organization's controls to
protect data held on its IT infrastructure across all of its locations?
A. Relevant data protection legislation and regulations for each location are adhered to.
B. Technical capabilities exist in each location to manage the data and recovery operations
D. The threat of natural disasters in each location hosting infrastructure has been accounted for.
Answer: A
Question #:212
Which of the following BEST helps to identify errors during data transfer?
Answer: C
Question #:213
Which of the following is the BEST reason to utilize blockchain technology to record accounting transactions?
A. Integrity of records
B. Confidentiality of records
C. Availability of records
D. Distribution of records
Answer: A
Question #:214
During an audit of a data classification policy, an IS auditor finds that many documents are inappropriately
classified as confidential. Which of the following is the GREATEST concern?
Answer: D
Question #:215
Of the following, who should approve a release to a critical application that would make the application
inaccessible for 24 hours?
B. Data custodian
C. Project manager
Answer: A
Question #:216
Which of the following sampling techniques is BEST to use when verifying the operating effectiveness of
internal controls during an audit of transactions?
A. Attribute sampling
B. Statistical sampling
C. Judgmental sampling
D. Stop-or-go sampling
Answer: B
Question #:217
Which of the following is the GREATEST risk associated with the use of instant messaging (IM)?
A. Data leakage
Answer: A
Question #:218
An auditor is creating an audit program in which the objective is to establish the adequacy of personal data
privacy controls in a payroll process. Which of the following would be MOST important to include?
A.
Answer: D
Question #:219
An IS auditor reviewing a purchase accounting system notices several duplicate payments made for the
services rendered. Which of the following is the auditor's BEST recommendation for preventing duplicate
payments?
C. Implement a system control that determines if there are corresponding invoices for purchase orders.
Answer: C
Question #:220
Which of the following is an example of a control that is both detective and preventive at the same lime?
A. A payment order to a sanctioned country is detected in the system before the payment is actually made.
B. Detective fraud controls performed on past transactions prevent legal action being taken against the
organization.
Answer: C
Question #:221
Which of the following should be an IS auditor's GREATEST concern when a security audit reveals the
organization's vulnerability assessment approach is limited to running a vulnerability scanner on its network?
A.
Answer: B
Question #:222
During an IT operations audit multiple unencrypted backup tapes containing sensitive credit card information
cannot be found Which of the following presents the GREATEST risk to the organization?
Answer: B
Question #:223
An IS auditor wants to understand the collective effect of the preventive, detective, and corrective controls for
a specific business process. Which of the following should the auditor focus on FIRST?
B. Whether the existence of preventive controls causes corrective controls to become unnecessary
C. Whether segregation of duties is in place when two controls are applied simultaneously
Answer: D
Question #:224
Which of the following would provide the BEST evidence of the effectiveness of mandated annual security
awareness training?
Answer: D
Question #:225
Which of the following should an IS auditor expect to find when reviewing IT security policy?
Answer: C
Question #:226
An IS auditor notes that help desk personnel are required to make critical decisions during major service
disruptions. Which of the following is the auditor's BEST recommendation to address this situation?
Answer: C
Question #:227
Which of the following findings should be of GREATEST concern to an IS auditor reviewing system
deployment tools for a critical enterprise application system?
Answer: A
Question #:228
B. Conduct general control audits annually and application audits in alternating years
Answer: C
Question #:229
To ensure the integrity of a recovered database, which of the following would be MOST useful?
Answer: D
Question #:230
Data analytics tools and techniques are MOST helpful to an IS auditor during which of the following audit
activities?
A. Audit follow-up
B. Walk-through testing
C. Substantive testing
Answer: C
Question #:231
Which of the following is the MAIN purpose of an information security management system?
A.
Answer: A
Question #:232
Which of the following analytical methods would be MOST useful when trying to identify groups with similar
behavior or characteristics in a large population?
A. Random sampling
B. Classification
C. Deviation detection
D. Cluster sampling
Answer: D
Question #:233
Which of the following group is MOST likely responsible for the implementation of IT projects?
A. IT steering committee
B. IT strategy committee
C. IT compliance committee
D. IT governance committee
Answer: A
Question #:234
An IS auditor reviewed the business case for a proposed investment to virtualize an organization's server
infrastructure. Which of the following is MOST likely to be included among the benefits in the project
proposal?
Answer: D
Question #:235
Which of the following application input controls would MOST likely detect data input errors in the customer
account number field during the processing of an accounts receivable transaction?
A. Reasonableness check
B. Validity check
C. Parity check
D. Limit check
Answer: A
Question #:236
Which of the following is MOST important for an IS auditor to review when evaluating the effectiveness of an
organization's incident response process?
Answer: B
Question #:237
During an audit, the client learns that the IS auditor has recently completed a similar security review at a
competitor. The client inquires about the competitor's audit results. What is the BEST way for the auditor to
address this inquiry?
A. Explain that it would be inappropriate to discuss the results of another audit client
C. Discuss the results of the audit omitting specifics related to names and products.
D. Obtain permission from the competitor to use the audit results as examples for future clients.
Answer: A
Question #:238
A. keep track of all the clients using the IS facilities of a service organization.
B. limit the clients and servers relationship by limiting the IS facilities to a single hardware system.
C. enhance system performance through the separation of front-end and back-end processes.
Answer: C
Question #:239
An internal audit department recently established a quality assurance (QA) program as part of its overall audit
program. Which of the following activities is MOST important to include as part of the QA program
requirements?
Answer: A
Question #:240
To help determine whether a controls-reliant approach to auditing financial systems r a company should be
used which sequence of IS audit work is MOST appropriate'
Answer: A
Question #:241
An IS auditor finds that terminated users have access to financial applications. Which of the following is the
auditor's MOST important course of action when assessing the impact?
good terms.
B. Inspect the logs to determine whether the users accessed the applications after termination.
Answer: B
Question #:242
Which sampling method should an IS auditor employ when the likelihood of exceptions existing in the
population is low''
A. Discovery sampling
B. Random sampling
C. Interval sampling
D. Unit sampling
Answer: A
Question #:243
A. compensating controls
B. preventive controls.
C. directive controls
D. corrective controls
Answer: C
Question #:244
An IS auditor is reviewing an enterprise database platform. The review involves statistical methods. Benford
analysis, and duplicate checks. Which of the following computer-assisted audit technique (CAAT) tools would
be MOST useful for this review''
C. Audit hooks
Answer: B
Question #:245
At what point in software development should the user acceptance test plan be prepared?
A. Feasibility study
C. Requirements definition
D. Implementation planning
Answer: C
Question #:246
Which of the following is MOST helpful for an IS auditor to review when determining the appropriateness of
controls relevant to a specific audit area?
Answer: C
Question #:247
The recovery time objective (RTO) is normally determined on the basis of the:
B. risk of occurrence.
Answer: C
Question #:248
During a privileged access review, an IS auditor observes many help desk employees have privileges within
systems not required for their job functions. Implementing which of the following would have prevented this
situation?
A. Multi-factor authentication
B. Separation of duties
Answer: C
Question #:249
Which of the following BEST minimizes performance degradation of servers used to authenticate users of an
e-commerce website?
A. Configure each authentication server and ensure that the disks of each server form part of a duplex.
B. Configure each authentication server and ensure that each disk of its RAID is attached to the primary
controller.
C. Configure a single server as a primary authentication server and a second server as a secondary
authentication server.
Answer: D
Question #:250
A.
B. Project plan
C. SWOT analysis
D. Gantt chart
Answer: A
Question #:251
Which of the following provides an IS auditor with the BEST evidence that a system has been assessed for
known exploits?
Answer: B
Question #:252
During an IT governance audit, an IS auditor notes that IT policies and procedures are not regularly reviewed
and updated. The GREATEST concern to the IS auditor is that p......
Answer: A
Question #:253
What information within change records would provide an IS auditor with the MOST assurance that
configuration management is operating effectively?
Answer: A
Question #:254
The maturity level of an organization s problem management support function is optimized when the function
Answer: B
Question #:255
Which of the following is the PRIMARY purpose of using data analytics when auditing an enterprise resource
planning (ERP) system for a large organization?
Answer: B
Question #:256
During an audit of a financial application, it was determined thai many terminated users' accounts were not
disabled. Which of the following should be the IS auditors NEXT step?
Answer: B
Question #:257
Which of the following demonstrates the use of data analytics for a loan origination process?
A. Evaluating whether loan records are included in the batch file and are validated by the servicing system
B. Validating whether reconciliations between the two systems are performed and discrepancies are
investigated
C. Reviewing error handling controls to notify appropriate personnel in the event of a transmission failure
D. Comparing a population of loans input in the origination system to loans booked on the servicing system
Answer: B
Question #:258
An IS auditor is evaluating a virtual server environment and learns that the production server, development
server, and management console are housed in the same physical host. What should be the auditor's
PRIMARY concern?
C. The development server and management console share the same host
Answer: B
Question #:259
An IS auditor is testing employee access to a large financial system and must select a sample from the current
employee list provided by the auditee. Which of the following is the MOST reliable sample source to support
this testing1?
Answer: B
Question #:260
Which of the following findings should be of GREATEST concern to an IS auditor reviewing the
effectiveness of an organization's problem management practices?
Answer: C
Question #:261
For an organization that has plans to implement web-based trading, it would be MOST important for an IS
auditor to verify the organization's information security plan includes:
Answer: B
Question #:262
Which of the following is the MOST important issue for an IS auditor to consider with regard to Voice-over IP
(VoIP) communications?
A. Nonrepudiation
B. Continuity of service
D. Identity management
Answer: C
Question #:263
An IS auditor is examining a front-end sub ledger and a main ledger Which of the following would be the
GREATEST concern if there are flaws in the mapping of accounts between the two systems?
A.
Answer: B
Question #:264
Which of the following is the MOST important consideration when incorporating data analytics into an audit?
Answer: C
Question #:265
During a review of an application system, an IS auditor identifies automated controls designed to prevent the
entry of duplicate transactions. What is the BEST way to verify that the controls work as designed?
C. Use generalized audit software for seeking data corresponding to duplicate transactions.
Answer: D
Question #:266
Which of the following is the BEST way to mitigate the risk associated with technology obsolescence?
Answer: D
Question #:267
When reviewing a project to replace multiple manual data entry systems with an artificial intelligence (Al)
system, the IS auditor should be MOST concerned with the impact At will have on:
B. employee retention
Answer: D
Question #:268
Which of the following is the MOST important reason to use statistical sampling?
Answer: D
Question #:269
An IS auditor will be testing accounts payable controls by performing data analytics on the entire population
of transactions. Which of the following is MOST important for the auditor to confirm when sourcing the
population data?
Answer: B
Question #:270
An IS auditor learns the organization has experienced several server failures in its distributed environment.
Which of the following is the BEST recommendation to limit the potential Impact of server failures in the
future?
A. Failover power
B. Clustering
C. Parallel testing
D. Redundant pathways
Answer: C
Question #:271
An internal audit department recently established a quality assurance (QA) program. Which of the following
activities is MOST important to include as part of the OA program requirements?
Answer: A
Question #:272
In assessing the priority given to systems covered in an organization’s business continuity plan (BCP), an IS
auditor should FIRST:
Answer: C
Question #:273
To help ensure the accuracy and completeness of end-user computing output it is MOST important to include
strong:
A. documentation controls.
D. reconciliation controls
Answer: D
Question #:274
During a disaster recovery audit, an IS auditor finds that a business impact analysis (BIA) has not been
performed The auditor should FIRST.
Answer: A
Question #:275
Which of the following is an IS auditor's BEST course of action upon learning that preventive controls have
been replaced with detective and corrective controls'
C. Verify the revised controls enhance the efficiency of related business processes.
Answer: B
Question #:276
A. Improved communication with management due to more confidence with data results
D. Expedient audit planning due to early identification of problem areas and incomplete data
Answer: B
Question #:277
Which of the following is MOST likely to be detected by an IS auditor applying data analytic techniques?
A. Potentially fraudulent invoice payments originating within the accounts payable department
C. Unauthorized salary or benefit changes to the payroll system generated by authorized users
D. Issues resulting from an unsecured application automatically uploading transactions to the general
ledger
Answer: A
Question #:278
Which of the following BEST facilitates the management of assets dunng the implementation of an
information system?
Answer: A
Question #:279
When an organization introduces virtualization into its architecture, which of the following should be an IS
auditor's PRIMARY area of focus to verify adequate protection?
C. Maintenance cycles
Answer: B
Question #:280
An IS auditor has obtained a large complex data set for analysis. Which of the following activities will MOST
improve the output from the use of data analytics tools?
A. Data classification
B. Data preparation
C. Data masking
D. Data anonymization
Answer: B
Question #:281
What is the MOST critical finding when reviewing an organization's information security management?
Answer: C
Question #:282
Which of the following should be the PRIMARY audience for a third-party technical security assessment
report?
A. Operational IT management
B. Board of directors
C. Legal counsel
D. External regulators
Answer: B
Question #:283
Which of the following is the GREATEST risk associated with the lack of an effective data privacy program?
Answer: C
Question #:284
An airlines online booking system uses an automated script that checks whether fares are within the defined
threshold of what is reasonable before the fares are displayed on the website. Which type of control is in
place?
A. Preventer control
B. Corrective control
C. Detective control
D. Compensating control
Answer: A
Question #:285
Which of the following is the MOST effective control for protecting the confidentiality and integrity of data
stored unencrypted on virtual machines?
Answer: C
Question #:286
Which of the following should an IS auditor expect to see in a network vulnerability assessment?
C. Zero-day vulnerabilities
Answer: A
Question #:287
Which of the following would be the MOST significant factor when choosing among several backup system
alternatives with different restoration speeds?
Answer: D
Question #:288
Which of the following is the PRIMARY objective of implementing privacy-related controls within an
organization"?
Answer: B
Question #:289
Which of the following approaches would utilize data analytics to facilitate the testing of a new account
creation process?
A. Review new account applications submitted in the past month for invalid dates of birth
C. Review the business requirements document for date of birth field requirements.
Answer: A
Question #:290
Which of the following is the role of audit leadership in ensuring the quality of audit and engagement
performance?
A. Ensuring audit customers remain highly satisfied with the quality of audit performance
B. Reviewing identified risks to ensure associated processes are included in the audit program
D. Ensuring the scope of peer quality assurance (QA) reviews is sufficient to address board concerns
Answer: C
Question #:291
An IS auditor intends to accept a management position in the data processing department within the same
organization. However, the auditor is currently working on an audit of a major application and has not yet
finished the report. Which of the following would be the BEST step tor the IS auditor to take?
B. Start in the position and inform the application owner of the job change.
C. Complete the audit without disclosure and then start in the position.
Answer: D
Question #:292
Which of the following processes BEST addresses the risk associated with the deployment of a new
production system?
A. Release management
B. Configuration management
C. Change management
D. Incident management
Answer: C
Question #:293
An IS auditor finds that corporate mobile devices used by employees have varying levels of password settings.
Which of the following would be the BEST recommendation?
Answer: D
Question #:294
An IS auditor finds that periodic reviews of read-only users for a reporting system are not being performed.
Which of the following should be the IS auditor's NEXT course of action?
Answer: C
Question #:295
Which of the following presents the GREATEST concern when implementing data flow across borders?
A. Equipment incompatibilities
C. Political unrest
Answer: B
Question #:296
Which of the following should be the FIRST step to help ensure the necessary regulatory requirements are
addressed in an organization's cross-border data protection policy?
Answer: C
Question #:297
Which of the following is the MOST effective way to minimize the risk of a SQL injection attack?
Answer: C
Question #:298
An organization that has suffered a cyber attack is performing a forensic analysis of the affected users'
computers Which of the following should be of GREATEST concern for the IS editor reviewing this process?
