Q1} Which of the following is MOST important for an IS auditor to ensure when evaluating an
organization's end-user computing (EUC) policy as part of an IT governance audit?
The EUC policy supports business objectives.
The EUC policy is covered in onboarding and awareness training
The EUC policy identifies control procedures.
The EUC policy requires signed acknowledgment by users.
Q2} An IS auditor is analyzing a sample of accounts payable transactions for a specific vendor
and identifies one transaction with a value five times as high as the average transaction. Which
of the following should the auditor do NEXT?
Increase the sample size to 100% of the population
Exclude the transaction from the sample population
Report the variance immediately to the audit committee.
Request an explanation of the variance from the auditee.
Q3} Which of the following is MOST important to consider when developing a service level
agreement (SLA)?
Provisions for regulatory requirements that impact the end users' businesses
Detailed identification of work to be completed
in Description of the services from the viewpoint of the client organization
Description of the services from the viewpoint of the provider
Q4}Which of the following is MOST important to determine when conducting an audit of an
organization's data privacy practices?
0Whether strong encryption algorithms are deployed for personal data protection
Whether privacy technologies are implemented for personal data protection
Whether the systems inventory containing personal data is maintained
Whether a disciplinary process is established for data privacy violations
Q5} Which of the following access control techniques is MOST difficult for an intruder to
compromise?
USB token and password
Airlock entrance and swipe card
Smart card and numeric keypad
13 Biometrics and PIN
Q6} A firewall between internal network segments improves security and reduces risk by:
logging all packets passing through network segments.
monitoring and reporting on sessions between network participants.
13 inspecting all traffic flowing between network segments and applying security policies.
ensuring all connecting systems have appropriate security controls enabled.
Q7} Which of the following is the BEST reason for an IS auditor to emphasize to management
the importance of using an IT governance framework?
Frameworks help facilitate control self-assessments (CSAS).
Frameworks can be tailored and optimized for different organizations.
Frameworks enable IT benchmarks against competitors.
Frameworks help organizations understand and manage IT risk.
Q8} Which of the following should be of GREATEST concern to an IS auditor when auditing an
organization's IT strategy development process?
Information security was not included as a key objective in the IT strategic plan.
The IT strategy was developed based on the current IT capability.
The IT strategy was developed before the business plan.
A business impact analysis (BIA) was not performed to support the IT strategy.
Q9} An organization is implementing a data loss prevention (DLP) system in response to a new
regulatory requirement. Reviewing which of the following would be MOST helpful in evaluating
in Enterprise architecture (EA)
Industry trends
Historical record of data breaches
System manuals
Q10} The charging method that effectively encourages the MOST efficient use of IS resources is:
total utilization to achieve full operating capacity.
residual income in excess of actual incurred costs.
specific charges that can be tied back to specific usage.
allocations based on the ability to absorb charges.
Q11} The use of access control lists (ACLS) is the MOST effective method to mitigate security risk
for routers because they:
are recommended by security standards.
act as filters between the world and the network.
can limit Telnet and traffic from the open Internet.
can detect cyberattacks.
Q12} Which of the following is MOST appropriate to review when determining if the work
completed on an IT project is in alignment with budgeted costs?
Business impact analysis (BIA)
Earned value analysis (EVA)
Return on investment (ROI) analysis
Financial value analysis
Q13} During a database management evaluation, an IS auditor discovers that some accounts
with database administrator (DBA) privileges have been assigned a default password with an
unlimited number of failed login attempts. Which of the following is the auditor's BEST course of
action?
Postpone the audit until adequate security and password management practices are established.
Identify accounts that have had excessive failed login attempts and request they be disabled.
Request the IT manager to change administrator security parameters and update the finding.
Document the finding and explain the risk of having administrator accounts with inappropriate
security settings.
Q14} Which of the following database models is MOST appropriate to use when handling a large
number of transactions that need to be readily accessible?
Network
Hierarchical
Object
Relational
Q15} Which of the following is the GREATEST benefit of an effective data classification process?
Appropriate ownership over data is assigned.
Data custodians are identified.
Data retention periods are well defined.
Data is protected according to its sensitivity.
Q16} As part of the architecture of virtualized environments, in a bare metal or native
virtualization the hypervisor runs without:
any applications on the host operating system.
any applications on the guest operating system.
a guest operating system.
a host operating system.
Q17} Which of the following is MOST important to include in security awareness training?
The importance of complex passwords
Contact information for the organization's security team
Descriptions of the organization's security infrastructure
How to respond to various types of suspicious activity
Q18}Which of the following is MOST important to include in a contract to outsource data
processing that involves customer personally identifiable information (PII)?
The vendor must provide an independent report of its data processing facilities.
The vendor must compensate the organization if service levels are not met.
The vendor must comply with the organization's legal and regulatory requirements.
The vendor must sign a nondisclosure agreement (NDA) with the organization.
Q19} The PRIMARY reason for prohibiting developers from having access to the production
system environment is to prevent a developer from:
modifying production systems without proper authorization.
compiling codes in the production server to avoid excessive CPU usage.
accidentally copying test data to a production system data server.
colluding with production support to steal sensitive information.
Q20} Which of the following should an IS auditor expect to find when reviewing an IT balanced
scorecard?
An assessment of how senior management evaluates the IT department
An assessment of business processes
An assessment of controls needed to mitigate risks
An assessment of how senior management evaluates IT portfolio performance
Q21} Which of the following is the BEST indication that an information security awareness
program is effective?
A reduction in the number of information security attacks
A reduction in the cost of maintaining the information security program
A reduction in the success rate of social engineering attacks
A reduction in the number of reported information security incidents
Q22} In planning a major system development project, function point analysis would assist in:
determining the business functions undertaken by a system or program.
analyzing the functions undertaken by system users as an aid to job redesign.
estimating the size of a system development task.
estimating the elapsed time of the project.
Q23} Which of the following is MOST important to determine when conducting an audit of an
organization's data privacy practices?
HI Whether strong encryption algorithms are deployed for personal data protection
Whether the systems inventory containing personal data is maintained
Whether privacy technologies are implemented for personal data protection
Whether a disciplinary process is established for data privacy violations
Q24} Which of the following provides the BEST evidence of effective IT portfolio management?
The IT portfolio is updated as business strategy changes.
HI Programs in the IT portfolio are prioritized by each business function.
The IT portfolio is updated on the basis of current industry benchmarks.
IT portfolio updates are communicated when approved.
Q25} Which of the following should be of MOST concern to an IS auditor when reviewing the
protection of data?
Classified data is not encrypted.
Data is not properly classified.
The classification scheme is not published.
Passwords are not changed regularly.
Q26} When is it MOST important for an IS auditor to apply the concept of materiality in an audit?
When a violation of a regulatory requirement has been identified
When planning an audit engagement
When gathering information for the fieldwork
When evaluating representations from the auditee
Q27} Which of the following is the GREATEST concern associated with IS risk-based auditing
when audit resources are limited?
The audit schedule may become too predictable.
Conducting risk assessments may reduce the time available for auditing.
Some business processes may not be audited.
There may be significant delays in responding to management audit requests.
Q28} The quality assurance (QA) team is testing a new e-ticketing application prior to go live to
ensure that sales tax is calculated and applied correctly. Which of the following should be of
GREATEST concern?
User acceptance criteria for the test performed are not clearly defined.
The project manager wants to delay implementation by a few days.
The tax schedules are not uploaded into the production database.
User procedures to manage the e-ticketing application are still being drafted.
Q29}A source code repository should be designed to:
Oprevent changes from being incorporated into existing code.
provide automatic incorporation and distribution of modified code.
prevent developers from accessing secure source code.
provide secure versioning and backup capabilities for existing code.
Q30}Which of the following is MOST important for an IS auditor to review when assessing the
integrity of encryption controls for data at rest?
Frequency of encryption key changes
Encryption of test data
Length of encryption keys
Protection of encryption keys
Q31} Which of the following is the BEST way to reduce the risk associated with inadequate
segregation of duties for privileged users?
Require prior authorization of privileged users' actions.
Implement remote logging with independent monitoring
Implement keystroke logging.
Use data loss prevention (DLP) software.
Q32} An IS auditor finds that the cost of developing an application is now projected to
significantly exceed the budget. Which of the following is the GREATEST risk to communicate to
senior management?
Noncompliance with project methodology
Project abandonment
Increased staff turnover
Inability to achieve expected benefits
Q33} Which of the following is the PRIMARY reason for an IS auditor to perform a risk
assessment while executing a risk-based IS audit strategy?
It helps to identify areas that are most sensitive to fraudulent practices.
It helps to identify areas with relatively high probability of material problems.
It increases awareness of the types of management actions that may be inappropriate.
It ensures adherence to global audit standards.
Q34} An organization recently implemented a data warehouse that is pulling data from
geographically dispersed sources. Updates are not synchronized due to time zone differences.
Which of the following controls would MOST likely compensate for the lack of synchronization?
Backup controls
Concurrency controls
Discretionary access controls
13
Normalization controls
Q35} Which of the following is the BEST method for reducing data redundancy in a database?
Transaction logging
Data normalization
Periodic data review
Concurrent controls
HDD
Q36} Which of the following is the PRIMARY purpose of obtaining a baseline image during an
operating system audit?
To identify atypical running processes
To verify the integrity of operating system backups
To verify antivirus definitions
To identify local administrator account access
Q37} During which of the following processes would an IS auditor identify and evaluate the
design of IT controls?
Walk-throughs
Pre-audit discussions
Validation of factual accuracy
Review of prior year documentation
Q38} Which of the following is the MOST effective accuracy control for entry of a valid numeric
part number?
Hash totals
Online review of description
Self-checking digit
Comparison to historical order pattern
Q39} Once a security policy is approved by key stakeholders, the NEXT step should be to:
validate it against security standards.
HI update it according to schedule.
integrate it into the security awareness program.
share it with external auditors.
Q40} An IS auditor is reviewing the service agreement with a technology company that provides
IT help desk services to the organization. Which of the following monthly performance metrics
is the BEST indicator of service quality?
The percent of issues resolved by the first contact
ID The average turnaround time spent on each reported issue
The total number of users requesting help desk services
The average call waiting time on each request
Q41} Which of the following is the GREATEST benefit of an effective data classification process?
Appropriate ownership over data is assigned.
Data custodians are identified.
Data retention periods are well defined.
Data is protected according to its sensitivity.
Q42} Exception reports generated by application processing are MOST likely to trigger
processes related to:
incident management.
change management
project management.
configuration management.
Q43} How can an organization authorize traffic from remote users to corporate network
resources while ensuring traffic is encrypted and travels through a secure tunnel?
Ensuring all external traffic is routed through a perimeter firewall with user authentication
Requiring the use of a thin client to connect directly to the server
Requiring connections via a virtual private network (VPN) connection with a trusted certificate
Validating all data transfer requests through an encrypted reverse proxy
Q44} An organization considering the outsourcing of a business application should FIRST:
Operform a vulnerability assessment.
define service level requirements.
issue a request for proposal (RFP).
conduct a cost-benefit analysis.
Q45} An IS auditor has been asked to review an organization's IT resource management
practices. Which of the following findings should be of GREATEST concern?
The lack of a confidentiality agreement for IT management
Insufficient IT training
An undocumented IT strategy
An existing vacancy for an IT administrator
Q46} When reviewing an ongoing business process reengineering (BPR) project, which of the
following should be an IS auditor's GREATEST concern?
Control gaps are created but not addressed.
Existing processes may not be fully documented.
A business impact analysis (BIA) may not be carried out.
Additional cost may be required to stabilize the process.
Q47} Which of the following presents the GREATEST concern for an organization transitioning
from a partially remote to a fully remote operating model?
[1 Remote connection infrastructure capacity has not been tested for the workload.
Remote connection software licenses expire within the year and renewal costs are expected to
increase.
Employees have not been required to increase the complexity of their system passwords.
Employees using personal devices for access have not received additional security training.
Q48} As part of the architecture of virtualized environments, in a bare metal or native
virtualization the hypervisor runs without:
a guest operating system.
any applications on the guest operating system.
any applications on the host operating system.
a host operating system.
Q49} Which of the following would be an auditor's GREATEST concern when reviewing data
inputs from spreadsheets into the core finance system?
The department data protection policy has not been reviewed or updated for two years.
Undocumented code formats data and transmits directly to the database.
Spreadsheets are accessible by all members of the finance department.
There is not a complete inventory of spreadsheets, and file naming is inconsistent.
Q50} When is it MOST important for an IS auditor to apply the concept of materiality in an audit?
When gathering information for the fieldwork
When evaluating representations from the auditee
When planning an audit engagement
When a violation of a regulatory requirement has been identified
Q51} An organization is implementing a data loss prevention (DLP) system in response to a new
regulatory requirement. Reviewing which of the following would be MOST helpful in evaluating
the system's design?
Enterprise architecture (EA)
Industry trends
System manuals
Historical record of data breaches
Q52} Which of the following is the GREATEST benefit related to disaster recovery for an
organization that has converted its infrastructure to a virtualized environment?
Virtual servers reduce the time and complexity associated with backup procedures.
Virtual servers decrease the recovery time objective (RTO).
Virtual servers eliminate the need to verify backups.
Virtual servers can be recreated on similar hardware faster than restoring from backups.
Q53} Management states that a recommendation made during a prior audit has been
implemented, but the IS auditor doubts the effectiveness of the actions taken. Which of the
HI Perform testing or other audit procedures to confirm the status of the original risk
Report to audit management that the actions taken have not effectively addressed the original
risk.
Make an additional recommendation on how to remediate the finding.
Recommend external verification of management's preferred actions.
Q54} A fire alarm system has been installed in the computer room. The MOST effective location
for the fire alarm control panel would be inside the:
HI booth used by the building security personnel.
computer room closest to the server computers.
system administrator's office.
computer room closest to the uninterruptible power supply (UPS) module.
Q55} Transaction records from a business database were inadvertently deleted, and system
operators decided to restore from a snapshot copy. Which of the following provides the BEST
assurance that the transactions were recovered successfully?
Compare transaction values against external statements to verify accuracy.
Review transaction recovery logs to ensure no errors were recorded.
Recount the transaction records to ensure no records are missing.
Rerun the process on a backup machine to verify the results are the same.
Q56} Which of the following should be of GREATEST concern to an IS auditor when reviewing
the quality of business intelligence reports generated from a data warehouse?
Data quality reports are generated from the data warehouse in nightly batches.
Data errors in the reports are corrected within the data warehouse.
Data errors are not consistently reviewed by IT personnel.
Data quality reports do not provide real-time insight into business trends.
Q57} Which of the following should an IS auditor recommend be done FIRST when an
organization is made aware of a new regulation that is likely to impact IT security requirements?
Evaluate how security awareness and training content may be impacted.
Review the design and effectiveness of existing IT controls.
Determine which systems and IT-related processes may be impacted.
Update security policies based on the new regulation.
Q58} Which of the following BEST addresses the availability of an online store?
A mirrored site at another location
RAID level 5 storage devices
Online backups
Clustered architecture
Q59} As part of the architecture of virtualized environments, in a bare metal or native
virtualization the hypervisor runs without:
a host operating system.
a guest operating system.
any applications on the host operating system.
any applications on the guest operating system.
Q60}Which of the following areas is MOST important for an IS auditor to focus on when
reviewing the maturity model for a technology organization?
Standard operating procedures
Service level agreements (SLAs)
Roles and responsibility matrix
Business resiliency
Q61} A finance department has a multi-year project to upgrade the enterprise resource
planning (ERP) system hosting the general ledger, and in year one, the system version upgrade
will be applied. Which of the following should be the PRIMARY focus of the IS auditor reviewing
the first year of the project?
Regression testing
User acceptance testing (UAT)
Unit testing.
Network performance testing
Q62} Which type of attack targets security vulnerabilities in web applications to gain access to
data sets?
Rootkits
SQL injection
Phishing attacks
Denial of service (DoS)
Q63} An organization uses public key infrastructure (PKI) to provide email security. Which of the
following would be the MOST efficient method to determine whether email messages have
been modified in transit?
The message is encrypted using a symmetric algorithm.
The message is sent along with an encrypted hash of the message.
The message is encrypted using the private key of the sender.
The message is sent using Transport Layer Security (TLS) protocol.
Q64} Which of the following architectural components is MOST relevant for understanding the
security profile of a new software platform on the cloud?
Virtual network infrastructure design
Computing and storage configurations
Application-to-database connectivity
Backup and restoration capabilities
Q65} Which of the following should be an IS auditor's GREATEST concern when a data owner
assigns an incorrect classification level to data?
Data may not be encrypted by the system administrator.
Controls to adequately safeguard the data may not be applied.
Competitors may be able to view the data.
Control costs may exceed the intrinsic value of the IT asset.
Q66} A firewall between internal network segments improves security and reduces risk by:
ensuring all connecting systems have appropriate security controls enabled.
monitoring and reporting on sessions between network participants.
logging all packets passing through network segments.
m inspecting all traffic flowing between network segments and applying security policies.
Q67} Which of the following actions would be MOST appropriate for an IS auditor to consider
when given feedback that a recently completed audit did not consider inherently high-risk
controls?
Identify new risks to the process that were not considered in the review.
Determine if the planning steps align with industry best practices.
Re-communicate the audit results to the auditee.
Conduct a lessons learned activity including internal audit management.
Q68} Which of the following is MOST likely to increase non-sampling risk?
Improperly stratified populations
Inappropriate materiality ratings
Poor knowledge of the audit process
Decreased tolerance rate
Q69} An organization is migrating its HR application to an Infrastructure as a Service (laaS)
model in a private cloud. Who is PRIMARILY responsible for the security configurations of the
deployed application's operating system?
The cloud provider
The operating system vendor
The organization
The cloud provider's external auditor
Q70} Which of the following BEST enables an organization to determine the effectiveness of its
information security awareness program?
Reviewing security staff performance evaluations
Evaluating the results of a social engineering exercise
Measuring user satisfaction with the quality of the training
Performing an analysis of the number of help desk calls
Q71} Which of the following should be done FIRST to minimize the risk of unstructured data?
Implement strong encryption for unstructured data.
Implement user access controls to unstructured data.
Purchase tools to analyze unstructured data.
Identify repositories of unstructured data.
Q72} Which of the following represents the GREATEST risk to virtualized environments?
Hypervisors may be a single point of failure.
Servers may only be accessed remotely.
Virtual servers may not have the latest security updates.
Account reviews may not be performed for guest operating systems.
Q73} Which of the following is an IS auditor's BEST recommendation to mitigate the risk of
eavesdropping associated with an application programming interface (API) integration
implementation?
Implement Simple Object Access Protocol (SOAP),
Mask the API endpoints.
Encrypt the extensible markup language (XML) file.
0
Implement Transport Layer Security (TLS).
Q74} Which of the following should be of GREATEST concern to an IS auditor when auditing an
organization's IT strategy development process?
The IT strategy was developed before the business plan.
A business impact analysis (BIA) was not performed to support the IT strategy
The IT strategy was developed based on the current IT capability.
Information security was not included as a key objective in the IT strategic plan.
0
Q75} Which of the following would be MOST important to include in an IS audit report?
Specific technology solutions for each audit observation
The roadmap for addressing the various risk areas
The level of unmitigated risk along with business impact
0
Observations not reported as findings due to inadequate evidence
Q76} An IS auditor learns of organizational changes that might impact the annual audit plan.
Which of the following is the auditor's BEST course of action?
Modify the current audit plan.
Notify the audit committee of the changes.
Assess the impact of the changes on the audit plan.
Modify the audit plan after the changes occur.
Q77} What should an IS auditor ensure when a financial organization intends to utilize
production data in the testing environment?
The data utilized is complete.
The data utilized is accurate.
The data utilized is current.
The data utilized is de-identified.
Q78} Which of the following is the GREATEST benefit of an effective data classification process?
Data is protected according to its sensitivity.
Appropriate ownership over data is assigned.
Data retention periods are well defined.
Data custodians are identified.
Q79} Which of the following is the MOST effective control to protect the integrity of database
activity logs?
s Logs are periodically monitored and reviewed.
Read-only access to logs is granted to personnel.
Log access is restricted via multi-factor authentication.
Sensitive data contained in the logs is masked.
Q80} Which of the following should be of concern to an IS auditor reviewing an organization's
network to ensure attack vectors from the Internet are minimized?
A data loss prevention (DLP) system is behind the organization's firewalls.
The organization's email server is in the demilitarized zone (DMZ).
The organization employs different types of firewalls in the demilitarized zone (DMZ).
A router is Internet-facing at the network perimeter.
Q81} When testing the accuracy of transaction data, which of the following situations BEST
justifies the use of a smaller sample size?
The IS audit staff has a high level of experience.
Proper segregation of duties is in place.
The data can be directly changed by users.
It is expected that the population is error-free.
Q82} Which of the following provides the MOST useful information for performing a business
impact analysis (BIA)?
Inventory of relevant business processes
Documentation of application configurations
Results of business resumption planning efforts
Policies for business procurement
HD
Q83} Which of the following should be of GREATEST concern to an IS auditor who is assessing an
organization's configuration and release management process?
There is no centralized configuration management database (CMDB).
®
All changes require middle and senior management approval.
The organization does not use an industry-recognized methodology.
Changes and change approvals are not documented.
Q84} Which of the following is the MOST cost-effective way to determine the effectiveness of a
business continuity plan (BCP)?
Stress test
Post-implementation review
Full operational test
a
Tabletop exercise
Q85} An organization has decided to outsource a critical application due to a lack of specialized
resources. Which risk response has been adopted?
19 Mitigation
Sharing
Acceptance
Avoidance
Q86} While conducting a post-implementation review, an IS auditor determines that a key
deliverable was not met. What should the auditor do FIRST?
Document the issue and mark the project as incomplete.
Review lessons learned to verify whether the issue was documented.
Work with the project manager to determine the root cause.
19 Report the unmet deliverable to senior management.
Q87} Which of the following IT processes should be correlated to incidents as the BEST way to
support continuous improvement in service management?
Incident management
Change management
19 Problem management
Risk management
Q88}What is the PRIMARY benefit of using one-time passwords?
Users do not have to memorize complex passwords.
An intercepted password cannot be reused.
Security for applications can be automated.
Users cannot be locked out of an account.
Q89} Which of the following should an IS auditor expect to find when reviewing an IT balanced
scorecard?
An assessment of business processes
An assessment of how senior management evaluates the IT department
An assessment of how senior management evaluates IT portfolio performance
An assessment of controls needed to mitigate risks
Q90} A web application is developed in-house by an organization. Which of the following would
provide the BEST evidence to an IS auditor that the application is secure from external attack?
Database application monitoring logs
Code review by a third party
Web application firewall implementation
Penetration test results
Q91} In planning a major system development project, function point analysis would assist in:
estimating the elapsed time of the project.
estimating the size of a system development task.
analyzing the functions undertaken by system users as an aid to job redesign
determining the business functions undertaken by a system or program.
Q92} Which of the following is MOST important to have in place to manage the risk of a resource
shortage when there are multiple IT investment projects in progress?
IT risk management
IT change management
IT portfolio management
IT project management
Q93} Which type of control is an IS auditor MOST likely to recommend for an environment
where segregation of duties is not feasible?
Managerial control
Preventive control
Deterrent control
Compensating control
Q94} Which of the following should be of MOST concern to an IS auditor when reviewing the
protection of data?
Classified data is not encrypted.
The classification scheme is not published.
Data is not properly classified.
Passwords are not changed regularly.
Q95} Which of the following is the GREATEST concern associated with IS risk-based auditing
when audit resources are limited?
Conducting risk assessments may reduce the time available for auditing.
There may be significant delays in responding to management audit requests.
The audit schedule may become too predictable.
Some business processes may not be audited.
Q96} What is the PRIMARY purpose of performing a parallel run of a new system?
To train the end users and supporting staff on the new system
To validate the new system against its predecessor
To reduce the need for additional testing
s To verify the new system provides required business functionality
Q97} Which of the following is the BEST method for reducing data redundancy in a database?
Transaction logging
Data normalization
Concurrent controls
Periodic data review
Q98} Which of the following is MOST critical to the success of an information security program?
User accountability for information security
Integration of business and information security
Alignment of information security with IT objectives
Management's commitment to information security
Q99} Which of the following is used to prevent or manage concurrent edits to source code files?
Operating system permissions
Check-in/check-out process
Database locks.
File system permissions
Q100}A database administrator (DBA) should be prevented from:
having end user responsibilities.
using an emergency user ID.
having access to production files.
accessing sensitive information.
Q101}Which of the following provides the MOST comprehensive information about inherent
risk within an organization?
Business impact analysis (BIA)
Risk-based audit findings
Vulnerability analysis
Risk assessments
Q102} Management states that a recommendation made during a prior audit has been
implemented, but the IS auditor doubts the effectiveness of the actions taken. Which of the
following is the auditor's MOST appropriate course of action?
0 Recommend external verification of management's preferred actions.
Make an additional recommendation on how to remediate the finding.
Perform testing or other audit procedures to confirm the status of the original risk.
Report to audit management that the actions taken have not effectively addressed the original
risk
Q103} Which of the following provides the MOST useful information for performing a business
impact analysis (BIA)?
Policies for business procurement
Inventory of relevant business processes
Results of business resumption planning efforts
Documentation of application configurations
Q104} An IS auditor is concerned that unauthorized access to a highly sensitive data center
might be gained by piggybacking or tailgating. Which of the following is the BEST
recommendation?
Procedures for escorting visitors
Biometrics
Intruder alarms
Airlock entrance
Q105} Which of the following would MOST likely be detailed in an audit charter?
List of evidence required for the audit
Appointments needed with key process owners
Right to access relevant information
Timeline of the audit engagement
Q106} Demonstrated support from which of the following roles in an organization has the
MOST influence over information security governance?
Chief information officer (CIO)
Chief information security officer (CISO)
Board of directors
0
Information security steering committee
Q107} Which of the following is the PRIMARY reason for an IS auditor to perform a risk
assessment while executing a risk-based IS audit strategy?
It helps to identify areas that are most sensitive to fraudulent practices.
It increases awareness of the types of management actions that may be inappropriate.
It ensures adherence to global audit standards.
It helps to identify areas with relatively high probability of material problems.
0
Q108} Which of the following poses the GREATEST risk to an organization when employees use
public social networking sites?
Cross-site scripting (XSS)
Adverse posts about the organization
Social engineering
0
Copyright violations
Q109} While conducting an IT operations audit, an internal IS auditor discovers there are backup
media missing that potentially contain unencrypted data. Which of the following should be the
IS auditor's NEXT step?
Determine what data is on the missing media.
11 Notify legal and regulatory authorities of the lost media.
Write a report regarding the missing media.
Review the backup media policy and procedures.
Q110} Which of the following would provide the MOST useful information to an IS auditor when
evaluating the maturity of an IT department's incident management processes?
Reviewing incident management logs from the previous year
Benchmarking the department's incident handling procedures
1] Identifying unmitigated risks in the way incidents are handled
Performing a gap analysis of incident management procedures
Q111} Which of the following is critical to the successful establishment of an enterprise IT
architecture?
II Organizational support for standardization
An architecture encompassing only critical systems
A well-defined data migration policy
Comparison of the architecture with that of other organizations
Q112} Which of the following audit procedures would provide the BEST assurance that an
application program is functioning as designed?
Interviewing business management
Reviewing program documentation
Using a continuous auditing module
Confirming accounts
Q113} To mitigate the risk of exposing data through application programming interface (API)
queries, which of the following design considerations is MOST important?
Data quality
Data retention
Data minimization
Data integrity
Q114}Which of the following is a method to prevent disclosure of classified documents printed
on a shared printer?
Encrypting the data stream between the user's computer and the printer
Using passwords to allow authorized users to send documents to the printer
Producing a header page with classification level for printed documents
Requiring a key code to be entered on the printer to produce hard copy
Q115} Which of the following BEST enables an IS auditor to combine and compare access
control lists from various applications and devices?
Integrated test facility (ITF)
Snapshots
Data analytics
Audit hooks
Q116} A source code repository should be designed to:
prevent changes from being incorporated into existing code.
provide automatic incorporation and distribution of modified code.
provide secure versioning and backup capabilities for existing code.
prevent developers from accessing secure source code.
Q117} When is it MOST important for an IS auditor to apply the concept of materiality in an
audit?
When planning an audit engagement
a When gathering information for the fieldwork
When a violation of a regulatory requirement has been identified
When evaluating representations from the auditee
Q118} Which of the following BEST enables the effectiveness of an organization's disaster
recovery team?
Periodic testing and updating of recovery protocols
Parallel business continuity and tabletop testing
Engaging a third-party disaster recovery service
Daily security threat briefings for the recovery team
Q119} Which of the following should an IS auditor recommend be done FIRST when an
organization is made aware of a new regulation that is likely to impact IT security requirements?
Determine which systems and IT-related processes may be impacted.
Review the design and effectiveness of existing IT controls.
Evaluate how security awareness and training content may be impacted.
Update security policies based on the new regulation.
Q120} An IS auditor is reviewing a bank's service level agreement (SLA) with a third-party
provider that hosts the bank's secondary data center. Which of the following findings should be
of GREATEST concern to the auditor?
The SLA has not been reviewed in more than a year.
0 The recovery time objective (RTO) has a longer duration than documented in the disaster
recovery plan (DRP).
The recovery point objective (RPO) has a shorter duration than documented in the disaster
recovery plan (DRP).
Backup data is hosted online only.
Q121} An organization has shifted from a bottom-up approach to a top-down approach in the
development of IT policies. This should result in:
s greater consistency across the organization.
a more comprehensive risk assessment plan.
a synthesis of existing operational policies.
greater adherence to best practices.
Q122} Email required for business purposes is being stored on employees' personal devices.
Which of the following is an IS auditor's BEST recommendation?
in
Implement an email containerization solution on personal devices.
Prohibit employees from storing company email on personal devices.
Require employees to utilize passwords on personal devices.
Ensure antivirus protection is installed on personal devices.
Q123} Which of the following is MOST important to include in security awareness training?
Contact information for the organization's security team
Descriptions of the organization's security infrastructure
The importance of complex passwords
How to respond to various types of suspicious activity
Q124} Which of the following is MOST important during software license audits?
Judgmental sampling
Compliance testing
Substantive testing
0 Stop-or-go sampling
Q125} Which of the following is the BEST indication that an information security awareness
program is effective?
A reduction in the cost of maintaining the information security program
A reduction in the number of reported information security incidents
A reduction in the number of information security attacks
19 A reduction in the success rate of social engineering attacks
Q126} What is the BEST way to reduce the risk of inaccurate or misleading data proliferating
through business intelligence systems?
Implement data entry controls for new and existing applications.
19 Establish rules for converting data from one format to another.
Develop a metadata repository to store and access metadata.
Implement a consistent database indexing strategy.
Q127} With regard to resilience, which of the following is the GREATEST risk to an organization
that has implemented a new critical system?
There is no plan for monitoring system downtime.
A business impact analysis (BIA) has not been performed.
Business data is not sanitized in the development environment.
The process owner has not signed off on user acceptance testing (UAT).
Q128} Which of the following provides the BEST assurance of data integrity after file transfers?
Reasonableness check
Hash values
Check digits
Monetary unit sampling
Q129} An incident response team has been notified of a virus outbreak in a network subnet.
Which of the following should be the NEXT step?
Verify that the compromised systems are fully functional.
0 Remove and restore the affected systems.
Document the incident.
Focus on limiting the damage.
Q130} Which of the following is an IS auditor's BEST recommendation to mitigate the risk of
eavesdropping associated with an application programming interface (API) integration
implementation?
Implement Simple Object Access Protocol (SOAP).
Implement Transport Layer Security (TLS).
Encrypt the extensible markup language (XML) file.
Mask the API endpoints.
Q131} Which of the following is the MOST cost-effective way to determine the effectiveness of a
business continuity plan (BCP)?
E Full operational test
Tabletop exercise
Post-implementation review
Stress test
Q132} An IS auditor has found that despite an increase in phishing attacks over the past two
years, there has been a significant decrease in the success rate. Which of the following is the
Implementation of an intrusion detection system (IDS)
Enhanced training for incident responders
Development of an incident response plan
Implementation of a security awareness program
Q133} A request for proposal (RFP) for the acquisition of computer hardware should include:
maximum cost restriction.
support and maintenance requirements.
the requirement that the supplier allow a right of audit.
detailed specification of the current hardware infrastructure.
Q134} A configuration management audit identified that predefined automated procedures are
used when deploying and configuring application infrastructure in a cloud-based environment.
Which of the following is MOST important for the IS auditor to review?
Processes for making changes to cloud environment specifications
Number of administrators with access to cloud management consoles
Storage location of configuration management documentation
Contracts of vendors responsible for maintaining provisioning tools
Q135} Which of the following is the MOST effective accuracy control for entry of a valid numeric
part number?
Hash totals
Comparison to historical order pattern
Online review of description
Self-checking digit
Q136} A programmer has made unauthorized changes to key fields in a payroll system report.
Which of the following control weaknesses would have contributed MOST to this problem?
The programmer has access to the production programs.
Payroll files were not under the control of a librarian.
The programmer did not involve the user in testing.
The user requirements were not documented.
Q137} Which of the following provides the BEST audit evidence that a firewall is configured in
compliance with the organization's security policy?
Performing penetration testing
Reviewing the rule base
Analyzing log files
Analyzing how the configuration changes are performed
Q138} A vendor requires privileged access to a key business application. Which of the following
is the BEST recommendation to reduce the risk of data leakage?
Implement real-time activity monitoring for privileged roles.
Perform a review of privileged roles and responsibilities.
Require the vendor to implement job rotation for privileged roles.
Include the right-to-audit in the vendor contract.
Q139} An organization is considering using production data for testing a new application's
functionality. Which of the following data protection techniques would BEST ensure that
personal data cannot be inadvertently recovered in test environments while also reducing the
need for strict confidentiality of the data?
Data encryption.
Data anonymization
Data normalization
Data minimization
Q140} Which of the following is the BEST way to ensure email confidentiality in transit?
Encryption of corporate network traffic
End-to-end encryption
Digital signatures
Complex user passwords
Q141} Which of the following is the BEST way to help ensure new IT implementations align with
enterprise architecture (EA) principles and requirements?
in Conduct EA reviews as part of the change advisory board.
Document the security view as part of the EA.
Perform mandatory post-implementation reviews of IT implementations.
Consider stakeholder concerns when defining the EA.
Q142} Which of the following is an IS auditor's BEST approach when preparing to evaluate
whether the IT strategy supports the organization's vision and mission?
Solicit feedback from other departments to gauge the organization's maturity
Review strategic projects for return on investments (ROIs).
Review the organization's key performance indicators (KPIs).
0
Meet with senior management to understand business goals.
Q143} Which of the following is the PRIMARY purpose of obtaining a baseline image during an
operating system audit?
To verify antivirus definitions
To identify atypical running processes
To identify local administrator account access
To verify the integrity of operating system backups
0
Q144} Which of the following is the BEST reason for an IS auditor to emphasize to management
the importance of using an IT governance framework?
Frameworks help facilitate control self-assessments (CSAS).
Frameworks enable IT benchmarks against competitors.
Frameworks can be tailored and optimized for different organizations.
0
Frameworks help organizations understand and manage IT risk.
Q145} An IS auditor is reviewing the service agreement with a technology company that
provides IT help desk services to the organization. Which of the following monthly performance
metrics is the BEST indicator of service quality?
The average turnaround time spent on each reported issue
The total number of users requesting help desk services
The percent of issues resolved by the first contact
0
The average call waiting time on each request
Q146} An IS auditor is reviewing the system development practices of an organization that is
about to move from a waterfall to an agile approach. Which of the following is MOST important
Secure code review
Capacity planning
Release management
Code versioning
0
Q147} As part of compliance testing, which of the following is the PRIMARY source of
information for testing user access controls?
System user access list
Key risk indicators (KRIs)
User access policy
0
Previous internal audit reports
Q148} While conducting a post-implementation review, an IS auditor determines that a key
deliverable was not met. What should the auditor do FIRST?
Review lessons learned to verify whether the issue was documented.
Document the issue and mark the project as incomplete.
Work with the project manager to determine the root cause.
Report the unmet deliverable to senior management.
Q149} Which of the following concerns is MOST effectively addressed by implementing an IT
framework for alignment between IT and business objectives?
Inadequate IT change management practices
Inaccurate business impact analysis (BIA)
Inadequate IT portfolio management
Lack of a benchmark analysis
Q150} An organization has initiated the process of divesting itself of a business in one of its
operating jurisdictions. Meanwhile, new data privacy regulations for that region have just been
announced. What should the IS auditor do FIRST when developing an audit plan for the
organization?
Exclude the business entity being divested from the audit plan.
Conduct an audit of the affected business entity immediately.
Assess the impact of the new regulations on the affected business entity.
Recommend that management accept the risk arising from the new requlations.
