Text Material Preview
CISA Certified Information Systems Auditor exam dumps questions are the best material for you to test all the related ISACA exam topics. By using the CISA exam dumps questions and practicing your skills, you can increase your confidence and chances of passing the CISA exam. Features of Dumpsinfo’s products Instant Download Free Update in 3 Months Money back guarantee PDF and Software 24/7 Customer Support Besides, Dumpsinfo also provides unlimited access. You can get all Dumpsinfo files at lowest price. Certified Information Systems Auditor CISA exam free dumps questions are available below for you to study. Full version: CISA Exam Dumps Questions 1.Which of the following is MOST important to consider when scheduling follow-up audits? A. The efforts required for independent verification with new auditors B. The impact if corrective actions are not taken C. The amount of time the auditee has agreed to spend with auditors D. Controls and detection risks related to the observations Answer: B 2.An organization has recently become aware of a pervasive chip-level security vulnerability that affects all of its processors. Which of the following is the BEST way to prevent this vulnerability from being exploited? A. Implement security awareness training. B. Install vendor patches 1 / 22 https://www.dumpsinfo.com/unlimited-access/ https://www.dumpsinfo.com/exam/cisa C. Review hardware vendor contracts. D. Review security log incidents. Answer: B Explanation: Vendor patches are updates released by hardware vendors that can fix security vulnerabilities, making it less likely that attackers will be able to exploit them. Additionally, hardware vendors may release patches for other security issues that have already been exploited, helping to protect the organization from future attacks. It is important for organizations to regularly review the available patches and install them as soon as possible in order to ensure their hardware and systems are secure. 3.Which of the following BEST guards against the risk of attack by hackers? A. Tunneling B. Encryption C. Message validation D. Firewalls Answer: B 4.Which of the following would lead an IS auditor to conclude that the evidence collected during a digital forensic investigation would not be admissible in court? A. The person who collected the evidence is not qualified to represent the case. B. The logs failed to identify the person handling the evidence. C. The evidence was collected by the internal forensics team. D. The evidence was not fully backed up using a cloud-based solution prior to the trial. Answer: B 5.Which of the following would be to MOST concern when determine if information assets are adequately safequately safeguarded during transport and disposal? A. Lack of appropriate labelling B. Lack of recent awareness training. C. Lack of password protection D. Lack of appropriate data classification Answer: D 6.A core system fails a week after a scheduled update, causing an outage that impacts service. Which of the following is MOST important for incident management to focus on when addressing the issue? A. Analyzing the root cause of the outage to ensure the incident will not reoccur B. Restoring the system to operational state as quickly as possible C. Ensuring all resolution steps are fully documented prior to returning the system to service D. Rolling back the unsuccessful change to the previous state Answer: B 7.Which of the following should be of MOST concern to an IS auditor reviewing the information systems acquisition, development, and implementation process? A. Data owners are not trained on the use of data conversion tools. B. A post-implementation lessons-learned exercise was not conducted. 2 / 22 https://www.dumpsinfo.com/ C. There is no system documentation available for review. D. System deployment is routinely performed by contractors. Answer: B Explanation: It is important for an IS auditor to review the information systems acquisition, development, and implementation process to ensure that it has been performed properly and that any errors or issues have been identified and addressed. A lessons-learned exercise is an important part of this process, as it allows for the identification and rectification of any issues that may have been missed during the initial stages of the process. Without this exercise, any potential issues may go unnoticed and lead to further problems down the line. 8.Which of the following provides the MOST assurance over the completeness and accuracy of loan application processing with respect to the implementation of a new system? A. Comparing code between old and new systems B. Running historical transactions through the new system C. Reviewing quality assurance (QA) procedures D. Loading balance and transaction data to the new system Answer: B 9.As part of business continuity planning, which of the following is MOST important to assess when conducting a business impact analysis (B1A)? A. Risk appetite B. Critical applications m the cloud C. Completeness of critical asset inventory D. Recovery scenarios Answer: C 10.Which of the following fire suppression systems needs to be combined with an automatic switch to shut down the electricity supply in the event of activation? A. Carbon dioxide B. FM-200 C. Dry pipe D. Halon Answer: C 11.Which of the following is a social engineering attack method? A. An unauthorized person attempts to gam access to secure premises by following an authonzed person through a secure door. B. An employee is induced to reveal confidential IP addresses and passwords by answering questions over the phone. C. A hacker walks around an office building using scanning tools to search for a wireless network to gain access. D. An intruder eavesdrops and collects sensitive information flowing through the network and sells it to