ExamGecko
Home Home / Isaca / CISA

Isaca CISA Practice Test - Questions Answers, Page 8

Question list
Search
Search

Related questions

What is MOST important to verify during an external assessment of network vulnerability?

A.
Update of security information event management (SIEM) rules
A.
Update of security information event management (SIEM) rules
Answers
B.
Regular review of the network security policy
B.
Regular review of the network security policy
Answers
C.
Completeness of network asset inventory
C.
Completeness of network asset inventory
Answers
D.
Location of intrusion detection systems (IDS)
D.
Location of intrusion detection systems (IDS)
Answers
Suggested answer: C

Explanation:

An external assessment of network vulnerability is a process of identifying and evaluating the weaknesses and risks that affect the security and availability of a network from an outsider's perspective. The most important factor to verify during this process is the completeness of network asset inventory, which is a list of all the devices, systems, and software that are connected to or part of the network. A complete and accurate network asset inventory can help identify the scope and boundaries of the network, the potential attack vectors and entry points, the critical assets and dependencies, and the existing security controls and gaps. Without a complete network asset inventory, an external assessment of network vulnerability may miss some important assets or vulnerabilities, leading to inaccurate or incomplete results and recommendations.

1explains what is an external vulnerability scan and why it is important to have a complete network asset inventory.

2provides a guide on how to conduct a full network vulnerability assessment and emphasizes the importance of knowing the network assets.

3compares internal and external vulnerability scanning and highlights the need for a comprehensive network asset inventory for both types.

A data breach has occurred due lo malware. Which of the following should be the FIRST course of action?

A.
Notify the cyber insurance company.
A.
Notify the cyber insurance company.
Answers
B.
Shut down the affected systems.
B.
Shut down the affected systems.
Answers
C.
Quarantine the impacted systems.
C.
Quarantine the impacted systems.
Answers
D.
Notify customers of the breach.
D.
Notify customers of the breach.
Answers
Suggested answer: C

Explanation:

The first course of action when a data breach has occurred due to malware is to quarantine the impacted systems. This means isolating the infected systems from the rest of the network and preventing any further communication or data transfer with them. This can help contain the spread of the malware, limit the damage and exposure of sensitive data, and facilitate the investigation and remediation of the incident. Quarantining the impacted systems can also help preserve the evidence and logs that may be needed for forensic analysis or legal action.

[1] provides a guide on how to respond to a data breach caused by malware and recommends quarantining the impacted systems as the first step.

[2] explains what is malware and how it can cause data breaches, and suggests quarantining the infected devices as a best practice.

[3] describes the steps involved in quarantining a system infected by malware and the benefits of doing so.

Which of the following should an IS auditor be MOST concerned with during a post-implementation review?

A.
The system does not have a maintenance plan.
A.
The system does not have a maintenance plan.
Answers
B.
The system contains several minor defects.
B.
The system contains several minor defects.
Answers
C.
The system deployment was delayed by three weeks.
C.
The system deployment was delayed by three weeks.
Answers
D.
The system was over budget by 15%.
D.
The system was over budget by 15%.
Answers
Suggested answer: A

Explanation:

A post-implementation review (PIR) is an assessment conducted at the end of a project cycle to determine if the project was indeed successful and to identify any existing flaws in the project1.One of the main objectives of a PIR is to evaluate the outcome and functional value of a project1. Therefore, an IS auditor should be most concerned with whether the system meets the intended requirements and delivers the expected benefits to the stakeholders. A system that does not have a maintenance plan is a major risk, as it may not be able to cope with changing needs, fix errors, or prevent security breaches.A maintenance plan is essential for ensuring the system's reliability, availability, and performance in the long term2.

The other options are less critical for a PIR, as they are more related to the project management aspects than the system quality aspects. The system may contain several minor defects that do not affect its functionality or usability, and these can be resolved in future updates. The system deployment may be delayed by three weeks due to unforeseen circumstances or dependencies, but this does not necessarily mean that the system is faulty or ineffective. The system may be over budget by 15% due to various factors such as scope creep, resource constraints, or market fluctuations, but this does not imply that the system is not valuable or beneficial.

Which of the following would BEST demonstrate that an effective disaster recovery plan (DRP) is in place?

A.
Frequent testing of backups
A.
Frequent testing of backups
Answers
B.
Annual walk-through testing
B.
Annual walk-through testing
Answers
C.
Periodic risk assessment
C.
Periodic risk assessment
Answers
D.
Full operational test
D.
Full operational test
Answers
Suggested answer: D

Explanation:

A disaster recovery plan (DRP) is a set of procedures and resources that enable an organization to restore its critical operations, data, and applications in the event of a disaster1.A DRP should be aligned with the organization's business continuity plan (BCP), which defines the strategies and objectives for maintaining business functions during and after a disaster1.

To ensure that a DRP is effective, it should be tested regularly and thoroughly to identify and resolve any issues or gaps that might hinder its execution2345.Testing a DRP can help evaluate its feasibility, validity, reliability, and compatibility with the organization's environment and needs4.Testing can also help prepare the staff, stakeholders, and vendors involved in the DRP for their roles and responsibilities during a disaster3.

There are different methods and levels of testing a DRP, depending on the scope, complexity, and objectives of the test4. Some of the common testing methods are:

Walkthrough testing: This is a step-by-step review of the DRP by the disaster recovery team and relevant stakeholders.It aims to verify the completeness and accuracy of the plan, as well as to clarify any doubts or questions among the participants45.

Simulation testing: This is a mock exercise of the DRP in a simulated disaster scenario.It aims to assess the readiness and effectiveness of the plan, as well as to identify any challenges or weaknesses that might arise during a real disaster45.

Checklist testing: This is a verification of the availability and functionality of the resources and equipment required for the DRP.It aims to ensure that the backup systems, data, and documentation are accessible and up-to-date45.

Full interruption testing: This is the most realistic and rigorous method of testing a DRP. It involves shutting down the primary site and activating the backup site for a certain period of time.It aims to measure the actual impact and performance of the DRP under real conditions45.

Parallel testing: This is a less disruptive method of testing a DRP. It involves running the backup site in parallel with the primary site without affecting the normal operations.It aims to compare and validate the results and outputs of both sites45.

Among these methods, full interruption testing would best demonstrate that an effective DRP is in place, as it provides the most accurate and comprehensive evaluation of the plan's capabilities and limitations4.Full interruption testing can reveal any hidden or unforeseen issues or risks that might affect the recovery process, such as data loss, system failure, compatibility problems, or human errors4.Full interruption testing can also verify that the backup site can support the critical operations and services of the organization without compromising its quality or security4.

However, full interruption testing also has some drawbacks, such as being costly, time-consuming, risky, and disruptive to the normal operations4.Therefore, it should be planned carefully and conducted periodically with proper coordination and communication among all parties involved4.

The other options are not as effective as full interruption testing in demonstrating that an effective DRP is in place.Frequent testing of backups is only one aspect of checklist testing, which does not cover other components or scenarios of the DRP4.Annual walk-through testing is only a theoretical review of the DRP, which does not test its practical implementation or outcomes4.Periodic risk assessment is only a preparatory step for developing or updating the DRP, which does not test its functionality or performance4.

Which of the following is the BEST way to mitigate the impact of ransomware attacks?

A.
Invoking the disaster recovery plan (DRP)
A.
Invoking the disaster recovery plan (DRP)
Answers
B.
Backing up data frequently
B.
Backing up data frequently
Answers
C.
Paying the ransom
C.
Paying the ransom
Answers
D.
Requiring password changes for administrative accounts
D.
Requiring password changes for administrative accounts
Answers
Suggested answer: B

Explanation:

Ransomware is a type of malicious software that encrypts the victim's data and demands a ransom for its decryption1.Ransomware attacks can cause significant damage to an organization's operations, reputation, and finances1. Therefore, it is important to mitigate the impact of ransomware attacks by implementing effective prevention and recovery strategies.

One of the best ways to mitigate the impact of ransomware attacks is to back up data frequently12345.Data backups are copies of the organization's data that are stored in a separate location or medium, such as an external hard drive, cloud storage, or tape2.Data backups can help the organization restore its data in case of a ransomware attack, without paying the ransom or losing valuable information2.Data backups should be performed regularly, preferably daily or weekly, depending on the criticality and volume of the data2.Data backups should also be tested periodically to ensure their integrity and usability2.

The other options are not as effective as backing up data frequently in mitigating the impact of ransomware attacks.Invoking the disaster recovery plan (DRP) is a reactive measure that can help the organization resume its operations after a ransomware attack, but it does not prevent or reduce the damage caused by the attack3. Paying the ransom is not a recommended option, as it does not guarantee the decryption of the data or the deletion of the stolen data by the attackers.Paying the ransom also encourages further attacks and funds criminal activities14. Requiring password changes for administrative accounts is a good security practice, but it is not sufficient to prevent or recover from ransomware attacks.Ransomware attacks can exploit other vulnerabilities, such as phishing emails, outdated software, or weak network security15.

Malicious program code was found in an application and corrected prior to release into production. After the release, the same issue was reported. Which of the following is the IS auditor's BEST recommendation?

A.
Ensure corrected program code is compiled in a dedicated server.
A.
Ensure corrected program code is compiled in a dedicated server.
Answers
B.
Ensure change management reports are independently reviewed.
B.
Ensure change management reports are independently reviewed.
Answers
C.
Ensure programmers cannot access code after the completion of program edits.
C.
Ensure programmers cannot access code after the completion of program edits.
Answers
D.
Ensure the business signs off on end-to-end user acceptance test (UAT) results.
D.
Ensure the business signs off on end-to-end user acceptance test (UAT) results.
Answers
Suggested answer: C

Explanation:

The IS auditor's best recommendation is to ensure that programmers cannot access code after the completion of program edits. This is because programmers who have access to code after editing may introduce unauthorized or malicious changes that could compromise the security, functionality, or performance of the application. By restricting access to code after editing, the organization can ensure that only authorized and tested code is released into production, and prevent any tampering or reoccurrence of the same issue.

1discusses the importance of controlling access to code after editing and testing, and provides some best practices for doing so.

2explains how programmers can introduce malicious code into applications, and how to prevent and detect such attacks.

3describes the role of IS auditors in reviewing and assessing the security and quality of application code.

Documentation of workaround processes to keep a business function operational during recovery of IT systems is a core part of a:

A.
business impact analysis (BIA).
A.
business impact analysis (BIA).
Answers
B.
threat and risk assessment.
B.
threat and risk assessment.
Answers
C.
business continuity plan (BCP).
C.
business continuity plan (BCP).
Answers
D.
disaster recovery plan (DRP).
D.
disaster recovery plan (DRP).
Answers
Suggested answer: C

Explanation:

A business continuity plan (BCP) is a system of prevention and recovery from potential threats to a company.The plan ensures that personnel and assets are protected and are able to function quickly in the event of a disaster1. A core part of a BCP is the documentation of workaround processes to keep a business function operational during recovery of IT systems.Workaround processes are alternative methods or procedures that can be used to perform a business function when the normal IT systems are unavailable or disrupted2. For example, if an online payment system is down, a workaround process could be to accept manual payments or use a backup system.Workaround processes help to minimize the impact of IT disruptions on the business operations and ensure continuity of service to customers and stakeholders3.

1explains what is a business continuity plan and why it is important.

2defines what is a workaround process and how it can be used in a BCP.

3provides examples of workaround processes for different business functions.

Which of the following strategies BEST optimizes data storage without compromising data retention practices?

A.
Limiting the size of file attachments being sent via email
A.
Limiting the size of file attachments being sent via email
Answers
B.
Automatically deleting emails older than one year
B.
Automatically deleting emails older than one year
Answers
C.
Moving emails to a virtual email vault after 30 days
C.
Moving emails to a virtual email vault after 30 days
Answers
D.
Allowing employees to store large emails on flash drives
D.
Allowing employees to store large emails on flash drives
Answers
Suggested answer: A

Explanation:

The best strategy to optimize data storage without compromising data retention practices is to limit the size of file attachments being sent via email. This strategy can reduce the amount of storage space required for email messages, as well as the network bandwidth consumed by email traffic. File attachments can be large and often contain redundant or unnecessary information that can be compressed, converted, or removed before sending. By limiting the size of file attachments, the sender can encourage the use of more efficient formats, such as PDF or ZIP, or alternative methods of sharing files, such as cloud storage or web links. This can also improve the security and privacy of email communications, as large attachments may pose a higher risk of being intercepted, corrupted, or infected by malware.

Data Storage Optimization: What is it and Why Does it Matter?

Data storage optimization 101: Everything you need to know

Which of the following should an IS auditor recommend as a PRIMARY area of focus when an organization decides to outsource technical support for its external customers?

A.
Align service level agreements (SLAs) with current needs.
A.
Align service level agreements (SLAs) with current needs.
Answers
B.
Monitor customer satisfaction with the change.
B.
Monitor customer satisfaction with the change.
Answers
C.
Minimize costs related to the third-party agreement.
C.
Minimize costs related to the third-party agreement.
Answers
D.
Ensure right to audit is included within the contract.
D.
Ensure right to audit is included within the contract.
Answers
Suggested answer: A

Explanation:

The primary area of focus when an organization decides to outsource technical support for its external customers is to align service level agreements (SLAs) with current needs. SLAs are contracts that define the scope, quality, and expectations of the services provided by the vendor, as well as the remedies or penalties for non-compliance. SLAs are essential for ensuring that the outsourced technical support meets the customer's requirements and satisfaction, as well as the organization's objectives and standards. By aligning SLAs with current needs, the organization can specify the key performance indicators (KPIs), metrics, and targets that reflect the desired outcomes and value of the technical support. This can also help to monitor and evaluate the vendor's performance, identify gaps or issues, and implement corrective actions or improvements.

Service Level Agreement (SLA) Examples and Template

What is an SLA? Best practices for service-level agreements

To confirm integrity for a hashed message, the receiver should use:

A.
the same hashing algorithm as the sender's to create a binary image of the file.
A.
the same hashing algorithm as the sender's to create a binary image of the file.
Answers
B.
a different hashing algorithm from the sender's to create a binary image of the file.
B.
a different hashing algorithm from the sender's to create a binary image of the file.
Answers
C.
the same hashing algorithm as the sender's to create a numerical representation of the file.
C.
the same hashing algorithm as the sender's to create a numerical representation of the file.
Answers
D.
a different hashing algorithm from the sender's to create a numerical representation of the file.
D.
a different hashing algorithm from the sender's to create a numerical representation of the file.
Answers
Suggested answer: A

Explanation:

To confirm integrity for a hashed message, the receiver should use the same hashing algorithm as the sender's to create a binary image of the file. A hashing algorithm is a mathematical function that transforms an input data into a fixed-length output value, called a hash or a digest. A hashing algorithm has two main properties: it is one-way, meaning that it is easy to compute the hash from the input, but hard to recover the input from the hash; and it is collision-resistant, meaning that it is very unlikely to find two different inputs that produce the same hash. These properties make hashing algorithms useful for verifying the integrity of data, as any change in the input data will result in a different hash value. Therefore, to confirm integrity for a hashed message, the receiver should use the same hashing algorithm as the sender's to create a binary image of the file, which is a representation of the file in bits (0s and 1s). The receiver should then compare this binary image with the hash value sent by the sender. If they match, then the message has not been altered in transit. If they do not match, then the message has been corrupted or tampered with.

Ensuring Data Integrity with Hash Codes

Message Integrity

Total 1.198 questions
Go to page: of 120