Q151} Which of the following is the GREATEST benefit of an effective data classification process?
Data custodians are identified.
Appropriate ownership over data is assigned,
Data retention periods are well defined.
Data is protected according to its sensitivity.
Q152} As part of the architecture of virtualized environments, in a bare metal or native
virtualization the hypervisor runs without:
a guest operating system.
any applications on the guest operating system.
a host operating system.
any applications on the host operating system.
Q153} An organization is planning to hire a third party to develop software. What is the MOST
appropriate way for the organization to ensure access to code if the software development
company goes out of business?
Establish a software escrow agreement.
Establish a service level agreement (SLA).
Request software licenses.
Request a copy of the software.
Q154} When reviewing an ongoing business process reengineering (BPR) project, which of the
following should be an IS auditor's GREATEST concern?
Existing processes may not be fully documented.
Control gaps are created but not addressed.
A business impact analysis (BIA) may not be carried out.
Additional cost may be required to stabilize the process.
Q155} An IT steering committee assists the board of directors in fulfilling IT governance duties
by:
developing IT policies and procedures for project tracking.
approving IT security awareness training content.
HI overseeing major projects and IT resource allocation.
assigning IT services to infrastructure components.
Q156} Recovery facilities providing a redundant combination of Internet connections to the
local communications loop is an example of which type of telecommunications continuity?
Voice recovery
Long-haul network diversity
Last-mile circuit protection
HI Alternative routing
Q157} How can an organization authorize traffic from remote users to corporate network
resources while ensuring traffic is encrypted and travels through a secure tunnel?
Requiring connections via a virtual private network (VPN) connection with a trusted certificate
Validating all data transfer requests through an encrypted reverse proxy
Requiring the use of a thin client to connect directly to the server
Ensuring all external traffic is routed through a perimeter firewall with user
Q158} Exception reports generated by application processing are MOST likely to trigger
processes related to:
project management.
configuration management.
incident management.
change management.
Q159} Backup procedures for an organization's critical data are considered to be which type of
control?
Directive
Detective
Corrective
Compensating
Q160} An organization uses public key infrastructure (PKI) to provide email security. Which of
the following would be the MOST efficient method to determine whether email messages have
been modified in transit?
The message is sent using Transport Layer Security (TLS) protocol.
The message is encrypted using the private key of the sender.
The message is sent along with an encrypted hash of the message.
The message is encrypted using a symmetric algorithm.
Q161} An IS auditor conducts a review of a third-party vendor's reporting of key performance
indicators (KPIs). Which of the following findings should be of MOST concern to the auditor?
KPIs are not clearly defined.
KPI data is not being analyzed.
KPIs have never been updated.
Some KPIs are not documented.
Q162} Which of the following observations should be of GREATEST concern to an IS auditor
when auditing web application security control as part of an IT general controls audit?
The application control configuration is not available.
Application control is not aligned with an IT framework.
An application control matrix has not been established.
An application control assessment has not been performed.
Q163} When auditing the feasibility study of a system development project, the IS auditor
should:
review the request for proposal (RFP) to ensure that it covers the scope of work.
review qualifications of key members of the project team.
review cost-benefit documentation for reasonableness.
ensure that vendor contracts are reviewed by legal counsel.
Q164} An organization recently implemented a data warehouse that is pulling data from
geographically dispersed sources. Updates are not synchronized due to time zone differences.
Which of the following controls would MOST likely compensate for the lack of synchronization?
Concurrency controls
Normalization controls
Backup controls
Discretionary access controls
Q165} Which of the following BEST mitigates the risk associated with the deployment of a new
production system?
Release management
Configuration management
Incident management
Problem management
Q166} Which of the following is the BEST method to delete sensitive information from storage
media that will be reused?
Multiple overwriting
Crypto-shredding
Re-partitioning
Reformatting
Q167} Which of the following is the PRIMARY objective of implementing privacy-related
controls within an organization?
To identify data at rest and data in transit for encryption
To provide options to individuals regarding use of their data
To prevent confidential data loss
To comply with legal and regulatory requirements
Q168} An organization considering the outsourcing of a business application should FIRST:
define service level requirements.
perform a vulnerability assessment.
conduct a cost-benefit analysis.
issue a request for proposal (RFP).
Q169} Which of the following controls associated with software development would be
classified as a preventive control to address scope creep?
Iteration retrospective
Iteration review
System demo
Backlog grooming
Q170} An IT balanced scorecard is BEST used for which of the following purposes?
Measuring risk in IT processes
Monitoring strategic performance
Evaluating IT's financial position
Evaluating business processes
Q171} Which of the following would protect the confidentiality of information sent in email
messages?
13 Digital signatures
Secure Hash Algorithm 1 (SHA-1)
Encryption
Digital certificates
Q172}Which of the following is MOST important for an IS auditor to review when determining
whether IT investments are providing value to the business?
Return on investment (ROI)
Total cost of ownership (TCO)
Business strategy
s Business cases
Q173} In a virtualized environment, which of the following techniques BEST mitigates the risk of
pervasive network attacks?
Segmentation
Demilitarized zone (DMZ)
Configuration assessment
Encryption
Q174} Which of the following should an IS auditor be MOST concerned with when reviewing the
IT asset disposal process?
Data migration to the new asset
Monetary value of the asset
Data stored on the asset
Certificate of destruction
Q175} Which of the following should be the FIRST consideration when deciding whether data
should be moved to a cloud provider for storage?
Data storage costs
Data classification
Service level agreements (SLAs)
Vendor cloud certification
Q176} Which of the following is the BEST way to reduce the risk associated with inadequate
segregation of duties for privileged users?
Implement remote logging with independent monitoring.
Use data loss prevention (DLP) software.
Implement keystroke logging.
Require prior authorization of privileged users' actions.
Q177} Which of the following is an IS auditor's BEST course of action when the auditee indicates
that a corrective action plan for a high-risk finding will take longer than expected?
Accept the longer target date and document it in the audit system.
Determine if an interim compensating control has been implemented.
Require that remediation is completed in the agreed timeframe.
Escalate the overdue finding to the audit committee.
Q178} Which of the following is the PRIMARY reason to perform a risk assessment?
To achieve compliance with regulatory requirements.
To help allocate budget for risk mitigation controls
To determine the current risk profile
To ensure alignment with the business impact analysis (BIA)
Q179} Which of the following should be done FIRST when planning to conduct internal and
external penetration testing for a client?
Establish the rules of engagement.
®
Establish the timing of testing.
Determine the test reporting.
Identify milestones.
Q180} What is the PRIMARY objective of evaluating the readiness of an information system
implementation?
Determine whether the system implementation is on schedule.
Determine whether the system complies with the organization's policy.
Determine whether the system meets business requirements.
s
Determine whether the system meets return on investment (ROI).
Q181} When reviewing the functionality of an intrusion detection system (IDS), the IS auditor
should be MOST concerned if:
detected events have increased.
actual attacks have not been identified.
false positives have been reported.
legitimate packets blocked by the system have increased.
Q182} Which of the following should be of MOST concern to an IS auditor reviewing the
information systems acquisition, development, and implementation process?
Data owners are not trained on the use of data conversion tools.
A post-implementation lessons-learned exercise was not conducted.
System deployment is routinely performed by contractors.
There is no system documentation available for review.
Q183} An organization has decided to migrate its underlying technology, and an enterprise
architect is tasked with proposing the blueprint for the future state architecture. Which of the
Reducing the number of unsupported systems
Aligning the business IT architecture with industry standards
Ensuring IT enables the business strategy
Ensuring technology cost reductions
Q184} Which of the following is the BEST preventive control to protect the confidentiality of
data on a corporate smartphone in the event it is lost?
Password for device authentication
Remote data wipe program
Encryption of the data stored on the device
Biometric authentication for the device
Q185} Which of the following applications should an IS auditor consider to be the HIGHEST
priority when reviewing disaster recovery planning (DRP) tests for an e-commerce company?
An application for financial management
An application for IT performance monitoring
An application for traffic load balancing
An application for HR management
Q186} An e-commerce transaction stopped during processing due to a sudden power outage.
Which of the following principles ensures transactions can be rolled back appropriately?
Atomicity
Durability
Integrity
Consistency
Q187} When planning an internal penetration test, which of the following is the MOST
important step prior to finalizing the scope of testing?
Agreeing on systems to be excluded from the testing scope with the IT department
Notifying the IT security department regarding the testing scope
Ensuring the scope of penetration testing is restricted to the test environment
Obtaining management's consent to the testing scope in writing
Q188} Which of the following applications has the MOST inherent risk and should be prioritized
during audit planning?
An onsite application that is unsupported
A decommissioned legacy application
An outsourced accounting application
An internally developed application
Q189} Which of the following would provide the BEST evidence of the effectiveness of
mandated annual security awareness training?
Results of a third-party penetration test
Trending of social engineering test results
Surveys completed by randomly selected employees
Number of security incidents
Q190} Which of the following is MOST important for an IS auditor to validate when auditing
network device management?
All devices are located within a protected network segment.
All devices have current security patches assessed.
Backup policies include device configuration files.
Devices cannot be accessed through service accounts.
Q191} An IS auditor discovers that due to resource constraints, a database administrator (DBA) is
responsible for developing and executing changes into the production environment. Which of
the following should the auditor do FIRST?
Report a potential segregation of duties violation.
Ensure a change management process is followed prior to implementation.
Determine whether another DBA could make the changes.
Identify whether any compensating controls exist.
Q192} Which of the following is an IS audit professional ethics violation?
Providing confidential information in response to a legal request
Making multiple errors in performing audit work
Disagreeing with management's assertions
m Withholding facts that affect audit conclusions
Q193}Which of the following areas is MOST important for an IS auditor to focus on when
reviewing the maturity model for a technology organization?
Business resiliency
Standard operating procedures
Service level agreements (SLAs)
Roles and responsibility matrix
Q194} The objectives of business process reengineering (BPR) should PRIMARILY include:
system improvements.
organizational structure changes.
performance efficiencies.
incremental changes in productivity.
Q195} Which of the following should be the MOST important consideration in IT portfolio
management?
Selecting IT investment projects that align with corporate strategy
Aligning IT portfolio processes with corporate objectives
Determining the opportunity cost of IT investment projects
Increasing the budget and resources allocated for IT investments
Q196} Which of the following would be an auditor's GREATEST concern when reviewing data
inputs from spreadsheets into the core finance system?
Undocumented code formats data and transmits directly to the database.
Spreadsheets are accessible by all members of the finance department.
The department data protection policy has not been reviewed or updated for two years
There is not a complete inventory of spreadsheets, and file naming is inconsistent.
Q197} Which of the following would BEST help an IS auditor identify Software as a Service (SaaS)
applications that are operating outside of an organization's cloud governance?
Reviewing access logs provided by SaaS application service providers
Obtaining third-party cloud compliance reporting
Assessing financial records to detect recent cloud service purchases
Reviewing reports produced by a cloud access security broker (CASB)
Q198} An organization is migrating its HR application to an Infrastructure as a Service (laaS)
model in a private cloud. Who is PRIMARILY responsible for the security configurations of the
deployed application's operating system?
IS The cloud provider
The cloud provider's external auditor
The operating system vendor
The organization
Q199} An organization is concerned with meeting new regulations for protecting data
confidentiality and asks an IS auditor to evaluate their procedures for transporting data. Which
of the following would BEST support the organization's objectives?
Dedicated lines
Cryptographic hashes
Encryption
0
Virtual local area network (VLAN)
Q200} Which of the following is an IS auditor's BEST recommendation to protect an organization
from attacks when its file server needs to be accessible to external users?
Enforce a secure tunnel connection.
Implement a secure protocol.
Set up a demilitarized zone (DMZ).
Enhance internal firewalls.
0
Q201} Which of the following would be MOST important to include in an IS audit report?
Specific technology solutions for each audit observation
Observations not reported as findings due to inadequate evidence
The level of unmitigated risk along with business impact
0
The roadmap for addressing the various risk areas
Q202} Which of the following risks is BEST mitigated by implementing an automated three-way
match?
Inaccurate customer records
Inaccurate customer discounts
Purchase order delays
Invalid payment processing
Q203} One advantage of monetary unit sampling is the fact that:
large-value population items are segregated and audited separately.
it increases the likelihood of selecting material items from the population.
results are stated in terms of the frequency of items in error.
it can easily be applied manually when computer resources are not available.
Q204} During a follow-up audit, an IS auditor finds that senior management has implemented a
different remediation action plan than what was previously agreed upon. Which of the
following is the auditor's BEST course of action?
Report the deviation by the control owner in the audit report.
Evaluate the implemented control to ensure it mitigates the risk to an acceptable level
Request justification from management for not implementing the recommended control
Cancel the follow-up audit and reschedule for the next audit period.
Q205} As part of a follow-up of a previous year's audit, an IS auditor has increased the expected
error rate for a sample. What is the impact?
Required sample size increases
Residual risk decreases
Standard deviation decreases
Degree of assurance increases
Q206} As part of a follow-up of a previous year's audit, an IS auditor has increased the expected
error rate for a sample. What is the impact?
Required sample size increases
Residual risk decreases
Standard deviation decreases
Degree of assurance increases
Q207} Attribute sampling is BEST suited to estimate:
the total error amount in the population.
standard deviation from the mean.
the true monetary value of a population.
the degree of compliance with approved procedures.
Q208} Once a security policy is approved by key stakeholders, the NEXT step should be to:
validate it against security standards.
integrate it into the security awareness program.
update it according to schedule.
share it with external auditors.
Q209} Which of the following should be the PRIMARY objective of an organization's incident
management program?
Closing incidents in accordance with service level agreements (SLAs)
Reducing the number and severity of security incidents throughout the organization
Enabling the organization to resume normal business operations
Preventing recurrence of similar incidents in the future
Q210} An IS auditor is reviewing the service management of an outsourced help desk. Which of
the following is the BEST indicator of how effectively the service provider is performing this
Call transcript reviews
HI Average ticket age
Customer satisfaction ratings
Number of calls worked
Q211} Which of the following should be used as the PRIMARY basis for prioritizing IT projects
and initiatives?
Expected business value
Estimated cost and time
Available resources
Level of risk reduction
Q212} An organization is migrating its HR application to an Infrastructure as a Service (laaS)
model in a private cloud. Who is PRIMARILY responsible for the security configurations of the
deployed application's operating system?
The operating system vendor
The cloud provider's external auditor
The organization
The cloud provider
Q213} Which of the following would a digital signature MOST likely prevent?
Repudiation
Unauthorized change
Corruption
Disclosure
Q214} An organization's database administrator (DBA) has implemented native database
auditing. Which of the following is the GREATEST concern with this situation?
Production database performance may be negatively affected.
Development of supplementary tools for database monitoring may be required
Configuration management resilience may be impaired.
Policy-driven event logging may be impaired.
Q215} An IS auditor engaged in developing the annual internal audit plan learns that the chief
information officer (CIO) has requested there be no IS audits in the upcoming year, as more time
is needed to address a large number of recommendations from the previous year. Which of the
following should the auditor do FIRST?
19 Notify the chief operating officer (COO) and discuss the audit plan risks.
Exclude IS audits from the upcoming year's plan
Increase the number of IS audits in the plan.
Escalate to audit management to discuss the audit plan.
Q216} A new system development project is running late against a critical implementation
deadline. Which of the following is the MOST important activity?
19 Perform user acceptance testing (UAT).
Ensure that code has been reviewed.
Perform a pre-implementation audit.
Document last-minute enhancements.
Q217} An IS auditor has identified potential fraud activity perpetrated by the network
administrator. What should the auditor do FIRST?
Review the audit finding with the audit committee prior to any other discussions
Share the potential audit finding with the security administrator.
Notify the audit committee to ensure a timely resolution
Perform more detailed tests prior to disclosing the audit results.
Q218} An IS auditor observes that a large number of departed employees have not been
removed from the accounts payable system. Which of the following is MOST important to
The ability of departed employees to actually access the system
The frequency of intrusion attempts associated with the accounts payable system
The process for terminating access of departed employees
The frequency of user access reviews performed by management
Q219} Which of the following is the BEST way to reduce the risk of vulnerabilities introduced by
rapid deployment of applications?
Review change management policies and procedures.
Review a sample of historical production changes to identify abnormalities.
Perform security audits during the development life cycle.
Conduct a post-deployment security audit to identify vulnerabilities.
Q220} Which of the following is an example of a preventive control for physical access?
Implementing a centralized logging server to record instances of staff logging into workstations
Installing closed-circuit television (CCTV) cameras for all ingress and egress points
Keeping log entries for all visitors to the building
Implementing a fingerprint-based access control system for the building
Q221} An IS auditor requests direct access to data required to perform audit procedures instead
of asking management to provide the data. Which of the following is the PRIMARY advantage of
this approach?
Data confidentiality
Audit efficiency
Professionalism
Audit transparency
Q222}An organization is concerned about duplicate vendor payments on a complex system
with a high volume of transactions. Which of the following would be MOST helpful to an IS
auditor to determine whether duplicate vendor payments exist?
Computer-assisted technique
Statistical sampling
Process walk-through
Stratified sampling
Q223} Which of the following is the MOST important consideration for an IS auditor when using
sampling techniques?
Quantify the probability of error..
Quantify the level of risk.
Apply professional judgment
Consider each item for selection.
Q224} The following findings are the result of an IS auditor's post-implementation review of a
newly implemented system. Which of the following findings is of GREATEST significance?
Monthly dashboards did not always contain deliverables.
Measurable benefits were not defined.
The project's 10% budget overrun was not reported to senior management.
A lessons-learned session was never conducted.
Q225}Which of the following is the BEST way for an organization that is using a Software as a
Service (SaaS) application to reduce its risk associated with the collection and protection of
personal information?
Only allow remote access to personal information from an alternate site.
Limit the amount of personal information collected to the minimum required
Encrypt personal information held by the organization
Limit the amount of personal information collected to industry standards.
Q226} An IS auditor finds that application servers had inconsistent security settings leading to
potential vulnerabilities. Which of the following is the BEST recommendation by the IS auditor?
Perform a penetration test
Perform a configuration review.
Improve the change management process.
Establish security metrics.
Q227} When an organization conducts business process improvements, the IS auditor should be
MOST concerned with the:
metrics used to evaluate key operating segments.
lack of version control over process documentation
adequacy of reporting to senior management.
adequacy of the controls in the redesigned process
Q228} Due to technical limitations, an organization is not able to implement encryption of
credit card details in the customer database. Which of the following would provide the BEST
Data masking of credit card details on screen
Encryption of credit card details in transit
Tokenization of credit card details
Multi-factor authentication to access the database
Q229} Which of the following is the MOST likely reason that local area network (LAN) servers can
contribute to the rapid distribution of viruses?
The server's file-sharing function facilitates distribution of files.
Server software is the first to be infected.
The server exchanges data with each workstation at logon time.
Users of a server often load the same programs.
Q230} Rather than decommission an entire legacy application, an IT department is replacing
specific modules while maintaining those still relevant. Which of the following artifacts is MOST
important for an IS auditor to review?
Application provider contract
Future state architecture and requirements
Applicable licensing agreements for the application
IT service management catalog and service level requirements
Q231} Which of the following would aid an IS auditor reviewing the integrity of program
changes migrated into production?
Operating system log data
Tape management system
Database schema
E Configuration management system
Q232} Which of the following is the BEST way to prevent a virus from spreading throughout a
local area network (LAN)?
Prohibiting user access to the Internet.
Having a memory resident virus-scanning program on network servers
Scanning the hard disks in the network for viruses on a daily basis
Disabling the ability to download executable files
Q233} Which of the following is the ULTIMATE objective of performing a phishing simulation
test?
HI To improve the level of security awareness
To reduce the likelihood of cyber incidents
To identify the occurrence of cyber events
To remove the need to install spam filtering
Q234} Which of the following BEST protects evidence in a forensic investigation?
Rebooting the affected system
Powering down the affected system
m Imaging the affected system
Protecting the hardware of the affected system
Q235} Which of the following can only be provided by asymmetric encryption?
Information privacy
Data availability
Nonrepudiation
256-bit key length
Q236} Which of the following should be considered when examining fire suppression systems
as part of a data center environmental controls review?
Insite replacement availability
Installation manuals
Insurance coverage
Maintenance procedures
Q237} One advantage of monetary unit sampling is the fact that
it increases the likelihood of selecting material items from the population.
large-value population items are segregated and audited separately
results are stated in terms of the frequency of items in error.
it can easily be applied manually when computer resources are not available
Q238} Which of the following should be the GREATEST concern to an IS auditor reviewing an
organization's method to transport sensitive data between offices?
The method relies exclusively on the use of digital signatures.
The method relies exclusively on the use of asymmetric encryption algorithms
The method relies exclusively on the use of public key infrastructure (PKI).
The method relies exclusively on the use of 128-bit encryption.
Q239} An organization using a cloud provider for its online billing system requires the website
to be accessible to customers at all times. What is the BEST way to verify the organization's
Agree on periodic performance discussions with the vendor.
Monitor the service level agreement (SLA) with the vendor.
Require the vendor to report any outages longer than five minutes.
Invoke the right-to-audit clause.
HDD
Q240} Which of the following metrics is MOST helpful for evaluating the effectiveness of
problem management practices?
The percentage of incidents resolved within a service level agreement (SLA)
The number of incidents investigated and diagnosed
The number of recurring incidents that cause downtime
®
The average time to detect and prioritize an incident
When developing customer-facing IT applications. in which stage ^
of the system development ife cycle <$QLC) is it MOST henef i to consider date privacy principles ?
Software selection and acquisition
o Systems design atxi architecture
[5] Requirements definition
User acceptance testing (UAT )
Aft organnation prodxe$ control reports with a desktop application that accesses data m the control production database Which of ihe following ^/ou < oi gwe an $ audits concern acor me reliability of iitese repods ?
t
'
^ 3 The report definitions file is not included in routine backups
The reports aie puntad hy the same person who rev ay/s lltairt
The refxirts available to ait eix ! itsars
O Tlw report refinilions can be mortified by end users
Which of the following is (ho PRIMARY advantage of u $ mg an automated security log monitonng too instead of conducting a manual review to monitor the use of privileged access?
*
: Case of storing and maintaining fog file
0 increased likelihood of detecting suspicious activity
O Case of tog retrieval for aud t purposes
Reduced costs associated vwth automat ng me review
Which of me following is the MAIN r SK associated with adding a now system functionality cunng the development phase without follow ng a project change management process^
O The project may go over budget.
0 The now functionalit may not moot requ moments
.
O The project may fail to moot the established deadline
The added functionality has net boon documented
Which of the following is the PRIMARY advantage of using an automated secunty log monitonng toot nsteac of corvducting a manual review to monitor the use of privileged access^
Case of stonng and maintaining log file
Q increased liketihooc of detecting suspicious activity
o Case of log retneva for aud t purposes
Reduced costs associated with automat ng the review
Which of the following BEST describes the role of the IS auditor m a control self- assessment (CSA)?
Approver
Reviewer
0 facilitator
implementor
An IT governance body wants to determine whether IT service delivery is based on consistently elective processes Winch of the following is the BEST approach?
0 evaluate Key performance indicators KPis)
(
Conduct a gap analysis
Develop a maturity trod*
O implement a control sff assessment (CSA )
Which of tho following is the GREATEST benefit of adopting an Agile audit methodology '
)
O Annual cost savings
0 Redjced documentation requirements
0 Getter ability to address key nsks
G Less frequent client interact on
Which of the following shook) be an IS auditor's GREATEST concern when reviewing a reciprocal disaster recovery agreement between two organizations'*
Right to temunate the agreement
Dfferences in IT policies and procedures
0 Trecuency of system testing
Maintenance of hardware and software compatibility
Which of the following provides the BEST evidence of an IT strategy committee s effectiveness'5
The IT strategy committee charier
Business unit satisfaction survey results
0 Increase tn the number of strategic objectives
.
Alignment of IT artivibes v ith corporate objectives
if a recent release of a prog'am has to t>e backed out of production, the corresponding changes within the delta version of the code should be
0 eUnt naled from the source code that refects the version in production
O applied to the source code that reflects the version in production
r reinstated when replacing the version back into production
.
filed in production for future reference in researching the proMem
Which of the following win BEST ensure tnat arch vod electronic information of permanent imporance rema ns accessible over t me 0
Acquiring applications that emulate old software
Pe -rodtcally backing up archived data
0 Regularly migrating data to current technology
Performing preventive maintenance on old hardware
Mach of the following t* MOST important for an IS auditor to evaluate when auditng proposed investments for fe acunfton of an enterprise wde appacaoon?
