ExamGecko
Home Home / Isaca / CISA

Isaca CISA Practice Test - Questions Answers, Page 29

Question list
Search
Search

List of questions

Search

Related questions











Which of the following is the BEST indicator of the effectiveness of an organization's incident response program?

A.
Number of successful penetration tests
A.
Number of successful penetration tests
Answers
B.
Percentage of protected business applications
B.
Percentage of protected business applications
Answers
C.
Financial impact per security event
C.
Financial impact per security event
Answers
D.
Number of security vulnerability patches
D.
Number of security vulnerability patches
Answers
Suggested answer: C

Explanation:

The best indicator of the effectiveness of an organization's incident response program is the financial impact per security event. This metric measures the direct and indirect costs associated with security incidents, such as loss of revenue, reputation damage, legal fees, recovery expenses, and fines. By reducing the financial impact per security event, the organization can demonstrate that its incident response program is effective in mitigating the consequences of security breaches and restoring normal operations as quickly as possible. Number of successful penetration tests, percentage of protected business applications, and number of security vulnerability patches are indicators of the security posture of the organization, but they do not reflect the effectiveness of the incident response program.Reference:ISACA Journal Article: Measuring Incident Response Effectiveness

Which of the following is the BEST source of information for an IS auditor to use as a baseline to assess the adequacy of an organization's privacy policy?

A.
Historical privacy breaches and related root causes
A.
Historical privacy breaches and related root causes
Answers
B.
Globally accepted privacy best practices
B.
Globally accepted privacy best practices
Answers
C.
Local privacy standards and regulations
C.
Local privacy standards and regulations
Answers
D.
Benchmark studies of similar organizations
D.
Benchmark studies of similar organizations
Answers
Suggested answer: C

Explanation:

The best source of information for an IS auditor to use as a baseline to assess the adequacy of an organization's privacy policy is the local privacy standards and regulations. Privacy standards and regulations are legal requirements that specify how personal data should be collected, processed, stored, shared, and disposed of by organizations. By using local privacy standards and regulations as a baseline, the IS auditor can ensure that the organization's privacy policy complies with the applicable laws and protects the rights and interests of data subjects. Historical privacy breaches and related root causes, globally accepted privacy best practices, and benchmark studies of similar organizations are useful sources of information for improving an organization's privacy policy, but they are not as authoritative and relevant as local privacy standards and regulations.Reference:CISA Review Manual (Digital Version): Chapter 2 - Governance and Management of Information Technology

The PRIMARY reason for an IS auditor to use data analytics techniques is to reduce which type of audit risk?

A.
Technology risk
A.
Technology risk
Answers
B.
Detection risk
B.
Detection risk
Answers
C.
Control risk
C.
Control risk
Answers
D.
Inherent risk
D.
Inherent risk
Answers
Suggested answer: B

Explanation:

The primary reason for an IS auditor to use data analytics techniques is to reduce detection risk. Detection risk is the risk that an IS auditor will fail to detect material errors or irregularities in the information systems environment. By using data analytics techniques, such as data extraction, analysis, visualization, and reporting, an IS auditor can enhance the audit scope, coverage, efficiency, and effectiveness. Data analytics techniques can help an IS auditor to identify anomalies, patterns, trends, correlations, and outliers in large volumes of data that may indicate potential issues or risks. Technology risk, control risk, and inherent risk are types of audit risk that are not directly affected by the use of data analytics techniques by an IS auditor.Reference:[ISACA Journal Article: Data Analytics for Auditors]

Which of the following would lead an IS auditor to conclude that the evidence collected during a digital forensic investigation would not be admissible in court?

