CISA Final Assessment 1
Quiz Summary
0 of 150 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Results
0 of 150 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 150
1. Question
An IS auditor learns a server administration team regularly applies workarounds to address repeated failures of critical data processing services. Which of the following would BEST enable the organization to resolve this issue?
CorrectIncorrect -
Question 2 of 150
2. Question
An IS auditor is informed that several spreadsheets are being used to generate key financial information. What should the auditor verify NEXT?
CorrectIncorrect -
Question 3 of 150
3. Question
An IS auditor is reviewing a contract for the outsourcing of IT facilities. If missing, which of the following should present the GREATEST concern to the auditor?
CorrectIncorrect -
Question 4 of 150
4. Question
An IS auditor is reviewing a data conversion project. Which of the following is the auditor’s BEST recommendation prior to go-live?
CorrectIncorrect -
Question 5 of 150
5. Question
An IS auditor should ensure that an application’s audit trail:
CorrectIncorrect -
Question 6 of 150
6. Question
Which of the following would provide the BEST evidence of an IT strategy committee’s effectiveness?
CorrectIncorrect -
Question 7 of 150
7. Question
An IS auditor is reviewing the business requirements for the deployment of a new website. Which of the following cryptographic systems would provide the BEST evidence of secure communications on the Internet?
CorrectIncorrect -
Question 8 of 150
8. Question
An IS auditor is performing a follow-up audit for findings identified in an organization’s user provisioning process. Which of the following is the MOST appropriate population to sample from when testing for remediation?
CorrectIncorrect -
Question 9 of 150
9. Question
Which of the following is the BEST method to prevent wire transfer fraud by bank employees?
CorrectIncorrect -
Question 10 of 150
10. Question
Which of the following would be MOST useful to an organization planning to adopt a public cloud computing model?
CorrectIncorrect -
Question 11 of 150
11. Question
Which of the following is the MOST effective control to mitigate unintentional misuse of authorized access?
CorrectIncorrect -
Question 12 of 150
12. Question
In order to be useful, a key performance indicator (KPI) MUST:
CorrectIncorrect -
Question 13 of 150
13. Question
Which of the following should be of GREATEST concern to an IS auditor reviewing an organization’s IT process performance reports over the last quarter?
CorrectIncorrect -
Question 14 of 150
14. Question
Which of the following is MOST important to have in place to build consensus among key stakeholders on the cost-effectiveness of IT?
CorrectIncorrect -
Question 15 of 150
15. Question
Which of the following is the PRIMARY benefit of continuous auditing?
CorrectIncorrect -
Question 16 of 150
16. Question
Which of the following are BEST suited for continuous auditing?
CorrectIncorrect -
Question 17 of 150
17. Question
Which of the following is the BEST method to maintain an audit trail of changes made to the source code of a program?
CorrectIncorrect -
Question 18 of 150
18. Question
Which of the following is MOST likely to be detected by an IS auditor applying data analytic techniques?
CorrectIncorrect -
Question 19 of 150
19. Question
An IS auditor is planning an audit of an organization’s accounts payable processes. Which of the following controls is MOST important to assess in the audit?
CorrectIncorrect -
Question 20 of 150
20. Question
An IS auditor discovers that due to resource constraints, a database administrator (DBA) is responsible for developing and executing changes into the production environment. Which of the following should the auditor do FIRST?
CorrectIncorrect -
Question 21 of 150
21. Question
An IS auditor is reviewing logical access controls for an organization’s financial business application. Which of the following findings should be of GREATEST concern to the auditor?
CorrectIncorrect -
Question 22 of 150
22. Question
An IS auditor has discovered that unauthorized customer management software was installed on a workstation. The auditor determines the software has been uploading customer data to an external party. Which of the following is the IS auditor’s BEST course of action?
CorrectIncorrect -
Question 23 of 150
23. Question
An IS auditor is reviewing an organization’s information asset management process. Which of the following would be of GREATEST concern to the auditor?
CorrectIncorrect -
Question 24 of 150
24. Question
An IS auditor is conducting a post-implementation review of an enterprise resource planning (ERP) system. End users indicated concerns with the accuracy of critical automatic calculations made by the system. The auditor’s FIRST course of action should be to:
CorrectIncorrect -
Question 25 of 150
25. Question
An IS auditor performing an audit of backup procedures observes that backup tapes are picked up weekly and stored offsite at a third-party hosting facility. Which of the following recommendations would be the BEST way to protect the integrity of the data on the backup tapes?