third parties. Answer: B 12.A system administrator recently informed the IS auditor about the occurrence of several 3 / 22 https://www.dumpsinfo.com/ unsuccessful intrusion attempts from outside the organization. Which of the following is MOST effective in detecting such an intrusion? A. Using smart cards with one-time passwords B. Periodically reviewing log files C. Configuring the router as a firewall D. Installing biometrics-based authentication Answer: C 13.Which of the following demonstrates the use of data analytics for a loan origination process? A. Evaluating whether loan records are included in the batch file and are validated by the servicing system B. Comparing a population of loans input in the origination system to loans booked on the servicing system C. Validating whether reconciliations between the two systems are performed and discrepancies are investigated D. Reviewing error handling controls to notify appropriate personnel in the event of a transmission failure Answer: B 14.Which of the following Is the BEST way to ensure payment transaction data is restricted to the appropriate users? A. Implementing two-factor authentication B. Restricting access to transactions using network security software C. implementing role-based access at the application level D. Using a single menu tor sensitive application transactions Answer: C 15.Which of the following is the BEST reason for an IS auditor to emphasize to management the importance of using an IT governance framework? A. Frameworks enable IT benchmarks against competitors B. Frameworks can be tailored and optimized for different organizations C. Frameworks help facilitate control self assessments (CSAs) D. Frameworks help organizations understand and manage IT risk Answer: B 16.The decision to accept an IT control risk related to data quality should be the responsibility of the: A. information security team. B. IS audit manager. C. chief information officer (CIO). D. business owner. Answer: D 17.Which of the following should be the PRIMARY basis for prioritizing follow-up audits? A. Audit cycledefined in the audit plan B. Complexity of management's action plans C. Recommendation from executive management D. Residual risk from the findings of previous audits 4 / 22 https://www.dumpsinfo.com/ Answer: D 18.Which of the following is the BEST way to enforce the principle of least privilege on a server containing data with different security classifications? A. Limiting access to the data files based on frequency of use B. Obtaining formal agreement by users to comply with the data classification policy C. Applying access controls determined by the data owner D. Using scripted access control lists to prevent unauthorized access to the server Answer: C 19.Which of the following is MOST important for an IS auditor to look for in a project feasibility study? A. An assessment of whether requirements will be fully met B. An assessment indicating security controls will operate effectively C. An assessment of whether the expected benefits can be achieved D. An assessment indicating the benefits will exceed the implement Answer: C 20.Which of the following is the BEST way for an organization to mitigate the risk associated with third- party application performance? A. Ensure the third party allocates adequate resources to meet requirements. B. Use analytics within the internal audit function C. Conduct a capacity planning exercise D. Utilize performance monitoring tools to verify service level agreements (SLAs) Answer: D 21.To develop meaningful recommendations 'or findings, which of the following is MOST important 'or an IS auditor to determine and understand? A. Root cause B. Responsible party C. impact D. Criteria Answer: A 22.A company requires that all program change requests (PCRs) be approved and all modifications be automatically logged. Which of the following IS audit procedures will BEST determine whether unauthorized changes have been made to production programs? A. Trace a sample of complete PCR forms to the log of all program changes B. Use source code comparison software to determine whether any changes have been made to a sample of programs since the last audit date C. Review a sample of PCRs for proper approval throughout the program change process D. Trace a sample of program change from the log to completed PCR forms Answer: D 23.Which of the following findings from an IT governance review should be of GREATEST concern? 5 / 22 https://www.dumpsinfo.com/ A. The IT budget is not monitored B. All IT services are provided by third parties. C. IT value analysis has not been completed. D. IT supports two different operating systems. Answer: C 24.An IS auditor has found that a vendor has gone out of business and the escrow has an older version of the source code. What is the auditor's BEST recommendation for the organization? A. Analyze a new application that moots the current re B. Perform an analysis to determine the business risk C. Bring the escrow version up to date. D. Develop a maintenance plan to support the application using the existing code Answer: C 25.During an external review, an IS auditor observes an inconsistent approach in classifying system criticality within the organization. Which of the following should be recommended as the PRIMARY factor to determine system criticality? A. Key performance indicators (KPIs) B. Maximum allowable downtime (MAD) C. Recovery point objective (RPO) D. Mean time to restore (MTTR) Answer: B 26.Which of the following is the MOST important responsibility of user departments associated with program changes? A. Providing unit test data B. Analyzing change requests C. Updating documentation lo reflect latest changes D. Approving changes before implementation Answer: A 27.An IS auditor is conducting a review of a data center. Which of the following