Categories
quizz

CISA 2020

CISA Exam 2020 Examination

1. Which of the following will be the MOST cost-effective way to evaluate the completeness of the disaster recovery plan?

 
 
 
 

2. Which of the following sampling methods is the MOST appropriate for testing automated invoice authorization controls to ensure that exceptions are not made for specific users?

 
 
 
 

3. Which of the following controls would BEST help protect an organization from successful phishing attacks?

 
 
 
 

4. Which of the following would be the GREATEST concern if audit objectives are not established during the initial phase of an audit program?

 
 
 
 

5. Which of the following is the FIRST step in an IT risk assessment for a risk-based audit?

 
 
 
 

6. A system developer transferred to the audit department to serve as an IT auditor. When production systems are to be reviewed by this employee, which of the following will become the MOST significant concern?

 
 
 
 

7. An auditee disagrees with an audit finding. Which of the following is the BEST course of action for the IT auditor to take?

 
 
 
 

8. In a public key infrastructure, certificate authorities are intended to PRIMARILY address:

 
 
 
 

9. A digital hash ensures:

 
 
 
 

10. After identifying the findings, the IS auditor should FIRST:

 
 
 
 

11. An employee who has access to highly confidential information has resigned. Upon departure, which of the following should be done FIRST?

 
 
 
 

12. An internal audit function is reviewing an internally developed common gateway interface script for a web application. The IS auditor discovers that the script was not reviewed and tested by the quality control function. Which of the following types of risk is of GREATEST concern?

 
 
 
 

13. Which of the following would an IS auditor FIRST reference when  performing an IS audit?

 
 
 
 

14. Who should be accountable for ensuring access rights to corporate web applications are revoked when user termination occurs?

 
 
 
 

15. Which of the following is MOST important to ensure before communicating the audit findings to top management during the closing meeting?

 
 
 
 

16. An IS auditor has found numerous users emailing confidential information to unauthorized recipients. The BEST course of action is to prevent this from recurring is to:

 
 
 
 

17. Which of the following would be of GREATEST concern to an IS auditor inspecting an organization’s computer room?

 
 
 
 

18. Which of the following methods would be the MOST effective way to ascertain that information security policies have been communicated to and understood by all IS users?

 
 
 
 

19. Which of the following is MOST important to consider when reviewing the classification levels of information assets?

 
 
 
 

20. Which of the following would be expected to approve the audit charter?

 
 
 
 

21. An IS auditor has been asked to look at past projects to determine how future projects can better meet business requirements. With which of the following would the auditors MOST likely consult?

 
 
 
 

22. Which of the following is the MOST important input for decision making throughout the life of an IT project?

 
 
 
 

23. Which of the following is MOST important when system patches need to be applied to application servers at the disaster recovery site?

 
 
 
 

24. Which of the following would BEST help an IS auditor determine the adequacy of user privileges set up in an application system?

 
 
 
 

25. As part of audit planning, an IS auditor is designing various data validation tests to effectively detect transposition and transcription errors. Which of the following will BEST help in detecting these errors?

 
 
 
 

26. An IS auditor is reviewing an organization’s business continuity plan. Which of the following would provide the BEST means of evaluating the systems supporting the organization’s critical processes?

 
 
 
 

27. Which of the following is the MOST important critical success factor of implementing a risk-based approach to the IT system life cycle?

 
 
 
 

28. Which of the following scenarios would an IS auditor MOST likely expect an application team to employ when a system change to a mission-critical application with a low tolerance to failure causes a disruption in operations?

 
 
 
 

29. An enterprise has selected a vendor to develop and implement a new software system. To ensure that the enterprise’s investment in software is protected, which of the following security clauses is MOST important to include in the master services agreement?

 
 
 
 

30. Which of the following countermeasures would the IS auditor MOST likely recommend for the risk mitigation of logic alteration vulnerabilities discovered during penetration testing of a public-facing web application?

 
 
 
 

31. An IS auditor is reviewing a third-party agreement for a new cloud based accounting service provider. Which of the following considerations is the MOST important with regard to the privacy of the accounting data?

 
 
 
 

32. Which of the following should an IS auditor recommend to BEST enforce alignment of an IT project portfolio with strategic organizational priorities?

 
 
 
 

33. Which of the following controls would be the MOST effective to reduce the impact of a successful ransomware attack?

 
 
 
 

34. An internal IT auditor is observing an organization’s disaster recovery tests. It is found that the organization’s ability to recover does not meet the management-approved recovery time objective (RTO). Which of the following is the BEST recommendation for the auditor to include in the report?

 
 
 
 

35. Which of the following is the MOST effective control when granting temporary access to vendors?

 
 
 
 

36. An organization bought a new system to integrate its existing human resources and payroll systems in the environment. Which of the following tests ensures that the new system can operate successfully with existing systems?

 
 
 
 

37. As result of profitability pressure, senior management of an enterprise has decided to keep investments in information security at an inadequate level, which of the following would be the BEST recommendation of an IS auditor?

 
 
 
 

38. An IS auditor is reviewing an e-commerce site. Which of the following is MOST important to ensure controls are in place to protect the consumer?

 
 
 
 

39. The PRIMARY benefit of implementing a security program as part of a security governance framework is the:

 
 
 
 

40. Which of the following would MOST likely be considered a conflict of interest for an IS auditor who is reviewing a cybersecurity implementation?

 
 
 
 

41. In a small organization, the function of release manager and application programmer are performed by the same employee. What is the BEST compensating control in this scenario?

 
 
 
 

42. Which of the following is the MOST appropriate action to take upon identifying that a computer may have been used to leak a confidential file?

 
 
 
 

43. Which of the following would be of MAIN concern to the IS auditor reviewing the transborder flow of personal data?

 
 
 
 

44. Which of the following should be of the GREATEST concern to an IS auditor when analyzing the baseline security of a corporate desktop personal computer?

 
 
 
 

45. Which of the following would be MOST useful for an IS auditor in accessing and analyzing digital data to collect relevant audit evidence from diverse software environments?

 
 
 
 

46. During an audit, which of the following situations would be MOST concerning for an organization that significantly outsources IS processing to a private network?

 
 
 
 

47. Which of the following carries the LOWEST risk when managing failures while transitioning from legacy applications to new applications?

 
 
 
 

48. Why would an organization MOST likely choose an agile systems development approach?

 
 
 
 

49. Accountants are developing a temporary reporting solution using a spreadsheet and macro program. Which of the following will be the MOST significant concern from a control perspective?

 
 
 
 

50. After initial investigation, an IS auditor has reasons to believe that fraud may be present. The IS auditor should:

 
 
 
 

51. The MAIN purpose of the annual IS audit plan is to:

 
 
 
 

52. Vulnerabilities associated with which of the following would pose the GREATEST risk to Domain Name Systeman organization hosting a web application?

 
 
 
 

53. When performing a post-implementation review of a software development project for a highly secure application, it is MOST important to confirm that:

 
 
 
 

54. Which of the following is the PRIMARY purpose of a risk-based audit?

 
 
 
 

55. Which of the following would be of MOST interest to an IS auditor reviewing an organization’s risk strategy?

 
 
 
 

56. Which of the following business continuity activities is PRIMARILY the responsibility of the IT department?

 
 
 
 

57. The IS auditor learns a business application has extended the access from users of one department to other departments. The GREATEST concern for the IS auditor would be approval of:

 
 
 
 

58. Which of the following backup techniques is the MOST appropriate when an organization requires extremely granular data restore points, as defined in the recovery point objective?

 
 
 
 

59. When developing a security architecture, which of the following steps should be executed FIRST?

 
 
 
 

60. Which of the following is the FIRST step in determining the appropriate level of protection for the enterprise information systems?

 
 
 
 

61. Which of the following provides the BEST evidence of an organization’s cyber incident response readiness?

 
 
 
 

62. An IS auditor is conducting a postimplementation review of an enterprise’s network. Which of the following findings would be of MOST concern?

 
 
 
 

63. An IS auditor is reviewing an organization’s change management process and finds that after-hours emergency changes are made, and approval is obtained subsequent to the change. Which of the following is the BEST course of action for the auditor?

 
 
 
 

64. The MOST important element for the effective design of an information security policy is the:

 
 
 
 

65. De-normalization of the relational database would PRIMARILY result in:

 
 
 
 

66. Which of the following is the BEST choice to ensure confidentiality of transmissions in a public-facing web application?

 
 
 
 

67. An enterprise is looking to obtain cloud hosting services from a cloud vendor with a high level of maturity. Which of the following would be the MOST important for the auditor to ensure continued alignment with the enterprise’s security requirements?

 
 
 
 

68. When performing a risk analysis, the IS auditor should FIRST:

 
 
 
 

69. What is the GREATEST advantage of performing penetration testing in addition to vulnerability assessment?

 
 
 
 

70. When developing a disaster recovery plan, the criteria for determining the acceptable downtime should be the:

 
 
 
 

71. Errors in audit procedures would PRIMARILY impact which of the following risks?

 
 
 
 

72. Which of the following BEST ensures that business requirements are met prior to go-live?

 
 
 
 

73. Establishing a software baseline would have the GREATEST impact on which of the following?

 
 
 
 

74. During the review of an enterprise’s preventive maintenance process for systems at a data center, the IS auditor has determined that adequate maintenance is being performed on all critical computing, power and cooling systems. Additionally, it is MOST important for the IS auditor to ensure that the organization:

 
 
 
 

75. Which of the following would be the GREATEST concern when an IS auditor notices an increasing number of emergency changes?

 
 
 
 

Question 1 of 75

Categories
exam quizz

sample auction listing

This content is restricted to subscribers

Categories
quizz

AWS Quiz

This content is restricted to subscribers