ExamGecko
Home Home / Isaca / CISA

Isaca CISA Practice Test - Questions Answers, Page 97

Question list
Search
Search

List of questions

Search

Related questions

External audits have identified recurring exceptions in the user termination process, despite similar internal audits having reported no exceptions in the past. Which of the following is the IS auditor's BEST course of action to improve the internal audit process in the future?

A.
Include the user termination process in all upcoming audits.
A.
Include the user termination process in all upcoming audits.
Answers
B.
Review user termination process changes.
B.
Review user termination process changes.
Answers
C.
Review the internal audit sampling methodology.
C.
Review the internal audit sampling methodology.
Answers
D.
Review control self-assessment (CSA) results.
D.
Review control self-assessment (CSA) results.
Answers
Suggested answer: C

An IS auditor is supporting a forensic investigation. An image of affected storage media has been captured while collecting digital forensic evidence. Which of the following techniques would BEST enable an IS auditor to verify that the captured image is an exact, unchanged replica of the original media?

A.
Hash value
A.
Hash value
Answers
B.
Access control list
B.
Access control list
Answers
C.
File allocation table
C.
File allocation table
Answers
D.
Size of the file
D.
Size of the file
Answers
Suggested answer: A

Which of the following measures BEST mitigates the risk of data exfiltration during a cyberattack?

A.
Data loss prevention (DLP) system
A.
Data loss prevention (DLP) system
Answers
B.
Network access controls (NAC)
B.
Network access controls (NAC)
Answers
C.
Perimeter firewall
C.
Perimeter firewall
Answers
D.
Hashing of sensitive data
D.
Hashing of sensitive data
Answers
Suggested answer: A

Having knowledge in which of the following areas is MOST relevant for an IS auditor reviewing public key infrastructure (PKI)?

A.
Design and application of key controls in public audit
A.
Design and application of key controls in public audit
Answers
B.
Security strategy in public cloud Infrastructure as a Service (IaaS)
B.
Security strategy in public cloud Infrastructure as a Service (IaaS)
Answers
C.
Modern encoding methods for digital communications
C.
Modern encoding methods for digital communications
Answers
D.
Technology and process life cycle for digital certificates and key pairs
D.
Technology and process life cycle for digital certificates and key pairs
Answers
Suggested answer: D

A small business unit is implementing a control self-assessment (CSA) program and leveraging the internal audit function to test its internal controls annually. Which of the following is the MOST significant benefit of this approach?

A.
Compliance costs are reduced.
A.
Compliance costs are reduced.
Answers
B.
Risks are detected earlier.
B.
Risks are detected earlier.
Answers
C.
Business owners can focus more on their core roles.
C.
Business owners can focus more on their core roles.
Answers
D.
Line management is more motivated to avoid control exceptions.
D.
Line management is more motivated to avoid control exceptions.
Answers
Suggested answer: B

Explanation:

The most significant benefit of implementing a control self-assessment (CSA) program and leveraging the internal audit function to test its internal controls annually is that risks are detected earlier. A CSA program is a process that enables business owners and managers to assess and improve their own internal controls on a regular basis, without relying on external auditors or consultants. A CSA program can help identify and mitigate risks, enhance performance, increase accountability, and foster a culture of control within the organization. By leveraging the internal audit function to test its internal controls annually, a small business unit can also obtain independent assurance and validation of its CSA results, as well as recommendations for improvement. This approach can help reduce compliance costs, as external audits may be less frequent or extensive. However, this is not the most significant benefit, as compliance costs are only one aspect of the total cost of risk. Business owners can also focus more on their core roles, as they can delegate some of their control responsibilities to their staff or teams through CSA. However, this is not the most significant benefit, as business owners still need to oversee and monitor their CSA activities and results, and ensure that they align with their strategic objectives and priorities. Line management may also be more motivated to avoid control exceptions, as they are directly involved in assessing and improving their own controls through CSA. However, this is not the most significant benefit, as motivation alone may not be sufficient to ensure effective control design and operation.Reference:Info Technology & Systems Resources | COBIT, Risk, Governance ... - ISACA,IT Governance and Process Maturity

Which of the following is an IS auditor's BEST recommendation to mitigate the risk of eavesdropping associated with an application programming interface (API) integration implementation?

A.
Encrypt the extensible markup language (XML) file.
A.
Encrypt the extensible markup language (XML) file.
Answers
B.
Implement Transport Layer Security (TLS).
B.
Implement Transport Layer Security (TLS).
Answers
C.
Implement Simple Object Access Protocol (SOAP).
C.
Implement Simple Object Access Protocol (SOAP).
Answers
D.
Mask the API endpoints.
D.
Mask the API endpoints.
Answers
Suggested answer: B

Explanation:

The best recommendation to mitigate the risk of eavesdropping associated with an API integration implementation is to implement Transport Layer Security (TLS). TLS is a cryptographic protocol that provides secure communication over a network by encrypting the data in transit and authenticating the parties involved. TLS can prevent unauthorized parties from intercepting, modifying or tampering with the data exchanged between the API endpoints. Encrypting the XML file, implementing SOAP, and masking the API endpoints are not sufficient to mitigate the risk of eavesdropping, as they do not provide end-to-end encryption or authentication for the API communication.Reference:IS Audit and Assurance Tools and Techniques,CISA Certification | Certified Information Systems Auditor | ISACA

Which of the following is MOST critical to the success of an information security program?

A.
Management's commitment to information security
A.
Management's commitment to information security
Answers
B.
User accountability for information security
B.
User accountability for information security
Answers
C.
Alignment of information security with IT objectives
C.
Alignment of information security with IT objectives
Answers
D.
Integration of business and information security
D.
Integration of business and information security
Answers
Suggested answer: A

Explanation:

The most critical factor for the success of an information security program is management's commitment to information security. Management's commitment to information security means that the senior management supports, sponsors, funds, monitors and enforces the information security program within the organization. Management's commitment to information security also demonstrates leadership, sets the tone and culture, and establishes the strategic direction and objectives for information security. User accountability for information security, alignment of information security with IT objectives, and integration of business and information security are also important factors for the success of an information security program, but they are not as critical as management's commitment to information security, as they depend on or derive from it.Reference:Info Technology & Systems Resources | COBIT, Risk, Governance ... - ISACA,IT Governance and Process Maturity

Several unattended laptops containing sensitive customer data were stolen from personnel offices Which of the following would be an IS auditor's BEST recommendation to protect data in case of recurrence?

A.
Encrypt the disk drive.
A.
Encrypt the disk drive.
Answers
B.
Require two-factor authentication
B.
Require two-factor authentication
Answers
C.
Enhance physical security
C.
Enhance physical security
Answers
D.
Require the use of cable locks
D.
Require the use of cable locks
Answers
Suggested answer: A

Explanation:

According to the CISA - Certified Information Systems Auditor Study Guide1, the correct answer to your question is A. Encrypt the disk drive. This is because encryption is a logical security measure that can protect data even if the physical device is stolen or lost. Encryption makes the data unreadable and inaccessible without the proper key or password. The other options are not as effective as encryption in this scenario. Two-factor authentication is a user authentication method that requires two pieces of evidence to verify the user's identity, such as a password and a code sent to a phone. However, this does not prevent unauthorized access to the data if the laptop is already logged in or if the attacker can bypass the authentication. Enhancing physical security is a preventive measure that can reduce the risk of theft, but it does not guarantee that theft will not occur or that the data will be safe if it does. Requiring the use of cable locks is another preventive measure that can deter thieves, but it can also be easily cut or removed by a determined attacker.

Which of the following should be done FIRST when planning to conduct internal and external penetration testing for a client?

A.
Establish the timing of testing.
A.
Establish the timing of testing.
Answers
B.
Identify milestones.
B.
Identify milestones.
Answers
C.
Determine the test reporting
C.
Determine the test reporting
Answers
D.
Establish the rules of engagement.
D.
Establish the rules of engagement.
Answers
Suggested answer: D

Explanation:

The rules of engagement define the scope, objectives, methodology, deliverables, and limitations of the penetration testing. They also specify the legal and ethical boundaries, communication channels, and escalation procedures. Establishing the rules of engagement is the first step when planning to conduct penetration testing for a client, as it ensures that both parties agree on the expectations and outcomes of the testing.The other options are important steps, but they should be done after the rules of engagement are established.Reference:CISA Review Manual (Digital Version)1, page 381.

When planning an internal penetration test, which of the following is the MOST important step prior to finalizing the scope of testing?

A.
Ensuring the scope of penetration testing is restricted to the test environment
A.
Ensuring the scope of penetration testing is restricted to the test environment
Answers
B.
Obtaining management's consent to the testing scope in writing
B.
Obtaining management's consent to the testing scope in writing
Answers
C.
Notifying the IT security department regarding the testing scope
C.
Notifying the IT security department regarding the testing scope
Answers
D.
Agreeing on systems to be excluded from the testing scope with the IT department
D.
Agreeing on systems to be excluded from the testing scope with the IT department
Answers
Suggested answer: B

Explanation:

Obtaining management's consent to the testing scope in writing is the most important step prior to finalizing the scope of testing, as it ensures that the penetration testers have the authorization and approval to perform the testing activities. It also protects them from any legal liabilities or accusations of unauthorized access or damage. The other options are not as important as obtaining management's consent, and they may vary depending on the specific situation and agreement.For example, some systems may not be excluded from the testing scope, and some tests may not be restricted to the test environment.Reference:CISA Review Manual (Digital Version)1, page 381-382.

Total 1.198 questions
Go to page: of 120