Last Updated on December 13, 2021 by Admin 3

CISA : Certified Information Systems Auditor : Part 70

  1. A business unit cannot achieve desired segregation of duties between operations and programming due to size constraints. Which of the following is MOST important for the IS auditor to identify?

    • Unauthorized user controls
    • Compensating controls
    • Controls over operational effectiveness
    • Additional control weaknesses
  2. An organization has shifted from a bottom-up approach to a top-down approach in the development of IT policies. This should result in:

    • a synthesis of existing operational policies
    • greater consistency across the organization
    • greater adherence to best practices
    • a more comprehensive risk assessment plan
  3. Which of the following weaknesses would have the GREATEST impact on the effective operation of a perimeter firewall?

    • Ad-hoc monitoring of firewall activity
    • Potential back doors to the firewall software
    • Misconfiguration on the firewall rules
    • Use of stateful firewalls with default configuration
  4. An IS auditor is reviewing database log settings and notices that only INSERT and DELETE operations are being monitored in the database. What is the MOST significant risk?

    • Metadata may not be logged
    • Newly added records may not be logged
    • Purged records may not be logged
    • Changes to existing records may not be logged
  5. Adding security requirements late in the software development life cycle would MOST likely result in:

    • cost savings
    • clearer understanding of requirements
    • operational efficiency
    • compensating controls
  6. A reduction in which of the following would indicate improved performance in the administration of information security?

    • IT security awareness training days
    • Number of staff involved in security administration
    • Systems subject to an intrusion detection process
    • Turnaround time for requests for new user access
  7. What is the PRIMARY objective of performing a vulnerability assessment following a business system update?

    • Update the threat landscape
    • Review the effectiveness of controls
    • Determine operational losses
    • Improve the change control process
  8. Which of the following is an effective way to ensure the integrity of file transfers in a peer-to-peer (P2P) computing environment?

    • Connect the client computers in the environment to a jump server.
    • Ensure the files transferred through an intrusion detection system (IDS).
    • Encrypt the packets shared between peers within the environment.
    • Associate a message authentication code with each file transferred.
  9. Which of the following activities provides an IS auditor with the MOST insight regarding potential single person dependencies that might exist withing the organization?

    • Reviewing user activity logs
    • Mapping IT processes to roles
    • Reviewing vacation patterns
    • Interviewing senior IT management
  10. Which of the following ensures components of an IT system are identified and baselined, and that changes to them are implemented in a controlled manner?

    • Restricted production access
    • Configuration management process
    • Change management process
    • Software versioning control
  11. Which of the following is the BEST indication that an organization’s vulnerability identification capability has achieved a high level of maturity?

    • The organization collaborates with relevant partners to correlate vulnerability data.
    • Known application vulnerabilities are manually categorized and prioritized.
    • Vulnerability management tools are tailored for specific operating systems.
    • Tools are in place to periodically identity new and updated vulnerabilities.
  12. Which of the following mechanisms for process improvement involves examination of industry best practice?

    • Continuous improvement
    • Knowledge management
    • Business process reengineering (BPR)
    • Benchmarking
  13. An audit report notes that terminated employees have been retaining their access rights after their departure. Which of the following strategies would BEST ensure that obsolete access rights are identified in a timely manner?

    • Delete user IDs at a predetermined date after their creation.
    • Automatically delete user IDs after they are unused for a predetermined time.
    • Implement an automated interface with the organization’s human resources system.
    • Require local supervisors to initiate connection.
  14. A small organization does not have enough employees to implement adequate segregation of duties in accounts payable. Which of the following is the BEST compensating control to mitigate the risk associated with this situation?

    • Regular reconciliation of key transactions approved by a supervisor
    • Supervisory review of logs to detect changes in vendors
    • Review of transactions exceeding a specific threshold
    • Rotation of duties among existing personnel
  15. An IS auditor is following upon a finding that determined elevated administrator accounts for servers were not being properly checked out and then back in after each use. Which of the following is the MOST appropriate sampling technique to determine the scope of the problem?

    • Stratified sampling
    • Random sampling
    • Attribute sampling
    • Statistical sampling
  16. Which of the following provides the BEST evidence that network filters are functioning?

    • Reviewing network configuration rules
    • Reviewing network filtering policy
    • Performing network port scans
    • Analyzing network performance
  17. An IS auditor performing an audit of backup procedures observes that backup tapes are picked up weekly and stored offsite at a third-party hosting facility. Which of the following recommendations would be the BEST way to maintain data integrity during transport?

    • Ensure the data is transported in locked tamper-evident containers. 
    • Ensure that logging and recording of data transport takes place.
    • Ensure the transport company is licensed and insured.
    • Ensure the data is validated prior to transport.
  18. IT help desk statistics show a high number of recurring incidents with known solutions. Which of the following is the BEST IS audit recommendation?

    • Outsource the IT help desk.
    • Provide better training to end users. 
    • Implement incident escalation.
    • Hire additional technical support staff.
  19. An organization outsourced its IS functions. To meet its responsibility for disaster recovery, the organization should:

    • delegate evaluation of disaster recovery to internal audit.
    • delegate evaluation of disaster recovery to a third party.
    • discontinue the maintenance of the disaster recovery plan (DRP).
    • coordinate disaster recovery administration with the outsourcing vendor.
  20. Which of the following is the BEST point in time to conduct a post-implementation review (PIR)?

    • After a full processing cycle
    • Immediately after deployment
    • To coincide with annual PIR cycle
    • Six weeks after deployment