observations could indicate an access control Issue? A. Security cameras deployed outside main entrance B. Antistatic mats deployed at the computer room entrance C. Muddy footprints directly inside the emergency exit D. Fencing around facility is two meters high Answer: C 28.Which of the following provides the MOST useful information to an IS auditor when selecting projects for inclusion in an IT audit plan? A. Project charter B. Project plan C. Project issue log D. Project business case 6 / 22 https://www.dumpsinfo.com/ Answer: D Explanation: The project business case provides the IS auditor with information on the purpose and objectives of the project, the expected costs and benefits of the project, and the possible risks associated with the project. This information can be used to help the IS auditor determine if the project is worth including in the IT audit plan. For more information, please refer to the ISACA CISA Study Guide section 4.12.2.1. 29.An organization is planning to implement a work-from-home policy that allows users to work remotely as needed. Which of the following is the BEST solution for ensuring secure remote access to corporate resources? A. Additional firewall rules B. Multi-factor authentication C. Virtual private network (VPN) D. Virtual desktop Answer: C 30.A characteristic of a digital signature is that it A. is under control of the receiver B. is unique to the message C. is validated when data are changed D. has a reproducible hashing algorithm Answer: B 31.Which of the following is the MOST important reason to implement version control for an end-user computing (EUC) application? A. To ensure that older versions are availability for reference B. To ensure that only the latest approved version of the application is used C. To ensure compatibility different versions of the application D. To ensure that only authorized users can access the application Answer: B 32.Backup procedures for an organization's critical data are considered to be which type of control? A. Directive B. Corrective C. Detective D. Compensating Answer: B 33.Documentation of workaround processes to keep a business function operational during recovery of IT systems is a core part of a: A. business impact analysis (BIA). B. threat and risk assessment. C. business continuity plan (BCP). D. disaster recovery plan (DRP). Answer: C 7 / 22 https://www.dumpsinfo.com/ 34.Which of the following provides the BEST providence that outsourced provider services are being properly managed? A. The service level agreement (SLA) includes penalties for non-performance. B. Adequate action is taken for noncompliance with the service level agreement (SLA). C. The vendor provides historical data to demonstrate its performance. D. Internal performance standards align with corporate strategy. Answer: B 35.During a security audit, an IS auditor is tasked with reviewing log entries obtained from an enterprise intrusion prevention system (IPS). Which type of risk would be associated with the potential for the auditor to miss a sequence of logged events that could indicate an error in the IPS configuration? A. Sampling risk B. Detection risk C. Control risk D. Inherent risk Answer: B 36.Which of the following would be an IS auditor's GREATEST concern when reviewing the early stages of a software development project? A. The lack of technical documentation to support the program code B. The lack of completion of all requirements at the end of each sprint C. The lack of acceptance criteria behind user requirements. D. The lack of a detailed unit and system test plan Answer: C 37.During a review, an IS auditor discovers that corporate users are able to access cloud-based applications and data any Internet-connected web browser. Which Of the following is the auditors BEST recommendation to prevent unauthorized access? A. Implement an intrusion detection system (IDS), B. Update security policies and procedures. C. Implement multi-factor authentication. D. Utilize strong anti-malware controls on all computing devices. Answer: C Explanation: The best recommendation to prevent unauthorized accessin this scenario is to implement multi-factor authentication (MFA). According to the ISACA CISA Study Manual, "MFA is a security technique that requires two or more independent credentials for user authentication. MFA can be used to provide additional security for cloud-based services and applications." Thus, implementing MFA would be an effective way to prevent unauthorized access and maintain a secure environment. Multi-factor authentication (MFA) is a security measure that requires users to provide two or more pieces of evidence to verify their identity before accessing cloud-based applications and data123. MFA can prevent unauthorized access by making it harder for attackers to compromise user credentials or bypass password protection 38.When reviewing an organization's information security policies, an IS auditor should verify that the 8 / 22 https://www.dumpsinfo.com/ policies have been defined PRIMARILY on the basis of: A. a risk management process. B. an information security framework. C. past information security incidents. D. industry best practices. Answer: B 39.During the discussion of a draft audit report IT management provided suitable evidence that a process has been implemented for a control that had been concluded by the IS auditor as ineffective Which of the following is the auditor's BEST action? A. Explain to IT management that the new control will be evaluated during follow-up B. Add comments about the action taken by IT management in the report C. Change the conclusion based on evidence provided by IT management D. Re-perform the audit before changing the conclusion Answer: D 40.Which of the following is the BEST source of information tor an IS auditor to use when determining