Practice Free CISA Exam Online Questions
Which of the following is the BEST way to ensure email confidentiality in transit?
- A . Encryption of corporate network traffic
- B . Complex user passwords
- C . End-to-end encryption
- D . Digital signatures
C
Explanation:
End-to-end encryption ensures that email content is encrypted during transmission and can only be decrypted by the intended recipient. This approach provides robust protection against interception and unauthorized access.
Encryption of Corporate Network Traffic (Option A): This does not address email confidentiality once the email leaves the corporate network.
Complex User Passwords (Option B): Enhances account security but does not ensure email confidentiality in transit.
Digital Signatures (Option D): Ensures authenticity and integrity but does not encrypt the email content.
Reference: ISACA CISA Review Manual, Job Practice Area 4: Protection of Information Assets.
Which of the following constitutes an effective detective control in a distributed processing environment?
- A . A log of privileged account use is reviewed.
- B . A disaster recovery plan (DRP)4% in place for the entire system.
- C . User IDs are suspended after three incorrect passwords have been entered.
- D . Users are required to request additional access via an electronic mail system.
When an intrusion into an organization network is deleted, which of the following should be done FIRST?
- A . Block all compromised network nodes.
- B . Contact law enforcement.
- C . Notify senior management.
- D . Identity nodes that have been compromised.
D
Explanation:
The first thing that should be done when an intrusion into an organization network is detected is to identify nodes that have been compromised. Identifying nodes that have been compromised is a critical step in responding to an intrusion, as it helps determine the scope, impact, and source of the attack, and enables the implementation of appropriate containment and recovery measures. The other options are not the first things that should be done when an intrusion into an organization network is detected, as they may be premature or ineffective without identifying nodes that have been compromised. Blocking all compromised network nodes is a containment measure that can help isolate and prevent the spread of the attack, but it may not be possible or feasible without identifying nodes that have been compromised. Contacting law enforcement is a reporting measure that can help seek external assistance and comply with legal obligations, but it may not be necessary or appropriate without identifying nodes that have been compromised. Notifying senior management is a communication measure that can help inform and escalate the incident, but it may not be urgent or accurate without identifying nodes that have been compromised.
Reference: CISA Review Manual (Digital Version), Chapter 4, Section 4.2.2
Which of the following methods will BEST reduce the risk associated with the transition to a new system using technologies that are not compatible with the old system?
- A . Parallel changeover
- B . Modular changeover
- C . Phased operation
- D . Pilot operation
A
Explanation:
The best method to reduce the risk associated with the transition to a new system using technologies that are not compatible with the old system is parallel changeover. Parallel changeover is a method of system conversion that involves running both the old and the new systems simultaneously for a period of time, until the new system is verified to be working correctly and completely. Parallel changeover can help reduce the risk of data loss, errors, or disruptions that may occur due to the incompatibility of the technologies, as well as provide a backup option in case of failure or malfunction of the new system. Parallel changeover can also help users compare and validate the results of both systems, and facilitate their training and adaptation to the new system.
Modular changeover is a method of system conversion that involves replacing one module or component of the old system with a corresponding module or component of the new system at a time, until the entire system is replaced. Modular changeover can help reduce the complexity and scope of the conversion, as well as minimize the impact on the users and operations. However, modular changeover may not be feasible or effective when the technologies of the old and new systems are not compatible, as it may create integration or interoperability issues among the modules.
Phased operation is a method of system conversion that involves implementing the new system in stages or increments, each with a subset of functions or features, until the entire system is operational. Phased operation can help reduce the risk and cost of implementing a large and complex system, as well as allow for testing and feedback at each stage. However, phased operation may not be suitable or efficient when the technologies of the old and new systems are not compatible, as it may require extensive modifications or adaptations to enable partial functionality.
Pilot operation is a method of system conversion that involves implementing the new system in a limited or controlled environment, such as a department or a location, before rolling it out to the entire organization. Pilot operation can help test and evaluate the performance and usability of the new system, as well as identify and resolve any issues or problems before full-scale implementation. However, pilot operation may not be relevant or reliable when the technologies of the old and new systems are not compatible, as it may not reflect the actual conditions or challenges of operating both systems concurrently.
Reference: TRANSITION TO THE NEW SYSTEM – O’Reilly Media 1
10 Challenges To Think About When Upgrading From Legacy Systems – Forbes
Prior to a follow-up engagement, an IS auditor learns that management has decided to accept a level of residual risk related to an audit finding without remediation. The IS auditor is concerned about management’s decision.
Which of the following should be the IS auditor’s NEXT course of action?
- A . Accept management’s decision and continue the follow-up.
- B . Report the issue to IS audit management.
- C . Report the disagreement to the board.
- D . Present the issue to executive management.
B
Explanation:
Prior to a follow-up engagement, if an IS auditor learns that management has decided to accept a level of residual risk related to an audit finding without remediation, the IS auditor should report the issue to IS audit management. This is because IS audit management is responsible for ensuring that audit findings are properly communicated and resolved. Accepting management’s decision and continuing the follow-up would not address the IS auditor’s concern. Reporting the disagreement to the board or executive management would be premature and inappropriate without consulting IS audit management first.
Reference: CISA Review Manual (Digital Version), Chapter 1, Section 1.6
An organization has recently become aware of a pervasive chip-level security vulnerability that affects all of its processors.
Which of the following is the BEST way to prevent this vulnerability from being exploited?
- A . Implement security awareness training.
- B . Install vendor patches
- C . Review hardware vendor contracts.
- D . Review security log incidents.
B
Explanation:
The best way to prevent a chip-level security vulnerability from being exploited is to install vendor patches. A chip-level security vulnerability is a flaw in the design or implementation of a processor that allows an attacker to bypass the normal security mechanisms and access privileged information or execute malicious code. A vendor patch is a software update provided by the manufacturer of the processor that fixes or mitigates the vulnerability. Installing vendor patches can help to protect the system from known exploits and reduce the risk of data leakage or compromise.
Security awareness training, reviewing hardware vendor contracts, and reviewing security log incidents are not as effective as installing vendor patches for preventing a chip-level security vulnerability from being exploited. Security awareness training is an educational program that teaches users about the importance of security and how to avoid common threats. Reviewing hardware vendor contracts is a legal process that evaluates the terms and conditions of the agreement between the organization and the processor supplier. Reviewing security log incidents is an analytical process that examines the records of security events and activities on the system. These methods may be useful for other security purposes, but they do not directly address the root cause of the chip-level vulnerability or prevent its exploitation.
Reference: Protecting your device against chip-related security vulnerabilities, New ‘Downfall’ Flaw Exposes Valuable Data in Generations of Intel Chips
During an audit, an IT finding is agreed upon by all IT teams involved, but no team wants to be responsible for remediation or considers the finding within Its area of responsibility.
Which of the following is the IS auditor’s BEST course of action?
- A . Escalate to IT management for resolution.
- B . Issue the finding without identifying an owner
- C . Assign shared responsibility to all IT teams.
- D . Determine the most appropriate team and assign accordingly.
A
Explanation:
The best course of action for the IS auditor is
When assessing the overall effectiveness of an organization’s disaster recovery planning process, which of the following is MOST important for the IS auditor to verify?
- A . Management contracts with a third party for warm site services.
- B . Management schedules an annual tabletop exercise.
- C . Management documents and distributes a copy of the plan to all personnel.
- D . Management reviews and updates the plan annually or as changes occur.
D
Explanation:
The overall effectiveness of an organization’s disaster recovery planning process depends on how well the plan reflects the current and future needs and risks of the organization, and how well the plan is tested, communicated, and maintained. Among the four options given, the most important one for the IS auditor to verify is that management reviews and updates the plan annually or as changes occur.
A disaster recovery plan is not a static document that can be created once and forgotten. It is a dynamic and evolving process that requires regular review and update to ensure that it remains relevant, accurate, and effective. A disaster recovery plan should be reviewed and updated at least annually, or whenever there are significant changes in the organization’s structure, operations, environment, or regulations. These changes could affect the business impact analysis, risk assessment, recovery objectives, recovery strategies, roles and responsibilities, or resources of the disaster recovery plan. If the plan is not updated to reflect these changes, it could become obsolete, incomplete, or inconsistent, and fail to meet the organization’s recovery needs or expectations.
The other three options are not as important as reviewing and updating the plan, although they may also contribute to the effectiveness of the disaster recovery planning process. Contracting with a third party for warm site services is a possible recovery strategy that involves using a partially equipped facility that can be quickly activated in case of a disaster. However, this strategy may not be suitable or sufficient for every organization or scenario, and it does not guarantee the success of the disaster recovery plan. Scheduling an annual tabletop exercise is a good practice that involves simulating a disaster scenario and testing the plan in a hypothetical setting. However, this exercisemay not be enough to evaluate the feasibility or readiness of the plan, and it should be complemented by other types of tests, such as walkthroughs, drills, or full-scale exercises. Documenting and distributing a copy of the plan to all personnel is an essential step that ensures that everyone involved in or affected by the plan is aware of their roles and responsibilities, and has access to the relevant information and instructions. However, this step alone does not ensure that the plan is understood or followed by all personnel, and it should be accompanied by proper training, education, and awareness programs.
Therefore, reviewing and updating the plan annually or as changes occur is the best answer.
An IS auditor finds ad hoc vulnerability scanning is in place with no clear alignment to the organization’s wider security threat and vulnerability management program.
Which of the following would BEST enable the organization to work toward improvement in this area?
- A . Implementing security logging to enhance threat and vulnerability management
- B . Maintaining a catalog of vulnerabilities that may impact mission-critical systems
- C . Using a capability maturity model to identify a path to an optimized program
- D . Outsourcing the threat and vulnerability management function to a third party
C
Explanation:
The best way to enable the organization to work toward improvement in its security threat and
vulnerability management program is to use a capability maturity model to identify a path to an optimized program. A capability maturity model is a framework that helps organizations assess their current level of performance and maturity in a specific domain, and provides guidance and best practices to achieve higher levels of excellence12. A capability maturity model for vulnerability management can help the organization to evaluate its current practices, identify gaps and weaknesses, and implement improvement actions based on the defined criteria and objectives34.
Reference
1: What is a Capability Maturity Model?1 2: Capability Maturity Model – Wikipedia2 3: Vulnerability Management Maturity Model – SANS Institute4 4: 5 Stages Of Vulnerability Management Maturity Model – SecPod Blog3
A financial accounting system audit determined that audit logging of transactions had been disabled by a finance employee. The IS auditor recommended that finance personnel no longer have the capability to change audit logging settings.
Which of the following is MOST important to verify during the follow-up?
- A . Finance personnel receive security awareness training.
- B . Audit logs of transactions are reviewed.
- C . Changes to configurations are documented.
- D . Least privilege access is being enforced.