D. An imaging process was used to obtain a copy of the data from each computer.
Answer: C
Question #:299
Due to budget restraints, an organization is postponing the replacement of an in-house developed mission
critical application. Which of the following represents the GREATEST risk?
Answer: C
Question #:300
An accounts receivable data entry routine prevents the entry of the same customer with different account
numbers. Which of the following is the BEST way to test if this programmed control is effective?
Answer: D
Question #:301
Which of the following is the PRIMARY reason an IS auditor should use an IT-related framework as a basis
for scoping and structuring an audit?
C. It demonstrates to management whether legal and regulatory requirements have been met.
D. It helps ensure comprehensiveness of the review and provides guidance on best practices.
Answer: D
Question #:302
An IS auditor is planning on utilizing attribute sampling to determine the error rate for health care claims
processed. Which of the following factors will cause the sample size to decrease?
Answer: C
Question #:303
The MOST important reason why an IT risk assessment should be updated on a regular basis is to:
Answer: C
Question #:304
Which of the following is the BEST compensating control for a lack of proper segregation of duties in an IT
department?
C. Authorization forms
Answer: A
Question #:305
Which of the following will BEST help to ensure that an in-house application in the production environment is
current?
B. Change management
D. Quality assurance
Answer: A
Question #:306
Answer: C
Question #:307
An IS auditor reviewing a high-risk business application has identified the need to strengthen controls for
reporting malfunctions to management Which of the following would BEST facilitate timely reporting?
A. Change prioritization
C. Performance monitoring
Answer: C
Question #:308
An organization plans to receive an automated data feed into its enterprise data warehouse from a third-party
service provider. Which of the following would be the BEST way to prevent accepting bad data?
Answer: D
Question #:309
Which of the following is the GREATEST concern when an organization allows personal devices to connect
to its network?
Answer: A
Question #:310
Which of the following is the BEST way to mitigate the risk associated with a document storage application
that has a syncing feature that could allow malware to spread to other machines in the network?
A. User behavior modeling and analysis should be performed to discover anomalies in user behavior.
B. Content inspection technologies should be used to scan files for sensitive data.
C. All files should be scanned when they are uploaded to and downloaded from the application.
D. An audit should be conducted to detect shadow data and shadow IT in the network.
Answer: C
Question #:311
To develop a robust data security program, the FIRST course of action should be to:
Answer: A
Question #:312
Which of the following BEST ensures the quality and integrity of test procedures used in audit analytics?
Answer: B
Question #:313
After the release of an application system, an IS auditor wants to verify that the system is providing value to
the organization. The auditor’s BEST course of action would be to:
B. Perform a gap analysis against the benefits defined in the business case
D. Confirm that risk has declined since the application system release
Answer: B
Question #:314
Which of the following provides the MOST assurance over the completeness and accuracy of loan application
processing with respect to the implementation of a new system?
Answer: C
Question #:315
Data analytics Tools are BEST suited for which of the following purposes?
Answer: C
Question #:316
Which of the following would BEST facilitate the detection of internal fraud perpetrated by an individual?
A. Mandatory leave
B. Flexible time
D. Segregation of duties
Answer: A
Question #:317
An organization's business function wants to capture customer data and must comply with global data
protection regulations. Which of the following should be considered FIRST?
Answer: D
Question #:318
An IS audit manager has been asked to perform a quality review on an audit that the same manager also
supervised. Which of the following is (he manager's BEST response to this situation?
A. Discuss with the audit team to understand how conclusions were reached.
Answer: D
Question #:319
servDuring an internal audit review of a human resources (HR) recruitment system implementation the IS
auditor notes that several defects were unresolved at the time the system went live Which of the following is
the auditor's MOST important task prior to formulating an audit opinion?
Answer: D
Question #:320
A software development organization with offshore personnel has implemented a third-party virtual
workspace to allow the teams to collaborate. Which of the following should be of GREATEST concern?
B. The team's work products are not properly classified as intellectual property.
Answer: D
Question #:321
Which of the following should the IS auditor do FIRST to ensure data transfer integrity for Internet of Things
(loT) devices?
A. Verify access control lists to the database where collected data is stored.
B.
C. Confirm that acceptable limits of data bandwidth are defined for each device.
Answer: B
Question #:322
During a post-implementation review, a step in determining whether a project met user requirements is to
review the:
Answer: D
Question #:323
An IS auditor is reviewing the installation of a new server. The IS auditor's PRIMARY objective is to ensure
that
D. the procurement project invited tenders from at least three different suppliers.
Answer: A
Question #:324
Which of the following is the GREATEST advantage of vulnerability scanning over penetration testing'?
C.
Answer: B
Question #:325
An organization's security policy mandates that all new employees must receive appropriate security
awareness training. Which of the following metrics would BEST assure compliance with this policy?
Answer: D
Question #:326
Which of the following should an IS auditor review FIRST when evaluating a business process for auditing?
Answer: B
Question #:327
An organization is developing a web portal using some external components. Which of the following should
be of MOST concern to an IS auditor?
B. The organization has not reviewed the components for known exploits.
Answer: B
Question #:328
While conducting a review of project plans related to a new software development, an IS auditor finds the
project initiation document (PID) is incomplete. What is the BEST way for the auditor to proceed?
Answer: A
Question #:329
Which of the following is MOST important to ensure during computer forensics investigations?
C. Personnel undertaking the investigation process are certified to collect digital evidence.
Answer: A
Question #:330
Which of the following should occur EARLIEST in a business continuity management lifecycle?
Answer: D
Question #:331
An IS auditor is reviewing environmental controls and finds extremely high levels of humidity in the data
center. Which of the following is the PRIMARY risk to computer equipment from this condition?
A. Corrosion
B. Static electricity
C. Brownout
D. Fire
Answer: A
Question #:332
When reviewing backup policies, an IS auditor MUST verify that backup intervals of critical systems do not
exceed which of the following?
Answer: D
Question #:333
Which of the following is an IS auditor's BEST guidance regarding the use of IT frameworks?
A. To ensure consistency throughout the organization, management should adopt a single comprehensive
framework.
B. Frameworks provide standards that enable management to benchmark against peer organizations.
C. Frameworks encourage efficiency, provide a way to measure effectiveness, and allow for improvements
D. Industry-specific frameworks, when available, are preferred over the more generic comprehensive
frameworks.
Answer: C
Question #:334
C. it can easily be applied manually when computer resources are not available
Answer: A
Question #:335
Which of the following is the BEST way for an IS auditor to reduce sampling risk when performing audit
sampling to verify the adequacy of an organization's internal controls?
Answer: A
Question #:336
Answer: B
Question #:337
Which of the following cloud deployment models would BEST meet the needs of a startup software
development organization with limited initial capital?
A. Community
B. Public
C. Hybrid
D. Private
Answer: B
Question #:338
During an audit, which of the following would be MOST helpful in establishing a baseline for measuring data
quality?
Answer: D
Question #:339
A. not be identified.
B. be illuminated.
C. be protected
Answer: B
Question #:340
Which of the following is the PRIMARY reason an IS auditor should discuss observations with management
before delivering a final report?
Answer: A
Question #:341
A security company and service provider have merged and the CEO has requested one comprehensive set of
security policies be developed for the newly formed company. The IS auditor s BEST recommendation would
be to:
Answer: D
Question #:342
A post-implementation review of a development project concludes that several business requirements were not
reflected in the software requirement specifications. Which of the following should an IS auditor recommend
to reduce this problem in the future?
Answer: A
Question #:343
Which of the following BEST describes the relationship between vulnerability scanning and penetration
testing?
B. For entities with regulatory drivers, the two tests must be the same.
Answer: C
Question #:344
A legacy application is running on an operating system that is no longer supported by vendor, if the
organization continues to use the current application, which of the application should be the IS auditor’s
GREATEST concern?
Answer: D
Question #:345
An IS auditor previously worked in an organization s IT department and was involved with the design of the
business continuity plan (BCP). The IS
auditor has now been asked to review this same BCP. The auditor should FIRST.