whether an organization's information security policy is adequate? A. Information security program plans B. Penetration test results C. Risk assessment results D. Industry benchmarks Answer: C 41.Which of the following testing methods is MOST appropriate for assessing whether system integrity has been maintained after changes have been made? A. Regression testing B. Unit testing C. Integration testing D. Acceptance testing Answer: A 42.What would be an IS auditor's BEST recommendation upon finding that a third-party IT service provider hosts the organization's human resources (HR) system in a foreign country? A. Perform background verification checks. B. Review third-party audit reports. C. Implement change management review. D. Conduct a privacy impact analysis. Answer: D 43.Which of the following is the BEST indicator for measuring performance of IT help desk function? A. Percentage of problems raised from incidents B. Mean time to categorize tickets C. Number 0t incidents reported D. Number of reopened tickets Answer: D Explanation: 9 / 22 https://www.dumpsinfo.com/ The number of reopened tickets is a key performance indicator (KPI) that measures how often the IT help desk function fails to resolve the issues or problems reported by the customers on the first attempt123. A high number of reopened tickets indicates poor quality of service, low customer satisfaction, and wasted resources 44.An IS auditor is evaluating the access controls for a shared customer relationship management (CRM) system. Which of the following would be the GREATEST concern? A. Single sign-on is not enabled B. Audit logging is not enabled C. Security baseline is not consistently applied D. Complex passwords are not required Answer: B 45.A programmer has made unauthorized changes lo key fields in a payroll system report. Which of the following control weaknesses would have contributed MOST to this problem? A. The programmer did not involve the user in testing B. The user requirements were not documented C. The programmer has access to the production programs D. Payroll files were not under the control of a librarian Answer: C 46.Which of the following is the BEST source of information for assessing the effectiveness of IT process monitoring? A. Real-time audit software B. Performance data C. Quality assurance (QA) reviews D. Participative management techniques Answer: A 47.When verifying the accuracy and completeness of migrated data for a new application system replacing a legacy system. It is MOST effective for an IS auditor to review; A. data analytics findings. B. audit trails C. acceptance lasting results D. rollback plans Answer: B 48.Which type of attack targets security vulnerabilities in web applications to gain access to data sets? A. Denial of service (DOS) B. SQL injection C. Phishing attacks D. Rootkits Answer: B Explanation: 10 / 22 https://www.dumpsinfo.com/ SQL injection is a type of attack that targets security vulnerabilities in web applications to gain access to data sets. It is accomplished by injecting malicious SQL code into user-supplied data fields, allowing the attacker to gain access to and manipulate the underlying database. In addition to gaining access to data, SQL injection can also be used to modify existing data or even delete it. According to ISACA's Certified Information Systems Auditor (CISA) Study Guide, "SQL injection attacks are the most common type of attack against web applications and databases, and they are a major security concern." 49.Which of the following is the MOST effective way to identify exfiltration of sensitive data by a malicious insider? A. Implement data loss prevention (DLP) software B. Review perimeter firewall logs C. Provide ongoing information security awareness training D. Establish behavioral analytics monitoring Answer: A 50.What should an IS auditor evaluate FIRST when reviewing an organization's response to new privacy legislation? A. Implementation plan for restricting the collection of personal information B. Privacy legislation in other countries that may contain similar requirements C. Operational plan for achieving compliance with the legislation D. Analysis of systems that contain privacy components Answer: D Explanation: This is according to the ISACA's IS Auditing Guideline G14 on Privacy and Data Protection, which states that an IS auditor should first evaluate the organization's ability to identify and assess the systems that contain privacy components, and then review the adequacy of the operational plan for achieving compliance with the legislation. 51.An IS auditor assessing the controls within a newly implemented call center would First A. gather information from the customers regarding response times and quality of service. B. review the manual and automated controls in the call center. C. test the technical infrastructure at the call center. D. evaluate the operational risk associated with the call center. Answer: D 52.An IS auditor who was instrumental in designing an application is called upon to review the application. The auditor should: A. refuse the assignment to avoid conflict of interest. B. use the knowledge of the application to carry out the audit. C. inform audit management of the earlier involvement. D. modify the scope of the audit. Answer: C 53.Which of the following is the BEST way to sanitize a hard disk for reuse to ensure the organization's information cannot be accessed? 