ExamGecko
Home Home / Isaca / CISA

Isaca CISA Practice Test - Questions Answers, Page 31

Question list
Search
Search

List of questions

Search

Related questions











Which of the following is the MOST important determining factor when establishing appropriate timeframes for follow-up activities related to audit findings?

A.
Availability of IS audit resources
A.
Availability of IS audit resources
Answers
B.
Remediation dates included in management responses
B.
Remediation dates included in management responses
Answers
C.
Peak activity periods for the business
C.
Peak activity periods for the business
Answers
D.
Complexity of business processes identified in the audit
D.
Complexity of business processes identified in the audit
Answers
Suggested answer: B

Explanation:

The most important determining factor when establishing appropriate timeframes for follow-up activities related to audit findings is the remediation dates included in management responses. The IS auditor should ensure that the follow-up activities are aligned with the agreed-upon action plans and deadlines that management has committed to in response to the audit findings. The follow-up activities should verify that management has implemented the corrective actions effectively and in a timely manner, and that the audit findings have been resolved or mitigated.

The other options are less important factors for establishing timeframes for follow-up activities:

Availability of IS audit resources. This is a practical factor that may affect the scheduling and execution of follow-up activities, but it should not override the priority and urgency of verifying management's corrective actions.

Peak activity periods for the business. This is a factor that may affect the availability and cooperation of auditees during follow-up activities, but it should not delay or postpone the verification of management's corrective actions beyond reasonable limits.

Complexity of business processes identified in the audit. This is a factor that may affect the scope and depth of follow-up activities, but it should not affect the timeframe for verifying management's corrective actions.

When an IS audit reveals that a firewall was unable to recognize a number of attack attempts, the auditor's BEST recommendation is to place an intrusion detection system (IDS) between the firewall and:

A.
the organization's web server.
A.
the organization's web server.
Answers
B.
the demilitarized zone (DMZ).
B.
the demilitarized zone (DMZ).
Answers
C.
the organization's network.
C.
the organization's network.
Answers
D.
the Internet
D.
the Internet
Answers
Suggested answer: D

Explanation:

The best recommendation is to place an intrusion detection system (IDS) between the firewall and the Internet. An IDS is a device or software that monitors network traffic for malicious activity and alerts the network administrator or takes preventive action. By placing an IDS between the firewall and the Internet, the IS auditor can enhance the security of the network perimeter and detect any attack attempts that the firewall was unable to recognize.

The other options are not as effective as placing an IDS between the firewall and the Internet:

Placing an IDS between the firewall and the organization's web server would not protect the web server from external attacks that bypass the firewall. The web server should be placed in a demilitarized zone (DMZ), which is a separate network segment that isolates public-facing servers from the internal network.

Placing an IDS between the firewall and the demilitarized zone (DMZ) would not protect the DMZ from external attacks that bypass the firewall. The DMZ should be protected by two firewalls, one facing the Internet and one facing the internal network, with an IDS monitoring both sides of each firewall.

Placing an IDS between the firewall and the organization's network would not protect the organization's network from external attacks that bypass the firewall. The organization's network should be protected by a firewall that blocks unauthorized traffic from entering or leaving the network, with an IDS monitoring both sides of the firewall.

Which of the following is the MOST important reason to classify a disaster recovery plan (DRP) as confidential?

A.
Ensure compliance with the data classification policy.
A.
Ensure compliance with the data classification policy.
Answers
B.
Protect the plan from unauthorized alteration.
B.
Protect the plan from unauthorized alteration.
Answers
C.
Comply with business continuity best practice.
C.
Comply with business continuity best practice.
Answers
D.
Reduce the risk of data leakage that could lead to an attack.
D.
Reduce the risk of data leakage that could lead to an attack.
Answers
Suggested answer: D

Explanation:

The most important reason to classify a disaster recovery plan (DRP) as confidential is to reduce the risk of data leakage that could lead to an attack. A DRP contains sensitive information about the organization's IT infrastructure, systems, processes, and procedures for recovering from a disaster. If this information falls into the wrong hands, it could be exploited by malicious actors to launch targeted attacks, sabotage recovery efforts, or extort ransom. Therefore, a DRP should be protected from unauthorized access, disclosure, modification, or destruction.

The other options are not as important as reducing the risk of data leakage that could lead to an attack:

Ensuring compliance with the data classification policy is a good practice, but it is not a sufficient reason to classify a DRP as confidential. The data classification policy should reflect the level of risk and impact associated with each type of data, and a DRP should be classified as confidential based on its potential harm if compromised.

Protecting the plan from unauthorized alteration is a valid concern, but it is not a primary reason to classify a DRP as confidential. A DRP should be protected from unauthorized alteration by implementing access controls, audit trails, version control, and change management processes. Classifying a DRP as confidential may deter some unauthorized alterations, but it does not prevent them.

