ExamGecko
Home Home / Isaca / CISA

Isaca CISA Practice Test - Questions Answers, Page 34

Question list
Search
Search

List of questions

Search

Related questions











An audit has identified that business units have purchased cloud-based applications without IPs support. What is the GREATEST risk associated with this situation?

A.
The applications are not included in business continuity plans (BCFs)
A.
The applications are not included in business continuity plans (BCFs)
Answers
B.
The applications may not reasonably protect data.
B.
The applications may not reasonably protect data.
Answers
C.
The application purchases did not follow procurement policy.
C.
The application purchases did not follow procurement policy.
Answers
D.
The applications could be modified without advanced notice.
D.
The applications could be modified without advanced notice.
Answers
Suggested answer: B

Explanation:

The greatest risk associated with the situation of business units purchasing cloud-based applications without IT support is that the applications may not reasonably protect data. Cloud-based applications are software applications that run on the internet, rather than on a local device or network.Cloud-based applications offer many benefits, such as scalability, accessibility, and cost-effectiveness, but they also pose many challenges and risks, especially for data security1.

Data security is the process of protecting data from unauthorized access, use, modification, disclosure, or destruction. Data security is essential for ensuring the confidentiality, integrity, and availability of data, as well as complying with legal and regulatory requirements.Data security is especially important for cloud-based applications, as data are stored and processed on remote servers that are owned and managed by third-party cloud service providers (CSPs)2.

When business units purchase cloud-based applications without IT support, they may not be aware of or follow the best practices and standards for data security in the cloud. They may not perform adequate risk assessments, vendor evaluations, contract reviews, or audits to ensure that the CSPs and the applications meet the organization's data security policies and expectations. They may not implement appropriate data encryption, backup, recovery, or disposal methods to protect the data in transit and at rest. They may not monitor or control the access and usage of the data by internal or external users.They may not report or respond to any data breaches or incidents that may occur3.

These actions or inactions may expose the organization's data to various threats and vulnerabilities in the cloud, such as cyberattacks, human errors, malicious insiders, misconfigurations, or legal disputes.These threats and vulnerabilities may result in data loss, leakage, corruption, or compromise, which may have serious consequences for the organization's reputation, operations, performance, compliance, and liability4.

Therefore, it is essential that business units consult and collaborate with IT support before purchasing any cloud-based applications, and follow the organization's guidelines and procedures for cloud security. IT support can help business units to select and use cloud-based applications that are suitable and secure for their needs and objectives.

Top 5 Risks With Cloud Software and How to Mitigate Them4

Mitigate risks and secure your cloud-native applications3

12 Risks, Threats & Vulnerabilities in Moving to the Cloud2

Best Practices to Manage Risks in the Cloud1

Which of the following would BEST enable an organization to address the security risks associated with a recently implemented bring your own device (BYOD) strategy?

A.
Mobile device tracking program
A.
Mobile device tracking program
Answers
B.
Mobile device upgrade program
B.
Mobile device upgrade program
Answers
C.
Mobile device testing program
C.
Mobile device testing program
Answers
D.
Mobile device awareness program
D.
Mobile device awareness program
Answers
Suggested answer: D

Explanation:

A mobile device awareness program would best enable an organization to address the security risks associated with a recently implemented bring your own device (BYOD) strategy. A mobile device awareness program is a set of activities that aim to educate and inform the employees about the benefits, challenges, and best practices of using their personal mobile devices for work purposes. A mobile device awareness program can help the organization to:

Communicate the organization's policies and expectations regarding BYOD, such as which devices are allowed, what data can be accessed or stored, and what security measures are required.

Raise the employees' awareness of the potential threats and vulnerabilities that affect their mobile devices, such as malware, phishing, data leakage, or device loss.

Provide the employees with guidance and tips on how to protect their mobile devices and the organization's data, such as using strong passwords, encryption, antivirus software, remote wipe, or VPN.

Encourage the employees to report any incidents or issues related to their mobile devices, such as suspicious messages, unauthorized access, or device damage.

A mobile device awareness program can help the organization to reduce the security risks associated with BYOD by enhancing the employees' knowledge, skills, and behavior in using their mobile devices securely and responsibly.A mobile device awareness program can also help the organization to comply with relevant regulations and standards that govern data privacy and security in the cloud1.

The other options are not as effective as a mobile device awareness program in enabling an organization to address the security risks associated with BYOD. Option A, mobile device tracking program, is a tool that allows the organization to monitor and locate the employees' mobile devices in case of loss or theft. However, this tool may not prevent or detect other types of security risks, such as malware infection or data breach. Option B, mobile device upgrade program, is a process that ensures that the employees' mobile devices are running the latest versions of operating systems and applications. However, this process may not address other aspects of security, such as user behavior or data protection. Option C, mobile device testing program, is a method that verifies the functionality and compatibility of the employees' mobile devices with the organization's systems and networks.However, this method may not cover all the scenarios or factors that may affect the security of the mobile devices or the organization's data2.

Mobile Device Security Awareness Topics3

Security Awareness Top Ten Topics - #8 Mobile Devices

Which of the following is MOST important to determine during the planning phase of a cloud-based messaging and collaboration platform acquisition?

A.
Role-based access control policies
A.
Role-based access control policies
Answers
B.
Types of data that can be uploaded to the platform
B.
Types of data that can be uploaded to the platform
Answers
C.
Processes for on-boarding and off-boarding users to the platform
C.
Processes for on-boarding and off-boarding users to the platform
Answers
D.
Processes for reviewing administrator activity
D.
Processes for reviewing administrator activity
Answers
Suggested answer: B

Explanation:

The most important thing to determine during the planning phase of a cloud-based messaging and collaboration platform acquisition is the types of data that can be uploaded to the platform. This is because different types of data may have different security, privacy, and compliance requirements, depending on the nature, sensitivity, and value of the data. For example, personal data, financial data, health data, or intellectual property data may be subject to various laws and regulations that govern how they can be collected, stored, processed, and shared in the cloud.Therefore, it is essential to identify and classify the types of data that will be uploaded to the platform, and ensure that the platform meets the organization's policies and standards for data protection1.

The other options are not as important as the types of data that can be uploaded to the platform during the planning phase of a cloud-based messaging and collaboration platform acquisition. Option A, role-based access control policies, is a mechanism that defines who can access what data and resources on the platform based on their roles and responsibilities.Role-based access control policies are important for ensuring data security and accountability, but they can be designed and implemented after the platform is acquired2. Option C, processes for on-boarding and off-boarding users to the platform, are procedures that enable or disable user accounts and access rights on the platform.Processes for on-boarding and off-boarding users are important for managing user identities and lifecycles, but they can be developed and executed after the platform is acquired3. Option D, processes for reviewing administrator activity, are methods that monitor and audit the actions and events performed by administrators on the platform.Processes for reviewing administrator activity are important for detecting and preventing unauthorized or malicious activities, but they can be established and performed after the platform is acquired4.

Cloud Messaging and Collaboration Services - Maryland.gov DoIT4

MessageBird acquires real-time notifications and in-app messaging platform Pusher for $35M | TechCrunch2

Symphony to lead financial market communications with the acquisition of Cloud9 Technologies3

Cloud messaging and collaboration | Sumo Logic

An IS auditor has found that a vendor has gone out of business and the escrow has an older version of the source code. What is the auditor's BEST recommendation for the organization?

A.
Analyze a new application that moots the current re
A.
Analyze a new application that moots the current re
Answers
B.
Perform an analysis to determine the business risk
B.
Perform an analysis to determine the business risk
Answers
C.
Bring the escrow version up to date.
C.
Bring the escrow version up to date.
Answers
D.
Develop a maintenance plan to support the application using the existing code
D.
Develop a maintenance plan to support the application using the existing code
Answers
Suggested answer: C

Explanation:

This means that the organization should obtain the source code from the escrow agent and compare it with the current version of the application that they are using. The organization should then identify and apply any changes or updates that are missing or different in the escrow version, so that it matches the current version. This way, the organization can ensure that they have a complete and accurate copy of the source code that reflects their current needs and requirements.

Bringing the escrow version up to date can help the organization to avoid or reduce the risks and costs associated with using an outdated or incompatible version of the source code. For example, an older version of the source code may have bugs, errors, or vulnerabilities that could affect the functionality, security, or performance of the application. An older version of the source code may also lack some features, enhancements, or integrations that could improve the usability, efficiency, or value of the application.An older version of the source code may also not comply with some standards, regulations, or contracts that could affect the quality, reliability, or legality of the application1.

The other options are not as good as bringing the escrow version up to date for the organization. Option A, analyzing a new application that meets the current requirements, is a possible option but it may be more time-consuming, expensive, and risky than updating the existing application. The organization may have to go through a complex and lengthy process of selecting, acquiring, implementing, testing, and migrating to a new application, which could disrupt their operations and performance.The organization may also have to deal with compatibility, interoperability, or data quality issues when switching to a new application2. Option B, performing an analysis to determine the business risk, is a necessary step but not a recommendation for the organization. The organization should already be aware of the business risk of using an application whose vendor has gone out of business and whose escrow has an older version of the source code.The organization should focus on finding and implementing a solution to mitigate or eliminate this risk3. Option D, developing a maintenance plan to support the application using the existing code, is not a feasible option because it assumes that the organization has access to the existing code. However, this is not the case because the vendor has gone out of business and the escrow has an older version of the source code. The organization cannot support or maintain an application without having a complete and accurate copy of its source code.

How Important Is Source Code Escrow - ISACA1

The What and Why of Source Code Escrow2

Unlocking Source Code In Escrow 2023: A Guide To Secure Software3

In response to an audit finding regarding a payroll application, management implemented a new automated control. Which of the following would be MOST helpful to the IS auditor when evaluating the effectiveness of the new control?

A.
Approved test scripts and results prior to implementation
A.
Approved test scripts and results prior to implementation
Answers
B.
Written procedures defining processes and controls
B.
Written procedures defining processes and controls
Answers
C.
Approved project scope document
C.
Approved project scope document
Answers
D.
A review of tabletop exercise results
D.
A review of tabletop exercise results
Answers
Suggested answer: B

Explanation:

The best way to evaluate the effectiveness of a new automated control is to review the written procedures that define the processes and controls. This will help the IS auditor to understand the objectives, scope, roles, responsibilities, and expected outcomes of the control. The written procedures will also provide a basis for testing the control and verifying its compliance with the audit finding recommendations.Reference:

ISACA Frameworks: Blueprints for Success

CISA Review Manual (Digital Version)

Which of the following BEST facilitates the legal process in the event of an incident?

A.
Right to perform e-discovery
A.
Right to perform e-discovery
Answers
B.
Advice from legal counsel
B.
Advice from legal counsel
Answers
C.
Preserving the chain of custody
C.
Preserving the chain of custody
Answers
D.
Results of a root cause analysis
D.
Results of a root cause analysis
Answers
Suggested answer: C

Explanation:

The best way to facilitate the legal process in the event of an incident is to preserve the chain of custody of the evidence. The chain of custody is a record of who handled, accessed, or modified the evidence, when, where, how, and why. The chain of custody helps to ensure the integrity, authenticity, and admissibility of the evidence in a court of law. The chain of custody also helps to prevent tampering, alteration, or loss of evidence that could compromise the investigation or the prosecution.Reference:

CISA Review Manual (Digital Version)

CISA Questions, Answers & Explanations Database

Which of the following is MOST important to ensure that electronic evidence collected during a forensic investigation will be admissible in future legal proceedings?

A.
Restricting evidence access to professionally certified forensic investigators
A.
Restricting evidence access to professionally certified forensic investigators
Answers
B.
Documenting evidence handling by personnel throughout the forensic investigation
B.
Documenting evidence handling by personnel throughout the forensic investigation
Answers
C.
Performing investigative procedures on the original hard drives rather than images of the hard drives
C.
Performing investigative procedures on the original hard drives rather than images of the hard drives
Answers
D.
Engaging an independent third party to perform the forensic investigation
D.
Engaging an independent third party to perform the forensic investigation
Answers
Suggested answer: B

Explanation:

The most important factor to ensure that electronic evidence collected during a forensic investigation will be admissible in future legal proceedings is to document evidence handling by personnel throughout the forensic investigation. Documentation is essential to establish the chain of custody, prove the integrity and authenticity of the evidence, and demonstrate compliance with legal and ethical standards. Documentation should include information such as the date, time, location, source, destination, method, purpose, result, and authorization of each action performed on the evidence. Documentation should also include any observations, findings, assumptions, limitations, or exceptions encountered during the investigation.Reference:

CISA Review Manual (Digital Version)

CISA Questions, Answers & Explanations Database

An IS auditor finds that one employee has unauthorized access to confidential data. The IS auditor's BEST recommendation should be to:

A.
reclassify the data to a lower level of confidentiality
A.
reclassify the data to a lower level of confidentiality
Answers
B.
require the business owner to conduct regular access reviews.
B.
require the business owner to conduct regular access reviews.
Answers
C.
implement a strong password schema for users.
C.
implement a strong password schema for users.
Answers
D.
recommend corrective actions to be taken by the security administrator.
D.
recommend corrective actions to be taken by the security administrator.
Answers
Suggested answer: B

Explanation:

The best recommendation for an IS auditor who finds that one employee has unauthorized access to confidential data is to require the business owner to conduct regular access reviews. Access reviews are periodic assessments of user access rights and permissions to ensure that they are appropriate, necessary, and aligned with the business needs and objectives. Access reviews help to identify and remediate any unauthorized, excessive, or obsolete access that could pose a security risk or violate compliance requirements. The business owner is responsible for defining and approving the access requirements for their data and ensuring that they are enforced and monitored.Reference:

CISA Review Manual (Digital Version)

CISA Questions, Answers & Explanations Database

Which of the following is necessary for effective risk management in IT governance?

A.
Local managers are solely responsible for risk evaluation.
A.
Local managers are solely responsible for risk evaluation.
Answers
B.
IT risk management is separate from corporate risk management.
B.
IT risk management is separate from corporate risk management.
Answers
C.
Risk management strategy is approved by the audit committee.
C.
Risk management strategy is approved by the audit committee.
Answers
D.
Risk evaluation is embedded in management processes.
D.
Risk evaluation is embedded in management processes.
Answers
Suggested answer: D

Explanation:

The necessary condition for effective risk management in IT governance is that risk evaluation is embedded in management processes. Risk evaluation is the process of comparing the results of risk analysis with risk criteria to determine whether the risk and/or its magnitude is acceptable or tolerable. Risk evaluation should be integrated into the management processes of planning, implementing, monitoring, and reviewing the IT activities and resources. This will ensure that risk management is aligned with the business objectives, strategies, and values, and that risk responses are timely, appropriate, and effective.Reference:

CISA Review Manual (Digital Version)

CISA Questions, Answers & Explanations Database

During a security audit, an IS auditor is tasked with reviewing log entries obtained from an enterprise intrusion prevention system (IPS). Which type of risk would be associated with the potential for the auditor to miss a sequence of logged events that could indicate an error in the IPS configuration?

A.
Sampling risk
A.
Sampling risk
Answers
B.
Detection risk
B.
Detection risk
Answers
C.
Control risk
C.
Control risk
Answers
D.
Inherent risk
D.
Inherent risk
Answers
Suggested answer: B

Explanation:

The type of risk associated with the potential for the auditor to miss a sequence of logged events that could indicate an error in the IPS configuration is detection risk. Detection risk is the risk that the auditor's procedures will not detect a material misstatement or error that exists in an assertion or a control. Detection risk can be affected by factors such as the nature, timing, and extent of the audit procedures, the quality and sufficiency of the audit evidence, and the auditor's professional judgment and competence. Detection risk can be reduced by applying appropriate audit techniques, such as sampling, testing, observation, inquiry, and analysis.Reference:

CISA Review Manual (Digital Version)

CISA Questions, Answers & Explanations Database

Total 1.198 questions
Go to page: of 120