DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

CISA Dumps & Mock Exam for Success, Certified Information Systems Auditor | SPOTO

Unlock the key to CISA certification success with SPOTO's comprehensive CISA dumps and mock exams. Our meticulously crafted materials provide an authentic testing experience, complete with real exam-style questions and scenarios. Access a vast database of exam dumps, regularly updated to reflect the latest exam objectives, ensuring you're thoroughly prepared for any curveball. Simulate the real exam environment with our timed, full-length mock exams, designed to build your confidence and endurance. Gain valuable insights through detailed explanations and performance analysis, identifying knowledge gaps and strengths. Trust SPOTO's CISA dumps and mock exams to maximize your preparation efficiency and achieve certification success.
Take other online exams

Question #1
Nonrepudiation of the client for e-commerce transactions is accomplished through which of the following control mechanisms?
A. Password security B
C. Public key infrastructure (PKI)
D. Secure Sockets Layer (SSL)
View answer
Correct Answer: A
Question #2
An IS auditor is assessing an organization’s data loss prevention (DLP) solution for protecting intellectual property from insider theft. Which of the following would the auditor consider MOST important for effective data protection?
A. Employee training on information handling
B. Creation of DLP policies and procedures
C. Encryption of data copied to flash drives
D. Identification and classification of sensitive data
View answer
Correct Answer: C
Question #3
As described at security policy, the CSO implemented an e-mail package solution that allows for ensuring integrity of messages sent using SMIME. Which of the options below BEST describes how it implements the environment to suite policy´s requirement?
A. Implementing PGP and allowing for recipient to receive the private key used to sign e-mail message
B. Implementing RSA standard for messages envelope and instructing users to sign all messages using their private key from their PKI digital certificate
C. Implementing RSA standard for messages envelope and instructing users to sign all messages using their public key from their PKI digital certificate
D. Implementing MIME solutions and providing a footer within each message sent, referencing to policy constraints related to e-mail usage
View answer
Correct Answer: C
Question #4
When selecting audit procedures, an IS auditor should use professional judgment to ensure that:
A. sufficient evidence will be collected
B. all significant deficiencies identified will be corrected within a reasonable period
C. all material weaknesses will be identified
D. audit costs will be kept at a minimum level
View answer
Correct Answer: A
Question #5
Which of the following attacks could capture network user passwords?
A. Data diddling
B. Sniffing
C. IP Spoofing
D. Surfing
View answer
Correct Answer: B
Question #6
Which of the following is used to evaluate biometric access controls?
A. FAR
B. EER
C. ERR
D. FRR
View answer
Correct Answer: C
Question #7
Parity bits are a control used to validate:
A. Data authentication
B. Data completeness
C. Data source
D. Data accuracy
View answer
Correct Answer: B
Question #8
As an IS auditor, it is very important to make sure all storage media are well protected. Which of the following is the LEAST important factor for protecting CDs and DVDs?
A. Handle by edges or by the hole in the middle
B. Store in anti-static bag
C. Avoid long term exposure to bright light
D. Store in a hard jewel case, not in soft sleeves
View answer
Correct Answer: D
Question #9
The PRIMARY advantage of object-oriented technology is enhanced:
A. efficiency due to the re-use of elements of logic
B. management of sequential program execution for data access
C. management of a restricted variety of data types for a data object
D. grouping of objects into methods for data access
View answer
Correct Answer: B
Question #10
________ (fill in the blank) is/are ultimately accountable for the functionality, reliability, and security within IT governance.
A. Data custodians
B. The board of directors and executive officers
C. IT security administration
D. Business unit managers
View answer
Correct Answer: B
Question #11
What is the lowest level of the IT governance maturity model where an IT balanced scorecard exists?
A. Repeatable but Intuitive
B. Defined
C. Managed and Measurable
D. Optimized
View answer
Correct Answer: D
Question #12
What can ISPs use to implement inbound traffic filtering as a control to identify IP packets transmitted from unauthorized sources?
A. OSI Layer 2 switches with packet filtering enabled
B. Virtual Private Networks
C. Access Control Lists (ACL)
D. Point-to-Point Tunneling Protocol
View answer
Correct Answer: B
Question #13
Which of the following components of a scheduling tool BEST prevents job failures due to insufficient system resources?
A. Job dependencies
B. Delayed job starts
C. Exception handling
D. Error alerts
View answer
Correct Answer: A
Question #14
Which of the following term related to network performance refers to the delay that packet may experience on their way to reach the destination from the source?