11 / 22 https://www.dumpsinfo.com/ A. Re-partitioning B. Degaussing C. Formatting D. Data wiping Answer: D 54.Upon completion of audit work, an IS auditor should: A. provide a report to senior management prior to discussion with the auditee. B. distribute a summary of general findings to the members of the auditing team. C. provide a report to the auditee stating the initial findings. D. review the working papers with the auditee. Answer: B 55.A credit card company has decided to outsource the printing of customer statements It Is MOST important for the company to verify whether: A. the provider has alternate service locations. B. the contract includes compensation for deficient service levels. C. the provider's informationsecurity controls are aligned with the company's. D. the provider adheres to the company's data retention policies. Answer: C 56.An IS auditor is reviewing the release management process for an in-house software development solution. In which environment Is the software version MOST likely to be the same as production? A. Staging B. Testing C. Integration D. Development Answer: B 57.An organization has shifted from a bottom-up approach to a top-down approach in the development of IT policies. This should result in: A. greater consistency across the organization. B. a synthesis of existing operational policies. C. a more comprehensive risk assessment plan. D. greater adherence to best practices. Answer: A Explanation: A top-down approach to the development of IT policies typically involves setting goals at the top and then developing policies to meet those goals. This type of approach results in greater consistency across the organization, as all policies are developed in alignment with the overall goals. Additionally, this approach may result in greater adherence to best practices, as the policies are developed with the organization's long-term goals in mind. It may also result in a synthesis of existing operational policies, as the goals set at the top are used to develop a unified IT policy. Finally, it may also result in a more comprehensive risk assessment plan, as all policies must be evaluated for their potential risks to the organization. 12 / 22 https://www.dumpsinfo.com/ 58.During the implementation of a new system, an IS auditor must assess whether certain automated calculations comply with the regulatory requirements Which of the following is the BEST way to obtain this assurance? A. Review sign-off documentation B. Review the source code related to the calculation C. Re-perform the calculation with audit software D. Inspect user acceptance lest (UAT) results Answer: C 59.Which of the following IT service management activities is MOST likely to help with identifying the root cause of repeated instances of network latency? A. Change management B. Problem management C. incident management D. Configuration management Answer: C 60.Which of the following is the MOST important control for virualized environments? A. Regular updates of policies for the operation of the virtualized environment B. Hardening for the hypervisor and guest machines C. Redundancy of hardware resources and network components D. Monitoring utilization of resources at the guest operating system level Answer: B Explanation: The most important control for virtualized environments is hardening for the hypervisor and guest machines. Hardening the hypervisor and guest machines involves taking measures to ensure that the system is secure and protected from external threats. This includes ensuring that all security patches and updates are applied, that the systems are configured securely, and that only approved applications are allowed to run. Additionally, it is important to ensure that the system is regularly monitored for any malicious activity. For more information, please refer to the ISACA CISA Study Guide section 4.13.4.1. 61.Which of the following is MOST important for an IS auditor to validate when auditing network device management? A. Devices cannot be accessed through service accounts. B. Backup policies include device configuration files. C. All devices have current security patches assessed. D. All devices are located within a protected network segment. Answer: C Explanation: The most important factor for an IS auditor to validate when auditing network device management is C - that all devices have current security patches assessed. This is because security patches are essential for ensuring that devices are protected from the latest threats, and that any vulnerabilities are addressed quickly. While it is important to ensure that devices cannot be accessed through service accounts, have backup policies that include device configuration files, and are located within a protected network segment, these measures do not ensure that devices are protected from the latest threats. 13 / 22 https://www.dumpsinfo.com/ 62.Which of the following would BEST demonstrate that an effective disaster recovery plan (DRP) is in place? A. Frequent testing of backups B. Annual walk-through testing C. Periodic risk assessment D. Full operational test Answer: D 63.An IS auditor has been asked to audit the proposed acquisition of new computer hardware. The auditor’s PRIMARY concern Is that: A. the implementation plan meets user requirements. B. a full, visible audit trail will be Included. C. a dear business case has been established. D. the new hardware meets established security standards Answer: C 64.An IS auditor is reviewing an organization's business continuity plan (BCP) following a change in organizational structure with significant impact to business processes. Which of the following findings should be the auditor's GREATEST concern? A. Key business process end users did not participate in the business impact " analysis (BIA) B. Copies of the BCP have not been distributed to new business unit end users sjnce the reorganization C. A test plan for the BCP has not been completed during the last two years Answer: C 65.Which of the following weaknesses would have the GREATEST impact on the effective operation of a perimeter firewall? A. Use of stateful firewalls with default configuration B. Ad hoc monitoring of firewall activity C. Misconfiguration of the firewall