C. communicate the conflict of interest to the audit manager prior to starting the assignment.
D. communicate the conflict of interest to the audit committee prior to starting the assignment
Answer: D
Question #:346
An organization transmits large amount of data from one internal system to another. The IS auditor is
reviewing quality of the data at the originating point. Which of the following should the auditor verify first?
Answer: D
Question #:347
When determining which IS audits to conduct during the upcoming year, internal audit has received a request
from management for multiple audits of the contract division due to fraud findings during the prior year Which
of the following is the BEST basis for selecting the audits to be performed?
Answer: D
Question #:348
In an environment where most IT services have been outsourced, continuity planning is BEST controlled by:
A. IT management,
C. business management.
Answer: B
Question #:349
Which of the following projects would be MOST important to review in an audit of an organizations financial
statements?
Answer: D
Question #:350
An IS department is evaluated monthly on its cost-revenue ratio user satisfaction rate, and computer downtime
This is BEST zed as an application of.
A. risk framework
B. balanced scorecard
Answer: B
Question #:351
Which of the following is the GREATEST concern when using a cold backup site?
Answer: C
Question #:352
When evaluating a protect immediately prior to implementation, which of the following would provide the
BEST evidence that the system has the required functionality?
Answer: B
Question #:353
A.
A. Manual transactions
B. Irregular transactions
C. Low-value transactions
D. Real-time transactions
Answer: D
Question #:354
In which phase of penetration testing would host detection and domain name system (DNS) interrogation be
performed?
A. Attacks
B. Planning
C. Discovery
D. Reporting
Answer: C
Question #:355
Answer: B
Question #:356
When measuring the effectiveness of a security awareness program, the MOST helpful key performance
indicator (KPI) is the number of:
D.
Answer: B
Question #:357
Which of the following physical controls will MOST effectively prevent breaches of computer room security?
A. Photo IDs
B. CCTV monitoring
C. Retina scanner
D. RFID badge
Answer: C
Question #:358
In planning a major system development project, function point analysis would assist in:
Answer: D
Question #:359
Which of the following would be the GREATEST risk associated with a new chat feature on a retailer's
website?
A. Productivity loss
B. Reputational damage
C. System downtime
D. Data loss
Answer: A
Question #:360
An organization processing high volumes of financial transactions has implemented log file analysis on a
central log server to continuously monitor compliance with its fraud policy. Which of the following poses the
GREATEST risk to this control?
Answer: B
Question #:361
Which of the following is the PRIMARY protocol for protecting outbound content from tampering and
eavesdropping?
Answer: A
Question #:362
Which of the following focus areas is a responsibility of IT management rather than IT governance?
A. IT controls implementation
B. Risk optimization
C. IT resource optimization
D. Benefits realization
Answer: A
Question #:363
When evaluating the recent implementation of an intrusion detection system (IDS), an IS auditor should be
A. training
B. encryption
C. tuning
D. patching
Answer: C
Question #:364
What would be an IS auditors GREATEST concern when using a test environment for an application audit?
Answer: A
Question #:365
Answer: D
Question #:366
During a security audit, an IS auditor is tasked with reviewing log entries obtained from an enterprise intrusion
prevention system (IPS). Which type of risk would be associated with the potential for the auditor to miss a
sequence of logged events that could indicate an error in the IPS configuration?
A. Sampling risk
B. Inherent risk
C. Detection risk
D. Control risk
Answer: C
Question #:367
Which of the following is the GREATEST concern with conducting penetration testing on an internally
developed application in the production environment?
C. The issues identified during the testing may require significant remediation efforts.
D. Internal security staff may not be qualified to conduct application penetration testing.
Answer: A
Question #:368
The risk of communication failure in an e-commerce environment is BEST minimized through the use of
Answer: C
Question #:369
An IS auditor begins an assignment and identifies audit components for which the auditor is not qualified to
assess. Which of the following is the BEST course of anion?
A. Exclude the related tests from the audit plan and continue the assignment.
C. Complete the audit and give full disclosure in the final audit report
Answer: B
Question #:370
Which of the following poses the GREATEST risk to a company that allows employees to use personally
owned devices to access customer files on the company's network?
A. The help desk might not be able to support all different types of personal devices.
Answer: C
Question #:371
An audit has identified that business units have purchased cloud-based applications without ITs support. What
is [he GREATEST risk associated with this situation?
Answer: C
Question #:372
An effective implementation of security roles and responsibilities is BEST evidenced across an enterprise
when:
Answer: C
Question #:373
Which of the following is the BEST way to ensure payment transaction data is restricted to the appropriate
users?
Answer: C
Question #:374
Which of the following should be an IS auditor's BEST recommendation to prevent installation of unlicensed
software on employees' company-provided devices?
Answer: D
Question #:375
An IS auditor is reviewing an industrial control system (ICS) that uses older unsupported technology in the
scope of an upcoming audit. What should the auditor consider the MOST significant concern?
Answer: C
Question #:376
Which of the following is the MOST likely cause of a successful firewall penetration?
C. Virus infection
Answer: D
Question #:377
An IS auditor is reviewing a banking mobile application that allows end users to perform financial
transactions. Which of the following poses a security risk to the organization?
Answer: D
Question #:378
Which of the following BEST demonstrates that IT strategy is aligned with organizational goals and
objectives?
D. The chief information officer (CIO) is involved in approving the organizational strategies
Answer: A
Question #:379
Which of the following is the BEST approach to identify whether a vulnerability is actively being exploited?
A.
Answer: B
Question #:380
A vulnerability in which of the following virtual systems would be of GREATEST concern to the IS auditor?
Answer: B
Question #:381
When preparing to evaluate the effectiveness of an organizations IT strategy, an IS auditor should FIRST
review:
Answer: A
Question #:382
An IS auditor is reviewing security controls related to collaboration to unit responsible for intellectual property
and patents. Which of the following observations should be of MOST concern to the auditor?
B. Employees can share files with users outside the company through collaboration tools
C. The collaboration tool is hosted and can only be accessed via an Internet browser.
D. Training was not provided to the department that handles intellectual property and patents
Answer: D
Question #:383
Which of the following IS functions can be performed by the same group or individual while still providing
the proper segregation of duties?
B. Computer operations and application Multiple versions of the same operating system programming
Answer: A
Question #:384
Which of the following is a PRIMARY role of an IS auditor in a control self-assessment (CSA) workshop?
Answer: A
Question #:385
Which of the following is an IS auditor s GREATEST concern when an organization does not regularly update
software on individual workstations in the internal environment?
Answer: A
Question #:386
When performing a post-implementation review, the adequacy of the data conversion effort would BEST be
evaluated by performing a thorough review of the:
Answer: B
Question #:387
Which of the following is MOST likely to be included in computer operating procedures in a large data
center?
Answer: D
Question #:388
Due to a high volume of customer orders, an organization plans to implement a new application for customers
to use for online ordering Which type of testing is MOST important to ensure the security of the application
prior to go-live?
A. Stress testing
B. Vulnerability testing
C. Regression testing
Answer: B
Question #:389
Which of the following BEST determines if a batch update job was successfully executed?
Answer: C
Question #:390
When an IS auditor evaluates key performance indicators (KPls) (or IT initiatives, it is MOST important that
the KPIs indicate.
Answer: B
Question #:391
A bank has implemented a new accounting system. Which of the following is the BEST lime for an IS auditor
to perform a post-implementation review?
Answer: C
Question #:392
Which of the following is the BEST development methodology to help manage project requirements in a
rapidly changing environment?
A. Prototyping
B.
Answer: B
Question #:393
An IS auditor is assessing an organization’s data loss prevention (DLP) solution for protecting intellectual
property from insider theft. Which of the following would the auditor consider MOST important for effective
data protection?
Answer: D
Question #:394
Which of the following is MOST influential when defining disaster recovery strategies?
Answer: A
Question #:395
Following the discovery of inaccuracies in a data warehouse, an organization has implemented data profiling,
cleansing, and handling filters to enhance the quality of data obtained from c
A. Detective control
B. Compensating control
C. Directive control
D. Corrective control
Answer: D
Question #:396
Which of the following validation techniques would BEST prevent duplicate electronic vouchers?
A. Sequence check
B. Edit check
D. Reasonless check
Answer: A
Question #:397
Which of the following is the GREATEST benefit of implementing an incident management process?
Answer: C
Question #:398
Which of the following attacks would MOST likely result in the interception and modification of traffic for
mobile phones connecting to potentially insecure public Wi-Fi networks?
A. Man-in-the-middle
B. Phishing
C. Vishing
D. Brute force
Answer: A
Question #:399
B. decreased performance.
D. incorrect metadata.
Answer: A
Question #:400
When deciding whether a third party can be used in resolving a suspected security breach, which of the
following should be the MOST important consideration for IT management?
A. Third-party cost
C. Data sensitivity
D. Audit approval
Answer: C
Question #:401
An IS auditor notes that IT and the business have different opinions on the availability of their application
servers Which of the following should the IS auditor review FIRST in order to understand the problem?
Answer: D
Question #:402
An organization wants to replace its suite of legacy applications with a new, in-house developed solution.
Which of the following is the BEST way to address concerns associated with migration of all mission-critical
business functionality?
A. Strengthen governance by hiring certified and qualified project managers for the migration.
B. Expedite go-live by migrating in a single release to allow more time for testing in production.
C. Plan multiple releases to gradually migrate subsets of functionality to reduce production risk.
D. Increase testing efforts so that all possible combinations of data have been tested prior to go-live.
Answer: C
Question #:403
During an audit of an access control system an IS auditor finds that RFID card readers are not connected via
the network to a central server Which of the following is the GREATEST risk associated with this finding?
Answer: C
Question #:404
Which of the following falls within the scope of an information security governance committee?
Answer: C
Question #:405
Which of the following situations would impair the independence of an IS auditor involved in a software
development project?
Answer: D
Question #:406
An employee has accidentally posted confidential data to the company's social media page. Which of the
following is the BEST control to prevent this from recurring?
Answer: B
Question #:407
An organization’s IT security policy states that user ID’s must uniquely identify individual’s and that user
should not disclose their passwords. An IS auditor discovers that several generic user ID’s are being used.
Which of the following is the MOST appropriate course of action for the auditor?
Answer: A
Question #:408
D.
Answer: C
Question #:409
A. Preventive
B. Compensating
C. Corrective
D. Detective
Answer: A
Question #:410
Compared to developing a system in-house, acquiring a software package means that the need for testing by
end users is:
A. eliminated.
B. increased.
C. reduced.
D. unchanged.
Answer: B
Question #:411
An organization recently implemented a data loss prevention (DLP) solution to control data in transit. Which
of the following would be the GREATEST risk related to the DLP implementation?
Answer: B
Question #:412
Which of the following is MOST important for an effective control self-assessment (CSA) program?
Answer: A
Question #:413
Which of the following would provide an IS auditor with the MOST assurance when auditing the
implementation of a new application system?
A. Substantive testing
B. Statistical sampling
D. Attribute sampling
Answer: A
Question #:414
A new application will require multiple interfaces. Which of the following testing methods can be used to
detect interface errors early in the development life cycle1?
A. Bottom up
B. Acceptance
C. Top down
D. Sociability
Answer: D
Question #:415
B.
Answer: C
Question #:416
Answer: A
Question #:417
Which control type would provide the MOST useful input to a root cause analysis?
A. Compensating
B. Detective
C. Directive
D. Corrective
Answer: B
Question #:418
Which of the following is MOST important for an IS auditor to consider when reviewing documentation for an
organization's forensics policy?
B. Notification processes
C. Access controls
D. Evidence preservation
Answer: D
Question #:419
Which of the following should be an IS auditor's GREATEST concern when reviewing an outsourcing
arrangement with a third-party cloud service provider to host personally identifiable data?
B. Fees are charged based on the volume of data stored by the host.
D. The organization's servers are not compatible with the third party's infrastructure
Answer: A
Question #:420
Which of the following findings should be of GREATEST concern to an IS auditor conducting a forensic
analysis following incidents of suspicious activities on a server?
Answer: A
Question #:421
A manager identifies active privileged accounts belonging to staff who have left the organization. Which of
the following is the threat actor In this scenario?
A. Hacktivists
B. Terminated staff
D. Unauthorized access
Answer: D
Question #:422
Which of the following must be in place before an IS auditor initiates audit follow-up activities?
A. A heat map with the gaps and recommendations displayed in terms of risk
C. Supporting evidence for the gaps and recommendations mentioned in the audit report
Answer: D
Question #:423
Following a significant merger and acquisition, which of the following should the chief audit executive (CAE)
do FIRST to evaluate the performance of the combined internal audit function?
Answer: D
Question #:424
An organization is running servers with critical business application that are in an area subject to frequent but
brief power outages. Knowledge of which of the following would allow the organization’s management to
monitor the ongoing adequacy of the uninterruptable power supply (UPS)?
Answer: B
Question #:425
Answer: D
Question #:426
The activation of a pandemic response plan has resulted in a remote workforce situation. Which of the
following technologies poses the GREATEST risk to data confidentiality?
Answer: D
Question #:427
A manufacturing company is implementing application software for its sales and distribution system. Which of
the following is the MOST important reason for the company to choose a centralized online database?
Answer: D
Question #:428
An IS auditor is reviewing a network diagram. Which of the following would be the BEST location for
placement of a firewall?
A.
Answer: D
Question #:429
Which of the following is the BEST control to help prevent sensitive data leaving an organization via email?
Answer: C
Question #:430
Which of the following is the PRIMARY reason for an IS auditor to use computer-assisted audit techniques
(CAATs)?
Answer: A
Question #:431
Which of the following is MOST important for an IS auditor to verify when reviewing a critical business
application that requires high availability?
Answer: C
Question #:432
Which of the following weaknesses would have the GREATEST impact on the effective operation of a
perimeter firewall?
Answer: D
Question #:433
Which of the following is MOST important for an IS auditor to consider during a review of the IT governance
of an organization?
A. Funding allocation
Answer: D
Question #:434
A company uses a standard form to document and approve all changes in production programs. To ensure that
the forms are properly authorized, which of the following is the MOST effective sampling method?
A. Random
B. Stratified
C. Attribute
D.
D. Variable
Answer: C
Question #:435
Which of the following should be of concern to an IS auditor performing a software audit on virtual machines?
B. Applications have not been approved by the chief financial officer (CFO) .
Answer: A
Question #:436
Which of the following is the PRIMARY reason for an organization's procurement processes to include an
independent party who is not directly involved with business operations and related decision-making'?
Answer: C
Question #:437
Which of the following should be of GREATEST concern to an IS auditor testing interface controls for an
associated bank wire transfer process?
B. Data in the bank's wire transfer system does not reconcile with transferred data.
D. The wire transfer was not completed with the most recent secure protocol.
Answer: B
Question #:438
Which of the following should an IS auditor validate FIRST when reviewing the security of an organization’s
IT infrastructure as it relates to Internet of Things (loT) devices?
Answer: A
Question #:439
Which of the following should be an IS auditor’s PRIMARY focus when developing a risk-banned IS audit
program?
A. Business processes
B. IT strategic plans
C. Portfolio management
D. Business plans
Answer: A
Question #:440
Following the sale of a business division, employees will be transferred to a new organization, but they will
retain access to IT equipment from the previous employer. An IS auditor has recommended that both
organizations agree to and document an acceptable use policy for the equipment. What type of control has
been recommended?
A. Detective control
B. Directive control
C. Preventive control
D. Corrective control
Answer: A
Question #:441
A bank is relocating its servers to a vendor that provides data center hosting services to multiple clients. Which
of the following controls would restrict other clients from physical access to the bank servers?
Answer: A
Question #:442
An IS auditor is evaluating the risk associated with moving from one database management system (DBMS) to
another. Which of the following would be MOST helpful to ensure the integrity of the system throughout the
change?