A. Bandwidth
B. Throughput
C. Latency
D. Jitter
View answer
Correct Answer: B
Question #15
During a review of operations, it is noted that during a batch update, an error was detected and the database initiated a roll-back. An IT operator stopped the rollback and re-initiated the update. What should the operator have done PRIOR to re-initiating the update?
A. Determined the cause of the error
B. Obtained approval before re-initiating the update
C. Allowed the roll-back to complete D
View answer
Correct Answer: B
Question #16
The MOST significant level of effort for business continuity planning (BCP) generally is required during the:
A. testing stage
B. evaluation stage
C. maintenance stage
D. early stages of planning
View answer
Correct Answer: D
Question #17
An IS auditor determines that a business impact analysis (BIA) was not conducted during the development of a business continuity plan (BCP). What is the MOST significant risk that could result from this situation?
A. Responsibilities are not property defined
B. Recovery time objectives (RTOs) are not correctly determined
C. Key performance indicators (KPIs) are not aligned
D. Critical business applications are not covered
View answer
Correct Answer: C
Question #18
The use of a GANTT chart can:
A. aid in scheduling project tasks
B. determine project checkpoints
C. ensure documentation standards
D. direct the post-implementation review
View answer
Correct Answer: C
Question #19
Which of the following is NOT a disadvantage of Single Sign On (SSO)?
A. Support for all major operating system environment is difficult
B. The cost associated with SSO development can be significant
C. SSO could be single point of failure and total compromise of an organization asset
D. SSO improves an administrator's ability to manage user's account and authorization to all associated system
View answer
Correct Answer: D
Question #20
The drives of a tile server are backed up at a hot site. Which of the following is the BEST way to duplicate the files stored on the server for forensic analysis?
A. Capture a bit-by-bit image of the file server's drives
B. Run forensic analysis software on the backup drive
C. Create a logical copy of the file server’s drives
D. Replicate the server's volatile data to another drive
View answer
Correct Answer: B
Question #21
An audit report notes that terminated employees have been retaining their access rights after their departure. Which of the following strategies would BEST ensure that obsolete access rights are identified in a timely manner?
A. Delete user IDs at a predetermined date after their creation
B. Automatically delete user IDs after they are unused for a predetermined time
C. Implement an automated interface with the organization’s human resources system
D. Require local supervisors to initiate connection
View answer
Correct Answer: D
Question #22
Obtaining user approval of program changes is very effective for controlling application changes and maintenance. True or false?
A. True
B. False
View answer
Correct Answer: A
Question #23
Which of the following would BEST detect logic bombs in the new programs?
A. Final acceptance testing by users
B. Parallel/pilot testing
C. Regression testing
D. Independent program review
View answer
Correct Answer: C
Question #24
Which of the following type of a computer network covers a limited area such as a home, office or campus?
A. LAN
B. WAN
C. SAN
D. PAN
View answer
Correct Answer: A
Question #25
Which of the following layer of the OSI model provides a standard interface for applications to communicate with devices on a network?
A. Application layer
B. Presentation layer
C. Session layer
D. Transport layer
View answer
Correct Answer: A
Question #26
Which of the following would be the MOST likely reason for an intrusion prevention system (IPS) being unable to block an ongoing web attack?
A. The firewall is not configured properly
B. The network design contains flaws
C. Monitoring personnel are not proactive
D. Signatures are outdated
View answer
Correct Answer: A
Question #27
What is an effective countermeasure for the vulnerability of data entry operators potentially leaving their computers without logging off?
A. Employee security awareness training
B. Administrator alerts
C. Screensaver passwords
D. Close supervision
View answer
Correct Answer: A
Question #28
Calculation of the recovery time objective (RTO) is necessary to determine the:
A. time required to restore files
B. annual loss expectancy (ALE)
C. point of synchronization
D. priority of restoration
View answer
Correct Answer: A
Question #29
An IS auditor is assigned to perform a post implementation review of an application system. Which pf the following situations may have impaired the independence of the IS auditor? The IS auditor:
A. implemented a specific control during the development of the application system
B. designed an embedded audit module exclusively for auditing the application system
C. participated as a member of the application system project team, but did not have operational responsibilities
D. provided consulting advice concerning application system best practices
View answer
Correct Answer: D
Question #30
What are used as the framework for developing logical access controls?
A. Information systems security policies
B. Organizational security policies
C. Access Control Lists (ACL)
D. Organizational charts for identifying roles and responsibilities
View answer
Correct Answer: B
Question #31
An IS auditor should be concerned when a telecommunication analyst: A. monitors systems performance and tracks problems resulting from program changes.