rules D. Potential back doors to the firewall software Answer: C 66.Which of the following is MOST important to consider when developing a service level agreement (SLAP)? A. Description of the services from the viewpoint of the provider B. Detailed identification of work to be completed C. Provisions for regulatory requirements that impact the end users' businesses D. Description of the services from the viewpoint of the client organization Answer: D 67.What is the MAIN reason to use incremental backups? A. To improve key availability metrics B. To reduce costs associates with backups C. To increase backup resiliency and redundancy D. To minimize the backup time and resources Answer: D 14 / 22 https://www.dumpsinfo.com/ 68.During a follow-up audit, an IS auditor finds that senior management has implemented a different remediation action plan than what was previously agreed upon. Which of the following is the auditor's BEST course of action? A. Report the deviation by the control owner in the audit report. B. Evaluate the implemented control to ensure it mitigates the risk to an acceptable level. C. Cancel the follow-up audit and reschedule for the next audit period. D. Request justification from management for not implementing the recommended control. Answer: D Explanation: The auditor should understand the reason for the deviation and evaluate if the new control mitigates the risk to an acceptable level. If necessary, the auditor can report the deviation in the audit report and provide recommendations for improving the process in the future. 69.An IS auditor learns the organization has experienced several server failures in its distributed environment. Which of the following is the BEST recommendation to limit the potential impact of server failures in the future? A. Redundant pathways B. Clustering C. Failover power D. Parallel testing Answer: B 70.An organization has engaged a third party to implement an application to perform business-critical calculations. Which of the following is the MOST important process to help ensure the application provides accurate calculations? A. Key performance indicator (KPI) monitoring B. Change management C. Configuration management D. Quality assurance (QA) Answer: A 71.When an intrusion into an organization network is deleted, which of the following should be done FIRST? A. Block all compromised network nodes. B. Contact law enforcement.C. Notify senior management. D. Identity nodes that have been compromised. Answer: D 72.An IS auditor has completed the fieldwork phase of a network security review and is preparing the initial following findings should be ranked as the HIGHEST risk? A. Network penetration tests are not performed B. The network firewall policy has not been approved by the information security officer. C. Network firewall rules have not been documented. 15 / 22 https://www.dumpsinfo.com/ D. The network device inventory is incomplete. Answer: A 73.Which of the following is MOST important for an IS auditor to determine during the detailed design phase of a system development project? A. Program coding standards have been followed B. Acceptance test criteria have been developed C. Data conversion procedures have been establish. D. The design has been approved by senior management. Answer: B 74.Which of the following is the PRIMARY advantage of using visualization technology for corporate applications? A. Improved disaster recovery B. Better utilization of resources C. Stronger data security D. Increased application performance Answer: A 75.One benefit of return on investment (ROI) analysts in IT decision making is that it provides the: A. basis for allocating indirect costs. B. cost of replacing equipment. C. estimated cost of ownership. D. basis for allocating financial resources. Answer: D 76.An IS auditor is reviewing the installation of a new server. The IS auditor's PRIMARY objective is to ensure that A. security parameters are set in accordance with the manufacturer s standards. B. a detailed business case was formally approved prior to the purchase. C. security parameters are set in accordance with the organization's policies. D. the procurement project invited lenders from at least three different suppliers. Answer: C 77.Which of the following is MOST important with regard to an application development acceptance test? A. The programming team is involved in the testing process. B. All data files are tested for valid information before conversion. C. User management approves the test design before the test is started. D. The quality assurance (QA) team is in charge of the testing process. Answer: B 78.An IS auditor concludes that an organization has a quality security policy. Which of the following is MOST important to determine next? The policy must be: A. well understand by all employees. B. based on industry standards. 16 / 22 https://www.dumpsinfo.com/ C. developed by process owners. D. updated frequently. Answer: A 79.Which of the following will BEST ensure that a proper cutoff has been established to reinstate transactions and records to their condition just prior to a computer system failure? A. Rotating backup copies of transaction files offsite B. Using a database management system (DBMS) to dynamically back-out partially processed transactions C. Maintaining system console logs in electronic formal D. Ensuring bisynchronous capabilities on all transmission lines Answer: D 80.In which phase of penetration testing would host detection and domain name system (DNS) interrogation be performed? A. Discovery B. Attacks C. Planning D. Reporting Answer: A 81.Following a security breach in which a hacker exploited a well-known vulnerability in the domain controller, an IS audit has been asked to conduct a control assessment. the auditor's BEST course of action would be to determine if: A. the patches were updated. B. The logs were monitored. C. The network traffic was being monitored. D. The domain controller was classified for high availability. Answer: A 82.Which of the following provides an IS auditor assurance that the interface between a point-of-sale (POS) system and the general ledger is transferring sales data completely and accurately? A. Electronic copies of customer sales receipts are maintained. B. Monthly bank statements are reconciled without exception. C. Nightly batch processing has been replaced with real-time processing. D. The data transferred over the POS interface is encrypted. Answer: A Explanation: Electronic copies of customer sales receipts are records that show the details of each sales transaction, such as the date, time, amount, item, and payment method12. Electronic copies of customer sales receipts can provide an IS auditor assurance that the interface between a point-of- sale (POS) system and the general ledger is transferring sales data completely and accurately, because: ? Electronic copies of customer sales receipts can be used to verify and reconcile the sales data that is captured by the POS system and posted to the general ledger12. ? Electronic copies of customer sales receipts can be used to detect and correct any errors, discrepancies, or frauds that may occur during the data transfer process12. ? Electronic copies of customer sales receipts can be used to comply with accounting standards, tax 17 / 22 https://www.dumpsinfo.com/ regulations, and audit requirements12. 83.Which of the following application input controls would MOST likely detect data input errors in the customer account number field during the processing of an accounts receivable transaction? A. Limit check B. Parity check C. Reasonableness check D. Validity check Answer: C 84.1.An IS auditor is examining a front-end subledger and a main ledger. Which of the following would be the GREATEST concern if there are flaws in the mapping of accounts between the two systems? A. Double-posting of a single journal entry B. Inability to support new business transactions C. Unauthorized alteration of account attributes D. Inaccuracy of financial reporting Answer: D 85.Which of the following would be of GREATEST concern to an IS auditor reviewing an IT strategy document? A. Target architecture is defined at a technical level. B. The previous year's IT strategic goals were not achieved. C. Strategic IT goals are derived solely from the latest market trends. D. Financial estimates of new initiatives are disclosed within the document. Answer: B Explanation: This is because it is important to ensure that the organization's IT strategy is in line with its overall business strategy, and that the IT goals are well-defined and achievable. If the previous year's goals were not achieved, this indicates that the organization is not properly assessing its IT goals, or that the goals are not realistic or achievable. References: [1] ISACA - Certified Information Systems Auditor (CISA) - https://www.isaca.org/certification/cisa [2] CISA Exam - ISACA - https://www.isaca.org/credentialing/cisa-certification/cisa-exam [3] Certified Information Systems Auditor (CISA) Certification - https://www.isaca.org/credentialing/cisa-certification [4] 5 Reasons to Pursue the CISA Certification - https://blog.udemy.com/cisa-certification/ [5] Certified Information Systems Auditor (CISA) Certification - https://www.isaca.org/credentialing/cisa-certification 86.Which of the following is the MOST effective method of destroying sensitive data stored on electronic media? A. Degaussing B. Random character overwrite C. Physical destruction D. Low-level formatting Answer: B 18 / 22 https://www.dumpsinfo.com/ 87.Which of the following is MOST important to consider when reviewing an organization's defined data backup and restoration procedures? A. Business continuity plan (BCP) B. Recovery point objective (RPO) C. Mean time to restore (MTTR) D. Mean time between failures (MTBF) Answer: B Explanation: The recovery point objective (RPO) is the maximum amount of time that can elapse between the last successful backup and the time of restoration in the event of a data loss incident. When reviewing an organization's defined data backup and restoration procedures, it is important to consider the RPO to ensure that the organization is able to restore data up to the most recent successful backup. 88.An IS auditor is reviewinglogical access controls for an organization's financial business application Which of the following findings should be of GREATEST concern to the auditor? A. Users are not required to change their passwords on a regular basis B. Management does not review application user activity logs C. User accounts are shared between users D. Password length is set to eight characters Answer: C 89.Which of the following provides the BEST assurance of data integrity after file transfers? A. Check digits B. Monetary unit sampling C. Hash values D. Reasonableness check Answer: C 90.Which of the following should be of GREATEST concern to an IS auditor performing a review of information security controls? A. The information security policy has not been approved by the chief audit executive (CAE). B. The information security policy does not include mobile device provisions C. The information security policy is not frequently reviewed D. The information security policy has not been approved by the policy owner Answer: D 91.Which of the following is the MOST important prerequisite for the protection of physical information assets in a data center? A. Segregation of duties between staff ordering and staff receiving information assets B. Complete and accurate list of information assets that have been deployed C. Availability and testing of onsite backup generators D. Knowledge of the IT staff regarding data protection requirements Answer: B 92.During an audit which of the following would be MOST helpful in establishing a baseline for measuring data quality? 19 / 22 https://www.dumpsinfo.com/ A. Input from customers B. Industry standard business definitions C. Validation of rules by the business D. Built-in data error prevention application controls Answer: C 93.An IS auditor is performing a follow-up audit for findings identified in an organization's user provisioning process. Which of the following is the MOST appropriate population to sample from when testing for remediation? A. All users provisioned after the finding was originally identified B. All users provisioned after management resolved the audit issue C. All users provisioned after the final audit report was issued D. All users who have followed user provisioning processes provided by management Answer: C 94.Which of the following is an advantage of using agile software development methodology over the waterfall methodology? A. Less funding required overall B. Quicker deliverables C. Quicker end user acceptance D. Clearly defined business expectations Answer: B 95.Which of the following would be an appropriate role of internal audit in helping to establish an organization’s privacy program? A. Analyzing risks posed by new regulations B. Developing procedures to monitor the use of personal data C. Defining roles within the organization related to privacy D. Designing controls to protect personal data Answer: A 96.An IS auditor notes that IT and the business have different opinions on the availability of their application servers. Which of the following should the IS auditor review FIRST in order to understand the problem? A. The exact definition of the service levels and their measurement B. The alerting and measurement process on the application servers C. The actual availability of the servers as part of a substantive test D. The regular performance-reporting documentation Answer: A 97.Due to system limitations, segregation of duties (SoD) cannot be enforced in an accounts payable system. Which of the following is the IS auditor's BEST recommendation for a compensating control? A. Require written authorization for all payment transactions B. Restrict payment authorization to senior staff members. C. Reconcile payment transactions with invoices. 20 / 22 https://www.dumpsinfo.com/ D. Review payment transaction history Answer: A 98.An organization outsourced its IS functions To meet its responsibility for disaster recovery, the organization should: A. discontinue maintenance of the disaster recovery plan (DRP> B. coordinate disaster recovery administration with the outsourcing vendor C. delegate evaluation of disaster recovery to a third party D. delegate evaluation of disaster recovery to internal audit Answer: B 99.A new system is being developed by a vendor for a consumer service organization. The vendor will provide its proprietary software once system development is completed. Which of the following is the MOST important requirement to include In the vendor contract to ensure continuity? A. Continuous 24/7 support must be available. B. The vendor must have a documented disaster recovery plan (DRP) in place. C. Source code for the software must be placed in escrow. D. The vendor must train the organization's staff to manage the new software Answer: C 100.An organization's IT risk assessment should include the identification of: A. vulnerabilities B. compensating controls C. business needs D. business process owners Answer: A 101.During the discussion of a draft audit report. IT management provided suitable evidence fiat a process has been implemented for a control that had been concluded by the IS auditor as Ineffective. Which of the following is the auditor's BEST action? A. Explain to IT management that the new control will be evaluated during follow-up B. Re-perform the audit before changing the conclusion. C. Change the conclusion based on evidence provided by IT management. D. Add comments about the action taken by IT management in the report. Answer: B 102.Which of the following should be identified FIRST during the risk assessment process? A. Vulnerability to threats B. Existing controls C. Information assets D. Legal requirements Answer: C Explanation: Based on the information provided, the first step in the risk assessment process should be to identify C: Information assets. Information assets are the most important component of the risk assessment process, as they are the basis for assessing the potential risks to the organization. Identifying 21 / 22 https://www.dumpsinfo.com/ information assets allows the auditor to assess the value and criticality of the assets and determine the level of risk associated with them. Once the information assets have been identified, the auditor can then move on to assess the vulnerability of the assets to threats, evaluate existing controls, and consider any relevant legal requirements. 103.An IT governance body wants to determine whether IT service delivery is based on consistently effective processes. Which of the following is the BEST approach? A. implement a control self-assessment (CSA) B. Conduct a gap analysis C. Develop a maturity model D. Evaluate key performance indicators (KPIs) Answer: D 104.When assessing the overall effectiveness of an organization's disaster recovery planning process, which of the following is MOST important for the IS auditor to verify? A. Management contracts with a third party for warm site services. B. Management schedules an annual tabletop exercise. C. Management documents and distributes a copy of the plan to all personnel. D. Management reviews and updates the plan annually or as changes occur. Answer: D Powered by TCPDF (www.tcpdf.org) 22 / 22 https://www.dumpsinfo.com/ http://www.tcpdf.org