Categories
quizz

CISA 2020

CISA Exam 2020 Examination

1. An IS auditor is reviewing an e-commerce site. Which of the following is MOST important to ensure controls are in place to protect the consumer?

 
 
 
 

2. Which of the following provides the BEST evidence of an organization’s cyber incident response readiness?

 
 
 
 

3. Which of the following would MOST likely be considered a conflict of interest for an IS auditor who is reviewing a cybersecurity implementation?

 
 
 
 

4. In a small organization, the function of release manager and application programmer are performed by the same employee. What is the BEST compensating control in this scenario?

 
 
 
 

5. What is the GREATEST advantage of performing penetration testing in addition to vulnerability assessment?

 
 
 
 

6. Which of the following backup techniques is the MOST appropriate when an organization requires extremely granular data restore points, as defined in the recovery point objective?

 
 
 
 

7. As result of profitability pressure, senior management of an enterprise has decided to keep investments in information security at an inadequate level, which of the following would be the BEST recommendation of an IS auditor?

 
 
 
 

8. As part of audit planning, an IS auditor is designing various data validation tests to effectively detect transposition and transcription errors. Which of the following will BEST help in detecting these errors?

 
 
 
 

9. The MAIN purpose of the annual IS audit plan is to:

 
 
 
 

10. Which of the following is the BEST choice to ensure confidentiality of transmissions in a public-facing web application?

 
 
 
 

11. Which of the following scenarios would an IS auditor MOST likely expect an application team to employ when a system change to a mission-critical application with a low tolerance to failure causes a disruption in operations?

 
 
 
 

12. An organization bought a new system to integrate its existing human resources and payroll systems in the environment. Which of the following tests ensures that the new system can operate successfully with existing systems?

 
 
 
 

13. An enterprise is looking to obtain cloud hosting services from a cloud vendor with a high level of maturity. Which of the following would be the MOST important for the auditor to ensure continued alignment with the enterprise’s security requirements?

 
 
 
 

14. Which of the following BEST ensures that business requirements are met prior to go-live?

 
 
 
 

15. A system developer transferred to the audit department to serve as an IT auditor. When production systems are to be reviewed by this employee, which of the following will become the MOST significant concern?

 
 
 
 

16. When performing a post-implementation review of a software development project for a highly secure application, it is MOST important to confirm that:

 
 
 
 

17. An IS auditor has found numerous users emailing confidential information to unauthorized recipients. The BEST course of action is to prevent this from recurring is to:

 
 
 
 

18. Establishing a software baseline would have the GREATEST impact on which of the following?

 
 
 
 

19. The PRIMARY benefit of implementing a security program as part of a security governance framework is the:

 
 
 
 

20. Which of the following business continuity activities is PRIMARILY the responsibility of the IT department?

 
 
 
 

21. Which of the following would be of MOST interest to an IS auditor reviewing an organization’s risk strategy?

 
 
 
 

22. Which of the following would be of MAIN concern to the IS auditor reviewing the transborder flow of personal data?

 
 
 
 

23. Which of the following should an IS auditor recommend to BEST enforce alignment of an IT project portfolio with strategic organizational priorities?

 
 
 
 

24. During the review of an enterprise’s preventive maintenance process for systems at a data center, the IS auditor has determined that adequate maintenance is being performed on all critical computing, power and cooling systems. Additionally, it is MOST important for the IS auditor to ensure that the organization:

 
 
 
 

25. Which of the following would be the GREATEST concern when an IS auditor notices an increasing number of emergency changes?

 
 
 
 

26. Which of the following carries the LOWEST risk when managing failures while transitioning from legacy applications to new applications?

 
 
 
 

27. Which of the following would be of GREATEST concern to an IS auditor inspecting an organization’s computer room?

 
 
 
 

28. An IS auditor is reviewing an organization’s business continuity plan. Which of the following would provide the BEST means of evaluating the systems supporting the organization’s critical processes?

 
 
 
 

29. Which of the following would BEST help an IS auditor determine the adequacy of user privileges set up in an application system?

 
 
 
 

30. In a public key infrastructure, certificate authorities are intended to PRIMARILY address:

 
 
 
 

31. Which of the following controls would be the MOST effective to reduce the impact of a successful ransomware attack?

 
 
 
 

32. An IS auditor is reviewing an organization’s change management process and finds that after-hours emergency changes are made, and approval is obtained subsequent to the change. Which of the following is the BEST course of action for the auditor?

 
 
 
 

33. An IS auditor has been asked to look at past projects to determine how future projects can better meet business requirements. With which of the following would the auditors MOST likely consult?

 
 
 
 

34. An internal audit function is reviewing an internally developed common gateway interface script for a web application. The IS auditor discovers that the script was not reviewed and tested by the quality control function. Which of the following types of risk is of GREATEST concern?

 
 
 
 

35. Which of the following is the MOST appropriate action to take upon identifying that a computer may have been used to leak a confidential file?