B. reviews network load requirements in terms of current and future transaction volumes
C. assesses the impact of the network load on terminal response times and network data transfer rates
D. recommends network balancing procedures and improvements
View answer
Correct Answer: D
Question #32
An IS auditor is reviewing a project to implement a payment system between a parent bank and a subsidiary. The IS auditor should FIRST verify that the:
A. technical platforms between the two companies are interoperable
B. parent bank is authorized to serve as a service provider
C. security features are in place to segregate subsidiary trades
D. subsidiary can join as a co-owner of this payment system
View answer
Correct Answer: D
Question #33
Which of the following is the MOST important IS audit consideration when an organization outsources a customer credit review system to a third-party service provider? The provider:
A. meets or exceeds industry security standards
B. agrees to be subject to external security reviews
C. has a good market reputation for service and experience
D. complies with security policies of the organization
View answer
Correct Answer: A
Question #34
Organizations should use off-site storage facilities to maintain ______________ (fill in the blank) of current and critical information within backup files.
A. Confidentiality
B. Integrity
C. Redundancy
D. Concurrency
View answer
Correct Answer: C
Question #35
As an auditor it is very important to ensure confidentiality, integrity, authenticity and availability are implemented appropriately in an information system. Which of the following definitions incorrectly describes these parameters? 1. Authenticity – A third party must be able to verify that the content of a message has been sent by a specific entity and nobody else. 2. Non-repudiation – The origin or the receipt of a specific message must be verifiable by a third party. A person cannot deny having sent a
A. All of the options presented B
C. Options number 1 and 2
D. Option number 3
View answer
Correct Answer: D
Question #36
To help ensure the organization’s information assets are adequately protected, which of the following considerations is MOST important when developing an information classification and handling policy?
A. The policy has been mapped against industry frameworks for classifying information assets
B. The policy is owned by the head of information security, who has the authority to enforce the policy
C. The policy specifies requirements to safeguard information assets based on their importance to the organization
D. The policy is subject to periodic reviews to ensure its provisions are up to date
View answer
Correct Answer: B
Question #37
Off-site data backup and storage should be geographically separated so as to _______________ (fill in the blank) the risk of a widespread physical disaster such as a hurricane or earthquake.
A. Accept
B. Eliminate
C. Transfer
D. Mitigate
View answer
Correct Answer: A
Question #38
Which of the following is a passive attack method used by intruders to determine potential network vulnerabilities?
A. Traffic analysis
B. SYN flood
C. Denial of service (DoS)
D. Distributed denial of service (DoS)
View answer
Correct Answer: D
Question #39
When evaluating the collective effect of preventive, detective or corrective controls within a process, an IS auditor should be aware of which of the following?
A. The point at which controls are exercised as data flow through the system
B. Only preventive and detective controls are relevant
C. Corrective controls can only be regarded as compensating
D. Classification allows an IS auditor to determine which controls are missing
View answer
Correct Answer: C
Question #40
What is an effective control for granting temporary access to vendors and external support personnel?
A. Creating user accounts that automatically expire by a predetermined date
B. Creating permanent guest accounts for temporary use
C. Creating user accounts that restrict logon access to certain hours of the day
D. Creating a single shared vendor administrator account on the basis of least-privileged access
View answer
Correct Answer: B
Question #41
Which of the following is the BEST way for an IS auditor to assess the effectiveness of backup procedures?
A. Review the backup schedule
B. Evaluate the latest data restore
C. Inspect backup logs
D. Interview the data owner
View answer
Correct Answer: D
Question #42
The purpose of business continuity planning and disaster-recovery planning is to:
A. Transfer the risk and impact of a business interruption or disaster
B. Mitigate, or reduce, the risk and impact of a business interruption or disaster
C. Accept the risk and impact of a business
D. Eliminate the risk and impact of a business interruption or disaster
View answer
Correct Answer: A
Question #43
Effective IT governance requires organizational structures and processes to ensure that:
A. the organization's strategies and objectives extend the IT strategy
B. the business strategy is derived from an IT strategy
C. IT governance is separate and distinct from the overall governance
D. the IT strategy extends the organization's strategies and objectives
View answer
Correct Answer: D
Question #44
Which of the following comparisons are used for identification and authentication in a biometric system?
A. One-to-many for identification and authentication
B. One-to-one for identification and authentication
C. One-to-many for identification and one-to-one for authentication
D. One-to-one for identification and one-to-many for authentication
View answer
Correct Answer: D
Question #45
Why is a clause for requiring source code escrow in an application vendor agreement important?
A. To segregate systems development and live environments
B. To protect the organization from copyright disputes
C. To ensure that sufficient code is available when needed D
View answer
Correct Answer: B
Question #46
Which of the following would MOST effectively aid executive management in achieving IT and business alignment?
A. Risk assessment
B. Value delivery assessment
C. Balanced scorecard
D. Performance measurement
View answer
Correct Answer: B
Question #47
With the objective of mitigating the risk and impact of a major business interruption, a disaster recovery plan should endeavor to reduce the length of recovery time necessary, as well as costs associated with recovery. Although DRP results in an increase of pre-and post-incident operational costs, the extra costs are more than offset by reduced recovery and business impact costs. True or false?
A. True
B. False
View answer
Correct Answer: D
Question #48
Which of the following attack best describe “Computer is the target of a crime” and “Computer is the tool of a crime”?
A. Denial of Service (DoS) and Installing Key loggers
B. War Driving and War Chalking
C. Piggybacking and Race Condition
D. Traffic analysis and Eavesdropping
View answer
Correct Answer: C
Question #49
Which of the following is MOST is critical during the business impact assessment phase of business continuity planning?
A. End-user involvement B
C. Security administration involvement
D. IS auditing involvement
View answer
Correct Answer: C
Question #50
What is a callback system?
A. It is a remote-access system whereby the remote-access server immediately calls the user back at a predetermined number if the dial-in connection fails
B. It is a remote-access system whereby the user's application automatically redials the remote access server if the initial connection attempt fails
C. It is a remote-access control whereby the user initially connects to the network systems via dial-up access, only to have the initial connection terminated by the server, which then subsequently dials the user back at a predetermined number stored in the server's configuration database
D. It is a remote-access control whereby the user initially connects to the network systems via dial-up access, only to have the initial connection terminated by the server, which then subsequently allows the user to call back at an approved number for a limited period of time
View answer
Correct Answer: B
Question #51
Which of the following can help detect transmission errors by appending specially calculated bits onto the end of each segment of data?
A. Redundancy check
B. Completeness check
C. Accuracy check
D. Parity check
View answer
Correct Answer: D
Question #52
Which of the following protects against the impact of temporary and rapid decreases or increases in electricity?
A. Redundant power supply
B. Emergency power-off switch
C. Stand-by generator
D. Uninterruptible power supply (UPS)
View answer
Correct Answer: A
Question #53
In an online application, which of the following would provide the MOST information about the transaction audit trail?
A. File layouts
B. System/process flowchart
C. Source code documentation
D. Data architecture
View answer
Correct Answer: A
Question #54
An e-commerce enterprise’s disaster recovery (DR) site has 30% less processing capability than the primary site. Based on this information, which of the following presents the GREATEST risk?
A. Network firewalls and database firewalls at the DR site do not provide high availability
B. No disaster recovery plan (DRP) testing has been performed during the last six months
C. The DR site is in a shared location that hosts multiple other enterprises
D. The DR site has not undergone testing to confirm its effectiveness
View answer
Correct Answer: A
Question #55
What can ISPs use to implement inbound traffic filtering as a control to identify IP packets transmitted from unauthorized sources?
A. OSI Layer 2 switches with packet filtering enabled
B. Virtual Private Networks
C. Access Control Lists (ACL) D
View answer
Correct Answer: C
Question #56
Which of the following type of a computer network is a WAN that are limited to a city?
A. LAN
B. MAN
C. SAN
D. PAN
View answer
Correct Answer: B
Question #57
Which of the following is the unique identifier within and IPSec packet that enables the sending host to reference the security parameter to apply?
A. SPI
B. SA
C. ESP
D. AH
View answer
Correct Answer: B
Question #58
Fourth-Generation Languages (4GLs) are most appropriate for designing the application's graphical user interface (GUI). They are inappropriate for designing any intensive data- calculation procedures. True or false?
A. True
B. False
View answer
Correct Answer: D
Question #59
Which of the following is the MAIN purpose of implementing an incident response process?
A. Provide substantial audit-trail evidence
B. Assign roles and responsibilities
D. Manage impact due to breaches
View answer
Correct Answer: B
Question #60
The PRIMARY purpose of a periodic threat and risk assessment report to senior management is to communicate the:
A. cost-benefit of security controls
B. status of the security posture
C. probability of future incidents
D. risk acceptance criteria
View answer
Correct Answer: D
Question #61
Which of the following should be the PRIMARY basis for how digital evidence is handled during a forensics investigation?
A. Industry best practices
B. Regulatory requirements
C. Organizational risk culture
D. Established business practices
View answer
Correct Answer: B
Question #62
What type(s) of firewalls provide(s) the greatest degree of protection and control because both firewall technologies inspect all seven OSI layers of network traffic?