A.
The person who collected the evidence is not qualified to represent the case.
A.
The person who collected the evidence is not qualified to represent the case.
Answers
B.
The logs failed to identify the person handling the evidence.
B.
The logs failed to identify the person handling the evidence.
Answers
C.
The evidence was collected by the internal forensics team.
C.
The evidence was collected by the internal forensics team.
Answers
D.
The evidence was not fully backed up using a cloud-based solution prior to the trial.
D.
The evidence was not fully backed up using a cloud-based solution prior to the trial.
Answers
Suggested answer: B

Explanation:

The evidence collected during a digital forensic investigation would not be admissible in court if the logs failed to identify the person handling the evidence. This would violate the chain of custody principle, which requires that the evidence be properly documented, secured, and tracked throughout the investigation process. The chain of custody ensures that the evidence is authentic, reliable, and trustworthy, and that it has not been tampered with or altered. The person who collected the evidence, whether qualified or not, is not relevant to the admissibility of the evidence, as long as they followed the proper procedures and protocols. The evidence collected by the internal forensics team can be admissible in court, as long as they are independent, objective, and competent. The evidence does not need to be fully backed up using a cloud-based solution prior to the trial, as long as it is preserved and protected from damage or loss.Reference:ISACA Journal Article: Digital Forensics: Chain of Custody

An IS auditor performs a follow-up audit and learns the approach taken by the auditee to fix the findings differs from the agreed-upon approach confirmed during the last audit. Which of the following should be the auditor's NEXT course of action?

A.
Evaluate the appropriateness of the remedial action taken.
A.
Evaluate the appropriateness of the remedial action taken.
Answers
B.
Conduct a risk analysis incorporating the change.
B.
Conduct a risk analysis incorporating the change.
Answers
C.
Report results of the follow-up to the audit committee.
C.
Report results of the follow-up to the audit committee.
Answers
D.
Inform senior management of the change in approach.
D.
Inform senior management of the change in approach.
Answers
Suggested answer: A

Explanation:

The auditor's next course of action should be to evaluate the appropriateness of the remedial action taken by the auditee. The auditor should assess whether the alternative approach taken by the auditee is effective, efficient, and aligned with the audit objectives and recommendations. The auditor should also consider the impact of the change on the audit scope, criteria, and risk assessment. Conducting a risk analysis incorporating the change, reporting results of the follow-up to the audit committee, and informing senior management of the change in approach are possible subsequent actions that the auditor may take after evaluating the appropriateness of the remedial action taken.Reference:CISA Review Manual (Digital Version): Chapter 1 - Information Systems Auditing Process

Which of the following conditions would be of MOST concern to an IS auditor assessing the risk of a successful brute force attack against encrypted data at test?

A.
Short key length
A.
Short key length
Answers
B.
Random key generation
B.
Random key generation
Answers
C.
Use of symmetric encryption
C.
Use of symmetric encryption
Answers
D.
Use of asymmetric encryption
D.
Use of asymmetric encryption
Answers
Suggested answer: A

Explanation:

The condition that would be of most concern to an IS auditor assessing the risk of a successful brute force attack against encrypted data at rest is short key length. A brute force attack is a method of breaking encryption by trying all possible combinations of keys until finding the correct one. The shorter the key length, the easier it is for an attacker to guess or crack the encryption. Random key generation, use of symmetric encryption, and use of asymmetric encryption are not conditions that would increase the risk of a successful brute force attack. In fact, random key generation can enhance security by preventing predictable patterns in key selection. Symmetric encryption and asymmetric encryption are different types of encryption that have their own advantages and disadvantages, but neither is inherently more vulnerable to brute force attacks than the other.Reference:CISA Review Manual (Digital Version): Chapter 5 - Information Systems Operations and Business Resilience

Which of the following metrics would BEST measure the agility of an organization's IT function?

A.
Average number of learning and training hours per IT staff member
A.
Average number of learning and training hours per IT staff member
Answers
B.
Frequency of security assessments against the most recent standards and guidelines
B.
Frequency of security assessments against the most recent standards and guidelines
Answers
C.
Average time to turn strategic IT objectives into an agreed upon and approved initiative
C.
Average time to turn strategic IT objectives into an agreed upon and approved initiative
Answers
D.
Percentage of staff with sufficient IT-related skills for the competency required of their roles
D.
Percentage of staff with sufficient IT-related skills for the competency required of their roles
Answers
Suggested answer: C

Explanation:

The metric that would best measure the agility of an organization's IT function is average time to turn strategic IT objectives into an agreed upon and approved initiative. IT agility is the ability of an IT function to respond quickly and effectively to changing business needs and opportunities. By measuring how fast an IT function can translate strategic IT objectives into actionable initiatives, such as projects or programs, an organization can assess how well its IT function can align with and support its business strategy. Average number of learning and training hours per IT staff member, frequency of security assessments against the most recent standards and guidelines, and percentage of staff with sufficient IT-related skills for the competency required of their roles are metrics that may indicate other aspects of IT performance, such as capability development, security maturity, and skills gap analysis, but they do not directly measure IT agility.Reference:ISACA Journal Article: Measuring IT Agility

An employee loses a mobile device resulting in loss of sensitive corporate data. Which o( the following would have BEST prevented data leakage?

A.
Data encryption on the mobile device
A.
Data encryption on the mobile device
Answers
B.
Complex password policy for mobile devices
B.
Complex password policy for mobile devices
Answers
C.
The triggering of remote data wipe capabilities
C.
The triggering of remote data wipe capabilities
Answers
D.
Awareness training for mobile device users
D.
Awareness training for mobile device users
Answers
Suggested answer: A

Explanation:

The best way to prevent data leakage from a lost mobile device is data encryption on the mobile device. Data encryption is a technique that transforms data into an unreadable format using a secret key or algorithm. Data encryption protects data from unauthorized access or disclosure in case of loss or theft of a mobile device. Complex password policy for mobile devices, triggering of remote data wipe capabilities, and awareness training for mobile device users are useful measures to enhance data security on mobile devices, but they do not prevent data leakage as effectively as data encryption. A complex password policy can be bypassed by brute force attacks or password cracking tools. Remote data wipe capabilities depend on network connectivity and device power availability. Awareness training for mobile device users can reduce human errors or negligence, but it cannot guarantee compliance or behavior change.Reference:CISA Review Manual (Digital Version): Chapter 5 - Information Systems Operations and Business Resilience

Which of the following should an IS auditor review FIRST when planning a customer data privacy audit?

A.
Legal and compliance requirements
A.
Legal and compliance requirements
Answers
B.
Customer agreements
B.
Customer agreements
Answers
C.
Data classification
C.
Data classification
Answers
D.
Organizational policies and procedures
D.
Organizational policies and procedures
Answers
Suggested answer: D

Explanation:

The organizational policies and procedures are the first source of guidance for an IS auditor when planning a customer data privacy audit. They provide the framework and objectives for ensuring compliance with legal and regulatory requirements, customer agreements and data classification. The IS auditor should review them first to understand the scope, roles and responsibilities, standards and controls related to customer data privacy in the organization.The other options are also important, but they are secondary sources of information that should be reviewed after the organizational policies and procedures.Reference:CISA Review Manual (Digital Version)1, Chapter 2: Governance and Management of Information Technology, Section 2.5: Privacy Principles and Policies.

Which of the following provides IS audit professionals with the BEST source of direction for performing audit functions?

A.
Audit charter
A.
Audit charter
Answers
B.
IT steering committee
B.
IT steering committee
Answers
C.
Information security policy
C.
Information security policy
Answers
D.
Audit best practices
D.
Audit best practices
Answers
Suggested answer: A

Explanation:

The audit charter is the document that defines the purpose, authority and responsibility of the IS audit function. It provides IS audit professionals with the best source of direction for performing audit functions, as it establishes the scope, objectives, reporting lines, independence, accountability and resources of the IS audit function. The IT steering committee is a governance body that oversees the strategic alignment, prioritization and direction of IT initiatives, but it does not provide specific guidance for IS audit functions. The information security policy is a document that defines the rules and principles for protecting information assets in the organization, but it does not cover all aspects of IS audit functions.Audit best practices are general guidelines and recommendations for conducting effective and efficient audits, but they are not binding or authoritative sources of direction for IS audit functions.Reference:CISA Review Manual (Digital Version)1, Chapter 1: Information Systems Auditing Process, Section 1.1: Audit Charter.

Total 1.198 questions
Go to page: of 120