Answer: C
Question #:443
During which phase of the incident management life cycle should metrics such as "mean time to incident
discovery" and "cost of recovery" be reported?
B. Post-incident assessment
Answer: B
Question #:444
An IS auditor finds a number of system accounts that do not have documented approvals Which of the
following should be performed FIRST by the auditor?
Answer: D
Question #:445
A company laptop has been stolen and all photos on the laptop have been published on social media. Which of
the following is the IS auditor's BEST course of action?
D. Review the photos to determine whether they were for business or personal purposes
Answer: B
Question #:446
Which of the following would BEST help prioritize various projects in an organization's IT portfolio?
A. Business cases
B. Industry trends
Answer: A
Question #:447
Audit management has just completed the annual audit plan for the upcoming year, which consists entirely of
high-risk processor. However it is determined that there are insufficient resources to execute the plan. What
should be done NEXT?
A. Remove audit from the annual plan to better match the number of resources available.
B.
B. Review the audit plan and defer some audits to the subsequent year
C. Present the annual plan to the audit committee and ask for more resources
D. Reduce the scope of the audit to better match the number of resources available
Answer: C
Question #:448
Which of the following is the BEST guidance from an IS auditor to an organization planning an initiative to
improve the effectiveness of its IT processes?
B. IT staff should be surveyed to identify current IT process weaknesses and suggest improvements.
C. The organization should refer to poor audit reports to identify the specific IT processes to be improved
D. The organization should use a capability maturity model to identify current maturity levels for each IT
process.
Answer: D
Question #:449
An organization allows its employees to use personal mobile devices for work. Which of the following would
BEST maintain information security without compromising employee privacy?
B. Restricting the use of devices for personal purposes during working hours
Answer: C
Question #:450
What is the PRIMARY reason for conducting a risk assessment when developing an annual IS audit plan?
Answer: C
Question #:451
Which of the following would be MOST helpful in ensuring security procedures are followed by employees in
a multinational organization?
Answer: A
Question #:452
The BEST method an organization can employ to align its business continuity plan (BCP) and disaster
recovery plan (DRP) with core business needs is to:
A. include BCP and disaster recovery plan responsibilities as a part of new employee training,
C. update the business impact analysis (BIA) for significant business changes.
D. outsource the maintenance of the BCP and disaster recovery plan to a third party.
Answer: C
Question #:453
A. improvement opportunities.
B. accountabilities.
C. performance drivers.
Answer: A
Question #:454
An IS auditor identifies key controls that have been overridden by management. The next step the IS auditor
should take is to
Answer: A
Question #:455
An IS auditor finds that the process for removing access for terminated employee is not documented. What is
the MOST significant risk from this observation?
Answer: A
Question #:456
Due to system limitations, segregation of duties (SoD) cannot be enforced in an accounts payable system.
Which of the following is the IS auditor s BEST recommendation for a compensating control?
Answer: C
Question #:457
A. Data confidentiality
B. Information privacy
C. Nonrepudiation
Answer: A
Question #:458
Answer: C
Question #:459
D. Align the sampling approach with the one used by external auditors
Answer: B
Question #:460
In an organization that has a staff-rotation policy, the MOST appropriate access control model is:
A. discretionary.
B. lattice-based.
C. mandatory.
D. role-based.
Answer: D
Question #:461
Which of the following backup schemes is the BEST option when storage media is limited?
A. Virtual backup
B. Real-time backup
C. Full backup
D. backup Differential
Answer: D
Question #:462
During a review of IT service desk practices, an IS auditor notes that help desk personnel are spending more
time fulfilling user requests (or password resets than resolving critical incidents. Which of the following
recommendations to IT management would BEST address this situation?
A. Implement a self-service solution and redirect users to access frequently requested services.
B. Incentivize service desk personnel to close incidents within agreed service levels.
C. Calculate the age of incident tickets and alert senior IT personnel when they exceed service level
agreements (SLAs).
D. Provide annual password management training to end users to reduce the number of instances requiring
password resets.
Answer: A
Question #:463
Which of the following is the BEST preventive control to ensure the integrity of server operating systems?
Answer: D
Question #:464
Answer: D
Question #:465
When evaluating the ability of a disaster recovery plan (DRP) to enable the recovery of IT processing
capabilities, it is MOST important for the IS auditor to verify the plan is:
B. regularly reviewed.
D. periodically tested.
Answer: D
Question #:466
Which of the following is the BEST solution to minimize risk from security flaws introduced by developers
using open source libraries?
Answer: A
Question #:467
Which of the following is the PRIMARY advantage of using virtualization technology for corporate
applications?
Answer: B
Question #:468
To address issues related to privileged users identified in an IS audit, management implemented a security
information and event management (SIEM) system. Which type of control ………
A. Directive
B. Corrective
C. Preventive
D. Detective
Answer: D
Question #:469
Which of the following should be of GREATEST concern to an IS auditor reviewing the controls for a
continuous software release process?
Answer: C
Question #:470
Which of the following is the PRIMARY benefit of using a capability maturity model?
A.
B. It helps the organization estimate how long it will lake to reach the highest level of maturity in each area
D. It helps the organization develop a roadmap toward its desired level of n each area
Answer: D
Question #:471
Which of the following human resources management practices BEST leads to the detection of fraudulent
activity?
A. Background checks
B. Time reporting
Answer: D
Question #:472
A review of IT interface controls finds an organization does not have a process to identify and correct records
that do not get transferred to the receiving system. Which of the following is.........
Answer: B
Question #:473
Which of the following provides for the GREATEST cost reduction in a large data center?
A. Power conditioning
B. Job-scheduling software
C.
C. Server consolidation
D. Staff rotation
Answer: C
Question #:474
An IS audit reveals that many of an organization's Internet of Things (loT) devices have not been patched.
Which of the following should the auditor do FIRST when determining why these devices have not received
the required patches?
Answer: B
Question #:475
When a firewall is subjected to a probing attack, the MOST appropriate first response is for the firewall to:
Answer: C
Question #:476
When developing metrics to measure the contribution of IT to the achievement of business goals, the MOST
important consideration is that the metrics:
D. are expressed in terms of how IT risk impacts the achievement of business goals.
Answer: C
Question #:477
Which of the following issues identified during a postmortem analysis of the IT security incident response
process should be of GREATEST concern?
A. The incident response team did not initiate actions to limit the impact of the incident
C. The root cause of the incident was not properly identified and documented
Answer: A
Question #:478
Which type of control is being implemented when a biometric access device is installed at the entrance to a
facility?
A. Preventive
B. Deterrent
C. Corrective
D. Detective
Answer: C
Question #:479
Which of the following is the MOST reliable network connection medium in an environment where there is
strong electromagnetic interface?
B. Coaxial cable
D. Wireless link
Answer: A
Question #:480
When reviewing an organization's information security policies, an IS auditor should venfy that the policies
have been defined PRIMARILY on the basis of
Answer: A
Question #:481
Which of the following clauses is MOST important to include in a contract to help maintain data privacy in the
event a Platform as a Service (PaaS) provider becomes financially insolvent?
B. Software escrow
C. Data classification
Answer: D
Question #:482
During a routine check, a system administrator identifies unusual activity indicating an intruder within a
firewall. Which of the following controls has MOST likely been compromised?
A. Data integrity
B. Identification
C. Authentication
D. Data validation
Answer: C
Question #:483
During a review of the IT strategic plan, an IS auditor finds several IT initiatives focused on delivering new
systems and technology are not aligned with the organization's strategy. Which of the following would be the
IS auditor's BEST recommendation?
A.
Answer: C
Question #:484
Which of the following is the MAIN benefit of using data analytics when testing the effectiveness of controls?
Answer: D
Question #:485
Which of the following is the GREATEST threat to Voice-over Internet Protocol (VoIP) related to privacy?
A. Call recording
B. Incorrect routing
C. Eavesdropping
Answer: C
Question #:486
D.
Answer: A
Question #:487
What would be of GREATEST concern to an IS auditor observing shared key cards being utilized to access an
organization's data center?
Answer: C
Question #:488
An IS auditor conducting a follow-up audit learns that previously funded recommendations have not been
implemented due to recent budget restrictions. Which of the following should the
A. Report the matter to the chief financial officer (CFO) and recommend funding be reinstated
B. Report to the audit committee that the recommendations are still open
Answer: B
Question #:489
A. segregation of duties
B. streamlining of tasks
Answer: B
Question #:490
Answer: B
Question #:491
Which of the following is the PRIMARY reason for using a digital signature?
C. Verify the integrity of the data and the identity of the recipient
Answer: C
Question #:492
Which of the following MOST efficiently protects computer equipment against short-term reductions in
electrical power?
D. Generators
Answer: C
Question #:493
Which of the following techniques would provide the BEST assurance to an IS auditor that all necessary data
has been successfully migrated from a legacy system to a modern platform?
B. Data analytics
D. Statistical sampling
Answer: A
Question #:494
After an external IS audit, which of the following should be IT management's MAIN consideration when
determining the prioritization of follow-up activities?
Answer: C
Question #:495
An audit of the quality management system (QMS) begins with an evaluation of the:
Answer: A
Question #:496
A project team evaluated vendor responses to a request for proposal (RFP). An IS auditor reviewing the
evaluation process would expect the team to have considered each vendor's:
A. security policy.
C. financial stability
D.
D. development methodology.
Answer: A
Question #:497
Which of the following is the BEST way to confirm that a digital signature is valid?
A. Confirm that the sender's public key certificate is from a trusted certificate authority (CA).
D. Request a valid private key from the sender and compare it with the public key
Answer: A
Question #:498
Which of the following is the GREATEST concern associated with migrating computing resources to a cloud
virtualized environment?
Answer: C
Question #:499
An IS auditor is reviewing the implementation of an international quality management standard Which of the
following provides the BEST evidence that quality management objectives have been achieved?
C. Measurable processes
Answer: C
Question #:500
Which of the following observations noted during a review of the organization s social media practices should
be of MOST concern to the IS auditor?
A. The organization does not require approval for social media posts.
B. Not all employees using social media have attended the security awareness program.
D. More than one employee is authorized to publish on social media on behalf of the organization
Answer: C
Question #:501
Which of the following audit procedures would be MOST conclusive in evaluating the effectiveness of an
e-commerce application system's edit routine?
Answer: D
Question #:502
As part of a follow-up of a previous year’s audit, an IS auditor has increased the expected error rate for a
sample. The impact will be:
Answer: C
Question #:503
Which of the following will MOST likely compromise the control provided by a digital signature created
using RSA encryption?
Answer: A
Question #:504
A financial institution suspects that a manager has been crediting customer accounts without authorization.
Which of the following is the MOST effective method to validate this concern?
A. Variable sampling
B. Attribute sampling
C. Stop or go sampling
D. Discovery sampling
Answer: B
Question #:505
An IS auditor is a member of an application development team that is selecting software. Which of the
following would impair the auditor's independence?
Answer: A
Question #:506
Which of the following is the client organization's responsibility in a Software as a Service (SaaS)
environment?
B.
Answer: B
Question #:507
An IS auditor is reviewing security policies and finds no mention of the return of corporate-owned
smartphones upon termination of employment. The GREATEST risk arising from this situation is that
unreturned devices:
Answer: C
Question #:508
A financial institution is launching a mobile banking service utilizing multi-factor authentication. This access
control is an example of which of the following?
A. Corrective control
B. Directive control
C. Detective control
D. Preventive control
Answer: D
Question #:509
A CIO has asked an IS auditor to implement several security controls for an organization s IT processes and
systems. The auditor should:
C. perform the assignment and future audits with due professional care.
D.
Answer: B
Question #:510
An organization recently implemented a cloud document storage solution and removed the ability for end
users to save data to their local workstation hard drives Which of the following findings should be the IS
auditor's GREATEST concern?
Answer: D
Question #:511
A. retention.
B. completeness.
C. availability.
D. confidentiality.
Answer: B
Question #:512
For a company that outsources payroll processing, which of the following is the BEST way to ensure that only
authorized employees are paid?
A. Only payroll employees should be given the password for data entry and report retrieval.
B. Employees should receive pay statements showing gross pay, net pay. and deductions.
Answer: D
Question #:513
An IS auditor finds that needed security patches cannot be applied to some of an organization's network
devices due to compatibility issues. The organization has not budgeted sufficiently for security upgrades.
Which of the following should the auditor recommend be done FIRST?
Answer: A
Question #:514
Which of the following is the GREATEST security risk associated with data migration from a legacy human
resources (HR) system to a cloud-based system''
B. Records past their retention period may not be migrated to the new system
D. Data from the source and target system may have different data formats
Answer: A
Question #:515
An IS auditor is reviewing database log settings and notices that only INSERT and DELETE operations are
being monitored in the database. What is the MOST significant risk?
Answer: D
Question #:516
What is the BEST justification for allocating more funds to implement a control for an IT asset than the actual
cost of the IT asset?
A.
Answer: A
Question #:517
Which of the following is the BEST source for describing the objectives of an organization s information
systems?
A. IT management
D. End users
Answer: B
Question #:518
Which audit approach is MOST helpful in optimizing the use of IS audit resources?
A. Outsourced auditing
B. Continuous auditing
C. Agile auditing
D. Risk-based auditing
Answer: D
Question #:519
Which of the following is the BEST control to mitigate the malware risk associated with an instant messaging
(IM) system1?
B. Encrypting IM traffic
D. Blocking attachments in IM
Answer: B
Question #:520
Which of the following is the BEST way to minimize the impact of a ransomware attack?
Answer: A
Question #:521
What would be an IS auditor’s BEST recommendation upon finding that a third-party IT service provider
hosts the organization's human resources (HR) system in a foreign country?
Answer: C
Question #:522
Which of the following should be of GREATEST concern to an IS auditor reviewing actions taken during a
forensic investigation?
Answer: C
Question #:523
An IS auditor finds the timeliness and depth of information regarding the organization's IT projects varies
based on which project manager is assigned. Which of the following recommendations would be A MOST
helpful in achieving predictable and repeatable project management processes?
Answer: B
Question #:524
Answer: B
Question #:525
An IS auditor determines that a business continuity plan has not been reviewed and approved by management.
Which of the following is the MOST significant risk associated with this situation?
Answer: C
Question #:526
An IS auditor is reviewing the key payroll interface that collects wage rates from various business applications
to process payroll. Which of the following is MOST likely to cause errors in payroll processing?
A. User acceptance testing (UAT) has not been properly documented for all changes.
B. Data conversion procedures did not include all business applications and interfaces.
C. The payroll processing application does not follow a regularly scheduled patching cycle.
D. Changes to the interface configuration settings were not adequately tested and approved.
Answer: D
Question #:527
Which of the following poses the GREATEST security risk when implementing acquired application systems?
B. Social engineering
D. Password length
Answer: A
Question #:528
Code changes are compiled and placed in a change folder by the developer. An implementation learn migrates
changes to production from the change folder. Which of the following BEST indicates separation of duties is
in place during the migration process?
A. A second individual performs code review before the change is released to production.
B. The implementation team does not have access to change the source code.
D. The developer approves changes prior to moving them to the change folder.
Answer: B
Question #:529
Which of the following would BEST provide executive management with current information on IT related
costs and IT performance indicators?
A.
A. Risk register
D. IT dashboard
Answer: D
Question #:530
An organization seeks to control costs related to storage media throughout the information life cycle while still
meeting business and regulatory requirements. Which of the following is the BEST way to achieve this
objective?
Answer: C
Question #:531
Answer: A
Question #:532
The PRIMARY reason an IS department should analyze past incidents and problems is to:
Answer: D
Question #:533
Which of the following is MOST likely to enable a hacker to successfully penetrate a system?
A. Unpatched software
Answer: A
Question #:534
Which of the following is a corrective control that reduces the impact of a threat event?
B. Security policy
Answer: C
Question #:535
Spreadsheets are used to calculate project cost estimates Totals for each cost category are then keyed into the
job-costing system. What is the BIST control to ensure that data are accurately entered into the system?
Answer: B
Question #:536
Answer: B
Question #:537
On a public-key cryptosystem when there is no previous knowledge between parties, which of the following
will BEST help to prevent one person from using a fictitious key to impersonate someone else?
A. Send the public key to the recipient prior to establishing the connection
B. Encrypt the message containing the sender's public key using a private-key
C. cryptosystem 1 Encrypt the message containing the sender's public key. using the recipient's public key
D. Send a certificate that can be verified by a certification authority with the public key
Answer: D
Question #:538
A. To ensure there are sufficient dedicated resources in place to facilitate data transfer
B. To ensure receiving data fields have been configured according to the structure of the transmitted data
Answer: B
Question #:539
During the implementation of an upgraded enterprise resource planning (ERP) system, which of the following
is the MOST important consideration for a go-live decision?
B. Test cases
C. Rollback strategy
D. Business case
Answer: C
Question #:540
Answer: A
Question #:541
A user of a telephone banking system has forgotten his personal identification number (PIN), after the user has
been authenticated, the BEST method of issuing a new pin is to have:
Answer: C
Question #:542
Which of the following control techniques BEST ensures the integrity of system interface transmissions?
A. Validity check
B. Completeness check
C. Parity check
D.
D. Reasonableness check
Answer: B
Question #:543
Which of the following is the BEST recommendation to prevent fraudulent electronic funds transfers by
accounts payable employees?
A. Independent reconciliation
C. Dual control
Answer: C
Question #:544
An IS auditor has completed an audit on the organization's IT strategic planning process Which of the
following findings should be given the HIGHEST priority?
A. Assumptions in the IT strategic plan have not been communicated to business stakeholders
C. The IT strategic plan was completed prior to the formulation of the business strategic plan
D. The IT strategic plan does not include resource requirements for implementation.
Answer: C
Question #:545
Which of the following is the MOST effective sampling method for an IS auditor to use for identifying fraud
and circumvention of regulations?
A. Discovery sampling
B. Stop-or-go sampling
C. Statistical sampling
D. Variable sampling
Answer: A
Question #:546
An IS audit reveals an organization's IT department reports any deviations from its security standards to an
internal IT risk committee involving IT senior management. Which of the following should be the IS auditor's
GREATEST concern?
A. The list of IT risk committee members does not include the board member responsible for IT.
B. The IT risk committee has no reporting line to any governance committee outside IT.
C. The IT risk committee meeting minutes are not signed off by all participants.
D. The chief information officer (CIO) did not attend a number of IT risk committee meetings during the
past year.
Answer: B
Question #:547
A. Purchase orders in the system being checked by a supervisor prior to execution to identify errors during
entry
B. An online retailer's daily review of transactions processed to identify trends and changes in customer
demand
C. Regular assessments of the sales department to identify the most profitable sales strategies used by sales
staff D. Continuous operation of a screening system to identify fraudulent patterns in recent transactions
Answer: A
Question #:548
Answer: B
Question #:549
An internal audit department recently established a quality assurance (QA) program as part of its overall audit
program. Which of the following activities is MOST important to rlude as part of the QA program
requirements?
Answer: A
Question #:550
Which of the following is MOST important for an IS auditor to verify when evaluating an organization's
firewall?
Answer: A
Question #:551
Which of the following is the MOST important consideration for building resilient systems?
Answer: C
Question #:552
Answer: D
Question #:553
A multinational organization is integrating its existing payroll system with a human resource information
system. Which of the following should be of GREATEST concern to the IS auditor?
A. Application interfaces
B. Scope creep
C. System documentation
D. Currency conversion
Answer: C
Question #:554
Which of the following controls will MOST effectively detect inconsistent records resulting from the lack of
referential integrity in a database management system?
Answer: D
Question #:555
Which of the following is MOST important for an IS auditor to examine when reviewing an organization's
privacy policy?
A. The encryption mechanism selected by the organization for protecting personal data
Answer: C
Question #:556
Which of the following is the BEST indicator of the effectiveness of signature-based intrusion detection
systems (IDSs)?
Answer: A
Question #:557
Which of the following communication modes should be of GREATEST concern to an IS auditor evaluating
end user networking?
A. Peer-to-peer
B. Client-to-server
C. Host-to-host
D. System-to-system
Answer: A
Question #:558
The BEST way to prevent fraudulent payments is to implement segregation of duties between payment
processing and:
A. payment approval.
B. requisition creation.
C. vendor setup.
D. check creation.
Answer: A
Question #:559
An IS auditor is assigned to review the development of a specific application. Which of the following would
be the MOST significant step following the feasibility study?
C. Follow up with project sponsor for project's budgets and actual costs.
Answer: D
Question #:560
An IS auditor assessing the controls within a newly implemented call center would FIRST
C. gather information from the customers regarding response times and quality of service.
Answer: D
Question #:561
When developing a business continuity plan (BCP), which of the following should be performed FIRST?
A. Classify operations.
D.
Answer: B
Question #:562
An IS auditor is reviewing a recent security incident and is seeking information about the approval of a recent
modification to a database system's security settings Where would the auditor MOST likely find this
information?
B. Change log
C. Database log
Answer: B
Question #:563
Which of the following would be the MOST appropriate reason for an organization to purchase fault-tolerant
hardware?
Answer: C
Question #:564
An IS auditor is evaluating a virtual server environment and teams that the production server, development
server and management console are housed in the same physical host. What
C. The development server and management console share the same host.
Answer: A
Question #:565
An organization is using a single account shared by personnel for its social networking marketing page. Which
of the following is the BEST method to maintain accountability over the account?
Answer: A
Question #:566
Which of the following is the BEST sampling method to ensure only active users have access to critical
systems?
A. Substantive testing
B. Difference estimation
D. Compliance testing
Answer: D
Question #:567
Which of the following would be an appropriate role of internal audit in helping to establish an organization’s
privacy program?
Answer: B
Question #:568
Answer: D
Question #:569
During a review, an IS auditor notes that an organization's marketing department has purchased a cloud-based
software application without following the procurement process. What should the auditor do FIRST?
Answer: A
Question #:570
Answer: A
Question #:571
An organization plans to eliminate pilot releases and instead deliver all functionality in a single release. Which
of the following is the GREATEST risk with this approach?
Answer: D
Question #:572
Answer: B
Question #:573
Which of the following is the MOST effective means of helping management and the IT strategy committee to
monitor IT performance?
A. Gap analysis
Answer: B
Question #:574
During an operational audit of a biometric system used to control physical access, which of the following
should be of GREATEST concern to an IS auditor?
A. False positives
C. False negatives
Answer: A
Question #:575
Answer: B
Question #:576
An IS auditor notes that application super-user activity was not recorded in system logs. What is the auditor’s
BEST course of action?
Answer: C
Question #:577
An organization has decided to implement a third-party system in its existing IT environment Which of the
following is MOST important for the IS auditor to confirm?
A. The organization has created a clone of the third party's IT infrastructure to host the IT system
C. The organization has analyzed the IT infrastructure to determine the feasibility of hosting the IT system.
D. The organization has purchased a newly released IT infrastructure environment relevant to the IT system
Answer: C
We help you pass any IT / Business Certification Exams with 100% Pass Guaranteed or Full Refund. Especially
Cisco, CompTIA, Citrix, EMC, HP, Oracle, VMware, Juniper, Check Point, LPI, Nortel, EXIN and so on.
We prepare state-of-the art practice tests for certification exams. You can reach us at any of the email addresses listed
below.
Sales: sales@dumpscollection.com
Feedback: feedback@dumpscollection.com
Support: support@dumpscollection.com
Skype ID: crack4sure@gmail.com
Any problems about IT certification or our products, You can write us back and we will get back to you within 24
hours.