0 Wtiefoer them are multiple business units interested m foe aoptrcabon
Whether business umts have approved user acceptance testing (UAT ) (or the application
Whether there are mdepenoent case studies regarding use o» foe ape
*canon
Whether management has approved a busness case tor the appucabon
Which of the tllowtng * MOST important tor an IS auditor to evaluate when auditing proposed investments for the acosrron of an enterprise wde application?
'
Whether there are miApie txjswess unrs reresred m the aopecaeon
Whether business units have approved user acceptance testing (OAT ) lor the apptcabcn
'Whether there are mdeoencent case studies regarong use of the appicaaon
0 Whether management has approved a busmess case lor the apptcabon
&
A checksum is classified as wfwch 'ype of control^
0 Correct * contra
*
0 Preventive control
C Detective contro
0 AdnvnrsJ aTive ccntrot
'
Which of the following provides the MOST useful n'ormaticn for performing a bus ness impact anatysis (BIA ?
>
Results of business resumption planning efforts
0 Inventory of relevant business processes
Pn tries for business pronirement
nocnmentation of application configurations
*
Which of the following audit procedures would provide the BEST assurance that an application program ts functioning as designed *
Using a continuous auditing module
|»J Reviewing program documentation
Confirming accounts
Interviewing business management
An IS auditor fnds mat irregularities have occurred ard that auditee management has chosen to ignore them If reporting to external authorities is required, which of the following is the BEST action for the IS auditor to take ?
-
Obtain approval from auditee management to release the report
Submit the report to appropriate regulators mmerhately
9 Obtain approval from audit management
[ to submit the report
Obtain approval from both audit and auditee management to release the report
Following a merger a revtew of an internal cnai organization determines the IT stoerng committee s decisions co not extend to regional offices as required m the consolidated IT operat ng model. Which of the folkwwng is the iS auditor's
,
BEST recommendation?
tngage an 11 governance consultant
3 Crcato regional centers ot cxccllcnoc
Update tlvo 11 steering committee's lormal charter
g )
Cicato icgwnai 11 steonng comnulloes
When auditing the adequacy of a cooling system for a dat8 center which of the following is MOST important for the IS auditor to review'*
,
Disaster recovery plan (DRP) testing results
0 environmental performance metrics
Geographical iccation of the data center
Q facilities maintenance records
An IS auditor s verifying the adequacy of an organization’s internal controls and is concerned about potential circumvention of regulations Which of the following is the BEST samp mg method to use?
Vlanabie sampling
Attnbute sampling
O Cluster sampling
• Random sampling
The purpose of a checksum on an amount field m an electronic data interchange (EDI ) communication of financial transactions is to ensure
0 integrity
authorization
authenticity
nonrepudation
Which of the following is the BEST reason to implement a data retention policy?
To assign responsibility and ownership for data protection outside 1 T
( 3 To limit the liability associated with storing and protecting information
'
J To establish a recovery po nt objective (RPO ) for disaster recovery procedures
To document business objectives for processing data within the organization
The PRIMARY oenefit of automating application testing is to
reduce the time to review code
O provide more flexibility
• provide test consistency
O replace al manual test processes
Management is concerned about sensitive nfoTnation oemg intentionally or unintentionally emailed as attachments outside the organization by emoloyees VVhat is mo MOST important task before implementing any associated emad
controls'?
Develop an acceptable use policy tor end user computing (tUC )
0 Develop an information classification scheme
Provide notification to omoloyees about possible ema momtonng
l
KOUJIMJ ail ompioycos to sign nondisclosure agreements (NDAs )
Which of the foUowmg win provide ire GREATEST assurance to IT management that a Quality management system (QMS) is effective0
^ A high percentage ot stakeholders satisfy wilh the Quality of IT
o A high percentage of IT employees attending quality tracing
O A high percentage of IT processes reviewed by quality assurance (QA)
o A high percentage of incidents being quickly resolved
Who is PRIMARILY responsible for the desrgn of IT controls tc meet control objectives?
o internal auditor
O IT manager
O RISK management
[ *] Business management
0
in which phase of me internal audit process is contact established with the individuals responsible for the easiness processes in scope for review?
O Selection phase
O execution phase
5] Planning phase
[
O follow - up phase
Which of me following technology has me SMALLEST max < ouirr reoge
> for data transmisston between devices?
Ne8 ' fiefdcomnr>unicatio
g ?J
^ NrC)
-
(
O Long- term evolution ( LTD
Wi - H
O Dluetooth
to is audit manager temporarily tasked wlh supervising a project manager assigned to the organization s peyro application upgrade upon returning to m audit department
'
l the audit manager nas Peen asked to perform an audit to
What is me BEST
,
validate the implementation ot me payroll application . The audit manager is inc only one in me audit department win I protect management oxponenoe cejrse OT action?
0 ransfer me assignment :o a dittcrcru audit manager despite &ck ot 11 project management experience.
l
Have a senior is auditor manage live preiect with the is audit manager performing imai rcv. cw
Manage the audn since mere is no one etso with the appropnale experience
^ outsource the audit to mdepcnconf and qualified resouices.
The iterations team of an organization has reported an is seounty attack Wh oh of the fofowmg sooufd t>e the FIRST step for the secunty incident response team ’
,
1
( 3 Perform a damage assessment
.
;
: Prioritize resources for corrective action.
Document lessons loomed
Report results to management.
Durng a project assessment an is auditor finds mt business owners have been removed
, f' oen me project initiation phase Which of me following should be me auditor s GREATEST concern with th s situation?
'
^
Unreaiite milestones
0 madeouate deitverabfes
Incomplete requirements
Unclear benefits
Which of the following is MOST imporant to include in forensic data collection one preservanon procedures ?
D Preserving data imegrity
0 Maintaining chain of custody
Determining toots o be used
1
Assuring the physics 1
security of devices
Which Of WO following is mo PRIMARY OtjOCiK O of enforpr SO architecture (FA)?
'
Maintaining detailed system documentaUcn
* Managi eg e hd piannmg for ITinvestmonto
enforcing the IT poncy across The organization
executing customizes development and delivery of proects
Art extera attacker spoofng an internal imemei Protocol (IP) address can BEST &o detected t> y which of m ?
following
Comparing Ihe souice address to the domain oarne server ( DNS ) enlry
O Using a slate lahla to compere Ihe message slates oreach packet as il enters Ihe system
Using slalin IP addresses for identification
'
O Comparing the source address to the interface used as the entry pntnl
An oxtcma attacks ^ goofng an internal internet Protocol ( IP) eddroi* can BEST b& detected t> y v/hich or
:
mo following?
Comparing he source address to the domain name server (DNS) enlry
Q Using a slate lahfe to compare Ihe message slates or each packet as 11 enters Ihe system
Q Using sialic IP addresses for rrenti frst
[|] Comparing the source address to the interface userl as the entry pnml
Which of tno follower constitutes on effective detective control in a distrbuted processing environment ?
Users RTH required to request additional access via an electronic mail system
O A disaster recovery plan (URP) is in pfnoe for Ihe entile system
* A log of piivdaged aorounr use is IRVIS AWI -
O User IDs are suspended afer three mooned passwords have been entereti
Ar is auditor roving a network diagram wh oh of the following wojid do the BEST location for piaoermnt of a fiew# ?
i
0 Al hootrs of network segments with different security levels
Q Between virtual local area networks (VI ANs)
:: Between earth host and the local network switcMhub
O Injwrt the demilitarized / one ( 0 M7)
When reviewing past results of a recurring annual ay<m , an iS auditor notes the; findings may not nave been reported and independence may not have oeen maintained Which of tf 'ie flowing is me editor s BEST course of action ?
'
: Re perform past audits to ensure independence
O inform senior management ,
£ 3 Infonr audit management
Reevaluate internet controls
IT £K v 0roance *
> tuld driven by
policies * MK! slardarcis
busiwwtmrl imtiehves
0 oroem^fttfNwl stMteow* £ >
tvdumed soorerjvrs
Which of we following data provides th * MOST useful mout when performing a business impact analyse ( OiA)?
0 expected costs for recovering the business
. . Cost- benefit analysis of running the current business
O Cost of regulatory compliance
Projected cost of goods sold
An is audito ' ' $ evaluating the log
management system for an organization win devices and systems in multiple geographic locations winch of the following is MOST mportam for the auditor to venfy ?
I og li es are encrypted and digitally signed
O I og fres are reviewed in rmilli|sie locations
* I og rues of the serve 's are synchronized
O I og fries are concurrently updated
Which of we following is mo GREATESTADVANTAGE cf maintaining on internal is audit function within on organization ?
Getter understanding of the business and processes
[ *] Inueyseti independence
UIKJ impartiality of recommendations
ASiflily to negotiate recon? memlaiions vnth management
increased l 5 audit start visr&hiy and availability throughout Uw year
Which of we following is a threat to is auditor independence
?
internal auditors design remediation pens to address control gaps identified by internal audit.
internal auditors attend IT steerng committee meetings.
Interna auditors recommend appropriate controls tor systems n development
' ;
* interna auditors share me audit plan and control test plans vnlh management prior to audit commencement.
'
An IS auditor is flawing a data conversion project wncfi of thetoifowing is ihe audtods BEST reccmncencation prior to go t/ e?
-
Auio rieto file
'
test scripts
* Conduct & nccf conversion tst
'
rpsttid : from Changina cer niri values within rpr
allow tiseis if fork nth = rs out of ( heir ft as
-
TI>o record-loccing of> ! sn of a OStOss®
,
managemm $y$i* m DBM$) $ * $s :
( rv 10
allow clathiise administrators (DBAs) to
-
« cor < i the a ; i vitiesof users
3 dim rrle tie iisk of concuif»nt updatas lo a
( record
restrict nsfris from chatting cerviiti values within records
allow users lo look others out of iliair ( ss
f
Which of the following applicates has iho MOST inherent r $ K ang shou ^ bo pwioritized Ourtng audit plowing?
£] An internally developed applicate
AO outsourced accounting app&cation
An onsite application llvat is unsupported
A eecommtssofted legacy application
i
) an IT organization where many r $ por& htie* ar‘
i ; snared . which of The following $
i the BEST contrl far detecting , r eythonjed data tenges?
U = «r $ am rquired to
periodically relate resjxlsitoltlies
Data changes ira
: togond m an outsift afrpllcalion
Segryation of duties oonf ids am perodical y rev pwad
• Qaln dwivjes ana independanily reviewed by another group
An ts auditO ' is conducting a physical security audit of a Healthcare facility and finds otosec circuit television (CCTV systems located in a patent cans area Which of we following is we GREATE ST coi ^em ?
>
H Thera are no notices indicating recording is in progress.
o The retention penod for video readings is undefned
Cameras are not monitored 24 /7
There are no backups of the videos
Audit frameworks can assist the IS audit function by :
O providing details on how to execute the audit program .
O outlining the specific steps needed to complete audits.
fU providing direction and information regarding the performance of audits.
O defining the authority and responsibility of the IS audit function.
An is audits finds me: me cos ? of developing an application is now prsjoctod to significantly exceed the budget. Which of the following is the GREATEST risk to communicate to senior management ?
Noncompliance with project methodology
& Inability to achieve expected benefits
r Project abandnnmen:
'
Increased staff turnover
An organisation s sensitive date is stored in a cloud computing environment and $ encrypted
'
i
Which of mo foiiowng findings should be of GREATEST concer to an is auditor ?
[5] Date encryption keys ar accessib e to the service provider
-
7) The cloud vendor does not have multi regional presence
The encryption keys are noi kept unde' dual control
Symiretnc keys are used for encryption .
Which of we fllowing is mo BEsr ideation that mote are potential problems within an organization s
'
IT service desk function?
Lack of segregation of duties
c Lack of m perormance indicators KPI$ )
<
£ ] An excessive backlog ol user requests
Undocumented operating procedures
Which of following i$ mo MOSTs^ nifcani risk whan ao oppf cstior' j $ e$ ncrviduel c id
user aoacgivs to access the jndoiiysng database ?
; £ Users may be able
|
: t: < monwerl application controls
User accounts may remain sottve after a lerminnlion
Multiple cowifrcls to the database are used and Slow the process
Application may not captnr » a complete audit trail
Af organization $ business continuity pfan ( 0CP) should oe
'
( 3 updated based on changes to personne and environments
tested after an intrusion attempt into the onganizatoo s hot site.
’
tested whenever new apol cations are m pi amen tec
updated before an independent audit wew
<
.
An audito' rviewing on infionnation processing environment decides to candid extern e penetration tolling . Which of the following is MOST appropriate to include in mo audit scope for the crgeni ^eiion to distinguish between mo
auditors penetration attacks and actual attacks?
