CISA : Certified Information Systems Auditor : Part 168

  1. Critical processes are not defined in an organization’s business continuity plan (BCP). Which of the following would have MOST likely identified the gap?

    • Updating the risk register
    • Reviewing the business continuity strategy
    • Reviewing the business impact analysis (BIA)
    • Testing the incident response plan
  2. A healthcare facility offers patients health tracking devices that can be monitored remotely by healthcare professionals. Which of the following is the BEST way to protect patient personal information from unauthorized exfiltration?

    • Restrict the devices to using Internet Protocol (IP) version 6 only
    • Add a digital certificate to the devices that limits communication to specific servers
    • Provide the patients with Internet security training and education programs
    • Configure the devices to reboot automatically every 7 days
  3. Which of the following is MOST important to ensure when reviewing a global organization’s controls to protect data held on its IT infrastructure across all of its locations?

    • The threat of natural disasters in each location hosting infrastructure has been accounted for.
    • The capacity of underlying communications infrastructure in the host locations is sufficient.
    • Technical capabilities exist in each location to manage the data and recovery operations.
    • Relevant data protection legislation and regulations for each location are adhered to.
  4. Which of the following is the PRIMARY concern when negotiating a contract for a hot site?

    • Complete testing of the recovery plan
    • Availability of the site in the event of multiple disaster declarations
    • Reciprocal agreements with other organizations
    • Coordination with the site staff in the event of multiple disaster declarations
  5. Which of the following would an IS auditor recommend as the MOST effective preventive control to reduce the risk of data leakage?

    • Ensure that paper documents are disposed securely.
    • Verify that application logs capture any changes made.
    • Implement an intrusion detection system (IDS).
    • Validate all data files contain digital watermarks.
  6. During an audit of a disaster recovery plan (DRP) for a critical business area, an IS auditor finds that not all critical systems are covered. What should the auditor do NEXT?

    • Evaluate the impact of not covering the systems
    • Escalate the finding to senior management
    • Evaluate the prior year’s audit results regarding critical system coverage
    • Verify whether the systems are part of the business impact analysis (BIA)
  7. An organization sends daily backup media by courier to an offsite location. Which of the following provides the BEST evidence that the media is transported reliably?

    • Documented backup media transport procedures
    • Certification of the courier company
    • Deliver schedule of the backup media
    • Signed acknowledgements by offsite manager
  8. An organization shares some of its customers’ personally identifiable information (PII) with third-party suppliers for business purposes. What is MOST important for the IS auditor to evaluate to ensure that risk associated with leakage of privacy-related data during transmission is effectively managed?

    • Encrypting and masking of customer data
    • The third party’s privacy and data security policies
    • Nondisclosure and indemnity agreements
    • Service and operational level agreements
  9. Which of the following is the BEST control to mitigate the malware risk associated with an instant messaging (IM) system?

    • Blocking external IM traffic
    • Blocking attachments in IM
    • Allowing only corporate IM solutions
    • Encrypting IM traffic
  10. Which of the following types of firewalls provide the GREATEST degree of control against hacker intrusion?

    • Screening router
    • Packet filtering router
    • Application level gateway
    • Circuit gateway
  11. Which of the following is the BEST control to prevent the transfer of files to external parties through instant messaging (IM) applications?

    • File Transfer Protocol (FTP)
    • Application level firewalls
    • Instant messaging policy
    • File level encryption
  12. Which of the following is MOST effective in detecting an intrusion attempt?

    • Installing biometrics-based authentication
    • Analyzing system logs
    • Using smart cards with one-time passwords
    • Using packet filter software
  13. A USB device containing sensitive production data was lost by an employee, and its contents were subsequently found published online. Which of the following controls is the BEST recommendation to prevent a similar recurrence?

    • Training users on USB device security
    • Monitoring data being downloaded on USB devices
    • Electronically tracking portable devices
    • Using a strong encryption algorithm
  14. An IS auditor is reviewing an organization’s business continuity plan (BCP) following a change in organizational structure with significant impact to business processes. Which of the following findings should be the auditor’s GREATEST concern?

    • Copies of the BCP have not been distributed to new business unit end users since the reorganization
    • The most recent business impact analysis (BIA) was performed two years before the reorganization
    • A test plan for the BCP has not been completed during the last two years
    • Key business process end users did not participate in the business impact analysis (BIA)
  15. What is BEST for an IS auditor to review when assessing the effectiveness of changes recently made to processes and tools related to an organization’s business continuity plan (BCP)?

    • Change management processes
    • Completed test plans
    • Updated inventory of systems
    • Full test results
  16. Which type of attack poses the GREATEST risk to an organization’s most sensitive data?

    • Password attack
    • Eavesdropping attack
    • Spear phishing attack
    • Insider attack
  17. An organization uses multiple offsite data center facilities. Which of the following is MOST important to consider when choosing related backup devices and media?

    • Associated costs
    • Standardization
    • Backup media capacity
    • Restoration speed
  18. An organization allows employees to retain confidential data on personal mobile devices. Which of the following is the BEST recommendation to mitigate the risk of data leakage from lost or stolen devices?

    • Require employees to attend security awareness training
    • Password protect critical data files
    • Enable device auto-lock function
    • Configure to auto-wipe after multiple failed access attempts
  19. Which of the following is the BEST recommendation to prevent fraudulent electronic funds transfers by accounts payable employees?

    • Re-keying of monetary amounts
    • Dual control
    • Periodic vendor reviews
    • Independent reconciliation
  20. An IS auditor observes that a business-critical application does not currently have any level of fault tolerance. Which of the following is the GREATEST concern with this situation?

    • Degradation of services
    • Limited tolerance for damage
    • Decreased mean time between failure (MTBF)
    • Single point of failure
Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments