ExamGecko
Home Home / Isaca / CISA

Isaca CISA Practice Test - Questions Answers, Page 112

Question list
Search
Search

Related questions

Which of the following is the PRIMARY basis on which audit objectives are established?

A.
Audit risk
A.
Audit risk
Answers
B.
Consideration of risks
B.
Consideration of risks
Answers
C.
Assessment of prior audits
C.
Assessment of prior audits
Answers
D.
Business strategy
D.
Business strategy
Answers
Suggested answer: B

Explanation:

The primary basis on which audit objectives are established is the consideration of risks12.This involves identifying and assessing the risks that could prevent the organization from achieving its objectives12.The audit objectives are then designed to address these risks and provide assurance that the organization's controls are effective in managing them12.While audit risk, assessment of prior audits, and business strategy are important factors in the audit process, they are secondary to the fundamental requirement of considering risks12.

Objectives of Auditing - Primary and Secondary Objectives of Auditing | Auditing Management Notes

Audit Objectives | Primary and Subsidiary Audit Objectives - EDUCBA

What is the PRIMARY reason for an organization to classify the data stored on its internal networks?

A.
To determine data retention policy
A.
To determine data retention policy
Answers
B.
To implement data protection requirements
B.
To implement data protection requirements
Answers
C.
To comply with the organization's data policies
C.
To comply with the organization's data policies
Answers
D.
To follow industry best practices
D.
To follow industry best practices
Answers
Suggested answer: B

Explanation:

The primary reason for an organization to classify the data stored on its internal networks is to implement data protection requirements1234.Data classification helps organizations understand what data they have, its characteristics, and what security and privacy requirements it needs to meet so that the necessary protections can be achieved3.While determining data retention policy56, complying with the organization's data policies27, and following industry best practices891011are important aspects of data classification, they are secondary to the fundamental requirement of implementing data protection requirements.

What Is Data Classification & Why Is It Important? --- RiskOptics

Data Classification Policy: Definition, Examples, & Free Template - Hyperproof

Data Classification Policy: Benefits, Examples, and Techniques - Satori

What is a Data Classification Policy? - Digital Guardian

Data Classification and Practices - NIST

Data Classification as a Catalyst for Data Retention and Archiving ...

What is data classification? - Cloud Adoption Framework

Data Classification - Data Security Policies | ITS Policies ...

IMPLEMENTING DATA CLASSIFICATION PRACTICES - NIST

Best Practices for Data Classification | Forcepoint

Which type of attack poses the GREATEST risk to an organization's most sensitive data?

A.
Password attack
A.
Password attack
Answers
B.
Eavesdropping attack
B.
Eavesdropping attack
Answers
C.
Insider attack
C.
Insider attack
Answers
D.
Spear phishing attack
D.
Spear phishing attack
Answers
Suggested answer: C

Explanation:

An insider attack poses the greatest risk to an organization's most sensitive data. An insider attack is a type of cyberattack that is carried out by someone who has legitimate access to the organization's network, systems, or data, such as an employee, contractor, or business partner. An insider attack can be intentional or unintentional, malicious or negligent, and can have various motives, such as financial gain, revenge, espionage, sabotage, or curiosity.

An insider attack poses the greatest risk to an organization's most sensitive data because:

An insider has a high level of trust and privilege within the organization, which allows them to bypass security controls and access confidential or restricted data without raising suspicion or detection.

An insider has a deep knowledge of the organization's operations, processes, policies, and vulnerabilities, which enables them to exploit them effectively and cause maximum damage or disruption.

An insider can use various techniques and tools to conceal their identity and actions, such as encryption, steganography, deletion, or alteration of logs or evidence.

An insider can cause significant harm or loss to the organization in terms of data integrity, availability, confidentiality, reputation, compliance, and profitability.

According to the 2023 Cost of Insider Threats Global Report by Ponemon Institute and ObserveIT1, the average annual cost of insider threats for organizations worldwide was $11.45 million in 2022, a 31% increase from 2018. The report also found that the average number of incidents per organization was 77 in 2022, a 47% increase from 2018. The report classified insider threats into three categories: careless or negligent employees or contractors, criminal or malicious insiders, and credential thieves. The report revealed that careless or negligent insiders were the most common and costly type of insider threat, accounting for 62% of all incidents and $4.58 million in costs.

The other options are not the greatest risk to an organization's most sensitive data, although they can still pose significant threats.

A password attack is a type of cyberattack that attempts to guess or crack a user's password to gain unauthorized access to their account or system. A password attack can use various methods, such as brute force, dictionary, rainbow table, phishing, keylogging, or social engineering. A password attack can compromise the security and privacy of the user's data and information. However, a password attack can be prevented or mitigated by using strong and unique passwords, changing passwords frequently, enabling multi-factor authentication (MFA), and avoiding clicking on suspicious links or attachments.

An eavesdropping attack is a type of cyberattack that intercepts or monitors the communication between two parties without their knowledge or consent. An eavesdropping attack can use various techniques, such as wiretapping, packet sniffing, man-in-the-middle (MITM), or side-channel. An eavesdropping attack can expose the content and metadata of the communication, such as messages, files, voice calls, emails, etc. However, an eavesdropping attack can be prevented or mitigated by using encryption, authentication, digital signatures, VPNs (virtual private networks), or secure protocols.

