Last Updated on December 13, 2021 by Admin 3

 CISA : Certified Information Systems Auditor : Part 165

  1. Which of the following would BEST protect a network from a worm that exploits a publicly announced operating system vulnerability?

    • Antivirus software
    • User awareness and training
    • Host security
    • Patch management
  2. Which of the following is the MOST effective control for protecting the confidentiality and integrity of data stored unencrypted on virtual machines?

    • Monitor access to stored images and snapshots of virtual machines
    • Restrict access to images and snapshots of virtual machines
    • Review logical access controls on virtual machines regularly
    • Limit creation of virtual machine images and snapshots
  3. What is the MAIN objective when implementing security controls within an application?

    • To minimize reputational risk to the organization
    • To minimize the exposure to the fullest extent possible
    • To optimize the level of data protection achieved against cost
    • To optimize user functionality of the application
  4. Which of the following controls would BEST help to protect an organization from social engineering attacks?

    • Email monitoring
    • Social media access restrictions
    • Security awareness training
    • Firewall access control list reviews
  5. What is the PRIMARY reason for including a clause requiring source code escrow in an application vendor agreement?

    • Protect the organization from copyright disputes.
    • Ensure source code changes are recorded.
    • Segregate system development and live environments.
    • Ensure the source code remains available.
  6. Which of the following would provide the BEST evidence of the adequacy of firewall rules?

    • Performing penetration tests
    • Reviewing intrusion detection system (IDS) logs
    • Reviewing network logs
    • Verifying firewall configuration
  7. Which of the following is the BEST control to reduce the likelihood that a spear phishing attack will be successful?

    • Tools for users to report suspicious emails and unusual financial transactions
    • Spam filtering for emails containing external hyperlinks sent to mass recipient lists
    • Automated alerts to security managers identifying confidential information transferred externally
    • Education for staff and high-profile users on social engineering
  8. Which of the following would BEST help management maintain a current and effective business continuity plan (BCP)?

    • Update the critical business software list on an annual basis.
    • Perform a periodic recovery test and include a lessons-learned summary.
    • Perform an annual walk-through and verify resources at the recovery site.
    • Verify vendor restore requirements are consistent with the recovery plan.
  9. An IS auditor is reviewing environmental controls and finds extremely high levels of humidity in the data center. Which of the following is the PRIMARY risk to computer equipment from this condition?

    • Brownout
    • Fire
    • Static electricity
    • Corrosion
  10. Which of the following is the BEST way to minimize the impact of a ransomware attack?

    • Grant system access based on least privilege.
    • Provide user awareness training on ransomware attacks.
    • Perform more frequent system backups.
    • Maintain a regular schedule for patch updates.
  11. What is the BEST type of network topology to reduce the risk of network faults?

    • Bus network
    • Star network
    • Ring network
    • Mesh network
  12. An organization’s sensitive data is stored in a cloud computing environment and is encrypted. Which of the following findings should be of GREATEST concern to an IS auditor?

    • Symmetric keys are used for encryption.
    • Encryption keys are not rotated on a regular basis.
    • Test data encryption keys are being used in production.
    • Data encryption keys are accessible to the service provider.
  13. Which of the following is the MOST important metric in selecting a biometric device?

    • System response time
    • Crossover error rate
    • False rejection rate
    • Image size
  14. An IS auditor observes that a bank’s web page address is prefixed “https://”. The auditor would be correct to conclude that:

    • the bank has a restricted Internet protocol (IP) address.
    • the bank has established a virtual private network (VPN).
    • the customer is connected to the bank’s intranet.
    • transactions are encrypted.
  15. When a data center is attempting to restore computing facilities at an alternative site following a disaster, which of the following should be restored FIRST?

    • Data backups
    • Decision support system
    • Operating system
    • Applications
  16. Which of the following findings would be of GREATEST concern when reviewing a business impact analysis (BIA)?

    • There is not adequate documentation to perform a recovery.
    • The business continuity plan (BCP) does not align with corporate strategy.
    • Several key business processes were not included.
    • The recovery point objective (RPO) is not accurate.
  17. Which of the following would BEST detect unauthorized modification of data by a database administrator (DBA)?

    • Audit database change requests
    • Audit database activity logs
    • Review changes to edit checks
    • Compare data to input records
  18. Which of the following attacks would MOST likely result in the interception and modification of traffic for mobile phones connecting to potentially insecure public Wi-Fi networks?

    • Phishing
    • Man-in-the middle
    • Vishing
    • Brute force
  19. An IS auditor is reviewing a small organization’s business continuity and disaster recovery plans. Which of the following findings would pose the GREATEST concern?

    • Data backup and storage is not performed every day.
    • Practice drills related to the plans are conducted infrequently.
    • The plans are not periodically reviewed and updated.
    • The organization’s hardware is near end-of-life.
  20. Which of the following is the BEST method to delete sensitive information from storage media that will be reused?

    • Multiple-overwriting
    • Crypto-shredding
    • Reformatting
    • Re-partitioning