Complying with business continuity best practice is a desirable goal, but it is not a compelling reason to classify a DRP as confidential. Business continuity best practice may recommend classifying a DRP as confidential, but it does not mandate it. The decision to classify a DRP as confidential should be based on a risk assessment and a cost-benefit analysis.

A now regulation requires organizations to report significant security incidents to the regulator within 24 hours of identification. Which of the following is the IS auditor's BEST recommendation to facilitate compliance with the regulation?

A.
Establish key performance indicators (KPls) for timely identification of security incidents.
A.
Establish key performance indicators (KPls) for timely identification of security incidents.
Answers
B.
Engage an external security incident response expert for incident handling.
B.
Engage an external security incident response expert for incident handling.
Answers
C.
Enhance the alert functionality of the intrusion detection system (IDS).
C.
Enhance the alert functionality of the intrusion detection system (IDS).
Answers
D.
Include the requirement in the incident management response plan.
D.
Include the requirement in the incident management response plan.
Answers
Suggested answer: D

Explanation:

The best recommendation for the IS auditor to facilitate compliance with the new regulation is to include the requirement in the incident management response plan. An incident management response plan is a document that defines the roles, responsibilities, processes, and procedures for responding to security incidents. By including the new regulation in the plan, the IS auditor can ensure that the organization is aware of the reporting obligation, has a clear workflow for notifying the regulator within 24 hours, and has the necessary documentation and evidence to support the report.

The other options are not as effective as including the requirement in the incident management response plan:

Establishing key performance indicators (KPIs) for timely identification of security incidents is a good practice, but it does not guarantee compliance with the regulation. KPIs are metrics that measure the performance of a process or activity, but they do not specify how to perform it. The IS auditor should also provide guidance on how to identify and report security incidents within 24 hours.

Engaging an external security incident response expert for incident handling is a possible option, but it may not be feasible or cost-effective. The organization may not have the budget or time to hire an external expert, or may prefer to handle the incidents internally. The IS auditor should also evaluate the qualifications and trustworthiness of the external expert, and ensure that they comply with the regulation and other contractual or legal obligations.

Enhancing the alert functionality of the intrusion detection system (IDS) is a useful measure, but it is not sufficient to comply with the regulation. An IDS is a tool that monitors network traffic for malicious activity and alerts the network administrator or takes preventive action. However, an IDS may not detect all types of security incidents, or may generate false positives or negatives. The IS auditor should also consider other sources of incident detection, such as logs, reports, audits, or user feedback.

After the merger of two organizations, which of the following is the MOST important task for an IS auditor to perform?

A.
Verifying that access privileges have been reviewed
A.
Verifying that access privileges have been reviewed
Answers
B.
investigating access rights for expiration dates
B.
investigating access rights for expiration dates
Answers
C.
Updating the continuity plan for critical resources
C.
Updating the continuity plan for critical resources
Answers
D.
Updating the security policy
D.
Updating the security policy
Answers
Suggested answer: A

Explanation:

The most important task for an IS auditor to perform after the merger of two organizations is to verify that access privileges have been reviewed. Access privileges are the permissions granted to users, groups, or roles to access, modify, or manage IT resources, such as systems, applications, data, or networks. After a merger, the IS auditor should ensure that the access privileges of both organizations are aligned with the new business objectives, policies, and processes, and that there are no conflicts, overlaps, or gaps in the access rights. The IS auditor should also verify that the access privileges are based on the principle of least privilege, which means that users are granted only the minimum level of access required to perform their tasks.

The other options are not as important as verifying that access privileges have been reviewed:

Investigating access rights for expiration dates is a useful task, but it is not the most important one. Expiration dates are the dates when access rights are automatically revoked or suspended after a certain period of time or after a specific event. The IS auditor should check that the expiration dates are set appropriately and enforced consistently, but this is not as critical as reviewing the access privileges themselves.

Updating the continuity plan for critical resources is a necessary task, but it is not the most urgent one. A continuity plan is a document that outlines the procedures and actions to be taken in the event of a disruption or disaster that affects the availability of IT resources. The IS auditor should update the continuity plan to reflect the changes and dependencies introduced by the merger, but this can be done after verifying that the access privileges are secure and compliant.

Updating the security policy is an essential task, but it is not the most immediate one. A security policy is a document that defines the rules and guidelines for securing IT resources and protecting information assets. The IS auditor should update the security policy to incorporate the best practices and standards of both organizations, and to address any new risks or threats posed by the merger, but this can be done after verifying that the access privileges are aligned with the policy.

An IS auditor is reviewing an organization's primary router access control list. Which of the following should result in a finding?

A.
There are conflicting permit and deny rules for the IT group.
A.
There are conflicting permit and deny rules for the IT group.
Answers
B.
The network security group can change network address translation (NAT).
B.
The network security group can change network address translation (NAT).
Answers
C.
Individual permissions are overriding group permissions.
C.
Individual permissions are overriding group permissions.
Answers
D.
There is only one rule per group with access privileges.
D.
There is only one rule per group with access privileges.
Answers
Suggested answer: C

Explanation:

This should result in a finding because it violates the best practice of setting rules for groups rather than users.According to one of the web search results1, using group permissions instead of individual permissions can simplify the management and maintenance of ACLs, reduce the risk of human errors, and ensure consistency and compliance. Individual permissions can create conflicts, confusion, and security gaps in the ACLs. Therefore, the IS auditor should report this as a finding and recommend using group permissions instead.

While auditing a small organization's data classification processes and procedures, an IS auditor noticed that data is often classified at the incorrect level. What is the MOST effective way for the organization to improve this situation?

A.
Use automatic document classification based on content.
A.
Use automatic document classification based on content.
Answers
B.
Have IT security staff conduct targeted training for data owners.
B.
Have IT security staff conduct targeted training for data owners.
Answers
C.
Publish the data classification policy on the corporate web portal.
C.
Publish the data classification policy on the corporate web portal.
Answers
D.
Conduct awareness presentations and seminars for information classification policies.
D.
Conduct awareness presentations and seminars for information classification policies.
Answers
Suggested answer: B

Explanation:

This is the most effective way for the organization to improve its data classification processes and procedures, because data owners are the ones who are responsible for assigning the appropriate level of classification to the data they create, collect, or manage. Data owners should be aware of the data classification policy, the criteria for each level of classification, and the implications of misclassification. IT security staff can provide tailored training for data owners based on their roles, functions, and types of data they handle.

The other options are not as effective as having IT security staff conduct targeted training for data owners:

Use automatic document classification based on content. This is a possible option, but it may not be feasible or accurate for a small organization. Automatic document classification is a process that uses artificial intelligence or machine learning to analyze the content of a document and assign a class label based on predefined rules or models. However, this process may require a lot of resources, expertise, and maintenance, and it may not capture all the nuances and context of the data. The IS auditor should also verify the reliability and validity of the automatic document classification system.

Publish the data classification policy on the corporate web portal. This is a good practice, but it is not enough to improve the data classification situation. Publishing the data classification policy on the corporate web portal can increase the visibility and accessibility of the policy, but it does not ensure that data owners will read, understand, and follow it. The IS auditor should also monitor and enforce the compliance with the policy.

Conduct awareness presentations and seminars for information classification policies. This is a useful measure, but it is not the most effective one. Conducting awareness presentations and seminars can raise the general awareness and knowledge of information classification policies among all employees, but it may not address the specific needs and challenges of data owners. The IS auditor should also provide more in-depth and practical training for data owners.

An organization recently implemented a cloud document storage solution and removed the ability for end users to save data to their local workstation hard drives. Which of the following findings should be the IS auditor's GREATEST concern?

A.
Users are not required to sign updated acceptable use agreements.
A.
Users are not required to sign updated acceptable use agreements.
Answers
B.
Users have not been trained on the new system.
B.
Users have not been trained on the new system.
Answers
C.
The business continuity plan (BCP) was not updated.
C.
The business continuity plan (BCP) was not updated.
Answers
D.
Mobile devices are not encrypted.
D.
Mobile devices are not encrypted.
Answers
Suggested answer: C

Explanation:

This should be the IS auditor's greatest concern, because it means that the organization has not considered the potential impact of the cloud document storage solution on its ability to continue its operations in the event of a disruption or disaster. A BCP is a document that outlines the procedures and actions to be taken in order to maintain or resume critical business functions during and after a crisis. A BCP should be updated whenever there is a significant change in the organization's IT infrastructure, systems, processes, or dependencies, such as implementing a cloud document storage solution. The IS auditor should verify that the BCP reflects the current state of the organization's IT environment, and that it addresses the risks, challenges, and opportunities associated with the cloud document storage solution.

The other options are not as concerning as the BCP not being updated:

Users are not required to sign updated acceptable use agreements. This is a minor concern, but it does not pose a major threat to the organization's business continuity. Acceptable use agreements are documents that define the rules and guidelines for using IT resources, such as the cloud document storage solution. Users should sign updated acceptable use agreements to acknowledge their responsibilities and obligations, and to comply with the organization's policies and standards. However, this does not affect the organization's ability to continue its operations in a crisis.

Users have not been trained on the new system. This is a moderate concern, but it does not jeopardize the organization's business continuity. Training users on the new system is important to ensure that they can use it effectively and efficiently, and to avoid errors or misuse that could compromise the security or performance of the system. However, this does not prevent the organization from accessing or restoring its data in a crisis.