A. A first-generation packet-filtering firewall
B. A circuit-level gateway
C. An application-layer gateway, or proxy firewall, and stateful-inspection firewalls
D. An application-layer gateway, or proxy firewall, but not stateful-inspection firewalls
View answer
Correct Answer: A
Question #63
The final decision to include a material finding in an audit report should be made by the:
A. audit committee
B. auditee's manager
C. IS auditor
D. CEO of the organization
View answer
Correct Answer: B
Question #64
In which of the following RFID risks competitor potentially could gain unauthorized access to RFID-generated information and use it to harm the interests of the organization implementing the RFID system?
A. Business Process Risk
B. Business Intelligence Risk
C. Privacy Risk
D. Externality Risk
View answer
Correct Answer: D
Question #65
The GREATEST benefit of choosing a private cloud over a public cloud would be:
A. server protection
B. online service availability
C. containment of customer data
D. collection of data forensics
View answer
Correct Answer: C
Question #66
Which of the following is NOT a true statement about public key infrastructure (PKI)?
A. The Registration authority role is to validate and issue digital certificates to end users
B. The Certificate authority role is to issue digital certificates to end users
C. The Registration authority (RA) acts as a verifier for Certificate Authority (CA)
D. Root certificate authority's certificate is always self-signed
View answer
Correct Answer: B
Question #67
Which of the following type of a computer network covers a broad area such as city, region, nation or international link?
A. LAN
B. WAN
C. SAN
D. PAN
View answer
Correct Answer: B
Question #68
Which of the following is the MOST significant concern when backup tapes are encrypted?
A. Loss of the encryption key
B. Lack of physical security over the tapes
C. Incompatibility with future software versions
D. Inaccurate data due to encryption processing
View answer
Correct Answer: B
Question #69
Which of the following is the MOST effective control to ensure electronic records beyond their retention periods are deleted from IT systems?
A. Review the record retention register regularly to initiate data deletion
B. Build in system logic to trigger data deletion at predefined times
C. Perform a sample check of current data against the retention schedule
D. Execute all data deletions at a predefined month during the year
View answer
Correct Answer: D
Question #70
During the testing of the business continuity plan (BCP), which of the following methods of results analysis provides the BEST assurance that the plan is workable?
A. Measurement of accuracy
B. Elapsed time for completion of critical tasks
C. Quantitatively measuring the results of the test
D. Evaluation of the observed test results
View answer
Correct Answer: A
Question #71
An IS auditor has discovered that unauthorized customer management software was installed on a workstation. The auditor determines the software has been uploading customer data to an external party. Which of the following is the IS auditor’s BEST course of action?
A. Review other workstations to determine the extent of the incident
B. Determine the number of customer records that were uploaded
C. Notify the incident response team
D. Present the issue at the next audit progress meeting
View answer
Correct Answer: D
Question #72
In an audit of an inventory application, which approach would provide the BEST evidence that purchase orders are valid? A. Testing whether inappropriate personnel can change application parameters
B. Tracing purchase orders to a computer listing
C. Comparing receiving reports to purchase order details
D. Reviewing the application documentation
View answer
Correct Answer: D
Question #73
As an IS auditor it is very important to understand software release management process. Which of the following software release normally contains a significant change or addition of new functionality?
A. Major software Release
B. Minor software Release
C. Emergency software release
D. General software Release
View answer
Correct Answer: A
Question #74
Which of the following is the BEST indication that an organization has achieved legal and regulatory compliance?
A. The board of directors and senior management accept responsibility for compliance
B. An independent consultant has been appointed to ensure legal and regulatory compliance
C. Periodic external and internal audits have not identified instances of noncompliance
D. The risk management process incorporates noncompliance as a risk
View answer
Correct Answer: C
Question #75
Within the confidentiality, integrity, and availability (CIA) triad, which of the following activities BEST supports the concept of integrity?
A. Ensuring encryption for data in transit
B. Implementing a data classification schema
C. Utilizing a formal change management process
D. Enforcing service level agreements (SLAs)
View answer
Correct Answer: A
Question #76
Which of the following BEST helps to ensure data integrity across system interfaces?
A. Environment segregation
B. System backups
C. Reconciliations
D. Access controls
View answer
Correct Answer: D
Question #77
Any changes in systems assets, such as replacement of hardware, should be immediately recorded within the assets inventory of which of the following?
A. IT strategic plan
B. Business continuity plan
C. Business impact analysis
D. Incident response plan
View answer
Correct Answer: C
Question #78
________________ should be implemented as early as data preparation to support data integrity at the earliest point possible.
A. Control totals
B. Authentication controls
C. Parity bits
D. Authorization controls
View answer
Correct Answer: C
Question #79
Which of the following is a type of computer network used for data transmission among devices such as computers, telephones and personal digital assistants?
A. LAN
B. WAN
C. SAN
D. PAN
View answer
Correct Answer: C
Question #80
Which of the following is the PRIMARY objective of using a capability maturity model as a tool to communicate audit results to senior management?
A. To evaluate management's action plan
B. To confirm audit findings
C. To illustrate improvement opportunities
D. To prioritize remediation efforts
View answer
Correct Answer: D
Question #81
What kind of testing should programmers perform following any changes to an application or system?
A. Unit, module, and full regression testing
B. Module testing C
D. Regression testing
View answer
Correct Answer: A
Question #82
Which of the following would be MOST important to include in a data security policy to adequately manage the privacy of customer information? A. Information classification criteria
B. Encryption technology
C. Backup strategy
D. Data ownership
View answer
Correct Answer: D
Question #83
An organization has installed blade server technology in its data center. To determine whether higher cooling demands are maintained, which of the following should the IS auditor review?
A. Ventilation systems
B. Uninterruptible power supply (UPS) systems
C. Air conditioning capacity
D. Duct maintenance
View answer
Correct Answer: D
Question #84
Which of the following attack involves slicing small amount of money from a computerize transaction or account?
A. Eavesdropping
B. Traffic Analysis
C. Salami
D. Masquerading
View answer
Correct Answer: D
Question #85
Which of the following is the GREATEST advantage of using a framework to guide an organization’s governance of IT?
A. It enables consistency when making strategic IT investments across the organization
C. It enables improvements to the security of high-risk systems in the organization
D. It enables the achievement of service levels between IT and true business departments
View answer
Correct Answer: B
Question #86
Which of the following test approaches would utilize data analytics to test a dual approval payment control?
A. Review payments completed in the past month that do not have a unique approver
B. Attempt to complete a payment without a secondary approval
C. Review users within the payment application who are assigned an approver role
D. Evaluate configuration settings for the secondary approval requirements
View answer
Correct Answer: B
Question #87
Which of the following functionality is NOT performed by the application layer of a TCP/IP model?
A. Print service, application services
B. Data encryption and compression
C. Dialog management
D. End-to-end connection
View answer
Correct Answer: B
Question #88
Following a malicious security incident, an organization has decided to prosecute those responsible. Which of the following will BEST facilitate the forensic investigation?
A. Identifying the affected environment
B. Performing a backup of affected systems C
D. Maintaining chain of custody
View answer
Correct Answer: C
Question #89
Which of the following controls would BEST decrease the exposure if a password is compromised?
A. Passwords are masked
B. Passwords are encrypted
C. Passwords have format restrictions
D. Password changes are forced periodically
View answer
Correct Answer: A
Question #90
Which of the following would be of MOST concern during an audit of an end user computing system containing sensitive information?
A. Audit logging is not available
B. System data is not protected
C. Secure authorization is not available
D. The system is not included in inventory
View answer
Correct Answer: A
Question #91
Which of the following is the MOST likely reason why e-mail systems have become a useful source of evidence for litigation? A. Multiple cycles of backup files remain available.
B. Access controls establish accountability for e-mail activity
C. Data classification regulates what information should be communicated via e-mail
D. Within the enterprise, a clear policy for using e-mail ensures that evidence is available
View answer
Correct Answer: B
Question #92
Which of the following metrics would be MOST helpful to an IS auditor in evaluating an organization’s security incident response management capability?
A. Number of business interruptions due to IT security incidents per year
B. Number of IT security incidents reported per month
C. Number of malware infections in business applications detected per day
D. Number of alerts generated by intrusion detection systems (IDS) per minute
View answer
Correct Answer: C
Question #93
Which of the following is the MOST critical step prior to performing a network penetration test?
A. Informing management of the potential risk involved with penetration testing
B. Identifying a scanning tool for use in identifying vulnerabilities
C. Communicating the location of the penetration test targets to management
D. Reviewing the results of previous penetration tests
View answer
Correct Answer: C
Question #94
An enterprise receiving email should have procedures to control:
A. insufficient end-points
B. unsolicited executable code
C. outdated protocols
D. insufficient connectivity
View answer
Correct Answer: D
Question #95
Which of the following is MOST important for the improvement of an organization’s incident response processes?
