Topic 3: Exam Pool C
Which of the following should be of GREATEST concern to an IS auditor conducting an audit of incident response procedures?
A.
End users have not completed security awareness training.
B.
Senior management is not involved in the incident response process.
C.
There is no procedure in place to learn from previous security incidents.
D.
Critical incident response events are not recorded in a centralized repository.
Senior management is not involved in the incident response process.
An IS auditor is performing a post-implementation review of a system deployed two years ago. Which of the following findings should be of MOST concern to the auditor?
A.
Maintenance costs were not included in the project lifecycle costs.
B.
Benefits as stated in the business case have not been realized.
C.
Workarounds due to remaining defects had to be used longer than anticipated.
D.
The system has undergone several change requests to further extend functionality.
Benefits as stated in the business case have not been realized.
Intrusion detection systems (IDSs) can:
A.
substitute for a firewall.
B.
compensate for weak authentication mechanisms
C.
conduct investigations of attacks from within the network
D.
provide information to enhance the security infrastructure.
provide information to enhance the security infrastructure.
Which of the following is the PRIMARY concern if a business continuity plan (BCP) is not based on a business impact analysis (BIA)?
A.
The critical systems were not identified but all systems are covered tn the BCP.
B.
The knowledge of key people within the organization was not considered in the BCP.
C.
The strategy of the BCP does not reflect estimated potential losses.
D.
Management was not involved in the early stages of the BCP
The strategy of the BCP does not reflect estimated potential losses.
An IS auditor evaluating a three-tier client/server architecture observes an issue with graphical user interface (GUI) tasks. Which layer should the auditor recommend the client address?
A.
Presentation layer
B.
Application layer
C.
Storage layer
D.
Transport layer
Presentation layer
Which of the following is the PRIMARY responsibility of an organizations information security function?
A.
Managing the organization's security procedures
B.
Reviewing unauthorized attempts to access sensitive files
C.
Approving access to data files
D.
Installing network security programs
Managing the organization's security procedures
To preserve chain-of-custody following an internal server compromise, which of the following should be the FIRST step?
A.
Trace the attacking route.
B.
Replicate the attack using the remaining evidence.
C.
Take a system image including memory dump.
D.
Safely shut down the server.
Take a system image including memory dump.
In reviewing the IT strategic plan, the IS auditor should consider whether it identifies the:
A.
major IT initiatives
B.
links to operational tactical plans.
C.
allocation of IT staff
D.
project management methodologies used.
links to operational tactical plans.
In a follow-up audit, an IS auditor notes that management has addressed the original findings in a different way than originally agreed upon. The auditor should FIRST:
A.
escalate the deviation to the audit committee
B.
mark the recommendation as satisfied and close the finding.
C.
verify if management's action mitigates the identified risk
D.
re-perform the audit to assess the changed control environment
verify if management's action mitigates the identified risk
An IS auditor finds multiple situations where the help desk resolved security incidents without notifying IT security as required by policy. Which of the following is the BEST audit recommendation?
A.
Reinforce the incident escalation process
B.
Redesign the help desk reporting process
C.
Have IT security review problem management policy
D.
Display the incident response hotline in common areas
Reinforce the incident escalation process
Which of the following should an IS auditor recommend as MOST critical to an effective performance improvement process for IT services?
A.
Progress on performance goals is regularly reported to the board.
B.
The performance goals are aligned with a commonly accepted framework.
C.
Root cause analysis of service issues is used to develop performance goals.
D.
Management accepts accountability for achieving performance goals.
Management accepts accountability for achieving performance goals.
Which of the following is the FIRST consideration when developing a data retention policy?
A.
Determining the backup cycle based on retention period
B.
Designing an infrastructure storage strategy
C.
Identifying the legal and contractual retention period for data
D.
Determining the security access privileges to the data
Identifying the legal and contractual retention period for data
| Page 26 out of 85 Pages |
| 1314151617181920212223242526272829303132333435363738 |
| CISA Practice Test Home |
Real-World Scenario Mastery: Our CISA practice exam don't just test definitions. They present you with the same complex, scenario-based problems you'll encounter on the actual exam.
Strategic Weakness Identification: Each practice session reveals exactly where you stand. Discover which domains need more attention, before exam day arrives.
Confidence Through Familiarity: There's no substitute for knowing what to expect. When you've worked through our comprehensive CISA practice exam questions pool covering all topics, the real exam feels like just another practice session.