Mobile devices are not encrypted. This is a serious concern, but it does not directly impact the organization's business continuity. Encrypting mobile devices is a security measure that protects the data stored on them from unauthorized access or disclosure in case of loss or theft. However, this does not affect the availability or integrity of the data stored in the cloud document storage solution, which should have its own encryption mechanisms.

Which of the following must be in place before an IS auditor initiates audit follow-up activities?

A.
Available resources for the activities included in the action plan
A.
Available resources for the activities included in the action plan
Answers
B.
A management response in the final report with a committed implementation date
B.
A management response in the final report with a committed implementation date
Answers
C.
A heal map with the gaps and recommendations displayed in terms of risk
C.
A heal map with the gaps and recommendations displayed in terms of risk
Answers
D.
Supporting evidence for the gaps and recommendations mentioned in the audit report
D.
Supporting evidence for the gaps and recommendations mentioned in the audit report
Answers
Suggested answer: B

Explanation:

This must be in place before an IS auditor initiates audit follow-up activities, because it indicates that management has acknowledged and accepted the audit findings and recommendations, and has agreed to take corrective actions within a specified timeframe. Audit follow-up activities are the processes and procedures that the IS auditor performs to verify that management has implemented the agreed-upon actions effectively and in a timely manner, and that the audit findings have been resolved or mitigated.

The other options are not required to be in place before an IS auditor initiates audit follow-up activities:

Available resources for the activities included in the action plan. This is a factor that may affect the feasibility and success of the action plan, but it is not a prerequisite for the audit follow-up activities. The IS auditor should assess the availability and adequacy of the resources for the action plan during the audit planning and execution phases, and provide recommendations accordingly. However, the IS auditor does not need to wait for the resources to be available before initiating the audit follow-up activities.

A heat map with the gaps and recommendations displayed in terms of risk. This is a tool that may help the IS auditor prioritize and communicate the gaps and recommendations, but it is not a requirement for the audit follow-up activities. A heat map is a graphical representation of data that uses colors to indicate the level of risk or impact of each gap or recommendation. The IS auditor may use a heat map to support the audit report or presentation, but it does not replace the need for a management response with a committed implementation date.

Supporting evidence for the gaps and recommendations mentioned in the audit report. This is a component that should be included in the audit report, but it is not a condition for the audit follow-up activities. Supporting evidence is the information or data that supports or substantiates the audit findings and recommendations. The IS auditor should collect and document sufficient, reliable, relevant, and useful evidence during the audit execution phase, and present it in the audit report. However, the IS auditor does not need to have supporting evidence in place before initiating the audit follow-up activities.

Which of the following is the MOST appropriate and effective fire suppression method for an unstaffed computer room?

A.
Water sprinkler
A.
Water sprinkler
Answers
B.
Fire extinguishers
B.
Fire extinguishers
Answers
C.
Carbon dioxide (CO2)
C.
Carbon dioxide (CO2)
Answers
D.
Dry pipe
D.
Dry pipe
Answers
Suggested answer: C

Explanation:

The most appropriate and effective fire suppression method for an un-staffed computer room is carbon dioxide (CO2). Carbon dioxide is a gaseous clean agent that extinguishes fire by displacing oxygen and reducing the combustion process. Carbon dioxide is suitable for un-staffed computer rooms because it does not leave any residue, damage, or corrosion on the electronic equipment, and it does not require water or other chemicals that could harm the environment or human health. However, carbon dioxide can pose a risk of asphyxiation to any person who may enter the computer room during or after the discharge, so proper safety precautions and warning signs should be in place.

The other options are not as appropriate or effective as carbon dioxide for an un-staffed computer room:

Water sprinkler. This is a common fire suppression method that uses water to cool down and extinguish fire. However, water sprinkler is not suitable for un-staffed computer rooms because it can cause severe damage to the electronic equipment, such as short circuits, corrosion, or data loss. Water sprinkler can also create a risk of electric shock to any person who may enter the computer room during or after the discharge.

Fire extinguishers. These are portable devices that contain a pressurized agent that can be sprayed on a fire to put it out. However, fire extinguishers are not effective for un-staffed computer rooms because they require manual operation by a trained person who can identify the type and location of the fire, and use the appropriate extinguisher. Fire extinguishers can also cause damage to the electronic equipment if they contain water or chemical agents.

Dry pipe. This is a type of sprinkler system that uses pressurized air or nitrogen in the pipes instead of water until a fire is detected. When a fire is detected, the air or nitrogen is released and water flows into the pipes and sprinklers. However, dry pipe is not ideal for un-staffed computer rooms because it still uses water as the extinguishing agent, which can damage the electronic equipment as mentioned above. Dry pipe also has a slower response time than wet pipe sprinkler systems, which can allow the fire to spread more quickly.

Total 1.198 questions
Go to page: of 120