@ Source IP addresses ci simulated attacks
0 l tmtng of simulated attacks
Restricted host IK add 'esses ct simulated attacks
losing
techniques 01 simulated attacks
Which of the following cloud capeoii Ues BEST enables on organization to meet unexpectedly high service demand^
Alternate routing
O flexibility
0 Scaiabthty
>
I ligh availability
Which of we foiiowing is MOST imporant when implementing a date classification program?
'
Developing a privacy policy
Planning for secure storage capacity
Formalizing data ownership
d ] Understanding the data dassifica nn avels:
^
Following the sale of a business division, employees will be transferred ;o a new organization, but they will retain access tc IT equipment from the previous employer An IS auditor has recommended that both organizations agree to and
document an acceptable use policy for he equipment What type of control has boon recommended?
I
O Preventive control
Corrective oonircl
[* ] Directive control
O Uotcctive oonlrc
Which of me following is the BEST way to imrigaie 1h ?
<
impact
*
a rartsomware attack ^
Paying me ransom
0 Decking jp data fequently
Recrjtmg pesswon: changes ftr adnmrKSfetive accounts
invoking the d savr recovery ptar iOPP)
Who would pfCwKJo an is aucitor with the MOST helpful input dunng an interview to determine whether Dusmosa requirements ler an application ware met *
'
Q use management
*
Protect sponsors
C) Senior management
O Project management
Which of me following enters is MOST imperani for mo successful delivery of benefits from an IT preset ?
7) Quantifying me size of too so ftwo re cevetoDment effort required by the
project
Q involving key stakeholders Curing the development and OKacutron onase^ f lOo project
ensuring T »* IT project managers have ngn ott aothenty on To busrss case
Assess ng me impact of changes to ndivroueis and business unts vwthtn the organization
An organization is planning an acquisition end nas engaged an IS audits to evaluate the IT governance framework of the target company. Which of the following would be MOSTheoiu ' m determiniix
) the effectiveness o: the framework?
Seif assessment
-
report o ? IT capability and rnaturity
Current and previous internal IS audit reports
g ] Recent third-party IS audit reports
IT performance benchmarking reports wm competitors
Which of in* following BEST dowries an audit nsk ?
The company is
being sued for false accusations
Q The financial report may comtf undetected material errors
O Onpteyees have been misaparopnating funds
Key employes have not taken vacation for two years
Which of me following is the MOST appropriate control to ensure ( he identity of an email sender!
Automatic return receipt
0 D^ itat signature
Mut factor authentication MT A
-
( )
Tianspo i Uye* Secjnty ( TLS)
-
Which of the following is the MAIN rsk associated with adding a new system functionality cunng the development phase without fofiow ng a pro,iect change management process?
.
The project may 90 over budget
[5] The new functionality may not meet requirements.
The proje « may tail to meet the established deadline
The added functionality has net been documented.
When developing customer facing U apphcations in which stage of
, the
system development ife cycle { SOLO is n MOST Denef c ai to consider cate privacy phncpies?
>
Softv/are selection and acquisition
Systems design and architecture
0 Requirements definition
User acceptance testing UAT )
;
An organize on produces conurol reports with a desktop epp icotion
! ,
the ; accesses data in ihe cohtrs pnoauciion riiatep & so Which of me following would g ve as IS audits concern eocur me
-
rc ieeihiv of mese Spors?
'
£ £ )
Th ;
report rtfiiitons file s not included in mutino backups
The reports are pr nted by ( he Mime parson who rev 6 ws Ihsm
‘
The rapnrfs ers avarlHble to nl and iiSF* rs
The raport refinTlionH cso be modified by end LiSers
Which of the following is he PRIMARY advantage of using ah automated security log rrtoniionng tocJ nsteac of conducting a manual raw* to monitor the use or privileged access ?
(
Case of storing and maintaining tog file
[5] increased likotihooc of detect mg suspicious activity
:) Case of log retneva for aud t purposes
^
Rod joed costs associated with automat ng the review
>
£
Which of iho fllowing BEST describes (ho role of me i 5 auditor tn ^nent
e oonifoi seifaese fCSAp
Approve^
~
Reviewer
Ci facilitator
o impomeruer
An IT goverance body wants to determine wnetner IT servroe delivery is fosed on consistently effective processes wnicb of the following +$ the BESTapproecJV
?
g] evaluate key performance indicators (KPIs ).
Conduct a gap analysis
Develop a matenty model.
implement
a control self -assessment (C 5A).
A credit card company has decided to outsource me prtiMing of customer statements .,
rt is MOST important for the company to vrify v/nenw :
0 the contract includes compensation for deficient service levels
o the providers information security controls are aligned with the company's
>
the provider adheres to the company's data retention polices
the provider has alternate service locations
Dunng an nfomation secunty review an IS aud tor lerns an organizational pol cy requirs all employees to attoixt information secunty tra nmg during the f rst week a* oach new year Wha* is the auditor's BEST recommendation to ensu'o
.
employees hired after January receive adcouate guidance rcga'ding security awareness'?
[3 Hoviso the policy to include security training cunno ortooardmg
tnsure new employees read S '
id sign acknowledgment ot the acceptable use policy
Koa Jire management ol vcw employees to provide an overview ol socunty awareness
Koviso the policy to teguiro socunty tiamng ovey six months oi ai employees
‘
Which of the following is the MOST effective audit approach to verfy whether tno projected benefits descroed m an IT project's business case are realistic"?
Review of mitigation plans against bus ness risk
( 3 Review of the cost-beneft analysis performed by managemen '
interviews with business stakeholders
Oompanson against industry business practices
A web application is developed in house by an organization Which o' the following would provide the BEST evidence to an IS auditor that the application Is secure from external attack ’
'
Web application firewall (WAF implementation
;
Code review by a third party
* Pe -wt aiion test retails
'
Database application mnnltnring logs
Which of the following presents tho GREATEST nsk associated with end -user computing <EUC) appications over financial reporting?
Lack of portability for users
Loss of time due to manual processes
inability to quickly modify and deploy a solution
0 Calculation errors m spreadsheets
Which of the following is MOST important to define wtthm a disaster recovery plan (DRPT5
0A comprenensive list o< disaster recovery scenarios and pnonties
O Business cont nulty plan DCP)
;
O Test results for backup data restoration
r. Roles and responsibilities for recovery team members
To ensure confidentiality through the use of asymmetric encryption, a message is encrypted with which of the following^
O Sender 's private key
O Recipient's private key
0 Recipient s public key
'
Sender 's ptMc key
Which type of risk would MOST influence the seection of a sampling methodology?
inherent
0 Detection
Residual
O Control
An IT strategic plan that BEST leverages IT m achieving organizational goals will include
a risk-based ranking of projects
IT budgets linked In the organization's budget
0 enterprise architecture (FA mparts
)
O a comparison of future needs against current capabilities
To ensure adequate security and controls in e-commerce applications, which of the following manages the certificate We cycle of putt c key pairs?
Certification practice statement {CPS)
Certification revocation list (CRI )
@ Certification authority (CA )
Registration authority (RA)
Which type of data analytics can be used to identify mva id data, extreme values , or linear correlations between data elements'’
G Descnptive
* Prescnptive
G Predictive
G exploratory
Which of the following would MOST effectively help to reduce the number of repeated incidents in an organization?
Training incident management teams on current incident trends
j Test ng incident response plans with a wide range of scenanos
Pnontizing incdents after impact assessment
Q Link ng modems to problem management actrvities
Management receives information mdicat ng a hgh level of rsk associated with ootental flooding near the organization s data center within the next few years As a reufl. a decision has been made to move data center opemtions to
’
wiotnc
' facility
on higher ground Which approach has been adopted?
0 WISH reduction
His* acceptance
"
Kisx avoidance
O Kisx transfer
Which type of tveat can mice a large group of automated social media accounts to steal data, send spam or launch distributed denial of service (DDoS) attacks0
Malware shanng
O Phishing attempt
0 Ootnet attack
Data mming
Which of the following should be an IS auditors GREATEST concern when assessing an IT service oonfguretion database ?
The database is executable for all users
The database is not encrypted at rest
0 The database is write -accessible for at users
The database is read-accessb e for all users
-
Dumg a follow-up audit an IS auditor loams that management has deferred the implementation of a previously agreed-upon recommendation What is the responsibility of the auditor *
,
Report the decision to defer the implementation to the steenng committee
Obtain commitment horn management to implement trie recommendations
Amend the final repon to reflect the deas on to defer the implementation
0 Assess the impact of any risks trie dec sion may peso to the organization
Which of the following would BEST prevent an arbitrary application of a patch?
Database access control
Network based access cont'ols
Established maintenance windows
[5] Change management
An IS auditor dentifies a process deficiency involving multiple departments None of the departments will accept ownership o< the def ciency or the remediation efforts What should the auditor do FIRST7
.
ft f acilitate a meeting with affected parties to discuss potent al cooperative remediation efforts
Document the defic ency m the audit report and et management determine who is responsible
Report each party's portion of the deficiency and their respect ve rented ation plans separately
Continue negotiations with both parties until ownership of the deficiency anc remediation s determined
Which of tno following should be to GREATEST conoorn to an IS auditc ' rev owing the -
.
nro maton secunty framov orX of an organization '
5
A list of cnt cat information assets was not inc uded in the information security policy
Senior management was not involved in the development of the information secuniy policy
The information security policy has not been updated in the last two years
3
[ The information security policy is not a gned with regulatory requirements
.
Which of the following is the BEST recommendation to drive accountability for achieving the desired outcomes specified in a benefits realization piar for an IT project?
Fnsure that IT takes ownership for the delivery and tracking of all aspects of the benefits realization plan
Fnsure hat the project manager has formal authority for managing the benefits realization plan
I
Q Assign respons h ihes measures and timelines for each identified benefit within 'he pian
,
Document the dependencies between the project and other projects within tne same program
"
Which of the following should be the MOST important consideration when conducting a review of IT portfolio management ’
0 Controls to minimize nsk and maximize value for the IT portfolio
Assignment of responsibility for each project to an IT team member
Trecuency of meetings where the business discusses the IT oortfoli o
Adherence to best practice and industry approved methodologies
Which of the following is the BEST preventive control to protect the confidentiality of data on a corporate smartphone in the event it is lost0
Password for device authentication
0 Fncryption of the data stored cn the device
Biometnr authentication for the device
Remote data /ape program
'
Which of the following is the BEST data integrity check?
Prepamg and running last data
0 Tracing data back to the point of origin
C Pedormrig a serpience check
Counting the transaction processed pe* day
*
The PRIMARY 'eason to assgn data ownership for protection of data is to etabfcsh
traceability
O reliability
0 accountably ,
authority.
Which of the following is the MOST mportant factor when an organization is developing information security policies and procedures'*
Consultation with security staff
Compliance with relevant regulations
Inclusion of mission and objectives
@ Alignment with an information security framework
Which of the following would be ot GREATEST concern to an IS auditor when a multi function pooler device is sent offsite for maintenance?
Maintenance costs exceed the value o» the device
3 The printout ms to he redaeded to another deparment
3 Internal rremnry does not aijlomalreHy
0 Ritsmess dunng the maartenanre pannd
An IS audited s rev owing a bank's service leve agreement (SLA ) wrtn a third party prov der that hosts the bank's secondary data center Which o the following hnd ngs shook be of GREATEST concern to the aud tor'*
-
!
The St A has not teen reviewed in more than a year
The recovery po n' objective (RPO) has a shorter duration than donumenled in the disaster recovery plan (DRP)
0 The recovery time objective RTQ) has a longer duration than documented
( in the disaster recovery plan (DRP)
Backup data ts hosted online only
Which of the following BEST enables ar IS auditor to confirm the batch processing to post transactions from an input source s successful'?
0 Crror log review
0 i lash totals
O Total number of items
Aggregate monetary amount
r\
.
An IS audito' nas been asked tc advise on measures to improve IT governance wrth n the organization Which of the following is the BEST roccmmendation?
Oenchmanr organizational performance against ndustry peers
implement annual third-paly audits
Require executive management to draft U strategy
0 implement key performance indicators (KPIs)
A post implementation review was conducted by ssumg a survey to users Which of tne following should be of CREATE ST concern to an IS auditor^
The survey was issued to employees a month after Nnpteentafton
The survey toon template 4d not alow aittonat feedback to be provided
r. The survey rsufts were not presented r detart to management
>
0 The survey questions H not address the scope of the busmess case
<
An organization is modernizing its technoogy policy framewor* to demonstrate compliance with external mcusiry standards Which of the following would be MOST useful to an IS auCitor for validating the outcome ?
Benchmarking of internal standards against peer organizations
inventory of the organization s approved policy exceptions
0 Mapping of relevant standards against the organizaton s controls
Policy recommendations from a leading external consulting agency
A computer forensic audit . 5 MOST relevant m which at tne following situations?
O inadequate controls m tie IT
environment
0 Os * ts
* * due to hacking of servers
O M smetches m transaction data
Musing server patches
RAID ty* 5 devices
3 Clustered wrrintertiire
A mmofed M** « t another locution
>
A security review focused on data loss prevention (DLP) revealed the organ zation has no visibility tc data stored in trie cloud What is the IS auditor's BE ST recommendation to address this issue?
implement a hie system scanner to discover data stored n the cloud
nance the firewall at the network penmeter
0 Employ a cloud access security ^oker (CASG).
Utrize a DLP toe on desktops to monitor user activities
Which of the following would BEST amp to ensure that potential secunty iss jes are considered by the development team as part o‘ tnc'omental changes to Agiledeveloped software?
'
0 Include a mandatory step to analyze the security impact when making changes
Mandate that the change aralyses are documented in a standard format
Dep ay changes in a ran rolled environment and observe for secunty ce'ents
I
Assign the security rsk analysts to a specially teamed member of the project management office
WTtcM of » following environments
tr is BEST used for copying data and transformation into a compatible data warohouse formal
Test ng
0 Stngng
Which of the following reliably associates users with met ' public keys 8nd includes attnoutes that uniquely identify the users?
encryption
Multi-factor authentication (MfA)
0 Digital certificate
Non'epudiatton
in order to be useful a key performance
,
indicator (KPl ) MUST
0 b® changed frequently lo reflect organisational
strategy
be approved by management
0 have a target value
be measurable in percen’ages
Which of the following is an analytical rev ew procoOu'e for a payroll system"*
Fvaiiialmg the performance of the payroll system us ng benchmarking software
O Test ng hours reported on time sheets
Pe'forming penetration ahempts on the oayrnll system
0 Pe forming reasonableness tests by
' mil liply ng the number of emplnyees by the average v/age rate
An IT asset management rev ew *inc)s that routors and switches are net sanitized bofro disposal What s the CREATE 8 T concern with this situation'’
<
Staff are not following the organization's sanitization bokoes and procedures
'
Samtizat on is not pad of (he IT department's security awareness tranmg program
0 Configuration hies may DO extracted from tie devices and compromise a network's security
Confidential data hies may be extracted *rom the devices and result n a privacy breach
Which of the following is the BEST disposal method for flash dnves that previously stored confidential dat8?
E Destruction
O Overwriting
Cryptographic erasure
Degaussing
An IS auditor observes that a business critical application does not currently have any leva of fau1 ’olerance Which of ihe following is the GREATEST concern with this situation?
Single point of failure
Limited tolerance for damage
Deg'adatwn of services
3
£ Decreased mean time between failures (MTOT)
Which of the following provides the BEST evidence that all elements of a business continuity plan (BCP) are operating effectively**
Simulation test results
0 rull ooerationai test results
O Walk through test results
O Tabletop test results
An IS auditor earns that a business owner violated the organization s secunty policy by creating a web page with access to production data Tho auditor's NEXT step should be to
determine if sufficient access controls exist
Q escalate to senior management
assess the snsrtivry of the production data
shut down the v vb page
.
A senior IS auditc' suspects that a PC may have been used to perpetrate fraud in a finance department The auditor sooutd FIRST roport this suspicion to
the audit comm ittee
audit managemen'
0 the police
auditee fine management
Which of the following practices is MOST helpf JI in eliminating potential bias dunng the veneer proposal review process'?
The project sponsor is available to an vendors to explain proposal requirements
O internal software development teams are not permitted to provide proposa s to the project
O The services of an m:ern8l or external auditor are available when vendor proposals are rev ewee
0 A proouremen professional
: is the point of contact fer al
venders responding with proposals
Which or the following should be ’he FIRST step when develoong a data loss prevention (OLP ) section for a large organization?
0 Conduct a data inver lory and classification exercise
Create the Dl P polioes and templates
Identify approved data workflows across the enterprise
Conduct a threat analysis against sensitive data usage
Which of tho following should be an IS auditors GREATEST concern when reviewing an organization's security controls tor policy compliance'!
Cnd users are net reomrec to acknowledge socurry pokey training
Security pohey documents are ave latte on a pjMcdomar «et*e
0 Secunty ponces are not aopheabe across e* business units
O The secunty poicy has »wt been >ev*ewed wsren the pes: year
’
Which of the following is the MOST mportant outcome of the data classification process'
Cmanced data access logs
0 identification of ^
le s of protect on
An access control matrix for data
A comprehensive inventory of data assets
A new system development project is running iate against a cntical impiocnon'eton deadline Which of trie followitig is the MOST important activity ’
Pi'form a pre-implementanon audit
Oocument last-minute enhancements
0 Pe form user acceptance testing tJAT
-
( )
Fnsure that code has been -ev ewed
Which of the following shoM be 'ho FIRST stop > n a data migration protect?
O Croat ng data convorsion scripts
0 Understanding the new system's data structure
Completing data cleanup in the current database to eliminate inconsistencies
Reviewing decis ons on how ousmess p'ocesses should he conducted in the new system
Which of the following provxtos the BEST method for maintaining the security of corporate applications poshed to employee owned mobile devices'*
0 Implementing mobile device management MDM ( )
DfsaNevj unnecesvry netcrtc ronoertvtty options
3 Reqjmg security mwveness treeing far mobde users
Fnetting remote dele resfn rtnn cepaNMies
Which of the following would be MOST useful to an IS auditor when making recommendations to enable continual improvement of IT processes over time ?
O IT nsk reg ster
IT mcdent log
0 Maturity model
Denchmadcmg studies
Which of the following components of a nsk assessment is MOST helpful to management in determining the level of risk mitigation to apply?
Control self assessment (CSA)
RISK identification
0 RISK classification
impact assessment
An organization is ready to implement a new'
. IT solution consisting of multiple modules. The last module updates tne processed data into the dataoase Which of the ‘ollowmg findings should be of MOS T concern to the IS auditor?
Use of weak encryption
0 Lack of input validation
Lack of a data dictionary
Absence of a formal change approval process
The waterfall life cycle model of software development is BEST suited for which cf the following situations?
The project intends to apply an object-oriented design approach
The project is subject to time pressures
O The project will involve the use of new technology
0 The project requirements are well understood
Dunng winch orocess * testing MOST commonly used *
'
regression
Program development
• System modftcatmn
3 On testing
*
O Stress testing
An IS auditor noted that management authorized the implementation of patches cn IT infrastructure components without evaluation. The auditor's GREATEST concern should be tnat the patches worn not evaluated for
impact on operational costs
alignment ’with the data reference model
0 impact on the current IT environment
compliance with release management
An IS auditor s reviewing a protect that nvoives creating a secure mooi e aop tor claims processing As pan of a security *1 development model tor the program, threat modeling should begin dunog which protect phased
0 Architectural revew
Requirements definition
O Testing
Coding
Which of the following should be of GREATEST concern to an IS auditor conducting an audit of an organization's data cooler?
employees working m the data center have not been trained m the use of fire extinguishers
O The data center has a wet-pipe sprmkter system
employees wonong m the data center are not trained on emergency evacuation procedures
0 The data center is in a high flood zqy
Which of the following fire suppression methods is MOST effective for use in a data center?
O Dry chemical compounds
0 Inert gases
. '
. Vet-pipe water spnkte' system
Dry-pipe water sprinkler system
When budding or upgrading enterprise cryptographic infrastructure which of the following is the MOST critical requirement for growing business environments?
,
Network tnrotthg
0 Scalable architectures and systems
Sennce discovery
Backup and restotabon caoaCMties
Which of the following is MOST important to cons dor when selecting 8 n automated fire suppression system for an unmanned data center?
Potential damage to equipment
Maintenance costs
Ons te support by the vendor
0 Uke ihood of fires at the data center
What should be the PRIMARY focus during a review of a business process approvement p 'oject'*
Business project plan
0 Business intact
O Continuous monitoring plans
The cost of new controts
.
A firewall has been installed on the company s web server Which concern does the f 'ov all address *
'
O Availability of the information
Connectrvily to the Internet
0 Una.ithon/ed mndfioat nn of information by internal users
Accessing information by the outside world
An organization is permanently transitioning from onsite to folly remote business operations When should the existing business impact analysis ( DlA ) be reviewed*?
During Tie next scheduled review
As soon as the new operating model is in place
3
[ As soon as the cecis on about the transition s ayiounced
At east one year after the transition
An organization is shifting to a remote wotcforce in preparation, the IT department is perform ng st'ess and capacity testing of remote access infrastructure and systems What type of control is being implemented?
Detective
O Compensating
0 Pe^ntive
O Deective
Data from a system of sensors located outside of a network ts reoerved by the open ports on a server Which of the following ts tne BEST way to ensure the integrity of the data being collected from the sensor system?
Route the traffic from the sensor system th'ougn a proxy server
Transmit the sensor data via a virtual private network ( VPN) to the server
implement network address translation on the sensor system
13
l lash the data tgpt is transmitted from the sensor system
An IS auditor observes an undocumented open port within tbe corporate firewall that is in conflict with 1ho baseline firewall configuration Which of the following is the BEST recommendation to prevent recurrence?
0 follow change management
initiate ncident response
Perform a risk assessment
Dprcy updated patches
Mitch of me following practices associated with capacity planning provides the GREATEST assurance that tuture ircidents related to existing server performance will oe prevented'
'
Dup icatmg existing cisk drive systems to improve redundancy and data storage
£] Performing a root cause analysts for past performance incidents
Reviewing results from simulated high-demand stress test scenarios
Anticipating current service level agreements ( SLAs) wilt remain unchanged
Which of the following would MOST effectively ensure the integrity of data transmitted over a network^
Message encryption
0 Message digest
Certificate authority (CA)
Sleganngraphy
Foilowirvg an IT audit management has decided to accept the nsk highlighted in the audit report Which erf the following would provide the MOST assurance to the IS auditor that management is adequate v balancing the needs of the
business 'with the need to manage risk?
A communication plan exists fix uifoirnuig parlies impacted by Mie nsk
Identified nsk is reported into Uie oryawalicn's nsk comnut .ee
• Established citeria exist ur accepting aid appioving nsk
(
Potential impact and likelihood are adequately documented
The remed ation process related :o a high nsk audit finding involves a mutti step action ptan by management and may not be competed by the next audit cycle VVh cb of the following is tne BEST way ‘or an IS auditor to follow up cm the
activities?
0 Kcvtcw the progress ot remediation on a cguiar basis
'
Schedule a review or the controls after tho projected remediation date
continue to audit the triod contiols according to tho audit schedule
0 Perform more substantive testing until tho remodialicn otan is implemented
Which of the following is MOST important for an IS auditor to verify when conducting a review of a potential th rd- party se vice provider?
-
0 Whether required security controls have been established
Whether a strategy for the use of third-pady providers is established
Whelher service level agreements ( SI As) are in place
Whether a business impact anaiys s (RIA ) has been completed
Who is
acojntafro fc
'
an organization's ontorpnso nsk m anagerrient ( CRM ; program?
Fxecutive management
0 Chief risk o 'fre ’ (CRO)
Steering rommittee
0 Board of directors
Mitch of the following
'
is the BEST way to prevent social engineering incidents?
Include security responsibilities in jab descriptions and require signed acknowledgment
0 Maintain an onboardmg and annual seajnty awareness program
Fnforce strrt email security gateway controls
Ensure user workstations are mnn ng the most recent version of anttviors software
Capacity management tools aro PRIMARILY usee to ensure that
concurrent use by a large numbe of users Is enabled
-
avw able 'esorrens are used efficiently and effectively
*
proposed hardware acquisitions meet rapacity requirements
C comp,its " systems are used In their maximum capacity most of the time
Which of the following is an effective way to ensure the integrity of file transfers in a peer to peer (P2P) computing
environment?
Cnsure the fi es are transferred through an intrusion detection system (IDS).
0 Associate a message authentication code with each tile transferred
O Connect the client computers n the environment to a jump server
f. Cncrypt the packets shared between peers within the environment