A. Post-event reviews by the incident response team
B. Regular upgrades to incident management software
C. Ongoing incident response training for users
D. Periodic walk-through of incident response procedures
View answer
Correct Answer: A
Question #96
When is regression testing used to determine whether new application changes have introduced any errors in the remaining unchanged code?
A. In program development and change management
B. In program feasibility studies
C. In program development
D. In change management
View answer
Correct Answer: A
Question #97
Which of the following would BEST detect that a distributed-denial-of-service attack (DDoS) is occurring?
A. Server crashes
B. Automated monitoring of logs
C. Penetration testing
D. Customer service complaints
View answer
Correct Answer: D
Question #98
A retirement system verifies that the field for employee status has either a value of A (for active) or R (for retired). This is an example of which type of check?
A. Validity
B. Existence
C. Limit
D. Completeness
View answer
Correct Answer: B
Question #99
Which of the following ensures components of an IT system are identified and baselined, and that changes to them are implemented in a controlled manner?
A. Restricted production access
B. Configuration management process
C. Change management process
D. Software versioning control
View answer
Correct Answer: D
Question #100
Which of the following comparisons are used for identification and authentication in a biometric system?
A. One-to-many for identification and authentication
B. One-to-one for identification and authentication
C. One-to-many for identification and one-to-one for authentication
D. One-to-one for identification and one-to-many for authentication
View answer
Correct Answer: C
Question #101
An organization globally distributes a free phone application that includes a module to gather and report user information. The application includes a privacy notice alerting users to the data gathering. Which of the following presents the GREATEST risk?
A. The data gathering notice is available in only one language
B. There is no framework to delete personal data
C. There may be a backlash among users when the data gathering is revealed
D. The data is not properly encrypted on the application server
View answer
Correct Answer: D
Question #102
An audit charter should:
A. be dynamic and change often to coincide with the changing nature of technology and the audit profession
B. clearly state audit objectives for, and the delegation of, authority to the maintenance and review of internal controls
C. document the audit procedures designed to achieve the planned audit objectives
D. outline the overall authority, scope and responsibilities of the audit function
View answer
Correct Answer: A
Question #103
In order to properly protect against unauthorized disclosure of sensitive data, how should hard disks be sanitized?
A. The data should be deleted and overwritten with binary 0s
B. The data should be demagnetized
C. The data should be low-level formatted
D. The data should be deleted
View answer
Correct Answer: A
Question #104
An IS auditor is performing a routine procedure to test for the possible existence of fraudulent transactions. Given there is no reason to suspect the existence of fraudulent transactions, which of the following data analytics techniques should be employed?
A. Association analysis
B. Classification analysis
C. Anomaly detection analysis
D. Regression analysis
View answer
Correct Answer: B
Question #105
Which of the following would an IS auditor use to determine if unauthorized modifications were made to production programs?
A. System log analysis
B. Compliance testing C
D. Analytical review
View answer
Correct Answer: B
Question #106
A system administrator recently informed the IS auditor about the occurrence of several unsuccessful intrusion attempts from outside the organization. Which of the following is MOST effective in detecting such an intrusion?
A. Installing biometrics-based authentication
B. Configuring the router as a firewall
C. Periodically reviewing log files
D. Using smart cards with one-time passwords
View answer
Correct Answer: B
Question #107
Which of the following forms of evidence for the auditor would be considered the MOST reliable?
A. An oral statement from the auditee
B. The results of a test performed by an IS auditor
C. An internally generated computer accounting report
D. A confirmation letter received from an outside source
View answer
Correct Answer: C
Question #108
When reviewing a database supported by a third-party service provider, an IS auditor found minor control deficiencies. The auditor should FIRST discuss recommendations with the: A. service provider support team manager
B. organization’s service level manager
C. organization’s chief information officer (CIO)
D. service provider contract liaison
View answer
Correct Answer: B
Question #109
A benefit of open system architecture is that it:
A. facilitates interoperability
B. facilitates the integration of proprietary components
C. D
C. will be a basis for volume discounts from equipment vendors
D. allows for the achievement of more economies of scale for equipment
View answer
Correct Answer: B
Question #110
Which of the following BEST determines if a batch update job was completed?
A. Reviewing the job log
B. Testing a sample of transactions
C. Reviewing a copy of the script
D. Obtaining process owner confirmation
View answer
Correct Answer: C
Question #111
After discussing findings with an auditee, an IS auditor is required to obtain approval of the report from the CEO before issuing it to the audit committee. This requirement PRIMARILY affects the IS auditor's:
A. judgment
B. effectiveness
C. independence
D. integrity
View answer
Correct Answer: B
Question #112
Which of the following would be the MOST appropriate reason for an organization to purchase fault-tolerant hardware?