CorrectIncorrect -
Question 26 of 150
26. Question
An IS auditor has been asked to perform an assurance review of an organization’s mobile computing security. To ensure the organization is able to centrally manage mobile devices to protect against data disclosure, it is MOST important for the auditor to determine whether:
CorrectIncorrect -
Question 27 of 150
27. Question
An IS auditor has been asked to perform a post-implementation assessment of a new corporate human resources (HR) system. Which of the following control areas would be MOST important to review for the protection of employee information?
CorrectIncorrect -
Question 28 of 150
28. Question
An external IS auditor has been engaged to determine the organization’s cybersecurity posture. Which of the following is MOST useful for this purpose?
CorrectIncorrect -
Question 29 of 150
29. Question
An IS auditor observes that a business-critical application does not currently have any level of fault tolerance. Which of the following is the GREATEST concern with this situation?
CorrectIncorrect -
Question 30 of 150
30. Question
An IS auditor is evaluating an organization’s IT strategy and plans. Which of the following would be of GREATEST concern?
CorrectIncorrect -
Question 31 of 150
31. Question
An IS auditor reviewing the threat assessment for a data center would be MOST concerned if:
CorrectIncorrect -
Question 32 of 150
32. Question
An IS auditor observes that exceptions have been approved for an organization’s information security policy. Which of the following is MOST important for the auditor to confirm?
CorrectIncorrect -
Question 33 of 150
33. Question
An IS auditor has found that an organization is unable to add new servers on demand in a cost-efficient manner. Which of the following is the auditor’s BEST recommendation?
CorrectIncorrect -
Question 34 of 150
34. Question
A senior auditor is reviewing work papers prepared by a junior auditor indicating that a finding was removed after the auditee said they corrected the problem.
Which of the following is the senior auditor’s MOST appropriate course of action?CorrectIncorrect -
Question 35 of 150
35. Question
An IS auditor finds that while an organization’s IT strategy is heavily focused on research and development, the majority of projects in the IT portfolio focus on operations and maintenance. Which of the following is the BEST recommendation?
CorrectIncorrect -
Question 36 of 150
36. Question
Which of the following documents should specify roles and responsibilities within an IT audit organization?
CorrectIncorrect -
Question 37 of 150
37. Question
Which of the following presents the GREATEST challenge to the alignment of business and IT?
CorrectIncorrect -
Question 38 of 150
38. Question
Which of the following would be of MOST concern when determining if information assets are adequately safeguarded during transport and disposal?
CorrectIncorrect -
Question 39 of 150
39. Question
Which of the following provides the BEST evidence that a third-party service provider’s information security controls are effective?
CorrectIncorrect -
Question 40 of 150
40. Question
Which of the following is the BEST reason to implement a data retention policy?
CorrectIncorrect -
Question 41 of 150
41. Question
Capacity management enables organizations to:
CorrectIncorrect -
Question 42 of 150
42. Question
Which of the following is the MOST effective way for an IS auditor to evaluate whether an organization is well positioned to defend against an advanced persistent threat (APT)?
CorrectIncorrect -
Question 43 of 150
43. Question
A credit card company has decided to outsource the printing of customer statements. It is MOST important for the company to verify whether:
CorrectIncorrect -
Question 44 of 150
44. Question
An IS auditor is conducting a review of a data center. Which of the following observations could indicate an access control issue?
CorrectIncorrect -
Question 45 of 150
45. Question
An IS auditor notes that IT and the business have different opinions on the availability of their application servers. Which of the following should the IS auditor review FIRST in order to understand the problem?
CorrectIncorrect -
Question 46 of 150
46. Question
Which type of migration process would BEST minimize the risk associated with a payroll application when converting from an old to a new system?
CorrectIncorrect -
Question 47 of 150
47. Question
Which of the following is MOST important for an IS auditor to verify when reviewing the use of an outsourcer for disposal of storage media?
CorrectIncorrect -
Question 48 of 150
48. Question
Which of the following is a detective control?
CorrectIncorrect -
Question 49 of 150
49. Question
Which of the following is the BEST way for an organization to mitigate the risk associated with third-party application performance?
CorrectIncorrect -
Question 50 of 150
50. Question
An organization conducted an exercise to test the security awareness level of users by sending an email offering a cash reward to those who click on a link embedded in the body of the email. Which of the following metrics BEST indicates the effectiveness of awareness training?
CorrectIncorrect -
Question 51 of 150
51. Question
A review of Internet security disclosed that users have individual user accounts with Internet service providers (ISPs) and use these accounts for downloading business data. The organization wants to ensure that only the corporate network is used. The organization should FIRST:
CorrectIncorrect -
Question 52 of 150
52. Question
Which of the following is MOST important to ensure when developing an effective security awareness program?
CorrectIncorrect -
Question 53 of 150
53. Question
An IS auditor has discovered that a cloud-based application was not included in an application inventory that was used to confirm the scope of an audit. The business process owner explained that the application will be audited by a third party in the next year. The auditor’s NEXT step should be to:
CorrectIncorrect -
Question 54 of 150
54. Question
While executing follow-up activities, an IS auditor is concerned that management has implemented corrective actions that are different from those originally discussed and agreed with the audit function. In order to resolve the situation, the IS auditor’s BEST course of action would be to:
CorrectIncorrect -
Question 55 of 150
55. Question
Which of the following is the PRIMARY reason to follow a configuration management process to maintain applications?
CorrectIncorrect -
Question 56 of 150
56. Question
What should an IS auditor do FIRST when management responses to an in-person internal control questionnaire indicate a key internal control is no longer effective?
CorrectIncorrect -
Question 57 of 150
57. Question
Which of the following is the PRIMARY reason for an IS audit manager to review the work performed by a senior IS auditor prior to presentation of a report?
CorrectIncorrect -
Question 58 of 150
58. Question
Following the implementation of a data loss prevention (DLP) tool, administrators have been overwhelmed with a high number of false positives. Which of the following is the BEST way to address this issue?
CorrectIncorrect -
Question 59 of 150
59. Question
During an exit interview, senior management disagrees with some of the facts presented in the draft audit report and wants them removed from the report. Which of the following would be the auditor’s BEST course of action?
CorrectIncorrect -
Question 60 of 150
60. Question
An organization was recently notified by its regulatory body of significant discrepancies in its reporting data. A preliminary investigation revealed that the discrepancies were caused by problems with the organization’s data quality. Management has directed the data quality team to enhance their program. The audit committee has asked internal audit to be advisors to the process. To ensure that management concerns are addressed, which data set should internal audit recommend be reviewed FIRST?
CorrectIncorrect -
Question 61 of 150
61. Question
Which of the following BEST minimizes performance degradation of servers used to authenticate users of an e-commerce website?
CorrectIncorrect -
Question 62 of 150
62. Question
Audit frameworks can assist the IS audit function by:
CorrectIncorrect -
Question 63 of 150
63. Question
What is the BEST way to evaluate a control environment where the organization and a third party have shared responsibility?
CorrectIncorrect -
Question 64 of 150
64. Question
Which of the following is the MAIN purpose of an information security management system?
CorrectIncorrect -
Question 65 of 150
65. Question
During the discussion of a draft audit report, IT management provided suitable evidence that a process has been implemented for a control that had been concluded by the IS auditor as ineffective. Which of the following is the auditor’s BEST action?
CorrectIncorrect -
Question 66 of 150
66. Question
An organization allows its employees to use personal mobile devices for work. Which of the following would BEST maintain information security without compromising employee privacy?
CorrectIncorrect -
Question 67 of 150
67. Question
An IS auditor who was instrumental in designing an application is called upon to review the application. The auditor should:
CorrectIncorrect -
Question 68 of 150
68. Question
Documentation of workaround processes to keep a business function operational during recovery of IT systems is a core part of a:
CorrectIncorrect -
Question 69 of 150
69. Question
IS audit is asked to explain how local area network (LAN) servers can contribute to a rapid dissemination of viruses. The IS auditor’s BEST response is that:
CorrectIncorrect -
Question 70 of 150
70. Question
An organization has developed mature risk management practices that are followed across all departments. What is the MOST effective way for the audit team to leverage this risk management maturity?
CorrectIncorrect -
Question 71 of 150
71. Question
Which of the following is the MOST important reason to implement version control for an end-user computing (EUC) application?
CorrectIncorrect -
Question 72 of 150
72. Question
One benefit of return on investment (ROI) analysis in IT decision making is that it provides the:
CorrectIncorrect -
Question 73 of 150
73. Question
Which of the following is MOST important for an IS auditor to verify when evaluating an organization’s data conversion and infrastructure migration plan?
