Practice Free CISA Exam Online Questions
Which of the following is the MOST effective way for an organization to project against data loss?
- A . Limit employee internet access.
- B . Implement data classification procedures.
- C . Review firewall logs for anomalies.
- D . Conduct periodic security awareness training.
D
Explanation:
Data loss can occur due to various reasons, such as accidental deletion, hardware failure, malware infection, theft, or unauthorized access. Data classification procedures can help to identify and protect sensitive data, but they are not sufficient to prevent data loss. The most effective way to protect against data loss is to conduct periodic security awareness training for employees, which can educate them on the importance of data security, the best practices for data handling and storage, and the common threats and risks to data.
During a review of system access, an IS auditor notes that an employee who has recently changed roles within the organization still has previous access rights.
The auditor’s NEXT step should be to:
- A . recommend a control to automatically update access rights.
- B . determine the reason why access rights have not been revoked.
- C . direct management to revoke current access rights.
- D . determine if access rights are in violation of software licenses.
B
Explanation:
The NEXT step for the IS auditor after noting that an employee who has recently changed roles within the organization still has previous access rights should be to B. determine the reason why access rights have not been revoked. Identifying the cause of this situation is crucial for understanding whether it’s due to oversight, process gaps, or other factors. Once the reason is determined, appropriate corrective actions can be recommended to ensure that access rights are aligned with the employee’s current role and responsibilities1.
Which of the following is a social engineering attack method?
- A . An employee is induced to reveal confidential IP addresses and passwords by answering questions over the phone.
- B . A hacker walks around an office building using scanning tools to search for a wireless network to gain access.
- C . An intruder eavesdrops and collects sensitive information flowing through the network and sells it to third parties.
- D . An unauthorized person attempts to gain access to secure premises by following an authorized person through a secure door.
A
Explanation:
Social engineering is a technique that exploits human weaknesses, such as trust, curiosity, or greed, to obtain information or access from a target. An employee is induced to reveal confidential IP addresses and passwords by answering questions over the phone is an example of a social engineering attack method, as it involves manipulating the employee into divulging sensitive information that can be used to compromise the network or system. A hacker walks around an office building using scanning tools to search for a wireless network to gain access, an intruder eavesdrops and collects sensitive information flowing through the network and sells it to third parties, and an unauthorized person attempts to gain access to secure premises by following an authorized person through a secure door are not examples of social engineering attack methods, as they do not involve human interaction or deception.
Reference: [ISACA CISA Review Manual 27th Edition], page 361.
An IS auditor discovers that validation controls m a web application have been moved from the server side into the browser to boost performance.
This would MOST likely increase the risk of a successful attack by.
- A . phishing.
- B . denial of service (DoS)
- C . structured query language (SQL) injection
- D . buffer overflow
C
Explanation:
Moving validation controls from the server side into the browser would most likely increase the risk of a successful attack by structured query language (SQL) injection. SQL injection is a technique that exploits a security vulnerability in an application’s database layer by inserting malicious SQL statements into user input fields. Validation controls are used to check and filter user input before sending it to the database. If these controls are moved to the browser, they can be easily bypassed or modified by an attacker, who can then execute arbitrary SQL commands on the database.
Reference: CISA Review Manual, 27th Edition, page 361
A sample for testing must include the 80 largest client balances and a random sample of the rest.
What should the IS auditor recommend?
- A . Query the database.
- B . Develop an integrated test facility (ITF).
- C . Use generalized audit software.
- D . Leverage a random number generator.
C
Explanation:
Generalized audit software is a type of computer-assisted audit technique (CAAT) that allows the IS auditor to perform various audit tasks on the data stored in different file formats and databases1. Generalized audit software can help the IS auditor to select a sample for testing that includes the 80 largest client balances and a random sample of the rest, by using functions such as sorting, filtering, stratifying, and randomizing the data23. Generalized audit software can also help the IS auditor to perform other audit procedures on the sample, such as verifying the accuracy, completeness, and validity of the data4.
Reference
1: Generalized Audit Software (GAS) – ISACA 2: Audit Sampling – ISACA 3: How to use generalized audit software to perform audit sampling 4: Generalized Audit Software: A Review of Five Packages
What is the PRIMARY purpose of performing a parallel run of a now system?
- A . To train the end users and supporting staff on the new system
- B . To verify the new system provides required business functionality
- C . To reduce the need for additional testing
- D . To validate the new system against its predecessor
D
Explanation:
The primary purpose of performing a parallel run of a new system is to validate the new system against its predecessor. A parallel run is a strategy for system changeover where a new system slowly assumes the roles of the older system while both systems operate simultaneously. This allows for comparison of the results and outputs of both systems to ensure that the new system is working correctly and reliably. A parallel run can also help identify and resolve any errors, discrepancies, or inconsistencies in the new system before the old system is discontinued.
The other options are not the primary purpose of performing a parallel run of a new system.
An IS auditor can BEST evaluate the business impact of system failures by:
- A . assessing user satisfaction levels.
- B . interviewing the security administrator.
- C . analyzing equipment maintenance logs.
- D . reviewing system-generated logs.
From a risk management perspective, which of the following is the BEST approach when implementing a large and complex data center IT infrastructure?
- A . Simulating the new infrastructure before deployment
- B . Prototyping and a one-phase deployment
- C . A deployment plan based on sequenced phases
- D . A big bang deployment with a successful proof of concept
C
Explanation:
The best approach from a risk management perspective when implementing a large and complex data center IT infrastructure is to use a deployment plan based on sequenced phases, as this will allow the organization to break down the project into manageable and measurable stages, and to monitor and control the progress, quality, and outcomes of each phase12. A phased deployment plan can also help to reduce the risks of errors, failures, or disruptions that could affect the entire infrastructure, and to implement corrective actions or contingency plans as needed34.
Reference
1: Data Center Project Planning: A Guide to Success2 2: Data Center Project Planning: A Guide to Success4 3: Data Center Migration: A Step-by-Step Guide3 4: Data Center Migration: A Step-by-Step Guide1
Which of the following is the PRIMARY reason for an IS audit manager to review the work performed by a senior IS auditor prior to presentation of a report?
- A . To ensure the conclusions are adequately supported
- B . To ensure adequate sampling methods were used during fieldwork
- C . To ensure the work is properly documented and filed
- D . To ensure the work is conducted according to industry standards
A
Explanation:
The primary reason for an IS audit manager to review the work performed by a senior IS auditor prior to presentation of a report is to ensure the conclusions are adequately supported. The IS audit manager is responsible for overseeing and supervising the audit process, ensuring the quality and consistency of the audit work, and approving the audit report and recommendations. The IS audit manager should review the work performed by the senior IS auditor to verify that the audit objectives, scope, and criteria have been met, that the audit evidence is sufficient, reliable, and relevant, and that the audit conclusions are logical, objective, and based on the audit evidence. The IS audit manager should also ensure that the audit report is clear, concise, accurate, and complete, and that it communicates the audit findings, conclusions, and recommendations effectively to the intended audience. The other options are not the primary reason for an IS audit manager to reviewthe work performed by a seniorIS auditor prior to presentation of a report, because they either relate to specific aspects or stages of the audit work rather than the overall outcome, or they are part of the senior IS auditor’s responsibility rather than the IS audit manager’s.
Reference: CISA Review Manual (Digital Version)1, Chapter 2, Section 2.2.5
Which of the following should an IS auditor consider FIRST when evaluating firewall rules?
- A . The organization’s security policy
- B . The number of remote nodes
- C . The firewalls’ default settings
- D . The physical location of the firewalls
A
Explanation:
This should be the first thing that an IS auditor considers when evaluating firewall rules, because it defines the objectives, standards, and guidelines for securing the organization’s network and information assets. The firewall rules should be aligned with the organization’s security policy, and reflect the level of risk and protection required for each type of network traffic, system, or data. The IS auditor should compare the firewall rules with the security policy, and identify any discrepancies, gaps, or conflicts that could compromise the security or performance of the network.
The other options are not as important as the organization’s security policy when evaluating firewall rules:
The number of remote nodes. This is a factor that may affect the complexity and scalability of the firewall rules, but it is not a primary consideration for the IS auditor. Remote nodes are devices or systems that connect to the network from outside locations, such as teleworkers, mobile users, or branch offices. The IS auditor should ensure that the firewall rules provide adequate security and access control for remote nodes, but this depends on the organization’s security policy and business needs.
The firewalls’ default settings. These are the predefined configurations that come with the firewall devices or software, and that determine how they handle network traffic by default. The IS auditor should review the firewalls’ default settings, and verify that they are appropriate and secure for the organization’s network environment. However, the firewalls’ default settings may not match the organization’s security policy or specific requirements, and may need to be customized or overridden by firewall rules.
The physical location of the firewalls. This is a factor that may affect the placement and design of the firewall rules, but it is not a critical consideration for the IS auditor. The physical location of the firewalls refers to where they are installed or deployed in relation to the network topology, such as at the network perimeter, between network segments, or on individual hosts. The IS auditor should ensure that the firewall rules are consistent and coordinated across different locations, but this depends on the organization’s security policy and network architecture.