A. Reducing hardware maintenance costs
B. Improving system performance
C. Minimizing business loss
D. Compensating for the lack of contingency planning
View answer
Correct Answer: A
Question #113
Utilizing external resources for highly technical information security tasks allows an information security manager to:
A. transfer business risk
B. distribute technology risk
C. outsource responsibility
D. leverage limited resources
View answer
Correct Answer: A
Question #114
Which of the following threats is MOST effectively controlled by a firewall?
A. Network congestion
B. Denial of service (DoS) attack
C. Network sniffing
D. Password cracking
View answer
Correct Answer: A
Question #115
Which of the following is the GREATEST benefit of implementing an incident management process?
A. Opportunity for frequent reassessment of incidents
B. Reduction in security threats
C. Reduction in the business impact of incidents
D. Reduction of costs by the efficient use of resources
View answer
Correct Answer: A
Question #116
Which of the following malware technical fool’s malware by appending section of themselves to files – somewhat in the same way that file malware appends themselves?
A. Scanners
B. Active Monitors
C. Immunizer
D. Behavior blocker
View answer
Correct Answer: C
Question #117
Which of the following is the BEST way to transmit documents classified as confidential over the Internet?
A. Hashing the document contents and destroying the hash value
B. Sending documents as multiple packets over different network routes C
D. Using a virtual private network (VPN)
View answer
Correct Answer: C
Question #118
Which of the following is MOST important for an IS auditor to consider when reviewing the effectiveness of an incident response program?
A. Incidents are categorized according to industry standards
B. Lessons learned are incorporated into incident response processes
C. Incidents are escalated to senior management in a timely manner
D. The plan is reviewed and updated annually
View answer
Correct Answer: A
Question #119
A control that detects transmission errors by appending calculated bits onto the end of each segment of data is known as a:
A. reasonableness check
B. parity check
C. redundancy check
View answer
Correct Answer: C
Question #120
Which of the following provides the GREATEST assurance that any confidential information on a disk is no longer accessible but the device is still usable by other internal users?
A. Reformatting the disk B
C. Degaussing the disk
D. Password-protecting the disk
View answer
Correct Answer: B
Question #121
Which of the following would MOST likely indicate that a customer data warehouse should remain in-house rather than be outsourced to an offshore operation? A. Time zone differences could impede communications between IT teams.
B. Telecommunications cost could be much higher in the first year
C. Privacy laws could prevent cross-border flow of information
D. Software development may require more detailed specifications
View answer
Correct Answer: A
Question #122
The GREATEST risk of database denormalization is:
A. decreased performance
B. loss of data confidentiality
C. loss of database integrity
D. incorrect metadata
View answer
Correct Answer: A
Question #123
Which of the following processes are performed during the design phase of the systems development life cycle (SDLC) model?
A. Develop test plans
B. Baseline procedures to prevent scope creep
D. Program and test the new system
View answer
Correct Answer: D
Question #124
What is often the most difficult part of initial efforts in application development? A. Configuring software
B. Planning security
C. Determining time and resource requirements
D. Configuring hardware
View answer
Correct Answer: B
Question #125
An IT steering committee should review information systems PRIMARILY to assess:
A. whether IT processes support business requirements
B. if proposed system functionality is adequate
C. the stability of existing software
View answer
Correct Answer: B
Question #126
When an operating system is being hardened, it is MOST important for an information security manager to ensure that:
A. default passwords are changed
B. anonymous access is removed
C. file access is restricted
D. system logs are activated
View answer
Correct Answer: D
Question #127
Which of the following is the PRIMARY reason for an IS auditor to map out the narrative of a business process?
A. To verify the business process is as described in the engagement letter
B. To identify the resources required to perform the audit
C. To ensure alignment with organizational objectives
D. To gain insight into potential risks
View answer
Correct Answer: C
Question #128
Authentication techniques for sending and receiving data between EDI systems is crucial to prevent which of the following?
A. Unsynchronized transactions
B. Unauthorized transactions C
D. Incomplete transactions
View answer
Correct Answer: D
Question #129
Documentation of workaround processes to keep a business function operational during recovery of IT systems is a core part of a:
A. business impact analysis (BIA)
B. threat and risk assessment
C. business continuity plan (BCP)
D. disaster recovery plan (DRP)
View answer
Correct Answer: A
Question #130
Which of the following term related to network performance refers to the variation in the time of arrival of packets on the receiver of the information?
A. Bandwidth
B. Throughput
C. Latency
D. Jitter
View answer
Correct Answer: C

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: