ExamGecko
Question list
Search
Search

Related questions











Question 461 - CISA discussion

Report
Export

An IS auditor concludes that logging and monitoring mechanisms within an organization are ineffective because critical servers are not included within the central log repository. Which of the following audit procedures would have MOST likely identified this exception?

A.
Inspecting a sample of alerts generated from the central log repository
Answers
A.
Inspecting a sample of alerts generated from the central log repository
B.
Comparing a list of all servers from the directory server against a list of all servers present in the central log repository
Answers
B.
Comparing a list of all servers from the directory server against a list of all servers present in the central log repository
C.
Inspecting a sample of alert settings configured in the central log repository
Answers
C.
Inspecting a sample of alert settings configured in the central log repository
D.
Comparing all servers included in the current central log repository with the listing used for the prior-year audit
Answers
D.
Comparing all servers included in the current central log repository with the listing used for the prior-year audit
Suggested answer: B

Explanation:

The audit procedure that would have most likely identified the exception of critical servers not included in the central log repository is to compare a list of all servers from the directory server against a list of all servers present in the central log repository. This would allow the IS auditor to detect any discrepancies or omissions in the central log repository. The other audit procedures (A, C and D) would not be effective in identifying this exception, as they would only focus on the alerts generated, the alert settings configured, or the servers included in the previous year's audit, which may not reflect the current state of the central log repository.Reference:IS Audit and Assurance Guideline 2202: Evidence Collection Techniques,CISA Review Manual (Digital Version), Chapter 5: Protection of Information Assets, Section 5.3: Logging and Monitoring

asked 18/09/2024
Markus Hechtl
35 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first