CorrectIncorrect -
Question 74 of 150
74. Question
Which of the following weaknesses would have the GREATEST impact on the effective operation of a perimeter firewall?
CorrectIncorrect -
Question 75 of 150
75. Question
Which of the following is MOST important to ensure that electronic evidence collected during a forensic investigation will be admissible in future legal proceedings?
CorrectIncorrect -
Question 76 of 150
76. Question
The IS auditor has recommended that management test a new system before using it in production mode. The BEST approach for management in developing a test plan is to use processing parameters that are:
CorrectIncorrect -
Question 77 of 150
77. Question
Which of the following is the GREATEST risk associated with storing customer data on a web server?
CorrectIncorrect -
Question 78 of 150
78. Question
Which of the following tests would provide the BEST assurance that a health care organization is handling patient data appropriately?
CorrectIncorrect -
Question 79 of 150
79. Question
Which of the following provides the BEST evidence that outsourced provider services are being properly managed?
CorrectIncorrect -
Question 80 of 150
80. Question
Which of the following is a concern when an organization’s disaster recovery strategy utilizes a hot site?
CorrectIncorrect -
Question 81 of 150
81. Question
What is the BEST method to determine if IT resource spending is aligned with planned project spending?
CorrectIncorrect -
Question 82 of 150
82. Question
An IS auditor is reviewing the release management process for an in-house software development solution. In which environment is the software version MOST likely to be the same as production?
CorrectIncorrect -
Question 83 of 150
83. Question
Which of the following would BEST help to ensure that potential security issues are considered by the development team as part of incremental changes to agile- developed software?
CorrectIncorrect -
Question 84 of 150
84. Question
The waterfall life cycle model of software development is BEST suited for which of the following situations?
CorrectIncorrect -
Question 85 of 150
85. Question
Which of the following is the GREATEST impact as a result of the ongoing deterioration of a detective control?
CorrectIncorrect -
Question 86 of 150
86. Question
A proper audit trail of changes to server start-up procedures would include evidence of:
CorrectIncorrect -
Question 87 of 150
87. Question
An audit identified that a computer system is not assigning sequential purchase order numbers to order requests. The IS auditor is conducting an audit follow-up to determine if management has resolved this finding. Which of the following is the MOST reliable follow-up procedure?
CorrectIncorrect -
Question 88 of 150
88. Question
Which of the following is the BEST way to enforce the principle of least privilege on a server containing data with different security classifications?
CorrectIncorrect -
Question 89 of 150
89. Question
Which of the following is the BEST way to determine whether a test of a disaster recovery plan (DRP) was successful?
CorrectIncorrect -
Question 90 of 150
90. Question
If enabled within firewall rules, which of the following services would present the GREATEST risk?
CorrectIncorrect -
Question 91 of 150
91. Question
Which of the following is the MOST effective way for an organization to protect against data loss?
CorrectIncorrect -
Question 92 of 150
92. Question
Which of the following is the BEST control to minimize the risk of unauthorized access to lost company-owned mobile devices?
CorrectIncorrect -
Question 93 of 150
93. Question
In a RACI model, which of the following roles must be assigned to only one individual?
CorrectIncorrect -
Question 94 of 150
94. Question
An IS auditor has found that a vendor has gone out of business and the escrow has an older version of the source code. What is the auditor’s BEST recommendation for the organization?
CorrectIncorrect -
Question 95 of 150
95. Question
An IS auditor is reviewing the installation of a new server. The IS auditor’s PRIMARY objective is to ensure that:
CorrectIncorrect -
Question 96 of 150
96. Question
An IS auditor finds a high-risk vulnerability in a public-facing web server used to process online customer payments. The IS auditor should FIRST:
CorrectIncorrect -
Question 97 of 150
97. Question
An IS auditor discovers that an IT organization serving several business units assigns equal priority to all initiatives, creating a risk of delays in securing project funding. Which of the following would be MOST helpful in matching demand for projects and services with available resources in a way that supports business objectives?
CorrectIncorrect -
Question 98 of 150
98. Question
Which of the following is the MOST efficient way to identify segregation of duties violations in a new system?
CorrectIncorrect -
Question 99 of 150
99. Question
An internal audit team is deciding whether to use an audit management application hosted by a third party in a different country. What should be the MOST important consideration related to the uploading of payroll audit documentation in the hosted application?
CorrectIncorrect -
Question 100 of 150
100. Question
Which of the following is the PRIMARY reason for an IS auditor to conduct post-implementation reviews?
CorrectIncorrect -
Question 101 of 150
101. Question
Which of the following is the BEST metric to measure the alignment of IT and business strategy?
CorrectIncorrect -
Question 102 of 150
102. Question
Which of the following is the MOST important activity in the data classification process?
CorrectIncorrect -
Question 103 of 150
103. Question
Which of the following is MOST appropriate to prevent unauthorized retrieval of confidential information stored in a business application system?
CorrectIncorrect -
Question 104 of 150
104. Question
A project team has decided to switch to an agile approach to develop a replacement for an existing business application. Which of the following should an IS auditor do FIRST to ensure the effectiveness of the project audit?
CorrectIncorrect -
Question 105 of 150
105. Question
During an external review, an IS auditor observes an inconsistent approach in classifying system criticality within the organization. Which of the following should be recommended as the PRIMARY factor to determine system criticality?
CorrectIncorrect -
Question 106 of 150
106. Question
Which of the following is the MOST significant risk that IS auditors are required to consider for each engagement?
CorrectIncorrect -
Question 107 of 150
107. Question
An externally facing system containing sensitive data is configured such that users have either read-only or administrator rights. Most users of the system have administrator access. Which of the following is the GREATEST risk associated with this situation?
CorrectIncorrect -
Question 108 of 150
108. Question
Which of the following is the GREATEST risk associated with utilizing spreadsheets for financial reporting in end-user computing (EUC)?
CorrectIncorrect -
Question 109 of 150
109. Question
The decision to accept an IT control risk related to data quality should be the responsibility of the:
CorrectIncorrect -
Question 110 of 150
110. Question
An organization’s audit charter PRIMARILY:
CorrectIncorrect -
Question 111 of 150
111. Question
Following a security breach in which a hacker exploited a well-known vulnerability in the domain controller, an IS auditor has been asked to conduct a control assessment. The auditor’s BEST course of action would be to determine if:
CorrectIncorrect -
Question 112 of 150
112. Question
What is MOST important to verify during an external assessment of network vulnerability?
CorrectIncorrect -
Question 113 of 150
113. Question
Which of the following environments is BEST used for copying data and transformation into a compatible data warehouse format?
CorrectIncorrect -
Question 114 of 150
114. Question
Which of the following is the BEST recommendation to include in an organization’s bring your own device (BYOD) policy to help prevent data leakage?
CorrectIncorrect -
Question 115 of 150
115. Question
Which type of testing BEST determines whether a new system meets business requirements and is ready to be placed into production?
CorrectIncorrect -
Question 116 of 150
116. Question
During audit planning, the IS audit manager is considering whether to budget for audits of entities regarded by the business as having low risk. Which of the following is the BEST course of action in this situation?
CorrectIncorrect -
Question 117 of 150
117. Question
An organization has virtualized its server environment without making any other changes to the network or security infrastructure. Which of the following is the
MOST significant risk?CorrectIncorrect -
Question 118 of 150
118. Question
During an audit of an organization’s risk management practices, an IS auditor finds several documented IT risk acceptances have not been renewed in a timely manner after the assigned expiration date. When assessing the severity of this finding, which mitigating factor would MOST significantly minimize the associated impact?
CorrectIncorrect -
Question 119 of 150
119. Question
Which of the following is MOST important for an IS auditor to consider when performing the risk assessment prior to an audit engagement?
CorrectIncorrect -
Question 120 of 150
120. Question
An IS auditor is reviewing the deployment of a new automated system. Which of the following findings presents the MOST significant risk?
CorrectIncorrect -
Question 121 of 150
121. Question
Which of the following is an executive management concern that could be addressed by the implementation of a security metrics dashboard?
CorrectIncorrect -
Question 122 of 150
122. Question
Which of the following is the BEST way to mitigate the risk associated with unintentional modifications of complex calculations in end-user computing (EUC)?
CorrectIncorrect -
Question 123 of 150
123. Question
Which of the following must be in place before an IS auditor initiates audit follow-up activities?
CorrectIncorrect -
Question 124 of 150
124. Question
Which of the following is the BEST way to address segregation of duties issues in an organization with budget constraints?
CorrectIncorrect -
Question 125 of 150
125. Question
The due date of an audit project is approaching, and the audit manager has determined that only 60% of the audit has been completed. Which of the following should the audit manager do FIRST?
CorrectIncorrect -
Question 126 of 150
126. Question
During a security audit, an IS auditor is tasked with reviewing log entries obtained from an enterprise intrusion prevention system (IPS). Which type of risk would be associated with the potential for the auditor to miss a sequence of logged events that could indicate an error in the IPS configuration?
CorrectIncorrect -
Question 127 of 150
127. Question
Which of the following backup schemes is the BEST option when storage media is limited?
CorrectIncorrect -
Question 128 of 150
128. Question
Which of the following should be of GREATEST concern for an IS auditor reviewing an organization’s disaster recovery plan (DRP)?
CorrectIncorrect -
Question 129 of 150
129. Question
A system administrator recently informed the IS auditor about the occurrence of several unsuccessful intrusion attempts from outside the organization. Which of the following is MOST effective in detecting such an intrusion?
CorrectIncorrect -
Question 130 of 150
130. Question
According to the three lines of defense model for risk management, the second line of defense includes functions that:
CorrectIncorrect -
Question 131 of 150
131. Question
Which of the following should be an IS auditor’s PRIMARY focus when developing a risk-based IS audit program?
CorrectIncorrect -
Question 132 of 150
132. Question
Which of the following is the MOST appropriate and effective fire suppression method for an unstaffed computer room?
CorrectIncorrect -
Question 133 of 150
133. Question
Which of the following is MOST important for an IS auditor to examine when reviewing an organization’s privacy policy?
CorrectIncorrect -
Question 134 of 150
134. Question
An IS auditor reviewing security incident processes realizes incidents are resolved and closed, but root causes are not investigated. Which of the following should be the MAJOR concern with this situation?
CorrectIncorrect -
Question 135 of 150
135. Question
Which of the following provides the MOST assurance of the integrity of a firewall log?
CorrectIncorrect -
Question 136 of 150
136. Question
Which of the following is MOST important for an IS auditor to determine during the detailed design phase of a system development project?
CorrectIncorrect -
Question 137 of 150
137. Question
Which of the following should an IS auditor consider FIRST when evaluating firewall rules?
CorrectIncorrect -
Question 138 of 150
138. Question
An IS auditor has discovered that a software system still in regular use is years out of date and no longer supported. The auditee has stated that it will take six months until the software is running on the current version. Which of the following is the BEST way to reduce the immediate risk associated with using an unsupported version of the software?
CorrectIncorrect -
Question 139 of 150
139. Question
The PRIMARY purpose of running a new system in parallel is to:
CorrectIncorrect -
Question 140 of 150
140. Question
During the planning phase of a data loss prevention (DLP) audit, management expresses a concern about mobile computing. Which of the following should the IS auditor identify as the associated risk?
CorrectIncorrect -
Question 141 of 150
141. Question
An organization has recently acquired and implemented intelligent-agent software for granting loans to customers. During the post-implementation review, which of the following is the MOST important procedure for the IS auditor to perform?
CorrectIncorrect -
Question 142 of 150
142. Question
During a new system implementation, an IS auditor has been assigned to review risk management at each milestone. The auditor finds that several risks to project benefits have not been addressed. Who should be accountable for managing these risks?
CorrectIncorrect -
Question 143 of 150
143. Question
In a post-implementation review of a recently purchased system, it is MOST important for the IS auditor to determine whether the:
CorrectIncorrect -
Question 144 of 150
144. Question
Which of the following strategies BEST optimizes data storage without compromising data retention practices?
CorrectIncorrect -
Question 145 of 150
145. Question
Which of the following will be the MOST effective method to verify that a service vendor keeps control levels as required by the client?
CorrectIncorrect -
Question 146 of 150
146. Question
An IS auditor is reviewing the maturity of a large organization’s IT governance. Which of the following BEST demonstrates that IT governance has been effectively implemented?
CorrectIncorrect -
Question 147 of 150
147. Question
What should an IS auditor do FIRST upon discovering that a service provider did not notify its customers of a security breach?
CorrectIncorrect -
Question 148 of 150
148. Question
An IS auditor is reviewing an organization’s primary router access control list. Which of the following should result in a finding?
CorrectIncorrect -
Question 149 of 150
149. Question
Which of the following is the GREATEST risk of using a reciprocal site for disaster recovery?
CorrectIncorrect -
Question 150 of 150
150. Question
Which of the following BEST enables the timely identification of risk exposure?
CorrectIncorrect