A spear phishing attack is a type of phishing attack that targets a specific individual or group with personalized and convincing emails that appear to come from a trusted source. A spear phishing attack aims to trick the recipient into clicking on a malicious link or attachment that can infect their device with malware or steal their credentials or data. A spear phishing attack can compromise the security and privacy of the recipient's data and information. However, a spear phishing attack can be prevented or mitigated by verifying the sender's identity and email address, checking the email content for spelling and grammar errors, hovering over links before clicking on them (or not clicking at all), scanning attachments for viruses before opening them (or not opening at all), and reporting suspicious emails to IT security staff.

An organization uses public key infrastructure (PKI) to provide email security. Which of the following would be the MOST efficient method to determine whether email messages have been modified in transit?

A.
The message is encrypted using a symmetric algorithm.
A.
The message is encrypted using a symmetric algorithm.
Answers
B.
The message is sent using Transport Layer Security (TLS) protocol.
B.
The message is sent using Transport Layer Security (TLS) protocol.
Answers
C.
The message is sent along with an encrypted hash of the message.
C.
The message is sent along with an encrypted hash of the message.
Answers
D.
The message is encrypted using the private key of the sender.
D.
The message is encrypted using the private key of the sender.
Answers
Suggested answer: C

Explanation:

This method is known as creating a digital signature of the message. It ensures the integrity of the message by verifying that it has not been tampered with in transit. The process involves hashing the message and encrypting the hash value with the sender's private key.Any changes to the message will result in a different hash value1.This method is used in DomainKeys Identified Mail (DKIM), which verifies an email's domain and helps show that the email has not been tampered with in transit2.

Understanding Digital Signatures | CISA

Using DomainKeys Identified Mail (DKIM) in your organisation

Which of the following findings from a database security audit presents the GREATEST risk of critical security exposures?

A.
Legacy data has not been purged.
A.
Legacy data has not been purged.
Answers
B.
Admin account passwords are not set to expire.
B.
Admin account passwords are not set to expire.
Answers
C.
Default settings have not been changed.
C.
Default settings have not been changed.
Answers
D.
Database activity logging is not complete.
D.
Database activity logging is not complete.
Answers
Suggested answer: B

Explanation:

Admin accounts typically have the highest level of privileges and access to sensitive data. If the passwords for these accounts are not set to expire, it increases the risk of unauthorized access and potential security breaches.This is especially true if an admin's credentials are compromised, as the attacker could have ongoing access to critical systems and data1.

Database Auditing - Satori

The FIRST step in an incident response plan is to:

A.
validate the incident.
A.
validate the incident.
Answers
B.
notify the head of the IT department.
B.
notify the head of the IT department.
Answers
C.
isolate systems impacted by the incident.
C.
isolate systems impacted by the incident.
Answers
D.
initiate root cause analysis.
D.
initiate root cause analysis.
Answers
Suggested answer: A

Explanation:

The first step in an incident response plan is typically preparation12. However, among the options provided, validating the incident would be the first step.This involves confirming that a security event is actually an incident3. It's important to verify the event to avoid wasting resources on false positives.

Incident Response Plan: Frameworks and Steps - CrowdStrike

What is Incident Response? Plan and Steps | Microsoft Security

What Are the Phases of an Incident Response Plan? - ISC2 Blog

Which of the following is the BEST indication of effective governance over IT infrastructure?

A.
The ability to deliver continuous, reliable performance
A.
The ability to deliver continuous, reliable performance
Answers
B.
A requirement for annual security awareness programs
B.
A requirement for annual security awareness programs
Answers
C.
An increase in the number of IT infrastructure servers
C.
An increase in the number of IT infrastructure servers
Answers
D.
A decrease in the number of information security incidents
D.
A decrease in the number of information security incidents
Answers
Suggested answer: A

Explanation:

Effective governance over IT infrastructure is indicated by the ability to deliver continuous, reliable performance12.This is because good governance ensures that IT investments support business objectives and produce measurable results towards achieving their strategies2.It involves implementing management and internal controls, strengthening security, financial controls, risk mitigation, and inspection and compliance obligations3. While security awareness programs, the number of servers, and the number of security incidents can be aspects of IT governance, they are not the best indicators of its effectiveness.

The Value of IT Governance - ISACA

What is IT governance? A formal way to align IT & business strategy | CIO

Robust Governance - KPMG Global

Following the sale of a business division, employees will be transferred to a new organization, but they will retain access to IT equipment from the previous employer. An IS auditor has recommended that both organizations agree to and document an acceptable use policy for the equipment. What type of control has been recommended?

A.
Detective control
A.
Detective control
Answers
B.
Preventive control
B.
Preventive control
Answers
C.
Directive control
C.
Directive control
Answers
D.
Corrective control
D.
Corrective control
Answers
Suggested answer: B

Explanation:

An acceptable use policy (AUP) is a preventive control that sets out rules and guidelines for using an organization's IT resources, including networks, devices, and software1.It defines acceptable and prohibited behaviors, aiming to protect assets, ensure security, and maintain a productive work environment1.By agreeing to and documenting an AUP for the equipment, both organizations can prevent potential misuse of IT resources2345.

ISO 27001 Acceptable Use Policy Beginner's Guide - High Table

Acceptable Use Policy for Information Technology Resources

Acceptable Use Policies for Workplace Technology | Verizon

IT Governance: Your Must-Have Policies - How-To Geek

Acceptable use policy template - Workable

In an organization's feasibility study to acquire hardware to support a new web server, omission of which of the following would be of MOST concern?

A.
Alternatives for financing the acquisition
A.
Alternatives for financing the acquisition
Answers
B.
Financial stability of potential vendors
B.
Financial stability of potential vendors
Answers
C.
Reputation of potential vendors
C.
Reputation of potential vendors
Answers
D.
Cost-benefit analysis of available products
D.
Cost-benefit analysis of available products
Answers
Suggested answer: D

Explanation:

The most important part of a feasibility study is the economics1.A cost-benefit analysis of available products is crucial as it helps to understand the economic viability of the project1.It compares the costs of the project with the benefits it is expected to deliver, which is essential for making informed decisions1. Omitting this could lead to investments in hardware that may not provide the expected returns or meet the organization's needs.

The Components of a Feasibility Study - ProjectEngineer

Which of the following is MOST likely to be a project deliverable of an agile software development methodology?

A.
Strictly managed software requirements baselines
A.
Strictly managed software requirements baselines
Answers
B.
Extensive project documentation
B.
Extensive project documentation
Answers
C.
Automated software programming routines
C.
Automated software programming routines
Answers
D.
Rapidly created working prototypes
D.
Rapidly created working prototypes
Answers
Suggested answer: D

Explanation:

A project deliverable is a tangible or intangible product or service that is produced as a result of a project and delivered to the customer or stakeholder. A project deliverable can be either an intermediate deliverable that is part of the project process or a final deliverable that is the outcome of the project.

An agile software development methodology is a project management approach that involves breaking the project into phases and emphasizes continuous collaboration and improvement. Teams follow a cycle of planning, executing, and evaluating. Agile software development methodologies value working software over comprehensive documentation and respond to change over following a plan.

Rapidly created working prototypes are most likely to be a project deliverable of an agile software development methodology because they:

Provide early and frequent feedback from customers and stakeholders on the functionality and usability of the software product

Allow for rapid validation and verification of the software requirements and design

Enable continuous improvement and adaptation of the software product based on changing customer needs and expectations

Reduce the risk of delivering a software product that does not meet customer needs or expectations

Increase customer satisfaction and trust by delivering working software products frequently and consistently

Some examples of agile software development methodologies that use rapidly created working prototypes as project deliverables are:

Scrum - a framework that organizes the work into fixed-length sprints (usually 2-4 weeks) and delivers potentially shippable increments of the software product at the end of each sprint1

Extreme Programming (XP) - a methodology that focuses on delivering high-quality software products through practices such as test-driven development, pair programming, continuous integration, and frequent releases2

Rapid Application Development (RAD) - a methodology that emphasizes rapid prototyping and user involvement throughout the software development process3

The other options are not likely to be project deliverables of an agile software development methodology.

Strictly managed software requirements baselines are not likely to be project deliverables of an agile software development methodology. A software requirements baseline is a set of agreed-upon and approved software requirements that serve as the basis for the software design, development, testing, and delivery. A strictly managed software requirements baseline is a software requirements baseline that is controlled and changed only through a formal change management process. Strictly managed software requirements baselines are more suitable for traditional or waterfall software development methodologies that follow a linear and sequential process of defining, designing, developing, testing, and delivering software products. Strictly managed software requirements baselines are not compatible with agile software development methodologies that embrace change and flexibility in the software requirements based on customer feedback and evolving needs.

Extensive project documentation is not likely to be project deliverables of an agile software development methodology. Project documentation is any written or electronic information that describes or records the activities, processes, results, or decisions of a project. Extensive project documentation is project documentation that covers every aspect of the project in detail and requires significant time and effort to produce and maintain. Extensive project documentation is more suitable for traditional or waterfall software development methodologies that rely on comprehensive documentation to communicate and document the project scope, requirements, design, testing, and delivery. Extensive project documentation is not compatible with agile software development methodologies that value working software over comprehensive documentation and use minimal documentation to support the communication and collaboration among the project team members.

Automated software programming routines are not likely to be project deliverables of an agile software development methodology. Automated software programming routines are programs or scripts that perform repetitive or complex tasks in the software development process without human intervention. Automated software programming routines can improve the efficiency, quality, and consistency of the software development process by reducing human errors, saving time, and enforcing standards. Automated software programming routines can be used in any software development methodology, but they are not specific to agile software development methodologies. Automated software programming routines are not considered as project deliverables because they are not part of the final product that is delivered to the customer.

Total 1.198 questions
Go to page: of 120