 
 
 
 

36. Which of the following is MOST important to ensure before communicating the audit findings to top management during the closing meeting?

 
 
 
 

37. After identifying the findings, the IS auditor should FIRST:

 
 
 
 

38. Which of the following is the FIRST step in determining the appropriate level of protection for the enterprise information systems?

 
 
 
 

39. When performing a risk analysis, the IS auditor should FIRST:

 
 
 
 

40. Which of the following would be MOST useful for an IS auditor in accessing and analyzing digital data to collect relevant audit evidence from diverse software environments?

 
 
 
 

41. Which of the following will be the MOST cost-effective way to evaluate the completeness of the disaster recovery plan?

 
 
 
 

42. During an audit, which of the following situations would be MOST concerning for an organization that significantly outsources IS processing to a private network?

 
 
 
 

43. Errors in audit procedures would PRIMARILY impact which of the following risks?

 
 
 
 

44. Which of the following is the MOST important critical success factor of implementing a risk-based approach to the IT system life cycle?

 
 
 
 

45. An auditee disagrees with an audit finding. Which of the following is the BEST course of action for the IT auditor to take?

 
 
 
 

46. Which of the following is the MOST effective control when granting temporary access to vendors?

 
 
 
 

47. Which of the following is the MOST important input for decision making throughout the life of an IT project?

 
 
 
 

48. When developing a security architecture, which of the following steps should be executed FIRST?

 
 
 
 

49. Which of the following is the FIRST step in an IT risk assessment for a risk-based audit?

 
 
 
 

50. Why would an organization MOST likely choose an agile systems development approach?

 
 
 
 

51. Which of the following would be the GREATEST concern if audit objectives are not established during the initial phase of an audit program?

 
 
 
 

52. An enterprise has selected a vendor to develop and implement a new software system. To ensure that the enterprise’s investment in software is protected, which of the following security clauses is MOST important to include in the master services agreement?

 
 
 
 

53. Which of the following sampling methods is the MOST appropriate for testing automated invoice authorization controls to ensure that exceptions are not made for specific users?

 
 
 
 

54. An IS auditor is reviewing a third-party agreement for a new cloud based accounting service provider. Which of the following considerations is the MOST important with regard to the privacy of the accounting data?

 
 
 
 

55. A digital hash ensures:

 
 
 
 

56. Which of the following methods would be the MOST effective way to ascertain that information security policies have been communicated to and understood by all IS users?

 
 
 
 

57. Which of the following countermeasures would the IS auditor MOST likely recommend for the risk mitigation of logic alteration vulnerabilities discovered during penetration testing of a public-facing web application?

 
 
 
 

58. An employee who has access to highly confidential information has resigned. Upon departure, which of the following should be done FIRST?

 
 
 
 

59. The IS auditor learns a business application has extended the access from users of one department to other departments. The GREATEST concern for the IS auditor would be approval of:

 
 
 
 

60. Which of the following would an IS auditor FIRST reference when  performing an IS audit?

 
 
 
 

61. Which of the following would be expected to approve the audit charter?

 
 
 
 

62. Who should be accountable for ensuring access rights to corporate web applications are revoked when user termination occurs?

 
 
 
 

63. Which of the following should be of the GREATEST concern to an IS auditor when analyzing the baseline security of a corporate desktop personal computer?

 
 
 
 

64. Which of the following is MOST important to consider when reviewing the classification levels of information assets?

 
 
 
 

65. Which of the following is MOST important when system patches need to be applied to application servers at the disaster recovery site?

 
 
 
 

66. Which of the following is the PRIMARY purpose of a risk-based audit?

 
 
 
 

67. De-normalization of the relational database would PRIMARILY result in:

 
 
 
 

68. An internal IT auditor is observing an organization’s disaster recovery tests. It is found that the organization’s ability to recover does not meet the management-approved recovery time objective (RTO). Which of the following is the BEST recommendation for the auditor to include in the report?

 
 
 
 

69. Accountants are developing a temporary reporting solution using a spreadsheet and macro program. Which of the following will be the MOST significant concern from a control perspective?

 
 
 
 

70. When developing a disaster recovery plan, the criteria for determining the acceptable downtime should be the:

 
 
 
 

71. An IS auditor is conducting a postimplementation review of an enterprise’s network. Which of the following findings would be of MOST concern?

 
 
 
 

72. Which of the following controls would BEST help protect an organization from successful phishing attacks?

 
 
 
 

73. After initial investigation, an IS auditor has reasons to believe that fraud may be present. The IS auditor should:

 
 
 
 

74. The MOST important element for the effective design of an information security policy is the:

 
 
 
 

75. Vulnerabilities associated with which of the following would pose the GREATEST risk to Domain Name Systeman organization hosting a web application?

 
 
 
 

Question 1 of 75

Categories
exam quizz

sample auction listing

This content is restricted to subscribers

Categories
quizz

AWS Quiz

This content is restricted to subscribers