DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

Ace CISA Certification Exam Questions & Study Resources, Certified Information Systems Auditor | SPOTO

Ace your CISA Certification Exam with SPOTO's comprehensive study resources! Our practice tests, exam questions, and mock exams mirror the real CISA exam, ensuring you're fully prepared. Gain access to a vast library of exam materials, including sample questions, exam answers, and free test dumps. Our exam simulator replicates the actual testing environment, helping you familiarize yourself with the format and timing. Stay ahead of the curve with our regularly updated exam questions and answers. Unlock your CISA potential and showcase your auditing prowess with SPOTO's expert exam preparation tools. Keywords: exam questions, sample questions, exam materials, practice tests, exam answers, exam dumps, exam simulator.
Take other online exams

Question #1
An organization can ensure that the recipients of e-mails from its employees can authenticate the identity of the sender by:
A. digitally signing all e-mail messages
B. encrypting all e-mail messages
C. compressing all e-mail messages
D. password protecting all e-mail messages
View answer
Correct Answer: B

View The Updated CISA Exam Questions

SPOTO Provides 100% Real CISA Exam Questions for You to Pass Your CISA Exam!

Question #2
An IS auditor is reviewing the remote access methods of a company used to access system remotely. Which of the following is LEAST preferred remote access method from a security and control point of view?
A. RADIUS
B. TACACS
C. DIAL-UP
D. DIAMETER
View answer
Correct Answer: D
Question #3
Which of the following is a reason for implementing a decentralized IT governance model?
A. Standardized controls and economies of scale
B. IT synergy among business units
C. Greater consistency among business units
D. Greater responsiveness to business needs
View answer
Correct Answer: B
Question #4
Which of the following is the MOST effective control when granting temporary access to vendors?
A. Vendor access corresponds to the service level agreement (SLA)
B. User accounts are created with expiration dates and are based on services provided
C. Administrator access is provided for a limited period
D. User IDs are deleted when the work is completed
View answer
Correct Answer: C
Question #5
Which of the following is an advantage of asymmetric crypto system over symmetric key crypto system?
A. Performance and Speed
B. Key Management is built in
C. Adequate for Bulk encryption
D. Number of keys grows very quickly
View answer
Correct Answer: A
Question #6
Change management procedures are established by IS management to:
A. control the movement of applications from the test environment to the production environment
B. control the interruption of business operations from lack of attention to unresolved problems
C. ensure the uninterrupted operation of the business in the event of a disaster
D. verify that system changes are properly documented
View answer
Correct Answer: B
Question #7
Although BCP and DRP are often implemented and tested by middle management and end users, the ultimate responsibility and accountability for the plans remain with executive management, such as the _______________________. (fill-in-the-blank)
A. Security administrator
B. Systems auditor
C. Board of directors
D. Financial auditor
View answer
Correct Answer: A
Question #8
Which of the following is an oft-cited cause of vulnerability of networks?
A. software monoculture
B. software diversification
C. single line of defense
D. multiple DMZ
E. None of the choices
View answer
Correct Answer: E
Question #9
Pretexting is an act of:
A. DoS
B. social engineering
C. eavedropping
D. soft coding
E. hard coding
F. None of the choices
View answer
Correct Answer: E
Question #10
What is the best defense against Distributed DoS Attack?
A. patch your systems
B. run a virus checker
C. run an anti-spy software
D. find the DoS program and kill it
E. None of the choices
View answer
Correct Answer: A
Question #11
An organization currently using tape backups takes one full backup weekly and incremental backups daily. They recently augmented their tape backup procedures with a backup-to- disk solution. This is appropriate because:
A. fast synthetic backups for offsite storage are supported
B. backup to disk is always significantly faster than backup to tape
C. tape libraries are no longer needed
D. data storage on disks is more reliable than on tapes
View answer
Correct Answer: A
Question #12
While planning a review of IT governance, the IS auditor is MOST likely to:
A. examine audit committee minutes for IS-related matters and their control
B. obtain information about the framework of control adopted by management
C. assess whether business process owner responsibilities are consistent across the organization
D. review compliance with policies and procedures issued by the board of directors
View answer
Correct Answer: D
Question #13
Distributed denial-of-service (DDOS) attacks on Internet sites are typically evoked by hackers using which of the following?
A. Logic bombs
B. Phishing
C. Spyware
D. Trojan horses
View answer
Correct Answer: C
Question #14
The selection of security controls is PRIMARILY linked to:
A. risk appetite of the organization
B. regulatory requirements
C. business impact assessment
D. best practices of similar organizations
View answer
Correct Answer: A
Question #15
An offsite information processing facility:
A. should have the same amount of physical access restrictions as the primary processing site
B. should be easily identified from the outside so that, in the event of an emergency, it can be easily found
C. should be located in proximity to the originating site, so it can quickly be made operational
D. need not have the same level of environmental monitoring as the originating site
View answer
Correct Answer: B
Question #16
Java applets and ActiveX controls are distributed executable programs that execute in the background of a web browser client. This practice is considered reasonable when:
A. a firewall exists
B. a secure web connection is used
C. the source of the executable file is certain
D. the host web site is part of the organization
View answer
Correct Answer: B
Question #17
Which of the following terms is used more generally for describing concealment routines in a malicious program?
A. virus
B. worm
C. trojan horse
D. spyware
E. rootkits
F. backdoor
G. None of the choices
View answer
Correct Answer: C
Question #18
Which of the following is a standard secure email protection protocol?
A. S/MIME
B. SSH
C. SET
D. S/HTTP
View answer
Correct Answer: D
Question #19
The sophistication and formality of IS audit programs may vary significantly depending on which of the following factors?
A. the target's management hands-on involvement
B. the target's location
C. the target's size and complexity
D. the target's budget
E. the target's head count
F. None of the choices
View answer
Correct Answer: A
Question #20
To develop a robust data security program, the FIRST course of action should be to:
A. implement monitoring controls
B. implement data loss prevention controls
C. perform an inventory of assets
D. interview IT senior management
View answer
Correct Answer: C
Question #21
In a client-server architecture, a domain name service (DNS) is MOST important because it provides the:
A. address of the domain server
B. resolution service for the name/address
C. IP addresses for the internet
D. domain name system
View answer
Correct Answer: B
Question #22
The GREATEST risk posed by an improperly implemented intrusion prevention system (IPS) is:
A. that there will be too many alerts for system administrators to verify
B. decreased network performance due to IPS traffic
C. the blocking of critical systems or services due to false triggers
D. reliance on specialized expertise within the IT organization
View answer
Correct Answer: A
Question #23
A LAN administrator normally would be restricted from:
A. having end-user responsibilities
B. reporting to the end-user manager
C. having programming responsibilities
D. being responsible for LAN security administration
View answer
Correct Answer: A
Question #24
An IS auditor should review the configuration of which of the following protocols to detect unauthorized mappings between the IP address and the media access control (MAC) address?
A. Simple Object Access Protocol (SOAP)
B. Address Resolution Protocol (ARP)
C. Routing Information Protocol (RIP)
D. Transmission Control Protocol (TCP)
View answer
Correct Answer: A
Question #25
An IS auditor’s PRIMARY concern about a business partner agreement for the exchange of electronic information should be to determine whether there is:
A. a clause that addresses the audit of shared systems
B. evidence of review and approval by each partner’s legal department
C. an information classification framework
D. appropriate control and responsibility defined for each partner
View answer
Correct Answer: D
Question #26
An IS auditor is reviewing documentation of application systems change control and identifies several patches that were not tested before being put into production. Which of the following is the MOST significant risk from this situation?
A. Developer access to production
B. Lack of system integrity
C. Outdated system documentation
D. Loss of application support
View answer
Correct Answer: B
Question #27
Assuming this diagram represents an internal facility and the organization is implementing a firewall protection program, where should firewalls be installed?
A. No firewalls are needed
B. Op-3 location only
C. MIS (Global) and NAT2
D. SMTP Gateway and op-3
View answer
Correct Answer: A
Question #28
Which of the following is the MOST beneficial outcome of testing an incident response plan?
A. The plan is enhanced to reflect the findings of the test
B. Test plan results are documented
C. Incident response time is improved
D. The response includes escalation to senior management
View answer
Correct Answer: B
Question #29
The activation of an enterprise's business continuity plan should be based on predetermined criteria that address the:
A. duration of the outage
B. type of outage
C. probability of the outage
D. cause of the outage
View answer
Correct Answer: B
Question #30
From a control perspective, the PRIMARY objective of classifying information assets is to:
A. establish guidelines for the level of access controls that should be assigned
B. ensure access controls are assigned to all information assets
C. assist management and auditors in risk assessment
D. identify which assets need to be insured against losses
View answer
Correct Answer: A
Question #31
Which of the following is necessary to determine what would constitute a disaster for an organization?
A. Backup strategy analysis
B. Threat probability analysis
C. Risk analysis
D. Recovery strategy analysis
View answer
Correct Answer: C
Question #32
Phishing attack works primarily through:
A. email and hyperlinks
B. SMS
C. chat
D. email attachment
E. news
F. file download
G. None of the choices
View answer
Correct Answer: D
Question #33
Which of the following is a PRIMARY security responsibility of an information owner?
A. Determining the controls associated with information classification
B. Testing information classification controls
C. Maintaining the integrity of data in the information systems
D. Deciding what level of classification the information requires
View answer
Correct Answer: C
Question #34
After threats to a data center are identified, an IS auditor would expect management to FIRST:
A. recommend required actions to executive management
B. discuss risk management practices with neighboring firms
C. implement procedures to address all identified threats
D. establish and quantify the potential effects if each threat occurs
View answer
Correct Answer: D
Question #35
What is the BEST action to prevent loss of data integrity or confidentiality in the case of an e- commerce application running on a LAN, processing electronic fund transfers (EFT) and orders?
A. Using virtual private network (VPN) tunnels for data transfer
B. Enabling data encryption within the application
C. Auditing the access control to the network
D. Logging all changes to access lists
View answer
Correct Answer: D
Question #36
ALL computer programming languages are vulnerable to command injection attack.
A. True
B. False
View answer
Correct Answer: C
Question #37
Iptables is based on which of the following frameworks?
A. Netfilter
B. NetDoom
C. NetCheck
D. NetSecure
E. None of the choices
View answer
Correct Answer: A
Question #38
Relatively speaking, firewalls operated at the application level of the seven layer OSI model are: D.
A. almost always less efficient
B. almost always less effective
C. almost always less secure
E. None of the choices
View answer
Correct Answer: B
Question #39
During a review of information security procedures for disabling user accounts, an IS auditor discovers that IT is only disabling network access for terminated employees. IT management maintains if terminated users cannot access the network, they will not be able to access any applications. Which of the following is the GREATEST risk associated with application access?
A. Unauthorized access to data
B. Inability to access data
C. Lack of segregation of duties
D. Loss of non-repudiation
View answer
Correct Answer: A
Question #40
In an organization that has a staff-rotation policy, the MOST appropriate access control model is:
A. role based
B. discretionary
C. mandatory
D. lattice based
View answer
Correct Answer: A
Question #41
As part of the IEEE 802.11 standard ratified in September 1999, WEP uses the CRC- 32 checksum for:
A. integrity
B. validity
C. accuracy
D. confidentiality
E. None of the choices
View answer
Correct Answer: S
Question #42
Which of the following is a good control for protecting confidential data residing on a PC?
A. Personal firewall
B. File encapsulation
C. File encryption
D. Host-based intrusion detection
View answer
Correct Answer: A
Question #43
An organization has outsourced its data leakage monitoring to an Internet service provider (ISP). Which of the following is the BEST way for an IS auditor to determine the effectiveness of this service?
A. Verify the ISP has staff to deal with data leakage
B. Review the ISP’s external audit report
C. Review the data leakage clause in the SLA
D. Simulate a data leakage incident
View answer
Correct Answer: B
Question #44
In addition to the backup considerations for all systems, which of the following is an important consideration in providing backup for online systems?
A. Maintaining system software parameters
B. Ensuring periodic dumps of transaction logs
C. Ensuring grandfather-father-son file backups
D. Maintaining important data at an offsite location
View answer
Correct Answer: D
Question #45
Which of the following protocols would be involved in the implementation of a router and an interconnectivity device monitoring system?
A. Simple Network Management Protocol
B. File Transfer Protocol
C. Simple Mail Transfer Protocol
D. Telnet
View answer
Correct Answer: D
Question #46
A medium-sized organization, whose IT disaster recovery measures have been in place and regularly tested for years, has just developed a formal business continuity plan (BCP). A basic BCP tabletop exercise has been performed successfully. Which testing should an IS auditor recommend be performed NEXT to verify the adequacy of the new BCP?
A. Full-scale test with relocation of all departments, including IT, to the contingency site
B. Walk-through test of a series of predefined scenarios with all critical personnel involved
C. IT disaster recovery test with business departments involved in testing the critical applications
D. Functional test of a scenario with limited IT involvement
View answer
Correct Answer: B
Question #47
Which of the following should be an IS auditor’s PRIMARY focus when developing a risk-based IS audit program?
A. Business plans
B. Business processes
C. IT strategic plans
D. Portfolio management
View answer
Correct Answer: D
Question #48
The Trojan.Linux.JBellz Trojan horse runs as a malformed file of what format?
A. e-mails
B. MP3
C. MS Office
D. Word template
E. None of the choices
View answer
Correct Answer: A
Question #49
Which of the following is the MOST effective control to minimize the risk of cross-site scripting (XSS)?
A. Periodic vulnerability assessments
B. Secure coding practices
C. Network intrusion prevention system
D. Web firewall policy
View answer
Correct Answer: D
Question #50
Use of asymmetric encryption in an internet e-commerce site, where there is one private key for the hosting server and the public key is widely distributed to the customers, is MOST likely to provide comfort to the:
A. customer over the authenticity of the hosting organization
B. hosting organization over the authenticity of the customer
C. customer over the confidentiality of messages from the hosting organization
D. hosting organization over the confidentiality of messages passed to the customer
View answer
Correct Answer: B
Question #51
Effective transactional controls are often capable of offering which of the following benefits (Choose four.):
A. reduced administrative and material costs
B. shortened contract cycle times
C. enhanced procurement decisions
D. diminished legal risk
E. None of the choices
View answer
Correct Answer: A
Question #52
Which of the following statement correctly describes the difference between total flooding and local application extinguishing agent?
A. The local application design contain physical barrier enclosing the fire space where as physical barrier is not present in total flooding extinguisher
B. The total flooding design contain physical barrier enclosing the fire space where as physical barrier is not present in local application design extinguisher
C. The physical barrier enclosing fire space is not present in total flooding and local application extinguisher agent
D. The physical barrier enclosing fire space is present in total flooding and local application extinguisher agent
View answer
Correct Answer: D
Question #53
The use of digital signatures:
A. requires the use of a one-time password generator
B. provides encryption to a message
C. validates the source of a message
D. ensures message confidentiality
View answer
Correct Answer: C
Question #54
Which of the following will BEST provide an organization with ongoing assurance of the information security services provided by a cloud provider?
A. Continuous monitoring of an information security risk profile
B. Evaluating the provider’s security incident response plan
C. Requiring periodic self-assessment by the provider
D. Ensuring the provider’s roles and responsibilities are established
View answer
Correct Answer: D
Question #55
Which of the following is used to evaluate biometric access controls?
A. FAR
B. EER
C. ERR
D. FRR
View answer
Correct Answer: C
Question #56
Which of the following IS functions can be performed by the same group or individual while still providing the proper segregation of duties?
A. Computer operations and application programming
B. Database administration and computer operations
C. Security administration and application programming
D. Application programming and systems analysis
View answer
Correct Answer: D
Question #57
To prevent IP spoofing attacks, a firewall should be configured to drop a packet if:
A. the source routing field is enabled
B. it has a broadcast address in the destination field
C. a reset flag (RST) is turned on for the TCP connection
D. dynamic routing is used instead of static routing
View answer
Correct Answer: B
Question #58
IS management is considering a Voice-over Internet Protocol (VoIP) network to reduce telecommunication costs and management asked the IS auditor to comment on appropriate security controls. Which of the following security measures is MOST appropriate?
A. Review and, where necessary, upgrade firewall capabilities
B. Install modems to allow remote maintenance support access
C. Create a physically distinct network to handle VoIP traffic
D. Redirect all VoIP traffic to allow clear text logging of authentication credentials
View answer
Correct Answer: B
Question #59
Which of the following are valid choices for the Apache/SSL combination (Choose three.):
A. the Apache-SSL project
B. third-party SSL patches
C. the mod_ssl module
D. the mod_css module
E. None of the choices
View answer
Correct Answer: A
Question #60
Which of the following is MOST effective against system intrusions?
A. Continuous monitoring
B. Layered protection
C. Penetration testing
D. Two-factor authentication
View answer
Correct Answer: D
Question #61
An organization has created a policy that defines the types of web sites that users are forbidden to access. What is the MOST effective technology to enforce this policy?
A. Stateful inspection firewall
B. Web content filter
C. Web cache server
D. Proxy server
View answer
Correct Answer: C
Question #62
In planning a major system development project, function point analysis would assist in:
A. estimating the elapsed time of the project
B. estimating the size of a system development task
C. analyzing the functions undertaken by system users as an aid to job redesign
D. determining the business functions undertaken by a system or program
View answer
Correct Answer: C
Question #63
An information security risk analysis BEST assists an organization in ensuring that:
A. cost-effective decisions are made with regard to which assets need protection
B. the organization implements appropriate security technologies
C. the infrastructure has the appropriate level of access control
D. an appropriate level of funding is applied to security processes
View answer
Correct Answer: B
Question #64
Which of the following would provide the BEST justification for a new information security investment?
A. Defined key performance indicators (KPIs)
B. Projected reduction in risk
C. Results of a comprehensive threat analysis
D. Senior management involvement in project prioritization
View answer
Correct Answer: D
Question #65
Which of the following processes should an IS auditor recommend to assist in the recording of baselines for software releases?
A. Change management
B. Backup and recovery
C. incident management
D. Configuration management
View answer
Correct Answer: A
Question #66
When conducting a post-implementation review, which of the following is the BEST way to determine whether the value from an IT project has been achieved?
A. Calculated the return on investment (ROI)
B. Interview stakeholders
C. Conduct an earned value analysis (EVA)
D. Survey end users
View answer
Correct Answer: A
Question #67
A firewall is being deployed at a new location. Which of the following is the MOST important factor in ensuring a successful deployment?
A. Reviewing logs frequently
B. Testing and validating the rules
C. Training a local administrator at the new location
D. Sharing firewall administrative duties
View answer
Correct Answer: B
Question #68
A PRIMARY benefit derived from an organization employing control self-assessment (CSA) techniques is that it:
A. can identify high-risk areas that might need a detailed review later
B. allows IS auditors to independently assess risk
C. can be used as a replacement for traditional audits
D. allows management to relinquish responsibility for control
View answer
Correct Answer: B
Question #69
Passwords should be:
A. assigned by the security administrator for first time logon
B. changed every 30 days at the discretion of the user
C. reused often to ensure the user does not forget the password
D. displayed on the screen so that the user can ensure that it has been entered properly
View answer
Correct Answer: C
Question #70
Before a failover test of a critical business application is performed, it is MOST important for the information security manager to:
A. obtain a signed risk acceptation from the recovery team
B. obtain senior management’s approval
C. inform the users that the test is taking place
D. verify that the information assets have been classified properly
View answer
Correct Answer: A
Question #71
When developing a business continuity plan (BCP), which of the following should be performed FIRST?
A. Develop business continuity training
B. Classify operations
C. Conduct a business impact analysis (BIA)
D. Establish a disaster recovery plan (DRP)
View answer
Correct Answer: A
Question #72
When preventive controls to appropriately mitigate risk are not feasible, which of the following is the MOST important action for the information security manager to perform?
A. Identity unacceptable risk levels
B. Manage the impact
C. Evaluate potential threats
D. Assess vulnerabilities
View answer
Correct Answer: B
Question #73
Which of the following would be the PRIMARY benefit of replacing physical keys with an electronic entry system for a data center?
A. Creates an audit trail
B. Enables data mining
C. Ensures compliance
D. Reduces cost
View answer
Correct Answer: A
Question #74
Which of the following is a feature of Wi-Fi Protected Access (WPA) in wireless networks?
A. Session keys are dynamic
B. Private symmetric keys are used
C. Keys are static and shared
D. Source addresses are not encrypted or authenticated
View answer
Correct Answer: D
Question #75
Which of the following is the MOST important action in recovering from a cyberattack?
A. Creation of an incident response team
B. Use of cyber forensic investigators
C. Execution of a business continuity plan
D. Filling an insurance claim
View answer
Correct Answer: C
Question #76
The business owner’s approval of software changes being moved into production is PRIMARILY necessary to:
A. ensure that an application functionality requirement is satisfied
B. prevent unauthorized access to data
C. inform management of deployments of new functionality
D. confirm there is a process to control system changes
View answer
Correct Answer: C
Question #77
Which of the following is the FIRST step in initiating a data classification program?
A. Risk appetite assessment
B. Inventory of data assets
C. Assignment of data ownership
D. Assignment of sensitivity levels
View answer
Correct Answer: A
Question #78
Users are issued security tokens to be used in combination with a PIN to access the corporate virtual private network (VPN). Regarding the PIN, what is the MOST important rule to be included in a security policy?
A. Users should not leave tokens where they could be stolen
B. Users must never keep the token in the same bag as their laptop computer
C. Users should select a PIN that is completely random, with no repeating digits
D. Users should never write down their PIN
View answer
Correct Answer: D
Question #79
In a botnet, mailbot logs into a particular type of system for making coordinated attack attempts. What type of system is this?
A. Chat system
B. SMS system
C. Email system
D. Log system
E. Kernel system
F. None of the choices
View answer
Correct Answer: B
Question #80
Which of the following would BEST support a business case to implement a data leakage prevention (DLP) solution?
A. An unusual upward trend in outbound email volume
B. Lack of visibility into previous data leakage incidents
C. Industry benchmark of DLP investments
D. A risk assessment on the threat of data leakage
View answer
Correct Answer: B
Question #81
In a security server audit, focus should be placed on (Choose two.):
A. proper segregation of duties
B. adequate user training
C. continuous and accurate audit trail
D. proper application licensing
E. system stability
F. performance and controls of the system
G. None of the choices
View answer
Correct Answer: A
Question #82
A successful risk-based IT audit program should be based on:
A. an effective scoring system
B. an effective PERT diagram
C. an effective departmental brainstorm session
D. an effective organization-wide brainstorm session
E. an effective yearly budget
F. None of the choices
View answer
Correct Answer: B
Question #83
When reviewing a digital certificate verification process, which of the following findings represents the MOST significant risk?
A. There is no registration authority (RA) for reporting key compromises
B. The certificate revocation list(CRL) is not current
C. Digital certificates contain a public key that is used to encrypt messages and verify digital signatures
D. Subscribers report key compromises to the certificate authority (CA)
View answer
Correct Answer: B
Question #84
Which of the following would be the GREATEST concern to an IS auditor reviewing a critical spreadsheet during a financial audit?
A. Periodic access reviews are manually performed
B. Changes to the file are not always documented
C. Access requests are manually processed
D. A copy current validated file is not available
View answer
Correct Answer: D
Question #85
Which of the following encryption methods uses a matching pair of key-codes, securely distributed, which are used once-and-only-once to encode and decode a single message?
A. Blowfish
B. Tripwire
C. certificate
D. DES
E. one-time pad
F. None of the choices
View answer
Correct Answer: D
Question #86
Which of the following is the MOST effective way for an organization to protect against data leakage?
A. Conduct periodic security awareness training
B. Limit employee Internet access
C. Review firewall logs for anomalies
D. Develop a comprehensive data loss prevention policy
View answer
Correct Answer: B
Question #87
Which of the following option INCORRECTLY describes PBX feature?
A. Voice mail -Stores messages centrally and – by using a password – allows for retrieval from inside or outside lines
B. Tenanting-Provides for the possibility to break into a busy line to inform another user an important message
C. Automatic Call Distribution - Allows a PBX to be configured so that incoming calls are distributed to the next available agent or placed on-hold until one become available
D. Diagnostics -Allows for bypassing normal call restriction procedures
View answer
Correct Answer: A
Question #88
Which of the following antivirus software implementation strategies would be the MOST effective in an interconnected corporate network?
A. Server antivirus software
B. Virus walls
C. Workstation antivirus software
D. Virus signature updating
View answer
Correct Answer: A
Question #89
The potential for unauthorized system access by way of terminals or workstations within an organization's facility is increased when:
A. connecting points are available in the facility to connect laptops to the network
B. users take precautions to keep their passwords confidential
C. terminals with password protection are located in insecure locations
D. terminals are located within the facility in small clusters under the supervision of an administrator
View answer
Correct Answer: C
Question #90
Which of the following is the MOST important objective of data protection?
A. identifying persons who need access to information Explanation Explanation/Reference: Explanation:
B. Ensuring the integrity of information
C. Denying or authorizing access to the IS system
D. Monitoring logical accesses
View answer
Correct Answer: D
Question #91
Organization A has a Software as a Service Agreement (SaaS) with Organization
B. The software is vital to Organization
A. Which of the following would provide the GREATEST assurance that the application can be recovered in the event of a disaster?
A. Organization B is responsible for disaster recovery and held accountable for interruption of service
B. Organization A has a source code escrow agreement and hardware procurement provisions for disaster recovery purposes
C. Organization B has a disaster recovery plan included in its contract and allows oversight by Organization
A.
D. Organization A buys disaster insurance to recuperate losses in the event of a disaster
View answer
Correct Answer: B
Question #92
Common implementations of strong authentication may use which of the following factors in their authentication efforts (Choose three.):
A. 'something you know'
B. 'something you have'
C. 'something you are'
D. 'something you have done in the past on this same system'
E. 'something you have installed on this same system'
F. None of the choices
View answer
Correct Answer: ABC
Question #93
Which of the following is the BEST method to prevent wire transfer fraud by bank employees?
A. Re-keying of wire dollar amounts
B. Independent reconciliation
C. Two-factor authentication control
D. System-enforced dual control
View answer
Correct Answer: B
Question #94
An IS auditor is assessing the results of an organization’s post-implementation review of a newly developed information system. Which of the following should be the auditor’s MAIN focus?
A. The procurement contract has been closed
B. Lessons learned have been identified
C. The disaster recovery plan has been updated
D. Benefits realization analysis has been completed
View answer
Correct Answer: C
Question #95
Which of the following metrics BEST evaluates the completeness of disaster-recovery preparations?
A. Number of published applications-recovery plans
B. Ratio of successful to unsuccessful tests
C. Ratio of recovery-plan documents to total applications
D. Ratio of tested application to total applications
View answer
Correct Answer: C
Question #96
Properly planned risk-based audit programs are often capable of offering which of the following benefits?
A. audit efficiency and effectiveness
B. audit efficiency only
C. audit effectiveness only
D. audit transparency only
E. audit transparency and effectiveness
F. None of the choices
View answer
Correct Answer: AC
Question #97
Which of the following would BEST describe an audit risk?
A. The company is being sued for false accusations
B. The financial report may contain undetected material errors
C. Key employees have not taken vacation for 2 years
D. Employees have been misappropriating funds
View answer
Correct Answer: D
Question #98
While conducting a test of a business continuity plan, which of the following is the MOST important consideration?
A. The test simulates actual prime-time processing conditions
B. The test is scheduled to reduce operational impact
C. The test involves IT members in the test process
D. The test addresses the critical components
View answer
Correct Answer: C
Question #99
An organization’s software develops need access to personally identifiable information (PII) stored in a particular data format. Which of the following would be the BEST way to protect this sensitive information while allowing the developers to use it in development and test environments?
A. Data masking
B. Data encryption
C. Data tokenization
D. Data abstraction
View answer
Correct Answer: C
Question #100
Which of the following is a rewrite of ipfwadm?
A. ipchains
B. iptables
C. Netfilter
D. ipcook
E. None of the choices
View answer
Correct Answer: A
Question #101
Which of the following would MOST likely require a business continuity plan to be invoked?
A. A distributed denial of service attack on an email server
B. An unauthorized visitor discovered in the data center
C. An epidemic preventing staff from performing job functions
D. A hacker holding personally identifiable information hostage
View answer
Correct Answer: A
Question #102
The recovery point objective (RPO) is required in which of the following?
A. Information security plan
B. Incident response plan
C. Disaster recovery plan
D. Business continuity plan
View answer
Correct Answer: D
Question #103
In an annual audit cycle, the audit of an organization’s IT department resulted in many findings. Which of the following would be the MOST important consideration when planning the next audit?
A. Limiting the review to the deficient areas
B. Verifying that all recommendations have been implemented
C. Postponing the review until all of the findings have been rectified
D. Following up on the status of all recommendations
View answer
Correct Answer: C
Question #104
Which of the following is the MOST effective way to reduce risk to an organization from widespread use of web-based communication technologies?
A. Publish an enterprise-wide policy outlining acceptance use of web-based communication technologies
B. Incorporate risk awareness training for web-based communications into the IT security program
C. Monitor staff usage of web-based communication and notify the IT security department of violations
D. Block access from user devices to unauthorized pages that allow web-based communication
View answer
Correct Answer: B
Question #105
Active radio frequency ID (RFID) tags are subject to which of the following exposures?
A. Session hijacking
B. Eavesdropping
C. Malicious code
D. Phishing
View answer
Correct Answer: C
Question #106
Which of the following threats is prevented by using token-based authentication?
A. Password sniffing attack on the network
B. Session eavesdropping attack on the network
C. Man-in-the-middle attack on the client
D. Denial of service attack over the network
View answer
Correct Answer: C
Question #107
Which of the following is the MOST secure and economical method for connecting a private network over the Internet in a small- to medium-sized organization?
A. Virtual private network
B. Dedicated line
C. Leased line
D. integrated services digital network
View answer
Correct Answer: B
Question #108
Which of the following is the BEST reason for an organization to develop a business continuity plan?
A. To develop a detailed description of information systems and processes
B. To identify the users of information systems and processes
C. To avoid the costs resulting from the failure of key systems and processes
D. To establish business unit prioritization of systems, projects, and strategies
View answer
Correct Answer: B
Question #109
Which of the following is MOST important to consider when developing a disaster recovery plan?
A. Business continuity plan (BCP)
B. Feasibility assessment
C. Business impact analysis (BIA)
D. Cost-benefit analysis
View answer
Correct Answer: A
Question #110
Which of the following would be the BEST way to address segregation of duties issues in an organization with budget constraints?
A. Perform an independent audit
B. Rotate job duties periodically
C. Implement compensating controls
D. Hire temporary staff
View answer
Correct Answer: D
Question #111
F. Which of the following types of attack involves a program that creates an infinite loop, makes lots of copies of itself, and continues to open lots of files?A
View answer
Correct Answer: A
Question #112
An organization has implemented a control to help ensure databases containing personal information will not be updated with online transactions that are incomplete due to connectivity issues. Which of the following information attributes is PRIMARILY addressed by this control?
A. Integrity
B. Confidentiality
C. Availability
D. Compliance
View answer
Correct Answer: A
Question #113
Which of the following is MOST important when an organization contracts for the long-term use of a custom-developed application?
A. Documented coding standards
B. Error correction management
C. Contract renewal provisions
D. Escrow clause
View answer
Correct Answer: A
Question #114
During a security audit, which of the following is MOST important to review to ensure data confidentiality is managed?
A. Access controls
B. Data flows
C. Access log monitoring
D. Network configuration
View answer
Correct Answer: A
Question #115
Which of the following is the MOST important reason for updating and retesting a business continuity plan?
A. Staff turnover
B. Emerging technology
C. Significant business change
D. Matching industry best practices
View answer
Correct Answer: A

View The Updated ISACA Exam Questions

SPOTO Provides 100% Real ISACA Exam Questions for You to Pass Your ISACA Exam!

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: